Geometric Inhomogeneous Random Graphs (GIRGs)

Size: px
Start display at page:

Download "Geometric Inhomogeneous Random Graphs (GIRGs)"

Transcription

1 Geometric Inhomogeneous Random Graphs (GIRGs) (ETH Zürich) joint work with K. Bringmann, R. Keusch, C. Koch

2 Motivation: Network Models want to develop good algorithms for large real-world networks want to have asymptotic statements, benchmarks, real network data is scarce and hard to obtain social: facebook, twitter, mobile phone, friendship, collaboration.. technological: internet, www, web of things, these networks share many properties power law degrees, (ultra-)small world, strong clustering, small separators,

3 Motivation: Network Models properties models power law degree? small world? clustering? non-rigid clust.? easy to analyze? Kleinberg pref. attachm. Chung-Lu geom. random hyperbolic spatial pref. att. GIRGs

4 Motivation: Hyperbolic Random Graphs best model so far: hyperbolic random graphs each vertex draws a random position in a hyperbolic disc of radius R. two points connect if and only if their distance is at most R. has many nice properties: power law degrees, clustering, small world,

5 Motivation: Hyperbolic Random Graphs best model so far: hyperbolic random graphs each vertex draws a random position in a hyperbolic disc of radius R. two points connect if and only if their distance is at most R. has many nice properties: power law degrees, clustering, small world, BUT: kind of complicated.

6 Motivation: GIRGs GIRGs () are natural. are very easy to analyze. are extremely flexible.

7 Motivation: GIRGs GIRGs () are natural. are very easy to analyze. are extremely flexible. Model 3: General Model 2: GIRGs Model 1: Euclidean

8 Motivation: GIRGs GIRGs () are natural. are very easy to analyze. are extremely flexible. Chung-Lu Model 3: General Model 2: GIRGs Norros-Reittu Model 1: Euclidean hyperbolic

9 Motivation: GIRGs GIRGs () are natural. are very easy to analyze. are extremely flexible. Chung-Lu Model 3: General Model 2: GIRGs Norros-Reittu Model 1: Euclidean hyperbolic

10 Model 1: Euclidean

11 Model 1: Euclidean We start with n vertices.

12 Model 1: Euclidean We start with n vertices. Each vertex vi draws independently a weight wi from a power law distribution: Pr[w i = w] = (w ), where 2 < < 3.

13 Model 1: Euclidean We start with n vertices. Each vertex vi draws independently a weight wi from a power law distribution: Pr[w i = w] = (w ), where 2 < < 3. Each vertex vi draws independently a position xi from the hypercube [0, 1] d.

14 Model 1: Euclidean We start with n vertices. Each vertex vi draws independently a weight wi from a power law distribution: Pr[w i = w] = (w ), where 2 < < 3. Each vertex vi draws independently a position xi from the hypercube [0, 1] d. For each pair (i,j), we independently connect vi and vj with prob. n d w i w o j p i,j = p(w i,w j,x i,x j )= min 1, x i x j, n where > 1 is a parameter.

15 Basic Properties Lemma: For any fixed xi, wi, wj, 1. Pr xj [v i v j ]= min 1, w iw j n. 2. E[deg(v i )] = (w i ).

16 Basic Properties Lemma: For any fixed xi, wi, wj, 1. Pr xj [v i v j ]= min 1, w iw j n. 2. E[deg(v i )] = (w i ). Corollary: The degree of a vertex vi of weight wi is Poisson distributed (in the limit) with mean (w i ). E[w i ]= (1) => There are O(n) edges.

17 (Ultra-)Small World Theorem: Whp, 1. the graph contains a giant component of linear size. 2. all other components are of polylog size. 3. the diameter of the graph is polylogarithmic. 4. the average distance in the giant is (2 + o(1)) log log n log( 2).

18 (Ultra-)Small World Theorem: Whp, 1. the graph contains a giant component of linear size. 2. all other components are of polylog size. 3. the diameter of the graph is polylogarithmic. 4. the average distance in the giant is (2 + o(1)) log log n log( 2). holds in the most general model (including Chung-Lu graphs) same is true for other power-law graph models (e.g., preferential attachment)

19 Clustering Definition: The clustering coefficient of a graph is cc := Pr u,v,w [v w u 2 V,v,w 2 (u)].

20 Clustering Definition: The clustering coefficient of a graph is cc := Pr u,v,w [v w u 2 V,v,w 2 (u)]. Social (and other) networks have large clustering coefficient. most models with power law degrees have cc = (1/n). (Chung-Lu, preferential attachment, ) exception: hyperbolic random graphs have cc = (1).

21 Clustering Definition: The clustering coefficient of a graph is cc := Pr u,v,w [v w u 2 V,v,w 2 (u)]. Social (and other) networks have large clustering coefficient. most models with power law degrees have cc = (1/n). (Chung-Lu, preferential attachment, ) exception: hyperbolic random graphs have cc = (1). Theorem: GIRGs have cc = (1).

22 Stability Theorem: GIRGs have small separators: n 1 (1) It suffices to delete edges from the graph to split the giant into two components of linear size.

23 Stability Theorem: GIRGs have small separators: n 1 (1) It suffices to delete edges from the graph to split the giant into two components of linear size. was unstudied for hyperbolic random graphs. Chung Lu and pref. attachment models are different: Removing o(n) edges or vertices reduces the giant by at most o(n). Real-world networks have small separators.

24 Entropy/Compression Observation: The web graph can be stored using bits per edge.

25 Entropy/Compression Observation: The web graph can be stored using bits per edge. 2-3 (!)

26 Entropy/Compression Observation: The web graph can be stored using bits per edge. 2-3 (!) Theorem: We can store a GIRG with expected O(n) bits, so that we can answer the queries - What is the degree of v? - What is the i-th neighbor of v? in time O(1). The algorithm has expected runtime O(n).

27 Entropy/Compression Observation: The web graph can be stored using bits per edge. 2-3 (!) Theorem: We can store a GIRG with expected O(n) bits, so that we can answer the queries - What is the degree of v? - What is the i-th neighbor of v? in time O(1). The algorithm has expected runtime O(n). compression algorithm for hyperbolic graphs was known. Chung Lu and pref. attachment models have entropy (n log n). (I.e., need (log n) bits per edge.)

28 Sampling Theorem: For every concrete function p(w i,w j,x i,x j )= min 1, x i x j d wiw j n, we can sample a GIRG in expected linear time (under some technical assumptions).

29 Sampling Theorem: For every concrete function p(w i,w j,x i,x j )= min 1, x i x j d wiw j n, we can sample a GIRG in expected linear time (under some technical assumptions). Naive sampling needs time (n 2 ). Efficient algorithms were known for Chung-Lu model and others. Best previous algorithm for hyperbolic random graphs had runtime (n 3/2 ).

30 Greedy Routing

31 Greedy Routing Vertex s wants to send message to vertex t. s only knows position and weight of its neighbors and of t

32 Greedy Routing Vertex s wants to send message to vertex t. s only knows position and weight of its neighbors and of t We try to maximize greedily '(v) :=Pr[t is neighbor of v].

33 Greedy Routing Vertex s wants to send message to vertex t. s only knows position and weight of its neighbors and of t We try to maximize greedily '(v) :=Pr[t is neighbor of v]. ALGORITHM (greedy routing): REPEAT until we find t: - s := best neighbor of s - IF '(s 0 ) > '(s) THEN s 0 := s ELSE fail.

34 Greedy Routing Vertex s wants to send message to vertex t. s only knows position and weight of its neighbors and of t We try to maximize greedily '(v) :=Pr[t is neighbor of v]. ALGORITHM (greedy routing): REPEAT until we find t: - s := best neighbor of s - IF '(s 0 ) > '(s) THEN s 0 := s ELSE fail. Theorem: With probability in (2 + o(1)) log log n log( 2) (1), greedy routing succeeds steps. With small modifications (e.g. backtracking), it succeeds within this time whp and in expectation.

35 Bootstrap Percolation We fix a region B of volume. In round 0, every vertex in B turns active with probability p. An active vertex stays active forever. A vertex has with k active neighbors turns active next round.

36 Bootstrap Percolation We fix a region B of volume. In round 0, every vertex in B turns active with probability p. An active vertex stays active forever. A vertex has with k active neighbors turns active next round. Theorem: Let p 0 := 1/( 1).Then if p p 0 then (n) vertices turn active whp; if p p 0 then no vertex turns active after round 0 whp; if p = (p 0 ) then either case happens with prob (1).

37 Bootstrap Percolation We fix a region B of volume. In round 0, every vertex in B turns active with probability p. An active vertex stays active forever. A vertex has with k active neighbors turns active next round. Theorem: Let p 0 := 1/( 1).Then if p p 0 then (n) vertices turn active whp; if p p 0 then no vertex turns active after round 0 whp; if p = (p 0 ) then either case happens with prob (1). Theorem: Assume > 1. Let v be a vertex of weight w 1 and distance r... from B. Thewhpv turns active in round (1 ± o(1))`(v) ± O(1), where `(v) := ( max{0, log log kr d n/w / log( 2) }, if w>(r d n) 1/( 1), (2 log log (r d n) log log w)/ log( 2), if w apple (r d n) 1/( 1).

38 Non-Euclidean GIRGs Chung-Lu Model 3: General Model 2: GIRGs Norros-Reittu Model 1: Euclidean hyperbolic

39 Non-Euclidean GIRGs Chung-Lu Model 3: General Model 2: GIRGs Norros-Reittu Model 1: Euclidean hyperbolic

40 Model 1: Euclidean We start with n vertices. Each vertex vi draws independently a weight wi from a power law distribution: Pr[w i = w] = (w ), where 2 < < 3. Each vertex vi draws independently a position xi from the hypercube [0, 1] d. For each pair (i,j), we independently connect vi and vj with prob. n p i,j = p(w i,w j,x i,x j )= min 1, x i x j d wiw o j n where > 1 is a parameter,,

41 Model 2: Distance We start with n vertices. Each vertex vi draws independently a weight wi from a power law distribution: Pr[w i = w] = (w ), where 2 < < 3. Each vertex vi draws independently a position xi from the hypercube [0, 1] d. For each pair (i,j), we independently connect vi and vj with prob. n p i,j = p(w i,w j,x i,x j )= min 1, wiw o j Vol(B i,j ) 1 n where > 1 is a parameter, and B i,j is the ball around x i with radius d(x i,x j ).,

42 Model 2: Distance For each pair (i,j), we independently connect vi and vj with prob. n p i,j = p(w i,w j,x i,x j )= min 1, wiw o j Vol(B i,j ) 1, n where > 1 is a parameter, and B i,j is the ball around x i with radius d(x i,x j ). Example: minimum component distance

43 Model 2: Distance For each pair (i,j), we independently connect vi and vj with prob. n p i,j = p(w i,w j,x i,x j )= min 1, wiw o j Vol(B i,j ) 1, n where > 1 is a parameter, and B i,j is the ball around x i with radius d(x i,x j ). Example: minimum component distance "-neighborhood

44 Model 2: Distance For each pair (i,j), we independently connect vi and vj with prob. n p i,j = p(w i,w j,x i,x j )= min 1, wiw o j Vol(B i,j ) 1, n where > 1 is a parameter, and B i,j is the ball around x i with radius d(x i,x j ). Example: minimum component distance "-neighborhood

45 Model 2: Distance For each pair (i,j), we independently connect vi and vj with prob. n p i,j = p(w i,w j,x i,x j )= min 1, wiw o j Vol(B i,j ) 1, n where > 1 is a parameter, and B i,j is the ball around x i with radius d(x i,x j ). Example: minimum component distance "-neighborhood

46 Model 2: Distance For each pair (i,j), we independently connect vi and vj with prob. n p i,j = p(w i,w j,x i,x j )= min 1, wiw o j Vol(B i,j ) 1, n where > 1 is a parameter, and B i,j is the ball around x i with radius d(x i,x j ). Example: minimum component distance "-neighborhood

47 Model 2: Distance For each pair (i,j), we independently connect vi and vj with prob. n p i,j = p(w i,w j,x i,x j )= min 1, wiw o j Vol(B i,j ) 1, n where > 1 is a parameter, and B i,j is the ball around x i with radius d(x i,x j ). Example: minimum component distance "-neighborhood

48 Summary General Model: - power law degrees - small world: components, diameter, average distance Distance Model: - strong clustering (if distance function is nice ) - may be non-rigid clustering Euclidean Model (or other norms): - small separators - small entropy, efficient compression - linear time sampling

49 Future Work Algorithms - communication protocols - de-anonymization Processes - infection processes (work in progress) - information dissemination Others - recovering the underlying geometry - attacks - dynamic graph problems - games on graphs

50 Thank you for your attention! Questions?

Distribution-Free Models of Social and Information Networks

Distribution-Free Models of Social and Information Networks Distribution-Free Models of Social and Information Networks Tim Roughgarden (Stanford CS) joint work with Jacob Fox (Stanford Math), Rishi Gupta (Stanford CS), C. Seshadhri (UC Santa Cruz), Fan Wei (Stanford

More information

Supplementary material to Epidemic spreading on complex networks with community structures

Supplementary material to Epidemic spreading on complex networks with community structures Supplementary material to Epidemic spreading on complex networks with community structures Clara Stegehuis, Remco van der Hofstad, Johan S. H. van Leeuwaarden Supplementary otes Supplementary ote etwork

More information

Cooperative Computing for Autonomous Data Centers

Cooperative Computing for Autonomous Data Centers Cooperative Computing for Autonomous Data Centers Jared Saia (U. New Mexico) Joint with: Jon Berry, Cindy Phillips (Sandia Labs), Aaron Kearns (U. New Mexico) Outline 1) Bounding clustering coefficients

More information

Lesson 4. Random graphs. Sergio Barbarossa. UPC - Barcelona - July 2008

Lesson 4. Random graphs. Sergio Barbarossa. UPC - Barcelona - July 2008 Lesson 4 Random graphs Sergio Barbarossa Graph models 1. Uncorrelated random graph (Erdős, Rényi) N nodes are connected through n edges which are chosen randomly from the possible configurations 2. Binomial

More information

Topology Enhancement in Wireless Multihop Networks: A Top-down Approach

Topology Enhancement in Wireless Multihop Networks: A Top-down Approach Topology Enhancement in Wireless Multihop Networks: A Top-down Approach Symeon Papavassiliou (joint work with Eleni Stai and Vasileios Karyotis) National Technical University of Athens (NTUA) School of

More information

Detection and approximation of linear structures in metric spaces

Detection and approximation of linear structures in metric spaces Stanford - July 12, 2012 MMDS 2012 Detection and approximation of linear structures in metric spaces Frédéric Chazal Geometrica group INRIA Saclay Joint work with M. Aanjaneya, D. Chen, M. Glisse, L. Guibas,

More information

Social, Information, and Routing Networks: Models, Algorithms, and Strategic Behavior

Social, Information, and Routing Networks: Models, Algorithms, and Strategic Behavior Social, Information, and Routing Networks: Models, Algorithms, and Strategic Behavior Who? Prof. Aris Anagnostopoulos Prof. Luciana S. Buriol Prof. Guido Schäfer What will We Cover? Topics: Network properties

More information

Rumour spreading in the spatial preferential attachment model

Rumour spreading in the spatial preferential attachment model Rumour spreading in the spatial preferential attachment model Abbas Mehrabian University of British Columbia Banff, 2016 joint work with Jeannette Janssen The push&pull rumour spreading protocol [Demers,

More information

Randomized Rumor Spreading in Social Networks

Randomized Rumor Spreading in Social Networks Randomized Rumor Spreading in Social Networks Benjamin Doerr (MPI Informatics / Saarland U) Summary: We study how fast rumors spread in social networks. For the preferential attachment network model and

More information

Fast Hierarchical Clustering via Dynamic Closest Pairs

Fast Hierarchical Clustering via Dynamic Closest Pairs Fast Hierarchical Clustering via Dynamic Closest Pairs David Eppstein Dept. Information and Computer Science Univ. of California, Irvine http://www.ics.uci.edu/ eppstein/ 1 My Interest In Clustering What

More information

Branching Distributional Equations and their Applications

Branching Distributional Equations and their Applications Branching Distributional Equations and their Applications Mariana Olvera-Cravioto UNC Chapel Hill molvera@unc.edu August 22nd, 2018 Bath-UNAM-CMAT, Lecture 3 Branching Distributional Equations and their

More information

Random walks on random planar triangulations via the circle packing theorem

Random walks on random planar triangulations via the circle packing theorem via the circle packing theorem Tel-Aviv University Mini-school on Random Maps and the Gaussian Free Field, ENS Lyon, May 15th 2017 Basic terminology Planar map: a graph embedded in R 2 so that vertices

More information

Graph Definitions. In a directed graph the edges have directions (ordered pairs). A weighted graph includes a weight function.

Graph Definitions. In a directed graph the edges have directions (ordered pairs). A weighted graph includes a weight function. Graph Definitions Definition 1. (V,E) where An undirected graph G is a pair V is the set of vertices, E V 2 is the set of edges (unordered pairs) E = {(u, v) u, v V }. In a directed graph the edges have

More information

Integral Geometry and the Polynomial Hirsch Conjecture

Integral Geometry and the Polynomial Hirsch Conjecture Integral Geometry and the Polynomial Hirsch Conjecture Jonathan Kelner, MIT Partially based on joint work with Daniel Spielman Introduction n A lot of recent work on Polynomial Hirsch Conjecture has focused

More information

Clustering coefficients in large directed graphs

Clustering coefficients in large directed graphs Clustering coefficients in large directed graphs Lasse Leskelä Aalto University, Finland joint work with Mindaugas Bloznelis, U Vilnius Proc. WAW 06, https://arxiv.org/abs/607.078 0 Dec 06 Statistical

More information

Distributed approximation algorithms in unit-disk graphs

Distributed approximation algorithms in unit-disk graphs Distributed approximation algorithms in unit-disk graphs A. Czygrinow 1 and M. Hańćkowiak 2 1 Department of Mathematics and Statistics Arizona State University Tempe, AZ 85287-1804, USA andrzej@math.la.asu.edu

More information

Small-World Models and Network Growth Models. Anastassia Semjonova Roman Tekhov

Small-World Models and Network Growth Models. Anastassia Semjonova Roman Tekhov Small-World Models and Network Growth Models Anastassia Semjonova Roman Tekhov Small world 6 billion small world? 1960s Stanley Milgram Six degree of separation Small world effect Motivation Not only friends:

More information

On the Longest Path and The Diameter in Random Apollonian Networks

On the Longest Path and The Diameter in Random Apollonian Networks On the Longest Path and The Diameter in Random Apollonian Networks Abbas Mehrabian amehrabi@uwaterloo.ca University of Waterloo Frontiers in Mathematical Sciences Honouring Siavash Shahshahani Sharif University

More information

Impact of Clustering on Epidemics in Random Networks

Impact of Clustering on Epidemics in Random Networks Impact of Clustering on Epidemics in Random Networks Joint work with Marc Lelarge INRIA-ENS 8 March 2012 Coupechoux - Lelarge (INRIA-ENS) Epidemics in Random Networks 8 March 2012 1 / 19 Outline 1 Introduction

More information

Flat Routing on Curved Spaces

Flat Routing on Curved Spaces Flat Routing on Curved Spaces Dmitri Krioukov (CAIDA/UCSD) dima@caida.org Berkeley April 19 th, 2006 Clean slate: reassess fundamental assumptions Information transmission between nodes in networks that

More information

Chapter 8 DOMINATING SETS

Chapter 8 DOMINATING SETS Chapter 8 DOMINATING SETS Distributed Computing Group Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking

More information

Preferential attachment models and their generalizations

Preferential attachment models and their generalizations Preferential attachment models and their generalizations Liudmila Ostroumova, Andrei Raigorodskii Yandex Lomonosov Moscow State University Moscow Institute of Physics and Technology June, 2013 Experimental

More information

CS249: SPECIAL TOPICS MINING INFORMATION/SOCIAL NETWORKS

CS249: SPECIAL TOPICS MINING INFORMATION/SOCIAL NETWORKS CS249: SPECIAL TOPICS MINING INFORMATION/SOCIAL NETWORKS Overview of Networks Instructor: Yizhou Sun yzsun@cs.ucla.edu January 10, 2017 Overview of Information Network Analysis Network Representation Network

More information

CS-E5740. Complex Networks. Scale-free networks

CS-E5740. Complex Networks. Scale-free networks CS-E5740 Complex Networks Scale-free networks Course outline 1. Introduction (motivation, definitions, etc. ) 2. Static network models: random and small-world networks 3. Growing network models: scale-free

More information

Chapter 8 DOMINATING SETS

Chapter 8 DOMINATING SETS Distributed Computing Group Chapter 8 DOMINATING SETS Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking

More information

Algorithms design under a geometric lens Spring 2014, CSE, OSU Lecture 1: Introduction

Algorithms design under a geometric lens Spring 2014, CSE, OSU Lecture 1: Introduction 5339 - Algorithms design under a geometric lens Spring 2014, CSE, OSU Lecture 1: Introduction Instructor: Anastasios Sidiropoulos January 8, 2014 Geometry & algorithms Geometry in algorithm design Computational

More information

High Dimensional Clustering

High Dimensional Clustering Distributed Computing High Dimensional Clustering Bachelor Thesis Alain Ryser aryser@ethz.ch Distributed Computing Group Computer Engineering and Networks Laboratory ETH Zürich Supervisors: Zeta Avarikioti,

More information

Statistical topological data analysis using. Persistence landscapes

Statistical topological data analysis using. Persistence landscapes Motivation Persistence landscape Statistical topological data analysis using persistence landscapes Cleveland State University February 3, 2014 funded by AFOSR Motivation Persistence landscape Topological

More information

arxiv: v1 [cs.ni] 28 Apr 2015

arxiv: v1 [cs.ni] 28 Apr 2015 Succint greedy routing without metric on planar triangulations Pierre Leone, Kasun Samarasinghe Computer Science Department, University of Geneva, Battelle A, route de Drize 7, 1227 Carouge, Switzerland

More information

Graph Algorithms. Many problems in networks can be modeled as graph problems.

Graph Algorithms. Many problems in networks can be modeled as graph problems. Graph Algorithms Many problems in networks can be modeled as graph problems. - The topology of a distributed system is a graph. - Routing table computation uses the shortest path algorithm - Efficient

More information

Math 443/543 Graph Theory Notes 10: Small world phenomenon and decentralized search

Math 443/543 Graph Theory Notes 10: Small world phenomenon and decentralized search Math 443/543 Graph Theory Notes 0: Small world phenomenon and decentralized search David Glickenstein November 0, 008 Small world phenomenon The small world phenomenon is the principle that all people

More information

Mathematical and Algorithmic Foundations Linear Programming and Matchings

Mathematical and Algorithmic Foundations Linear Programming and Matchings Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis

More information

Models of Network Formation. Networked Life NETS 112 Fall 2017 Prof. Michael Kearns

Models of Network Formation. Networked Life NETS 112 Fall 2017 Prof. Michael Kearns Models of Network Formation Networked Life NETS 112 Fall 2017 Prof. Michael Kearns Roadmap Recently: typical large-scale social and other networks exhibit: giant component with small diameter sparsity

More information

Graph Algorithms. Many problems in networks can be modeled as graph problems.

Graph Algorithms. Many problems in networks can be modeled as graph problems. Graph Algorithms Graph Algorithms Many problems in networks can be modeled as graph problems. - The topology of a distributed system is a graph. - Routing table computation uses the shortest path algorithm

More information

Scalable P2P architectures

Scalable P2P architectures Scalable P2P architectures Oscar Boykin Electrical Engineering, UCLA Joint work with: Jesse Bridgewater, Joseph Kong, Kamen Lozev, Behnam Rezaei, Vwani Roychowdhury, Nima Sarshar Outline Introduction to

More information

Machine Learning for Signal Processing Clustering. Bhiksha Raj Class Oct 2016

Machine Learning for Signal Processing Clustering. Bhiksha Raj Class Oct 2016 Machine Learning for Signal Processing Clustering Bhiksha Raj Class 11. 13 Oct 2016 1 Statistical Modelling and Latent Structure Much of statistical modelling attempts to identify latent structure in the

More information

Routing. Geo-Routing. Thanks to Stefan Schmid for slides

Routing. Geo-Routing. Thanks to Stefan Schmid for slides Routing Geo-Routing Thanks to Stefan Schmid for slides 1 Overview Classic routing overview Geo-routing Greedy geo-routing Euclidean and Planar graphs Face Routing Greedy and Face Routing 2 Shortest path

More information

Community detection. Leonid E. Zhukov

Community detection. Leonid E. Zhukov Community detection Leonid E. Zhukov School of Data Analysis and Artificial Intelligence Department of Computer Science National Research University Higher School of Economics Network Science Leonid E.

More information

Combinatorial Geometry & Approximation Algorithms

Combinatorial Geometry & Approximation Algorithms Combinatorial Geometry & Approximation Algorithms Timothy Chan U. of Waterloo PROLOGUE Analysis of Approx Factor in Analysis of Runtime in Computational Geometry Combinatorial Geometry Problem 1: Geometric

More information

Peer-to-Peer Data Management

Peer-to-Peer Data Management Peer-to-Peer Data Management Wolf-Tilo Balke Sascha Tönnies Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 10. Networkmodels 1. Introduction Motivation

More information

MATH 567: Mathematical Techniques in Data

MATH 567: Mathematical Techniques in Data Supervised and unsupervised learning Supervised learning problems: MATH 567: Mathematical Techniques in Data (X, Y ) P (X, Y ). Data Science Clustering I is labelled (input/output) with joint density We

More information

Network Mathematics - Why is it a Small World? Oskar Sandberg

Network Mathematics - Why is it a Small World? Oskar Sandberg Network Mathematics - Why is it a Small World? Oskar Sandberg 1 Networks Formally, a network is a collection of points and connections between them. 2 Networks Formally, a network is a collection of points

More information

Distributed Computing over Communication Networks: Leader Election

Distributed Computing over Communication Networks: Leader Election Distributed Computing over Communication Networks: Leader Election Motivation Reasons for electing a leader? Reasons for not electing a leader? Motivation Reasons for electing a leader? Once elected, coordination

More information

Hyperbolic Traffic Load Centrality for Large-Scale Complex Communications Networks

Hyperbolic Traffic Load Centrality for Large-Scale Complex Communications Networks ICT 2016: 23 rd International Conference on Telecommunications Hyperbolic Traffic Load Centrality for Large-Scale Complex Communications Networks National Technical University of Athens (NTUA) School of

More information

Structured prediction using the network perceptron

Structured prediction using the network perceptron Structured prediction using the network perceptron Ta-tsen Soong Joint work with Stuart Andrews and Prof. Tony Jebara Motivation A lot of network-structured data Social networks Citation networks Biological

More information

Linear Programming Motivation: The Diet Problem

Linear Programming Motivation: The Diet Problem Agenda We ve done Greedy Method Divide and Conquer Dynamic Programming Network Flows & Applications NP-completeness Now Linear Programming and the Simplex Method Hung Q. Ngo (SUNY at Buffalo) CSE 531 1

More information

Outsourcing Privacy-Preserving Social Networks to a Cloud

Outsourcing Privacy-Preserving Social Networks to a Cloud IEEE INFOCOM 2013, April 14-19, Turin, Italy Outsourcing Privacy-Preserving Social Networks to a Cloud Guojun Wang a, Qin Liu a, Feng Li c, Shuhui Yang d, and Jie Wu b a Central South University, China

More information

A Simple and Practical Linear-Work Parallel Algorithm for Connectivity

A Simple and Practical Linear-Work Parallel Algorithm for Connectivity A Simple and Practical Linear-Work Parallel Algorithm for Connectivity Julian Shun, Laxman Dhulipala, and Guy Blelloch Presentation based on publication in Symposium on Parallelism in Algorithms and Architectures

More information

Erdös-Rényi Graphs, Part 2

Erdös-Rényi Graphs, Part 2 Graphs and Networks Lecture 3 Erdös-Rényi Graphs, Part 2 Daniel A. Spielman September 5, 2013 3.1 Disclaimer These notes are not necessarily an accurate representation of what happened in class. They are

More information

CS224W: Analysis of Networks Jure Leskovec, Stanford University

CS224W: Analysis of Networks Jure Leskovec, Stanford University CS224W: Analysis of Networks Jure Leskovec, Stanford University http://cs224w.stanford.edu 11/13/17 Jure Leskovec, Stanford CS224W: Analysis of Networks, http://cs224w.stanford.edu 2 Observations Models

More information

Graphs associated to CAT(0) cube complexes

Graphs associated to CAT(0) cube complexes Graphs associated to CAT(0) cube complexes Mark Hagen McGill University Cornell Topology Seminar, 15 November 2011 Outline Background on CAT(0) cube complexes The contact graph: a combinatorial invariant

More information

Lecture 11: Clustering and the Spectral Partitioning Algorithm A note on randomized algorithm, Unbiased estimates

Lecture 11: Clustering and the Spectral Partitioning Algorithm A note on randomized algorithm, Unbiased estimates CSE 51: Design and Analysis of Algorithms I Spring 016 Lecture 11: Clustering and the Spectral Partitioning Algorithm Lecturer: Shayan Oveis Gharan May nd Scribe: Yueqi Sheng Disclaimer: These notes have

More information

Overview of Clustering

Overview of Clustering based on Loïc Cerfs slides (UFMG) April 2017 UCBL LIRIS DM2L Example of applicative problem Student profiles Given the marks received by students for different courses, how to group the students so that

More information

6. Overview. L3S Research Center, University of Hannover. 6.1 Section Motivation. Investigation of structural aspects of peer-to-peer networks

6. Overview. L3S Research Center, University of Hannover. 6.1 Section Motivation. Investigation of structural aspects of peer-to-peer networks , University of Hannover Random Graphs, Small-Worlds, and Scale-Free Networks Wolf-Tilo Balke and Wolf Siberski 05.12.07 * Original slides provided by K.A. Lehmann (University Tübingen, Germany) 6. Overview

More information

Balls Into Bins Model Occupancy Problems

Balls Into Bins Model Occupancy Problems Balls Into Bins Model Occupancy Problems Assume that m balls are thrown randomly is n bins, i.e., the location of each ball is independently and uniformly chosen at random from the n possibilities. How

More information

V 2 Clusters, Dijkstra, and Graph Layout

V 2 Clusters, Dijkstra, and Graph Layout Bioinformatics 3 V 2 Clusters, Dijkstra, and Graph Layout Mon, Oct 31, 2016 Graph Basics A graph G is an ordered pair (V, E) of a set V of vertices and a set E of edges. Degree distribution P(k) Random

More information

Branching Out: Quantifying Tree-like Structure in Complex Networks

Branching Out: Quantifying Tree-like Structure in Complex Networks Branching Out: Quantifying Tree-like Structure in Complex Networks Blair D. Sullivan Complex Systems Group Center for Engineering Science Advanced Research Computer Science and Mathematics Division Oak

More information

Graph Algorithms. Tours in Graphs. Graph Algorithms

Graph Algorithms. Tours in Graphs. Graph Algorithms Graph Algorithms Tours in Graphs Graph Algorithms Special Paths and Cycles in Graphs Euler Path: A path that traverses all the edges of the graph exactly once. Euler Cycle: A cycle that traverses all the

More information

V 2 Clusters, Dijkstra, and Graph Layout"

V 2 Clusters, Dijkstra, and Graph Layout Bioinformatics 3! V 2 Clusters, Dijkstra, and Graph Layout" Mon, Oct 21, 2013" Graph Basics" A graph G is an ordered pair (V, E) of a set V of vertices and a set E of edges." Degree distribution P(k)!

More information

Large Scale Graph Algorithms

Large Scale Graph Algorithms Large Scale Graph Algorithms A Guide to Web Research: Lecture 2 Yury Lifshits Steklov Institute of Mathematics at St.Petersburg Stuttgart, Spring 2007 1 / 34 Talk Objective To pose an abstract computational

More information

Fabian Kuhn. Nicla Bernasconi, Dan Hefetz, Angelika Steger

Fabian Kuhn. Nicla Bernasconi, Dan Hefetz, Angelika Steger Algorithms and Lower Bounds for Distributed Coloring Problems Fabian Kuhn Parts are joint work with Parts are joint work with Nicla Bernasconi, Dan Hefetz, Angelika Steger Given: Network = Graph G Distributed

More information

Signal Processing for Big Data

Signal Processing for Big Data Signal Processing for Big Data Sergio Barbarossa 1 Summary 1. Networks 2.Algebraic graph theory 3. Random graph models 4. OperaGons on graphs 2 Networks The simplest way to represent the interaction between

More information

V 2 Clusters, Dijkstra, and Graph Layout

V 2 Clusters, Dijkstra, and Graph Layout Bioinformatics 3 V 2 Clusters, Dijkstra, and Graph Layout Fri, Oct 19, 2012 Graph Basics A graph G is an ordered pair (V, E) of a set V of vertices and a set E of edges. Degree distribution P(k) Random

More information

Diversity Coloring for Distributed Storage in Mobile Networks

Diversity Coloring for Distributed Storage in Mobile Networks Diversity Coloring for Distributed Storage in Mobile Networks Anxiao (Andrew) Jiang and Jehoshua Bruck California Institute of Technology Abstract: Storing multiple copies of files is crucial for ensuring

More information

Algorithmic and Economic Aspects of Networks. Nicole Immorlica

Algorithmic and Economic Aspects of Networks. Nicole Immorlica Algorithmic and Economic Aspects of Networks Nicole Immorlica Syllabus 1. Jan. 8 th (today): Graph theory, network structure 2. Jan. 15 th : Random graphs, probabilistic network formation 3. Jan. 20 th

More information

CONNECTIVITY CHECK IN 3-CONNECTED PLANAR GRAPHS WITH OBSTACLES

CONNECTIVITY CHECK IN 3-CONNECTED PLANAR GRAPHS WITH OBSTACLES CONNECTIVITY CHECK IN 3-CONNECTED PLANAR GRAPHS WITH OBSTACLES M. M. KANTÉ 1 B. COURCELLE 1 C. GAVOILLE 1 A. TWIGG 2 1 Université Bordeaux 1, LaBRI, CNRS. 2 Computer Laboratory, Cambridge University. Topological

More information

Fractional Cascading in Wireless. Jie Gao Computer Science Department Stony Brook University

Fractional Cascading in Wireless. Jie Gao Computer Science Department Stony Brook University Fractional Cascading in Wireless Sensor Networks Jie Gao Computer Science Department Stony Brook University 1 Sensor Networks Large number of small devices for environment monitoring 2 My recent work Lightweight,

More information

Dual Interpolants for Finite Element Methods

Dual Interpolants for Finite Element Methods Dual Interpolants for Finite Element Methods Andrew Gillette joint work with Chandrajit Bajaj and Alexander Rand Department of Mathematics Institute of Computational Engineering and Sciences University

More information

Edges and Triangles. Po-Shen Loh. Carnegie Mellon University. Joint work with Jacob Fox

Edges and Triangles. Po-Shen Loh. Carnegie Mellon University. Joint work with Jacob Fox Edges and Triangles Po-Shen Loh Carnegie Mellon University Joint work with Jacob Fox Edges in triangles Observation There are graphs with the property that every edge is contained in a triangle, but no

More information

Simplicial Hyperbolic Surfaces

Simplicial Hyperbolic Surfaces Simplicial Hyperbolic Surfaces Talk by Ken Bromberg August 21, 2007 1-Lipschitz Surfaces- In this lecture we will discuss geometrically meaningful ways of mapping a surface S into a hyperbolic manifold

More information

A Simple and Practical Linear-Work Parallel Algorithm for Connectivity

A Simple and Practical Linear-Work Parallel Algorithm for Connectivity A Simple and Practical Linear-Work Parallel Algorithm for Connectivity Julian Shun, Laxman Dhulipala, and Guy Blelloch Presentation based on publication in Symposium on Parallelism in Algorithms and Architectures

More information

The point (x, y) lies on the circle of radius r and center (h, k) iff. x h y k r

The point (x, y) lies on the circle of radius r and center (h, k) iff. x h y k r NOTES +: ANALYTIC GEOMETRY NAME LESSON. GRAPHS OF EQUATIONS IN TWO VARIABLES (CIRCLES). Standard form of a Circle The point (x, y) lies on the circle of radius r and center (h, k) iff x h y k r Center:

More information

CS 473: Algorithms. Ruta Mehta. Spring University of Illinois, Urbana-Champaign. Ruta (UIUC) CS473 1 Spring / 29

CS 473: Algorithms. Ruta Mehta. Spring University of Illinois, Urbana-Champaign. Ruta (UIUC) CS473 1 Spring / 29 CS 473: Algorithms Ruta Mehta University of Illinois, Urbana-Champaign Spring 2018 Ruta (UIUC) CS473 1 Spring 2018 1 / 29 CS 473: Algorithms, Spring 2018 Simplex and LP Duality Lecture 19 March 29, 2018

More information

Fast Collisionless Pattern Formation by Anonymous, Position-Aware Robots

Fast Collisionless Pattern Formation by Anonymous, Position-Aware Robots Fast Collisionless Pattern Formation by Anonymous, Position-Aware Robots Tamás Lukovszki and Friedhelm Meyer auf der Heide Eötvös Loránd University, Budapest, Hungary University of Paderborn, Germany lukovszki@inf.elte.hu

More information

Analysis of Link Reversal Routing Algorithms for Mobile Ad Hoc Networks

Analysis of Link Reversal Routing Algorithms for Mobile Ad Hoc Networks Analysis of Link Reversal Routing Algorithms for Mobile Ad Hoc Networks Seminar of Distributed Computing WS 04/05 ETH Zurich, 1.2.2005 Nicolas Born nborn@student.ethz.ch Paper Analysis of Link Reversal

More information

CSE 421 Greedy Alg: Union Find/Dijkstra s Alg

CSE 421 Greedy Alg: Union Find/Dijkstra s Alg CSE 1 Greedy Alg: Union Find/Dijkstra s Alg Shayan Oveis Gharan 1 Dijkstra s Algorithm Dijkstra(G, c, s) { d s 0 foreach (v V) d[v] //This is the key of node v foreach (v V) insert v onto a priority queue

More information

Throughout this course, we use the terms vertex and node interchangeably.

Throughout this course, we use the terms vertex and node interchangeably. Chapter Vertex Coloring. Introduction Vertex coloring is an infamous graph theory problem. It is also a useful toy example to see the style of this course already in the first lecture. Vertex coloring

More information

Sublinear Time and Space Algorithms 2016B Lecture 7 Sublinear-Time Algorithms for Sparse Graphs

Sublinear Time and Space Algorithms 2016B Lecture 7 Sublinear-Time Algorithms for Sparse Graphs Sublinear Time and Space Algorithms 2016B Lecture 7 Sublinear-Time Algorithms for Sparse Graphs Robert Krauthgamer 1 Approximating Average Degree in a Graph Input: A graph represented (say) as the adjacency

More information

An Optimal Allocation Approach to Influence Maximization Problem on Modular Social Network. Tianyu Cao, Xindong Wu, Song Wang, Xiaohua Hu

An Optimal Allocation Approach to Influence Maximization Problem on Modular Social Network. Tianyu Cao, Xindong Wu, Song Wang, Xiaohua Hu An Optimal Allocation Approach to Influence Maximization Problem on Modular Social Network Tianyu Cao, Xindong Wu, Song Wang, Xiaohua Hu ACM SAC 2010 outline Social network Definition and properties Social

More information

Nominal Data. May not have a numerical representation Distance measures might not make sense. PR and ANN

Nominal Data. May not have a numerical representation Distance measures might not make sense. PR and ANN NonMetric Data Nominal Data So far we consider patterns to be represented by feature vectors of real or integer values Easy to come up with a distance (similarity) measure by using a variety of mathematical

More information

A geometric model for on-line social networks

A geometric model for on-line social networks WOSN 10 June 22, 2010 A geometric model for on-line social networks Anthony Bonato Ryerson University Geometric model for OSNs 1 Complex Networks web graph, social networks, biological networks, internet

More information

Online Algorithms. Lecture 11

Online Algorithms. Lecture 11 Online Algorithms Lecture 11 Today DC on trees DC on arbitrary metrics DC on circle Scheduling K-server on trees Theorem The DC Algorithm is k-competitive for the k server problem on arbitrary tree metrics.

More information

Hyperbolic Geometry on the Figure-Eight Knot Complement

Hyperbolic Geometry on the Figure-Eight Knot Complement Hyperbolic Geometry on the Figure-Eight Knot Complement Alex Gutierrez Arizona State University December 10, 2012 Hyperbolic Space Hyperbolic Space Hyperbolic space H n is the unique complete simply-connected

More information

Complex-Network Modelling and Inference

Complex-Network Modelling and Inference Complex-Network Modelling and Inference Lecture 8: Graph features (2) Matthew Roughan http://www.maths.adelaide.edu.au/matthew.roughan/notes/ Network_Modelling/ School

More information

Distributed Maximal Matching: Greedy is Optimal

Distributed Maximal Matching: Greedy is Optimal Distributed Maximal Matching: Greedy is Optimal Jukka Suomela Helsinki Institute for Information Technology HIIT University of Helsinki Joint work with Juho Hirvonen Weimann Institute of Science, 7 November

More information

Constructing a G(N, p) Network

Constructing a G(N, p) Network Random Graph Theory Dr. Natarajan Meghanathan Associate Professor Department of Computer Science Jackson State University, Jackson, MS E-mail: natarajan.meghanathan@jsums.edu Introduction At first inspection,

More information

The Rigidity Transition in Random Graphs

The Rigidity Transition in Random Graphs The Rigidity Transition in Random Graphs Shiva Prasad Kasiviswanathan Cristopher Moore Louis Theran Abstract As we add rigid bars between points in the plane, at what point is there a giant (linear-sized)

More information

(Social) Networks Analysis III. Prof. Dr. Daning Hu Department of Informatics University of Zurich

(Social) Networks Analysis III. Prof. Dr. Daning Hu Department of Informatics University of Zurich (Social) Networks Analysis III Prof. Dr. Daning Hu Department of Informatics University of Zurich Outline Network Topological Analysis Network Models Random Networks Small-World Networks Scale-Free Networks

More information

Nominal Data. May not have a numerical representation Distance measures might not make sense PR, ANN, & ML

Nominal Data. May not have a numerical representation Distance measures might not make sense PR, ANN, & ML Decision Trees Nominal Data So far we consider patterns to be represented by feature vectors of real or integer values Easy to come up with a distance (similarity) measure by using a variety of mathematical

More information

INFINITE RANDOM GEOMETRIC GRAPHS EXTENDED ABSTRACT

INFINITE RANDOM GEOMETRIC GRAPHS EXTENDED ABSTRACT INFINITE RANDOM GEOMETRIC GRAPHS EXTENDED ABSTRACT ANTHONY BONATO AND JEANNETTE JANSSEN Abstract. We introduce a new class of countably infinite random geometric graphs, whose vertices V are points in

More information

Classifying Online Social Network Users Through the Social Graph

Classifying Online Social Network Users Through the Social Graph Classifying Online Social Network Users Through the Social Graph Cristina Pe rez Sola and Jordi Herrera Joancomartı Departament d Enginyeria de la Informacio i les Comunicacions Universitat Auto noma de

More information

Random Simplicial Complexes

Random Simplicial Complexes Random Simplicial Complexes Duke University CAT-School 2015 Oxford 10/9/2015 Part III Extensions & Applications Contents Morse Theory for the Distance Function Persistent Homology and Maximal Cycles Contents

More information

Property Testing for Sparse Graphs: Structural graph theory meets Property testing

Property Testing for Sparse Graphs: Structural graph theory meets Property testing Property Testing for Sparse Graphs: Structural graph theory meets Property testing Ken-ichi Kawarabayashi National Institute of Informatics(NII)& JST, ERATO, Kawarabayashi Large Graph Project Joint work

More information

Geometric Spanners for Routing in Mobile Networks

Geometric Spanners for Routing in Mobile Networks 1 Geometric Spanners for Routing in Mobile Networks Jie Gao, Leonidas J Guibas, John Hershberger, Li Zhang, An Zhu Abstract We propose a new routing graph, the Restricted Delaunay Graph (RDG), for mobile

More information

Maximal Independent Set

Maximal Independent Set Chapter 0 Maximal Independent Set In this chapter we present a highlight of this course, a fast maximal independent set (MIS) algorithm. The algorithm is the first randomized algorithm that we study in

More information

Hierarchical Spatial Gossip for Multi-Resolution Representations in Sensor Networks

Hierarchical Spatial Gossip for Multi-Resolution Representations in Sensor Networks Hierarchical Spatial Gossip for Multi-Resolution Representations in Sensor Networks RIK SARKAR, XIANJIN ZHU and JIE GAO Stony Brook University In this paper we propose a lightweight algorithm for constructing

More information

Geographical routing 1

Geographical routing 1 Geographical routing 1 Routing in ad hoc networks Obtain route information between pairs of nodes wishing to communicate. Proactive protocols: maintain routing tables at each node that is updated as changes

More information

Discharging and reducible configurations

Discharging and reducible configurations Discharging and reducible configurations Zdeněk Dvořák March 24, 2018 Suppose we want to show that graphs from some hereditary class G are k- colorable. Clearly, we can restrict our attention to graphs

More information

Graphs. Part I: Basic algorithms. Laura Toma Algorithms (csci2200), Bowdoin College

Graphs. Part I: Basic algorithms. Laura Toma Algorithms (csci2200), Bowdoin College Laura Toma Algorithms (csci2200), Bowdoin College Undirected graphs Concepts: connectivity, connected components paths (undirected) cycles Basic problems, given undirected graph G: is G connected how many

More information

Secure Algorithms and Data Structures for Massive Networks

Secure Algorithms and Data Structures for Massive Networks Secure Algorithms and Data Structures for Massive Networks Jared Saia Joint work with: Amos Fiat(U. Tel Aviv), Valerie King(U. Vic), Erik Vee (IBM Labs), Vishal Sanwalani(U. Waterloo), and Maxwell Young(UNM)

More information