Why is a power law interesting? 2. it begs a question about mechanism: How do networks come to have power-law degree distributions in the first place?

Size: px
Start display at page:

Download "Why is a power law interesting? 2. it begs a question about mechanism: How do networks come to have power-law degree distributions in the first place?"

Transcription

1 you ve got the power Why is a power law interesting? 1. it is scale-free 2. it begs a question about mechanism: How do networks come to have power-law degree distributions in the first place?

2 powerful mechanisms combination of exponentials random walks (e.g. probability of first return time) 1 loss of scale at critical points self-organized criticality (forest fire model, sandpile model) 2 multiplicative processes (lognormal distribution) 3 rich-get-richer mechanisms (Yule process, preferential attachment)

3

4 1 more is different, suddenly n=100 phase transition p=0.001 p=0.005 p=0.009 p=0.01 p=0.012 p=0.02 giant component

5 2 start a multiplicative process positive random number multiplicative process: by the central limit theorem, the logs obey a normal distribution:

6 2 a tail of another world is lognormal if is normal

7 2 end log of lognormal looks like a power law if the range of data covers only a few orders of magnitude..., or if the variance is large

8 3 start smart people Herbert Simon ( ) Derek de Solla Price ( )

9 citation networks cumulative distribution power-tail citations to all papers catalogued by ISI between 1981 and 1997 Derek de Solla Price ( )

10 you name it the rich get richer -effect cumulative advantage preferential attachment Matthew-effect For every one that hath shall be given......but from him that hath not, that also which he seemeth to have shall be taken away Matthew 25:29

11 de Solla Price model of citation networks nodes in network, now fraction of nodes with in-degree add a new node with fixed out-degree average out-degree is fixed at...thus mean in-degree is fixed as well: probability that a new edge attaches to any node of degree:

12 ...+1 # of incident edges: P of node with incident edges P of attachment

13 de Solla Price model master-equation (rate-equation): at stationarity......the master-equation becomes:

14 3 end de Solla Price model beta-function for large k

15 Barabasi & Albert: preferential attachment model same as Price, but undirected edges and new nodes appear with initial degree m (average degree of the network is now 2m) each link attaches to another node with probability proportional to that node s degree new node has initial degree m, fixed solve like Price model, via a master equation

16 clustering coefficient: are the friends of my friends my friends? each triangle contributes to 3 triples a triple 5 a triangle probability that two vertices that are neighbors of the same vertex will themselves be neighbors triangle, 8 triples: C=3/8 2 5

17 clustering coefficient: are the friends of my friends my friends? a triple 5 a triangle /6 0 5 C=1/5 x 13/6 = 13/

18 small world 1 mean vertex-vertex distance clustering coefficient o r C/ C 0.5 l/l max max rewiring probability p

19 so far our concern was global, now for local structure

20 patterns are rules A pattern language is a set of patterns used by a process to generate artifacts. Each pattern is a kind of rule that states a problem to be solved and a solution to that problem in a particular context. Christopher Alexander

21 elements of style levels of scale strong centers boundaries alternating repetition background simple shape local symmetry interlock & ambiguity contrast gradients roughness echoes the void essential connectedness source: Wired, March 2004, and

22 software patterns patterns are everywhere Leaky Bucket of Credits Problem: How can one processor know whether another processor is capable of handling more work? Forces: For a peripheral to be able to reject new work when the system is overloaded, it must be able to recognize when the system is overloaded. But having the bottleneck processor take up valuable realtime cycles to inform the (potentially large number of) peripherals would further reduce its capacity. And what happens if it gets so bogged down that it can t send out the Stop sending me work! messages? Solution: The bottleneck processor tells the peripherals when it is capable of accepting more work. It does so by sending credits to the peripherals. Each peripheral tracks a leaky bucket of credits received from the bottleneck processor (BP). As requests are sent to the BP, or simply as time passes, the bucket leaks until it is empty. When the system is not at capacity, the bucket is continuously refilled by new credits sent from the BP; however, if the system is at capacity, the BP will not send credits and the peripherals will hold back new work... (Meszaros, 1996) source: James Coplien, Software Patterns, Bell Labs (2000)

23 patterns are everywhere protein 3D motifs (domains) binding DNA... basic helix-loop-helix spanning a membrane... receptor tyrosine kinase binding a phosphorylated site... sequence motifs DNA binding site... regulatory site of dnaj

24 transcription network motifs in E.coli patterns are everywhere S. Shen-Orr, R. Milo, S. Mangan, U. Alon, Nature Genetics, 31, 64 (2002) E. Yeger-Lotem et al, PNAS, 101, 5934 (2004) network N. Rosenfeld & U. Alon, JMB, 329, 645 (2003) N. Rosenfeld, M. Elowitz & U. Alon, JMB, 323, 785 (2002) S. Mangan, A. Zaslaver & U. Alon, JMB, 334, 197 (2003) S. Mangan & U. Alon, PNAS, 100, (2003) G. Conant & A. Wagner, Nature Genetics, 34, 264 (2003) Shai Shen-Orr says E.coli thinks ahead because it feeds forward.

25 network patterns transcription network: nodes: operons edge from i to j: operon i contains a transcription factor for operon j detect whether certain subgraphs occur more frequently than expected. those that do are presumably solutions to some problem(s) figure out the problem(s) technically, it is a comparison of an actual network vs a random network of identical statistical profile (number of nodes, total number of edges, number of incoming and outgoing edges per node)

26 randomizing a graph uniformly randomizing a network with the switching algorithm: D D B B A A C C exchange only if no self-edges or multiple edges are generated uniformly randomizing a network with the matching algorithm: discard and start from scratch (!) if a self-edge or multiple edge is generated in a move

27 randomizing a graph matching algorithm if the network is not discarded upon formation of a multiple edge, the procedure will undersample this configuration 1 configuration 90 configurations

28 ChIP chip protein-dna interaction studies Chromatin Immuno Precipitation followed by a microarray

29 network motifs feedforward motif (FL) single input motif (SIM) -/+ dense overlapping regulons (DOR)...

30 overall picture

31 the feed forward loop the motives of motifs a delay mechanism Y X + AND Z pulse-filter X Y Z

32 multi-site phosphorylation is a pulse-filter too another delay mechanism "signal" target with 5 phosphoepitopes "output" phosphatase concentration of components concentration of components time time WF & D. Krakauer, unpublished

33 error correction through kinetic proof-reading and yet another delay mechanism + on off 1 R + on off 2 > off 1 R minimum error fraction: f 0 = off 1 /off 2 = exp - G/RT + on Q R off 1 off 1 + on Q R off 2 > off 1 off 2 minimum error fraction: f 0 2

34 Sx Sy Y X coherent Z most abundant in E.coli and yeast incoherent fairly abundant in yeast accelerates response time in Z

35 single input module the motives of motifs

36 transcriptional regulation & protein-protein interaction

Advanced Algorithms and Models for Computational Biology -- a machine learning approach

Advanced Algorithms and Models for Computational Biology -- a machine learning approach Advanced Algorithms and Models for Computational Biology -- a machine learning approach Biological Networks & Network Evolution Eric Xing Lecture 22, April 10, 2006 Reading: Molecular Networks Interaction

More information

Structure of biological networks. Presentation by Atanas Kamburov

Structure of biological networks. Presentation by Atanas Kamburov Structure of biological networks Presentation by Atanas Kamburov Seminar Gute Ideen in der theoretischen Biologie / Systembiologie 08.05.2007 Overview Motivation Definitions Large-scale properties of cellular

More information

Graph Theory. Graph Theory. COURSE: Introduction to Biological Networks. Euler s Solution LECTURE 1: INTRODUCTION TO NETWORKS.

Graph Theory. Graph Theory. COURSE: Introduction to Biological Networks. Euler s Solution LECTURE 1: INTRODUCTION TO NETWORKS. Graph Theory COURSE: Introduction to Biological Networks LECTURE 1: INTRODUCTION TO NETWORKS Arun Krishnan Koenigsberg, Russia Is it possible to walk with a route that crosses each bridge exactly once,

More information

Models of Network Formation. Networked Life NETS 112 Fall 2017 Prof. Michael Kearns

Models of Network Formation. Networked Life NETS 112 Fall 2017 Prof. Michael Kearns Models of Network Formation Networked Life NETS 112 Fall 2017 Prof. Michael Kearns Roadmap Recently: typical large-scale social and other networks exhibit: giant component with small diameter sparsity

More information

Properties of Biological Networks

Properties of Biological Networks Properties of Biological Networks presented by: Ola Hamud June 12, 2013 Supervisor: Prof. Ron Pinter Based on: NETWORK BIOLOGY: UNDERSTANDING THE CELL S FUNCTIONAL ORGANIZATION By Albert-László Barabási

More information

Signal Processing for Big Data

Signal Processing for Big Data Signal Processing for Big Data Sergio Barbarossa 1 Summary 1. Networks 2.Algebraic graph theory 3. Random graph models 4. OperaGons on graphs 2 Networks The simplest way to represent the interaction between

More information

Visualisation and Analysis of Network Motifs

Visualisation and Analysis of Network Motifs Visualisation and Analysis of Network Motifs Weidong Huang, Colin Murray, Xiaobin Shen, Le Song, Ying Xin Wu, Lanbo Zheng National ICT Australia & University of Sydney, Australia {weidong.huang,colin.murray,robert.shen,le.song,christine.wu,lanbo.zheng}

More information

CS249: SPECIAL TOPICS MINING INFORMATION/SOCIAL NETWORKS

CS249: SPECIAL TOPICS MINING INFORMATION/SOCIAL NETWORKS CS249: SPECIAL TOPICS MINING INFORMATION/SOCIAL NETWORKS Overview of Networks Instructor: Yizhou Sun yzsun@cs.ucla.edu January 10, 2017 Overview of Information Network Analysis Network Representation Network

More information

CS-E5740. Complex Networks. Scale-free networks

CS-E5740. Complex Networks. Scale-free networks CS-E5740 Complex Networks Scale-free networks Course outline 1. Introduction (motivation, definitions, etc. ) 2. Static network models: random and small-world networks 3. Growing network models: scale-free

More information

Comparison of Centralities for Biological Networks

Comparison of Centralities for Biological Networks Comparison of Centralities for Biological Networks Dirk Koschützki and Falk Schreiber Bioinformatics Center Gatersleben-Halle Institute of Plant Genetics and Crop Plant Research Corrensstraße 3 06466 Gatersleben,

More information

Summary: What We Have Learned So Far

Summary: What We Have Learned So Far Summary: What We Have Learned So Far small-world phenomenon Real-world networks: { Short path lengths High clustering Broad degree distributions, often power laws P (k) k γ Erdös-Renyi model: Short path

More information

Local higher-order graph clustering

Local higher-order graph clustering Local higher-order graph clustering Hao Yin Stanford University yinh@stanford.edu Austin R. Benson Cornell University arb@cornell.edu Jure Leskovec Stanford University jure@cs.stanford.edu David F. Gleich

More information

Networks and Discrete Mathematics

Networks and Discrete Mathematics Aristotle University, School of Mathematics Master in Web Science Networks and Discrete Mathematics Small Words-Scale-Free- Model Chronis Moyssiadis Vassilis Karagiannis 7/12/2012 WS.04 Webscience: lecture

More information

Solving Linear Recurrence Relations (8.2)

Solving Linear Recurrence Relations (8.2) EECS 203 Spring 2016 Lecture 18 Page 1 of 10 Review: Recurrence relations (Chapter 8) Last time we started in on recurrence relations. In computer science, one of the primary reasons we look at solving

More information

Example for calculation of clustering coefficient Node N 1 has 8 neighbors (red arrows) There are 12 connectivities among neighbors (blue arrows)

Example for calculation of clustering coefficient Node N 1 has 8 neighbors (red arrows) There are 12 connectivities among neighbors (blue arrows) Example for calculation of clustering coefficient Node N 1 has 8 neighbors (red arrows) There are 12 connectivities among neighbors (blue arrows) Average clustering coefficient of a graph Overall measure

More information

CAIM: Cerca i Anàlisi d Informació Massiva

CAIM: Cerca i Anàlisi d Informació Massiva 1 / 72 CAIM: Cerca i Anàlisi d Informació Massiva FIB, Grau en Enginyeria Informàtica Slides by Marta Arias, José Balcázar, Ricard Gavaldá Department of Computer Science, UPC Fall 2016 http://www.cs.upc.edu/~caim

More information

Biological Networks Analysis Network Motifs. Genome 373 Genomic Informatics Elhanan Borenstein

Biological Networks Analysis Network Motifs. Genome 373 Genomic Informatics Elhanan Borenstein Biological Networks Analysis Network Motifs Genome 373 Genomic Informatics Elhanan Borenstein Networks: Networks vs. graphs A collection of nodes and links A quick review Directed/undirected; weighted/non-weighted,

More information

Network Thinking. Complexity: A Guided Tour, Chapters 15-16

Network Thinking. Complexity: A Guided Tour, Chapters 15-16 Network Thinking Complexity: A Guided Tour, Chapters 15-16 Neural Network (C. Elegans) http://gephi.org/wp-content/uploads/2008/12/screenshot-celegans.png Food Web http://1.bp.blogspot.com/_vifbm3t8bou/sbhzqbchiei/aaaaaaaaaxk/rsc-pj45avc/

More information

Lesson 4. Random graphs. Sergio Barbarossa. UPC - Barcelona - July 2008

Lesson 4. Random graphs. Sergio Barbarossa. UPC - Barcelona - July 2008 Lesson 4 Random graphs Sergio Barbarossa Graph models 1. Uncorrelated random graph (Erdős, Rényi) N nodes are connected through n edges which are chosen randomly from the possible configurations 2. Binomial

More information

Distribution-Free Models of Social and Information Networks

Distribution-Free Models of Social and Information Networks Distribution-Free Models of Social and Information Networks Tim Roughgarden (Stanford CS) joint work with Jacob Fox (Stanford Math), Rishi Gupta (Stanford CS), C. Seshadhri (UC Santa Cruz), Fan Wei (Stanford

More information

An Exploratory Journey Into Network Analysis A Gentle Introduction to Network Science and Graph Visualization

An Exploratory Journey Into Network Analysis A Gentle Introduction to Network Science and Graph Visualization An Exploratory Journey Into Network Analysis A Gentle Introduction to Network Science and Graph Visualization Pedro Ribeiro (DCC/FCUP & CRACS/INESC-TEC) Part 1 Motivation and emergence of Network Science

More information

E6885 Network Science Lecture 5: Network Estimation and Modeling

E6885 Network Science Lecture 5: Network Estimation and Modeling E 6885 Topics in Signal Processing -- Network Science E6885 Network Science Lecture 5: Network Estimation and Modeling Ching-Yung Lin, Dept. of Electrical Engineering, Columbia University October 7th,

More information

Supplementary material to Epidemic spreading on complex networks with community structures

Supplementary material to Epidemic spreading on complex networks with community structures Supplementary material to Epidemic spreading on complex networks with community structures Clara Stegehuis, Remco van der Hofstad, Johan S. H. van Leeuwaarden Supplementary otes Supplementary ote etwork

More information

Incoming, Outgoing Degree and Importance Analysis of Network Motifs

Incoming, Outgoing Degree and Importance Analysis of Network Motifs Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.758

More information

1 Homophily and assortative mixing

1 Homophily and assortative mixing 1 Homophily and assortative mixing Networks, and particularly social networks, often exhibit a property called homophily or assortative mixing, which simply means that the attributes of vertices correlate

More information

The Mathematical Description of Networks

The Mathematical Description of Networks Modelling Complex Systems University of Manchester, 21 st 23 rd June 2010 Tim Evans Theoretical Physics The Mathematical Description of Networs Page 1 Notation I will focus on Simple Graphs with multiple

More information

Lecture on Game Theoretical Network Analysis

Lecture on Game Theoretical Network Analysis Lecture on Game Theoretical Network Analysis Prof. Maria Papadopouli CS 590.21 Analysis and Modeling of Brain Networks Department of Computer Science University of Crete ACKNOWLEDGEMENTS Most of the slides

More information

Economics of Information Networks

Economics of Information Networks Economics of Information Networks Stephen Turnbull Division of Policy and Planning Sciences Lecture 4: December 7, 2017 Abstract We continue discussion of the modern economics of networks, which considers

More information

Wednesday, March 8, Complex Networks. Presenter: Jirakhom Ruttanavakul. CS 790R, University of Nevada, Reno

Wednesday, March 8, Complex Networks. Presenter: Jirakhom Ruttanavakul. CS 790R, University of Nevada, Reno Wednesday, March 8, 2006 Complex Networks Presenter: Jirakhom Ruttanavakul CS 790R, University of Nevada, Reno Presented Papers Emergence of scaling in random networks, Barabási & Bonabeau (2003) Scale-free

More information

Basic Graph Properties

Basic Graph Properties Network Analysis Basic Graph Properties Michele Coscia & Luca Rossi ITU København Background: Background: Real world networks have surprising properties Stanley Milgram (1933-1984) ~5.5 hops on

More information

Locality-sensitive hashing and biological network alignment

Locality-sensitive hashing and biological network alignment Locality-sensitive hashing and biological network alignment Laura LeGault - University of Wisconsin, Madison 12 May 2008 Abstract Large biological networks contain much information about the functionality

More information

Coordinated Perspectives and Enhanced Force-Directed Layout for the Analysis of Network Motifs

Coordinated Perspectives and Enhanced Force-Directed Layout for the Analysis of Network Motifs Coordinated Perspectives and Enhanced Force-Directed Layout for the Analysis of Network Motifs Christian Klukas Falk Schreiber Henning Schwöbbermeyer Leibniz Institute of Plant Genetics and Crop Plant

More information

Overlay (and P2P) Networks

Overlay (and P2P) Networks Overlay (and P2P) Networks Part II Recap (Small World, Erdös Rényi model, Duncan Watts Model) Graph Properties Scale Free Networks Preferential Attachment Evolving Copying Navigation in Small World Samu

More information

CSE 258 Lecture 12. Web Mining and Recommender Systems. Social networks

CSE 258 Lecture 12. Web Mining and Recommender Systems. Social networks CSE 258 Lecture 12 Web Mining and Recommender Systems Social networks Social networks We ve already seen networks (a little bit) in week 3 i.e., we ve studied inference problems defined on graphs, and

More information

Social, Information, and Routing Networks: Models, Algorithms, and Strategic Behavior

Social, Information, and Routing Networks: Models, Algorithms, and Strategic Behavior Social, Information, and Routing Networks: Models, Algorithms, and Strategic Behavior Who? Prof. Aris Anagnostopoulos Prof. Luciana S. Buriol Prof. Guido Schäfer What will We Cover? Topics: Network properties

More information

Erdős-Rényi Model for network formation

Erdős-Rényi Model for network formation Network Science: Erdős-Rényi Model for network formation Ozalp Babaoglu Dipartimento di Informatica Scienza e Ingegneria Università di Bologna www.cs.unibo.it/babaoglu/ Why model? Simpler representation

More information

CSE 158 Lecture 11. Web Mining and Recommender Systems. Social networks

CSE 158 Lecture 11. Web Mining and Recommender Systems. Social networks CSE 158 Lecture 11 Web Mining and Recommender Systems Social networks Assignment 1 Due 5pm next Monday! (Kaggle shows UTC time, but the due date is 5pm, Monday, PST) Assignment 1 Assignment 1 Social networks

More information

Case Studies in Complex Networks

Case Studies in Complex Networks Case Studies in Complex Networks Introduction to Scientific Modeling CS 365 George Bezerra 08/27/2012 The origin of graph theory Königsberg bridge problem Leonard Euler (1707-1783) The Königsberg Bridge

More information

How Do Real Networks Look? Networked Life NETS 112 Fall 2014 Prof. Michael Kearns

How Do Real Networks Look? Networked Life NETS 112 Fall 2014 Prof. Michael Kearns How Do Real Networks Look? Networked Life NETS 112 Fall 2014 Prof. Michael Kearns Roadmap Next several lectures: universal structural properties of networks Each large-scale network is unique microscopically,

More information

NETWORK BASICS OUTLINE ABSTRACT ORGANIZATION NETWORK MEASURES. 1. Network measures 2. Small-world and scale-free networks 3. Connectomes 4.

NETWORK BASICS OUTLINE ABSTRACT ORGANIZATION NETWORK MEASURES. 1. Network measures 2. Small-world and scale-free networks 3. Connectomes 4. NETWORK BASICS OUTLINE 1. Network measures 2. Small-world and scale-free networks 3. Connectomes 4. Motifs ABSTRACT ORGANIZATION In systems/mechanisms in the real world Entities have distinctive properties

More information

Special-topic lecture bioinformatics: Mathematics of Biological Networks

Special-topic lecture bioinformatics: Mathematics of Biological Networks Special-topic lecture bioinformatics: Leistungspunkte/Credit points: 5 (V2/Ü1) This course is taught in English language. The material (from books and original literature) are provided online at the course

More information

Persistence of activity in random Boolean networks

Persistence of activity in random Boolean networks Persistence of activity in random Boolean networks Shirshendu Chatterjee Courant Institute, NYU Joint work with Rick Durrett October 2012 S. Chatterjee (NYU) Random Boolean Networks 1 / 11 The process

More information

TELCOM2125: Network Science and Analysis

TELCOM2125: Network Science and Analysis School of Information Sciences University of Pittsburgh TELCOM2125: Network Science and Analysis Konstantinos Pelechrinis Spring 2015 Figures are taken from: M.E.J. Newman, Networks: An Introduction 2

More information

Drawing Graphs Within Graphs

Drawing Graphs Within Graphs Journal of Graph Algorithms and Applications http://jgaa.info/ vol. 9, no. 1, pp. 7 18 (2005) Drawing Graphs Within Graphs Paul Holleis Ludwig-Maximilians-Universität München, Germany http://www.hcilab.org/paul/

More information

V 2 Clusters, Dijkstra, and Graph Layout

V 2 Clusters, Dijkstra, and Graph Layout Bioinformatics 3 V 2 Clusters, Dijkstra, and Graph Layout Mon, Oct 31, 2016 Graph Basics A graph G is an ordered pair (V, E) of a set V of vertices and a set E of edges. Degree distribution P(k) Random

More information

Estimating and Sampling Graphs with Multidimensional Random Walks. Group 2: Mingyan Zhao, Chengle Zhang, Biao Yin, Yuchen Liu

Estimating and Sampling Graphs with Multidimensional Random Walks. Group 2: Mingyan Zhao, Chengle Zhang, Biao Yin, Yuchen Liu Estimating and Sampling Graphs with Multidimensional Random Walks Group 2: Mingyan Zhao, Chengle Zhang, Biao Yin, Yuchen Liu Complex Network Motivation Social Network Biological Network erence: www.forbe.com

More information

Nick Hamilton Institute for Molecular Bioscience. Essential Graph Theory for Biologists. Image: Matt Moores, The Visible Cell

Nick Hamilton Institute for Molecular Bioscience. Essential Graph Theory for Biologists. Image: Matt Moores, The Visible Cell Nick Hamilton Institute for Molecular Bioscience Essential Graph Theory for Biologists Image: Matt Moores, The Visible Cell Outline Core definitions Which are the most important bits? What happens when

More information

Analytical reasoning task reveals limits of social learning in networks

Analytical reasoning task reveals limits of social learning in networks Electronic Supplementary Material for: Analytical reasoning task reveals limits of social learning in networks Iyad Rahwan, Dmytro Krasnoshtan, Azim Shariff, Jean-François Bonnefon A Experimental Interface

More information

modern database systems lecture 10 : large-scale graph processing

modern database systems lecture 10 : large-scale graph processing modern database systems lecture 1 : large-scale graph processing Aristides Gionis spring 18 timeline today : homework is due march 6 : homework out april 5, 9-1 : final exam april : homework due graphs

More information

Machine Learning and Modeling for Social Networks

Machine Learning and Modeling for Social Networks Machine Learning and Modeling for Social Networks Olivia Woolley Meza, Izabela Moise, Nino Antulov-Fatulin, Lloyd Sanders 1 Introduction to Networks Computational Social Science D-GESS Olivia Woolley Meza

More information

Structured prediction using the network perceptron

Structured prediction using the network perceptron Structured prediction using the network perceptron Ta-tsen Soong Joint work with Stuart Andrews and Prof. Tony Jebara Motivation A lot of network-structured data Social networks Citation networks Biological

More information

M.E.J. Newman: Models of the Small World

M.E.J. Newman: Models of the Small World A Review Adaptive Informatics Research Centre Helsinki University of Technology November 7, 2007 Vocabulary N number of nodes of the graph l average distance between nodes D diameter of the graph d is

More information

V2: Measures and Metrics (II)

V2: Measures and Metrics (II) - Betweenness Centrality V2: Measures and Metrics (II) - Groups of Vertices - Transitivity - Reciprocity - Signed Edges and Structural Balance - Similarity - Homophily and Assortative Mixing 1 Betweenness

More information

Social and Technological Network Data Analytics. Lecture 5: Structure of the Web, Search and Power Laws. Prof Cecilia Mascolo

Social and Technological Network Data Analytics. Lecture 5: Structure of the Web, Search and Power Laws. Prof Cecilia Mascolo Social and Technological Network Data Analytics Lecture 5: Structure of the Web, Search and Power Laws Prof Cecilia Mascolo In This Lecture We describe power law networks and their properties and show

More information

Graph-theoretic Properties of Networks

Graph-theoretic Properties of Networks Graph-theoretic Properties of Networks Bioinformatics: Sequence Analysis COMP 571 - Spring 2015 Luay Nakhleh, Rice University Graphs A graph is a set of vertices, or nodes, and edges that connect pairs

More information

Rumour spreading in the spatial preferential attachment model

Rumour spreading in the spatial preferential attachment model Rumour spreading in the spatial preferential attachment model Abbas Mehrabian University of British Columbia Banff, 2016 joint work with Jeannette Janssen The push&pull rumour spreading protocol [Demers,

More information

V 1 Introduction! Mon, Oct 15, 2012! Bioinformatics 3 Volkhard Helms!

V 1 Introduction! Mon, Oct 15, 2012! Bioinformatics 3 Volkhard Helms! V 1 Introduction! Mon, Oct 15, 2012! Bioinformatics 3 Volkhard Helms! How Does a Cell Work?! A cell is a crowded environment! => many different proteins,! metabolites, compartments,! On a microscopic level!

More information

CS224W: Analysis of Networks Jure Leskovec, Stanford University

CS224W: Analysis of Networks Jure Leskovec, Stanford University CS224W: Analysis of Networks Jure Leskovec, Stanford University http://cs224w.stanford.edu 11/13/17 Jure Leskovec, Stanford CS224W: Analysis of Networks, http://cs224w.stanford.edu 2 Observations Models

More information

Distances in power-law random graphs

Distances in power-law random graphs Distances in power-law random graphs Sander Dommers Supervisor: Remco van der Hofstad February 2, 2009 Where innovation starts Introduction There are many complex real-world networks, e.g. Social networks

More information

Graph Theory and Network Measurment

Graph Theory and Network Measurment Graph Theory and Network Measurment Social and Economic Networks MohammadAmin Fazli Social and Economic Networks 1 ToC Network Representation Basic Graph Theory Definitions (SE) Network Statistics and

More information

Illumination Models & Shading

Illumination Models & Shading Illumination Models & Shading Lighting vs. Shading Lighting Interaction between materials and light sources Physics Shading Determining the color of a pixel Computer Graphics ZBuffer(Scene) PutColor(x,y,Col(P));

More information

1 Degree Distributions

1 Degree Distributions Lecture Notes: Social Networks: Models, Algorithms, and Applications Lecture 3: Jan 24, 2012 Scribes: Geoffrey Fairchild and Jason Fries 1 Degree Distributions Last time, we discussed some graph-theoretic

More information

Strongly connected: A directed graph is strongly connected if every pair of vertices are reachable from each other.

Strongly connected: A directed graph is strongly connected if every pair of vertices are reachable from each other. Directed Graph In a directed graph, each edge (u, v) has a direction u v. Thus (u, v) (v, u). Directed graph is useful to model many practical problems (such as one-way road in traffic network, and asymmetric

More information

A Study of Random Duplication Graphs and Degree Distribution Pattern of Protein-Protein Interaction Networks

A Study of Random Duplication Graphs and Degree Distribution Pattern of Protein-Protein Interaction Networks A Study of Random Duplication Graphs and Degree Distribution Pattern of Protein-Protein Interaction Networks by Zheng Ma A thesis presented to the University of Waterloo in fulfillment of the thesis requirement

More information

Counting Triangles & The Curse of the Last Reducer. Siddharth Suri Sergei Vassilvitskii Yahoo! Research

Counting Triangles & The Curse of the Last Reducer. Siddharth Suri Sergei Vassilvitskii Yahoo! Research Counting Triangles & The Curse of the Last Reducer Siddharth Suri Yahoo! Research Why Count Triangles? 2 Why Count Triangles? Clustering Coefficient: Given an undirected graph G =(V,E) cc(v) = fraction

More information

MCL. (and other clustering algorithms) 858L

MCL. (and other clustering algorithms) 858L MCL (and other clustering algorithms) 858L Comparing Clustering Algorithms Brohee and van Helden (2006) compared 4 graph clustering algorithms for the task of finding protein complexes: MCODE RNSC Restricted

More information

Topology Enhancement in Wireless Multihop Networks: A Top-down Approach

Topology Enhancement in Wireless Multihop Networks: A Top-down Approach Topology Enhancement in Wireless Multihop Networks: A Top-down Approach Symeon Papavassiliou (joint work with Eleni Stai and Vasileios Karyotis) National Technical University of Athens (NTUA) School of

More information

Degree Distribution: The case of Citation Networks

Degree Distribution: The case of Citation Networks Network Analysis Degree Distribution: The case of Citation Networks Papers (in almost all fields) refer to works done earlier on same/related topics Citations A network can be defined as Each node is a

More information

Unit 8: Coping with NP-Completeness. Complexity classes Reducibility and NP-completeness proofs Coping with NP-complete problems. Y.-W.

Unit 8: Coping with NP-Completeness. Complexity classes Reducibility and NP-completeness proofs Coping with NP-complete problems. Y.-W. : Coping with NP-Completeness Course contents: Complexity classes Reducibility and NP-completeness proofs Coping with NP-complete problems Reading: Chapter 34 Chapter 35.1, 35.2 Y.-W. Chang 1 Complexity

More information

V 2 Clusters, Dijkstra, and Graph Layout"

V 2 Clusters, Dijkstra, and Graph Layout Bioinformatics 3! V 2 Clusters, Dijkstra, and Graph Layout" Mon, Oct 21, 2013" Graph Basics" A graph G is an ordered pair (V, E) of a set V of vertices and a set E of edges." Degree distribution P(k)!

More information

V 2 Clusters, Dijkstra, and Graph Layout

V 2 Clusters, Dijkstra, and Graph Layout Bioinformatics 3 V 2 Clusters, Dijkstra, and Graph Layout Fri, Oct 19, 2012 Graph Basics A graph G is an ordered pair (V, E) of a set V of vertices and a set E of edges. Degree distribution P(k) Random

More information

1 More configuration model

1 More configuration model 1 More configuration model In the last lecture, we explored the definition of the configuration model, a simple method for drawing networks from the ensemble, and derived some of its mathematical properties.

More information

A Generating Function Approach to Analyze Random Graphs

A Generating Function Approach to Analyze Random Graphs A Generating Function Approach to Analyze Random Graphs Presented by - Vilas Veeraraghavan Advisor - Dr. Steven Weber Department of Electrical and Computer Engineering Drexel University April 8, 2005 Presentation

More information

Topic II: Graph Mining

Topic II: Graph Mining Topic II: Graph Mining Discrete Topics in Data Mining Universität des Saarlandes, Saarbrücken Winter Semester 2012/13 T II.Intro-1 Topic II Intro: Graph Mining 1. Why Graphs? 2. What is Graph Mining 3.

More information

Pregel. Ali Shah

Pregel. Ali Shah Pregel Ali Shah s9alshah@stud.uni-saarland.de 2 Outline Introduction Model of Computation Fundamentals of Pregel Program Implementation Applications Experiments Issues with Pregel 3 Outline Costs of Computation

More information

arxiv: v1 [cs.si] 11 Jan 2019

arxiv: v1 [cs.si] 11 Jan 2019 A Community-aware Network Growth Model for Synthetic Social Network Generation Furkan Gursoy furkan.gursoy@boun.edu.tr Bertan Badur bertan.badur@boun.edu.tr arxiv:1901.03629v1 [cs.si] 11 Jan 2019 Dept.

More information

Social Network Analysis

Social Network Analysis Social Network Analysis Mathematics of Networks Manar Mohaisen Department of EEC Engineering Adjacency matrix Network types Edge list Adjacency list Graph representation 2 Adjacency matrix Adjacency matrix

More information

Biological Networks Analysis

Biological Networks Analysis Biological Networks Analysis Introduction and Dijkstra s algorithm Genome 559: Introduction to Statistical and Computational Genomics Elhanan Borenstein The clustering problem: partition genes into distinct

More information

Spanning and weighted spanning trees. A different kind of optimization. (graph theory is cool.)

Spanning and weighted spanning trees. A different kind of optimization. (graph theory is cool.) A different kind of optimization (graph theory is cool.) A different kind of optimization (graph theory is cool.) Definitions and examples Graphs A graph is a collection of vertices (that look like dots

More information

CSE 158 Lecture 11. Web Mining and Recommender Systems. Triadic closure; strong & weak ties

CSE 158 Lecture 11. Web Mining and Recommender Systems. Triadic closure; strong & weak ties CSE 158 Lecture 11 Web Mining and Recommender Systems Triadic closure; strong & weak ties Triangles So far we ve seen (a little about) how networks can be characterized by their connectivity patterns What

More information

On Compressing Social Networks. Ravi Kumar. Yahoo! Research, Sunnyvale, CA. Jun 30, 2009 KDD 1

On Compressing Social Networks. Ravi Kumar. Yahoo! Research, Sunnyvale, CA. Jun 30, 2009 KDD 1 On Compressing Social Networks Ravi Kumar Yahoo! Research, Sunnyvale, CA KDD 1 Joint work with Flavio Chierichetti, University of Rome Silvio Lattanzi, University of Rome Michael Mitzenmacher, Harvard

More information

1 Large-scale structure in networks

1 Large-scale structure in networks 1 Large-scale structure in networks Most of the network measures we have considered so far can tell us a great deal about the shape of a network. However, these measures generally describe patterns as

More information

Network Environments in AnyLogic. Nathaniel Osgood Agent-Based Modeling Bootcamp for Health Researchers

Network Environments in AnyLogic. Nathaniel Osgood Agent-Based Modeling Bootcamp for Health Researchers Network Environments in AnyLogic Nathaniel Osgood Agent-Based Modeling Bootcamp for Health Researchers August 23, 2011 Hands on Model Use Ahead Load model: Network Modification of SIR AB The Environment

More information

Plan of the lecture I. INTRODUCTION II. DYNAMICAL PROCESSES. I. Networks: definitions, statistical characterization, examples II. Modeling frameworks

Plan of the lecture I. INTRODUCTION II. DYNAMICAL PROCESSES. I. Networks: definitions, statistical characterization, examples II. Modeling frameworks Plan of the lecture I. INTRODUCTION I. Networks: definitions, statistical characterization, examples II. Modeling frameworks II. DYNAMICAL PROCESSES I. Resilience, vulnerability II. Random walks III. Epidemic

More information

Graphs and Trees. An example. Graphs. Example 2

Graphs and Trees. An example. Graphs. Example 2 Graphs and Trees An example How would you describe this network? What kind of model would you write for it? What kind of information would you expect to obtain? Relationship between some of the apoptotic

More information

Weighted networks. 9.1 The strength of weak ties

Weighted networks. 9.1 The strength of weak ties Weighted networks 9 In this lecture we consider networks in which links differ from each other. The links are made individual by ascribing a positive number a weight to each of them. These weighted networks

More information

The Betweenness Centrality Of Biological Networks

The Betweenness Centrality Of Biological Networks The Betweenness Centrality Of Biological Networks Shivaram Narayanan Thesis submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of the requirements

More information

Network Motif Discovery Using Subgraph Enumeration and Symmetry-Breaking

Network Motif Discovery Using Subgraph Enumeration and Symmetry-Breaking Network Motif Discovery Using Subgraph Enumeration and Symmetry-Breaking Joshua A. Grochow and Manolis Kellis Computer Science and AI Laboratory, M.I.T. Broad Institute of M.I.T. and Harvard joshuag@cs.uchicago.edu,

More information

Network Motif & Triad Significance Profile Analyses On Software System

Network Motif & Triad Significance Profile Analyses On Software System Network Motif & Triad Significance Profile Analyses On Software System Zhang Lin, Qian GuanQun,Zhang Li School of Compute Science and Engineering Beihang University 37# Xueyuan Rd, Beijing CHINA zhanglin@cse.buaa.edu.cn,qianguanqun@cse.buaa.edu.cn,lily@buaa.edu.cn

More information

Data-Intensive Distributed Computing

Data-Intensive Distributed Computing Data-Intensive Distributed Computing CS 451/651 (Fall 2018) Part 4: Analyzing Graphs (1/2) October 4, 2018 Jimmy Lin David R. Cheriton School of Computer Science University of Waterloo These slides are

More information

(Social) Networks Analysis III. Prof. Dr. Daning Hu Department of Informatics University of Zurich

(Social) Networks Analysis III. Prof. Dr. Daning Hu Department of Informatics University of Zurich (Social) Networks Analysis III Prof. Dr. Daning Hu Department of Informatics University of Zurich Outline Network Topological Analysis Network Models Random Networks Small-World Networks Scale-Free Networks

More information

Overview of Network Theory, I

Overview of Network Theory, I Overview of Network Theory, I ECS 253 / MAE 253, Spring 2016, Lecture 1 Prof. Raissa D Souza University of California, Davis Raissa s background: 1999, PhD, Physics, Massachusetts Inst of Tech (MIT): Joint

More information

Examples of Complex Networks

Examples of Complex Networks Examples of Complex Networks Neural Network (C. Elegans) http://gephi.org/wp-content/uploads/2008/12/screenshot-celegans.png Food Web http://1.bp.blogspot.com/_vifbm3t8bou/sbhzqbchiei/aaaaaaaaaxk/rsc-

More information

CS 534: Computer Vision Segmentation and Perceptual Grouping

CS 534: Computer Vision Segmentation and Perceptual Grouping CS 534: Computer Vision Segmentation and Perceptual Grouping Ahmed Elgammal Dept of Computer Science CS 534 Segmentation - 1 Outlines Mid-level vision What is segmentation Perceptual Grouping Segmentation

More information

Investigation and Justification (Proof) Thread

Investigation and Justification (Proof) Thread Concept Category 3 (CC3): Triangle Trigonometry Grounded in students study of similar triangles in CC2, students consider slope triangles in CC3 to learn about the relationship between the angles and the

More information

The k-center problem Approximation Algorithms 2009 Petros Potikas

The k-center problem Approximation Algorithms 2009 Petros Potikas Approximation Algorithms 2009 Petros Potikas 1 Definition: Let G=(V,E) be a complete undirected graph with edge costs satisfying the triangle inequality and k be an integer, 0 < k V. For any S V and vertex

More information

8/19/13. Computational problems. Introduction to Algorithm

8/19/13. Computational problems. Introduction to Algorithm I519, Introduction to Introduction to Algorithm Yuzhen Ye (yye@indiana.edu) School of Informatics and Computing, IUB Computational problems A computational problem specifies an input-output relationship

More information

BioNSi - Biological Network Simulation Tool

BioNSi - Biological Network Simulation Tool Workshop: BioNSi - Biological Network Simulation Tool Amir Rubinstein CS @ TAU Tel-Aviv University, Faculty of Life Sciences 8 May 2016 Outline Part I Basic notions: - Modeling and simulation - Crash intro

More information

A quick review. The clustering problem: Hierarchical clustering algorithm: Many possible distance metrics K-mean clustering algorithm:

A quick review. The clustering problem: Hierarchical clustering algorithm: Many possible distance metrics K-mean clustering algorithm: The clustering problem: partition genes into distinct sets with high homogeneity and high separation Hierarchical clustering algorithm: 1. Assign each object to a separate cluster.. Regroup the pair of

More information

CSE 701: LARGE-SCALE GRAPH MINING. A. Erdem Sariyuce

CSE 701: LARGE-SCALE GRAPH MINING. A. Erdem Sariyuce CSE 701: LARGE-SCALE GRAPH MINING A. Erdem Sariyuce WHO AM I? My name is Erdem Office: 323 Davis Hall Office hours: Wednesday 2-4 pm Research on graph (network) mining & management Practical algorithms

More information