Network Science: Principles and Applications

Size: px
Start display at page:

Download "Network Science: Principles and Applications"

Transcription

1 Network Science: Principles and Applications CS Fall 2016 Amarda Shehu,Fei Li [amarda, lifei](at)gmu.edu Department of Computer Science George Mason University

2 1 Outline of Today s Class 2 Robustness Cascades:Percolation Theory Robustness in Complex Systems Robustness of Regular Networks Robustness of Scale-free Networks Molloy-Reed Criterion Application of Molloy-Reed Criterion Attack Tolerance Cascading Failures Modeling Cascading Failures Building Robustness Summary: Achilles Heel Amarda Shehu,Fei Li () Outline of Today s Class 2

3 Robustness in Complex Systems Complex systems maintain their basic functions even under errors and failures cell mutations There are uncountable number of mutations and other errors in our cells, yet, we do not notice their consequences Internet router breakdowns At any moment hundreds of routers on the internet are broken, yet, the internet as a whole does not loose its functionality Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 3

4 Robustness in Complex Systems Complex systems maintain their basic functions even under errors and failures cell mutations There are uncountable number of mutations and other errors in our cells, yet, we do not notice their consequences Internet router breakdowns At any moment hundreds of routers on the internet are broken, yet, the internet as a whole does not loose its functionality Where does robustness come from? There are feedback loops in most complex systems that keep tab on the components and the systems health Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 3

5 Robustness in Complex Systems Complex systems maintain their basic functions even under errors and failures cell mutations There are uncountable number of mutations and other errors in our cells, yet, we do not notice their consequences Internet router breakdowns At any moment hundreds of routers on the internet are broken, yet, the internet as a whole does not loose its functionality Where does robustness come from? There are feedback loops in most complex systems that keep tab on the components and the systems health Could the network structure affect a system s robustness? Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 3

6 Robustness Could the network structure affect a system s robustness? Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 4

7 Robustness Could the network structure affect a system s robustness? How do we describe in quantitave terms the breakdown of a network under node or link removal? Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 4

8 Robustness Could the network structure affect a system s robustness? How do we describe in quantitave terms the breakdown of a network under node or link removal? Percolation Theory Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 4

9 Percolation Theory p = the probability that a node is occupied Critical point p c : above p c we have a spanning/percolating cluster (has at least one site on each of the four boundaries of a lattice) Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 5

10 Percolation Theory Key Questions What is the expected size of the largest cluster? What is the average cluster size? Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 6

11 Percolation Theory Key Questions What is the expected size of the largest cluster? What is the average cluster size? The higher p, the larger are the clusters Key prediction: cluster size does not change gradually with p For a wide range of p, the lattice is populated with numerous tiny clusters If p approaches a critical value p c, these small clusters grow and coalesce, leading to the emergence of a large cluster at p c The percolating cluster as it reaches the end of the lattice phase transition at p c: from many small clusters to a percolating cluster that percolates the whole lattice Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 6

12 Percolation Theory Key Questions What is the expected size of the largest cluster? What is the average cluster size? The higher p, the larger are the clusters Key prediction: cluster size does not change gradually with p For a wide range of p, the lattice is populated with numerous tiny clusters If p approaches a critical value p c, these small clusters grow and coalesce, leading to the emergence of a large cluster at p c The percolating cluster as it reaches the end of the lattice phase transition at p c: from many small clusters to a percolating cluster that percolates the whole lattice Three critical quantities: Order Parameter, Average Cluster Size, and Correlation Length Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 6

13 Percolation: Critical Exponents p plays the role of T in thermal phase transitions Order parameter: P (p p c ) β probability that a node (or link) belongs to cluster Correlation length: η p p c ν mean distance between two sites/pebbles on same cluster Cluster size: S p p c γp Average size of finite clusters β, ν, γ p : critical exponentscharacterize the behavior near the phase transition The exponents are universal (independent of the lattice) p c depends on details (lattice) ν and γ are the same for p > p c and p < p c For η and S take into account all finite clusters Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 7

14 Percolation Theory and Phase Transitions Site or bond percolation in 2D lattice: simplest system that exhibits characteristics of a sharp second order phase transition in the limit of infinite size The size of the system is the number of sites (or bonds) in the lattice There is a single control variable, the probability p that a lattice site is occupied A second order phase transition has characteristic singular behavior in the limit of infinite size These singularities appear in the equations of state at the critical value of the control parameter and are characterized by numbers called critical exponents The critical exponents are very useful and interesting because they appear to take the numerical same values for systems with the same dimensionality and symmetries, and are independent of the microscopic details of individual systems Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 8

15 Order Parameter P Convenient order parameter: the fraction of occupied sites in the spanning cluster: nr. sites in spanning cluster P = total nr. occupied sites This is also the probability that a randomly chosen pebble belongs to the largest cluster. As N, P = constant (p p c) β for p p c and 0 otherwise (β = 5/36 in 2D square lattice) Figure: Schematic illustration of P belongs to the largest connected component: For p < p c, all components are small, so P = 0. Once p reaches p c, a giant component emerges. Beyond p c, there is a finite probability that a node belongs to the largest component. Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 9

16 From Cluster Size Distribution to Average Cluster Size The cluster size distribution of a lattice configuration is defined to be: nr. clusters with s sites n s (p) = nr. sites in lattice By convention, spanning clusters are not included in calculating this distribution The probability w s that an occupied site belongs to a cluster of s sites is: w s = s ns s s ns The average or mean cluster size in a lattice configuration is then: S = s s w s s = s2 n s s s ns Here again, spanning clusters are excluded from this calculation so the average cluster size is finite above the percolation threshold In the limit of infinite lattice size, the average cluster size becomes singular near the percolation threshold S p p c γ where γ = 43/18 for percolation on 2D square lattice. Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 10

17 Average Cluster Size S S p p c γp Figure: As we approach p c from below, numerous small clusters coalesce and S diverges. Same divergence is observed above p c, where to calculate S we remove the percolating cluster from the average. Same exponent γ p characterizes divergence on both sides of the critical point p c. Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 11

18 Correlation Length Two sites on the lattice are said to be correlated or connected if they are both occupied and belong to the same cluster The correlation length η of a lattice configuration is the average distance between connected sites By convention, spanning clusters are not included in calculating the correlation length so that correlation length remains finite in the limit of infinite lattice size Even so, the correlation length diverges near the percolation phase transition as in: η p p c ν where ν = 4/3 for percolation on 2D square lattice Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 12

19 Universality and Scaling Laws p c dependent of lattice type and dimensionality d (e.g., p c for 2D square lattice) Critical exponents only dependent of d Theoretical and experimental indications that the critical exponents that characterize second-order phase transitions are connected by scaling laws The scaling law which appears to apply to systems with transitions similar to percolation is 2β + γ = νd Sharp phase transitions, critical singularities and exponents, and scaling laws are all properties of infinitely large systems Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 13

20 Role of Percolation in Understanding Robustness Could the network structure affect a system s robustness? How do we describe in quantitave terms the breakdown of a network under node or link removal? Percolation Theory Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 14

21 Robustness: Inverse Percolation Transition Phenomenon of interest: impact of node failures on integrity of network Percolation theory helps us understand this process Treat square lattice as network whose nodes are intersections Randomly remove f fraction of nodes and ask how this impacts integrity of lattice If f is small, damage should be minimal Increasing f should isolate chunks of nodes from giant component For sufficiently large f, giant component breaks into tiny disconnected components Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 15

22 Damage is Modeled as an Inverse Percolation Process Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 16

23 Robustness: Inverse Percolation Transition Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 17

24 Bottom Line: Robustness of Regular Networks is Well Understood! Breakdown under random node removal is not gradual: once fraction of removed nodes reaches a critical threshold f c, network breaks into disconnected components Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 18

25 Robustness of Scale-free Networks Interest in the robustness problem has three origins: Robustness of complex systems is an important problem in many areas Many real networks are not regular but have a scale-free topology In scale-free networks, the scenario described above is not valid Albert, Jeong, Barabási, Nature 406:378, 2000 Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 19

26 Robustness of Scale-free Networks Scale-free networks do not appear to break apart under random failures Reason: the hubs (likelihood of removing a hub is small) Figure: y-axis: relative size of giant component. Have to remove almost all nodes to break down network f c 1. Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 20

27 Molloy-Reed Criterion High f c characteristic of scale-free networks Calculate f c for network with arbitrary degree distribution For a network to have a giant component, most nodes that belong to it must be connected to at least two other nodes Molloy-Reed criterion: a randomly-wired network has a giant component if: K = k2 k > 2 Networks with K < 2 lack a giant component, being fragmented into many disconnected components Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 21

28 Derivation of Molloy-Reed Criterion Each node in a giant component must be connected to 2 other nodes on average Denote with P(k i i j) the conditional probability that a node i with degree k i is connected to a node j that is part of the giant component Then, expected degree of such a node i is: k i i j = k i k i P(k i i j) Condition for node i to also be part of the giant component: k i i j 2 Equivalently: k i k i P(k i i j) 2 Goal: rewrite inequality in terms of first ( k ) and second momenta ( k 2 ) of p k We can rewrite the conditional probability P(k i i j) using Bayes formula: P(k i i j) = P(k i,i j) P(i j) = P(i j k i )p(k i ) P(i j) Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 22

29 Derivation of Molloy-Reed Criterion Continued For network with degree distribution p k, in absence of degree correlations, we can write: P(i j) = 2L N(N 1) = k N 1 We can also write: P(i j k i ) = k i N 1 The above expresses the fact that we can choose between N 1 nodes to link to, each with probability 1/(N 1) and we can try this k i times So, now we return to expected degree of node i in giant component: k i k i P(k i i j) = k i k i 1 k k i N 1 p(k i ) k N 1 = k i k 2 i p(k i ) = k2 k So we arrive at the Molloy-Reed criterion providing condition for giant component: K = k2 k > 2 2 is the criticality point Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 23

30 Application of Molloy-Reed Criterion: Predictive Power on Random Network In a random network, the degree distribution follows the Poisson distribution with peak at k and standard deviation σ = k 1 2 so, σ 2 = k Normally, we write σ in terms of the spread, so σ = ( k 2 k 2 ) 1 2 Equivalently, σ 2 = k 2 k 2 It follows then that in a random network, k = k 2 k 2 So, we have k 2 = k + k 2 = k (1 + k ) Then, K = k2 k = k (1+ k ) k = 1 + k > 2 Or, equivalently: k > 1 condition for giant component to emerge The Molloy-Reed-derived criterion coincides with that derived by Erdos and Renyi in their classical 1959 paper (i.e.; there is a giant component iff each node has on average more than one link) Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 24

31 Application of Molloy-Reed Criterion: Prediction of Giant Component Molloy-Reed criterion tells us that a network will have a giant component as long as k 2 diverges Recall that k n = k max k min k n P(k)dk In scale-free networks, k n = C kn γ+1 max k n γ+1 min n γ+1 C collects constant terms: Barabasi 4.20 All moments larger than γ 1 diverge (n > γ 1) Example: k 2 diverges in scale-free network with γ < 3 Since in most scale-free networks 2 < γ < 3, k 2 diverges in most scale-free networks Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 25

32 Critical Threshold f c At what threshold will a network lose its giant component? After the random deletion of a fraction f of nodes, a vertex with former connectivity k will now be attached to a number k of existing nodes. This number k is distributed binomially: P(k ) = k=k P(k)( k k ) (1 f ) k f k k Substituting the new k 2 and k in the criterion for criticality k2 k one obtains: 1 f c = 1 k 2 k 1 Barabasi 8.C pg. 42 Note: f c depends on k 2 and k, which are determined by degree distribution p k Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 26

33 Critical Threshold f c So, we have: f c = 1 1 k 2 k 1 On scale-fre networks: k 2 diverges for most scale-free networks, where 2 < γ < 3 So f c 1 On random networks: k 2 = k ( k + 1): So, fc ER = 1 1 k Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 27

34 Critical Threshold f c So, we have: f c = 1 1 k 2 k 1 On scale-fre networks: k 2 diverges for most scale-free networks, where 2 < γ < 3 So f c 1 On random networks: k 2 = k ( k + 1): So, fc ER = 1 1 k What do these derivations mean? Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 27

35 Critical Threshold f c So, we have: f c = 1 1 k 2 k 1 On scale-fre networks: k 2 diverges for most scale-free networks, where 2 < γ < 3 So f c 1 On random networks: k 2 = k ( k + 1): So, fc ER = 1 1 k What do these derivations mean? On scale-free graphs, one has to remove almost all nodes in order for the giant component to break Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 27

36 Critical Threshold f c So, we have: f c = 1 1 k 2 k 1 On scale-fre networks: k 2 diverges for most scale-free networks, where 2 < γ < 3 So f c 1 On random networks: k 2 = k ( k + 1): So, fc ER = 1 1 k What do these derivations mean? On scale-free graphs, one has to remove almost all nodes in order for the giant component to break On random networks, f c is finite and inversely related to density the denser the random network, the higher its f c Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 27

37 Criticality Threshold in Degree-correlated Graphs The above derivation of f c assumes no degree-degree correlations In the case of degree-degree correlations, it is non-trivial to derive f c Consider the case of the giant component in a disassortative network Disassortative correlations compete with the formation of the giant component In the presence of disassortative correlations, divergence of k 2 is not a sufficient condition to get a robust graph with f c = 1 A detailed treatment in section 3 in Boccaletti 2006 review What is f c in real networks, and what is its dependence on γ? Just obtain k2 in terms of γ k Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 28

38 Criticality Threshold in Degree-correlated Graphs The above derivation of f c assumes no degree-degree correlations In the case of degree-degree correlations, it is non-trivial to derive f c Consider the case of the giant component in a disassortative network Disassortative correlations compete with the formation of the giant component In the presence of disassortative correlations, divergence of k 2 is not a sufficient condition to get a robust graph with f c = 1 A detailed treatment in section 3 in Boccaletti 2006 review What is f c in real networks, and what is its dependence on γ? Just obtain k2 in terms of γ k Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 28

39 Criticality Threshold in Scale-free Networks Recall that k n = k max k min And that f c = 1 1 k 2 k 1 k n P(k)dk = C kn γ+1 max After some manipulations, one obtains: k n γ+1 min n γ+1 1 1, 2 < γ < 3 γ 2 3 γ f c = kγ 2 min k3 γ max 1 1 1, γ > 3 γ 2 γ 3 k min 1 What does this mean? How does f c change with respect to γ? Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 29

40 Criticality Threshold in Scale-free Networks Recall that k n = k max k min And that f c = 1 1 k 2 k 1 k n P(k)dk = C kn γ+1 max After some manipulations, one obtains: k n γ+1 min n γ+1 1 1, 2 < γ < 3 γ 2 3 γ f c = kγ 2 min k3 γ max 1 1 1, γ > 3 γ 2 γ 3 k min 1 What does this mean? How does f c change with respect to γ? Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 29

41 Enhanced Robustness in Scale-Free Networks For scale-free networks with γ < 3, second moment k 2 diverges as N So, if k 2, f c 1 To fragment a scale-free network, almost all nodes have to be removed 1 f c = 1 1 γ 2 3 γ kγ 2 min k3 γ 1 γ 2 max 1, 2 < γ < 3 γ 3 k min 1, γ > 3 For γ > 3, f c depends only on γ and k min So, f c is independent of network size N This network behaves like a random network; it falls apart once a finite fraction of its nodes are removed For γ < 3, k max diverges for large N, so f c 1 (dependence on N is hidden in k max) Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 30

42 Robustness of Finite Networks Above equation predicts that for a scale-free network, f c converges iff k max which corresponds to N Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 31

43 Robustness of Finite Networks Above equation predicts that for a scale-free network, f c converges iff k max which corresponds to N What about finite networks? Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 31

44 Robustness of Finite Networks Above equation predicts that for a scale-free network, f c converges iff k max which corresponds to N What about finite networks? If we insert k max = k min N γ 1 1 (Barabasi 4.18) into the above equation, we obtain: f c 1 C 3 γ with C collecting all terms that do not depend on N N γ 1 Above again shows that the larger the network, the closer f c is to 1 Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 31

45 Robustness of Finite Networks Above equation predicts that for a scale-free network, f c converges iff k max which corresponds to N What about finite networks? If we insert k max = k min N γ 1 1 (Barabasi 4.18) into the above equation, we obtain: f c 1 C 3 γ with C collecting all terms that do not depend on N N γ 1 Above again shows that the larger the network, the closer f c is to 1 Enhanced Robutness Displayed by a network if its breakdown threshold deviates from the random network prediction: f c > fc ER All we need for it is deviation of k 2 from expected value for a random network of same size (not even a strict power law in degree distribution) Emerges under link removal, as well Scale-free property changes not only f c but also critical exponents γ, β, ν Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 31

46 Breakdown Thresholds Under Random Failures and Attacks Estimated f c for random node failures (column 2) and attacks (column 4) for ten reference networks. Power grid (p k is exponential), citation, and actor networks (high k ) lack enhanced robustness. Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 32

47 Attack Tolerance What if we do not remove nodes at random, but instead target hubs? Attack: remove nodes in order of highest to lowest degree? Attack assumes a detailed knowledge of the network topology in the ability to target hubs Impact of Hub Removal: A scale-free networks extreme fragility to attacks: f c is small, implying that the removal of only a few hubs can disintegrate the network. The initial network has degree exponent γ = 2.5, k min = 2 and N = 10, 000. Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 33

48 Critical Threshold Under Attack An attack on a scale-free network has two consequences: The critical threshold f c < 1, indicating that under attacks a scale-free network can be fragmented by the removal of a finite fraction of its hubs. The observed f c is remarkably low, indicating that we need to remove only a tiny fraction of the hubs to cripple the network! Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 34

49 Critical Threshold Under Attack An attack on a scale-free network has two consequences: The critical threshold f c < 1, indicating that under attacks a scale-free network can be fragmented by the removal of a finite fraction of its hubs. The observed f c is remarkably low, indicating that we need to remove only a tiny fraction of the hubs to cripple the network! How do we analytically calculate f c for a scale-free network under attack? Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 34

50 Critical Threshold Under Attack An attack on a scale-free network has two consequences: The critical threshold f c < 1, indicating that under attacks a scale-free network can be fragmented by the removal of a finite fraction of its hubs. The observed f c is remarkably low, indicating that we need to remove only a tiny fraction of the hubs to cripple the network! How do we analytically calculate f c for a scale-free network under attack? We need two observations on how hub removal changes the network: It changes the maximum degree of the network from k max to k max, as all nodes with degree larger than k max have been removed Degree distribution also changes from p k to p k, as nodes connected to the removed hubs will lose links, changing the degrees of the remaining nodes Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 34

51 Critical Threshold Under Attack An attack on a scale-free network has two consequences: The critical threshold f c < 1, indicating that under attacks a scale-free network can be fragmented by the removal of a finite fraction of its hubs. The observed f c is remarkably low, indicating that we need to remove only a tiny fraction of the hubs to cripple the network! How do we analytically calculate f c for a scale-free network under attack? We need two observations on how hub removal changes the network: It changes the maximum degree of the network from k max to k max, as all nodes with degree larger than k max have been removed Degree distribution also changes from p k to p k, as nodes connected to the removed hubs will lose links, changing the degrees of the remaining nodes Gist of idea: view attack as random node removal from network with adjusted k max and p k Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 34

52 Critical Threshold Under Attack Solution to equation fc 2 γ 1 γ = γ 3 γ k min(f 3 γ 1 γ c 1) (Barabasi 8F) f c for attacks is non-monotonic, may increase for small γ and decrease for large γ f c for attacks < than f c for random failures Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 35

53 Summary: Critical Threshold Under Attack For large γ, scale-free network behaves like a random network, with the impact of an attack being similar to the impack of random node removal Failure and attack thresholds converge to each-other for large γ If γ, p k δ(k k min ), meaning all nodes have the same degree k min Random failures and attacks become indistinguishable in the γ limit, obtaining f c 1 1 k min 1 Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 36

54 Summary: Critical Threshold Under Attack For large γ, scale-free network behaves like a random network, with the impact of an attack being similar to the impack of random node removal Failure and attack thresholds converge to each-other for large γ If γ, p k δ(k k min ), meaning all nodes have the same degree k min Random failures and attacks become indistinguishable in the γ limit, obtaining f c 1 1 k min 1 Summary While random node failures do not fragment a scale-free network, an attack that targets the hubs can easily destroy such a network This fragility is bad news for the Internet, as it indicates that it is inherently vulnerable to deliberate attacks It can be good news in medicine, as the vulnerability of bacteria to the removal of their hub proteins offers avenues to design drugs that kill unwanted bacteria Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 36

55 Cascading Failures Assumed that nodes fail independently of each-other In reality, activity of each node depends on activity of neighboring nodes Failure of a node can induce failures of neighboring nodes Examples: Blackouts (power grid) shifting power to other lines upon a node/generator failure may overwhelm capacities and cause more nodes to fail Denial of Service Attacks (DoS, internet) a failed router increases traffic on other routers, potentially cascading DoS attacks Financial Crises drop in the house prices in 2008 in the U.S. has spread along the links of the financial network, inducing a cascade of failed banks, companies and even nations Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 37

56 Empirical Patterns Governing Cascading Failures: Blackouts Frequently recorded measured of blackout size is energy unserved Electrical engineers approximate the probability distribution p(s) of energy unserved in North America with the power law p(s) s α α is the avalance exponent, and most blackouts are small but coexist with occasional major blackouts (millions of consumers lose power) Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 38

57 Empirical Patterns Governing Cascading Failures: Information Cascades As users frequently share web-content using URL shorteners, one can also track each spreading/sharing process Twitter study tracking 74 million such events over two months followed the diffusion of each URL from a particular seed node through reposts Size distribution of observed cascades follows power law, as well, with avalanche exponent α 1.75 (vast majority of posted URLS do not spread; few reposted thousands of times) Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 39

58 Empirical Patterns Governing Cascading Failures: Earthquakes Seismologists approximate the distribution of earthquake amplitudes with the power law with α 1.67 The cumulative distribution of earthquake amplitudes recorded between 1977 and 2000 The dashed lines indicate the power law fit used by seismologists to characterize the distribution The earthquake magnitude shown on the horizontal axis is the logarithm of s, which is the amplitude of the observed seismic waves Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 40

59 Modeling Cascading Failures Size distribution of the observed avalanches is universal, being independent of the particularities of the system Goal: understand the mechanisms governing cascading phenomena and to explain the power-law nature of the avalanche size distribution Many models have been proposed to capture the dynamics of cascading events They indicate that systems that develop cascades share three key ingredients: The system is characterized by some flow over a network, like the flow of electric current in the power grid or the flow of information in communication systems Each component has a local breakdown rule that determines when it contributes to a cascade, either by failing (power grid, earthquakes) or by choosing to pass on a piece of information (Twitter) Each system has a mechanism to redistribute the traffic to other nodes upon the failure or the activation of a component Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 41

60 Modeling Cascading Failures Size distribution of the observed avalanches is universal, being independent of the particularities of the system Goal: understand the mechanisms governing cascading phenomena and to explain the power-law nature of the avalanche size distribution Many models have been proposed to capture the dynamics of cascading events They indicate that systems that develop cascades share three key ingredients: The system is characterized by some flow over a network, like the flow of electric current in the power grid or the flow of information in communication systems Each component has a local breakdown rule that determines when it contributes to a cascade, either by failing (power grid, earthquakes) or by choosing to pass on a piece of information (Twitter) Each system has a mechanism to redistribute the traffic to other nodes upon the failure or the activation of a component Let s see two such models Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 41

61 Failure Propagation Model Introduced to model spread of ideas and opinions Consider a network with an arbitrary degree distribution, where each node contains an agent. An agent i can be in the state 0 (active or healthy) or 1 (inactive or failed), and is characterized by a breakdown threshold φ i = φ for all i All agents are initially in the healthy state 0 At time t = 0 one agent switches to state 1, corresponding to an initial component failure or to the release of a new piece of information In each subsequent time step, we randomly pick an agent and update its state following a threshold rule: If the selected agent i is in state 0, it inspects the state of its k i neighbors and adopts state 1 (i.e. it also fails) if at least a fraction of its k i neighbors are in state 1, otherwise it retains its original state 0 If selected agent i is in state 1, it does not change its state Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 42

62 Illustration of Failure Propagation Model Development of a cascade in a small network in which each node has the same breakdown threshold φ = 0.4 Initially all nodes are in state 0, shown as green circles After node A changes its state to 1 (purple), its neighbors B and E will have a fraction f = 1/2 > 0.4 of their neighbors in state 1 Consequently they also fail, changing their state to 1 In the next time step C and D will also fail, as both have f > 0.4 Consequently the cascade sweeps the whole network, reaching a size s = 5 One can check that if we initially flip node B, it will not induce an avalanche Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 43

63 Regimes in Failure Propagation Model Subcritical Regime If k is high, flipping a node is unlikely to flip other nodes, as healthy nodes already have many healthy neighbors Cascades in this regime die out quickly, and sizes follow an exponential distribution (no global cascades) Supercritical Regime If k is small, flipping single nodes can put several of neighbors over the threshold, triggering global cascade Perturbations induce major breakdowns Critical Regime At the boundary of the subcritical and supercritical regime, the avalanches have widely different sizes Numerical simulations indicate that in this regime the avalanche sizes s follows the power law p(s) s α with α = 3/2 if underlying network is random Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 44

64 Branching Model Simplest model that still captures the basic features of a cascading event Builds on the observation that each cascading failure follows a branching process Call the node whose initial failure triggers the avalanche the root of the tree Branches of the tree are the nodes whose failure was triggered by this initial failure The breakdown of node A starts the avalanche, hence A is the root of the tree The failure of A leads to the failure of B and E, representing the two branches of the tree Subsequently, E induces the failure of D and B leads to the failure of C Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 45

65 Branching Model Starts with a single active node In next time step, each active node produces k offspring, where k is selected from p k distribution If a node selects k = 0, that branch dies out If it selects k > 0, it will have k new active sites Size of avalanche corresponds to size of tree when all active sites die out Branching model predicts same phases as those observed in cascading failures model, but now phases are determined only by the p k distribution Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 46

66 Regimes in Branching Model Subcritical Regime For k < 1, on average each branch has less then one offspring Consequently each tree will terminate quickly In this regime, avalanche sizes follow an exponential distribution Supercritical Regime For k > 1, on average each branch has more than one offspring Consequently, tree will grow indefinitely, with all avalanches being global Critical Regime For k = 1, on average each branch has exactly one offspring Consequently, some trees are large and others die out shortly Numerical simulations indicate that in this regime the avalanche size distribution follows the power law Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 47

67 Size Distribution in Branching Model The branching model can be solved analytically, allowing us to determine the avalanche size distribution for an arbitrary p k If p k is exponentially-bounded, e.g. it has an exponential tail, the calculations predict α = 3/2 If, however, p k is scale-free, then the avalanche exponent depends on the power-law exponent γ, following: { 3/2, γ 3 α = γ/(γ 1), 2 < γ < 3 Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 48

68 Size Distribution in Branching Model The branching model can be solved analytically, allowing us to determine the avalanche size distribution for an arbitrary p k If p k is exponentially-bounded, e.g. it has an exponential tail, the calculations predict α = 3/2 If, however, p k is scale-free, then the avalanche exponent depends on the power-law exponent γ, following: { 3/2, γ 3 α = γ/(γ 1), 2 < γ < 3 Indeed, empirically-observed avalanche exponents are all between 1.5 and 2, as predicted by the branching model Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 48

69 Size Distribution in Branching Model The branching model can be solved analytically, allowing us to determine the avalanche size distribution for an arbitrary p k If p k is exponentially-bounded, e.g. it has an exponential tail, the calculations predict α = 3/2 If, however, p k is scale-free, then the avalanche exponent depends on the power-law exponent γ, following: { 3/2, γ 3 α = γ/(γ 1), 2 < γ < 3 Indeed, empirically-observed avalanche exponents are all between 1.5 and 2, as predicted by the branching model Many other models in literature: overload model to capture power grid failures, sandpile model to capture cascading failures in critical regimes; other models can account for different traffic capacities in nodes and links Yet all predict existence of a critical state in which avalanche size follows the power law, suggesting the underlying phenomenon is universal Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 48

70 Building Robustness Can we enhance robustness? We can, if we connect peripheral nodes so that the removal of hubs does not fragment the network Price to pay: doubling number of links Cost: proportional to k Can we maximize the robustness of a network to both random failures and targeted attacks without changing the cost? Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 49

71 Low-cost, Enhanced Robustness A network s robustness against random failures is captured by its percolation threshold f c So, increase f c to increase robustness f c depends only on k 2 and k Consequently, the degree distribution which maximizes f c needs to maximize k 2 if we wish to keep the cost k fixed Achieved by binomial distribution corresponding to a network with only two kinds of nodes, with degrees k min and k max If we wish to simultaneously optimize the network topology against both random failures and attacks, we search for topologies that maximize the sum fc tot = fc rand + fc targ Combination of analytical arguments and numerical simulations indicate that this is best achieved by the bimodal degree distribution p k = (1 r) δ(k k min ) + rδ(k k max), where r fraction of nodes have degree k max and 1 r have degree k min Halting cascading failures: actually achieved via selectice node and link removal Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 50

72 Summary: Achilles Heel The remarkable robustness of real networks represents good news for most complex systems Indeed, there are uncountable errors in our cells, from misfolding proteins to the late arrival of a transcription factor Yet, the robustness of the underlying cellular network allows our cells to carry on their normal functions Network robustness also explains why we rarely notice the effect of router errors on the Internet or why the disappearance of a species does not result in an immediate environmental catastrophe Topological robustness comes with a price, vulnerability to attacks Bad news for the internet, economic systems, but good news for drug design Each complex system has its Acchilles heel: the networks behind them are simultaneously robust to random failures but vulnerable to attacks Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 51

73 Summary: Scale-free Property and Robustness Are complex networks robust because they are scale-free or are they scale-free because they are robust? If real systems have evolved to be scale-free to satisfy need for robustness, then one should obtain a scale-free network with robustness as optimization criterion However, the degree distribution in a network with maximal robustness is bimodal rather than a power law Robustness is not the principle that drives the development of scale-free networks Rather, networks are scale-free due to preferential (proportional) attachment It just so happens that scale-freeness also results in enhanced robustness but not maximal robustness Amarda Shehu,Fei Li () Robustness Cascades:Percolation Theory 52

Lecture 10. Under Attack!

Lecture 10. Under Attack! Lecture 10 Under Attack! Science of Complex Systems Tuesday Wednesday Thursday 11.15 am 12.15 pm 11.15 am 12.15 pm Feb. 26 Feb. 27 Feb. 28 Mar.4 Mar.5 Mar.6 Mar.11 Mar.12 Mar.13 Mar.18 Mar.19 Mar.20 Mar.25

More information

CS224W: Analysis of Networks Jure Leskovec, Stanford University

CS224W: Analysis of Networks Jure Leskovec, Stanford University CS224W: Analysis of Networks Jure Leskovec, Stanford University http://cs224w.stanford.edu 10/30/17 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, http://cs224w.stanford.edu 2

More information

Lecture VI Introduction to complex networks. Santo Fortunato

Lecture VI Introduction to complex networks. Santo Fortunato Lecture VI Introduction to complex networks Santo Fortunato Plan of the course I. Networks: definitions, characteristics, basic concepts in graph theory II. III. IV. Real world networks: basic properties

More information

6.207/14.15: Networks Lecture 12: Generalized Random Graphs

6.207/14.15: Networks Lecture 12: Generalized Random Graphs 6.207/14.15: Networks Lecture 12: Generalized Random Graphs 1 Outline Small-world model Growing random networks Power-law degree distributions: Rich-Get-Richer effects Models: Uniform attachment model

More information

arxiv: v1 [math.st] 1 Nov 2017

arxiv: v1 [math.st] 1 Nov 2017 ASSESSING THE RELIABILITY POLYNOMIAL BASED ON PERCOLATION THEORY arxiv:1711.00303v1 [math.st] 1 Nov 2017 SAJADI, FARKHONDEH A. Department of Statistics, University of Isfahan, Isfahan 81744,Iran; f.sajadi@sci.ui.ac.ir

More information

1 Mechanistic and generative models of network structure

1 Mechanistic and generative models of network structure 1 Mechanistic and generative models of network structure There are many models of network structure, and these largely can be divided into two classes: mechanistic models and generative or probabilistic

More information

Social Networks- Stanley Milgram (1967)

Social Networks- Stanley Milgram (1967) Complex Networs Networ is a structure of N nodes and 2M lins (or M edges) Called also graph in Mathematics Many examples of networs Internet: nodes represent computers lins the connecting cables Social

More information

Emergent Phenomena on Complex Networks

Emergent Phenomena on Complex Networks Chapter 1 Emergent Phenomena on Complex Networks 1.0.1 More is different When many interacting elements give rise to a collective behavior that cannot be explained or predicted by considering them individually,

More information

Branching Process Approach to Avalanche Dynamics on Complex Networks

Branching Process Approach to Avalanche Dynamics on Complex Networks Journal of the Korean Physical Society, Vol. 44, No. 3, March 2004, pp. 633 637 Branching Process Approach to Avalanche Dynamics on Complex Networks D.-S. Lee, K.-I. Goh, B. Kahng and D. Kim School of

More information

Attack Strategies on Complex Networks

Attack Strategies on Complex Networks Attack Strategies on Complex Networks Lazaros K. Gallos 1, Reuven Cohen 2, Fredrik Liljeros 3, Panos Argyrakis 1, Armin Bunde 4, and Shlomo Havlin 5 1 Department of Physics, University of Thessaloniki,

More information

Networks as a tool for Complex systems

Networks as a tool for Complex systems Complex Networs Networ is a structure of N nodes and 2M lins (or M edges) Called also graph in Mathematics Many examples of networs Internet: nodes represent computers lins the connecting cables Social

More information

Stability and topology of scale-free networks under attack and defense strategies

Stability and topology of scale-free networks under attack and defense strategies Stability and topology of scale-free networks under attack and defense strategies Lazaros K. Gallos, Reuven Cohen 2, Panos Argyrakis, Armin Bunde 3, and Shlomo Havlin 2 Department of Physics, University

More information

ECS 289 F / MAE 298, Lecture 15 May 20, Diffusion, Cascades and Influence

ECS 289 F / MAE 298, Lecture 15 May 20, Diffusion, Cascades and Influence ECS 289 F / MAE 298, Lecture 15 May 20, 2014 Diffusion, Cascades and Influence Diffusion and cascades in networks (Nodes in one of two states) Viruses (human and computer) contact processes epidemic thresholds

More information

Data Mining and Analysis: Fundamental Concepts and Algorithms

Data Mining and Analysis: Fundamental Concepts and Algorithms Data Mining and Analysis: Fundamental Concepts and Algorithms dataminingbook.info Mohammed J. Zaki 1 Wagner Meira Jr. 2 1 Department of Computer Science Rensselaer Polytechnic Institute, Troy, NY, USA

More information

Almost giant clusters for percolation on large trees

Almost giant clusters for percolation on large trees for percolation on large trees Institut für Mathematik Universität Zürich Erdős-Rényi random graph model in supercritical regime G n = complete graph with n vertices Bond percolation with parameter p(n)

More information

arxiv:cond-mat/ v1 [cond-mat.dis-nn] 4 May 2000

arxiv:cond-mat/ v1 [cond-mat.dis-nn] 4 May 2000 Topology of evolving networks: local events and universality arxiv:cond-mat/0005085v1 [cond-mat.dis-nn] 4 May 2000 Réka Albert and Albert-László Barabási Department of Physics, University of Notre-Dame,

More information

The Beginning of Graph Theory. Theory and Applications of Complex Networks. Eulerian paths. Graph Theory. Class Three. College of the Atlantic

The Beginning of Graph Theory. Theory and Applications of Complex Networks. Eulerian paths. Graph Theory. Class Three. College of the Atlantic Theory and Applications of Complex Networs 1 Theory and Applications of Complex Networs 2 Theory and Applications of Complex Networs Class Three The Beginning of Graph Theory Leonhard Euler wonders, can

More information

ECS 253 / MAE 253, Lecture 15 May 17, I. Probability generating function recap

ECS 253 / MAE 253, Lecture 15 May 17, I. Probability generating function recap ECS 253 / MAE 253, Lecture 15 May 17, 2016 I. Probability generating function recap Part I. Ensemble approaches A. Master equations (Random graph evolution, cluster aggregation) B. Network configuration

More information

Self Similar (Scale Free, Power Law) Networks (I)

Self Similar (Scale Free, Power Law) Networks (I) Self Similar (Scale Free, Power Law) Networks (I) E6083: lecture 4 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA {predrag}@ee.columbia.edu February 7, 2007

More information

Network Biology: Understanding the cell s functional organization. Albert-László Barabási Zoltán N. Oltvai

Network Biology: Understanding the cell s functional organization. Albert-László Barabási Zoltán N. Oltvai Network Biology: Understanding the cell s functional organization Albert-László Barabási Zoltán N. Oltvai Outline: Evolutionary origin of scale-free networks Motifs, modules and hierarchical networks Network

More information

Network models: dynamical growth and small world

Network models: dynamical growth and small world Network models: dynamical growth and small world Leonid E. Zhukov School of Data Analysis and Artificial Intelligence Department of Computer Science National Research University Higher School of Economics

More information

Network models: random graphs

Network models: random graphs Network models: random graphs Leonid E. Zhukov School of Data Analysis and Artificial Intelligence Department of Computer Science National Research University Higher School of Economics Structural Analysis

More information

Complex networks: an introduction

Complex networks: an introduction Alain Barrat Complex networks: an introduction CPT, Marseille, France ISI, Turin, Italy http://www.cpt.univ-mrs.fr/~barrat http://cxnets.googlepages.com Plan of the lecture I. INTRODUCTION II. I. Networks:

More information

Mini course on Complex Networks

Mini course on Complex Networks Mini course on Complex Networks Massimo Ostilli 1 1 UFSC, Florianopolis, Brazil September 2017 Dep. de Fisica Organization of The Mini Course Day 1: Basic Topology of Equilibrium Networks Day 2: Percolation

More information

Cascading failure spreading on weighted heterogeneous networks

Cascading failure spreading on weighted heterogeneous networks Cascading failure spreading on weighted heterogeneous networks Zhi-Xi Wu, Gang Peng, Wen-Xu Wang, Sammy Chan, and Eric Wing-Ming Wong Department of Electronic Engineering, City University of Hong Kong,

More information

1 Complex Networks - A Brief Overview

1 Complex Networks - A Brief Overview Power-law Degree Distributions 1 Complex Networks - A Brief Overview Complex networks occur in many social, technological and scientific settings. Examples of complex networks include World Wide Web, Internet,

More information

Géza Ódor MTA-EK-MFA Budapest 16/01/2015 Rio de Janeiro

Géza Ódor MTA-EK-MFA Budapest 16/01/2015 Rio de Janeiro Griffiths phases, localization and burstyness in network models Géza Ódor MTA-EK-MFA Budapest 16/01/2015 Rio de Janeiro Partners: R. Juhász M. A. Munoz C. Castellano R. Pastor-Satorras Infocommunication

More information

Gutenberg-Richter Law for Internetquakes

Gutenberg-Richter Law for Internetquakes Gutenberg-Richter Law for Internetquakes Sumiyoshi Abe 1 and Norikazu Suzuki 2 1 Institute of Physics, University of Tsukuba, Ibaraki 305-8571, Japan 2 College of Science and Technology, Nihon University,

More information

Random Networks. Complex Networks CSYS/MATH 303, Spring, Prof. Peter Dodds

Random Networks. Complex Networks CSYS/MATH 303, Spring, Prof. Peter Dodds Complex Networks CSYS/MATH 303, Spring, 2011 Prof. Peter Dodds Department of Mathematics & Statistics Center for Complex Systems Vermont Advanced Computing Center University of Vermont Licensed under the

More information

Erdős-Renyi random graphs basics

Erdős-Renyi random graphs basics Erdős-Renyi random graphs basics Nathanaël Berestycki U.B.C. - class on percolation We take n vertices and a number p = p(n) with < p < 1. Let G(n, p(n)) be the graph such that there is an edge between

More information

Percolation in Complex Networks: Optimal Paths and Optimal Networks

Percolation in Complex Networks: Optimal Paths and Optimal Networks Percolation in Complex Networs: Optimal Paths and Optimal Networs Shlomo Havlin Bar-Ilan University Israel Complex Networs Networ is a structure of N nodes and 2M lins (or M edges) Called also graph in

More information

Lecture 06 01/31/ Proofs for emergence of giant component

Lecture 06 01/31/ Proofs for emergence of giant component M375T/M396C: Topics in Complex Networks Spring 2013 Lecture 06 01/31/13 Lecturer: Ravi Srinivasan Scribe: Tianran Geng 6.1 Proofs for emergence of giant component We now sketch the main ideas underlying

More information

The tail does not determine the size of the giant

The tail does not determine the size of the giant The tail does not determine the size of the giant arxiv:1710.01208v2 [math.pr] 20 Jun 2018 Maria Deijfen Sebastian Rosengren Pieter Trapman June 2018 Abstract The size of the giant component in the configuration

More information

Modeling, Analysis, and Control of Information Propagation in Multi-layer and Multiplex Networks. Osman Yağan

Modeling, Analysis, and Control of Information Propagation in Multi-layer and Multiplex Networks. Osman Yağan Modeling, Analysis, and Control of Information Propagation in Multi-layer and Multiplex Networks Osman Yağan Department of ECE Carnegie Mellon University Joint work with Y. Zhuang and V. Gligor (CMU) Alex

More information

Susceptible-Infective-Removed Epidemics and Erdős-Rényi random

Susceptible-Infective-Removed Epidemics and Erdős-Rényi random Susceptible-Infective-Removed Epidemics and Erdős-Rényi random graphs MSR-Inria Joint Centre October 13, 2015 SIR epidemics: the Reed-Frost model Individuals i [n] when infected, attempt to infect all

More information

KINETICS OF COMPLEX SOCIAL CONTAGION. János Kertész Central European University. Pohang, May 27, 2016

KINETICS OF COMPLEX SOCIAL CONTAGION. János Kertész Central European University. Pohang, May 27, 2016 KINETICS OF COMPLEX SOCIAL CONTAGION János Kertész Central European University Pohang, May 27, 2016 Theory: Zhongyuan Ruan, Gerardo Iniguez, Marton Karsai, JK: Kinetics of social contagion Phys. Rev. Lett.

More information

Geometric phase transitions: percolation

Geometric phase transitions: percolation Chapter 2 Geometric phase transitions: percolation 2013 by Alessandro Codello 2.1 Percolation Percolation models are the simplest systems that exhibit continuous phase transitions and universality. A percolating

More information

Exact solution of site and bond percolation. on small-world networks. Abstract

Exact solution of site and bond percolation. on small-world networks. Abstract Exact solution of site and bond percolation on small-world networks Cristopher Moore 1,2 and M. E. J. Newman 2 1 Departments of Computer Science and Physics, University of New Mexico, Albuquerque, New

More information

Bootstrap Percolation on Periodic Trees

Bootstrap Percolation on Periodic Trees Bootstrap Percolation on Periodic Trees Milan Bradonjić Iraj Saniee Abstract We study bootstrap percolation with the threshold parameter θ 2 and the initial probability p on infinite periodic trees that

More information

Analysis of Biological Networks: Network Robustness and Evolution

Analysis of Biological Networks: Network Robustness and Evolution Analysis of Biological Networks: Network Robustness and Evolution Lecturer: Roded Sharan Scribers: Sasha Medvedovsky and Eitan Hirsh Lecture 14, February 2, 2006 1 Introduction The chapter is divided into

More information

KINETICS OF SOCIAL CONTAGION. János Kertész Central European University. SNU, June

KINETICS OF SOCIAL CONTAGION. János Kertész Central European University. SNU, June KINETICS OF SOCIAL CONTAGION János Kertész Central European University SNU, June 1 2016 Theory: Zhongyuan Ruan, Gerardo Iniguez, Marton Karsai, JK: Kinetics of social contagion Phys. Rev. Lett. 115, 218702

More information

Self-organized Criticality in a Modified Evolution Model on Generalized Barabási Albert Scale-Free Networks

Self-organized Criticality in a Modified Evolution Model on Generalized Barabási Albert Scale-Free Networks Commun. Theor. Phys. (Beijing, China) 47 (2007) pp. 512 516 c International Academic Publishers Vol. 47, No. 3, March 15, 2007 Self-organized Criticality in a Modified Evolution Model on Generalized Barabási

More information

The Extreme Vulnerability of Network of Networks

The Extreme Vulnerability of Network of Networks The Extreme Vulnerability of Network of Networks Shlomo Havlin Protein networks, Brain networks Bar-Ilan University Physiological systems Infrastructures Israel Cascading disaster-sudden collapse.. Two

More information

Optimal Allocation of Interconnecting Links in Cyber-Physical Systems: Interdependence, Cascading Failures and Robustness

Optimal Allocation of Interconnecting Links in Cyber-Physical Systems: Interdependence, Cascading Failures and Robustness Optimal Allocation of Interconnecting Links in Cyber-Physical Systems: Interdependence, Cascading Failures and Robustness arxiv:2698v2 [physics.data-an] 3 Apr 202 Osman Yağan, Dajun Qian, Junshan Zhang,

More information

Avalanches, transport, and local equilibrium in self-organized criticality

Avalanches, transport, and local equilibrium in self-organized criticality PHYSICAL REVIEW E VOLUME 58, NUMBER 5 NOVEMBER 998 Avalanches, transport, and local equilibrium in self-organized criticality Afshin Montakhab and J. M. Carlson Department of Physics, University of California,

More information

networks in molecular biology Wolfgang Huber

networks in molecular biology Wolfgang Huber networks in molecular biology Wolfgang Huber networks in molecular biology Regulatory networks: components = gene products interactions = regulation of transcription, translation, phosphorylation... Metabolic

More information

Numerical evaluation of the upper critical dimension of percolation in scale-free networks

Numerical evaluation of the upper critical dimension of percolation in scale-free networks umerical evaluation of the upper critical dimension of percolation in scale-free networks Zhenhua Wu, 1 Cecilia Lagorio, 2 Lidia A. Braunstein, 1,2 Reuven Cohen, 3 Shlomo Havlin, 3 and H. Eugene Stanley

More information

Biological networks CS449 BIOINFORMATICS

Biological networks CS449 BIOINFORMATICS CS449 BIOINFORMATICS Biological networks Programming today is a race between software engineers striving to build bigger and better idiot-proof programs, and the Universe trying to produce bigger and better

More information

Networks: Lectures 9 & 10 Random graphs

Networks: Lectures 9 & 10 Random graphs Networks: Lectures 9 & 10 Random graphs Heather A Harrington Mathematical Institute University of Oxford HT 2017 What you re in for Week 1: Introduction and basic concepts Week 2: Small worlds Week 3:

More information

The architecture of complexity: the structure and dynamics of complex networks.

The architecture of complexity: the structure and dynamics of complex networks. SMR.1656-36 School and Workshop on Structure and Function of Complex Networks 16-28 May 2005 ------------------------------------------------------------------------------------------------------------------------

More information

The Power Law: Hallmark Of A Complex System

The Power Law: Hallmark Of A Complex System The Power Law: Hallmark Of A Complex System Or Playing With Data Can Be Dangerous For Your Mental Health Tom Love, Department of General Practice Wellington School of Medicine and Health Sciences University

More information

Random Networks. Complex Networks, CSYS/MATH 303, Spring, Prof. Peter Dodds

Random Networks. Complex Networks, CSYS/MATH 303, Spring, Prof. Peter Dodds Complex Networks, CSYS/MATH 303, Spring, 2010 Prof. Peter Dodds Department of Mathematics & Statistics Center for Complex Systems Vermont Advanced Computing Center University of Vermont Licensed under

More information

arxiv:cond-mat/ v2 6 Aug 2002

arxiv:cond-mat/ v2 6 Aug 2002 Percolation in Directed Scale-Free Networs N. Schwartz, R. Cohen, D. ben-avraham, A.-L. Barabási and S. Havlin Minerva Center and Department of Physics, Bar-Ilan University, Ramat-Gan, Israel Department

More information

Graph Theory and Networks in Biology arxiv:q-bio/ v1 [q-bio.mn] 6 Apr 2006

Graph Theory and Networks in Biology arxiv:q-bio/ v1 [q-bio.mn] 6 Apr 2006 Graph Theory and Networks in Biology arxiv:q-bio/0604006v1 [q-bio.mn] 6 Apr 2006 Oliver Mason and Mark Verwoerd February 4, 2008 Abstract In this paper, we present a survey of the use of graph theoretical

More information

The Sandpile Model on Random Apollonian Networks

The Sandpile Model on Random Apollonian Networks 1 The Sandpile Model on Random Apollonian Networks Massimo Stella Bak, Teng and Wiesenfel originally proposed a simple model of a system whose dynamics spontaneously drives, and then maintains it, at the

More information

Web Structure Mining Nodes, Links and Influence

Web Structure Mining Nodes, Links and Influence Web Structure Mining Nodes, Links and Influence 1 Outline 1. Importance of nodes 1. Centrality 2. Prestige 3. Page Rank 4. Hubs and Authority 5. Metrics comparison 2. Link analysis 3. Influence model 1.

More information

Theorem 1.7 [Bayes' Law]: Assume that,,, are mutually disjoint events in the sample space s.t.. Then Pr( )

Theorem 1.7 [Bayes' Law]: Assume that,,, are mutually disjoint events in the sample space s.t.. Then Pr( ) Theorem 1.7 [Bayes' Law]: Assume that,,, are mutually disjoint events in the sample space s.t.. Then Pr Pr = Pr Pr Pr() Pr Pr. We are given three coins and are told that two of the coins are fair and the

More information

14 Branching processes

14 Branching processes 4 BRANCHING PROCESSES 6 4 Branching processes In this chapter we will consider a rom model for population growth in the absence of spatial or any other resource constraints. So, consider a population of

More information

Complex-Network Modelling and Inference

Complex-Network Modelling and Inference Complex-Network Modelling and Inference Lecture 12: Random Graphs: preferential-attachment models Matthew Roughan http://www.maths.adelaide.edu.au/matthew.roughan/notes/

More information

Clusters and Percolation

Clusters and Percolation Chapter 6 Clusters and Percolation c 2012 by W. Klein, Harvey Gould, and Jan Tobochnik 5 November 2012 6.1 Introduction In this chapter we continue our investigation of nucleation near the spinodal. We

More information

EVOLUTION OF COMPLEX FOOD WEB STRUCTURE BASED ON MASS EXTINCTION

EVOLUTION OF COMPLEX FOOD WEB STRUCTURE BASED ON MASS EXTINCTION EVOLUTION OF COMPLEX FOOD WEB STRUCTURE BASED ON MASS EXTINCTION Kenichi Nakazato Nagoya University Graduate School of Human Informatics nakazato@create.human.nagoya-u.ac.jp Takaya Arita Nagoya University

More information

Implementing Per Bak s Sand Pile Model as a Two-Dimensional Cellular Automaton Leigh Tesfatsion 21 January 2009 Econ 308. Presentation Outline

Implementing Per Bak s Sand Pile Model as a Two-Dimensional Cellular Automaton Leigh Tesfatsion 21 January 2009 Econ 308. Presentation Outline Implementing Per Bak s Sand Pile Model as a Two-Dimensional Cellular Automaton Leigh Tesfatsion 21 January 2009 Econ 308 Presentation Outline Brief review: What is a Cellular Automaton? Sand piles and

More information

Growing a Network on a Given Substrate

Growing a Network on a Given Substrate Growing a Network on a Given Substrate 1 Babak Fotouhi and Michael G. Rabbat Department of Electrical and Computer Engineering McGill University, Montréal, Québec, Canada Email: babak.fotouhi@mail.mcgill.ca,

More information

The Spreading of Epidemics in Complex Networks

The Spreading of Epidemics in Complex Networks The Spreading of Epidemics in Complex Networks Xiangyu Song PHY 563 Term Paper, Department of Physics, UIUC May 8, 2017 Abstract The spreading of epidemics in complex networks has been extensively studied

More information

Criticality in Earthquakes. Good or bad for prediction?

Criticality in Earthquakes. Good or bad for prediction? http://www.pmmh.espci.fr/~oramos/ Osvanny Ramos. Main projects & collaborators Slow crack propagation Cracks patterns L. Vanel, S. Ciliberto, S. Santucci, J-C. Géminard, J. Mathiesen IPG Strasbourg, Nov.

More information

arxiv: v2 [physics.soc-ph] 15 Nov 2017

arxiv: v2 [physics.soc-ph] 15 Nov 2017 arxiv:1702.00239v2 [physics.soc-ph] 15 Nov 2017 Mean Field Analysis of Algorithms for Scale-free Networks in Molecular Biology S Konini and EJ Janse van Rensburg Department of Mathematics and Statistics,

More information

Spatial and Temporal Behaviors in a Modified Evolution Model Based on Small World Network

Spatial and Temporal Behaviors in a Modified Evolution Model Based on Small World Network Commun. Theor. Phys. (Beijing, China) 42 (2004) pp. 242 246 c International Academic Publishers Vol. 42, No. 2, August 15, 2004 Spatial and Temporal Behaviors in a Modified Evolution Model Based on Small

More information

Phase Transitions in Physics and Computer Science. Cristopher Moore University of New Mexico and the Santa Fe Institute

Phase Transitions in Physics and Computer Science. Cristopher Moore University of New Mexico and the Santa Fe Institute Phase Transitions in Physics and Computer Science Cristopher Moore University of New Mexico and the Santa Fe Institute Magnetism When cold enough, Iron will stay magnetized, and even magnetize spontaneously

More information

Spontaneous recovery in dynamical networks

Spontaneous recovery in dynamical networks Spontaneous recovery in dynamical networks A) Model: Additional Technical Details and Discussion Here we provide a more extensive discussion of the technical details of the model. The model is based on

More information

Assortativity and Mixing. Outline. Definition. General mixing. Definition. Assortativity by degree. Contagion. References. Contagion.

Assortativity and Mixing. Outline. Definition. General mixing. Definition. Assortativity by degree. Contagion. References. Contagion. Outline Complex Networks, Course 303A, Spring, 2009 Prof Peter Dodds Department of Mathematics & Statistics University of Vermont Licensed under the Creative Commons Attribution-NonCommercial-ShareAlike

More information

BOSTON UNIVERSITY GRADUATE SCHOOL OF ARTS AND SCIENCES. Dissertation TRANSPORT AND PERCOLATION IN COMPLEX NETWORKS GUANLIANG LI

BOSTON UNIVERSITY GRADUATE SCHOOL OF ARTS AND SCIENCES. Dissertation TRANSPORT AND PERCOLATION IN COMPLEX NETWORKS GUANLIANG LI BOSTON UNIVERSITY GRADUATE SCHOOL OF ARTS AND SCIENCES Dissertation TRANSPORT AND PERCOLATION IN COMPLEX NETWORKS by GUANLIANG LI B.S., University of Science and Technology of China, 2003 Submitted in

More information

MAE 298, Lecture 4 April 9, Exploring network robustness

MAE 298, Lecture 4 April 9, Exploring network robustness MAE 298, Lecture 4 April 9, 2006 Switzerland Germany Spain Italy Japan Netherlands Russian Federation Sweden UK USA Unknown Exploring network robustness What is a power law? (Also called a Pareto Distribution

More information

Final Exam: Probability Theory (ANSWERS)

Final Exam: Probability Theory (ANSWERS) Final Exam: Probability Theory ANSWERS) IST Austria February 015 10:00-1:30) Instructions: i) This is a closed book exam ii) You have to justify your answers Unjustified results even if correct will not

More information

arxiv:cond-mat/ v1 28 Feb 2005

arxiv:cond-mat/ v1 28 Feb 2005 How to calculate the main characteristics of random uncorrelated networks Agata Fronczak, Piotr Fronczak and Janusz A. Hołyst arxiv:cond-mat/0502663 v1 28 Feb 2005 Faculty of Physics and Center of Excellence

More information

Epidemic spreading is always possible on regular networks

Epidemic spreading is always possible on regular networks Epidemic spreading is always possible on regular networks Charo I. del Genio Warwick Mathematics Institute Centre for Complexity Science Warwick Infectious Disease Epidemiology Research (WIDER) Centre

More information

Scale-Free Networks. Outline. Redner & Krapivisky s model. Superlinear attachment kernels. References. References. Scale-Free Networks

Scale-Free Networks. Outline. Redner & Krapivisky s model. Superlinear attachment kernels. References. References. Scale-Free Networks Outline Complex, CSYS/MATH 303, Spring, 200 Prof. Peter Dodds Department of Mathematics & Statistics Center for Complex Systems Vermont Advanced Computing Center University of Vermont Licensed under the

More information

Nonlinear Dynamical Behavior in BS Evolution Model Based on Small-World Network Added with Nonlinear Preference

Nonlinear Dynamical Behavior in BS Evolution Model Based on Small-World Network Added with Nonlinear Preference Commun. Theor. Phys. (Beijing, China) 48 (2007) pp. 137 142 c International Academic Publishers Vol. 48, No. 1, July 15, 2007 Nonlinear Dynamical Behavior in BS Evolution Model Based on Small-World Network

More information

Attacks on Correlated Peer-to-Peer Networks: An Analytical Study

Attacks on Correlated Peer-to-Peer Networks: An Analytical Study The First International Workshop on Security in Computers, Networking and Communications Attacks on Correlated Peer-to-Peer Networks: An Analytical Study Animesh Srivastava Department of CSE IIT Kharagpur,

More information

arxiv: v1 [cond-mat.dis-nn] 23 Jan 2019

arxiv: v1 [cond-mat.dis-nn] 23 Jan 2019 Self-avoiding walks and connective constants in clustered scale-free networks Carlos P. Herrero Instituto de Ciencia de Materiales, Consejo Superior de Investigaciones Científicas (CSIC), Campus de Cantoblanco,

More information

Locating the Source of Diffusion in Large-Scale Networks

Locating the Source of Diffusion in Large-Scale Networks Locating the Source of Diffusion in Large-Scale Networks Supplemental Material Pedro C. Pinto, Patrick Thiran, Martin Vetterli Contents S1. Detailed Proof of Proposition 1..................................

More information

CS 224w: Problem Set 1

CS 224w: Problem Set 1 CS 224w: Problem Set 1 Tony Hyun Kim October 8, 213 1 Fighting Reticulovirus avarum 1.1 Set of nodes that will be infected We are assuming that once R. avarum infects a host, it always infects all of the

More information

Avalanches in Fractional Cascading

Avalanches in Fractional Cascading Avalanches in Fractional Cascading Angela Dai Advisor: Prof. Bernard Chazelle May 8, 2012 Abstract This paper studies the distribution of avalanches in fractional cascading, linking the behavior to studies

More information

Erzsébet Ravasz Advisor: Albert-László Barabási

Erzsébet Ravasz Advisor: Albert-László Barabási Hierarchical Networks Erzsébet Ravasz Advisor: Albert-László Barabási Introduction to networks How to model complex networks? Clustering and hierarchy Hierarchical organization of cellular metabolism The

More information

JIGSAW PERCOLATION ON ERDÖS-RÉNYI RANDOM GRAPHS

JIGSAW PERCOLATION ON ERDÖS-RÉNYI RANDOM GRAPHS JIGSAW PERCOLATION ON ERDÖS-RÉNYI RANDOM GRAPHS ERIK SLIVKEN Abstract. We extend the jigsaw percolation model to analyze graphs where both underlying people and puzzle graphs are Erdös-Rényi random graphs.

More information

Synchronization Transitions in Complex Networks

Synchronization Transitions in Complex Networks Synchronization Transitions in Complex Networks Y. Moreno 1,2,3 1 Institute for Biocomputation and Physics of Complex Systems (BIFI) University of Zaragoza, Zaragoza 50018, Spain 2 Department of Theoretical

More information

Why does attention to web articles fall with time?

Why does attention to web articles fall with time? Why does attention to web articles fall with time? M.V. Simkin and V.P. Roychowdhury Department of Electrical Engineering, University of California, Los Angeles, CA 90095-594 We analyze access statistics

More information

Random walks, Brownian motion, and percolation

Random walks, Brownian motion, and percolation Random walks, Brownian motion, and percolation Martin Barlow 1 Department of Mathematics, University of British Columbia PITP, St Johns College, January 14th, 2015 Two models in probability theory In this

More information

arxiv: v1 [nlin.cg] 23 Sep 2010

arxiv: v1 [nlin.cg] 23 Sep 2010 Complex networks derived from cellular automata Yoshihiko Kayama Department of Media and Information, BAIKA Women s University, 2-9-5, Shukuno-sho, Ibaraki-city, Osaka-pref., Japan arxiv:009.4509v [nlin.cg]

More information

A New Random Graph Model with Self-Optimizing Nodes: Connectivity and Diameter

A New Random Graph Model with Self-Optimizing Nodes: Connectivity and Diameter A New Random Graph Model with Self-Optimizing Nodes: Connectivity and Diameter Richard J. La and Maya Kabkab Abstract We introduce a new random graph model. In our model, n, n 2, vertices choose a subset

More information

CS 781 Lecture 9 March 10, 2011 Topics: Local Search and Optimization Metropolis Algorithm Greedy Optimization Hopfield Networks Max Cut Problem Nash

CS 781 Lecture 9 March 10, 2011 Topics: Local Search and Optimization Metropolis Algorithm Greedy Optimization Hopfield Networks Max Cut Problem Nash CS 781 Lecture 9 March 10, 2011 Topics: Local Search and Optimization Metropolis Algorithm Greedy Optimization Hopfield Networks Max Cut Problem Nash Equilibrium Price of Stability Coping With NP-Hardness

More information

Modeling of Growing Networks with Directional Attachment and Communities

Modeling of Growing Networks with Directional Attachment and Communities Modeling of Growing Networks with Directional Attachment and Communities Masahiro KIMURA, Kazumi SAITO, Naonori UEDA NTT Communication Science Laboratories 2-4 Hikaridai, Seika-cho, Kyoto 619-0237, Japan

More information

Cascading failures in interdependent systems under a flow redistribution model

Cascading failures in interdependent systems under a flow redistribution model Cascading failures in interdependent systems under a flow redistribution model Yingrui Zhuang, Alex Arenas, 2 and Osman Yağan, Department of ECE, Carnegie Mellon University, Pittsburgh, PA 523 USA 2 Departament

More information

5.3 METABOLIC NETWORKS 193. P (x i P a (x i )) (5.30) i=1

5.3 METABOLIC NETWORKS 193. P (x i P a (x i )) (5.30) i=1 5.3 METABOLIC NETWORKS 193 5.3 Metabolic Networks 5.4 Bayesian Networks Let G = (V, E) be a directed acyclic graph. We assume that the vertices i V (1 i n) represent for example genes and correspond to

More information

Lecture 11 October 11, Information Dissemination through Social Networks

Lecture 11 October 11, Information Dissemination through Social Networks CS 284r: Incentives and Information in Networks Fall 2013 Prof. Yaron Singer Lecture 11 October 11, 2013 Scribe: Michael Tingley, K. Nathaniel Tucker 1 Overview In today s lecture we will start the second

More information

Renormalization: An Attack on Critical Exponents

Renormalization: An Attack on Critical Exponents Renormalization: An Attack on Critical Exponents Zebediah Engberg March 15, 2010 1 Introduction Suppose L R d is a lattice with critical probability p c. Percolation on L is significantly differs depending

More information

Small-world structure of earthquake network

Small-world structure of earthquake network Small-world structure of earthquake network Sumiyoshi Abe 1 and Norikazu Suzuki 2 1 Institute of Physics, University of Tsukuba, Ibaraki 305-8571, Japan 2 College of Science and Technology, Nihon University,

More information

Hyperbolic metric spaces and their applications to large complex real world networks II

Hyperbolic metric spaces and their applications to large complex real world networks II Hyperbolic metric spaces Hyperbolic metric spaces and their applications to large complex real world networks II Gabriel H. Tucci Bell Laboratories Alcatel-Lucent May 17, 2010 Tucci Hyperbolic metric spaces

More information

Problems on Evolutionary dynamics

Problems on Evolutionary dynamics Problems on Evolutionary dynamics Doctoral Programme in Physics José A. Cuesta Lausanne, June 10 13, 2014 Replication 1. Consider the Galton-Watson process defined by the offspring distribution p 0 =

More information

CS224W: Social and Information Network Analysis

CS224W: Social and Information Network Analysis CS224W: Social and Information Network Analysis Reaction Paper Adithya Rao, Gautam Kumar Parai, Sandeep Sripada Keywords: Self-similar networks, fractality, scale invariance, modularity, Kronecker graphs.

More information

12. LOCAL SEARCH. gradient descent Metropolis algorithm Hopfield neural networks maximum cut Nash equilibria

12. LOCAL SEARCH. gradient descent Metropolis algorithm Hopfield neural networks maximum cut Nash equilibria 12. LOCAL SEARCH gradient descent Metropolis algorithm Hopfield neural networks maximum cut Nash equilibria Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison Wesley h ttp://www.cs.princeton.edu/~wayne/kleinberg-tardos

More information