Modeling Social Networks
|
|
- Cora Sharp
- 6 years ago
- Views:
Transcription
1 Distance-epenent Kronecker Graphs for 1 Moeling Social Networks Elizabeth Boine-Baron,* Member, IEEE, Babak Hassibi, Member, IEEE, an Aam Wierman, Member, IEEE Abstract This paper focuses on a generalization of stochastic Kronecker graphs, introucing a Kronecker-like operator an efining a family of generator matrices H epenent on istances between noes in a specifie graph embeing. We prove that any lattice-base network moel with sufficiently small istanceepenent connection probability will have a Poisson egree istribution an provie a general framework to prove searchability for such a network. Using this framework, we focus on a specific example of an expaning hypercube an iscuss the similarities an ifferences of such a moel with recently propose network moels base on a hien metric space. We also prove that a greey forwaring algorithm can fin very short paths of length O((log log n) 2 ) on the hypercube with n noes, emonstrating that istance-epenent Kronecker graphs can generate searchable network moels. EDICS: OTH-EMRG, SEN-APPL, SPC-APPL I. INTRODUCTION Beginning with the simple Erös-Rényi moel of ranom networks [1], network science has attempte to capture the key characteristics of complex networks such as power networks, the Internet, protein interaction networks, an social networks with a simple, mathematically tractable moel 1. Social networks in particular have generate much interest ue to the consistency of their characteristics. These networks ten E. Boine-Baron is with the Electrical Engineering Department at the California Institute of Technology, MC 16-9, 1200 E. California Boulevar, Pasaena, CA Phone: (214) Fax: (626) eaboine@caltech.eu B. Hassibi is with the Electrical Engineering Department at the California Institute of Technology, MC 16-9, 1200 E. California Boulevar, Pasaena, CA Phone: (626) Fax: (626) hassibi@caltech.eu A. Wierman is with the Computer Science Department at the California Institute of Technology, MC 05-16, 1200 E. California Boulevar, Pasaena, CA Phone: (626) Fax: (626) aamw@caltech.eu 1 A preliminary version of many of the results of this paper first appeare in [2]
2 2 to exhibit small iameter, high clustering, scale-free egree istributions, an perhaps most importantly, they are searchable by a local greey algorithm; see [], [4], an [5] for thorough surveys of this area. The Erös-Rényi ranom graph maintains a small iameter but fails to capture many of the other key properties [6], [1]. The combination of small iameter an high clustering is often calle the small-worl effect, an Watts an Strogatz (see section 2) generate much interest when they propose a moel that maintains these two characteristics simultaneously [7]. Several moels were then propose to explain the heavy-taile egree istributions an ensification of complex networks; these inclue the preferential attachment moel [8], the forest-fire moel [9], [10], Kronecker graphs [11], [12], an many others []. As emonstrate by Milgram s 1967 experiment using real people, iniviuals can iscover an use short paths using only local information [1]. Kleinberg focuses on this searchability characteristic in his lattice moel an proves searchability for a precise set of input parameters, but his moel lacks any heavy-taile istributions [14], [5], [15]. The Kronecker graphs escribe in [11], [12], an [16] are simple to generate, mathematically tractable, an have been shown to exhibit several important social network characteristics such as heavy-taile egree an eigen-istributions, high clustering, small iameter, an network ensification. However, Kronecker graphs are not searchable by a istribute greey algorithm [16]. In this paper, we exten the moel propose in [2], a generalization of stochastic Kronecker graphs that can generate searchable networks. Instea of using the traitional Kronecker operation, we introuce a new Kronecker-like operation an a family of generator matrices, H, both epenent upon the istance between two noes. This new generation metho yiels networks that have both a local (lattice-base) an global (istance-epenent) structure. This ual structure is what allows a greey algorithm to search the network using only local information. Aitionally, the networks generate have a high clustering (ue to the lattice structure) an a small iameter (ue to the aition of long-range links). As part of the analysis of this new moel, we provie a general framework for analyzing egree istributions an the performance of greey search algorithms on a general lattice-base network. We use this framework to stuy one example in etail: an expaning hypercube with istance-epenent long-range connections. We give an explicit escription of its egree istribution, the circumstances uner which it will be searchable by a local greey algorithm, an a lower boun on its iameter. We support our finings with simulations. This example is chosen because it mimics the efining feature of tree metrics an hyperbolic space exponentially expaning neighborhoos which are thought to be representative of both the Internet an social networks [17], [18], [19], [20]. Exponentially expaning neighborhoos lea to very small iameters (O(log log n as oppose to O(log n)) an we can show that,
3 as in [21], a local greey algorithm on the hypercube will fin ultra-short paths, O((log log n) 2 ). This paper is organize as follows. Section II escribes in etail our moel an its relation to the original Kronecker graph moel an other traitional moels. Section III explores the connection between a Kleinberg-like expaning hypercube example an the hien metric space moels propose in [17]. Section IV escribes a general analysis of egree istributions for lattice-base networks an gives a theorem showing that all such networks will have a Poisson egree istribution provie that P() is sufficiently small, an gives the relevant egree istribution for the expaning hypercube example. Section V gives a general framework for proving searchability of a lattice-base istance-epenent network moel an recovers the searchability result of [14] an finally proves that the expaning hypercube is in fact searchable. Section VI explores the iameter of the expaning hypercube example an Section VII conclues with propose future work. The appenices support the proof of searchability for the expaning hypercube example in Section V. II. DISTANCE-DEPENDENT KRONECKER GRAPHS In this section we escribe the original formulation of stochastic Kronecker graphs as well as our new istance -epenent extension of the moel. We then present a few examples illustrating how to generate existing network moels using the istance -epenent Kronecker graph. A. Stochastic Kronecker Graphs Stochastic Kronecker graphs are generate by recursively using a stanar matrix operation, the Kronecker prouct 2 [11]. Beginning with an initiator probability matrix P 1, with N 1 noes, where the entries p ij enote the probability that ege (i, j) is present, successively larger graphs P 2,...,P n are generate such that the k th graph P k has N k = N k 1 noes. The Kronecker prouct is use to generate each successive graph. Definition 2.1: The k th power of P 1 is efine as the matrix P k 1, such that: P1 k = P k = P 1 P 1...P }{{ 1 = P } k 1 P 1 k times For each entry p uv in P k, inclue an ege in the graph G between noes u an v with probability p uv. The resulting binary ranom matrix is the ajacency matrix of the generate graph. Kronecker graphs have many of the static properties of social networks, such as small iameter an a heavy-taile egree istribution, a heavy-taile eigenvalue istribution, an a heavy-taile eigenvector 2 For a escription of eterministic Kronecker graphs, see Leskovec et al, [11].
4 4 istribution [11]. In aition, they exhibit several temporal properties such as ensification an shrinking iameter. Using a simple 2x2 P 1, Leskovec emonstrate that he coul generate graphs matching the patterns of the various properties mentione above for several real-worl atasets [11]. However, as shown by Mahian an Xu, stochastic Kronecker graphs are not searchable by a istribute greey algorithm [16] they lack the necessary spatial structure that allows a local greey agent to fin a short path through the network. This is the motivation for the current paper. B. Distance-Depenent Kronecker Graphs In this section, we propose an extension to Kronecker graphs incorporating the spatial structure necessary to have searchability. We a to the framework of Kronecker graphs a notion of istance, which comes from the embeing of the graph, an exten the generator from a single matrix to a family of matrices, one for each istance, efining the likelihoo of a connection occurring between noes at a particular istance. We accomplish this with a new Kronecker-like operation. Specifically, whereas in the original formulation of Kronecker graphs one initiator matrix is iteratively Kronecker-multiplie with itself to prouce a new ajacency or probability matrix, we efine a istance -epenent Kronecker operator. Depening on the istance between two noes u an v, (u, v) Z, a ifferent matrix from a efine family will be selecte to be multiplie by that entry, as shown below. a 11 H (1,1) a 12 H (1,2)... a 1n H (1,n) a 21 H (2,1) a 22 H (2,2)... a 2n H (2,n) C = A H = a n1 H (n,1) a n2 H (n,2)... a nn H (n,n) where So, the k th Kronecker power is now H = {H i } i Z G k = G 1 H H }{{} k times In the Kronecker-like multiplication, the choice of H i from the family H, multiplying entry (u, v), is epenent upon the istance (u, v). Note that our (u, v) is not a true istance measure we can have negative istances. Further, (u, v) is not symmetric ((u, v) (v, u)) since we nee to maintain symmetry in the resulting matrix. Instea, (u, v) = (v, u) an H (u,v) = H (v,u).
5 5 This change to the Kronecker operation makes the moel more complicate, an we o give up some of the beneficial properties of Kronecker multiplication. Potentially, we coul have to efine a large number of matrices for H. However, for the moels we want to generate, there are actually only a few parameters to efine, as (i, j) an a simple function efines H i for i > 1. The unerlying reason for this simplicity is that the local lattice structure is usually specifie by H 0 an H 1, while the global, istance-epenent probability of connection can usually be specifie by an H i with a simple form. So, while we lose the benefits of true Kronecker multiplication, we gain generality an the ability to create many ifferent lattices an probability of long-range contacts. We note in passing that the generation of these lattice structures is not possible with the original formulation of the Kronecker graph moel. For example, it is impossible to generate the Watts-Strogatz moel with conventional Kronecker graphs. However, it can be one with the current generalization. This is illustrate in our examples below. Example 1: Original Kronecker Graph. The simplest example is that of the original Kronecker graph formulation. For this case, the istance can be arbitrary, an the family of matrices, H, is simply G 1, the same G 1 use in the original efinition. Thus, we efine G k = G 1 H H }{{} k times = G 1 G 1...G 1 }{{} k times Example 2: Watts-Strogatz Small-Worl Moel. The next example we consier, the Watts-Strogatz moel, consists of a ring of n noes, each connecte to their neighbors within istance k on the ring. The probability of a connection to any other noe on the ring is then P(u, v) = p [7]. To generate the unerlying ring structure with k = 1, start with an initiator matrix K 1, representing the graph in figure 1(a). Fig. 1. Generating the Watts-Strogatz Moel In orer to obtain the sequence of matrices representing the graphs in Figure 1, we efine a istance measure as the number of hops from one noe to another along the ring, where clockwise hops are
6 6 positive, an counter-clockwise hops are negative. Recall that the efinition of negative istance is require only to keep the matrix symmetric. The negative matrix is just the transpose of the matrix efine for the positive irection. After each operation, the istance between noes is still the number of hops along the ring, though the number of noes oubles each time. We then efine the following family of matrices, H: 1 1 p p 1 1 H 0 =,H 1 =,H i = i > p 1 1 Note that H i = H i. So, starting from the initiator matrix in Figure 1(a), we have the following progression of matrices: 1 1 p p G 1 =, p p H 0 1 H 1 p H 2 1 H 1 1 H 1 1 H 0 1 H 1 p H 2 G 2 = G 1 H = p H 2 1 H 1 1 H 0 1 H 1 1 H 1 p H 2 1 H 1 1 H p p p p p p p p p p p p p p p p p p p p = p p p p p p p p p p p p p p p p p p p p 1 1 Note that the W-S moel is not searchable by a greey agent; however, if P(u, v) = 1 (u,v), it becomes
7 7 searchable [14], [5]. It is possible to moel this P(u, v) by simply ajusting H i, i 1 as follows: i 2i+1 H 0 =, H i = i, i 1, i n 2, 1 1 H i = i 1 2i 1 2i 1 1 2i 1 1 2i 1 1 2i 1 2i, i 1, i = n 2 As in the previous examples, H i = H i. The ifferent efinition for the mile noe in the ring is ue to the fact that we nee the probability of a connection to reach a minimum at this point, an then start to rise again. With this new efinition of H i, i 1, we have the following progression of matrices: 1 1 1/ /2 G 1 =, 1/ / H 0 1 H 1 1/2 H 2 1 H 1 1 H 1 1 H 0 1 H 1 1/2 H 2 G 2 = G 1 H = 1/2 H 2 1 H 1 1 H 0 1 H 1 1 H 1 1/2 H 2 1 H 1 1 H /2 1/ 1/4 1/ 1/ /2 1/ 1/4 1/ 1/2 1/ /2 1/ 1/4 1/ 1/ 1/ /2 1/ 1/4 = 1/4 1/ 1/ /2 1/ 1/ 1/4 1/ 1/ /2 1/2 1/ 1/4 1/ 1/ /2 1/ 1/4 1/ 1/2 1 1 This example alreay illustrates that the generalize operator we have efine allows the generation of searchable networks, but we will provie another more realistic example in the next example.
8 8 Example : Kleinberg-like Moel. The final example we consier, Kleinberg s lattice moel, is particularly pertinent as it was shown to be searchable [14]. In the original formulation, local connections of noes are efine on a k-imensional lattice, an long-range links occur between two noes at istance with probability proportional to α. We focus on a Kleinberg-like moel here, where instea of a k-imensional lattice, we have an an expaning hypercube as our unerlying lattice. In this example, at any point, the graph is a hypercube with some extra long-range connections, an when it grows, it grows by oubling the number of noes an aing a imension to the hypercube. Note that we will have n noes arrange on a k = log n-imensional hypercube. This example is of particular interest ue to recent work suggesting that many networks have an unerlying hyperbolic or tree-metric structure [19], [18]. The expaning hypercube captures the key feature of these topologies, as the number of noes at istance grows exponentially in. This example is also very naturally represente using our istance -epenent Kronecker operation an a Hamming istance as our istance measure. Fig. 2. Example: the growth of an expaning hypercube To efine the expaning hypercube, we efine a graph G with n noes, numbere 1...n, where each noe is labele with its corresponing log n-length bit vector. We efine the istance between two noes as the Hamming istance between their labels. The family of matrices H is as follows: β i H 0 =,H i =,for all i β i 1 where β 1 = a normalizing constant, β i = P(i) P(i+1). The graph may or may not be searchable epening on ( P(i). To mimic Kleinberg s moel, we let P(i) = i α, so that β i = i α. i+1) Thus, for the sequence
9 9 of graphs shown in the figure above, we have the following sequence of matrices: β β 1 1 G 1 =, G 2 =, G = β β β 1 1 β 1 β 1 β 1β β 1 1 β 1 1 β 1β 2 β 1 1 β β 1 β 1β 2 1 β 1 β β 1β 2 β 1 β β 1 β 1 β 1β β 1 β 1 1 β 1β 2 β β 1 1 β 1 β 1β 2 1 β 1 1 β β 1β 2 β 1 β 1 1 β From the matrix, we can tell that in each step, 1 if (u, v) = 0, 1 P(u, v) = (u, v) α otherwise In the original k-imensional lattice, a istribute algorithm (as efine in Section V), can fin paths of length O(log n) only if α = k [14]; in the moifie case presente above, we will see in section V that we nee a ifferent probability of connection to fin short paths. III. CONNECTION TO HIDDEN HYPERBOLIC SPACE MODEL As mentione previously, the expaning hypercube moel in Example resembles moels propose in [17] an extene in [18], [21], an [22]. In [17], every noe in the network has a hien variable - their location in a hien metric space. The probability of a connection between two noes is base upon the istance between them in this hien space. The resulting egree istribution epens on the curvature of this hien space; if the space has negative curvature, the egree istribution will be scale-free with P(k) = k γ [2]. In the istance-epenent Kronecker graph escribe in this paper an [2], the probability of a connection is base on the istance between two noes in the given lattice, efine usually by H 0 an H 1 in the family of matrices H. As a result, the lattice, or metric space, is not really hien since neighbors are explicitly connecte in the lattice. It is important to note that both moels incorporate a istance-epenent probability of connection. As will be efine formally in Section V, a local greey search algorithm can take avantage of this embeing into a hien or physical space to forwar a message to a estination. If a given noe u has a message to forwar to a estination t, it can use its knowlege of the embeing to forwar the message to its neighbor closest to the estination in the embeing. It is not necessary that the embeing be physical, as shown in [18] an [21]; rather, what is necessary is that the the probability of a connection between two noes is epenent on the istance between them. In most social networks the abstract istance is a measure of social istance - the
10 10 likelihoo of two iniviuals being connecte epens on their memberships in various groups, among other factors. In aition, in the moels of [17], a hyperbolic space results in exponentially expaning neighborhoos aroun each noe. In the istance-epenent hypercube example, there are ( k ) noes at each istance, also resulting in exponentially expaning neighborhoos. However, the hien metric space moel necessarily inclues the notion of a core an periphery of the network, where high-egree noes form the core connecting many low-egree noes at the periphery [21]. In the hypercube example, all noes are homogeneous in expecte egree - there is no notion of a core. In [18], as noes are locate further from the origin in the hien hyperbolic space their expecte egree ecreases exponentially ( e βr ). When this is combine with the exponentially expaning neighborhoos ( e αr ), the result is a scale-free istribution with γ = 1 + α β. It is important to note that an exponential ecrease in expecte egree is not strictly necessary; to see this, let the number of noes at istance r from a reference origin in the hyperbolic space be Let the average egree of noes at istance r be so that Using we have n(r) = e αr (1) k(r) = r δ (2) r(k) = k 1 δ () n(k) n[r(k)] r (k) (4) n(k) e αk 1/δ k 1/δ 1 (5) which asymptotically behaves like a power law with γ = 1+1/δ. In the hypercube example, espite the exponential expansion of neighborhoos, the resulting egree istribution will always be Poisson as long as the probability of connection is sufficiently small, as shown in the next section. Nevertheless, the connection between this moel an those base on tree-metrics an hien metric spaces is important to note, as one key factor emerges: a istance-epenent relation is necessary for a greey algorithm to succee in fining shortest paths.
11 11 IV. DEGREE DISTRIBUTION In this section we escribe a general characteristic function-base analysis of egree istributions for lattice-base networks, an apply it to the expaning hypercube example in Section II. In general, any lattice-base network with a istance-epenent probability of connection will have a Poisson egree istribution, as long as the probability of a connection at a istance is sufficiently small. Formally, Theorem 4.1: The egree istribution of a general lattice-base network with a sufficiently small istance-epenent probability of connection P() an maximum istance max will have a Poisson egree istribution: P(ν = i) = e α α i i! where α = max an N() = number of noes at istance from a reference noe in the lattice. =1 P()N() (6) Proof: Let ν enote the egree of an arbitrary noe u in a general lattice-base network with n noes. Thus, ν = v 1 + v v n where 1 if link to noe i, v i = 0 otherwise. We efine the characteristic function of the egree istribution as E[e itν ] = E[e it(v1+v2+ +vn) ] = E[e itv1 ]E[e itv2 ]...E[e itvn ] (7) We can then group the expecta E[e itν max ] = (1 P() + P()e it ) N() (8) =1 max = =1 max =1 (1 P()(1 e it )) N() (9) e (1 eit )P()N() for sufficiently small P() (10) =e (1 eit max ) P()N() =1 (11) =e α(eit 1) (12) Expaning, we see that the characteristic function is E[e itν ] = e α ( 1 + αe it + (αeit ) 2 2! +... From such a representation of the characteristic function, we can clearly see the egree istribution as P(ν = i) = e α α i i! ) (1) (14)
12 12 We now turn to a specific lattice-base network, the hypercube istance-epenent Kronecker graph escribe in Example in Section II. In this example, N() = ( k ), an the maximum istance in the ] ) 1 network is k = log n. We use a particular P() = log k ln optimize for searchability, as etermine in Section V. [ (k 2 Theorem 4.2: The egree istribution of the expaning hypercube is given by the following Poisson istribution, P(ν = i) = e α α i i! where α.6919 n.470 log log n log n Proof: We use the same framework as in the proof of Theorem 4.1, an let e it = x for simplicity. In this case, the characteristic function becomes so that α = = (15) E[x ν ] = e (1 x) k =1 P()N() (16) k P()N() (17) =1 k =1 [( ) k 2 log k ln ] 1 ( ) k To calculate α, we use the entropy approximation ( k ) 2 kh( ) k, so that α 1 log k ln k =1 1 2 kh( k) (k 2 )H We can approximate the sum by using sale point integration. 2π g(y)e kf(y) y = k f (y 0 ) g(y 0)e kf(y0) ( k 2 ( 1 + O ) ( 1 k )) where y 0 is the sale point of the function f(y), i.e., the point at which f (y) = 0. We rewrite the sum S(k) in nats, leaving out the constants in front, [ ( S(k) = 1 )] k k H( k) (1 k)h 2 k k ek 1 k 2 an then we let y = k, S(y) = =1 1 1 k [ 1 ( ) ( y )] H(y) 1 2 y ek y H 1 y 2 (18) (19) (20) (21) (22)
13 1 so that, in the sale point approximation, g(y) = 1 y Mathematica, we fin 2 an f(y) = H(y) (1 y )H( y 1 2 y ). Using yieling, So, our α is now S(k) y 0 = f(y 0 ) = 2.4 g(y 0 ) = 0.26 f (y 0 ) = 2.2 2π 2.2k (2.4)e0.26k (2) 1 2π α log k ln 2.2k (2.4)e0.26k (24).6919 n0.470 log log n log n With the results of Theorem 4.1, we have a Poisson egree istribution with parameter α. (25) A. Expecte Degree From the characteristic function, we can also etermine the expecte egree. E[ν] = x E[xν ] (26) x=1 = x [e (1 x)α ] (27) x=1 = α (28) Thus, the expecte egree of the expaning hypercube example is is a growing function of n. B. Simulation of expaning hypercube example Simulating the expaning hypercube with the P() etermine in Section V yiels results that match well, within a constant, the analysis above. Figure below shows the comparison of the theoretical an simulate expecte egrees, while figure 4 shows an example histogram of the egree istribution, both theoretical an simulate, with n = The Poisson nature of the istribution is clearly visible, as is the growth of the expecte egree as a function of n.
14 14 Fig.. Expecte egree of expaning hypercube Fig. 4. Example histogram with n = 4096 V. PROVING SEARCHABILITY While the istance-epenent Kronecker graph moel is more complicate than the original Kronecker graph moel, it can capture several existing network moels, an it incorporates istance into the
15 15 probability of connection, allowing for several cases in which searchability can be proven. In this section, we first give a general framework within which a lattice-base network can be proven searchable an then procee to the specific cases of the Kleinberg moel [14] an the expaning hypercube moel of Example in Section II. A. General Searchability Theorem We efine a ecentralize algorithm A similar to [14]. In each step, the current message-holer u passes the message to a neighbor that is closest to the estination, t. Each noe only has knowlege of its aress on the lattice (given by its bit vector label), the aress of the estination, an the noes that have previously come into contact with the message. For the graph to be searchable, we nee to have that the istribute algorithm A is able to fin short paths through the network, which are usually O(D) where D is the iameter of the network. Let the current message holer be noe u an the estination noe t. We will say that the execution of a ecentralize search algorithm A is in phase j when 2 j < (u, t) 2 j+1, where (u, t) is the istance between noe u an noe t. Thus, the largest value of j in a general lattice-base network is j max = log max where max enotes the maximum geoesic in the network. For example, in a hypercube, the maximum geoesic is max = log n = k, so j max = log log n = log k. We efine N u,t () = {v : (v, t) 2 j, (u, v) = } an min N() = min u,t,(u,t)= N u,t (). Theorem 5.1: A ecentralize algorithm A will fin short paths, roughly O(D), when the probability of a connection is P(u, v) = [c min N() ] 1 where c log max. Proof: Suppose we are in phase j with current message holer noe u; we want to etermine the probability that the phase ens at this step. This is equivalent to the probability that the message enters a set of noes B j where B j = {v : (v, t) 2 j }. Pr(message enters B j ) =1 =1 1 v B j (1 P(u, v : v B j )) (29) (u,t)+2 j =(u,t) 2 j (1 P()) Nu,t() (u,t)+2 j =(u,t) 2 j (1 P()) min N() (0) (1)
16 16 Fig. 5. Relative positions of noes u,v, an t in phase j In any network moel, enforcing searchibility boils own to etermining this min N(), the minimum number of noes at a istance from a given noe u within a ball of noes centere aroun the estination, t, as illustrate in Figure 5. Once this min N() is foun, if we set the probability of a connection between two noes istance apart as in Theorem 5.1, with an appropriate constant, we will fin that each phase escribe above will en in approximately j max steps, an, as there are only j max such phases, our greey forwaring algorithm will fin be able to fin very short paths of length O(jmax). 2 Thus, we have Pr(message enters B j ) 1 (u,t)+2 j =(u,t) 2 j (1 P()) min N() 1 e (u,t)+2 j =(u,t) 2 j min N() P() (2) () =1 e 1 c 1 e 1 c 1 e 1 c (u,t)+2 j =(u,t) 2 j 1 (4) (u,t)+2 j ln (u,t) 2 j (5) ln 2j 2 j (6) =1 e 1 c (7) 1 c (8) where line () hols in the limit of large n (lim n (1 x/n) n = e x ), an line (8) comes from the power series expansion of e x. Let X j enote the total number of steps spent in phase j. Then, EX j = Pr[X j i] (9) i=1 ( 1 1 ) i 1 c i=1 (40)
17 17 Let X enote the total number of steps taken by the algorithm A. =c (41) an j=0 X = j max j=0 X j (42) j max EX = EX j (4) (1 + j max )(c ) (44) δ(log max ) 2, for a large enough δ. (45) With this framework, we can explore the searchability of any lattice-base network moel with istanceepenent connection probability. B. Searchability in original Kleinberg moel In the original Kleinberg two-imensional lattice [14], the number of noes at a istance from a reference noe is approximately 4, ignoring ege effects. The maximum istance between any two noes is O(n), so j max log n. Aitionally, the iameter of the graph is on the orer of log n. In general, min N() for a fixe j, resulting in the probability of connection optimize for searchability, P() = [α log(n) 2 ] 1. Using this P(), Pr(message enters B j ) 1 (u,t)+2 j =(u,t) 2 j (1 P()) min N() 1 e 1 α log n (u,t)+2 j (46) =(u,t) 2 j 1 (47) Therefore, an 1 e 1 α log n (48) 1 α log n (49) EX j α log n (50) log n EX = EX j (51) j=0 δ(log n) 2, for a large enough δ. (52)
18 18 C. Searchability in expaning hypercube example In the expaning hypercube example of Section II, each noe has log n neighbors from the lattice itself. With the aition of long-range links, we expect the iameter to be O(log log n), similar to [18]. Note that with this example, j max = log log n = log k an the number of noes at istance equals ( n ). Using Theorem 5.1, we can prove the following result: Theorem 5.2: A ecentralize algorithm A will fin paths of length O((log log n) 2 ) in the expaning hypercube example when β 0 =1, β 1 = [2 log k ln] 1, (5) β i = [( ) k 2i i i such that the probability of a connection is P(u, v) = [ (k 2 ] [( k 2(i+1) ) 1 (i + 1)] i 2 (54) i+1 1 if (u, v) = 0, 1 ) log k ln ] 1 if (u, v) = Proof: Using Theorem 5.1, all that remains is to fin min N() an to etermine the appropriate constants to use. Without loss of generality, we assume that the estination noe t is the all-zero noe (i.e., its label is the zero vector) so that we can write (u, t) = u. To etermine min N() in our case, since the istance measure is a Hamming istance, we must count the number of possible bit vectors that are at a specific istance from a noe u while still being within a certain istance of the estination. We prove that min N u,t () = ( k 2 ) in Appenix A. We then let c = log k ln for reasons that will be clear below. Using the same framework as in Theorem 5.1 we have that Pr(msg enters B j ) 1 u +2 j = u 2 j (1 P()) min N() 1 e 1 log k ln u +2 j (55) (56) = u 2 j 1 (57) Therefore, we have 1 e 1 log k (58) 1 log k (59) EX j log k (60)
19 19 an log k EX = EX j (61) j=0 δ(log k) 2, for a large enough δ. (62) Since the expecte number of steps in phase j is log k, an there are at most log k phases, the expecte amount of steps taken by the algorithm A is at most δ log 2 k. So, with this efinition of P(), the istribute algorithm provies searchabilty. D. Simulation of istribute search algorithm We simulate the local greey algorithm escribe above in MATLAB for 16 n 4096 with the probability istribution as in Theorem 5.2 an appropriate floor functions. We foun that the greey algorithm fins a path between two noes with an average length of a constant factor away from the iameter of the simulate network, where iameter is efine as the maximum geoesic in the network. Note that the two noes selecte for the simulation are actually the worst-case noes - the istance between them in the network is exactly the iameter. Figure 6 illustrates the results of the greey algorithm simulations. Fig. 6. Average path length foun by greey algorithm using local information
20 20 E. Path length with sub-optimal P() In this section we analyze the performance of the local greey search algorithm on the expaning hypercube when P() is not optimal, as in Theorem 5.2. For this example, let P() = [log k ( k ) ] 1, which is clearly not min N() from Lemma 8.1. We will show that this suboptimal P() also allows for searchability. Using the same framework as in Theorem 5.1, Pr(msg enters B j ) 1 1 e (u,t)+2 j =(u,t) 2 j (1 P()) min N() (u,t)+2 j =(u,t) 2 j P()min N() =1 e (u,t)+2 j P()( k 2 =(u,t) 2 j ) (6) (64) (65) 1 e 1 log k S(k,) (66) 1 e 1 log k min S(k,) (67) where S(k, ) = 2 j =2 j ( k 2 j 2 (k =2 j min ) 1 ( k 2 2 j 2 (k =2 j ) (68) 2 )H( ) kh( ) k 2 k (69) 2 )H( ) kh( ) k 2 k (70) 2 max (k 2 )H( ) kh( ) k 2 k. (71) Since the exponent is convex in, the maximum will be at either the upper or lower boun of the sum. For 0 j log k the lower boun ( = 2 j ) yiels the maximal exponent. So, Pr(msg enters B j ) 1 e 1 log k 2f(k,j) (72) where f(k, j) = (k 2j+1 2f(k,j) log k )H( 2j k 2j+1 (7) ) kh( 2j ). (74) k
21 21 Continuing with the proof of searchibility, we have EX j = Pr[X j i] (75) i=1 log k 2 f(k,j) (76) an log k EX = EX j (77) j=0 (1 + log k)log k 2 minj f(k,j) (78) δ(log k) 2, for a large enough δ (79) since f(k, j) is convex but its minimum occurs close to log k. As a result, even for suboptimal P(), a local greey algorithm can fin short paths. However, the bouns use in the analysis above are looser than those in previous sections, so the final expecte number of steps taken by A is not as tight. This analysis is supporte by simulation results as shown in the figure below. 6 Average iameter an path length of simulate Kron graphs with suboptimal P() Average iameter an path length, over 20 trials Simulate iameter Path length foun by ist alg n Fig. 7. Performance of greey algorithm when P() = [log k ( ) k ] 1 Finally, if P() = [ log k ( k ) ] 1, using the same sort of techniques as above we can show that EX δk(log k) 2 for a large enough δ. Note that in this case, the paths foun will be O(log n log log n), which are longer than before. Simulation results with this P() are shown in figure 8.
22 22 8 Average iameter an path length of simulate Kron graphs with suboptimal P() 7 Average iameter an path length, over 20 trials Simulate iameter Path length foun by ist alg n Fig. 8. Performance of greey algorithm when P() = [log k ( ) k ] 1 VI. BRIEF DIAMETER ANALYSIS OF HYPERCUBE In this section, we briefly iscuss the iameter of a general ranom graph. Fining the actual iameter, efine as either the maximum or the average geoesic in the network, can be very complicate. We iscuss a simple lower boun of the hypercube example here, which can be applie to any ranom graph. If we assume that the expecte egree of the hypercube example in Section II is polynomial in n, say n β, similar to what was foun in Section III for the expaning hypercube, we can lower boun the iameter as follows. We assume that at each step, every noe has neighbors an that it takes α steps to reach all n noes. Therefore, to reach all n noes in the network, we have α = n (80) (n β ) α = n (81) α = 1 β (82) Constant iameter (8) Thus, a simple lower boun for the iameter of a graph with polynomial expecte egree is some constant, 1 β. We can also work backwars, assuming a log log n iameter. In this case, we have α = n (84) log log n = n (85)
23 2 = n 1 log log n = e log n log log n (86) which is less than a polynomial in n, but still grows with n. Figure 9 compares the simulate iameter of the expaning hypercube example with the two lower bouns iscusse above. For 16 n 4096, both lower bouns appear to be a goo match. Fig. 9. Simulate an theoretical iameter of expaning hypercube VII. CONCLUSION We have presente a generalization of Kronecker graphs by efining a family of istance -epenent matrices an a new Kronecker-like operation. As a result, the network moel efines both local regular structures an global istance-epenent connections. Though the moel is more complicate than the original Kronecker graph moel, it is more general, as it can generate existing social network moels, an more importantly, networks that are searchable. These properties emerge naturally from the efinition of the embeing of the noes an the probability of connection within the family of matrices H. Any lattice-base network moel with istance-epenent connection probabilities can be analyze using the framework escribe in Sections IV, V, an VI for exploring egree istribution, iameter, an searchability. Most importantly, the searchability analysis shows how to make any network moel searchable by efining the appropriate probability of connection base upon N(). The particular expaning hypercube example explicitly escribe here shares characteristics with those base upon hien hyperbolic spaces [17], [18], though it has one major ifference - egree homogeneity across noes. Nevertheless, its
24 24 exponentially expaning neighborhoos an istance-epenent probability of connection make it a goo moel for social networks as people ten to exhibit strong homophily, i.e., associating with other people most like themselves. In aition, in contrast to Kleinberg s lattice-base moel [14], the searchability of the expaning hypercube is not too sensitive to the choice of P(). Though this paper gives a near complete escription of the characteristics of istance -epenent Kronecker graphs, there are many interesting questions that remain. These inclue how to parameterize the moel from real-worl ata sets, an how to incorporate network ynamics. Ieally, given any ata set, we woul like to be able to fin an appropriate family of istance-epenent matrices to match any esire characteristic of the ata set. Aitionally, while the current moel incorporates some measure of growth, growing from a small initiator matrix to a final nxn ajacency matrix, we woul like to better incorporate mobility into the moel so that it is not just a static escription of the network at one point in time. VIII. APPENDIX A - CALCULATING THE SIZE OF N u,t () In this appenix, we show a lower boun for N u,t (), the number of noes at istance from a given noe u, still within istance 2 j of the estination, t. Lemma 8.1: min N u,t () = ( k 2 ) Proof: We first count exactly the number of noes in N u,t (), the number of noes at a istance from a given noe u within a ball of noes centere aroun the estination, t, as illustrate in Figure. Without loss of generality, efine t as the all zero noe, t = (00...0). Arrange the label of u such that u = ( ). Define v = (v 11 v 10 v 01 v 00 ) accoring to this partition of u, so that v 11 an v 01 have 1 entries an v 10 an v 00 have 0 entries. Let x enote the weight, or number of ones, of the label of noe x. We know the following: We can solve in terms of v 11, yieling v 11 + v 10 + v 01 + v 00 = k (87) v 11 + v 10 = u (88) v 01 + v 10 = (89) v 11 + v 01 = v (90) v 00 =k v 11 (91) v 10 = u v 11 (92) v 01 = u + v 11 (9)
25 25 We also know that we must satisfy the following: From these bouns we have v 11, v 10, v 01, v 00 0 (94) 2 j < u 2 j+1 (95) u 2 j u + 2 j (96) v 2 j (97) max(0, u ) v 11 min( u, k, 1 2 (2j + u )) (98) Note that the secon an thir bouns o not affect v 11. Counting the number of noes in the ball, we have N u,t () = v u v 11=v l ( )( u k u v 11 u + v 11 where we have substitute v u an v l, for the upper an lower bouns above, respectively. We can now approximate the number of noes in N u,t (), using the entropy approximation for combinations. Let u = ak, = bk,2 j = ck, x = v 11. Using this notation, we have ( )( ) v u ak k(1 a) N u,t () = x k(1 b) + x x=v l v u 2 k(ah( x ak)+(1 a)h x=v l ( b a+ x k 1 a ) ) ) (99) (100) (101) 2 kx (102) where subject to ( x X = maxah + (1 a)h x ak) ( b a + x ) k 1 a (10) k max(0, a b) x k min(a,1 b, 1 (a b + c)) (104) 2 Note that line (101) is true as ( n k) = 2 n(h(p)+o(1)) when k pn. Note that the function X is concave in x, so unconstraine optimization yiels the two solutions below, each giving ifferent values of min N u,t () : x 1 = ak abk when c a + b(1 2a) yieling min N u,t () = ( ) k
26 26 yieling x 2 = 1 k(a b + c) when c < a + b(1 2a) 2 min N u,t () = ( ) k 2 The resulting min N u,t () are erive in Sections A an B below. As the secon solution yiels a smaller min N u,t (), we have an overall min N u,t () = ( k 2 ). A. Solution 1: c a + b(1 2a) In this region, the solution to the unconstraine problem, x 1 Substituting in for the size of N u,t (), we have N u,t () = 2 where line (108) is true in the limit of large k. ak abk k(ah( ak )+(1 a)h = ak abk gives us the maximal X. ( ) b a+ ak abk k ) 1 a (105) = 2 k(ah(1 b)+(1 a)h(b)) (106) = 2 kh(b) (107) ( ) k bk (108) ( ) k = (109) B. Solution 2: c < a + b(1 2a) In this region, we choose one of the bounary points, x 2 = 1 2k(a b + c), as the solution to the maximization problem. Substituting this solution for x in N u,t (), we obtain k(ah( ( ) a b+c a+b+c N u,t () = 2 2a )+(1 a)h 2(1 a) ) (110) This gives us a function of a, b, c, so we want to fin the worst case a, c that minimizes N u,t (). The new optimization problem is thus Note that the bouns for this region are: 1) a b c 0 2) a b + c 0 f(b) = min N u,t () (111) ( ) ( ) a b + c a + b + c = min + (1 a)h a,c 2a 2(1 a) (112)
27 27 ) c < a 2c 4) 0 c 1 2 5) 0 a, b 1 6) 0 2 a b c 7) 0 a + b c 8) 0 a + b c 2ab where 1) an 2) come from the bouns on (u, v), ) comes from the bouns on u, an 4) an 5) come from the ranges for j an the size of the network. Note that 1-5 are always true, not just in this region. 6),7), an 8) come from the fact that our solution x 2 is minimal in this region. Note that 8) implies 7). Computing the Hessian of the function in line (112) shows that it is concave in both a an b; the erivation is in Appenix B. Since our function is concave, the min N u,t () is foun from the bounary points of Region 2. Rearranging the bouns from before in terms of a we have: 1) a b + c 2) a b c ) a > c, a 2c 4) c > 0, c 1 2 5) 0 a, a 1 6) a 2 b c 7) a b + c 8) a c 1 2b b 1 2b when b 1 2 9) a c 1 2b b 1 2b when b > 1 2 Fig. 10. Bounaries of f(b) when b 1 2
28 28 When b 1 2, only bouns (1,2,,4) apply to f(b), yieling 5 points that we nee to examine, as shown in Figure 10. If b.115, then f(b) is minimal at point (1), ( b, 2b ), yieling ( b ) 2b k(1 min N u,t () = 2 )H 1 2b (11) ( ) k 2bk bk, for large k (114) ( ) k 2 = (115) If b < 0.115, then f(b) is minimal at point (5), (b, 2b), yieling min N u,t () = 2 k2b = 4 (116) When b > 1 2, only bouns (2,,4,an 8) apply to f(b), yieling 4 points that we nee to examine, as shown in Figure 11. Fig. 11. Bounaries of f(b) when b 1 2 For this region, f(b) is minimal at point (1), matching point (5) in the previous region, yieling ( b ) 2b k(1 min N u,t () = 2 )H 1 2b (117) ( ) k 2, for large k (118) Thus, when b < 0.115, we have min N u,t () = 4, an when b 0.115, we have min N u,t () = ). Finally, we have that when c < a + b(1 2a), we apply Solution 2 from Lemma 5.1, an we ( k 2 have min N u,t () = ( k 2 have again that min N u,t () = ( k 2 ) when Solution 2 is vali. Comparing the Solution 1 with Solution 2, we ).
29 29 IX. APPENDIX B - CONCAVITY OF f(a, b, c) FOR SOLUTION 2 ( ) ( ) Lemma 9.1: The function f(a, b, c) = ah a b+c 2a + (1 a)h a+b+c 2(1 a) is concave in both a an b. Proof: To prove that the function is concave in both a an b, we nee to see if the Hessian is negative efinite. Let ( a b + c f(a, b, c) = ah 2a Taking erivatives with respect to a, we fin an an f a = 1 2 ) + (1 a)h ( ) a + b + c 2(1 a) ( log c + a b log b + a c + log c a + b 2a 2a 2(1 a) + log 2 a b c 2(1 a) 2 f a 2 = (c b) 2 a(c + a b)(b + a c) + (1 c b) 2 (1 a)(c a + b)(2 a b c) = 1 ( 1 2 a b + c + 1 a + b c + 2 a + 1 a + b + c a b c + 2 ) 1 a From the bouns for this region, we can see that the function is concave in a. Taking erivatives with respect to c, we fin ) (119) (120) (121) (122) f c = 1 ( log (c + a b) + log (a + b c) log (c a + b) + log (2 a b c)) (12) 2 2 f c 2 = 1 ( 2 1 c + a b + 1 a + b c + 1 c a + b + ) 1 2 a b c From the bouns in this region, we can see that the function is concave in c. Taking erivatives with respect to both a an c, we fin 2 f c a = 1 ( 2 The Hessian H is 1 a b + c + 1 a + b c + 1 a + b + c + 2 a 2 2 a c 2 a c 2 c 2 ) 1 2 a b c (124) (125) We want to show that the Hessian is negative efinte, i.e, that H < 0. We have alreay shown that 2 a 2 < 0, so it remains to show that the secon leaing principal minor of H is positive efinite. This is just the eterminant of H et[h] = 2 2 ( ) 2 2 a 2 c 2 > 0 (126) a c
30 0 We rewrite the secon erivatives as where, from above, 2 a 2 =1 2 ( f 1 + f a + 2 ) 1 a (127) 2 c 2 =1 2 (f 1 + f 2 ) (128) 2 a c =1 2 (f 1 f 2 ) (129) f 1 = 1 a b + c a b c < 0 (10) f 2 = 1 a + b c + 1 a + b + c < 0 (11) So, our eterminant is now ( et[h] = f 1 + f a + 2 ) (f 1 + f 2 ) (f 1 f 2 ) 2 (12) 1 a = 1 4 (f 1 + f 2 ) ( 2 4 a + 2 ) (f 1 + f 2 ) 1 1 a 4 (f 1 f 2 ) 2 (1) =f 1 f 2 + (f 1 + f 2 ) (14) 2a(1 a) Simplifying, this is just et[h] = ( a b + c + 2ab) 2 (a b + c)( 2 + a + b + c)(a + b c)(a b c)a(a 1) (15) which, from our bouns, is postive. Since the eterminant of H is postive, an since 2 a 2 is negative, we can say that H is negative efinite, an the function is concave in both a an c. REFERENCES [1] P. Erős an A. Rényi, On ranom graphs, Publicationes Mathematicae 6, p , [2] E.Boine, B. Hassibi, an A. Weirman, Generalizing kronecker graphs in orer to moel searchable networks, in Proc. Forty-Seventh Annual Allerton Conference, [] M.E.J. Newman, The structure an function of complex networks, SIAM Review, 200. [4] R. Albert an A. Barabási, Statistical mechanics of complex networks, Reviews of Moern Physics, vol. 74, [5] J. Kleinberg, Complex networks an ecentralize search algorithms, in Proc. of International Conference of Mathematicians, [6] B. Bollobás, Ranom Graphs, Acaemic Press, Inc., [7] D.J. Watts an S.H. Strogatz, Collective ynamics of small-worl networks, Nature, vol. 9, pp. 440, [8] A. Barabási an R. Albert, Emergence of scaling in ranom networks, Science, vol. 286, pp , [9] J. Leskovec, J. Kleinberg, an C. Faloutsos, Graphs over time: ensification laws, shrinking iameters an possible explanations, in Proc. of ACM SIGKDD conf. on knowlege iscovery in ata mining, 2005, pp
31 1 [10] P. Bak, K. Chen, an C. Tang, A forest-fire moel an some thoughts on turbulence, Phys. Lett. A, vol. 147, pp , [11] J. Leskovec, D. Chakrabarti, J. Kleinberg, an C. Faloutsos, Realistic, mathematically tractable graph generation an evolution, using kronecker multiplication, in Conf. on Principles an Practice of Knowlege Discovery in Databases, [12] J. Leskovec, Dynamics of Large Networks, PhD in Computer Science, Carnegie Mellon University, [1] S. Migram, The small-worl problem, Psychology Toay, vol. 2, pp. 60, [14] J. Kleinberg, The small-worl phenomenon: An algorithmic perspective, in Proc. of the 2n ACM Symposium on Theory of Computing, 2000, pp [15] C. Martel an V. Nguyen, Analyzing Kleinberg s an other small-worl moels, in In PODC 04: Proc. of ACM symposium on Principles of istribute computing, 2004, pp [16] M. Mahian an Y. Xu, Stochastic kronecker graphs, in In WAW07: Proc. of Workshop On Algorithms An Moels For The Web-Graph, 2007, pp [17] M. Ángeles Serrano, D. Krioukov, an M. Boguñá, Self-similarity of complex networks an hien metric spaces, Physics Review Letters, vol. 100, [18] D. Krioukov, F. Papaopoulos, M. Boguñá, an A. Vahat, Greey forwaring in scale-free networks embee in hyperbolic metric spaces, in Proc. of MAMA Workshop at Sigmetrics, [19] A. Cvetkovski an M. Crovella, Hyperbolic embeing an routing for ynamic graphs, in Proc. of Infocom, [20] V. Ramasubramanian an D. Malkhi, On the treeness of internet latency an banwith, in Proc. of ACM Sigmetrics, 2009, pp [21] M. Boguñá an D. Krioukov, Navigating ultrasmall worls in ultrashort time, Physical Review Letters, vol. 102, pp , [22] M. Boguñá, D. Krioukov, an kc claffy, Navigability of complex networks, Nature Physics, vol. 5, pp , [2] D. Krioukov, F. Papaopoulos, A. Vahat, an M. Boguñá, Curvature an temperature of complex networks, Physical Review E, vol. 80, pp , 2009.
Generalizing Kronecker Graphs in order to Model Searchable Networks
Generalizing Kronecker Graphs in orer to Moel Searchable Networks Elizabeth Boine, Babak Hassibi, Aam Wierman California Institute of Technology Pasaena, CA 925 Email: {eaboine, hassibi, aamw}@caltecheu
More informationDistance-dependent Kronecker Graphs for Modeling Social Networks
Distance-epenent Kronecker Graphs for Moeling Social Networks Elizabeth Boine-Baron,* Member, IEEE, Babak Hassibi, Member, IEEE, an Aam Wierman, Member, IEEE Abstract This paper focuses on a generalization
More informationSurvey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013
Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing
More informationLecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012
CS-6 Theory Gems November 8, 0 Lecture Lecturer: Alesaner Mąry Scribes: Alhussein Fawzi, Dorina Thanou Introuction Toay, we will briefly iscuss an important technique in probability theory measure concentration
More informationDeterministic Decentralized Search in Random Graphs
Deterministic Decentralized Search in Random Graphs Esteban Arcaute 1,, Ning Chen 2,, Ravi Kumar 3, David Liben-Nowell 4,, Mohammad Mahdian 3, Hamid Nazerzadeh 1,, and Ying Xu 1, 1 Stanford University.
More informationMULTIFRACTAL NETWORK GENERATORS
MULTIFRACTAL NETWORK GENERATORS AUSTIN R. BENSON, CARLOS RIQUELME, SVEN P. SCHMIT (0) Abstract. Generating ranom graphs to moel networks has a rich history. In this paper, we explore a recent generative
More informationMath 1B, lecture 8: Integration by parts
Math B, lecture 8: Integration by parts Nathan Pflueger 23 September 2 Introuction Integration by parts, similarly to integration by substitution, reverses a well-known technique of ifferentiation an explores
More informationTime-of-Arrival Estimation in Non-Line-Of-Sight Environments
2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor
More informationLower Bounds for the Smoothed Number of Pareto optimal Solutions
Lower Bouns for the Smoothe Number of Pareto optimal Solutions Tobias Brunsch an Heiko Röglin Department of Computer Science, University of Bonn, Germany brunsch@cs.uni-bonn.e, heiko@roeglin.org Abstract.
More informationMake graph of g by adding c to the y-values. on the graph of f by c. multiplying the y-values. even-degree polynomial. graph goes up on both sides
Reference 1: Transformations of Graphs an En Behavior of Polynomial Graphs Transformations of graphs aitive constant constant on the outsie g(x) = + c Make graph of g by aing c to the y-values on the graph
More informationLower bounds on Locality Sensitive Hashing
Lower bouns on Locality Sensitive Hashing Rajeev Motwani Assaf Naor Rina Panigrahy Abstract Given a metric space (X, X ), c 1, r > 0, an p, q [0, 1], a istribution over mappings H : X N is calle a (r,
More informationDiophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations
Diophantine Approximations: Examining the Farey Process an its Metho on Proucing Best Approximations Kelly Bowen Introuction When a person hears the phrase irrational number, one oes not think of anything
More information19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control
19 Eigenvalues, Eigenvectors, Orinary Differential Equations, an Control This section introuces eigenvalues an eigenvectors of a matrix, an iscusses the role of the eigenvalues in etermining the behavior
More information'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21
Large amping in a structural material may be either esirable or unesirable, epening on the engineering application at han. For example, amping is a esirable property to the esigner concerne with limiting
More informationu!i = a T u = 0. Then S satisfies
Deterministic Conitions for Subspace Ientifiability from Incomplete Sampling Daniel L Pimentel-Alarcón, Nigel Boston, Robert D Nowak University of Wisconsin-Maison Abstract Consier an r-imensional subspace
More informationProof of SPNs as Mixture of Trees
A Proof of SPNs as Mixture of Trees Theorem 1. If T is an inuce SPN from a complete an ecomposable SPN S, then T is a tree that is complete an ecomposable. Proof. Argue by contraiction that T is not a
More informationLinear First-Order Equations
5 Linear First-Orer Equations Linear first-orer ifferential equations make up another important class of ifferential equations that commonly arise in applications an are relatively easy to solve (in theory)
More informationLATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION
The Annals of Statistics 1997, Vol. 25, No. 6, 2313 2327 LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION By Eva Riccomagno, 1 Rainer Schwabe 2 an Henry P. Wynn 1 University of Warwick, Technische
More informationCalculus and optimization
Calculus an optimization These notes essentially correspon to mathematical appenix 2 in the text. 1 Functions of a single variable Now that we have e ne functions we turn our attention to calculus. A function
More informationCapacity Analysis of MIMO Systems with Unknown Channel State Information
Capacity Analysis of MIMO Systems with Unknown Channel State Information Jun Zheng an Bhaskar D. Rao Dept. of Electrical an Computer Engineering University of California at San Diego e-mail: juzheng@ucs.eu,
More informationStopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Codes
Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Coes Kaiann Fu an Achilleas Anastasopoulos Electrical Engineering an Computer Science Dept. University of Michigan, Ann Arbor, MI
More informationGeneralization of the persistent random walk to dimensions greater than 1
PHYSICAL REVIEW E VOLUME 58, NUMBER 6 DECEMBER 1998 Generalization of the persistent ranom walk to imensions greater than 1 Marián Boguñá, Josep M. Porrà, an Jaume Masoliver Departament e Física Fonamental,
More informationA Weak First Digit Law for a Class of Sequences
International Mathematical Forum, Vol. 11, 2016, no. 15, 67-702 HIKARI Lt, www.m-hikari.com http://x.oi.org/10.1288/imf.2016.6562 A Weak First Digit Law for a Class of Sequences M. A. Nyblom School of
More informationIntegration Review. May 11, 2013
Integration Review May 11, 2013 Goals: Review the funamental theorem of calculus. Review u-substitution. Review integration by parts. Do lots of integration eamples. 1 Funamental Theorem of Calculus In
More informationIntroduction to the Vlasov-Poisson system
Introuction to the Vlasov-Poisson system Simone Calogero 1 The Vlasov equation Consier a particle with mass m > 0. Let x(t) R 3 enote the position of the particle at time t R an v(t) = ẋ(t) = x(t)/t its
More informationLeaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes
Leaving Ranomness to Nature: -Dimensional Prouct Coes through the lens of Generalize-LDPC coes Tavor Baharav, Kannan Ramchanran Dept. of Electrical Engineering an Computer Sciences, U.C. Berkeley {tavorb,
More informationInfluence of weight initialization on multilayer perceptron performance
Influence of weight initialization on multilayer perceptron performance M. Karouia (1,2) T. Denœux (1) R. Lengellé (1) (1) Université e Compiègne U.R.A. CNRS 817 Heuiasyc BP 649 - F-66 Compiègne ceex -
More information. Using a multinomial model gives us the following equation for P d. , with respect to same length term sequences.
S 63 Lecture 8 2/2/26 Lecturer Lillian Lee Scribes Peter Babinski, Davi Lin Basic Language Moeling Approach I. Special ase of LM-base Approach a. Recap of Formulas an Terms b. Fixing θ? c. About that Multinomial
More informationNOTES ON EULER-BOOLE SUMMATION (1) f (l 1) (n) f (l 1) (m) + ( 1)k 1 k! B k (y) f (k) (y) dy,
NOTES ON EULER-BOOLE SUMMATION JONATHAN M BORWEIN, NEIL J CALKIN, AND DANTE MANNA Abstract We stuy a connection between Euler-MacLaurin Summation an Boole Summation suggeste in an AMM note from 196, which
More informationLecture 2 Lagrangian formulation of classical mechanics Mechanics
Lecture Lagrangian formulation of classical mechanics 70.00 Mechanics Principle of stationary action MATH-GA To specify a motion uniquely in classical mechanics, it suffices to give, at some time t 0,
More informationThe derivative of a function f(x) is another function, defined in terms of a limiting expression: f(x + δx) f(x)
Y. D. Chong (2016) MH2801: Complex Methos for the Sciences 1. Derivatives The erivative of a function f(x) is another function, efine in terms of a limiting expression: f (x) f (x) lim x δx 0 f(x + δx)
More informationCalculus of Variations
16.323 Lecture 5 Calculus of Variations Calculus of Variations Most books cover this material well, but Kirk Chapter 4 oes a particularly nice job. x(t) x* x*+ αδx (1) x*- αδx (1) αδx (1) αδx (1) t f t
More informationLeast-Squares Regression on Sparse Spaces
Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction
More informationMath Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors
Math 18.02 Notes on ifferentials, the Chain Rule, graients, irectional erivative, an normal vectors Tangent plane an linear approximation We efine the partial erivatives of f( xy, ) as follows: f f( x+
More informationinflow outflow Part I. Regular tasks for MAE598/494 Task 1
MAE 494/598, Fall 2016 Project #1 (Regular tasks = 20 points) Har copy of report is ue at the start of class on the ue ate. The rules on collaboration will be release separately. Please always follow the
More information7.1 Support Vector Machine
67577 Intro. to Machine Learning Fall semester, 006/7 Lecture 7: Support Vector Machines an Kernel Functions II Lecturer: Amnon Shashua Scribe: Amnon Shashua 7. Support Vector Machine We return now to
More informationAcute sets in Euclidean spaces
Acute sets in Eucliean spaces Viktor Harangi April, 011 Abstract A finite set H in R is calle an acute set if any angle etermine by three points of H is acute. We examine the maximal carinality α() of
More informationRobust Forward Algorithms via PAC-Bayes and Laplace Distributions. ω Q. Pr (y(ω x) < 0) = Pr A k
A Proof of Lemma 2 B Proof of Lemma 3 Proof: Since the support of LL istributions is R, two such istributions are equivalent absolutely continuous with respect to each other an the ivergence is well-efine
More informationarxiv: v4 [cs.ds] 7 Mar 2014
Analysis of Agglomerative Clustering Marcel R. Ackermann Johannes Blömer Daniel Kuntze Christian Sohler arxiv:101.697v [cs.ds] 7 Mar 01 Abstract The iameter k-clustering problem is the problem of partitioning
More informationLectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs
Lectures - Week 10 Introuction to Orinary Differential Equations (ODES) First Orer Linear ODEs When stuying ODEs we are consiering functions of one inepenent variable, e.g., f(x), where x is the inepenent
More informationA Sketch of Menshikov s Theorem
A Sketch of Menshikov s Theorem Thomas Bao March 14, 2010 Abstract Let Λ be an infinite, locally finite oriente multi-graph with C Λ finite an strongly connecte, an let p
More informationLecture 10: Logistic growth models #2
Lecture 1: Logistic growth moels #2 Fugo Takasu Dept. Information an Computer Sciences Nara Women s University takasu@ics.nara-wu.ac.jp 6 July 29 1 Analysis of the stochastic process of logistic growth
More informationθ x = f ( x,t) could be written as
9. Higher orer PDEs as systems of first-orer PDEs. Hyperbolic systems. For PDEs, as for ODEs, we may reuce the orer by efining new epenent variables. For example, in the case of the wave equation, (1)
More informationarxiv: v2 [math.st] 29 Oct 2015
EXPONENTIAL RANDOM SIMPLICIAL COMPLEXES KONSTANTIN ZUEV, OR EISENBERG, AND DMITRI KRIOUKOV arxiv:1502.05032v2 [math.st] 29 Oct 2015 Abstract. Exponential ranom graph moels have attracte significant research
More informationLecture 6: Calculus. In Song Kim. September 7, 2011
Lecture 6: Calculus In Song Kim September 7, 20 Introuction to Differential Calculus In our previous lecture we came up with several ways to analyze functions. We saw previously that the slope of a linear
More informationParameter estimation: A new approach to weighting a priori information
Parameter estimation: A new approach to weighting a priori information J.L. Mea Department of Mathematics, Boise State University, Boise, ID 83725-555 E-mail: jmea@boisestate.eu Abstract. We propose a
More informationTable of Common Derivatives By David Abraham
Prouct an Quotient Rules: Table of Common Derivatives By Davi Abraham [ f ( g( ] = [ f ( ] g( + f ( [ g( ] f ( = g( [ f ( ] g( g( f ( [ g( ] Trigonometric Functions: sin( = cos( cos( = sin( tan( = sec
More informationCalculus Class Notes for the Combined Calculus and Physics Course Semester I
Calculus Class Notes for the Combine Calculus an Physics Course Semester I Kelly Black December 14, 2001 Support provie by the National Science Founation - NSF-DUE-9752485 1 Section 0 2 Contents 1 Average
More informationensembles When working with density operators, we can use this connection to define a generalized Bloch vector: v x Tr x, v y Tr y
Ph195a lecture notes, 1/3/01 Density operators for spin- 1 ensembles So far in our iscussion of spin- 1 systems, we have restricte our attention to the case of pure states an Hamiltonian evolution. Toay
More informationThe Principle of Least Action
Chapter 7. The Principle of Least Action 7.1 Force Methos vs. Energy Methos We have so far stuie two istinct ways of analyzing physics problems: force methos, basically consisting of the application of
More informationOptimal Variable-Structure Control Tracking of Spacecraft Maneuvers
Optimal Variable-Structure Control racking of Spacecraft Maneuvers John L. Crassiis 1 Srinivas R. Vaali F. Lanis Markley 3 Introuction In recent years, much effort has been evote to the close-loop esign
More informationThe total derivative. Chapter Lagrangian and Eulerian approaches
Chapter 5 The total erivative 51 Lagrangian an Eulerian approaches The representation of a flui through scalar or vector fiels means that each physical quantity uner consieration is escribe as a function
More informationPerfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs
Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Ashish Goel Michael Kapralov Sanjeev Khanna Abstract We consier the well-stuie problem of fining a perfect matching in -regular bipartite
More informationAPPPHYS 217 Thursday 8 April 2010
APPPHYS 7 Thursay 8 April A&M example 6: The ouble integrator Consier the motion of a point particle in D with the applie force as a control input This is simply Newton s equation F ma with F u : t q q
More informationu t v t v t c a u t b a v t u t v t b a
Nonlinear Dynamical Systems In orer to iscuss nonlinear ynamical systems, we must first consier linear ynamical systems. Linear ynamical systems are just systems of linear equations like we have been stuying
More informationarxiv: v1 [math.co] 29 May 2009
arxiv:0905.4913v1 [math.co] 29 May 2009 simple Havel-Hakimi type algorithm to realize graphical egree sequences of irecte graphs Péter L. Erős an István Miklós. Rényi Institute of Mathematics, Hungarian
More informationLecture 5. Symmetric Shearer s Lemma
Stanfor University Spring 208 Math 233: Non-constructive methos in combinatorics Instructor: Jan Vonrák Lecture ate: January 23, 208 Original scribe: Erik Bates Lecture 5 Symmetric Shearer s Lemma Here
More informationarxiv: v4 [math.pr] 27 Jul 2016
The Asymptotic Distribution of the Determinant of a Ranom Correlation Matrix arxiv:309768v4 mathpr] 7 Jul 06 AM Hanea a, & GF Nane b a Centre of xcellence for Biosecurity Risk Analysis, University of Melbourne,
More informationAgmon Kolmogorov Inequalities on l 2 (Z d )
Journal of Mathematics Research; Vol. 6, No. ; 04 ISSN 96-9795 E-ISSN 96-9809 Publishe by Canaian Center of Science an Eucation Agmon Kolmogorov Inequalities on l (Z ) Arman Sahovic Mathematics Department,
More informationStable and compact finite difference schemes
Center for Turbulence Research Annual Research Briefs 2006 2 Stable an compact finite ifference schemes By K. Mattsson, M. Svär AND M. Shoeybi. Motivation an objectives Compact secon erivatives have long
More informationA new proof of the sharpness of the phase transition for Bernoulli percolation on Z d
A new proof of the sharpness of the phase transition for Bernoulli percolation on Z Hugo Duminil-Copin an Vincent Tassion October 8, 205 Abstract We provie a new proof of the sharpness of the phase transition
More informationAsymptotic determination of edge-bandwidth of multidimensional grids and Hamming graphs
Asymptotic etermination of ege-banwith of multiimensional gris an Hamming graphs Reza Akhtar Tao Jiang Zevi Miller. Revise on May 7, 007 Abstract The ege-banwith B (G) of a graph G is the banwith of the
More informationOn combinatorial approaches to compressed sensing
On combinatorial approaches to compresse sensing Abolreza Abolhosseini Moghaam an Hayer Raha Department of Electrical an Computer Engineering, Michigan State University, East Lansing, MI, U.S. Emails:{abolhos,raha}@msu.eu
More informationDiagonalization of Matrices Dr. E. Jacobs
Diagonalization of Matrices Dr. E. Jacobs One of the very interesting lessons in this course is how certain algebraic techniques can be use to solve ifferential equations. The purpose of these notes is
More informationALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS
ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS MARK SCHACHNER Abstract. When consiere as an algebraic space, the set of arithmetic functions equippe with the operations of pointwise aition an
More informationEVALUATING HIGHER DERIVATIVE TENSORS BY FORWARD PROPAGATION OF UNIVARIATE TAYLOR SERIES
MATHEMATICS OF COMPUTATION Volume 69, Number 231, Pages 1117 1130 S 0025-5718(00)01120-0 Article electronically publishe on February 17, 2000 EVALUATING HIGHER DERIVATIVE TENSORS BY FORWARD PROPAGATION
More informationThroughput Optimal Control of Cooperative Relay Networks
hroughput Optimal Control of Cooperative Relay Networks Emun Yeh Dept. of Electrical Engineering Yale University New Haven, C 06520, USA E-mail: emun.yeh@yale.eu Ranall Berry Dept. of Electrical an Computer
More informationPerformance of Opportunistic Epidemic Routing on Edge-Markovian Dynamic Graphs
IEEE TRANSACTIONS ON COMMUNICATIONS, TCOM-9-63 Performance of Opportunistic Epiemic Routing on Ege-Markovian Dynamic Graphs John Whitbeck, Vania Conan, an Marcelo Dias e Amorim arxiv:99.29v3 [cs.ni] 25
More informationarxiv: v1 [hep-lat] 19 Nov 2013
HU-EP-13/69 SFB/CPP-13-98 DESY 13-225 Applicability of Quasi-Monte Carlo for lattice systems arxiv:1311.4726v1 [hep-lat] 19 ov 2013, a,b Tobias Hartung, c Karl Jansen, b Hernan Leovey, Anreas Griewank
More informationELEC3114 Control Systems 1
ELEC34 Control Systems Linear Systems - Moelling - Some Issues Session 2, 2007 Introuction Linear systems may be represente in a number of ifferent ways. Figure shows the relationship between various representations.
More informationComputing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions
Working Paper 2013:5 Department of Statistics Computing Exact Confience Coefficients of Simultaneous Confience Intervals for Multinomial Proportions an their Functions Shaobo Jin Working Paper 2013:5
More informationTransmission Line Matrix (TLM) network analogues of reversible trapping processes Part B: scaling and consistency
Transmission Line Matrix (TLM network analogues of reversible trapping processes Part B: scaling an consistency Donar e Cogan * ANC Eucation, 308-310.A. De Mel Mawatha, Colombo 3, Sri Lanka * onarecogan@gmail.com
More informationBalancing Expected and Worst-Case Utility in Contracting Models with Asymmetric Information and Pooling
Balancing Expecte an Worst-Case Utility in Contracting Moels with Asymmetric Information an Pooling R.B.O. erkkamp & W. van en Heuvel & A.P.M. Wagelmans Econometric Institute Report EI2018-01 9th January
More informationThe Exact Form and General Integrating Factors
7 The Exact Form an General Integrating Factors In the previous chapters, we ve seen how separable an linear ifferential equations can be solve using methos for converting them to forms that can be easily
More informationA PAC-Bayesian Approach to Spectrally-Normalized Margin Bounds for Neural Networks
A PAC-Bayesian Approach to Spectrally-Normalize Margin Bouns for Neural Networks Behnam Neyshabur, Srinah Bhojanapalli, Davi McAllester, Nathan Srebro Toyota Technological Institute at Chicago {bneyshabur,
More informationDEGREE DISTRIBUTION OF SHORTEST PATH TREES AND BIAS OF NETWORK SAMPLING ALGORITHMS
DEGREE DISTRIBUTION OF SHORTEST PATH TREES AND BIAS OF NETWORK SAMPLING ALGORITHMS SHANKAR BHAMIDI 1, JESSE GOODMAN 2, REMCO VAN DER HOFSTAD 3, AND JÚLIA KOMJÁTHY3 Abstract. In this article, we explicitly
More informationAssignment 1. g i (x 1,..., x n ) dx i = 0. i=1
Assignment 1 Golstein 1.4 The equations of motion for the rolling isk are special cases of general linear ifferential equations of constraint of the form g i (x 1,..., x n x i = 0. i=1 A constraint conition
More informationHyperbolic Moment Equations Using Quadrature-Based Projection Methods
Hyperbolic Moment Equations Using Quarature-Base Projection Methos J. Koellermeier an M. Torrilhon Department of Mathematics, RWTH Aachen University, Aachen, Germany Abstract. Kinetic equations like the
More informationSwitching Time Optimization in Discretized Hybrid Dynamical Systems
Switching Time Optimization in Discretize Hybri Dynamical Systems Kathrin Flaßkamp, To Murphey, an Sina Ober-Blöbaum Abstract Switching time optimization (STO) arises in systems that have a finite set
More informationLower Bounds for Local Monotonicity Reconstruction from Transitive-Closure Spanners
Lower Bouns for Local Monotonicity Reconstruction from Transitive-Closure Spanners Arnab Bhattacharyya Elena Grigorescu Mahav Jha Kyomin Jung Sofya Raskhonikova Davi P. Wooruff Abstract Given a irecte
More informationProblem Sheet 2: Eigenvalues and eigenvectors and their use in solving linear ODEs
Problem Sheet 2: Eigenvalues an eigenvectors an their use in solving linear ODEs If you fin any typos/errors in this problem sheet please email jk28@icacuk The material in this problem sheet is not examinable
More informationCOUPLING REQUIREMENTS FOR WELL POSED AND STABLE MULTI-PHYSICS PROBLEMS
VI International Conference on Computational Methos for Couple Problems in Science an Engineering COUPLED PROBLEMS 15 B. Schrefler, E. Oñate an M. Paparakakis(Es) COUPLING REQUIREMENTS FOR WELL POSED AND
More informationConsider for simplicity a 3rd-order IIR filter with a transfer function. where
Basic IIR Digital Filter The causal IIR igital filters we are concerne with in this course are characterie by a real rational transfer function of or, equivalently by a constant coefficient ifference equation
More informationSchrödinger s equation.
Physics 342 Lecture 5 Schröinger s Equation Lecture 5 Physics 342 Quantum Mechanics I Wenesay, February 3r, 2010 Toay we iscuss Schröinger s equation an show that it supports the basic interpretation of
More informationBohr Model of the Hydrogen Atom
Class 2 page 1 Bohr Moel of the Hyrogen Atom The Bohr Moel of the hyrogen atom assumes that the atom consists of one electron orbiting a positively charge nucleus. Although it oes NOT o a goo job of escribing
More informationA Second Time Dimension, Hidden in Plain Sight
A Secon Time Dimension, Hien in Plain Sight Brett A Collins. In this paper I postulate the existence of a secon time imension, making five imensions, three space imensions an two time imensions. I will
More informationFLUCTUATIONS IN THE NUMBER OF POINTS ON SMOOTH PLANE CURVES OVER FINITE FIELDS. 1. Introduction
FLUCTUATIONS IN THE NUMBER OF POINTS ON SMOOTH PLANE CURVES OVER FINITE FIELDS ALINA BUCUR, CHANTAL DAVID, BROOKE FEIGON, MATILDE LALÍN 1 Introuction In this note, we stuy the fluctuations in the number
More informationEntanglement is not very useful for estimating multiple phases
PHYSICAL REVIEW A 70, 032310 (2004) Entanglement is not very useful for estimating multiple phases Manuel A. Ballester* Department of Mathematics, University of Utrecht, Box 80010, 3508 TA Utrecht, The
More informationPure Further Mathematics 1. Revision Notes
Pure Further Mathematics Revision Notes June 20 2 FP JUNE 20 SDB Further Pure Complex Numbers... 3 Definitions an arithmetical operations... 3 Complex conjugate... 3 Properties... 3 Complex number plane,
More informationPermanent vs. Determinant
Permanent vs. Determinant Frank Ban Introuction A major problem in theoretical computer science is the Permanent vs. Determinant problem. It asks: given an n by n matrix of ineterminates A = (a i,j ) an
More informationSpace-time Linear Dispersion Using Coordinate Interleaving
Space-time Linear Dispersion Using Coorinate Interleaving Jinsong Wu an Steven D Blostein Department of Electrical an Computer Engineering Queen s University, Kingston, Ontario, Canaa, K7L3N6 Email: wujs@ieeeorg
More informationImplicit Differentiation
Implicit Differentiation Thus far, the functions we have been concerne with have been efine explicitly. A function is efine explicitly if the output is given irectly in terms of the input. For instance,
More informationMulti-View Clustering via Canonical Correlation Analysis
Technical Report TTI-TR-2008-5 Multi-View Clustering via Canonical Correlation Analysis Kamalika Chauhuri UC San Diego Sham M. Kakae Toyota Technological Institute at Chicago ABSTRACT Clustering ata in
More informationChapter 4. Electrostatics of Macroscopic Media
Chapter 4. Electrostatics of Macroscopic Meia 4.1 Multipole Expansion Approximate potentials at large istances 3 x' x' (x') x x' x x Fig 4.1 We consier the potential in the far-fiel region (see Fig. 4.1
More informationQubit channels that achieve capacity with two states
Qubit channels that achieve capacity with two states Dominic W. Berry Department of Physics, The University of Queenslan, Brisbane, Queenslan 4072, Australia Receive 22 December 2004; publishe 22 March
More informationPDE Notes, Lecture #11
PDE Notes, Lecture # from Professor Jalal Shatah s Lectures Febuary 9th, 2009 Sobolev Spaces Recall that for u L loc we can efine the weak erivative Du by Du, φ := udφ φ C0 If v L loc such that Du, φ =
More informationEstimation of the Maximum Domination Value in Multi-Dimensional Data Sets
Proceeings of the 4th East-European Conference on Avances in Databases an Information Systems ADBIS) 200 Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets Eleftherios Tiakas, Apostolos.
More informationThermal conductivity of graded composites: Numerical simulations and an effective medium approximation
JOURNAL OF MATERIALS SCIENCE 34 (999)5497 5503 Thermal conuctivity of grae composites: Numerical simulations an an effective meium approximation P. M. HUI Department of Physics, The Chinese University
More informationChromatic number for a generalization of Cartesian product graphs
Chromatic number for a generalization of Cartesian prouct graphs Daniel Král Douglas B. West Abstract Let G be a class of graphs. The -fol gri over G, enote G, is the family of graphs obtaine from -imensional
More informationSpring 2016 Network Science
Spring 206 Network Science Sample Problems for Quiz I Problem [The Application of An one-imensional Poisson Process] Suppose that the number of typographical errors in a new text is Poisson istribute with
More information