Contagion. Basic Contagion Models. Social Contagion Models. Network version All-to-all networks Theory. References. 1 of 58.

Size: px
Start display at page:

Download "Contagion. Basic Contagion Models. Social Contagion Models. Network version All-to-all networks Theory. References. 1 of 58."

Transcription

1 Complex Networks CSYS/MATH 33, Spring, 2 Prof. Peter Dodds Department of Mathematics & Statistics Center for Complex Systems Vermont Advanced Computing Center University of Vermont Basic Social Spreading mechanisms uninfected infected General spreading mechanism: State of node i depends on history of i and i s neighbors states. Doses of entity may be stochastic and history-dependent. May have multiple, interacting entities spreading at once. Basic Social Licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 3. License. of 58 4 of 58 Outline Basic Spreading on andom Networks Basic Basic Social Social For random networks, we know local structure is pure branching. Successful spreading is contingent on single edges infecting nodes. Success Failure: Social Focus on binary case with edges and nodes either infected or not. 2 of 58 5 of 58 models Some large questions concerning network contagion:. For a given spreading mechanism on a given network, what s the probability that there will be global spreading? 2. If spreading does take off, how far will it go? 3. How do the details of the network affect the outcome? 4. How do the details of the spreading mechanism affect the outcome? 5. What if the seed is one or many nodes? Next up: We ll look at some fundamental kinds of spreading on generalied random networks. Basic Social condition We need to find: the average # of infected edges that one random infected edge brings about. Define b k as the probability that a node of degree k is infected by a single infected edge. k= + kp k prob. of connecting to a degree k node {}}{ kp k ( } {{ b k } Prob. of no infection k= b k Prob. of infection # outgoing infected edges (k # outgoing infected edges Basic Social 3 of 58 6 of 58

2 condition Basic condition Basic Our contagion condition is then: Social Example: b k = /k. Social (k kp k b k >. k= k= (k kp k b k = k= (k kp k k Case : If b k = = then (k kp k k= = k(k >. Good: This is ust our giant component condition again. = k= (k P k = P Since r is always less than, no spreading can occur for this mechanism. Decay of b k is too fast. esult is independent of degree distribution. 7 of 58 of 58 condition Case 2: If b k = b < = then (k kp k b >. k= Basic Social condition Example: b k = H( k φ where < φ is a threshold and H is the Heaviside function (. Infection only occurs for nodes with low degree. Basic Social A fraction (-b of edges do not transmit infection. Analogous phase transition to giant component case but critical value of is increased. Aka bond percolation (. esulting degree distribution P k : P k = bk i=k ( i ( b i k P i. k Insert question from assignment 7 ( We can show F P (x = F P (bx + b. 8 of 58 Call these nodes vulnerables: they flip when only one of their friends flips. k= φ = k= (k kp k (k kp k b k = k= (k kp k H( k φ where means floor. of 58 condition Basic condition Basic Cases 3, 4, 5,...: Now allow b k to depend on k Asymmetry: Transmission along an edge depends on node s degree at other end. Possibility: b k increases with k... unlikely. Possibility: b k is not monotonic in k... unlikely. Possibility: b k decreases with k... hmmm. b k is a plausible representation of a simple kind of social contagion. The story: More well connected people are harder to influence. Social The contagion condition: φ k= (k kp k >. As φ, all nodes become resilient and r. As φ, all nodes become vulnerable and the contagion condition matches up with the giant component condition. Key: If we fix φ and then vary, we may see two phase transitions. Added to our standard giant component transition, we will see a cut off in spreading as nodes become more connected. Social 9 of 58 2 of 58

3 Social Basic Threshold model on a network Basic Social Social Some important models (recap from CSYS 3 Tipping models Schelling (97 [8, 9, ] Simulation on checker boards. Idea of thresholds. Threshold models Granovetter (978 [7] Herding models Bikhchandani et al. (992 [, 2] Social learning theory, Informational cascades,... t= t=2 t=3 e e a a d d b b b c c All nodes have threshold φ =.2. a c e d 4 of 58 7 of 58 Threshold model on a network Basic The most gullible Basic Original work: A simple model of global cascades on random networks D. J. Watts. Proc. Natl. Acad. Sci., 22 [2] Mean field Granovetter model network model Individuals now have a limited view of the world Social Vulnerables: ecall definition: individuals who can be activated by ust one contact being active are vulnerables. The vulnerability condition for node i: /k i φ i. Means # contacts k i /φ i. Key: For global cascades on random networks, must have a global component of vulnerables [2] For a uniform threshold φ, our contagion condition tells us when such a component exists: Social φ k= (k kp k >. 5 of 58 8 of 58 Threshold model on a network Basic Fig.. Cascade windows for the threshold model. TheSocial dashed line encloses the region of the (, plane in which the cascade condition (Eq. 5 is satisfied * for a uniform random graph with a homogenous threshold distribution f( (. The solid circles outline the region in which global Network cascades version occur for * the same parameter settings in the full dynamical model All-to-all fornetworks n, (averaged over random single-node perturbations. Interactions between individuals now represented by a network Network is sparse Individual i has k i contacts explicitly excluding the percolating cluster (when it exists from the sum nqnx n. Using Eq. 3b, it follows that Sv H( P G(H(, where H( satisfies Eq. 3a. Outside the cascade window, the only solution to Eq. 3a is H(, which yields Sv (and therefore no cascades as expected. But inside the cascade window, where the percolating vulnerable cluster exists, Eq.3a has an additional solution that corresponds to a non-ero value of Sv. In the special case of a uniform random graph with homogeneous thresholds, we obtain Sv Q(K, e (H Q(K, H, * * in which H satisfies H Q(K, e (H Q(K, H. We * * contrast this expression with that for the sie of the entire connected component of the graph, S e S (32, which is equivalent to allowing K 3 (or 3. In Fig. 2b we show the exact solutions * * for both Sv (long-dashed line and S (solid line for the case of *.8, and compare these quantities with the frequency and sie of global cascades observed in the full dynamical simulation of, nodes averaged over, random realiations of the network and the initial condition. (The corresponding numerical valuesforsv andsareindistinguishablefromtheanalyticalcurves, except near the upper boundary of the window. The frequency of global cascades (open circles that is, cascades that are successful is obviously related to the sie of the vulnerable component: the larger is Sv, the more likely a randomly chosen initial site is to be a part of it. In particular, if Sv does not percolate, then global cascades are impossible. Fig. 2b clearly supports this intuition, but it is equally clear that, within the cascade window, Sv seriously underestimates the likelihood of 6 a global of 58 cascade. The reason is that, according to our original decision rule, an individual s choice of state depends only on the states of its neighbors; hence, even stable vertices, although they do not participate in the initial stages of a global cascade, can still trigger them as long as they are directly adacent to the vulnerable cluster. The true likelihood of a global cascade is therefore determined by the sie of what we call the extended vulnerable cluster Se, consisting of the vulnerable cluster itself, and any stable vertices immediately adacent to it. We have not solved forse exactly (although this may be possible, but it is relatively simple to determine numerically, and as the corresponding (dotted curve in Fig. 2b demonstrates, the average value of Se is an excellent approximation to the observed frequency of global cascades. Influence on each link is reciprocal and of unit weight Each individual i has a fixed threshold φ i Individuals repeatedly poll contacts on network Synchronous, discrete time updating Individual i becomes active when number of active contacts a i φ i k i Activation is permanent (SI Cascades on random networks ( n.b., = Fig. 2. Cross section of the cascade window from Fig., at.8. (a The * average time required for a cascade to terminate diverges at both the lower and upper boundaries of the cascade window, indicating two phase transitions. (b Comparison between connected components of the network and the properties of global cascades. The frequency of global cascades in the numerical model (open circles is well approximated by the fractional sie of theextended vulnerable cluster (short dashes. subcomponent For comparison, the sie of the vulnerable >. cluster is also shown, both the exact solution derived in the text (long dashes and the average over, realiations of a random graph (crosses. The exact and numerical solutions agree everywhere except at the upper phase transition, where the finite sie of the network (n, affects the numerical results. Finally, the average sieboundary [3, 4, ] of global cascades is shown (solid circles and compared with the exact solution for the largest connected component (solid line. The average sie of global cascades (solid circles is clearly not governed either by the sie of the vulnerable cluster Sv, or by Se, but by S, the connectivity of the network as a whole. This is a surprising result, the reason for which is not entirely clear, but a plausible explanation is as follows. If a global cascade is triggered by an initially small seed striking the extended vulnerable cluster, it is guaranteed to occupy the entire vulnerable cluster, and therefore a finite fraction of even an infinite network. At this stage, the small-seed condition no longer holds, and so nodes that are still in the off state can now have multiple (early-adopting neighbors in the on state. Hence, even individuals that were originally classified as stable (the early and late maority can now be toppled, allowing the cascade to occupy not ust the vulnerable component that allowed the cascade to spread initially, but the entire connected component of the graph. That the activation of a percolating APPLIED Top curve: final fraction infected if successful. Middle curve: chance of starting a global spreading event (cascade. Bottom curve: fractional sie of vulnerable subcomponent. [2] Cascades occur only if sie of vulnerable System is robust-yet-fragile ust below upper Ignorance facilitates spreading. MATHEMATICS Basic Social 9 of 58 Watts PNAS April 3, 22 vol. 99 no

4 No Cascades Low influence Example networks Cascades Possible No Cascades High influence Cascades on random networks Basic Social Basic d line encloses q. 5 is satisfied ribution f( cades occur for or n, sts from the ( P the cascade h yields Sv the cascade ts, Eq.3a has value of Sv. omogeneous, H, *, H. We * re connected quivalent to act solutions e case of * ncy and sie imulation of tions of the g numerical ytical curves, t is, cascades sie of the y a randomly f Sv does not. 2b clearly n the cascade of a global ecision rule, states of its do not partrigger them cluster. The ined by the consisting of immediately ugh this may erically, and nstrates, the the observed ( n.b., = Fig. 2. Cross section of the cascade window from Fig., at.8. (a The * average time required for a cascade to terminate diverges at both the lower and upper boundaries of the cascade window, indicating two phase transitions. (b Comparison between connected components of the network and the properties of global cascades. The frequency of global cascades in the numerical model (open circles is well approximated by the fractional sie of theextended vulnerable cluster (short dashes. For comparison, the sie of the vulnerable cluster is also shown, both the exact solution derived in the text (long dashes and the average over, realiations of a random graph (crosses. The exact and numerical solutions agree everywhere except at the upper phase transition, where the finite sie of the network (n, affects the numerical results. Finally, the average sie of global cascades is shown (solid circles and compared with the exact solution for the largest connected component (solid line. The average sie of global cascades (solid circles is clearly not governed either by the sie of the vulnerable cluster Sv, or by Se, but by S, the connectivity of the network as a whole. This is a surprising result, the reason for which is not entirely clear, but a plausible explanation is as follows. If a global cascade is triggered by an initially small seed striking the extended vulnerable cluster, it is guaranteed to occupy the entire vulnerable cluster, and therefore a finite fraction of even an infinite network. At this stage, the small-seed condition no longer holds, and so nodes that are still in the off state can now have multiple (early-adopting neighbors in the on state. Hence, even individuals that were originally classified as stable (the early and late maority can now be toppled, allowing the cascade to occupy not ust the vulnerable component that allowed the cascade to spread initially, but the entire connected component of the graph. That the activation of a percolating PNAS April 3, 22 vol. 99 no APPLIED Time taken for cascade to spread through network. [2] Two phase transitions. Largest vulnerable component = critical mass. Now have endogenous mechanism for spreading from an individual to the critical mass and then beyond. Cascade window for random networks MATHEMATICS Social 2 of 58 Basic Social Prob(activation Granovetter s Threshold model recap φ Assumes deterministic response functions φ = threshold of an individual. f (φ = distribution of thresholds in a population. F (φ = cumulative distribution = φ φ = f (φ dφ φ t = fraction of people rioting at time step t. Social Sciences Threshold models At time t +, fraction rioting = fraction with φ φ t. φt φ t+ = f (φ dφ = F (φ φ t = F (φ t Iterative maps of the unit interval [, ]. Social 24 of 58 Basic Social ( n.b., = Outline of cascade window for random networks. 2 of of 58 Cascade window for random networks Basic Social Sciences Threshold models Basic no cascades S Fraction of Vulnerables Final cascade sie Social Action based on perceived behavior of others. Pr(a i,t+ = A φ i φ i,t f (φ 2.5 B φ φ t+ = F (φ t C φ t Social influence 5 cascades φ = uniform individual threshold Two states: S and I ecover now possible (SIS φ = fraction of contacts on (e.g., rioting Discrete time, synchronous update (strong assumption! This is a Critical mass model 22 of of 58

5 Social Sciences Threshold models Basic Threshold contagion on random networks Basic 3 Social Social f(γ γ φ t φ t Three key pieces to describe analytically:. The fractional sie of the largest subcomponent of vulnerable nodes, S vuln. 2. The chance of starting a global spreading event, P trig = S trig. 3. The expected final sie of any successful spread, S. n.b., the distribution of S is almost always bimodal. Example of single stable state model 27 of 58 3 of 58 Social Sciences Threshold models Implications for collective action theory:. Collective uniformity individual uniformity 2. Small individual changes large global changes Basic Social Threshold contagion on random networks First goal: Find the largest component of vulnerable nodes. ecall that for finding the giant component s sie, we had to solve: F π (x = xf P (F (x and F (x = xf (F (x Basic Social Next: Connect mean-field model to network model. Single seed for network model: /N. Comparison between network and mean-field model sensible for vanishing seed sie for the latter. We ll find a similar result for the subset of nodes that are vulnerable. This is a node-based percolation problem. For a general monotonic threshold distribution f (φ, a degree k node is vulnerable with probability b k = /k f (φdφ. 28 of of 58 All-to-all versus random networks F (a t+ all to all networks A C.8 a f (φ a t 5.5 φ S random networks B D.8 k Basic Social Threshold contagion on random networks Everything now revolves around the modified generating function: F (vuln P (x = b k P k x k. k= Generating function for friends-of-friends distribution is related in same way as before: Basic Social F (a t f (φ φ S F (vuln (x = d dx F (vuln P (x d dx F (vuln. P (x x=.2 a a at k 29 of of 58

6 Threshold contagion on random networks Functional relations for component sie g.f. s are almost the same... ( F π (vuln (x = F (vuln P ( +xf (vuln P F (vuln (x central node is not vulnerable F (vuln (x = F (vuln ( first node is not vulnerable ( +xf (vuln F (vuln (x Can now solve as before to find S vuln = F (vuln π (. Basic Social 34 of 58 Expected sie of spread Idea: andomly turn on a fraction φ of nodes at time t = Capitalie on local branching network structure of random networks (again Now think about what must happen for a specific node i to become active at time t: t = : i is one of the seeds (prob = φ t = : i was not a seed but enough of i s friends switched on at time t = so that i s threshold is now exceeded. t = 2: enough of i s friends and friends-of-friends switched on at time t = so that i s threshold is now exceeded. t = n: enough nodes within n hops of i switched on at t = and their effects have propagated to reach i. Basic Social 37 of 58 Threshold contagion on random networks Basic Expected sie of spread Basic Second goal: Find probability of triggering largest vulnerable component. Assumption is first node is randomly chosen. Social = active, t= ϕ = /3 Social Same set up as for vulnerable component except now we don t care if the initial node is vulnerable or not: ( F π (trig (x = xf P F (vuln (x ( F (vuln (x = F v (vuln ( + xf F (vuln (x i Solve as before to find P trig = S trig = F (trig π (. 35 of of 58 Threshold contagion on random networks Basic Expected sie of spread Basic Third goal: Find expected fractional sie of spread. Not obvious even for uniform threshold problem. Difficulty is in figuring out if and when nodes that need 2 hits switch on. Problem solved for infinite seed case by Gleeson and Cahalane: Seed sie strongly affects cascades on random networks, Phys. ev. E, 27. [6] Developed further by Gleeson in Cascades on correlated and modular random networks, Phys. ev. E, 28. [5] Social t=4 i = active at t= = active at t= = active at t=2 = active at t=3 = active at t=4 Social ϕ = /3 36 of of 58

7 Expected sie of spread Notes: Calculations are possible nodes do not become inactive. Not ust for threshold model works for a wide range of contagion processes. We can analytically determine the entire time evolution, not ust the final sie. We can in fact determine Pr(node of degree k switching on at time t. Asynchronous updating can be handled too. Basic Social Expected sie of spread For general t, we need to know the probability an edge coming into a degree k node at time t is active. Notation: call this probability θ t. We already know θ = φ. Story analogous to t = case: k i ( ki φ i,t+ = φ + ( φ θ t ( θ t k i b ki. = Average over all nodes to obtain expression for φ t+ : φ t+ = φ + ( φ k P k k= = ( k θ t ( θ t k b k. Basic Social So we need to compute θ t... massive excitement... 4 of of 58 Expected sie of spread Basic Expected sie of spread Basic Social First connect θ to θ : Social Pleasantness: Taking off from a single seed story is about expansion away from a node. Extent of spreading story is about contraction at a node. θ = φ + k kp k ( k ( φ θ ( θ k b k k= = kp k = k = Pr (edge connects to a degree k node. piece gives Pr(degree node k activates of its neighbors k incoming neighbors are active. k = φ and ( φ terms account for state of node at time t =. See this all generalies to give θ t+ in terms of θ t... 4 of of 58 Expected sie of spread Notation: φ k,t = Pr(a degree k node is active at time t. Notation: b k = Pr (a degree k node becomes active if neighbors are active. Our ( starting point: φ k, = φ. k φ ( φ k = Pr ( of a degree k node s neighbors were seeded at time t =. Probability a degree k node was a seed at t = is φ (as above. Probability a degree k node was not a seed at t = is ( φ. Combining everything, we have: φ k, = φ + ( φ k = ( k φ ( φ k b k. Basic Social Expected sie of spread Two pieces: edges first, and then nodes. θ t+ = φ exogenous k kp k ( k +( φ with θ = φ. 2. φ t+ = φ exogenous k= = θ t ( θ t k b k } {{ } social effects +( φ k ( k P k θ t ( θ t k b k. k= = social effects Basic Social 42 of of 58

8 Comparison between theory and simulations JAMES P. GLEESON AND DIAMUID J. CAHALANE 5 (a (b Basic PHYSICAL EVIEW E 75, Social FIG.. Color online Average density of active nodes in a FIG. 2. Color online As Fig., but threshold distribution is Poisson random graph of mean degree and uniform threshold Gaussian increases. with mean and standard deviation.2, and seed fraction value. a Color-coded values of from Eq. on the, plane =. a Cascade boundaries as in Fig. ; the arrow marks the with seed fraction = 2. Lines show approximations to the global cascade boundaries: the solid line encloses the region where 5 simulation results N= 5, average over realiations at critical point c, c described in the text; b theory and numerical 46 of 58 is satisfied; the dashed line represents the extended cascade boundary from Eq. 6. b Values of at =.8 from Eq. lines and =.2 solid,.362 dashed, and.38 dash-dotted. numerical simulations symbols, averaged over realiations = 3 and 2 close to the value marked by the arrow, with N= 5. Seed fractions are = 3 solid, 5 3 dashed, but the simulations and full theory show that the respective and 2 dot-dashed. The arrow marks the cascade boundary transitions are actually near 6.4 and 9.2. Condition 5 given by Notes: Eq. 5 in the limit of ero seed fraction. clearly does not accurately represent the effects ofbasic finite seed sie norjames of nonero P. GLEESON F ; see AND below, DIAMUID because J. CAHALANE the function. The theory shows etrieve excellent cascade agreement withcondition simulations. for G is spreading not well approximated from by aastraight line near Social the critical Note the smooth from to nea, and parameters for cascade transitions. the discontinuous single transitionseed back to in limit at larger φ values.. 5 (a We seek an improved cascade condition by extending the The location of the upper transition clearly depends sensitively on the initial Depends activated fraction on map. θ t+ = G(θ series for G q to order q 2. This approximation results in a quadratic t ; φ. equation for the fixed point q A global cascade occurs with high probability when a which we represent as aq 2 small seed results in a large value of. Writing G q as +bq +c=. Under the approximation of small q values, we interpret the existence of a positive root of this qua-.5 First: if self-starters are present, some activation is = C q with coefficients assured: dratic equation to imply q, and hence the impossibility C = k kf k= + n= n +nk p n of global cascades. 5 Note that the first-order approximation 4 5 requires b for global cascades. However, when the k, kp nonlinear k behavior of G is important, it is still possible for G(; φ global cascades to occur when b is negative, provided that and lineariing Eq. 2 near q= gives a first-order = condition for global cascades to occur: C the full solution of the quadratic equation precludes positive b k >., since this..2.3 k= real roots. We therefore extend thecascade boundary to include regions where either b as in 5 or b guarantees that q n increases with n, at least initially. This cascade condition may also be written as 2 4ac, the latter giving to meaning b first order in k > for at least one value of k k p k= k F k F (b k.. 5 If θ = is a fixed C point 2 4C C 2 +2 C C 2 2C 2 +4C C 2. of G (i.e., G(;.5 φ = then 6 In the limit spreading and with F =, occurs this reduces if to the condition derived by Watts using percolation arguments 3. It is straightforward to plot this extended cascade condition: On the, plane of Fig. a the condition 5 is satisfied the dashed lines in Figs. a and 2 a clearly give much inside the solid line; fo.8 in Fig. b, 5 predicts improved approximations to the actual boundaries for global cascade transitions at values G between (; φ5.7 and = for both (kcascades. kp FIG. k. b k Color > online. Average density of active nodes in a Poisson random graph of mean degree and uniform threshold k= value. a Color-coded values of from Eq. on the, plane with seed fraction = 2. Lines show approximations to the global cascade boundaries: the solid line encloses the region where 5 Insert question from assignment 8 ( is satisfied; the dashed line represents the extended cascade 47 of boundary from Eq. 6. b Values of at =.8 from Eq. lines and 58 numerical simulations symbols, averaged over realiations with N= 5. Seed fractions are = 3 solid, 5 3 dashed, and Notes: 2 dot-dashed. The arrow marks the cascade boundary given by Eq. 5 in the limit of ero seed fraction. Basic. The theory shows excellent agreement with simulations. Note the smooth transition from to Social near =, and In words: the discontinuous transition back to at larger values. The location of the upper transition clearly Network depends version sensitively on the initial activated fraction If G(; φ >, spreading must occur because some. A global cascade occurs with high probability when a small seed nodes turn on for free. results in a large value of. Writing G q as From Gleeson and Cahalane [6] Pure 5 random networks (a with simple threshold responses = uniform threshold (our5 φ ; = average degree; = φ; q = θ; N = 5. φ = 3,.5 2, and (b 2. Cascade.5 window is for φ = 2 case Sensible expansion of cascade window as φ If G has an unstable fixed point at θ =, then C cascades are also always possible. = k= + n= Non-vanishing seed case: = C q with coefficients Cascade condition is more complicated for k k φ >. If G has a stable fixed point at θ =, and an unstable fixed point for some < θ <, then for θ > θ, spreading takes off. Tricky point: G depends on φ, so as we change φ, we also change G. k n +nk p kf n k, 4 and lineariing Eq. 2 near q= gives a first-order condition for global cascades to occur: C, since this guarantees that q n increases with n, at least initially. This cascade condition may also be written as k= p k F k F. 5 In the limit and with F =, this reduces to the condition derived by Watts using percolation arguments 3. On the, plane of Fig. a the condition 5 is satisfied inside the solid line; fo.8 in Fig. b, 5 predicts cascade transitions at values between 5.7 and 5.8 for both 48 of 58 General fixed point story: θt+ = G(θt; φ θt θt+ = G(θt; φ Given θ (= φ, θ will be the nearest stable fixed point, either above or below. n.b., adacent fixed points must have opposite stability types. Important: Actual form of G depends on φ. So choice of φ dictates both G and starting point can t start anywhere for a given G. Comparison between theory and simulations 5 (a (b.5 PHYSICAL EVIEW E 75, = 3 and 2 close to the value marked by the arrow, but the simulations and full theory show that the respective transitions are actually near 6.4 and 9.2. Condition 5 clearly does not accurately represent the effects of finite seed SEED sie nor SIZE of STONGLY nonero F ; AFFECTS see below, CASCADES because ON the ANDOM function G is not well approximated by a straight line near the critical parameters for cascade transitions. (a We seek an improved cascade condition by extending the series for G q to order q 2. This approximation results in a quadratic.5 equation for the fixed point q which we represent as aq 2 +bq +c=. Under the approximation of small q values, we interpret the existence of a positive root of this quadratic equation to imply 2 q 4, and6 hence the 8 impossibility of global cascades. Note that the first-order approximation 5 requires b for global cascades. However, when the nonlinear behavior (b of G is important, it is still possible for global cascades to occur when b is negative, provided that the full solution of the quadratic equation precludes positive.5 real roots. We therefore extend the cascade boundary to include regions where either b as in 5 or b 2 4ac, the latter giving to first order in C 2 4C C 2 +2 C C 2 2C 2 +4C C 2. 6 (c It is straightforward to plot this extended cascade condition: the dashed.5 lines in Figs. a and 2 a clearly give much improved approximations to the actual boundaries for global cascades FIG. 2. Color online As Fig., but threshold distribution is Gaussian From with mean Gleeson and standard andeviation Cahalane.2, and seed [6] fraction =. a Cascade boundaries as in Fig. ; the arrow marks the critical point c, c described in the text; b theory and numerical simulation results N= 5, average over realiations at =.2 solid,.362 dashed, and.38 dash-dotted. θt θt+ = G(θt; φ Now allow thresholds to be distributed according to a Gaussian with mean. =.2,.362, and.38; σ =.2. φ = but some nodes have thresholds so effectively φ >. Now see a (nasty discontinuous phase transition for low. Comparison between theory and simulations q q q From Gleeson and Cahalane [6] FIG. 3. Color online Bifurcation diagrams as described in text for dependence of q on for =.2 and = at = a.35, b.37, and c.375. Figure 2 a shows on Poisson random graphs with thresholds drawn from a Gaussian distribution of mean and standard deviation =.2. Unlike the assumption in 3 that F =, a Gaussian distribution necessarily implies the presence of negative-valued thresholds among the population, so F. Negative-threshold agents act as a natural seed, since they activate regardless of the states of their neighbors. The presence of these innovators 3 allows us to set = in this case. The extended cascade condition 6 again gives a good approximation to the discontinuous transition at high values. Figure 2 b focuses on the low- transition θt Basic Social 49 of 58 Basic Social 5 of 58 PHYSICAL EVIEW E 75, Basic root finding for the system of three equations Social q= + G q, G q =, and G q =. For =.2 this yields c, c =.3543,3.36 ; this point is Network marked version with an arrow in Fig. 2 a. We remark that the discontinuous transition for from θ t+ q = G(θ to q t ; φ which. induces a similar transi- tion in through Eq. occurs due to a saddle-node bifurcation 24. This behavior is quite generic, occurring for a wide variety of parameters, with the exception of the special case point studied here: by Watts. θ Fo = and F = as in 3, the coefficient C is ero and the fixed-point equation always has always takes off. a root at q=, with transcritical bifurcations on the q= line giving rise to the observed transitions. However, any nonero seed sie replaces the transcritical bifurcations with saddlenode.35, bifurcations.37, as described and.375. above. We have confirmed the accuracy of these results and Eq. against numerical simulations on other configuration model network topologies, including power-law degree distributions with exponential for cutoff : (b pand k k (c exp k/ lead 7. to We turn now to the derivation Eqs. 3. Our analytical higher approach fixed is based points on methods of G. introduced by Dhar et al. to study the ero-temperature random-field Ising model on Bethe lattices 22. The FIM is a spin-based model of magnetic materials, and its ero-temperature limit has been bifurcations appear and extensively studied as a model for systems exhibiting hysteresis merge and Barkhausen (b and noise c. 2. A Bethe lattice of coordination number for integer is an infinite tree where every node has exactly neighbors. Dhar et al. derive analytical results valid on Bethe lattices, but their numerical simulations show that the theory also applies very accurately 5 of to58 random graphs where every node has exactly neighbors, provided that short-distance loops are rare. To analye Watts model we extend the approach of 22 in two ways. First, we consider treelike random graphs with arbitrary degree distributions, rather than the Bethe lattices of 22. Second, we account for the PAP, which is the essential difference between Watts update rule and standard FIM dynamics. This difference between the update rules is crucial to our derivation of the dependence of the activated fraction. We begin by replacing the given random graph with degree distribution p k by a tree structure. The top level of the tree is a single node with degree k, and this is connected to Plots of stability points n.b.: is not a fixed Top to bottom: = n.b.: higher values of θ Saddle node

9 Spreadarama Basic I Basic Bridging to single seed case: Consider largest vulnerable component as initial set of seeds. Not quite right as spreading must move through vulnerables. But we can usefully think of the vulnerable component as activating at time t = because order doesn t matter. ebuild φ t and θ t expressions... Social [] S. Bikhchandani, D. Hirshleifer, and I. Welch. A theory of fads, fashion, custom, and cultural change as informational cascades. J. Polit. Econ., :992 26, 992. [2] S. Bikhchandani, D. Hirshleifer, and I. Welch. Learning from the behavior of others: Conformity, fads, and informational cascades. J. Econ. Perspect., 2(3:5 7, 998. pdf ( [3] J. M. Carlson and J. Doyle. Highly optimied tolerance: A mechanism for power laws in design systems. Phys. ev. E, 6(2:42 427, 999. pdf ( Social 52 of of 58 Spreadarama Two pieces modified for single seed:. θ t+ = θ vuln + k kp k ( k ( θ vuln θ t ( θ t k b k k= = with θ = θ vuln = Pr an edge leads to the giant vulnerable component (if it exists. 2. φ t+ = S vuln + ( S vuln k P k k= = ( k θ t ( θ t k b k. Basic Social 53 of 58 II [4] J. M. Carlson and J. Doyle. Highly optimied tolerance: obustness and design in complex systems. Phys. ev. Lett., 84(: , 2. pdf ( [5] J. P. Gleeson. Cascades on correlated and modular random networks. Phys. ev. E, 77:467, 28. pdf ( [6] J. P. Gleeson and D. J. Cahalane. Seed sie strongly affects cascades on random networks. Phys. ev. E, 75:563, 27. pdf ( [7] M. Granovetter. Threshold models of collective behavior. Am. J. Sociol., 83(6:42 443, 978. pdf ( Basic Social 56 of 58 Time-dependent solutions Basic III Basic Synchronous update Done: Evolution of φ t and θ t given exactly by the maps we have derived. Asynchronous updates Update nodes with probability α. As α, updates become effectively independent. Now can talk about φ(t and θ(t. Social [8] T. C. Schelling. Dynamic models of segregation. J. Math. Sociol., :43 86, 97. [9] T. C. Schelling. Hockey helmets, concealed weapons, and daylight saving: A study of binary choices with externalities. J. Conflict esolut., 7:38 428, 973. pdf ( [] T. C. Schelling. Micromotives and Macrobehavior. Norton, New York, 978. Social More on this later... [] D. Sornette. Critical Phenomena in Natural Sciences. Springer-Verlag, Berlin, 2nd edition, of of 58

10 IV Basic Social [2] D. J. Watts. A simple model of global cascades on random networks. Proc. Natl. Acad. Sci., 99(9: , 22. pdf ( 58 of 58

Contagion. Complex Networks CSYS/MATH 303, Spring, Prof. Peter Dodds

Contagion. Complex Networks CSYS/MATH 303, Spring, Prof. Peter Dodds Complex Networks CSYS/MATH 33, Spring, 211 Basic Social Prof. Peter Dodds Department of Mathematics & Statistics Center for Complex Systems Vermont Advanced Computing Center University of Vermont Licensed

More information

Complex Networks, Course 303A, Spring, Prof. Peter Dodds

Complex Networks, Course 303A, Spring, Prof. Peter Dodds Complex Networks, Course 303A, Spring, 2009 Prof. Peter Dodds Department of Mathematics & Statistics University of Vermont Licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 3.0 License.

More information

Random Networks. Complex Networks CSYS/MATH 303, Spring, Prof. Peter Dodds

Random Networks. Complex Networks CSYS/MATH 303, Spring, Prof. Peter Dodds Complex Networks CSYS/MATH 303, Spring, 2011 Prof. Peter Dodds Department of Mathematics & Statistics Center for Complex Systems Vermont Advanced Computing Center University of Vermont Licensed under the

More information

Random Networks. Complex Networks, CSYS/MATH 303, Spring, Prof. Peter Dodds

Random Networks. Complex Networks, CSYS/MATH 303, Spring, Prof. Peter Dodds Complex Networks, CSYS/MATH 303, Spring, 2010 Prof. Peter Dodds Department of Mathematics & Statistics Center for Complex Systems Vermont Advanced Computing Center University of Vermont Licensed under

More information

Social Contagion. Principles of Complex Systems CSYS/MATH 300, Fall, Prof. Peter Dodds

Social Contagion. Principles of Complex Systems CSYS/MATH 300, Fall, Prof. Peter Dodds Principles of Complex Systems CSYS/MATH 3, Fall, 2 Prof. Peter Dodds Department of Mathematics & Statistics Center for Complex Systems Vermont Advanced Computing Center University of Vermont Licensed under

More information

ECS 289 F / MAE 298, Lecture 15 May 20, Diffusion, Cascades and Influence

ECS 289 F / MAE 298, Lecture 15 May 20, Diffusion, Cascades and Influence ECS 289 F / MAE 298, Lecture 15 May 20, 2014 Diffusion, Cascades and Influence Diffusion and cascades in networks (Nodes in one of two states) Viruses (human and computer) contact processes epidemic thresholds

More information

arxiv: v4 [cond-mat.dis-nn] 16 May 2011

arxiv: v4 [cond-mat.dis-nn] 16 May 2011 Direct, physically-motivated derivation of the contagion condition for spreading processes on generalized random networks arxiv:1101.5591v4 [cond-mat.dis-nn] 16 May 2011 Peter Sheridan Dodds, 1,2, Kameron

More information

Assortativity and Mixing. Outline. Definition. General mixing. Definition. Assortativity by degree. Contagion. References. Contagion.

Assortativity and Mixing. Outline. Definition. General mixing. Definition. Assortativity by degree. Contagion. References. Contagion. Outline Complex Networks, Course 303A, Spring, 2009 Prof Peter Dodds Department of Mathematics & Statistics University of Vermont Licensed under the Creative Commons Attribution-NonCommercial-ShareAlike

More information

Modeling, Analysis, and Control of Information Propagation in Multi-layer and Multiplex Networks. Osman Yağan

Modeling, Analysis, and Control of Information Propagation in Multi-layer and Multiplex Networks. Osman Yağan Modeling, Analysis, and Control of Information Propagation in Multi-layer and Multiplex Networks Osman Yağan Department of ECE Carnegie Mellon University Joint work with Y. Zhuang and V. Gligor (CMU) Alex

More information

ECS 253 / MAE 253, Lecture 15 May 17, I. Probability generating function recap

ECS 253 / MAE 253, Lecture 15 May 17, I. Probability generating function recap ECS 253 / MAE 253, Lecture 15 May 17, 2016 I. Probability generating function recap Part I. Ensemble approaches A. Master equations (Random graph evolution, cluster aggregation) B. Network configuration

More information

KINETICS OF SOCIAL CONTAGION. János Kertész Central European University. SNU, June

KINETICS OF SOCIAL CONTAGION. János Kertész Central European University. SNU, June KINETICS OF SOCIAL CONTAGION János Kertész Central European University SNU, June 1 2016 Theory: Zhongyuan Ruan, Gerardo Iniguez, Marton Karsai, JK: Kinetics of social contagion Phys. Rev. Lett. 115, 218702

More information

Complex contagions and hybrid phase transitions

Complex contagions and hybrid phase transitions Journal of Complex Networks Advance Access published August 14, 2015 Journal of Complex Networks (2014) Page 1 of 23 doi:10.1093/comnet/cnv021 Complex contagions and hybrid phase transitions Joel C. Miller

More information

Complex Networks CSYS/MATH 303, Spring, Prof. Peter Dodds

Complex Networks CSYS/MATH 303, Spring, Prof. Peter Dodds Complex Networks CSYS/MATH 303, Spring, 2011 Prof. Peter Dodds Department of Mathematics & Statistics Center for Complex Systems Vermont Advanced Computing Center University of Vermont Licensed under the

More information

KINETICS OF COMPLEX SOCIAL CONTAGION. János Kertész Central European University. Pohang, May 27, 2016

KINETICS OF COMPLEX SOCIAL CONTAGION. János Kertész Central European University. Pohang, May 27, 2016 KINETICS OF COMPLEX SOCIAL CONTAGION János Kertész Central European University Pohang, May 27, 2016 Theory: Zhongyuan Ruan, Gerardo Iniguez, Marton Karsai, JK: Kinetics of social contagion Phys. Rev. Lett.

More information

Lecture 10. Under Attack!

Lecture 10. Under Attack! Lecture 10 Under Attack! Science of Complex Systems Tuesday Wednesday Thursday 11.15 am 12.15 pm 11.15 am 12.15 pm Feb. 26 Feb. 27 Feb. 28 Mar.4 Mar.5 Mar.6 Mar.11 Mar.12 Mar.13 Mar.18 Mar.19 Mar.20 Mar.25

More information

Maximizing the Spread of Influence through a Social Network. David Kempe, Jon Kleinberg, Éva Tardos SIGKDD 03

Maximizing the Spread of Influence through a Social Network. David Kempe, Jon Kleinberg, Éva Tardos SIGKDD 03 Maximizing the Spread of Influence through a Social Network David Kempe, Jon Kleinberg, Éva Tardos SIGKDD 03 Influence and Social Networks Economics, sociology, political science, etc. all have studied

More information

CONSTRAINED PERCOLATION ON Z 2

CONSTRAINED PERCOLATION ON Z 2 CONSTRAINED PERCOLATION ON Z 2 ZHONGYANG LI Abstract. We study a constrained percolation process on Z 2, and prove the almost sure nonexistence of infinite clusters and contours for a large class of probability

More information

Summary of free theory: one particle state: vacuum state is annihilated by all a s: then, one particle state has normalization:

Summary of free theory: one particle state: vacuum state is annihilated by all a s: then, one particle state has normalization: The LSZ reduction formula based on S-5 In order to describe scattering experiments we need to construct appropriate initial and final states and calculate scattering amplitude. Summary of free theory:

More information

Spreading and Opinion Dynamics in Social Networks

Spreading and Opinion Dynamics in Social Networks Spreading and Opinion Dynamics in Social Networks Gyorgy Korniss Rensselaer Polytechnic Institute 05/27/2013 1 Simple Models for Epidemiological and Social Contagion Susceptible-Infected-Susceptible (SIS)

More information

Generating Functions for Random Networks

Generating Functions for Random Networks for Random Networks Complex Networks CSYS/MATH 303, Spring, 2011 Prof. Peter Dodds Department of Mathematics & Statistics Center for Complex Systems Vermont Advanced Computing Center University of Vermont

More information

Epidemics in Complex Networks and Phase Transitions

Epidemics in Complex Networks and Phase Transitions Master M2 Sciences de la Matière ENS de Lyon 2015-2016 Phase Transitions and Critical Phenomena Epidemics in Complex Networks and Phase Transitions Jordan Cambe January 13, 2016 Abstract Spreading phenomena

More information

Phase transition and spontaneous symmetry breaking

Phase transition and spontaneous symmetry breaking Phys60.nb 111 8 Phase transition and spontaneous symmetry breaking 8.1. Questions: Q1: Symmetry: if a the Hamiltonian of a system has certain symmetry, can the system have a lower symmetry? Q: Analyticity:

More information

Renormalization: An Attack on Critical Exponents

Renormalization: An Attack on Critical Exponents Renormalization: An Attack on Critical Exponents Zebediah Engberg March 15, 2010 1 Introduction Suppose L R d is a lattice with critical probability p c. Percolation on L is significantly differs depending

More information

2. As we shall see, we choose to write in terms of σ x because ( X ) 2 = σ 2 x.

2. As we shall see, we choose to write in terms of σ x because ( X ) 2 = σ 2 x. Section 5.1 Simple One-Dimensional Problems: The Free Particle Page 9 The Free Particle Gaussian Wave Packets The Gaussian wave packet initial state is one of the few states for which both the { x } and

More information

27 : Distributed Monte Carlo Markov Chain. 1 Recap of MCMC and Naive Parallel Gibbs Sampling

27 : Distributed Monte Carlo Markov Chain. 1 Recap of MCMC and Naive Parallel Gibbs Sampling 10-708: Probabilistic Graphical Models 10-708, Spring 2014 27 : Distributed Monte Carlo Markov Chain Lecturer: Eric P. Xing Scribes: Pengtao Xie, Khoa Luu In this scribe, we are going to review the Parallel

More information

Lecture VI Introduction to complex networks. Santo Fortunato

Lecture VI Introduction to complex networks. Santo Fortunato Lecture VI Introduction to complex networks Santo Fortunato Plan of the course I. Networks: definitions, characteristics, basic concepts in graph theory II. III. IV. Real world networks: basic properties

More information

Networks: Lectures 9 & 10 Random graphs

Networks: Lectures 9 & 10 Random graphs Networks: Lectures 9 & 10 Random graphs Heather A Harrington Mathematical Institute University of Oxford HT 2017 What you re in for Week 1: Introduction and basic concepts Week 2: Small worlds Week 3:

More information

Web Structure Mining Nodes, Links and Influence

Web Structure Mining Nodes, Links and Influence Web Structure Mining Nodes, Links and Influence 1 Outline 1. Importance of nodes 1. Centrality 2. Prestige 3. Page Rank 4. Hubs and Authority 5. Metrics comparison 2. Link analysis 3. Influence model 1.

More information

Multi-Stage Complex Contagions in Random Multiplex Networks

Multi-Stage Complex Contagions in Random Multiplex Networks Multi-Stage Complex Contagions in Random Multiplex Networks Yong Zhuang and Osman Yağan Department of ECE, Carnegie Mellon University, Pittsburgh, PA 523, USA (Dated: July 4, 28) In this work, we aim to

More information

Problem Set Number 2, j/2.036j MIT (Fall 2014)

Problem Set Number 2, j/2.036j MIT (Fall 2014) Problem Set Number 2, 18.385j/2.036j MIT (Fall 2014) Rodolfo R. Rosales (MIT, Math. Dept.,Cambridge, MA 02139) Due Mon., September 29, 2014. 1 Inverse function problem #01. Statement: Inverse function

More information

Critical Phenomena and Percolation Theory: II

Critical Phenomena and Percolation Theory: II Critical Phenomena and Percolation Theory: II Kim Christensen Complexity & Networks Group Imperial College London Joint CRM-Imperial College School and Workshop Complex Systems Barcelona 8-13 April 2013

More information

1. Introductory Examples

1. Introductory Examples 1. Introductory Examples We introduce the concept of the deterministic and stochastic simulation methods. Two problems are provided to explain the methods: the percolation problem, providing an example

More information

Exact solution of site and bond percolation. on small-world networks. Abstract

Exact solution of site and bond percolation. on small-world networks. Abstract Exact solution of site and bond percolation on small-world networks Cristopher Moore 1,2 and M. E. J. Newman 2 1 Departments of Computer Science and Physics, University of New Mexico, Albuquerque, New

More information

Analytic Treatment of Tipping Points for Social Consensus in Large Random Networks

Analytic Treatment of Tipping Points for Social Consensus in Large Random Networks 2 3 4 5 6 7 8 9 Analytic Treatment of Tipping Points for Social Consensus in Large Random Networks W. Zhang and C. Lim Department of Mathematical Sciences, Rensselaer Polytechnic Institute, 8th Street,

More information

Problem Set Number 02, j/2.036j MIT (Fall 2018)

Problem Set Number 02, j/2.036j MIT (Fall 2018) Problem Set Number 0, 18.385j/.036j MIT (Fall 018) Rodolfo R. Rosales (MIT, Math. Dept., room -337, Cambridge, MA 0139) September 6, 018 Due October 4, 018. Turn it in (by 3PM) at the Math. Problem Set

More information

Rate of Convergence of Learning in Social Networks

Rate of Convergence of Learning in Social Networks Rate of Convergence of Learning in Social Networks Ilan Lobel, Daron Acemoglu, Munther Dahleh and Asuman Ozdaglar Massachusetts Institute of Technology Cambridge, MA Abstract We study the rate of convergence

More information

6.207/14.15: Networks Lecture 12: Generalized Random Graphs

6.207/14.15: Networks Lecture 12: Generalized Random Graphs 6.207/14.15: Networks Lecture 12: Generalized Random Graphs 1 Outline Small-world model Growing random networks Power-law degree distributions: Rich-Get-Richer effects Models: Uniform attachment model

More information

Nonlinear Dynamics between Micromotives and Macrobehavior

Nonlinear Dynamics between Micromotives and Macrobehavior Nonlinear Dynamics between Micromotives and Macrobehavior Saori Iwanaga & kira Namatame Dept. of Computer Science, National Defense cademy, Yokosuka, 239-8686, JPN, E-mail: {g38042, nama}@nda.ac.jp Tel:

More information

Diffusion of Innovations in Social Networks

Diffusion of Innovations in Social Networks Daron Acemoglu Massachusetts Institute of Technology, Department of Economics, Cambridge, MA, 02139, daron@mit.edu Diffusion of Innovations in Social Networks Asuman Ozdaglar Massachusetts Institute of

More information

Diffusion of Innovation and Influence Maximization

Diffusion of Innovation and Influence Maximization Diffusion of Innovation and Influence Maximization Leonid E. Zhukov School of Data Analysis and Artificial Intelligence Department of Computer Science National Research University Higher School of Economics

More information

Recursive Estimation

Recursive Estimation Recursive Estimation Raffaello D Andrea Spring 08 Problem Set : Bayes Theorem and Bayesian Tracking Last updated: March, 08 Notes: Notation: Unless otherwise noted, x, y, and z denote random variables,

More information

Attack Strategies on Complex Networks

Attack Strategies on Complex Networks Attack Strategies on Complex Networks Lazaros K. Gallos 1, Reuven Cohen 2, Fredrik Liljeros 3, Panos Argyrakis 1, Armin Bunde 4, and Shlomo Havlin 5 1 Department of Physics, University of Thessaloniki,

More information

Diffusion of information and social contagion

Diffusion of information and social contagion Diffusion of information and social contagion Leonid E. Zhukov School of Data Analysis and Artificial Intelligence Department of Computer Science National Research University Higher School of Economics

More information

CSCI 3210: Computational Game Theory. Cascading Behavior in Networks Ref: [AGT] Ch 24

CSCI 3210: Computational Game Theory. Cascading Behavior in Networks Ref: [AGT] Ch 24 CSCI 3210: Computational Game Theory Cascading Behavior in Networks Ref: [AGT] Ch 24 Mohammad T. Irfan Email: mirfan@bowdoin.edu Web: www.bowdoin.edu/~mirfan Course Website: www.bowdoin.edu/~mirfan/csci-3210.html

More information

Phase transitions and finite-size scaling

Phase transitions and finite-size scaling Phase transitions and finite-size scaling Critical slowing down and cluster methods. Theory of phase transitions/ RNG Finite-size scaling Detailed treatment: Lectures on Phase Transitions and the Renormalization

More information

Comment on A BINOMIAL MOMENT APPROXIMATION SCHEME FOR EPIDEMIC SPREADING IN NETWORKS in U.P.B. Sci. Bull., Series A, Vol. 76, Iss.

Comment on A BINOMIAL MOMENT APPROXIMATION SCHEME FOR EPIDEMIC SPREADING IN NETWORKS in U.P.B. Sci. Bull., Series A, Vol. 76, Iss. Comment on A BINOMIAL MOMENT APPROXIMATION SCHEME FOR EPIDEMIC SPREADING IN NETWORKS in U.P.B. Sci. Bull., Series A, Vol. 76, Iss. 2, 23-3, 24 Istvan Z. Kiss, & Prapanporn Rattana July 2, 24 School of

More information

Math 216 First Midterm 8 October, 2012

Math 216 First Midterm 8 October, 2012 Math 216 First Midterm 8 October, 2012 This sample exam is provided to serve as one component of your studying for this exam in this course. Please note that it is not guaranteed to cover the material

More information

Chapter 9. Non-Parametric Density Function Estimation

Chapter 9. Non-Parametric Density Function Estimation 9-1 Density Estimation Version 1.1 Chapter 9 Non-Parametric Density Function Estimation 9.1. Introduction We have discussed several estimation techniques: method of moments, maximum likelihood, and least

More information

Chapter 9. Non-Parametric Density Function Estimation

Chapter 9. Non-Parametric Density Function Estimation 9-1 Density Estimation Version 1.2 Chapter 9 Non-Parametric Density Function Estimation 9.1. Introduction We have discussed several estimation techniques: method of moments, maximum likelihood, and least

More information

Stability and topology of scale-free networks under attack and defense strategies

Stability and topology of scale-free networks under attack and defense strategies Stability and topology of scale-free networks under attack and defense strategies Lazaros K. Gallos, Reuven Cohen 2, Panos Argyrakis, Armin Bunde 3, and Shlomo Havlin 2 Department of Physics, University

More information

Spontaneous recovery in dynamical networks

Spontaneous recovery in dynamical networks Spontaneous recovery in dynamical networks A) Model: Additional Technical Details and Discussion Here we provide a more extensive discussion of the technical details of the model. The model is based on

More information

Time Evolution in Diffusion and Quantum Mechanics. Paul Hughes & Daniel Martin

Time Evolution in Diffusion and Quantum Mechanics. Paul Hughes & Daniel Martin Time Evolution in Diffusion and Quantum Mechanics Paul Hughes & Daniel Martin April 29, 2005 Abstract The Diffusion and Time dependent Schrödinger equations were solved using both a Fourier based method

More information

Distributed Systems Gossip Algorithms

Distributed Systems Gossip Algorithms Distributed Systems Gossip Algorithms He Sun School of Informatics University of Edinburgh What is Gossip? Gossip algorithms In a gossip algorithm, each node in the network periodically exchanges information

More information

Branching Process Approach to Avalanche Dynamics on Complex Networks

Branching Process Approach to Avalanche Dynamics on Complex Networks Journal of the Korean Physical Society, Vol. 44, No. 3, March 2004, pp. 633 637 Branching Process Approach to Avalanche Dynamics on Complex Networks D.-S. Lee, K.-I. Goh, B. Kahng and D. Kim School of

More information

MONTE CARLO METHODS IN SEQUENTIAL AND PARALLEL COMPUTING OF 2D AND 3D ISING MODEL

MONTE CARLO METHODS IN SEQUENTIAL AND PARALLEL COMPUTING OF 2D AND 3D ISING MODEL Journal of Optoelectronics and Advanced Materials Vol. 5, No. 4, December 003, p. 971-976 MONTE CARLO METHODS IN SEQUENTIAL AND PARALLEL COMPUTING OF D AND 3D ISING MODEL M. Diaconu *, R. Puscasu, A. Stancu

More information

1 Using standard errors when comparing estimated values

1 Using standard errors when comparing estimated values MLPR Assignment Part : General comments Below are comments on some recurring issues I came across when marking the second part of the assignment, which I thought it would help to explain in more detail

More information

CHAPTER 1: Functions

CHAPTER 1: Functions CHAPTER 1: Functions 1.1: Functions 1.2: Graphs of Functions 1.3: Basic Graphs and Symmetry 1.4: Transformations 1.5: Piecewise-Defined Functions; Limits and Continuity in Calculus 1.6: Combining Functions

More information

arxiv:cond-mat/ v1 [cond-mat.other] 4 Aug 2004

arxiv:cond-mat/ v1 [cond-mat.other] 4 Aug 2004 Conservation laws for the voter model in complex networks arxiv:cond-mat/0408101v1 [cond-mat.other] 4 Aug 2004 Krzysztof Suchecki, 1,2 Víctor M. Eguíluz, 1 and Maxi San Miguel 1 1 Instituto Mediterráneo

More information

ECS 289 / MAE 298, Lecture 7 April 22, Percolation and Epidemiology on Networks, Part 2 Searching on networks

ECS 289 / MAE 298, Lecture 7 April 22, Percolation and Epidemiology on Networks, Part 2 Searching on networks ECS 289 / MAE 298, Lecture 7 April 22, 2014 Percolation and Epidemiology on Networks, Part 2 Searching on networks 28 project pitches turned in Announcements We are compiling them into one file to share

More information

TELCOM2125: Network Science and Analysis

TELCOM2125: Network Science and Analysis School of Information Sciences University of Pittsburgh TELCOM2125: Network Science and Analysis Konstantinos Pelechrinis Spring 2015 Figures are taken from: M.E.J. Newman, Networks: An Introduction 2

More information

Cascades on Temporal Networks

Cascades on Temporal Networks Cascades on Temporal Networks Georgios Kapros-Anastasiadis St Anne s College University of Oxford A thesis submitted for the degree of M.Sc. in Mathematical Modelling and Scientific Computing September

More information

Fundamentals of Dynamical Systems / Discrete-Time Models. Dr. Dylan McNamara people.uncw.edu/ mcnamarad

Fundamentals of Dynamical Systems / Discrete-Time Models. Dr. Dylan McNamara people.uncw.edu/ mcnamarad Fundamentals of Dynamical Systems / Discrete-Time Models Dr. Dylan McNamara people.uncw.edu/ mcnamarad Dynamical systems theory Considers how systems autonomously change along time Ranges from Newtonian

More information

Epidemics and information spreading

Epidemics and information spreading Epidemics and information spreading Leonid E. Zhukov School of Data Analysis and Artificial Intelligence Department of Computer Science National Research University Higher School of Economics Social Network

More information

Emergent Phenomena on Complex Networks

Emergent Phenomena on Complex Networks Chapter 1 Emergent Phenomena on Complex Networks 1.0.1 More is different When many interacting elements give rise to a collective behavior that cannot be explained or predicted by considering them individually,

More information

Controlling chaos in random Boolean networks

Controlling chaos in random Boolean networks EUROPHYSICS LETTERS 20 March 1997 Europhys. Lett., 37 (9), pp. 597-602 (1997) Controlling chaos in random Boolean networks B. Luque and R. V. Solé Complex Systems Research Group, Departament de Fisica

More information

MATH2206 Prob Stat/20.Jan Weekly Review 1-2

MATH2206 Prob Stat/20.Jan Weekly Review 1-2 MATH2206 Prob Stat/20.Jan.2017 Weekly Review 1-2 This week I explained the idea behind the formula of the well-known statistic standard deviation so that it is clear now why it is a measure of dispersion

More information

Stephen Scott.

Stephen Scott. 1 / 35 (Adapted from Ethem Alpaydin and Tom Mitchell) sscott@cse.unl.edu In Homework 1, you are (supposedly) 1 Choosing a data set 2 Extracting a test set of size > 30 3 Building a tree on the training

More information

Adaptive Dual Control

Adaptive Dual Control Adaptive Dual Control Björn Wittenmark Department of Automatic Control, Lund Institute of Technology Box 118, S-221 00 Lund, Sweden email: bjorn@control.lth.se Keywords: Dual control, stochastic control,

More information

13 Definite integrals

13 Definite integrals 3 Definite integrals Read: Boas h. 4. 3. Laurent series: Def.: Laurent series (LS). If f() is analytic in a region R, then converges in R, with a n = πi f() = a n ( ) n + n= n= f() ; b ( ) n+ n = πi b

More information

ECS 253 / MAE 253, Lecture 13 May 15, Diffusion, Cascades and Influence Mathematical models & generating functions

ECS 253 / MAE 253, Lecture 13 May 15, Diffusion, Cascades and Influence Mathematical models & generating functions ECS 253 / MAE 253, Lecture 13 May 15, 2018 Diffusion, Cascades and Influence Mathematical models & generating functions Last week: spatial flows and game theory on networks Optimal location of facilities

More information

UC Berkeley Haas School of Business Game Theory (EMBA 296 & EWMBA 211) Summer Social learning and bargaining (axiomatic approach)

UC Berkeley Haas School of Business Game Theory (EMBA 296 & EWMBA 211) Summer Social learning and bargaining (axiomatic approach) UC Berkeley Haas School of Business Game Theory (EMBA 296 & EWMBA 211) Summer 2015 Social learning and bargaining (axiomatic approach) Block 4 Jul 31 and Aug 1, 2015 Auction results Herd behavior and

More information

MULTI-PARAMETER MODELS OF INNOVATION DIFFUSION ON COMPLEX NETWORKS

MULTI-PARAMETER MODELS OF INNOVATION DIFFUSION ON COMPLEX NETWORKS SIAM J. APPLIED DYNAMICAL SYSTEMS Vol. xx, pp. x c xxxx Society for Industrial and Applied Mathematics x x MULTI-PARAMETER MODELS OF INNOVATION DIFFUSION ON COMPLEX NETWORKS N. J. McCullen, A. M. Rucklidge,

More information

Predicting AGI: What can we say when we know so little?

Predicting AGI: What can we say when we know so little? Predicting AGI: What can we say when we know so little? Fallenstein, Benja Mennen, Alex December 2, 2013 (Working Paper) 1 Time to taxi Our situation now looks fairly similar to our situation 20 years

More information

The Beginning of Graph Theory. Theory and Applications of Complex Networks. Eulerian paths. Graph Theory. Class Three. College of the Atlantic

The Beginning of Graph Theory. Theory and Applications of Complex Networks. Eulerian paths. Graph Theory. Class Three. College of the Atlantic Theory and Applications of Complex Networs 1 Theory and Applications of Complex Networs 2 Theory and Applications of Complex Networs Class Three The Beginning of Graph Theory Leonhard Euler wonders, can

More information

arxiv: v1 [physics.comp-ph] 14 Nov 2014

arxiv: v1 [physics.comp-ph] 14 Nov 2014 Variation of the critical percolation threshold in the Achlioptas processes Paraskevas Giazitzidis, 1 Isak Avramov, 2 and Panos Argyrakis 1 1 Department of Physics, University of Thessaloniki, 54124 Thessaloniki,

More information

CENTRAL OR POLARIZED PATTERNS IN COLLECTIVE ACTIONS

CENTRAL OR POLARIZED PATTERNS IN COLLECTIVE ACTIONS 1 IMITATION, LEARNING, AND COMMUNICATION: CENTRAL OR POLARIZED PATTERNS IN COLLECTIVE ACTIONS Ping Chen I.Prigogine Center for Studies in Statistical Mechanics and Complex Systems and IC2 Institute University

More information

Math 5a Reading Assignments for Sections

Math 5a Reading Assignments for Sections Math 5a Reading Assignments for Sections 4.1 4.5 Due Dates for Reading Assignments Note: There will be a very short online reading quiz (WebWork) on each reading assignment due one hour before class on

More information

Learning and Memory in Neural Networks

Learning and Memory in Neural Networks Learning and Memory in Neural Networks Guy Billings, Neuroinformatics Doctoral Training Centre, The School of Informatics, The University of Edinburgh, UK. Neural networks consist of computational units

More information

New Journal of Physics

New Journal of Physics New Journal of Physics The open access journal for physics Dynamics of competing ideas in complex social systems Yubo Wang 1, Gaoxi Xiao 1,3 and Jian Liu 2 1 School of Electrical and Electronic Engineering,

More information

An introduction to basic information theory. Hampus Wessman

An introduction to basic information theory. Hampus Wessman An introduction to basic information theory Hampus Wessman Abstract We give a short and simple introduction to basic information theory, by stripping away all the non-essentials. Theoretical bounds on

More information

Physics 127b: Statistical Mechanics. Renormalization Group: 1d Ising Model. Perturbation expansion

Physics 127b: Statistical Mechanics. Renormalization Group: 1d Ising Model. Perturbation expansion Physics 17b: Statistical Mechanics Renormalization Group: 1d Ising Model The ReNormalization Group (RNG) gives an understanding of scaling and universality, and provides various approximation schemes to

More information

Notes on induction proofs and recursive definitions

Notes on induction proofs and recursive definitions Notes on induction proofs and recursive definitions James Aspnes December 13, 2010 1 Simple induction Most of the proof techniques we ve talked about so far are only really useful for proving a property

More information

Physics 6720 Introduction to Statistics April 4, 2017

Physics 6720 Introduction to Statistics April 4, 2017 Physics 6720 Introduction to Statistics April 4, 2017 1 Statistics of Counting Often an experiment yields a result that can be classified according to a set of discrete events, giving rise to an integer

More information

Logistic systems with linear feedback

Logistic systems with linear feedback Journal of Physics: Conference Series PAPER OPEN ACCESS Logistic systems with linear feedback To cite this article: Leonid Son et al 06 J. Phys.: Conf. Ser. 738 0053 View the article online for updates

More information

At the start of the term, we saw the following formula for computing the sum of the first n integers:

At the start of the term, we saw the following formula for computing the sum of the first n integers: Chapter 11 Induction This chapter covers mathematical induction. 11.1 Introduction to induction At the start of the term, we saw the following formula for computing the sum of the first n integers: Claim

More information

Clustering with k-means and Gaussian mixture distributions

Clustering with k-means and Gaussian mixture distributions Clustering with k-means and Gaussian mixture distributions Machine Learning and Category Representation 2012-2013 Jakob Verbeek, ovember 23, 2012 Course website: http://lear.inrialpes.fr/~verbeek/mlcr.12.13

More information

Coarsening process in the 2d voter model

Coarsening process in the 2d voter model Alessandro Tartaglia (LPTHE) Coarsening in the 2d voter model May 8, 2015 1 / 34 Coarsening process in the 2d voter model Alessandro Tartaglia LPTHE, Université Pierre et Marie Curie alessandro.tartaglia91@gmail.com

More information

Preliminary Results on Social Learning with Partial Observations

Preliminary Results on Social Learning with Partial Observations Preliminary Results on Social Learning with Partial Observations Ilan Lobel, Daron Acemoglu, Munther Dahleh and Asuman Ozdaglar ABSTRACT We study a model of social learning with partial observations from

More information

Homework 9: Protein Folding & Simulated Annealing : Programming for Scientists Due: Thursday, April 14, 2016 at 11:59 PM

Homework 9: Protein Folding & Simulated Annealing : Programming for Scientists Due: Thursday, April 14, 2016 at 11:59 PM Homework 9: Protein Folding & Simulated Annealing 02-201: Programming for Scientists Due: Thursday, April 14, 2016 at 11:59 PM 1. Set up We re back to Go for this assignment. 1. Inside of your src directory,

More information

Ergodicity in data assimilation methods

Ergodicity in data assimilation methods Ergodicity in data assimilation methods David Kelly Andy Majda Xin Tong Courant Institute New York University New York NY www.dtbkelly.com April 15, 2016 ETH Zurich David Kelly (CIMS) Data assimilation

More information

Chapter 2 Direct Current Circuits

Chapter 2 Direct Current Circuits Chapter 2 Direct Current Circuits 2.1 Introduction Nowadays, our lives are increasingly dependent upon the availability of devices that make extensive use of electric circuits. The knowledge of the electrical

More information

Holme and Newman (2006) Evolving voter model. Extreme Cases. Community sizes N =3200, M =6400, γ =10. Our model: continuous time. Finite size scaling

Holme and Newman (2006) Evolving voter model. Extreme Cases. Community sizes N =3200, M =6400, γ =10. Our model: continuous time. Finite size scaling Evolving voter model Rick Durrett 1, James Gleeson 5, Alun Lloyd 4, Peter Mucha 3, Bill Shi 3, David Sivakoff 1, Josh Socolar 2,andChris Varghese 2 1. Duke Math, 2. Duke Physics, 3. UNC Math, 4. NC State

More information

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Intro to Learning Theory Date: 12/8/16

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Intro to Learning Theory Date: 12/8/16 600.463 Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Intro to Learning Theory Date: 12/8/16 25.1 Introduction Today we re going to talk about machine learning, but from an

More information

Machine Learning. Theory of Classification and Nonparametric Classifier. Lecture 2, January 16, What is theoretically the best classifier

Machine Learning. Theory of Classification and Nonparametric Classifier. Lecture 2, January 16, What is theoretically the best classifier Machine Learning 10-701/15 701/15-781, 781, Spring 2008 Theory of Classification and Nonparametric Classifier Eric Xing Lecture 2, January 16, 2006 Reading: Chap. 2,5 CB and handouts Outline What is theoretically

More information

8.1 Bifurcations of Equilibria

8.1 Bifurcations of Equilibria 1 81 Bifurcations of Equilibria Bifurcation theory studies qualitative changes in solutions as a parameter varies In general one could study the bifurcation theory of ODEs PDEs integro-differential equations

More information

Online Social Networks and Media. Opinion formation on social networks

Online Social Networks and Media. Opinion formation on social networks Online Social Networks and Media Opinion formation on social networks Diffusion of items So far we have assumed that what is being diffused in the network is some discrete item: E.g., a virus, a product,

More information

Variational Inference (11/04/13)

Variational Inference (11/04/13) STA561: Probabilistic machine learning Variational Inference (11/04/13) Lecturer: Barbara Engelhardt Scribes: Matt Dickenson, Alireza Samany, Tracy Schifeling 1 Introduction In this lecture we will further

More information

Latent voter model on random regular graphs

Latent voter model on random regular graphs Latent voter model on random regular graphs Shirshendu Chatterjee Cornell University (visiting Duke U.) Work in progress with Rick Durrett April 25, 2011 Outline Definition of voter model and duality with

More information

APPPHYS217 Tuesday 25 May 2010

APPPHYS217 Tuesday 25 May 2010 APPPHYS7 Tuesday 5 May Our aim today is to take a brief tour of some topics in nonlinear dynamics. Some good references include: [Perko] Lawrence Perko Differential Equations and Dynamical Systems (Springer-Verlag

More information