Explosion in branching processes and applications to epidemics in random graph models

Similar documents
arxiv: v1 [math.pr] 4 Feb 2016

DEGREE DISTRIBUTION OF SHORTEST PATH TREES AND BIAS OF NETWORK SAMPLING ALGORITHMS

Critical percolation on networks with given degrees. Souvik Dhara

CS224W: Analysis of Networks Jure Leskovec, Stanford University

Distances in Random Graphs with Finite Variance Degrees

abstract 1. Introduction

4: The Pandemic process

arxiv: v1 [math.pr] 27 Sep 2017

Universal techniques to analyze preferential attachment trees: Global and Local analysis

Lecture 10. Under Attack!

Random trees and branching processes

Stochastic processes on. random graphs. Remco van der Hofstad

6.207/14.15: Networks Lecture 4: Erdös-Renyi Graphs and Phase Transitions

Bootstrap Percolation on Periodic Trees

Three Disguises of 1 x = e λx

The dynamics of power laws

6.207/14.15: Networks Lecture 12: Generalized Random Graphs

Finding Rumor Sources on Random Trees

1 Mechanistic and generative models of network structure

Systemic Risk in Stochastic Financial Networks

The Minesweeper game: Percolation and Complexity

The diameter and mixing time of critical random graphs.

Modeling, Analysis, and Control of Information Propagation in Multi-layer and Multiplex Networks. Osman Yağan

Random graphs: Random geometric graphs

THE SECOND LARGEST COMPONENT IN THE SUPERCRITICAL 2D HAMMING GRAPH

7.4* General logarithmic and exponential functions

Distributed Systems Gossip Algorithms

Shortest Paths & Link Weight Structure in Networks

Practical conditions on Markov chains for weak convergence of tail empirical processes

Percolation in Complex Networks: Optimal Paths and Optimal Networks

n! (k 1)!(n k)! = F (X) U(0, 1). (x, y) = n(n 1) ( F (y) F (x) ) n 2

Epidemic spreading is always possible on regular networks

arxiv: v1 [math.pr] 24 Sep 2009

Branching within branching: a general model for host-parasite co-evolution

Erdős-Renyi random graphs basics

Topic 1: a paper The asymmetric one-dimensional constrained Ising model by David Aldous and Persi Diaconis. J. Statistical Physics 2002.

SIS epidemics on Networks

Threshold Parameter for a Random Graph Epidemic Model

Epidemics in Complex Networks and Phase Transitions

The tail does not determine the size of the giant

Random Geometric Graphs

Concentration of Measures by Bounded Size Bias Couplings

Mixing time and diameter in random graphs

Transmission in finite populations

First order logic on Galton-Watson trees

PERCOLATION IN SELFISH SOCIAL NETWORKS

Small-world phenomenon on random graphs

On the robustness of power-law random graphs in the finite mean, infinite variance region

The Spreading of Epidemics in Complex Networks

Lecture 06 01/31/ Proofs for emergence of giant component

The Contact Process on the Complete Graph with Random, Vertex-dependent, Infection Rates

THE DIAMETER OF WEIGHTED RANDOM GRAPHS. By Hamed Amini and Marc Lelarge EPFL and INRIA

arxiv: v1 [math.st] 1 Nov 2017

Phase Transitions in Artificial Intelligence

Social Networks- Stanley Milgram (1967)

MIXING TIMES OF RANDOM WALKS ON DYNAMIC CONFIGURATION MODELS

Superstar Model: ReTweets, Lady Gaga and Surgery on a Branching Process

Oberwolfach workshop on Combinatorics and Probability

3.1 Review: x m. Fall

On a Local Version of the Bak-Sneppen Model

Age-dependent branching processes with incubation

ALMOST SURE CONVERGENCE OF RANDOM GOSSIP ALGORITHMS

CS224W: Analysis of Networks Jure Leskovec, Stanford University

Connection to Branching Random Walk

Problems on Evolutionary dynamics

Networks as a tool for Complex systems

Susceptible-Infective-Removed Epidemics and Erdős-Rényi random

process on the hierarchical group

Crump Mode Jagers processes with neutral Poissonian mutations

Estimation of the functional Weibull-tail coefficient

The giant component in a random subgraph of a given graph

The Contour Process of Crump-Mode-Jagers Branching Processes

arxiv: v1 [math.co] 8 Aug 2018

SIR epidemics on random graphs with clustering

Stochastic Viral Dynamics with Beddington-DeAngelis Functional Response

Value-Ordering and Discrepancies. Ciaran McCreesh and Patrick Prosser

Metastability for the Ising model on a random graph

On a stochastic epidemic SEIHR model and its diffusion approximation

Almost giant clusters for percolation on large trees

Discrete random structures whose limits are described by a PDE: 3 open problems

, and rewards and transition matrices as shown below:

Notes on MapReduce Algorithms

Network Infusion to Infer Information Sources in Networks Soheil Feizi, Ken Duffy, Manolis Kellis, and Muriel Medard

Reproduction numbers for epidemic models with households and other social structures I: Definition and calculation of R 0

Tail inequalities for additive functionals and empirical processes of. Markov chains

Assignment 2 : Probabilistic Methods

Partially Observed Stochastic Epidemics

arxiv: v2 [math.pr] 23 Feb 2017

Interlude: Practice Final

Concentration of Measures by Bounded Couplings

) = nlog b ( m) ( m) log b ( ) ( ) = log a b ( ) Algebra 2 (1) Semester 2. Exponents and Logarithmic Functions

Finite rooted tree. Each vertex v defines a subtree rooted at v. Picking v at random (uniformly) gives the random fringe subtree.

arxiv: v1 [math.pr] 13 Dec 2017

3.2 Configuration model

Universality of weighted scale-free configuration models

Lecture 7: The Subgraph Isomorphism Problem

Random measures, intersections, and applications

arxiv: v1 [math.pr] 25 Mar 2016

MCMC 2: Lecture 2 Coding and output. Phil O Neill Theo Kypraios School of Mathematical Sciences University of Nottingham

Modern Discrete Probability Branching processes

Transcription:

Explosion in branching processes and applications to epidemics in random graph models Júlia Komjáthy joint with Enrico Baroni and Remco van der Hofstad Eindhoven University of Technology Advances on Epidemics in Complex Networks 31 Aug 2017 Júlia Komjáthy (TU/e) 1 / 44

Class of processes on networks Spreading processes Júlia Komjáthy (TU/e) 2 / 44

Class of processes on networks Information diffusion Júlia Komjáthy (TU/e) 2 / 44

Class of processes on networks Includes Júlia Komjáthy (TU/e) 2 / 44

Viruses Júlia Komjáthy (TU/e) 3 / 44

Viruses The spread of the west-nile-virus Júlia Komjáthy (TU/e) 4 / 44

Viruses The spread of the Zika virus Júlia Komjáthy (TU/e) 5 / 44

Memes Júlia Komjáthy (TU/e) 6 / 44

Memes Júlia Komjáthy (TU/e) 7 / 44

Viral videos Júlia Komjáthy (TU/e) 8 / 44

Extremely fast spread Search intensity of Gangnam style from knowyourmeme.com Júlia Komjáthy (TU/e) 9 / 44

Extremely fast spread Search intensity of the Slenderman meme from knowyourmeme.com Júlia Komjáthy (TU/e) 10 / 44

Extremely fast spread Epidemic curve of a flu from China from Center for Infectious Disease Research and Policy Júlia Komjáthy (TU/e) 11 / 44

Modeling We need models! Júlia Komjáthy (TU/e) 12 / 44

The scale-free property Many real-life networks have power-law degrees. Júlia Komjáthy (TU/e) 13 / 44

The scale-free property Many real-life networks have power-law degrees. Power-law paradigm For some τ > 2, the degree of a uniformly chosen vertex satisfies P(deg(v) = x) C x τ Júlia Komjáthy (TU/e) 13 / 44

The scale-free property Many real-life networks have power-law degrees. Power-law paradigm For some τ > 2, the degree of a uniformly chosen vertex satisfies P(deg(v) = x) C x τ log P(deg(v) = x) log C τ log x log(proportion of degree x vertices) vs log x is a straight line. Júlia Komjáthy (TU/e) 13 / 44

Power laws Degree distribution of the router level internet network from Faloutsos, Faloutsos, Faloutsos. 1999 Júlia Komjáthy (TU/e) 14 / 44

Power laws Degree distribution of ecological networks from Montoya, Pimm, Polé. Nature 2006 Júlia Komjáthy (TU/e) 15 / 44

Power laws Note: τ (2, 3) often! When τ (2, 3) then Var n [deg(v)] and E n [deg(v)] <. Júlia Komjáthy (TU/e) 16 / 44

Choice of model Configuration model Júlia Komjáthy (TU/e) 17 / 44

The configuration model Matches the degree sequence of the network you would like to model. [Configuration model simulator by Robert Fitzner] [Configuration model with power law degrees by Robert Fitzner] Júlia Komjáthy (TU/e) 18 / 44

The configuration model Matches the degree sequence of the network you would like to model. [Configuration model simulator by Robert Fitzner] [Configuration model with power law degrees by Robert Fitzner] Power-law assumption For some τ (2, 3), the tail of the empirical degree distribution satisfies c 1 x τ 1 [1 F n](x) = P(deg(v n ) x) C 1 x τ 1 Júlia Komjáthy (TU/e) 18 / 44

Weighted Configuration model Júlia Komjáthy (TU/e) 19 / 44

Weighted Configuration model Information diffusion Transmission times through edges are random in real networks. Modeling: each edge has an independent weight from the same distribution σ. Júlia Komjáthy (TU/e) 19 / 44

Weighted Configuration model Information diffusion Transmission times through edges are random in real networks. Modeling: each edge has an independent weight from the same distribution σ. Independence might not hold in real-life, but makes the analysis tractable. Júlia Komjáthy (TU/e) 19 / 44

Weighted Configuration model Information diffusion Transmission times through edges are random in real networks. Modeling: each edge has an independent weight from the same distribution σ. Independence might not hold in real-life, but makes the analysis tractable. Spreading time = weighted distance The spreading time between two vertices u, v = the weighted distance: d σ (u, v) Júlia Komjáthy (TU/e) 19 / 44

Weighted Configuration model Information diffusion Transmission times through edges are random in real networks. Modeling: each edge has an independent weight from the same distribution σ. Independence might not hold in real-life, but makes the analysis tractable. Spreading time = weighted distance The spreading time between two vertices u, v = the weighted distance: d σ (u, v) How does d σ (u, v) behave in terms of the degrees and the edge-weight distribution σ? Júlia Komjáthy (TU/e) 19 / 44

The epidemic curve Epidemic curve Considering vertex u as a (single) source of infection, σ e as the transmission time of an infection through edge e, the epidemic curve is defined as I u (t) = 1 1 V dσ(u,v) t. v V Júlia Komjáthy (TU/e) 20 / 44

The epidemic curve Epidemic curve Considering vertex u as a (single) source of infection, σ e as the transmission time of an infection through edge e, the epidemic curve is defined as I u (t) = 1 1 V dσ(u,v) t. v V How does I u (t) behave, in terms of the degree distribution, the edge-length distribution σ, and the source vertex u? Júlia Komjáthy (TU/e) 20 / 44

Locally tree-like structure Local neighborhoods look like random trees with size biased degrees. Júlia Komjáthy (TU/e) 21 / 44

Locally tree-like structure Local neighborhoods look like random trees with size biased degrees. Size-biasing effect A neighbor of a uniform vertex is more likely to have larger degree P ( deg(neighbor(v)) > x ) Cx x τ 1 = C x τ 2 Júlia Komjáthy (TU/e) 21 / 44

Preliminaries Initial stage of the spreading in the graph looks like a random tree with power law degrees, tail exponent α := τ 2 (0, 1) each edge has an independent length or weight Júlia Komjáthy (TU/e) 22 / 44

Age-dependent branching process In an age-dependent branching process BP(X, σ) Júlia Komjáthy (TU/e) 23 / 44

Age-dependent branching process In an age-dependent branching process BP(X, σ) root is born at time 0, Júlia Komjáthy (TU/e) 23 / 44

Age-dependent branching process In an age-dependent branching process BP(X, σ) root is born at time 0, the number of children of each individual is independent, from distribution X, Júlia Komjáthy (TU/e) 23 / 44

Age-dependent branching process In an age-dependent branching process BP(X, σ) root is born at time 0, the number of children of each individual is independent, from distribution X, birth-times of children are independent, from some distribution σ. Júlia Komjáthy (TU/e) 23 / 44

Age-dependent branching process In an age-dependent branching process BP(X, σ) root is born at time 0, the number of children of each individual is independent, from distribution X, birth-times of children are independent, from some distribution σ. Júlia Komjáthy (TU/e) 23 / 44

Explosion? Definition D(t) = population born by time t. Júlia Komjáthy (TU/e) 24 / 44

Explosion? Definition D(t) = population born by time t. A branching process is explosive if for some t > 0, P( D(t) = ) > 0. Júlia Komjáthy (TU/e) 24 / 44

Explosion? Definition D(t) = population born by time t. A branching process is explosive if for some t > 0, Otherwise conservative. P( D(t) = ) > 0. Júlia Komjáthy (TU/e) 24 / 44

Explosion? Definition D(t) = population born by time t. A branching process is explosive if for some t > 0, Otherwise conservative. Explosive vs conservative P( D(t) = ) > 0. When is a branching process BP(X, σ) explosive? Júlia Komjáthy (TU/e) 24 / 44

Explosion of BPs Theorem (Amini, Devroye, Griffith, Olver) Assume for x large enough and some ε > 0 1 1 > P(X > x) > x ε x 1 ε. (P2) Júlia Komjáthy (TU/e) 25 / 44

Explosion of BPs Theorem (Amini, Devroye, Griffith, Olver) Assume for x large enough and some ε > 0 1 1 > P(X > x) > x ε x 1 ε. (P2) The branching process BP(X, σ) is explosive if and only if for some K > 0 K ( ) F σ ( 1) e ek < where F ( 1) σ is the generalised inverse of the distribution function of σ. (I) Júlia Komjáthy (TU/e) 25 / 44

Explosion of BPs Theorem (Amini, Devroye, Griffith, Olver) Assume for x large enough and some ε > 0 1 1 > P(X > x) > x ε x 1 ε. (P2) The branching process BP(X, σ) is explosive if and only if for some K > 0 K ( ) F σ ( 1) e ek < where F ( 1) σ is the generalised inverse of the distribution function of σ. Corollary If a distribution σ satisfies (I) then it explodes for all X satisfying (P2) (including all power law degrees with τ (2, 3)). (I) Júlia Komjáthy (TU/e) 25 / 44

Explosive σ-s ( k K ) F σ ( 1) e ek < is easy to check. Júlia Komjáthy (TU/e) 26 / 44

Explosive σ-s ( k K ) F σ ( 1) e ek < is easy to check. Examples Flatness of distribution function F σ at the origin matters. Exponential, Gamma, Uniform, etc. Júlia Komjáthy (TU/e) 26 / 44

Explosive σ-s ( k K ) F σ ( 1) e ek < is easy to check. Examples Flatness of distribution function F σ at the origin matters. Exponential, Gamma, Uniform, etc. F σ (t) = exp{ 1/t β }, β > 0 Júlia Komjáthy (TU/e) 26 / 44

Explosive σ-s ( k K ) F σ ( 1) e ek < is easy to check. Examples Flatness of distribution function F σ at the origin matters. Exponential, Gamma, Uniform, etc. F σ (t) = exp{ 1/t β }, β > 0 Boundary case: F σ (t) = exp{ exp{ 1 t β }}. Explosive for β < 1, conservative for β 1. Júlia Komjáthy (TU/e) 26 / 44

Explosive σ-s ( k K ) F σ ( 1) e ek < is easy to check. Examples Flatness of distribution function F σ at the origin matters. Exponential, Gamma, Uniform, etc. F σ (t) = exp{ 1/t β }, β > 0 Boundary case: F σ (t) = exp{ exp{ 1 t β }}. Explosive for β < 1, conservative for β 1. F σ does not have to be continuous to satisfy (I): e.g. put point-mass c k 1 /(1 c) to points at ck 2, for c 1, c 2 < 1. Júlia Komjáthy (TU/e) 26 / 44

Application to epidemics in random graphs Júlia Komjáthy (TU/e) 27 / 44

Explosive weights on the configuration model Theorem (Baroni, van der Hofstad, K) Consider the configuration model with Júlia Komjáthy (TU/e) 28 / 44

Explosive weights on the configuration model Theorem (Baroni, van der Hofstad, K) Consider the configuration model with power-law degree distribution with exponent τ (2, 3) Júlia Komjáthy (TU/e) 28 / 44

Explosive weights on the configuration model Theorem (Baroni, van der Hofstad, K) Consider the configuration model with power-law degree distribution with exponent τ (2, 3) independent edge weights from distribution σ. Júlia Komjáthy (TU/e) 28 / 44

Explosive weights on the configuration model Theorem (Baroni, van der Hofstad, K) Consider the configuration model with power-law degree distribution with exponent τ (2, 3) independent edge weights from distribution σ. If the branching process BP(D, σ) is explosive, lim d σ(u, v) = V (u) + V (v) n in the distributional sense. V (u), V (v) explosion times of two copies of BP(D, σ), with D =size biased degree, u, v two uniformly chosen vertices. Júlia Komjáthy (TU/e) 28 / 44

Explosive weights on the configuration model Theorem (Baroni, van der Hofstad, K) Consider the configuration model with power-law degree distribution with exponent τ (2, 3) independent edge weights from distribution σ. If the branching process BP(D, σ) is explosive, lim d σ(u, v) = V (u) + V (v) n in the distributional sense. V (u), V (v) explosion times of two copies of BP(D, σ), with D =size biased degree, u, v two uniformly chosen vertices. Otherwise d σ (u, v). Júlia Komjáthy (TU/e) 28 / 44

Explosive weights on the configuration model Theorem (Baroni, van der Hofstad, K) Consider the configuration model with power-law degree distribution with exponent τ (2, 3) independent edge weights from distribution σ. If the branching process BP(D, σ) is explosive, lim d σ(u, v) = V (u) + V (v) n in the distributional sense. V (u), V (v) explosion times of two copies of BP(D, σ), with D =size biased degree, u, v two uniformly chosen vertices. Otherwise d σ (u, v). This was first shown for exponential edge weights by Bhamidi, Hofstad & Hooghiemstra. Júlia Komjáthy (TU/e) 28 / 44

Corrollary: Epidemic curve in the explosive case Recall I u (t) = 1 V v V 1 d σ(u,v) t is the epidemic curve. Convergence of the epidemic curve Consider an epidemic started at a single, uniformly chosen vertex u V. Then P I u (t) f (t V (u) ) = P(V (u) + V (v) t V (u) ) A deterministic curve with a random but constant shift V (u). Júlia Komjáthy (TU/e) 29 / 44

Conservative weights on the configuration model Theorem (Adriaans, K unpublished) Consider the configuration model with Júlia Komjáthy (TU/e) 30 / 44

Conservative weights on the configuration model Theorem (Adriaans, K unpublished) Consider the configuration model with power-law degree distribution with exponent τ (2, 3) Júlia Komjáthy (TU/e) 30 / 44

Conservative weights on the configuration model Theorem (Adriaans, K unpublished) Consider the configuration model with power-law degree distribution with exponent τ (2, 3) independent edge weights from distribution σ. Júlia Komjáthy (TU/e) 30 / 44

Conservative weights on the configuration model Theorem (Adriaans, K unpublished) Consider the configuration model with power-law degree distribution with exponent τ (2, 3) independent edge weights from distribution σ. If BP(D, σ) is conservative, then for all ε > 0, P d σ (u, w) (1 ε, 1 + ε) 1. Júlia Komjáthy (TU/e) 30 / 44

Conservative weights on the configuration model Theorem (Adriaans, K unpublished) Consider the configuration model with power-law degree distribution with exponent τ (2, 3) independent edge weights from distribution σ. If BP(D, σ) is conservative, then for all ε > 0, P d σ (u, w) 2 log log n/ log(τ 2) k=1 (1 ε, 1 + ε) 1. Gives back the main term graph distances by setting σ 1. Júlia Komjáthy (TU/e) 30 / 44

Conservative weights on the configuration model Theorem (Adriaans, K unpublished) Consider the configuration model with power-law degree distribution with exponent τ (2, 3) independent edge weights from distribution σ. If BP(D, σ) is conservative, then for all ε > 0, P d σ (u, w) 2 ( log log n/ log(τ 2) k=1 F σ ( 1) exp ( (1 ε, 1 + ε) 1. ( 1 τ 2 )k)) Gives back the main term graph distances by setting σ 1. Júlia Komjáthy (TU/e) 30 / 44

Not enough... For an epidemic curve one would need distributional convergence of the fluctuations of d σ (u, v) around 2 ( log log n/ log(τ 2) k=1 F σ ( 1) exp ( ( 1 τ 2 )k)) which is not known/not possible to show with our current methods. Júlia Komjáthy (TU/e) 31 / 44

When τ > 3 τ (2, 3) Dichotomy: bounded average distance for explosive weight distributions, non-bounded average distance for conservative weight distributions Theorem (Bhamidi, Hofstad, Hooghiemstra) Universally, for all σ that have a density, d σ (u, v) = 1 log n + tight, λ where λ is the Malthusian parameter (exponential growth rate) of the embedded BP. Júlia Komjáthy (TU/e) 32 / 44

Generalisation to spatial models Two scale free spatial models Geometric Random Inhomogeneous Random Graphs vertices = n uniform points in [0, n 1/d ] d Scale free percolation: vertex set is Z d. In both models, each vertex v gets a weight W v and two vertices are connected ( ) W u W v P(u v W u, W v ) = Θ min{1, u v α } Theorems [K&Lodewijks, v/d Hofstad&K] Both the explosive and conservative results carry through for these models. Júlia Komjáthy (TU/e) 33 / 44

Epidemics with contagious intervals In a model of an epidemic (X, σ, [I, C]), each individual v, after being infected at some time t v, Júlia Komjáthy (TU/e) 34 / 44

Epidemics with contagious intervals In a model of an epidemic (X, σ, [I, C]), each individual v, after being infected at some time t v, contacts its neighbors at times t v + (σ (v) i ) i X i.i.d. d = σ, Júlia Komjáthy (TU/e) 34 / 44

Epidemics with contagious intervals In a model of an epidemic (X, σ, [I, C]), each individual v, after being infected at some time t v, contacts its neighbors at times t v + (σ (v) i ) i X i.i.d. contagious in an i.i.d. random interval t v + [I v, C v ], d = σ, Júlia Komjáthy (TU/e) 34 / 44

Epidemics with contagious intervals In a model of an epidemic (X, σ, [I, C]), each individual v, after being infected at some time t v, contacts its neighbors at times t v + (σ (v) i ) i X i.i.d. contagious in an i.i.d. random interval t v + [I v, C v ], d = σ, only those friends will be infected that satisfy σ (v) i [I v, C v ]. Júlia Komjáthy (TU/e) 34 / 44

Epidemics with contagious intervals In a model of an epidemic (X, σ, [I, C]), each individual v, after being infected at some time t v, contacts its neighbors at times t v + (σ (v) ) i X i.i.d. i d = σ, contagious in an i.i.d. random interval t v + [I v, C v ], only those friends will be infected that satisfy σ (v) i [I v, C v ]. Júlia Komjáthy (TU/e) 34 / 44

Epidemics with contagious intervals In a model of an epidemic (X, σ, [I, C]), each individual v, after being infected at some time t v, contacts its neighbors at times t v + (σ (v) ) i X i.i.d. i d = σ, contagious in an i.i.d. random interval t v + [I v, C v ], only those friends will be infected that satisfy σ (v) i [I v, C v ]. Júlia Komjáthy (TU/e) 34 / 44

Epidemics with contagious intervals In a model of an epidemic (X, σ, [I, C]), each individual v, after being infected at some time t v, contacts its neighbors at times t v + (σ (v) ) i X i.i.d. i d = σ, contagious in an i.i.d. random interval t v + [I v, C v ], only those friends will be infected that satisfy σ (v) i [I v, C v ]. Júlia Komjáthy (TU/e) 34 / 44

Epidemics with contagious intervals In a model of an epidemic (X, σ, [I, C]), each individual v, after being infected at some time t v, contacts its neighbors at times t v + (σ (v) ) i X i.i.d. i d = σ, contagious in an i.i.d. random interval t v + [I v, C v ], only those friends will be infected that satisfy σ (v) i [I v, C v ]. Júlia Komjáthy (TU/e) 34 / 44

Explosion in this case? Epidemics with contagious intervals When is a triplet (X, σ, [I, C]) explosive? Can the explosion of BP(X, σ) be stopped by adding [I, C] to it? Júlia Komjáthy (TU/e) 35 / 44

Getting rid of end of interval Heuristics: Explosion is carried by short edges, so deleting long edges does not matter. Júlia Komjáthy (TU/e) 36 / 44

Getting rid of end of interval Heuristics: Explosion is carried by short edges, so deleting long edges does not matter. Theorem (K) Suppose X satisfies (P2) and [I, C] satisfies t 0, δ > 0 P(C > t I = i) δ i < t < t 0. ( ) Then (X, σ, [I, C]) explosive (X, σ, [I, ]) explosive. Júlia Komjáthy (TU/e) 36 / 44

Getting rid of end of interval Heuristics: Explosion is carried by short edges, so deleting long edges does not matter. Theorem (K) Suppose X satisfies (P2) and [I, C] satisfies t 0, δ > 0 P(C > t I = i) δ i < t < t 0. ( ) Then (X, σ, [I, C]) explosive (X, σ, [I, ]) explosive. Natural condition Condition ( ) on [I, C] is satisfied if Júlia Komjáthy (TU/e) 36 / 44

Getting rid of end of interval Heuristics: Explosion is carried by short edges, so deleting long edges does not matter. Theorem (K) Suppose X satisfies (P2) and [I, C] satisfies t 0, δ > 0 P(C > t I = i) δ i < t < t 0. ( ) Then (X, σ, [I, C]) explosive (X, σ, [I, ]) explosive. Natural condition Condition ( ) on [I, C] is satisfied if I, C independent, C 0. Júlia Komjáthy (TU/e) 36 / 44

Getting rid of end of interval Heuristics: Explosion is carried by short edges, so deleting long edges does not matter. Theorem (K) Suppose X satisfies (P2) and [I, C] satisfies t 0, δ > 0 P(C > t I = i) δ i < t < t 0. ( ) Then (X, σ, [I, C]) explosive (X, σ, [I, ]) explosive. Natural condition Condition ( ) on [I, C] is satisfied if I, C independent, C 0. C = I + L with I, L independent, L 0. Júlia Komjáthy (TU/e) 36 / 44

Getting rid of end of interval Heuristics: Explosion is carried by short edges, so deleting long edges does not matter. Theorem (K) Suppose X satisfies (P2) and [I, C] satisfies t 0, δ > 0 P(C > t I = i) δ i < t < t 0. ( ) Then (X, σ, [I, C]) explosive (X, σ, [I, ]) explosive. Natural condition Condition ( ) on [I, C] is satisfied if I, C independent, C 0. C = I + L with I, L independent, L 0. It means that the support of I, L is not concentrated on a slented wedge separating the support from the L axes. Júlia Komjáthy (TU/e) 36 / 44

Explosion of epidemics with incubation time Heuristics: Explosion is carried by short edges, so deleting short edges does matter. Júlia Komjáthy (TU/e) 37 / 44

Explosion of epidemics with incubation time Heuristics: Explosion is carried by short edges, so deleting short edges does matter. Theorem (K) Suppose X satisfies (P2), then BP(X, σ, [I, ]) explosive BP(X, σ), BP(X, I ) both explosive. Júlia Komjáthy (TU/e) 37 / 44

Explosion of epidemics with incubation time Heuristics: Explosion is carried by short edges, so deleting short edges does matter. Theorem (K) Suppose X satisfies (P2), then BP(X, σ, [I, ]) explosive BP(X, σ), BP(X, I ) both explosive. Coupling argument: If (X, I ) does not explode, all its rays have infinite length Júlia Komjáthy (TU/e) 37 / 44

Explosion of epidemics with incubation time Heuristics: Explosion is carried by short edges, so deleting short edges does matter. Theorem (K) Suppose X satisfies (P2), then BP(X, σ, [I, ]) explosive BP(X, σ), BP(X, I ) both explosive. Coupling argument: If (X, I ) does not explode, all its rays have infinite length Júlia Komjáthy (TU/e) 37 / 44

Explosion of epidemics with incubation time Heuristics: Explosion is carried by short edges, so deleting short edges does matter. Theorem (K) Suppose X satisfies (P2), then BP(X, σ, [I, ]) explosive BP(X, σ), BP(X, I ) both explosive. Coupling argument: If (X, I ) does not explode, all its rays have infinite length in (X, σ, [I, ]) only edges with σ v > I v are kept, Júlia Komjáthy (TU/e) 37 / 44

Explosion of epidemics with incubation time Heuristics: Explosion is carried by short edges, so deleting short edges does matter. Theorem (K) Suppose X satisfies (P2), then BP(X, σ, [I, ]) explosive BP(X, σ), BP(X, I ) both explosive. Coupling argument: If (X, I ) does not explode, all its rays have infinite length in (X, σ, [I, ]) only edges with σ v > I v are kept, and (X, I ) is conservative Júlia Komjáthy (TU/e) 37 / 44

Explosion of epidemics with incubation time Heuristics: Explosion is carried by short edges, so deleting short edges does matter. Theorem (K) Suppose X satisfies (P2), then BP(X, σ, [I, ]) explosive BP(X, σ), BP(X, I ) both explosive. Coupling argument: If (X, I ) does not explode, all its rays have infinite length in (X, σ, [I, ]) only edges with σ v > I v are kept, and (X, I ) is conservative so (X, σ, [I, ]) does not explode either. Júlia Komjáthy (TU/e) 37 / 44

Explosion of epidemics with incubation time Heuristics: Explosion is carried by short edges, so deleting short edges does matter. Theorem (K) Suppose X satisfies (P2), then BP(X, σ, [I, ]) explosive BP(X, σ), BP(X, I ) both explosive. Coupling argument: If (X, I ) does not explode, all its rays have infinite length in (X, σ, [I, ]) only edges with σ v > I v are kept, and (X, I ) is conservative so (X, σ, [I, ]) does not explode either. Other way round trickier... Júlia Komjáthy (TU/e) 37 / 44

Epidemics on the configuration model Theorem (K, unpublished) Consider the epidemic model on the configuration model with Júlia Komjáthy (TU/e) 38 / 44

Epidemics on the configuration model Theorem (K, unpublished) Consider the epidemic model on the configuration model with power-law degrees with τ (2, 3) Júlia Komjáthy (TU/e) 38 / 44

Epidemics on the configuration model Theorem (K, unpublished) Consider the epidemic model on the configuration model with power-law degrees with τ (2, 3) i.i.d. contact times on edges = d σ Júlia Komjáthy (TU/e) 38 / 44

Epidemics on the configuration model Theorem (K, unpublished) Consider the epidemic model on the configuration model with power-law degrees with τ (2, 3) i.i.d. contact times on edges = d σ i.i.d. contagious intervals on vertices = d [I, C]. Júlia Komjáthy (TU/e) 38 / 44

Epidemics on the configuration model Theorem (K, unpublished) Consider the epidemic model on the configuration model with power-law degrees with τ (2, 3) i.i.d. contact times on edges = d σ i.i.d. contagious intervals on vertices = d [I, C]. u, v chosen uniformly at random Júlia Komjáthy (TU/e) 38 / 44

Epidemics on the configuration model Theorem (K, unpublished) Consider the epidemic model on the configuration model with power-law degrees with τ (2, 3) i.i.d. contact times on edges d = σ i.i.d. contagious intervals on vertices d = [I, C]. u, v chosen uniformly at random For the infection started from u, the time it takes to infect v: d epi (u, v) if and only if (D, σ, [I, C]) is explosive, d V (u) + V (v) bw Júlia Komjáthy (TU/e) 38 / 44

Epidemics on the configuration model Theorem (K, unpublished) Consider the epidemic model on the configuration model with power-law degrees with τ (2, 3) i.i.d. contact times on edges d = σ i.i.d. contagious intervals on vertices d = [I, C]. u, v chosen uniformly at random For the infection started from u, the time it takes to infect v: d epi (u, v) d V (u) + V (v) bw if and only if (D, σ, [I, C]) is explosive, finite iff both Epi (u) and Epi (w) bw survives. V (u) explosion time, V (w) bw explosion time of the backward epidemics. Júlia Komjáthy (TU/e) 38 / 44

Epidemics on the configuration model Theorem (K, unpublished) Consider the epidemic model on the configuration model with power-law degrees with τ (2, 3) i.i.d. contact times on edges d = σ i.i.d. contagious intervals on vertices d = [I, C]. u, v chosen uniformly at random The epidemic curve of u: f epi (t) = 1 n n w=1 1 {w infected before t} d P(V (w) bw t V (u) V (u) ) a deterministic curve with a random shift, conditioned that Epi (u) survives. V (u) explosion time, V (w) bw explosion time of the backward epidemic. Júlia Komjáthy (TU/e) 38 / 44

Picture-proof of explosion Júlia Komjáthy (TU/e) 39 / 44

Picture-proof of explosion Júlia Komjáthy (TU/e) 39 / 44

Picture-proof of explosion Júlia Komjáthy (TU/e) 39 / 44

Picture-proof of explosion Júlia Komjáthy (TU/e) 39 / 44

Picture-proof of explosion Júlia Komjáthy (TU/e) 39 / 44

Picture-proof of explosion Júlia Komjáthy (TU/e) 39 / 44

Picture-proof of explosion Júlia Komjáthy (TU/e) 39 / 44

Picture-proof of explosion Júlia Komjáthy (TU/e) 39 / 44

Picture-proof of explosion Júlia Komjáthy (TU/e) 39 / 44

Non-picture-proof Step 1: Couple the initial stages of the spreading by two independent age dependent BPs, one started at u, one at v, until generation M n for some small M n = o(log n). Júlia Komjáthy (TU/e) 40 / 44

Non-picture-proof Step 1: Couple the initial stages of the spreading by two independent age dependent BPs, one started at u, one at v, until generation M n for some small M n = o(log n). Step 2: Use degree dependent percolation to percolate the whole graph: edges connecting vertices with degrees d 1, d 2 are kept iff their length is < tr(d 1, d 2 ) for some well-chosen threshold function. Júlia Komjáthy (TU/e) 40 / 44

Non-picture-proof Step 1: Couple the initial stages of the spreading by two independent age dependent BPs, one started at u, one at v, until generation M n for some small M n = o(log n). Step 2: Use degree dependent percolation to percolate the whole graph: edges connecting vertices with degrees d 1, d 2 are kept iff their length is < tr(d 1, d 2 ) for some well-chosen threshold function. Step 3: Find two vertices ũ, ṽ with high enough percolated degree (say K n ) in the two BPs Júlia Komjáthy (TU/e) 40 / 44

Non-picture-proof Step 1: Couple the initial stages of the spreading by two independent age dependent BPs, one started at u, one at v, until generation M n for some small M n = o(log n). Step 2: Use degree dependent percolation to percolate the whole graph: edges connecting vertices with degrees d 1, d 2 are kept iff their length is < tr(d 1, d 2 ) for some well-chosen threshold function. Step 3: Find two vertices ũ, ṽ with high enough percolated degree (say K n ) in the two BPs Step 4: Show that in the percolated subgraph, there is a nested layering starting with degree K n with the property that a vertex in layer i is connected to at least one vertex in layer i + 1, and the degrees deg v in layer i is K 1/(τ 2)i n. Júlia Komjáthy (TU/e) 40 / 44

Non-picture-proof Step 5: Show that ũ, ṽ falls into layer 1. Thus # layers d L (u, v) d L (u, ũ) + d L (v, ṽ) + 2 i=1 F 1 σ ) (tr(kn 1/(τ 2)i, Kn 1/(τ 2)i+1 ). Júlia Komjáthy (TU/e) 41 / 44

Non-picture-proof Step 5: Show that ũ, ṽ falls into layer 1. Thus # layers d L (u, v) d L (u, ũ) + d L (v, ṽ) + 2 i=1 F 1 σ ) (tr(kn 1/(τ 2)i, Kn 1/(τ 2)i+1 ). Step 6: Show that the first two terms can be chosen to be negligible and the second term is log log n/ log(τ 2) (1 + ε)2 Fσ 1 ( exp{ (τ 2) i } ). i=1 Júlia Komjáthy (TU/e) 41 / 44

Thank you for the attention! Júlia Komjáthy (TU/e) 42 / 44

Thank you for the attention! Júlia Komjáthy (TU/e) 42 / 44

Thank you for the attention! Júlia Komjáthy (TU/e) 42 / 44

Thank you for the attention! Júlia Komjáthy (TU/e) 42 / 44

Explosive extra weights on the configuration model Theorem (Baroni, van der Hofstad, K) Consider the configuration model with Júlia Komjáthy (TU/e) 43 / 44

Explosive extra weights on the configuration model Theorem (Baroni, van der Hofstad, K) Consider the configuration model with power-law degree distribution with exponent τ (2, 3) Júlia Komjáthy (TU/e) 43 / 44

Explosive extra weights on the configuration model Theorem (Baroni, van der Hofstad, K) Consider the configuration model with power-law degree distribution with exponent τ (2, 3) independent edge weights from distribution 1 + σ. Júlia Komjáthy (TU/e) 43 / 44

Explosive extra weights on the configuration model Theorem (Baroni, van der Hofstad, K) Consider the configuration model with power-law degree distribution with exponent τ (2, 3) independent edge weights from distribution 1 + σ. Then the sequence of random variables d 1+σ (u, v) 2 log log n log(τ 2) is tight if and only if the branching process BP(D, σ) is explosive. Júlia Komjáthy (TU/e) 43 / 44

Explosive extra weights on the configuration model Theorem (Baroni, van der Hofstad, K) Consider the configuration model with power-law degree distribution with exponent τ (2, 3) independent edge weights from distribution 1 + σ. Then the sequence of random variables d 1+σ (u, v) 2 log log n log(τ 2) is tight if and only if the branching process BP(D, σ) is explosive. X n is a tight sequence of random variables if the tail probabilities decay uniformly in n: ε > 0, K ε such that n : P( X n K ε ) ε. Júlia Komjáthy (TU/e) 43 / 44

4-line proof for non-tightness Assume that the branching process BP(D, σ) is conservative. Júlia Komjáthy (TU/e) 44 / 44

4-line proof for non-tightness Assume that the branching process BP(D, σ) is conservative. Every path from u to v uses at least d G (u, v) = d 1 (u, v) many edges, so Júlia Komjáthy (TU/e) 44 / 44

4-line proof for non-tightness Assume that the branching process BP(D, σ) is conservative. Every path from u to v uses at least d G (u, v) = d 1 (u, v) many edges, so d 1+σ (u, v) d G (u, v) + d σ (u, v). Júlia Komjáthy (TU/e) 44 / 44

4-line proof for non-tightness Assume that the branching process BP(D, σ) is conservative. Every path from u to v uses at least d G (u, v) = d 1 (u, v) many edges, so d 1+σ (u, v) d G (u, v) + d σ (u, v). d G (u, v) 2 log log n/ log(τ 2) is a tight sequence From Hofstad, Hooghiemstra, Znamenski 07 Júlia Komjáthy (TU/e) 44 / 44

4-line proof for non-tightness Assume that the branching process BP(D, σ) is conservative. Every path from u to v uses at least d G (u, v) = d 1 (u, v) many edges, so d 1+σ (u, v) 2 log log n log(τ 2) + O(1) + d σ(u, v). d G (u, v) 2 log log n/ log(τ 2) is a tight sequence From Hofstad, Hooghiemstra, Znamenski 07 Júlia Komjáthy (TU/e) 44 / 44

4-line proof for non-tightness Assume that the branching process BP(D, σ) is conservative. Every path from u to v uses at least d G (u, v) = d 1 (u, v) many edges, so d 1+σ (u, v) 2 log log n log(τ 2) + O(1) + d σ(u, v). d G (u, v) 2 log log n/ log(τ 2) is a tight sequence From Hofstad, Hooghiemstra, Znamenski 07 σ non-explosive: d σ (u, v) by the previous theorem Júlia Komjáthy (TU/e) 44 / 44

4-line proof for non-tightness Assume that the branching process BP(D, σ) is conservative. Every path from u to v uses at least d G (u, v) = d 1 (u, v) many edges, so d 1+σ (u, v) 2 log log n log(τ 2) + O(1) + d σ(u, v). d G (u, v) 2 log log n/ log(τ 2) is a tight sequence From Hofstad, Hooghiemstra, Znamenski 07 σ non-explosive: d σ (u, v) by the previous theorem As n, d 1+σ (u, v) so the sequence cannot be tight. 2 log log n log(τ 2) = O(1) + d σ(u, v) Júlia Komjáthy (TU/e) 44 / 44