Results 1  10
of
421
Finding community structure in networks using the eigenvectors of matrices
, 2006
"... We consider the problem of detecting communities or modules in networks, groups of vertices with a higherthanaverage density of edges connecting them. Previous work indicates that a robust approach to this problem is the maximization of the benefit function known as “modularity ” over possible div ..."
Abstract

Cited by 500 (0 self)
 Add to MetaCart
(Show Context)
We consider the problem of detecting communities or modules in networks, groups of vertices with a higherthanaverage density of edges connecting them. Previous work indicates that a robust approach to this problem is the maximization of the benefit function known as “modularity ” over possible divisions of a network. Here we show that this maximization process can be written in terms of the eigenspectrum of a matrix we call the modularity matrix, which plays a role in community detection similar to that played by the graph Laplacian in graph partitioning calculations. This result leads us to a number of possible algorithms for detecting community structure, as well as several other results, including a spectral measure of bipartite structure in networks and a new centrality measure that identifies those vertices that occupy central positions within the communities to which they belong. The algorithms and measures proposed are illustrated with applications to a variety of realworld complex networks.
Statistical properties of community structure in large social and information networks
"... A large body of work has been devoted to identifying community structure in networks. A community is often though of as a set of nodes that has more connections between its members than to the remainder of the network. In this paper, we characterize as a function of size the statistical and structur ..."
Abstract

Cited by 242 (14 self)
 Add to MetaCart
(Show Context)
A large body of work has been devoted to identifying community structure in networks. A community is often though of as a set of nodes that has more connections between its members than to the remainder of the network. In this paper, we characterize as a function of size the statistical and structural properties of such sets of nodes. We define the network community profile plot, which characterizes the “best ” possible community—according to the conductance measure—over a wide range of size scales, and we study over 70 large sparse realworld networks taken from a wide range of application domains. Our results suggest a significantly more refined picture of community structure in large realworld networks than has been appreciated previously. Our most striking finding is that in nearly every network dataset we examined, we observe tight but almost trivial communities at very small scales, and at larger size scales, the best possible communities gradually “blend in ” with the rest of the network and thus become less “communitylike.” This behavior is not explained, even at a qualitative level, by any of the commonlyused network generation models. Moreover, this behavior is exactly the opposite of what one would expect based on experience with and intuition from expander graphs, from graphs that are wellembeddable in a lowdimensional structure, and from small social networks that have served as testbeds of community detection algorithms. We have found, however, that a generative model, in which new edges are added via an iterative “forest fire” burning process, is able to produce graphs exhibiting a network community structure similar to our observations.
Structure and tie strengths in mobile communication networks
 Proc. Natl. Acad. Sci. (USA
, 2007
"... We examine the communication patterns of millions of anonymized mobile phone users. Based on call records, we construct a communication network where vertices are subscribers and edge weights are defined as aggregated duration of calls, reflecting the strengths of social ties between callers. We obs ..."
Abstract

Cited by 234 (13 self)
 Add to MetaCart
(Show Context)
We examine the communication patterns of millions of anonymized mobile phone users. Based on call records, we construct a communication network where vertices are subscribers and edge weights are defined as aggregated duration of calls, reflecting the strengths of social ties between callers. We observe a coupling between tie strengths and network topology: at the ”local ” level, strong ties are associated with densely connected network neighbourhoods, providing the first largescale confirmation of the Granovetter hypothesis. Based on fragmentation analysis, weak ties are seen to play an important role at the network level, accounting for global connectivity. The observed coupling is shown to significantly slow down the spreading of random information, resulting in dynamic trapping of information in communities. 1.
Community structure in large networks: Natural cluster sizes and the absence of large welldefined clusters
, 2008
"... A large body of work has been devoted to defining and identifying clusters or communities in social and information networks, i.e., in graphs in which the nodes represent underlying social entities and the edges represent some sort of interaction between pairs of nodes. Most such research begins wit ..."
Abstract

Cited by 198 (17 self)
 Add to MetaCart
(Show Context)
A large body of work has been devoted to defining and identifying clusters or communities in social and information networks, i.e., in graphs in which the nodes represent underlying social entities and the edges represent some sort of interaction between pairs of nodes. Most such research begins with the premise that a community or a cluster should be thought of as a set of nodes that has more and/or better connections between its members than to the remainder of the network. In this paper, we explore from a novel perspective several questions related to identifying meaningful communities in large social and information networks, and we come to several striking conclusions. Rather than defining a procedure to extract sets of nodes from a graph and then attempt to interpret these sets as a “real ” communities, we employ approximation algorithms for the graph partitioning problem to characterize as a function of size the statistical and structural properties of partitions of graphs that could plausibly be interpreted as communities. In particular, we define the network community profile plot, which characterizes the “best ” possible community—according to the conductance measure—over a wide range of size scales. We study over 100 large realworld networks, ranging from traditional and online social networks, to technological and information networks and
Evolutionary games on graphs
, 2007
"... Game theory is one of the key paradigms behind many scientific disciplines from biology to behavioral sciences to economics. In its evolutionary form and especially when the interacting agents are linked in a specific social network the underlying solution concepts and methods are very similar to ..."
Abstract

Cited by 143 (0 self)
 Add to MetaCart
Game theory is one of the key paradigms behind many scientific disciplines from biology to behavioral sciences to economics. In its evolutionary form and especially when the interacting agents are linked in a specific social network the underlying solution concepts and methods are very similar to those applied in nonequilibrium statistical physics. This review gives a tutorialtype overview of the field for physicists. The first four sections introduce the necessary background in classical and evolutionary game theory from the basic definitions to the most important results. The fifth section surveys the topological complications implied by nonmeanfieldtype social network structures in general. The next three sections discuss in detail the dynamic behavior of three prominent classes of models: the Prisoner’s Dilemma, the Rock–Scissors–Paper game, and Competing Associations. The major theme of the review is in what sense and how the graph structure of interactions can modify and enrich the picture of long term behavioral patterns emerging in evolutionary games.
Complex systems analysis of series of blackouts: cascading failure, critical points, and selforganization
 Chaos
, 2004
"... We give a comprehensive account of a complex systems approach to large blackouts caused by cascading failure. Instead of looking at the details of particular blackouts, we study the statistics, dynamics and risk of series of blackouts with approximate global models. North American blackout data sugg ..."
Abstract

Cited by 89 (14 self)
 Add to MetaCart
(Show Context)
We give a comprehensive account of a complex systems approach to large blackouts caused by cascading failure. Instead of looking at the details of particular blackouts, we study the statistics, dynamics and risk of series of blackouts with approximate global models. North American blackout data suggests that the frequency of large blackouts is governed by a power law. This result is consistent with the power system being a complex system designed and operated near criticality. The power law makes the risk of large blackouts consequential and implies the need for nonstandard risk analysis. Power system overall load relative to operating limits is a key factor affecting the risk of cascading failure. Blackout models and an abstract model of cascading failure show that there are critical transitions as load is increased. Power law behavior can be observed at these transitions. The critical loads at which blackout risk sharply increases are identifiable thresholds for cascading failure and we discuss approaches to computing the proximity to cascading failure using these thresholds. Approximating cascading failure as a branching process suggests ways to compute and monitor criticality by quantifying how much failures propagate. Inspired by concepts from selforganized criticality, we suggest that power system operating margins evolve slowly to near criticality and confirm this idea using a blackout model. Mitigation of blackout risk should take care to account for counterintuitive effects in complex selforganized critical systems. For example, suppressing small blackouts could lead the system to be operated closer to the edge and ultimately increase the risk of large blackouts. 1
Estimating and sampling graphs with multidimensional random walks
, 2010
"... Estimating characteristics of large graphs via sampling is a vital part of the study of complex networks. Current sampling methods such as (independent) random vertex and random walks are useful but have drawbacks. Random vertex sampling may require too many resources (time, bandwidth, or money). Ra ..."
Abstract

Cited by 69 (12 self)
 Add to MetaCart
(Show Context)
Estimating characteristics of large graphs via sampling is a vital part of the study of complex networks. Current sampling methods such as (independent) random vertex and random walks are useful but have drawbacks. Random vertex sampling may require too many resources (time, bandwidth, or money). Random walks, which normally require fewer resources per sample, can suffer from large estimation errors in the presence of disconnected or loosely connected graphs. In this work we propose a new mdimensional random walk that uses m dependent random walkers. We show that the proposed sampling method, which we call Frontier sampling, exhibits all of the nice sampling properties of a regular random walk. At the same time, our simulations over large real world graphs show that, in the presence of disconnected or loosely connected components, Frontier sampling exhibits lower estimation errors than regular random walks. We also show that Frontier sampling is more suitable than random vertex sampling to sample the tail of the degree distribution of the graph.
Networks formed from interdependent networks
 PHYS
, 2011
"... ... obtained by analysing isolated networks, many realworld networks do in fact interact with and depend on other networks. The set of extensive results for the limiting case of noninteracting networks holds only to the extent that ignoring the presence of other networks can be justified. Recently ..."
Abstract

Cited by 43 (5 self)
 Add to MetaCart
... obtained by analysing isolated networks, many realworld networks do in fact interact with and depend on other networks. The set of extensive results for the limiting case of noninteracting networks holds only to the extent that ignoring the presence of other networks can be justified. Recently, an analytical framework for studying the percolation properties of interacting networks has been developed. Here we review this framework and the results obtained so far for connectivity properties of ‘networks of networks’ formed by interdependent random networks.
Analysing Information Flows and Key Mediators through Temporal Centrality Metrics
"... The study of influential members of human networks is an important research question in social network analysis. However, the current stateoftheart is based on static or aggregated representation of the network topology. We argue that dynamically evolving network topologies are inherent in many s ..."
Abstract

Cited by 35 (5 self)
 Add to MetaCart
(Show Context)
The study of influential members of human networks is an important research question in social network analysis. However, the current stateoftheart is based on static or aggregated representation of the network topology. We argue that dynamically evolving network topologies are inherent in many systems, including real online social and technological networks: fortunately the nature of these systems is such that they allow the gathering of large quantities of finegrained temporal data on interactions amongst the network members. In this paper we propose novel temporal centrality metrics which take into account such dynamic interactions over time. Using a real corporate email dataset we evaluate the important individuals selected by means of static and temporal analysis taking two perspectives: firstly, from a semantic level, we investigate their corporate role in the organisation; and secondly, from a dynamic process point of view, we measure information dissemination and the role of information mediators. We find that temporal analysis provides a better understanding of dynamic processes and a more accurate identification of important people compared to traditional static methods.
Do topological models provide good information about electricity infrastructure vulnerability
, 2010
"... In order to identify the extent to which results from topological graph models are useful for modeling vulnerability in electricity infrastructure, we measure the susceptibility of power networks to random failures and directed attacks using three measures of vulnerability: characteristic path leng ..."
Abstract

Cited by 32 (3 self)
 Add to MetaCart
In order to identify the extent to which results from topological graph models are useful for modeling vulnerability in electricity infrastructure, we measure the susceptibility of power networks to random failures and directed attacks using three measures of vulnerability: characteristic path lengths, connectivity loss and blackout sizes. The first two are purely topological metrics. The blackout size calculation results from a model of cascading failure in power networks. Testing the response of 40 areas within the Eastern US power grid and a standard IEEE test case to a variety of attack/failure vectors indicates that directed attacks result in larger failures using all three vulnerability measures, but the attack vectors that appear to cause the most damage depend on the measure chosen. While our topological and power grid model results show some trends that are similar, there is only a mild correlation between the vulnerability measures for individual simulations. We conclude that evaluating vulnerability in power networks using purely topological metrics can be misleading. Electricity infrastructures are vital to the operation of modern society, yet they are notably vulnerable to cascading failures. Understanding the nature of this vulnerability is fundamental to the assessment of electric energy reliability and security. A number of articles have recently used topological