• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

Error and attack tolerance of complex networks. Nature (2000)

by R Albert, H Jeong, A-L Barabasi
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 1,013
Next 10 →

Freenet: A Distributed Anonymous Information Storage and Retrieval System

by Ian Clarke, Oskar Sandberg, Brandon Wiley, Theodore W. Hong - INTERNATIONAL WORKSHOP ON DESIGNING PRIVACY ENHANCING TECHNOLOGIES: DESIGN ISSUES IN ANONYMITY AND UNOBSERVABILITY , 2001
"... We describe Freenet, an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and readers. Freenet operates as a network of identical nodes that collectively pool their storage space to store data ..."
Abstract - Cited by 1064 (12 self) - Add to MetaCart
We describe Freenet, an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and readers. Freenet operates as a network of identical nodes that collectively pool their storage space to store data files and cooperate to route requests to the most likely physical location of data. No broadcast search or centralized location index is employed. Files are referred to in a location-independent manner, and are dynamically replicated in locations near requestors and deleted from locations where there is no interest. It is infeasible to discover the true origin or destination of a file passing through the network, and difficult for a node operator to determine or be held responsible for the actual physical contents of her own node.
(Show Context)

Citation Context

...length remains below 20 even when up to 30% of nodes fail. 5.4 Small-World Model The scalability and fault-tolerance characteristics of Freenet can be explained in terms of a small-world network model=-=[23,31,22,3]-=-. In a small-world network, the majority of nodes have only relatively few, local, connections to other nodes, while a small number of nodes have large, wide-ranging sets of connections. Small-world n...

Maximizing the Spread of Influence Through a Social Network

by David Kempe - In KDD , 2003
"... Models for the processes by which ideas and influence propagate through a social network have been studied in a number of domains, including the diffusion of medical and technological innovations, the sudden and widespread adoption of various strategies in game-theoretic settings, and the effects of ..."
Abstract - Cited by 990 (7 self) - Add to MetaCart
Models for the processes by which ideas and influence propagate through a social network have been studied in a number of domains, including the diffusion of medical and technological innovations, the sudden and widespread adoption of various strategies in game-theoretic settings, and the effects of “word of mouth ” in the promotion of new products. Recently, motivated by the design of viral marketing strategies, Domingos and Richardson posed a fundamental algorithmic problem for such social network processes: if we can try to convince a subset of individuals to adopt a new product or innovation, and the goal is to trigger a large cascade of further adoptions, which set of individuals should we target? We consider this problem in several of the most widely studied models in social network analysis. The optimization problem of selecting the most influential nodes is NP-hard here, and we provide the first provable approximation guarantees for efficient algorithms. Using an analysis framework based on submodular functions, we show that a natural greedy strategy obtains a solution that is provably within 63 % of optimal for several classes of models; our framework suggests a general approach for reasoning about the performance guarantees of algorithms for these types of influence problems in social networks. We also provide computational experiments on large collaboration networks, showing that in addition to their provable guarantees, our approximation algorithms significantly out-perform nodeselection heuristics based on the well-studied notions of degree centrality and distance centrality from the field of social networks.
(Show Context)

Citation Context

...ighbor w according to a weight bv,w such that # w neighbor of v bv,w # 1. The dynamics of the process then proceed as follows. Each node v chooses a threshold #v uniformly at random from the interval =-=[0, 1]-=-; this represents the weighted fraction of v's neighbors that must become active in order for v to become active. Given a random choice of thresholds, and an initial set of active nodes A0 (with all o...

Bind: the biomolecular interaction network database

by Gary D. Bader, Doron Betel, Christopher W. V. Hogue - Nucleic Acids Res , 2003
"... ..."
Abstract - Cited by 402 (8 self) - Add to MetaCart
Abstract not found

A general framework for weighted gene coexpression network analysis

by Bin Zhang, Steve Horvath - STATISTICAL APPLICATIONS IN GENETICS AND MOLECULAR BIOLOGY 4: ARTICLE 17 , 2005
"... ..."
Abstract - Cited by 400 (23 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...ventions, an error tolerance attributed to the robustness of the underlying metabolic network. The ability of nodes to communicate is unaffected even by very high failure rates in scale free networks(=-=Albert et al., 2000-=-). But error tolerance comes at a high price in that these networks are extremely vulnerable to attacks, i.e. to the selection and removal of a few nodes that play a vital role in maintaining the netw...

A Survey and Comparison of Peer-to-Peer Overlay Network Schemes

by Eng Keong Lua, Jon Crowcroft, Marcelo Pias, Ravi Sharma, Steven Lim - IEEE COMMUNICATIONS SURVEYS AND TUTORIALS , 2005
"... Over the Internet today, computing and communications environments are significantly more complex and chaotic than classical distributed systems, lacking any centralized organization or hierarchical control. There has been much interest in emerging Peer-to-Peer (P2P) network overlays because they ..."
Abstract - Cited by 302 (1 self) - Add to MetaCart
Over the Internet today, computing and communications environments are significantly more complex and chaotic than classical distributed systems, lacking any centralized organization or hierarchical control. There has been much interest in emerging Peer-to-Peer (P2P) network overlays because they provide a good substrate for creating large-scale data sharing, content distribution and application-level multicast applications. These P2P networks try to provide a long list of features such as: selection of nearby peers, redundant storage, efficient search/location of data items, data permanence or guarantees, hierarchical naming, trust and authentication, and, anonymity. P2P networks potentially offer an efficient routing architecture that is self-organizing, massively scalable, and robust in the wide-area, combining fault tolerance, load balancing and explicit notion of locality. In this paper, we present a survey and comparison of various Structured and Unstructured P2P networks. We categorize the various schemes into these two groups in the design spectrum and discuss the application-level network performance of each group.
(Show Context)

Citation Context

... for Unstructured P2P networks are discussed in [93]: iterative deepening, directed BFS and local indices. Networks with power-law organizational structure, display an unexpected degree of robustness =-=[94]-=-, i.e. the ability of the peers to communicate unaffectedly even by extremely high failure rates. But these networks are prone to attacks. Thus, Unstructured P2P networks reduce the network dependence...

Analysis of Topological Characteristics of Huge Online Social Networking Services.

by Yong-Yeol Ahn , Seungyeop Han , Haewoon Kwak , Sue Moon , Hawoong Jeong - In Proc. of ACM WWW, , 2007
"... ABSTRACT Social networking services are a fast-growing business in the Internet. However, it is unknown if online relationships and their growth patterns are the same as in real-life social networks. In this paper, we compare the structures of three online social networking services: Cyworld, MySpa ..."
Abstract - Cited by 260 (6 self) - Add to MetaCart
ABSTRACT Social networking services are a fast-growing business in the Internet. However, it is unknown if online relationships and their growth patterns are the same as in real-life social networks. In this paper, we compare the structures of three online social networking services: Cyworld, MySpace, and orkut, each with more than 10 million users, respectively. We have access to complete data of Cyworld's ilchon (friend) relationships and analyze its degree distribution, clustering property, degree correlation, and evolution over time. We also use Cyworld data to evaluate the validity of snowball sampling method, which we use to crawl and obtain partial network topologies of MySpace and orkut. Cyworld, the oldest of the three, demonstrates a changing scaling behavior over time in degree distribution. The latest Cyworld data's degree distribution exhibits a multi-scaling behavior, while those of MySpace and orkut have simple scaling behaviors with different exponents. Very interestingly, each of the two exponents corresponds to the different segments in Cyworld's degree distribution. Certain online social networking services encourage online activities that cannot be easily copied in real life; we show that they deviate from close-knit online social networks which show a similar degree correlation pattern to real-life social networks.
(Show Context)

Citation Context

...l, but it is very difficult to get a power-law degree distribution from a network without the power-law decaying degree distribution. 4.2 Metrics of interest We begin the analysis of online social network topologies by looking at their degree distributions. Networks of a power-law degree distribution, P (k) ∼ k−γ , where k is the node degree and γ ≤ 3, attest to the existence of a relatively small number of nodes with a very large number of links. These networks also have distinguishing properties, such as vanishing epidemic threshold, ultra-small worldness, and robustness under random errors [11, 12, 13, 14]. The degree distribution is often plotted as a complementary cumulative probability function (CCDF), ℘(k) ≡ R ∞ k P (k′)dk′ ∼ k−α ∼ k−(γ−1). As a power-law distribution shows up as a straight WWW 2007 / Track: Semantic Web Session: Semantic Web and Web 2.0 837 line in a log-log plot, the exponent of a power-law distribution is a representative characteristic, distinguishing one from others. Next, we examine the clustering coefficient. The clustering coefficient of a node is the ratio of the number of existing links over the number of possible links between its neighbors. Given a network G = (...

Random graph models of social networks

by M. E. J. Newman, D. J. Watts, S. H. Strogatz
"... We describe some new exactly solvable models of the structure of social networks, based on random graphs with arbitrary degree distributions. We give models both for simple unipartite networks, such as acquaintance networks, and bipartite networks, such as affiliation networks. We compare the predic ..."
Abstract - Cited by 252 (1 self) - Add to MetaCart
We describe some new exactly solvable models of the structure of social networks, based on random graphs with arbitrary degree distributions. We give models both for simple unipartite networks, such as acquaintance networks, and bipartite networks, such as affiliation networks. We compare the predictions of our models to data for a number of real-world social networks and find that in some cases the models are in remarkable agreement with the data, while in others the agreement is poorer, perhaps indicating the presence of additional social structure in the network that is not captured by the random graph.

Metabolomics: the link between genotypes and phenotypes

by Oliver Fiehn - Plant Molecular Biology
"... Metabolites are the end products of cellular regulatory processes, and their levels can be regarded as the ultimate response of biological systems to genetic or environmental changes. In parallel to the terms ‘transcriptome ’ and ‘proteome’, the set of metabolites synthesized by a biological system ..."
Abstract - Cited by 236 (14 self) - Add to MetaCart
Metabolites are the end products of cellular regulatory processes, and their levels can be regarded as the ultimate response of biological systems to genetic or environmental changes. In parallel to the terms ‘transcriptome ’ and ‘proteome’, the set of metabolites synthesized by a biological system constitute its ‘metabolome’. Yet, unlike other functional genomics approaches, the unbiased simultaneous identification and quantification of plant metabolomes has been largely neglected. Until recently, most analyses were restricted to profiling selected classes of compounds, or to fingerprinting metabolic changes without sufficient analytical resolution to determine metabolite levels and identities individually. As a prerequisite for metabolomic analysis, careful consideration of the methods employed for tissue extraction, sample preparation, data acquisition, and data mining must be taken. In this review, the differences among metabolite target analysis, metabolite profiling, and metabolic fingerprinting are clarified, and terms are defined. Current approaches are examined, and potential applications are summarized with a special emphasis on data mining and mathematical modelling of metabolism.
(Show Context)

Citation Context

...d co-workers have shown that metabolic networks are organized in a scale-free manner, indicating a high robustness against random errors (e.g. mutations) but a high vulnerability to directed attacks (=-=Albert et al., 2000-=-; Jeong et al., 2000). Conclusions Metabolomic analyses have just begun. With today’s powerful analytical and computational systems, the experimental outcome of systematic changes to plant systems can...

Protecting Free Expression Online with Freenet

by Ian Clarke, Scott G. Miller, Theodore W. Hong, Oskar Sandberg, Brandon Wiley , 2002
"... ially hundreds of thousands of desktop computers to create a collaborative virtual file system. To increase network robustness and eliminate single points of failure, Freenet employs a completely decentralized architecture. Given that the P2P environment is inherently untrustworthy and unreliable, w ..."
Abstract - Cited by 211 (7 self) - Add to MetaCart
ially hundreds of thousands of desktop computers to create a collaborative virtual file system. To increase network robustness and eliminate single points of failure, Freenet employs a completely decentralized architecture. Given that the P2P environment is inherently untrustworthy and unreliable, we must assume that participants could operate maliciously or fail without warning at any time. Therefore, Freenet implements strategies to protect data integrity and prevent privacy leaks in the former instance, and provide for graceful degradation and redundant data availability in the latter. The system is also designed to adapt to usage patterns, automatically replicating and deleting files to make the most effective use of available storage in response to demand. 40 JANUARY . FEBRUARY 2002 http://computer.org/internet/ 1089 - 7801/02/$17.00 2002 IEEE IEEE INTERNET COMPUTING Peer-to-Peer Networking Design Motivation As documented by

The Large-Scale Structure of Semantic Networks: Statistical Analyses and a Model of Semantic Growth

by Mark Steyvers, Joshua B. Tenenbaum - Cognitive Science
"... We present statistical analyses of the large-scale structure of three types of semantic networks: word associations, WordNet, and Roget's thesaurus. We show that they have a small-world structure, characterized by sparse connectivity, short average path-lengths between words, and strong local ..."
Abstract - Cited by 209 (2 self) - Add to MetaCart
We present statistical analyses of the large-scale structure of three types of semantic networks: word associations, WordNet, and Roget's thesaurus. We show that they have a small-world structure, characterized by sparse connectivity, short average path-lengths between words, and strong local clustering. In addition, the distributions of the number of connections follow power laws that indicate a scale-free pattern of connectivity, with most nodes having relatively few connections joined together through a small number of hubs with many connections. These regularities have also been found in certain other complex natural networks, such as the world wide web, but they are not consistent with many conventional models of semantic organization, based on inheritance hierarchies, arbitrarily structured networks, or high-dimensional vector spaces. We propose that these structures reflect the mechanisms by which semantic networks grow. We describe a simple model for semantic growth, in which each new word or concept is connected to an existing network by differentiating the connectivity pattern of an existing node. This model generates appropriate small-world statistics and power-law connectivity distributions, and also suggests one possible mechanistic basis for the effects of learning history variables (age-ofacquisition, usage frequency) on behavioral performance in semantic processing tasks.
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University