1,389 research outputs found

    Error and Attack Tolerance of Layered Complex Networks

    Get PDF
    Many complex systems may be described not by one, but by a number of complex networks mapped one on the other in a multilayer structure. The interactions and dependencies between these layers cause that what is true for a distinct single layer does not necessarily reflect well the state of the entire system. In this paper we study the robustness of three real-life examples of two-layer complex systems that come from the fields of communication (the Internet), transportation (the European railway system) and biology (the human brain). In order to cover the whole range of features specific to these systems, we focus on two extreme policies of system's response to failures, no rerouting and full rerouting. Our main finding is that multilayer systems are much more vulnerable to errors and intentional attacks than they seem to be from a single layer perspective.Comment: 5 pages, 3 figure

    Design process robustness: A bi-partite network analysis reveals the central importance of people

    Get PDF
    Design processes require the joint effort of many people to collaborate and work on multiple activities. Effective techniques to analyse and model design processes are important for understanding organisational dynamics, for improving collaboration, and for planning robust design processes, reducing the risk of rework and delays. Although there has been much progress in modelling and understanding design processes, little is known about the interplay between people and the activities they perform and its influence on design process robustness. To analyse this interplay, we model a large-scale design process of a biomass power plant with people and activities as a bipartite network. Observing that some people act as bridges between activities organised to form nearly independent modules, in order to evaluate process fragility, we simulate random failures and targeted attacks to people and activities. We find that our process is more vulnerable to attacks to people rather than activities. These findings show how the allocation of people to activities can obscure an inherent fragility, making the process highly sensitive and dependent on specific people. More generally, we show that the behaviour of robustness is determined by the degree distributions, the heterogeneity of which can be leveraged to improve robustness and resilience to cascading failures. Overall, we show that it is important to carefully plan the assignment of people to activities

    Multilayer Aggregation with Statistical Validation: Application to Investor Networks

    Get PDF
    Multilayer networks are attracting growing attention in many fields, including finance. In this paper, we develop a new tractable procedure for multilayer aggregation based on statistical validation, which we apply to investor networks. Moreover, we propose two other improvements to their analysis: transaction bootstrapping and investor categorization. The aggregation procedure can be used to integrate security-wise and time-wise information about investor trading networks, but it is not limited to finance. In fact, it can be used for different applications, such as gene, transportation, and social networks, were they inferred or observable. Additionally, in the investor network inference, we use transaction bootstrapping for better statistical validation. Investor categorization allows for constant size networks and having more observations for each node, which is important in the inference especially for less liquid securities. Furthermore, we observe that the window size used for averaging has a substantial effect on the number of inferred relationships. We apply this procedure by analyzing a unique data set of Finnish shareholders during the period 2004-2009. We find that households in the capital have high centrality in investor networks, which, under the theory of information channels in investor networks suggests that they are well-informed investors
    corecore