13,954 research outputs found
Building Damage-Resilient Dominating Sets in Complex Networks against Random and Targeted Attacks
We study the vulnerability of dominating sets against random and targeted
node removals in complex networks. While small, cost-efficient dominating sets
play a significant role in controllability and observability of these networks,
a fixed and intact network structure is always implicitly assumed. We find that
cost-efficiency of dominating sets optimized for small size alone comes at a
price of being vulnerable to damage; domination in the remaining network can be
severely disrupted, even if a small fraction of dominator nodes are lost. We
develop two new methods for finding flexible dominating sets, allowing either
adjustable overall resilience, or dominating set size, while maximizing the
dominated fraction of the remaining network after the attack. We analyze the
efficiency of each method on synthetic scale-free networks, as well as real
complex networks
The domination number of on-line social networks and random geometric graphs
We consider the domination number for on-line social networks, both in a
stochastic network model, and for real-world, networked data. Asymptotic
sublinear bounds are rigorously derived for the domination number of graphs
generated by the memoryless geometric protean random graph model. We establish
sublinear bounds for the domination number of graphs in the Facebook 100 data
set, and these bounds are well-correlated with those predicted by the
stochastic model. In addition, we derive the asymptotic value of the domination
number in classical random geometric graphs
Random subgraphs make identification affordable
An identifying code of a graph is a dominating set which uniquely determines
all the vertices by their neighborhood within the code. Whereas graphs with
large minimum degree have small domination number, this is not the case for the
identifying code number (the size of a smallest identifying code), which indeed
is not even a monotone parameter with respect to graph inclusion.
We show that every graph with vertices, maximum degree
and minimum degree , for some
constant , contains a large spanning subgraph which admits an identifying
code with size . In particular, if
, then has a dense spanning subgraph with identifying
code , namely, of asymptotically optimal size. The
subgraph we build is created using a probabilistic approach, and we use an
interplay of various random methods to analyze it. Moreover we show that the
result is essentially best possible, both in terms of the number of deleted
edges and the size of the identifying code
Online Learning with Feedback Graphs: Beyond Bandits
We study a general class of online learning problems where the feedback is
specified by a graph. This class includes online prediction with expert advice
and the multi-armed bandit problem, but also several learning problems where
the online player does not necessarily observe his own loss. We analyze how the
structure of the feedback graph controls the inherent difficulty of the induced
-round learning problem. Specifically, we show that any feedback graph
belongs to one of three classes: strongly observable graphs, weakly observable
graphs, and unobservable graphs. We prove that the first class induces learning
problems with minimax regret, where
is the independence number of the underlying graph; the second class
induces problems with minimax regret,
where is the domination number of a certain portion of the graph; and
the third class induces problems with linear minimax regret. Our results
subsume much of the previous work on learning with feedback graphs and reveal
new connections to partial monitoring games. We also show how the regret is
affected if the graphs are allowed to vary with time
- …