14,597 research outputs found

    Where Graph Topology Matters: The Robust Subgraph Problem

    Full text link
    Robustness is a critical measure of the resilience of large networked systems, such as transportation and communication networks. Most prior works focus on the global robustness of a given graph at large, e.g., by measuring its overall vulnerability to external attacks or random failures. In this paper, we turn attention to local robustness and pose a novel problem in the lines of subgraph mining: given a large graph, how can we find its most robust local subgraph (RLS)? We define a robust subgraph as a subset of nodes with high communicability among them, and formulate the RLS-PROBLEM of finding a subgraph of given size with maximum robustness in the host graph. Our formulation is related to the recently proposed general framework for the densest subgraph problem, however differs from it substantially in that besides the number of edges in the subgraph, robustness also concerns with the placement of edges, i.e., the subgraph topology. We show that the RLS-PROBLEM is NP-hard and propose two heuristic algorithms based on top-down and bottom-up search strategies. Further, we present modifications of our algorithms to handle three practical variants of the RLS-PROBLEM. Experiments on synthetic and real-world graphs demonstrate that we find subgraphs with larger robustness than the densest subgraphs even at lower densities, suggesting that the existing approaches are not suitable for the new problem setting.Comment: 13 pages, 10 Figures, 3 Tables, to appear at SDM 2015 (9 pages only

    Systemic trade-risk of critical resources

    Get PDF
    In the wake of the 2008 financial crisis the role of strongly interconnected markets in fostering systemic instability has been increasingly acknowledged. Trade networks of commodities are susceptible to deleterious cascades of supply shocks that increase systemic trade-risks and pose a threat to geopolitical stability. On a global and a regional level we show that supply risk, scarcity, and price volatility of non-fuel mineral resources are intricately connected with the structure of the world-trade network of or spanned by these resources. On the global level we demonstrate that the scarcity of a resource, as measured by its trade volume compared to extractable reserves, is closely related to the susceptibility of the trade network with respect to cascading shocks. On the regional level we find that to some extent the region-specific price volatility and supply risk can be understood by centrality measures that capture systemic trade-risk. The resources associated with the highest systemic trade-risk indicators are often those that are produced as byproducts of major metals. We identify significant shortcomings in the management of systemic trade-risk, in particular in the EU

    Mathematics and the Internet: A Source of Enormous Confusion and Great Potential

    Get PDF
    Graph theory models the Internet mathematically, and a number of plausible mathematically intersecting network models for the Internet have been developed and studied. Simultaneously, Internet researchers have developed methodology to use real data to validate, or invalidate, proposed Internet models. The authors look at these parallel developments, particularly as they apply to scale-free network models of the preferential attachment type

    Architecture-based Qualitative Risk Analysis for Availability of IT Infrastructures

    Get PDF
    An IT risk assessment must deliver the best possible quality of results in a time-eļ¬€ective way. Organisations are used to customise the general-purpose standard risk assessment methods in a way that can satisfy their requirements. In this paper we present the QualTD Model and method, which is meant to be employed together with standard risk assessment methods for the qualitative assessment of availability risks of IT architectures, or parts of them. The QualTD Model is based on our previous quantitative model, but geared to industrial practice since it does not require quantitative data which is often too costly to acquire. We validate the model and method in a real-world case by performing a risk assessment on the authentication and authorisation system of a large multinational company and by evaluating the results w.r.t. the goals of the stakeholders of the system. We also perform a review of the most popular standard risk assessment methods and an analysis of which one can be actually integrated with our QualTD Model
    • ā€¦
    corecore