977 research outputs found

    Accelerated growth in outgoing links in evolving networks: deterministic vs. stochastic picture

    Full text link
    In several real-world networks like the Internet, WWW etc., the number of links grow in time in a non-linear fashion. We consider growing networks in which the number of outgoing links is a non-linear function of time but new links between older nodes are forbidden. The attachments are made using a preferential attachment scheme. In the deterministic picture, the number of outgoing links m(t)m(t) at any time tt is taken as N(t)θN(t)^\theta where N(t)N(t) is the number of nodes present at that time. The continuum theory predicts a power law decay of the degree distribution: P(k)k121θP(k) \propto k^{-1-\frac{2} {1-\theta}}, while the degree of the node introduced at time tit_i is given by k(ti,t)=tiθ[tti]1+θ2k(t_i,t) = t_i^{\theta}[ \frac {t}{t_i}]^{\frac {1+\theta}{2}} when the network is evolved till time tt. Numerical results show a growth in the degree distribution for small kk values at any non-zero θ\theta. In the stochastic picture, m(t)m(t) is a random variable. As long as isindependentoftime,thenetworkshowsabehavioursimilartotheBarabaˊsiAlbert(BA)model.Differentresultsareobtainedwhen is independent of time, the network shows a behaviour similar to the Barab\'asi-Albert (BA) model. Different results are obtained when is time-dependent, e.g., when m(t)m(t) follows a distribution P(m)mλP(m) \propto m^{-\lambda}. The behaviour of P(k)P(k) changes significantly as λ\lambda is varied: for λ>3\lambda > 3, the network has a scale-free distribution belonging to the BA class as predicted by the mean field theory, for smaller values of λ\lambda it shows different behaviour. Characteristic features of the clustering coefficients in both models have also been discussed.Comment: Revised text, references added, to be published in PR

    (Net)workers\u27 Rights: The NLRA and Employee Electronic Communications

    Get PDF

    MARKET FAILURE IN MULTIPHASE ELECTRIC POWER DEVELOPMENT FOR AGRICULTURAL IRRIGATION

    Get PDF
    The adoption of multiphase electric power for electric irrigation has been limited in an area characterized by extremely rapid expansion of irrigated acreage despite production cost advantages. Theoretical and empirical evidence of failure in the existing market for multiphase power development are presented. Alternative development mechanisms are presented and discussed.Resource /Energy Economics and Policy,

    Fast Locality-Sensitive Hashing Frameworks for Approximate Near Neighbor Search

    Full text link
    The Indyk-Motwani Locality-Sensitive Hashing (LSH) framework (STOC 1998) is a general technique for constructing a data structure to answer approximate near neighbor queries by using a distribution H\mathcal{H} over locality-sensitive hash functions that partition space. For a collection of nn points, after preprocessing, the query time is dominated by O(nρlogn)O(n^{\rho} \log n) evaluations of hash functions from H\mathcal{H} and O(nρ)O(n^{\rho}) hash table lookups and distance computations where ρ(0,1)\rho \in (0,1) is determined by the locality-sensitivity properties of H\mathcal{H}. It follows from a recent result by Dahlgaard et al. (FOCS 2017) that the number of locality-sensitive hash functions can be reduced to O(log2n)O(\log^2 n), leaving the query time to be dominated by O(nρ)O(n^{\rho}) distance computations and O(nρlogn)O(n^{\rho} \log n) additional word-RAM operations. We state this result as a general framework and provide a simpler analysis showing that the number of lookups and distance computations closely match the Indyk-Motwani framework, making it a viable replacement in practice. Using ideas from another locality-sensitive hashing framework by Andoni and Indyk (SODA 2006) we are able to reduce the number of additional word-RAM operations to O(nρ)O(n^\rho).Comment: 15 pages, 3 figure

    Giant strongly connected component of directed networks

    Full text link
    We describe how to calculate the sizes of all giant connected components of a directed graph, including the {\em strongly} connected one. Just to the class of directed networks, in particular, belongs the World Wide Web. The results are obtained for graphs with statistically uncorrelated vertices and an arbitrary joint in,out-degree distribution P(ki,ko)P(k_i,k_o). We show that if P(ki,ko)P(k_i,k_o) does not factorize, the relative size of the giant strongly connected component deviates from the product of the relative sizes of the giant in- and out-components. The calculations of the relative sizes of all the giant components are demonstrated using the simplest examples. We explain that the giant strongly connected component may be less resilient to random damage than the giant weakly connected one.Comment: 4 pages revtex, 4 figure

    Degree distributions of growing networks

    Get PDF
    The in-degree and out-degree distributions of a growing network model are determined. The in-degree is the number of incoming links to a given node (and vice versa for out-degree. The network is built by (i) creation of new nodes which each immediately attach to a pre-existing node, and (ii) creation of new links between pre-existing nodes. This process naturally generates correlated in- and out-degree distributions. When the node and link creation rates are linear functions of node degree, these distributions exhibit distinct power-law forms. By tuning the parameters in these rates to reasonable values, exponents which agree with those of the web graph are obtained

    Complexity transitions in global algorithms for sparse linear systems over finite fields

    Full text link
    We study the computational complexity of a very basic problem, namely that of finding solutions to a very large set of random linear equations in a finite Galois Field modulo q. Using tools from statistical mechanics we are able to identify phase transitions in the structure of the solution space and to connect them to changes in performance of a global algorithm, namely Gaussian elimination. Crossing phase boundaries produces a dramatic increase in memory and CPU requirements necessary to the algorithms. In turn, this causes the saturation of the upper bounds for the running time. We illustrate the results on the specific problem of integer factorization, which is of central interest for deciphering messages encrypted with the RSA cryptosystem.Comment: 23 pages, 8 figure
    corecore