1,448 research outputs found
Taxonomy and clustering in collaborative systems: the case of the on-line encyclopedia Wikipedia
In this paper we investigate the nature and structure of the relation between
imposed classifications and real clustering in a particular case of a
scale-free network given by the on-line encyclopedia Wikipedia. We find a
statistical similarity in the distributions of community sizes both by using
the top-down approach of the categories division present in the archive and in
the bottom-up procedure of community detection given by an algorithm based on
the spectral properties of the graph. Regardless the statistically similar
behaviour the two methods provide a rather different division of the articles,
thereby signaling that the nature and presence of power laws is a general
feature for these systems and cannot be used as a benchmark to evaluate the
suitability of a clustering method.Comment: 5 pages, 3 figures, epl2 styl
Causality Violation and Naked Time Machines in AdS_5
We study supersymmetric charged rotating black holes in AdS, and show
that closed timelike curves occur outside the event horizon. Also upon lifting
to rotating D3 brane solutions of type IIB supergravity in ten dimensions,
closed timelike curves are still present. We believe that these causal
anomalies correspond to loss of unitarity in the dual , D=4 super
Yang-Mills theory, i.e. the chronology protection conjecture in the AdS bulk is
related to unitarity bounds in the boundary CFT. We show that no charged or
uncharged geodesic can penetrate the horizon, so that the exterior region is
geodesically complete. These results still hold true in the quantum case,
i.~e.~the total absorption cross section for Klein-Gordon scalars propagating
in the black hole background is zero. This suggests that the effective
temperature is zero instead of assuming the naively found imaginary value.Comment: 22 pages, Latex, uses JHEP.cls, 1 figure. v3: comments on unitarity
in CFT and 2 references added. v4: changes in final remarks, final version to
appear in JHE
Beauty and Distance in the Stable Marriage Problem
The stable marriage problem has been introduced in order to describe a
complex system where individuals attempt to optimise their own satisfaction,
subject to mutually conflicting constraints. Due to the potential large
applicability of such model to describe all the situation where different
objects has to be matched pairwise, the statistical properties of this model
have been extensively studied. In this paper we present a generalization of
this model, introduced in order to take into account the presence of
correlations in the lists and the effects of distance when the player are
supposed to be represented by a position in space.Comment: 8 pages, 3 figures, submitted to ep
Chronology Protection in anti-de Sitter
We consider 1/2 BPS excitations of AdS(5)xS(5) geometries in type IIB string
theory that can be mapped into free fermion configurations according to the
prescription of Lin, Lunin and Maldacena (LLM). It is shown that whenever the
fermionic probability density exceeds one or is negative, closed timelike
curves appear in the bulk. A violation of the Pauli exclusion principle in the
phase space of the fermions is thus intimately related to causality violation
in the dual geometries.Comment: 4 pages, 1 figure. v2: clarifications on the proof and comments on
curvature singularity added. v3: final version to appear in Class. Quantum
Gra
Quantitative description and modeling of real networks
In this letter we present data analysis and modeling of two particular cases
of study in the field of growing networks. We analyze WWW data set and
authorship collaboration networks in order to check the presence of correlation
in the data. The results are reproduced with a pretty good agreement through a
suitable modification of the standard AB model of network growth. In
particular, intrinsic relevance of sites plays a role in determining the future
degree of the vertex.Comment: 4 pages, 3 figure
Invasion Percolation with Temperature and the Nature of SOC in Real Systems
We show that the introduction of thermal noise in Invasion Percolation (IP)
brings the system outside the critical point. This result suggests a possible
definition of SOC systems as ordinary critical systems where the critical point
correspond to set to 0 one of the parameters. We recover both IP and EDEN
model, for , and respectively. For small we find a
dynamical second order transition with correlation length diverging when .Comment: 4 pages, 2 figure
Optimal scales in weighted networks
The analysis of networks characterized by links with heterogeneous intensity
or weight suffers from two long-standing problems of arbitrariness. On one
hand, the definitions of topological properties introduced for binary graphs
can be generalized in non-unique ways to weighted networks. On the other hand,
even when a definition is given, there is no natural choice of the (optimal)
scale of link intensities (e.g. the money unit in economic networks). Here we
show that these two seemingly independent problems can be regarded as
intimately related, and propose a common solution to both. Using a formalism
that we recently proposed in order to map a weighted network to an ensemble of
binary graphs, we introduce an information-theoretic approach leading to the
least biased generalization of binary properties to weighted networks, and at
the same time fixing the optimal scale of link intensities. We illustrate our
method on various social and economic networks.Comment: Accepted for presentation at SocInfo 2013, Kyoto, 25-27 November 2013
(http://www.socinfo2013.org
Uncovering the topology of configuration space networks
The configuration space network (CSN) of a dynamical system is an effective
approach to represent the ensemble of configurations sampled during a
simulation and their dynamic connectivity. To elucidate the connection between
the CSN topology and the underlying free-energy landscape governing the system
dynamics and thermodynamics, an analytical soluti on is provided to explain the
heavy tail of the degree distribution, neighbor co nnectivity and clustering
coefficient. This derivation allows to understand the universal CSN network
topology observed in systems ranging from a simple quadratic well to the native
state of the beta3s peptide and a 2D lattice heteropolymer. Moreover CSN are
shown to fall in the general class of complex networks describe d by the
fitness model.Comment: 6 figure
A perturbative approach to the Bak-Sneppen Model
We study the Bak-Sneppen model in the probabilistic framework of the Run Time
Statistics (RTS). This model has attracted a large interest for its simplicity
being a prototype for the whole class of models showing Self-Organized
Criticality. The dynamics is characterized by a self-organization of almost all
the species fitnesses above a non-trivial threshold value, and by a lack of
spatial and temporal characteristic scales. This results in {\em avalanches} of
activity power law distributed. In this letter we use the RTS approach to
compute the value of , the value of the avalanche exponent and the
asymptotic distribution of minimal fitnesses.Comment: 4 pages, 3 figures, to be published on Physical Review Letter
- …