582 research outputs found

    Modeling self-organization of communication and topology in social networks

    Full text link
    This paper introduces a model of self-organization between communication and topology in social networks, with a feedback between different communication habits and the topology. To study this feedback, we let agents communicate to build a perception of a network and use this information to create strategic links. We observe a narrow distribution of links when the communication is low and a system with a broad distribution of links when the communication is high. We also analyze the outcome of chatting, cheating, and lying, as strategies to get better access to information in the network. Chatting, although only adopted by a few agents, gives a global gain in the system. Contrary, a global loss is inevitable in a system with too many liarsComment: 6 pages 7 figures, Java simulation available at http://cmol.nbi.dk/models/inforew/inforew.htm

    A fitness model for the Italian Interbank Money Market

    Get PDF
    We use the theory of complex networks in order to quantitatively characterize the formation of communities in a particular financial market. The system is composed by different banks exchanging on a daily basis loans and debts of liquidity. Through topological analysis and by means of a model of network growth we can determine the formation of different group of banks characterized by different business strategy. The model based on Pareto's Law makes no use of growth or preferential attachment and it reproduces correctly all the various statistical properties of the system. We believe that this network modeling of the market could be an efficient way to evaluate the impact of different policies in the market of liquidity.Comment: 5 pages 5 figure

    Greedy Connectivity of Geographically Embedded Graphs

    Full text link
    We introduce a measure of {\em greedy connectivity} for geographical networks (graphs embedded in space) and where the search for connecting paths relies only on local information, such as a node's location and that of its neighbors. Constraints of this type are common in everyday life applications. Greedy connectivity accounts also for imperfect transmission across established links and is larger the higher the proportion of nodes that can be reached from other nodes with a high probability. Greedy connectivity can be used as a criterion for optimal network design

    The Influence of Early Respondents: Information Cascade Effects in Online Event Scheduling

    Full text link
    Sequential group decision-making processes, such as online event scheduling, can be subject to social influence if the decisions involve individuals’ subjective preferences and values. Indeed, prior work has shown that scheduling polls that allow respondents to see others’ answers are more likely to succeed than polls that hide other responses, suggesting the impact of social influence and coordination. In this paper, we investigate whether this difference is due to information cascade effects in which later respondents adopt the decisions of earlier respondents. Analyzing more than 1.3 million Doodle polls, we found evidence that cascading effects take place during event scheduling, and in particular, that early respondents have a larger influence on the outcome of a poll than people who come late. Drawing on simulations of an event scheduling model, we compare possible interventions to mitigate this bias and show that we can optimize the success of polls by hiding the responses of a small percentage of low availability respondents.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/134703/1/Romero et al 2017 (WSDM).pd

    On the Mixing of Diffusing Particles

    Full text link
    We study how the order of N independent random walks in one dimension evolves with time. Our focus is statistical properties of the inversion number m, defined as the number of pairs that are out of sort with respect to the initial configuration. In the steady-state, the distribution of the inversion number is Gaussian with the average ~N^2/4 and the standard deviation sigma N^{3/2}/6. The survival probability, S_m(t), which measures the likelihood that the inversion number remains below m until time t, decays algebraically in the long-time limit, S_m t^{-beta_m}. Interestingly, there is a spectrum of N(N-1)/2 distinct exponents beta_m(N). We also find that the kinetics of first-passage in a circular cone provides a good approximation for these exponents. When N is large, the first-passage exponents are a universal function of a single scaling variable, beta_m(N)--> beta(z) with z=(m-)/sigma. In the cone approximation, the scaling function is a root of a transcendental equation involving the parabolic cylinder equation, D_{2 beta}(-z)=0, and surprisingly, numerical simulations show this prediction to be exact.Comment: 9 pages, 6 figures, 2 table

    Small-World Networks: Links with long-tailed distributions

    Full text link
    Small-world networks (SWN), obtained by randomly adding to a regular structure additional links (AL), are of current interest. In this article we explore (based on physical models) a new variant of SWN, in which the probability of realizing an AL depends on the chemical distance between the connected sites. We assume a power-law probability distribution and study random walkers on the network, focussing especially on their probability of being at the origin. We connect the results to L\'evy Flights, which follow from a mean field variant of our model.Comment: 11 pages, 4 figures, to appear in Phys.Rev.

    Thermodynamics of protein folding: a random matrix formulation

    Full text link
    The process of protein folding from an unfolded state to a biologically active, folded conformation is governed by many parameters e.g the sequence of amino acids, intermolecular interactions, the solvent, temperature and chaperon molecules. Our study, based on random matrix modeling of the interactions, shows however that the evolution of the statistical measures e.g Gibbs free energy, heat capacity, entropy is single parametric. The information can explain the selection of specific folding pathways from an infinite number of possible ways as well as other folding characteristics observed in computer simulation studies.Comment: 21 Pages, no figure

    Two-dimensional SIR epidemics with long range infection

    Full text link
    We extend a recent study of susceptible-infected-removed epidemic processes with long range infection (referred to as I in the following) from 1-dimensional lattices to lattices in two dimensions. As in I we use hashing to simulate very large lattices for which finite size effects can be neglected, in spite of the assumed power law p(x)xσ2p({\bf x})\sim |{\bf x}|^{-\sigma-2} for the probability that a site can infect another site a distance vector x{\bf x} apart. As in I we present detailed results for the critical case, for the supercritical case with σ=2\sigma = 2, and for the supercritical case with 0<σ<20< \sigma < 2. For the latter we verify the stretched exponential growth of the infected cluster with time predicted by M. Biskup. For σ=2\sigma=2 we find generic power laws with σ\sigma-dependent exponents in the supercritical phase, but no Kosterlitz-Thouless (KT) like critical point as in 1-d. Instead of diverging exponentially with the distance from the critical point, the correlation length increases with an inverse power, as in an ordinary critical point. Finally we study the dependence of the critical exponents on σ\sigma in the regime 0<σ<20<\sigma <2, and compare with field theoretic predictions. In particular we discuss in detail whether the critical behavior for σ\sigma slightly less than 2 is in the short range universality class, as conjectured recently by F. Linder {\it et al.}. As in I we also consider a modified version of the model where only some of the contacts are long range, the others being between nearest neighbors. If the number of the latter reaches the percolation threshold, the critical behavior is changed but the supercritical behavior stays qualitatively the same.Comment: 14 pages, including 29 figure

    Self-organized Emergence of Navigability on Small-World Networks

    Full text link
    This paper mainly investigates why small-world networks are navigable and how to navigate small-world networks. We find that the navigability can naturally emerge from self-organization in the absence of prior knowledge about underlying reference frames of networks. Through a process of information exchange and accumulation on networks, a hidden metric space for navigation on networks is constructed. Navigation based on distances between vertices in the hidden metric space can efficiently deliver messages on small-world networks, in which long range connections play an important role. Numerical simulations further suggest that high cluster coefficient and low diameter are both necessary for navigability. These interesting results provide profound insights into scalable routing on the Internet due to its distributed and localized requirements.Comment: 3 figure

    Complexity of Discrete Energy Minimization Problems

    Full text link
    Discrete energy minimization is widely-used in computer vision and machine learning for problems such as MAP inference in graphical models. The problem, in general, is notoriously intractable, and finding the global optimal solution is known to be NP-hard. However, is it possible to approximate this problem with a reasonable ratio bound on the solution quality in polynomial time? We show in this paper that the answer is no. Specifically, we show that general energy minimization, even in the 2-label pairwise case, and planar energy minimization with three or more labels are exp-APX-complete. This finding rules out the existence of any approximation algorithm with a sub-exponential approximation ratio in the input size for these two problems, including constant factor approximations. Moreover, we collect and review the computational complexity of several subclass problems and arrange them on a complexity scale consisting of three major complexity classes -- PO, APX, and exp-APX, corresponding to problems that are solvable, approximable, and inapproximable in polynomial time. Problems in the first two complexity classes can serve as alternative tractable formulations to the inapproximable ones. This paper can help vision researchers to select an appropriate model for an application or guide them in designing new algorithms.Comment: ECCV'16 accepte
    corecore