This document discusses common features of complex systems and networks. It notes that complex systems generally have a large number of elements that follow individual behavior rules and interact locally. The systems exhibit node and link diversity and dynamics. They can display hierarchy across different levels and heterogeneity. Complex networks form the backbone of complex systems. Network structure influences function and vice versa. Three key metrics to characterize networks are described - average path length, degree distribution, and clustering coefficient. Different types of networks, including random, regular, small-world and scale-free are also discussed.
Multi-mediated community structure in a socio-technical networksuthers
Suthers, D. D., & Chu, K.-H. (2012, April 29-May 2, 2012). Multi-mediated community structure in a socio-technical network. Paper presented at the Learning Analytics and Knowledge 2012 conference
International Conference on Cognitive Modeling 2010 Brahms tutorialMaarten Sierhuis
This presentation is the course work for the Brahms tutorial given at the 2010 International Conference on Cognitive Modeling. Brahms is a Multi-Agent Modeling and Simulation Environment for Human Behavior and Work Practice.
Multi-mediated community structure in a socio-technical networksuthers
Suthers, D. D., & Chu, K.-H. (2012, April 29-May 2, 2012). Multi-mediated community structure in a socio-technical network. Paper presented at the Learning Analytics and Knowledge 2012 conference
International Conference on Cognitive Modeling 2010 Brahms tutorialMaarten Sierhuis
This presentation is the course work for the Brahms tutorial given at the 2010 International Conference on Cognitive Modeling. Brahms is a Multi-Agent Modeling and Simulation Environment for Human Behavior and Work Practice.
Can network science be taught with a gamified approach?
These are the slides i use for an introductory lesson about network science basics. The teaching methodology is inductive.
First part (pp 1-42)
The five main topics (nodes and links, centrality, in-degree and out-degree, diffusion through networks, degrees of separation) are presented through a concrete case. Students have a game to answer, in presence and/or on line, for each subject. This interactive phase activate their interest and curiosity.
Second part (pp 43-58)
Each game is recovered, and the experience of the game is explained and connected with the relative concept of network science.
Third part (59-68)
At the end there is a meta-reflection the gamified experience, talking about the “what” (contents about network complexity) and the “how” (modalities to sustain engagement).
Complex systems,
Software systems,
Database systems,
Operating systems,
Bioinformatics systems,
Social Systems,
Service Oriented Systems,
Cloud Systems,
Ubiquitous systems,
Distributed Version Control Systems (GitHub), and
Software Container Systems (DockerHub and Google App Engine).
New Metrics for New Media Bay Area CIO IT Executives MeetupTatyana Kanzaveli
Presentation done by Marc Smith, Chief Social Scientist, Telligent at the Bay Area CIO/IT Executives meetup http://www.meetup.com/CIO-IT-Executives/ run by Tatyana Kanzaveli.
My slides from my 3-hour tutorial on mesoscale structures in networks from the 2016 Lake Como School on Complex Networks (http://ntmb.lakecomoschool.org/).
After my talk, Tiago Peixoto gave a talk on statistical inference of large-scale mesoscale structures in networks. His presentation, which takes a complementary perspective from mine, is available at the following website: https://speakerdeck.com/count0/statisical-inference-of-generative-network-models
Title: What Is the Difference between a Social and a Hyperlink Network? -- Ho...Jérôme KUNEGIS
Networks represent a type of dataset that is ubiquitous in many
disciplines and areas. Examples are social networks (ties between
people), communication networks, trophic networks ("who eats who"), the
World Wide Web, computer networks, lexical networks (connections between
words), transport networks, metabolic networks (e.g., interactions
between proteins), neural networks, animal networks, citation networks,
affiliation networks (of people in groups), software dependency
networks, and many more. In this talk, we present ongoing work on
answering the question "Can the type of network be detected from the
network structure alone?" For instance, given a completely unlabeled
network dataset consisting only of node and edges, can we detect whether
the data represents a social network or a hyperlink network? We present
machine learning and statistical approaches to answering questions of
this type. The presented results will make use of data in the KONECT
project, one of the largest repositories of network datasets, curated at
the University of Namur.
Can network science be taught with a gamified approach?
These are the slides i use for an introductory lesson about network science basics. The teaching methodology is inductive.
First part (pp 1-42)
The five main topics (nodes and links, centrality, in-degree and out-degree, diffusion through networks, degrees of separation) are presented through a concrete case. Students have a game to answer, in presence and/or on line, for each subject. This interactive phase activate their interest and curiosity.
Second part (pp 43-58)
Each game is recovered, and the experience of the game is explained and connected with the relative concept of network science.
Third part (59-68)
At the end there is a meta-reflection the gamified experience, talking about the “what” (contents about network complexity) and the “how” (modalities to sustain engagement).
Complex systems,
Software systems,
Database systems,
Operating systems,
Bioinformatics systems,
Social Systems,
Service Oriented Systems,
Cloud Systems,
Ubiquitous systems,
Distributed Version Control Systems (GitHub), and
Software Container Systems (DockerHub and Google App Engine).
New Metrics for New Media Bay Area CIO IT Executives MeetupTatyana Kanzaveli
Presentation done by Marc Smith, Chief Social Scientist, Telligent at the Bay Area CIO/IT Executives meetup http://www.meetup.com/CIO-IT-Executives/ run by Tatyana Kanzaveli.
My slides from my 3-hour tutorial on mesoscale structures in networks from the 2016 Lake Como School on Complex Networks (http://ntmb.lakecomoschool.org/).
After my talk, Tiago Peixoto gave a talk on statistical inference of large-scale mesoscale structures in networks. His presentation, which takes a complementary perspective from mine, is available at the following website: https://speakerdeck.com/count0/statisical-inference-of-generative-network-models
Title: What Is the Difference between a Social and a Hyperlink Network? -- Ho...Jérôme KUNEGIS
Networks represent a type of dataset that is ubiquitous in many
disciplines and areas. Examples are social networks (ties between
people), communication networks, trophic networks ("who eats who"), the
World Wide Web, computer networks, lexical networks (connections between
words), transport networks, metabolic networks (e.g., interactions
between proteins), neural networks, animal networks, citation networks,
affiliation networks (of people in groups), software dependency
networks, and many more. In this talk, we present ongoing work on
answering the question "Can the type of network be detected from the
network structure alone?" For instance, given a completely unlabeled
network dataset consisting only of node and edges, can we detect whether
the data represents a social network or a hyperlink network? We present
machine learning and statistical approaches to answering questions of
this type. The presented results will make use of data in the KONECT
project, one of the largest repositories of network datasets, curated at
the University of Namur.
Similar to Academic Course: 02 Self-organization and emergence in networked systems (20)
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Accelerate your Kubernetes clusters with Varnish Caching
Academic Course: 02 Self-organization and emergence in networked systems
1. Designed by René Doursat & José Halloy
Self-organization and emergence
in networked systems
René Doursat & José Halloy
2. Designed by René Doursat & José Halloy
Common features of complex systems
• Large number of elements
• Individual behavior rules
• Local interactions
• Node / link diversity & dynamics
• Hierarchy of levels, heterogeneity, reproducibility
3. Designed by René Doursat & José Halloy
Common features of complex systems
Large number of elements
NodesSystem
fireflies
animals, cars
ants, termites
cells
amoebae
molecules
swarm sync
flocking, traffic
insect colonies
animal coats
slime mold
BZ reaction
4. Designed by René Doursat & José Halloy
always do A
if B then C
sometimes do D
etc.
limited repertoire of fixed
and reactive behavior
note: elements are not
intrinsically “simple”, only
functionally at the level of
description of the studied
process
Common features of complex systems
Individual behavior rules
System Nodes Rules
BZ reaction molecules react, diffuse
slime mold amoebae
diffuse, sync,
move
animal coats cells
activate,
inhibit
insect colonies ants, termites
carry, deposit,
follow
flocking, traffic animals, cars
steer, adjust
speed
swarm sync fireflies
reset
phase/freq
5. Designed by René Doursat & José Halloy
System Nodes Edges
BZ reaction molecules collisions
slime mold amoebae cAMP
animal coats cells morphogens
insect colonies ants, termites pheromone
flocking, traffic animals, cars perception
swarm sync fireflies
photons
long-range
interactions inside a local
neighborhood in 2-D or 3-D
geometric space
limited “visibility” within
Euclidean distance
one-to-one messaging or
one-to-many broadcasting
Common features of complex systems
Local interactions: geometric, regular
6. Designed by René Doursat & José Halloy
local neighborhoods can also
contain “long-range” links:
either “element” nodes
located in space
or “categorical” nodes not
located in space
still limited “visibility”, but not
according to distance
Common features of complex systems
Local interactions: Semi-geometric, irregular
System Nodes Edges
Internet routers wires
brain neurons synapses
WWW pages hyperlinks
Hollywood actors movies
gene regulation proteins binding sites
ecology web species competition
7. Designed by René Doursat & José Halloy
System
Node
diversity
Node state/
dynamics
Internet
routers, PCs,
switches ...
routing state/
algorithm
brain
sensory, inter,
motor neuron
electrical
potentials
WWW
commercial,
educational ...
popularity,
num. of visits
Hollywood traits, talent ...
celebrity level,
contracts
gene regulation
protein type,
DNA sites ...
boundness,
concentration
ecology web
species traits
(diet, reprod.)
fitness,
density
nodes can be of different
subtypes: , , ...
nodes have variable states
of activity:
Common features of complex systems
Node diversity
8. Designed by René Doursat & José Halloy
chaotic attractorlimit cycle attractor
dx
dt
= f(x) if each node in the network obey some diff equation, e.g.:
then generally, three possible behaviors in phase space:
fixed point attractor
Common features of complex systems
Node dynamics: individual nodes
9. Designed by René Doursat & José Halloy
chaotic node
network
limit cycle node
network
fixed point node
network
= f(xA)+AB g(xA,xB)
dxA
dt
a complex system is a set of coupled nodes obeying:
generally, three types of node network dynamics:
Common features of complex systems
Node dynamics: coupled nodes
10. Designed by René Doursat & José Halloy
fixed point nodes
fully connected network
a few fixed patterns
( 0.14 N)
Pattern retrieval in Hopfield memory:
full graph with Ising-type interactions
Common features of complex systems
Node dynamics: attractors in full networks
11. Designed by René Doursat & José Halloy
Pattern formation in animal pigmentation:
2-D lattice with stationary reaction-diffusion
(NetLogo simulation, Uri Wilensky, Northwestern University, IL)
fixed point nodes
regular lattice network
a great number of new
patterns
Common features of complex systems
Node dynamics: attractors in lattice networks
12. Designed by René Doursat & José Halloy
limit cycle nodes
fully connected network
global synchronization
Spontaneous synchronization in a network of limit-cycle
oscillators with distributed natural frequencies
(Strogatz, 2001)
Common features of complex systems
Node dynamics: sync in full networks
13. Designed by René Doursat & José Halloy
limit cycle nodes
fully connected network
global synchronization
Spontaneous synchronization in a swarm of fireflies:
(almost) fully connected graph of independent oscillators
(NetLogo simulation, Uri Wilensky, Northwestern University, IL)
Common features of complex systems
Node dynamics: sync in full networks
14. Designed by René Doursat & José Halloy
BZ reaction or slime mold aggregation:
2-D lattice with oscillatory reaction-diffusion
(NetLogo simulation, Uri Wilensky, Northwestern University, IL)
limit cycle nodes
regular lattice network
traveling waves
Common features of complex systems
Node dynamics: waves in lattice networks
15. Designed by René Doursat & José Halloy
understand of beneficial or nefarious
activity/failures spread over a network:
diseases
power blackouts
computer viruses
fashions, etc.
susceptible-infected-susceptible (SIS)
epidemiological model:
two node states: infected or
susceptible
susceptible nodes can get infected
with probability
infected nodes heal and become
susceptible again with proba
spreading rate: = /
3-D visualization of social links
(A. S. Klovdahl, http://carnap.ss.uci.edu/vis.html)
Common features of complex systems
Node dynamics: epidemics in complex networks
16. Designed by René Doursat & José Halloy
exponential network
spread with threshold
scale-free network
spread WITHOUT threshold
spreading rate
densityofinfectednodes
WS small-world
Epidemic on exponential and scale-free networks
(Pastor-Satorras & Vespignani, 2001)
C
BA scale-free
Common features of complex systems
Node dynamics: epidemics in complex networks
17. Designed by René Doursat & José Halloy
System
Link
diversity
Link state/
dynamics
Internet
bandwidth
(DSL, cable)...
--
brain
excit., inhib.
synapses ...
synap. weight,
learning
WWW -- --
Hollywood
theater movie,
TV series ...
partnerships
gene regulation
enhancing,
blocking ...
mutations,
evolution
ecology web
predation,
cooperation
evolution,
selection
links can be of different
subtypes: , , ...
links can also have variable
weights:
Common features of complex systems
Link diversity & dynamics
18. Designed by René Doursat & José Halloy
the state of a network generally evolves
on two time-scales:
fast time scale: node activities
slow time scale: connection weights
examples:
neural networks: activities & learning
gene networks: expression & mutations
the structural complexity of
a network can also evolve by
adding or removing nodes
and edges
examples:
Internet, WWW, actors.
ecology, etc.
Common features of complex systems
Link diversity & dynamics
19. Designed by René Doursat & José Halloy
society
organism
cell
protein
each complex system
can become a “simple”
component in a higher
organization
Common features of complex systems
Hierarchy of levels
20. Designed by René Doursat & José Halloy
Complex networks within complex systems
• Three network metrics
• Random & regular networks
• Small-world & scale-free networks
• Case studies
21. Designed by René Doursat & José Halloy
the brain organisms ant trails
termite
mounds
animal
flocks
physical
patterns
living cell
biological
patterns
2D, 3D spatial
range
non-spatial,
hybrid range cities,
populations
social networks
markets,
economy
Internet,
Web
Complex networks
22. Designed by René Doursat & José Halloy
complex networks are the backbone of complex systems
every complex system is a network of interaction among numerous
smaller elements
some networks are geometric or regular in 2-D or 3-D space
other contain “long-range” connections or are not spatial at all
understanding a complex system = break down into parts + reassemble
network anatomy is important to characterize because
structure affects function (and vice-versa)
ex: structure of social networks
prevent spread of diseases
control spread of information (marketing, fads, rumors, etc.)
ex: structure of power grid / Internet
understand robustness and stability of power / data transmission
Complex networks
23. Designed by René Doursat & José Halloy
A
B
the path length between two nodes
A and B is the smallest number of
edges connecting them:
l(A, B) = min l(A, Ai, ... An, B)
the average path length of a network
over all pairs of N nodes is
L = l(A, B)
= 2/N(N–1)A,B l(A, B)
the network diameter is the maximal
path length between two nodes:
D = max l(A, B)
property: 1 L D N–1
The path length between A and B is 3
Complex networks
Three metrics: average path length
24. Designed by René Doursat & José Halloy
A
the degree of a node A is the number
of its connections (or neighbors), kA
the average degree of a network is
k = 1/N A kA
the degree distribution function P(k)
is the histogram (or probability) of the
node degrees: it shows their spread
around the average value
The degree of A is 5
numberofnodes
node degree
P(k)
0 k N–1
Complex networks
Three metrics: degree distribution
25. Designed by René Doursat & José Halloy
A
the neighborhood of a node A is the
set of kA nodes at distance 1 from A
given the number of pairs of neighbors:
FA = B,B’ 1
= kA (kA –1) / 2
and the number of pairs of neighbors
that are also connected to each other:
EA = BB’ 1
the clustering coefficient of A is
CA = EA / FA 1
and the network clustering coefficient:
C = 1/N A CA 1
B
B’
The clustering coefficient of A is 0.6
Complex networks
Three metrics: clustering coefficient
26. Designed by René Doursat & José Halloy
in a fully (globally) connected
network, each node is connected to
all other nodes
fully connected networks have the
LOWEST path length and diameter:
L = D = 1
the HIGHEST clustering coefficient:
C = 1
and a PEAK degree distribution (at
the largest possible constant):
kA = N–1, P(k) = (k – N+1)
also the highest number of edges:
E = N(N–1) / 2 ~ N2
A fully connected network
Complex networks
Regular networks: fully connected
27. Designed by René Doursat & José Halloy
a lattice network is generally
structured against a geometric 2-D or
3-D background
for example, each node is connected
to its nearest neighbors depending
on the Euclidean distance:
A B d(A, B) r
the radius r should be sufficiently
small to remain far from a fully
connected network, i.e., keep a large
diameter:
D >> 1
A
r
A 2-D lattice network
Complex networks
Regular networks: lattice
28. Designed by René Doursat & José Halloy
in a ring lattice, nodes are laid out on a
circle and connected to their K nearest
neighbors, with K << N
HIGH average path length:
L N / 2K ~ N for N >> 1
(mean between closest node l = 1 and
antipode node l = N / K)
HIGH clustering coefficient:
C 0.75 for K >> 1
(mean between center with K edges
and farthest neighbors with K/2 edges)
PEAK degree distribution (low value):
kA = K, P(k) = (k – K)
A ring lattice with K = 4
Complex networks
Regular networks: lattice: ring world
29. Designed by René Doursat & José Halloy
A random graph with p = 3/N = 0.18
in a random graph each pair of nodes
is connected with probability p
LOW average path length:
L lnN / lnk ~ lnN for N >> 1
(because the entire network can be
covered in about L steps: N ~ kL
)
LOW clustering coefficient (if sparse):
C = p = k / N << 1 for p << 1
(because the probability of 2 neighbors
being connected is p, by definition)
PEAK (Poisson) degree distribution
(low value):
k pN, P(k) (k – pN)
Complex networks
Random networks
30. Designed by René Doursat & José Halloy
Percolation in a random graph
(Wang, X. F., 2002)
Erdős & Rényi (1960): above a
critical value of random connectivity
the network is almost certainly
connected in one single component
percolation happens when “picking
one button (node) will lift all the
others”
the critical value of probability p is
pc lnN / N
and the corresponding average
critical degree:
kc pc N lnN
NetLogo model: /Networks/Giant Component
Complex networks
Random networks
31. Designed by René Doursat & José Halloy
a network with small-world EFFECT is
ANY large network that has a low
average path length:
L << N for N >> 1
famous “6 degrees of separation”
the Watts-Strogatz (WS) small-world
MODEL is a hybrid network between a
regular lattice and a random graph
WS networks have both the LOW
average path length of random graphs:
L ~ lnN for N >> 1
and the HIGH clustering coefficient of
regular lattices:
C 0.75 for K >> 1
A Watts-Strogatz small-world network
Complex networks
Small-world networks
32. Designed by René Doursat & José Halloy
Ring Lattice
large world
well clustered
Watts-Strogatz (1998)
small world
well clustered
Random graph
small world
poorly clustered
the WS model consists in gradually rewiring a regular lattice into a random graph,
with a probability p that an original lattice edge will be reassigned at random
p = 0 (order) 0 < p < 1 p = 1 (disorder)
Complex networks
Small-world networks
33. Designed by René Doursat & José Halloy
the clustering coefficient is resistant to
rewiring over a broad interval of p
it means that the small-world effect
is hardly detectable locally: nodes
continue seeing mostly the same
“clique” of neighbors
on the other hand, the average path
length drops rapidly for low p
as soon as a few long-range “short-
cut” connections are introduced, the
original large-world starts collapsing
through a few bridges, far away
cliques are put in contact and this is
sufficient for a rapid spread of
information
0
random rewiring0 1
averagepathlengthclustering
1
L
C
p
p
0.75
~ lnN
Complex networks
Small-world networks
34. Designed by René Doursat & José Halloy
NetLogo model: /Networks/Small Worlds
Complex networks
Small-world networks
Modeling & simulation
setup:
number of nodes
each node is connected to its 2+2
nearest neighbors
rewire ONCE:
rewire one ring lattice incrementally
(ignoring the rewiring probability)
rewire ALL:
rewire several ring lattices in one
shot under a certain rewiring
probability
calculate 2 metrics for each network:
average path length
clustering coefficient
35. Designed by René Doursat & José Halloy
on the other hand, the WS model still
has a PEAK (Poisson) degree
distribution (uniform connectivity)
in that sense, it belongs to the same
family of exponential networks:
fully connected networks
lattices
random graphs
WS small-world networks
P(k)
krandom, k = 3 WS small-world, k = 3
lattice, k = 3full, k = 16
Complex networks
Small-world networks
36. Designed by René Doursat & José Halloy
A schematic scale-free network
in a scale-free network the degree
distribution follows a POWER-LAW:
P(k) ~ k
–
there exists a small number of highly
connected nodes, called hubs (tail of
the distribution)
the great majority of nodes have few
connections (head of the distribution)
numberofnodes
node degree
P(k)
hubs
Complex networks
Scale-free networks
37. Designed by René Doursat & José Halloy
Typical aspect of a power law
(image from Larry Ruff, University of Michigan, http://www.geo.lsa.umich.edu/~ruff)
straight line, in log-log plot hyperbola-like, in linear-linear plot
Complex networks
Scale-free networks
38. Designed by René Doursat & José Halloy
U.S. highway system U.S. airline system
(Barabási & Bonabeau, 2003)
Complex networks
Scale-free networks
39. Designed by René Doursat & José Halloy
Effect of failures and attacks on scale-free networks
(Barabási & Bonabeau, 2003)
regular networks are not
resistant to random node
failures: they quickly break
down into isolated fragments
scale-free networks are
remarkably resistant to
random accidental node
failures . . .
. . . however they are also
highly vulnerable to targeted
attacks on their hubs
Complex networks
Scale-free networks
40. Designed by René Doursat & José Halloy
in a random graph the
average path length
increases significantly with
node removal, then eventually
breaks down
for a while, the network
becomes a large world
in a scale-free network, the
average path length is
preserved during random
node removal
it remains a small world
however, it fails even faster
than a random graph under
targeted removal
random and targeted
removal of nodes
(Albert, Jeong & Barabási, 1999)
averagepathlengthaveragepathlength
Scale-free network
Random graph
Complex networks
Scale-free networks
41. Designed by René Doursat & José Halloy
Growth and preferential attachment creating a scale-free network
(Barabási & Bonabeau, 2003)
the Barabási-Albert model, reproduces
the scale-free property by:
growth and
(linear) preferential attachment
growth: a node is added at each step
attachment: new nodes tend to prefer
well-connected nodes (“the rich get
richer” or “first come, best served”) in
linear proportion to their degree
NetLogo model: /Networks/Preferential Attachment
Complex networks
Scale-free networks
42. Designed by René Doursat & José Halloy
NetLogo model: /Networks/Preferential Attachment
Complex networks
Scale-free networks
Modeling & simulation
setup:
2 nodes, 1 link
step:
a new node is added to the
network and preferrentially
attached to one other node
calculate 1 metric:
degree distribution (displayed as
histogram and in log-log
coordinates)
43. Designed by René Doursat & José Halloy
the Internet is a network
of routers that transmit
data among computers
routers are grouped into
domains, which are
interconnected
to map the connections,
“traceroute” utilities are
used to send test data
packets and trace their
path
Schema of the Internet
(Wang, X. F., 2002)
Complex networks
Case studies: Internet
44. Designed by René Doursat & José Halloy
Map of Internet colored by IP address
(Bill Cheswick & Hal Burch, http://research.lumeta.com/ches/map)
Complex networks
Case studies: Internet
45. Designed by René Doursat & José Halloy
the connectivity degree of a node
follows a power of its rank (sorting out
in decreasing order of degree):
node degree ~ (node rank)–
the most connected nodes are the
least frequent:
degree frequency ~(node degree )–
the Internet is a scale-free network
nodedegree
node degree
node rank
frequency
Two power laws of the Internet topology
(Faloutsos, Faloutsos & Faloutsos, 1999)
Complex networks
Case studies: Internet
46. Designed by René Doursat & José Halloy
Schema of the World Wide Web of documents
the World Wide Web is a
network of documents
that reference each other
the nodes are the Web
pages and the edges are
the hyperlinks
edges are directed: they
can be outgoing and
incoming hyperlinks
Complex networks
Case studies: World Wide Web
47. Designed by René Doursat & José Halloy
Hierachical topology of the international Web cache
(Bradley Huffaker, http://www.caida.org/tools/visualization/plankton)
Complex networks
Case studies: World Wide Web
48. Designed by René Doursat & José Halloy
Distribution of links on the World-Wide Web
(Albert, Jeong & Barabási, 1999)
averagepathlengthdegreeprobability
network size
degree
WWW is a scale-free network:
P(k) ~ k
–
with out = 2.45 and in = 2.1
WWW is also a small world:
L lnN
with L 11 for N = 10
5
documents
Complex networks
Case studies: World Wide Web
49. Designed by René Doursat & José Halloy
“The Oracle of Bacon”
http://www.cs.virginia.edu/oracle
Path from K. Kline to K. Bacon = 3 (as of 1995)
(http://collegian.ksu.edu/issues/v100/FA/n069/fea-making-bacon-fuqua.html)
a given actor is on average 3 movies
away from Kevin Bacon
(LBacon=2.946, as of June 2004) . . .
or any other actor for that matter
Hollywood is a small world
. . . and it is a scale-free small world:
a few actors played in a lot of movies,
and a lot of actors in few movies
Complex networks
Case studies: actors
50. Designed by René Doursat & José Halloy
Co-authors of Paul Erdős have number 1,
co-authors of co-authors number 2, etc.
Mathematicians form a highly clustered
(C = 0.14) small world (L = 7.64)
“The Erdős Number Project”
http://www.oakland.edu/enp
Complex networks
Case studies: scientists
51. Designed by René Doursat & José Halloy
Complex networks
Case studies: proteins
52. Designed by René Doursat & José Halloy
Complex networks
Case studies: proteins
53. Designed by René Doursat & José Halloy
Correct Identification of nodes and links is a difficult task that presents numerous experimental
technical.
Complex networks
Case studies: proteins