-
Evidence of Replica Symmetry Breaking under the Nishimori conditions in epidemic inference on graphs
Authors:
Alfredo Braunstein,
Louise Budzynski,
Matteo Mariani,
Federico Ricci-Tersenghi
Abstract:
In Bayesian inference, computing the posterior distribution from the data is typically a non-trivial problem, which usually requires approximations such as mean-field approaches or numerical methods, like the Monte Carlo Markov Chain. Being a high-dimensional distribution over a set of correlated variables, the posterior distribution can undergo the notorious replica symmetry breaking transition.…
▽ More
In Bayesian inference, computing the posterior distribution from the data is typically a non-trivial problem, which usually requires approximations such as mean-field approaches or numerical methods, like the Monte Carlo Markov Chain. Being a high-dimensional distribution over a set of correlated variables, the posterior distribution can undergo the notorious replica symmetry breaking transition. When it happens, several mean-field methods and virtually every Monte Carlo scheme can not provide a reasonable approximation to the posterior and its marginals. Replica symmetry is believed to be guaranteed whenever the data is generated with known prior and likelihood distributions, namely under the so-called Nishimori conditions. In this paper, we break this belief, by providing a counter-example showing that, under the Nishimori conditions, replica symmetry breaking arises. Introducing a simple, geometrical model that can be thought of as a patient zero retrieval problem in a highly infectious regime of the epidemic Susceptible-Infectious model, we show that under the Nishimori conditions, there is evidence of replica symmetry breaking. We achieve this result by computing the instability of the replica symmetric cavity method toward the one step replica symmetry broken phase. The origin of this phenomenon -- replica symmetry breaking under the Nishimori conditions -- is likely due to the correlated disorder appearing in the epidemic models.
△ Less
Submitted 28 February, 2025; v1 submitted 18 February, 2025;
originally announced February 2025.
-
Nonequilibrium steady-state dynamics of Markov processes on graphs
Authors:
Stefano Crotti,
Thomas Barthel,
Alfredo Braunstein
Abstract:
We propose an analytic approach for the steady-state dynamics of Markov processes on locally tree-like graphs. It is based on the definition of a probability distribution for infinite edge trajectories in terms of infinite matrix products. For homogeneous ensembles on regular graphs, the distribution is parametrized by a single $d\times d\times r^2$ tensor, where $r$ is the number of states per va…
▽ More
We propose an analytic approach for the steady-state dynamics of Markov processes on locally tree-like graphs. It is based on the definition of a probability distribution for infinite edge trajectories in terms of infinite matrix products. For homogeneous ensembles on regular graphs, the distribution is parametrized by a single $d\times d\times r^2$ tensor, where $r$ is the number of states per variable and $d$ is the matrix-product bond dimension. While the approach becomes exact in the large-$d$ limit, it usually produces extremely accurate results even for small $d$. The $d^2r^2$ parameters are found by solving a fixed point equation, for which we provide an efficient belief-propagation procedure. We apply it to a variety of models, including Ising-Glauber dynamics with symmetric and asymmetric couplings and the SIS model. Even for small $d$, the results are compatible with Monte Carlo estimates and accurately reproduce known exact solutions. The method gives access to accurate temporal correlations which, in some regimes, may be virtually impossible to estimate by sampling.
△ Less
Submitted 13 December, 2024; v1 submitted 28 November, 2024;
originally announced November 2024.
-
GPT-4o System Card
Authors:
OpenAI,
:,
Aaron Hurst,
Adam Lerer,
Adam P. Goucher,
Adam Perelman,
Aditya Ramesh,
Aidan Clark,
AJ Ostrow,
Akila Welihinda,
Alan Hayes,
Alec Radford,
Aleksander Mądry,
Alex Baker-Whitcomb,
Alex Beutel,
Alex Borzunov,
Alex Carney,
Alex Chow,
Alex Kirillov,
Alex Nichol,
Alex Paino,
Alex Renzin,
Alex Tachard Passos,
Alexander Kirillov,
Alexi Christakis
, et al. (395 additional authors not shown)
Abstract:
GPT-4o is an autoregressive omni model that accepts as input any combination of text, audio, image, and video, and generates any combination of text, audio, and image outputs. It's trained end-to-end across text, vision, and audio, meaning all inputs and outputs are processed by the same neural network. GPT-4o can respond to audio inputs in as little as 232 milliseconds, with an average of 320 mil…
▽ More
GPT-4o is an autoregressive omni model that accepts as input any combination of text, audio, image, and video, and generates any combination of text, audio, and image outputs. It's trained end-to-end across text, vision, and audio, meaning all inputs and outputs are processed by the same neural network. GPT-4o can respond to audio inputs in as little as 232 milliseconds, with an average of 320 milliseconds, which is similar to human response time in conversation. It matches GPT-4 Turbo performance on text in English and code, with significant improvement on text in non-English languages, while also being much faster and 50\% cheaper in the API. GPT-4o is especially better at vision and audio understanding compared to existing models. In line with our commitment to building AI safely and consistent with our voluntary commitments to the White House, we are sharing the GPT-4o System Card, which includes our Preparedness Framework evaluations. In this System Card, we provide a detailed look at GPT-4o's capabilities, limitations, and safety evaluations across multiple categories, focusing on speech-to-speech while also evaluating text and image capabilities, and measures we've implemented to ensure the model is safe and aligned. We also include third-party assessments on dangerous capabilities, as well as discussion of potential societal impacts of GPT-4o's text and vision capabilities.
△ Less
Submitted 25 October, 2024;
originally announced October 2024.
-
Effectiveness of probabilistic contact tracing in epidemic containment: the role of super-spreaders and transmission path reconstruction
Authors:
A. P. Muntoni,
F. Mazza,
A. Braunstein,
G. Catania,
L. Dall'Asta
Abstract:
The recent COVID-19 pandemic underscores the significance of early-stage non-pharmacological intervention strategies. The widespread use of masks and the systematic implementation of contact tracing strategies provide a potentially equally effective and socially less impactful alternative to more conventional approaches, such as large-scale mobility restrictions. However, manual contact tracing fa…
▽ More
The recent COVID-19 pandemic underscores the significance of early-stage non-pharmacological intervention strategies. The widespread use of masks and the systematic implementation of contact tracing strategies provide a potentially equally effective and socially less impactful alternative to more conventional approaches, such as large-scale mobility restrictions. However, manual contact tracing faces strong limitations in accessing the network of contacts, and the scalability of currently implemented protocols for smartphone-based digital contact tracing becomes impractical during the rapid expansion phases of the outbreaks, due to the surge in exposure notifications and associated tests. A substantial improvement in digital contact tracing can be obtained through the integration of probabilistic techniques for risk assessment that can more effectively guide the allocation of new diagnostic tests. In this study, we first quantitatively analyze the diagnostic and social costs associated with these containment measures based on contact tracing, employing three state-of-the-art models of SARS-CoV-2 spreading. Our results suggest that probabilistic techniques allow for more effective mitigation at a lower cost. Secondly, our findings reveal a remarkable efficacy of probabilistic contact-tracing techniques in performing backward and multi-step tracing and capturing super-spreading events.
△ Less
Submitted 30 August, 2024; v1 submitted 1 December, 2023;
originally announced December 2023.
-
Critical behavior of cascading failures in overloaded networks
Authors:
Ignacio A. Perez,
Dana Ben Porath,
Cristian E. La Rocca,
Lidia A. Braunstein,
Shlomo Havlin
Abstract:
While network abrupt breakdowns due to overloads and cascading failures have been studied extensively, the critical exponents and the universality class of such phase transitions have not been discussed. Here, we study breakdowns triggered by failures of links and overloads in networks with a spatial characteristic link length $ζ$. Our results indicate that this abrupt transition has features and…
▽ More
While network abrupt breakdowns due to overloads and cascading failures have been studied extensively, the critical exponents and the universality class of such phase transitions have not been discussed. Here, we study breakdowns triggered by failures of links and overloads in networks with a spatial characteristic link length $ζ$. Our results indicate that this abrupt transition has features and critical exponents similar to those of interdependent networks, suggesting that both systems are in the same universality class. For weakly embedded systems (i.e., $ζ$ of the order of the system size $L$) we observe a mixed-order transition, where the order parameter collapses following a long critical plateau. On the other hand, strongly embedded systems (i.e., $ζ\ll L$) exhibit a pure first-order transition, involving nucleation and the growth of damage. The system's critical behavior in both limits is similar to that observed in interdependent networks.
△ Less
Submitted 6 March, 2024; v1 submitted 10 July, 2023;
originally announced July 2023.
-
Small-Coupling Dynamic Cavity: a Bayesian mean-field framework for epidemic inference
Authors:
Alfredo Braunstein,
Giovanni Catania,
Luca Dall'Asta,
Matteo Mariani,
Fabio Mazza,
Mattia Tarabolo
Abstract:
We present the Small-Coupling Dynamic Cavity (SCDC) method, a novel generalized mean-field approximation for epidemic inference and risk assessment within a fully Bayesian framework. SCDC accounts for non-causal effects of observations and uses a graphical model representation of epidemic processes to derive self-consistent equations for edge probability marginals. A small-coupling expansion yield…
▽ More
We present the Small-Coupling Dynamic Cavity (SCDC) method, a novel generalized mean-field approximation for epidemic inference and risk assessment within a fully Bayesian framework. SCDC accounts for non-causal effects of observations and uses a graphical model representation of epidemic processes to derive self-consistent equations for edge probability marginals. A small-coupling expansion yields time-dependent cavity messages capturing individual infection probabilities and observational conditioning. With linear computational cost per iteration in the epidemic duration, SCDC is particularly efficient and valid even for recurrent epidemic processes, where standard methods are exponentially complex. Tested on synthetic networks, it matches Belief Propagation in accuracy and outperforms individual-based mean-field methods. Notably, despite being derived as a small-infectiousness expansion, SCDC maintains good accuracy even for relatively large infection probabilities. While convergence issues may arise on graphs with long-range correlations, SCDC reliably estimates risk. Future extensions include non-Markovian models and higher-order terms in the dynamic cavity framework.
△ Less
Submitted 10 April, 2025; v1 submitted 6 June, 2023;
originally announced June 2023.
-
Statistical Mechanics of Inference in Epidemic Spreading
Authors:
Alfredo Braunstein,
Louise Budzynski,
Matteo Mariani
Abstract:
We investigate the information-theoretical limits of inference tasks in epidemic spreading on graphs in the thermodynamic limit. The typical inference tasks consist in computing observables of the posterior distribution of the epidemic model given observations taken from a ground truth (sometimes called planted) random trajectory. We can identify two main sources of quenched disorder: the graph en…
▽ More
We investigate the information-theoretical limits of inference tasks in epidemic spreading on graphs in the thermodynamic limit. The typical inference tasks consist in computing observables of the posterior distribution of the epidemic model given observations taken from a ground truth (sometimes called planted) random trajectory. We can identify two main sources of quenched disorder: the graph ensemble and the planted trajectory. The epidemic dynamics however induces non-trivial long-range correlations among individuals' states on the latter. This results in non-local correlated quenched disorder which unfortunately is typically hard to handle. To overcome this difficulty, we divide the dynamical process into two sets of variables: a set of stochastic independent variables (representing transmission delays), plus a set of correlated variables (the infection times) that depend deterministically on the first. Treating the former as quenched variables and the latter as dynamic ones, computing disorder average becomes feasible by means of the Replica Symmetric cavity method. We give theoretical predictions on the posterior probability distribution of the trajectory of each individual, conditioned to observations on the state of individuals at given times, focusing on the Susceptible Infectious (SI) model. In the Bayes-optimal condition, i.e. when true dynamic parameters are known, the inference task is expected to fall in the Replica Symmetric regime. We indeed provide predictions for the information theoretic limits of various inference tasks, in form of phase diagrams. We also identify a region, in the Bayes-Optimal setting, with strong hints of Replica Symmetry Breaking. When true parameters are unknown, we show how a maximum-likelihood procedure is able to recover them with mostly unaffected performance.
△ Less
Submitted 24 July, 2023; v1 submitted 13 April, 2023;
originally announced April 2023.
-
Matrix Product Belief Propagation for reweighted stochastic dynamics over graphs
Authors:
Stefano Crotti,
Alfredo Braunstein
Abstract:
Stochastic processes on graphs can describe a great variety of phenomena ranging from neural activity to epidemic spreading. While many existing methods can accurately describe typical realizations of such processes, computing properties of extremely rare events is a hard task. Particularly so in the case of recurrent models, in which variables may return to a previously visited state. Here, we bu…
▽ More
Stochastic processes on graphs can describe a great variety of phenomena ranging from neural activity to epidemic spreading. While many existing methods can accurately describe typical realizations of such processes, computing properties of extremely rare events is a hard task. Particularly so in the case of recurrent models, in which variables may return to a previously visited state. Here, we build on the matrix product cavity method, extending it fundamentally in two directions: first, we show how it can be applied to Markov processes biased by arbitrary reweighting factors that concentrate most of the probability mass on rare events. Second, we introduce an efficient scheme to reduce the computational cost of a single node update from exponential to polynomial in the node degree. Two applications are considered: inference of infection probabilities from sparse observations within the SIRS epidemic model, and the computation of both typical observables and large deviations of several kinetic Ising models.
△ Less
Submitted 15 November, 2023; v1 submitted 30 March, 2023;
originally announced March 2023.
-
Epidemic control in networks with cliques
Authors:
L. D. Valdez,
L. Vassallo,
L. A. Braunstein
Abstract:
Social units, such as households and schools, can play an important role in controlling epidemic outbreaks. In this work, we study an epidemic model with a prompt quarantine measure on networks with cliques (a $clique$ is a fully connected subgraph representing a social unit). According to this strategy, newly infected individuals are detected and quarantined (along with their close contacts) with…
▽ More
Social units, such as households and schools, can play an important role in controlling epidemic outbreaks. In this work, we study an epidemic model with a prompt quarantine measure on networks with cliques (a $clique$ is a fully connected subgraph representing a social unit). According to this strategy, newly infected individuals are detected and quarantined (along with their close contacts) with probability $f$. Numerical simulations reveal that epidemic outbreaks in networks with cliques are abruptly suppressed at a transition point $f_c$. However, small outbreaks show features of a second-order phase transition around $f_c$. Therefore, our model can exhibit properties of both discontinuous and continuous phase transitions. Next, we show analytically that the probability of small outbreaks goes continuously to 1 at $f_c$ in the thermodynamic limit. Finally, we find that our model exhibits a backward bifurcation phenomenon.
△ Less
Submitted 25 May, 2023; v1 submitted 16 February, 2023;
originally announced February 2023.
-
Inference in conditioned dynamics through causality restoration
Authors:
Alfredo Braunstein,
Giovanni Catania,
Luca Dall'Asta,
Matteo Mariani,
Anna Paola Muntoni
Abstract:
Computing observables from conditioned dynamics is typically computationally hard, because, although obtaining independent samples efficiently from the unconditioned dynamics is usually feasible, generally most of the samples must be discarded (in a form of importance sampling) because they do not satisfy the imposed conditions. Sampling directly from the conditioned distribution is non-trivial, a…
▽ More
Computing observables from conditioned dynamics is typically computationally hard, because, although obtaining independent samples efficiently from the unconditioned dynamics is usually feasible, generally most of the samples must be discarded (in a form of importance sampling) because they do not satisfy the imposed conditions. Sampling directly from the conditioned distribution is non-trivial, as conditioning breaks the causal properties of the dynamics which ultimately renders the sampling procedure efficient. One standard way of achieving it is through a Metropolis Monte-Carlo procedure, but this procedure is normally slow and a very large number of Monte-Carlo steps is needed to obtain a small number of statistically independent samples. In this work, we propose an alternative method to produce independent samples from a conditioned distribution. The method learns the parameters of a generalized dynamical model that optimally describe the conditioned distribution in a variational sense. The outcome is an effective, unconditioned, dynamical model, from which one can trivially obtain independent samples, effectively restoring causality of the conditioned distribution. The consequences are twofold: on the one hand, it allows us to efficiently compute observables from the conditioned dynamics by simply averaging over independent samples. On the other hand, the method gives an effective unconditioned distribution which is easier to interpret. The method is flexible and can be applied virtually to any dynamics. We discuss an important application of the method, namely the problem of epidemic risk assessment from (imperfect) clinical tests, for a large family of time-continuous epidemic models endowed with a Gillespie-like sampler. We show that the method compares favorably against the state of the art, including the soft-margin approach and mean-field methods.
△ Less
Submitted 30 March, 2023; v1 submitted 18 October, 2022;
originally announced October 2022.
-
The cavity method: from exact solutions to algorithms
Authors:
Alfredo Braunstein,
Guilhem Semerjian
Abstract:
The goal of this chapter is to review the main ideas that underlie the cavity method for disordered models defined on random graphs, as well as present some of its outcomes, focusing on the random constraint satisfaction problems for which it provided both a better understanding of the phase transitions they undergo, and suggestions for the development of algorithms to solve them.
The goal of this chapter is to review the main ideas that underlie the cavity method for disordered models defined on random graphs, as well as present some of its outcomes, focusing on the random constraint satisfaction problems for which it provided both a better understanding of the phase transitions they undergo, and suggestions for the development of algorithms to solve them.
△ Less
Submitted 23 September, 2022;
originally announced September 2022.
-
The closest vector problem and the zero-temperature p-spin landscape for lossy compression
Authors:
Alfredo Braunstein,
Louise Budzynski,
Stefano Crotti,
Federico Ricci-Tersenghi
Abstract:
We consider a high-dimensional random constrained optimization problem in which a set of binary variables is subjected to a linear system of equations. The cost function is a simple linear cost, measuring the Hamming distance with respect to a reference configuration. Despite its apparent simplicity, this problem exhibits a rich phenomenology. We show that different situations arise depending on t…
▽ More
We consider a high-dimensional random constrained optimization problem in which a set of binary variables is subjected to a linear system of equations. The cost function is a simple linear cost, measuring the Hamming distance with respect to a reference configuration. Despite its apparent simplicity, this problem exhibits a rich phenomenology. We show that different situations arise depending on the random ensemble of linear systems. When each variable is involved in at most two linear constraints, we show that the problem can be partially solved analytically, in particular we show that upon convergence, the zero-temperature limit of the cavity equations returns the optimal solution. We then study the geometrical properties of more general random ensembles. In particular we observe a range in the density of constraints at which the systems enters a glassy phase where the cost function has many minima. Interestingly, the algorithmic performances are only sensitive to another phase transition affecting the structure of configurations allowed by the linear constraints. We also extend our results to variables belonging to $\text{GF}(q)$, the Galois Field of order $q$. We show that increasing the value of $q$ allows to achieve a better optimum, which is confirmed by the Replica Symmetric cavity method predictions.
△ Less
Submitted 24 October, 2022; v1 submitted 1 July, 2022;
originally announced July 2022.
-
Peak fraction of infected in epidemic spreading for multi-community networks
Authors:
Jing Ma,
Xiangyi Meng,
Lidia A. Braunstein
Abstract:
One of the most effective strategies to mitigate the global spreading of a pandemic (e.g., COVID-19) is to shut down international airports. From a network theory perspective, this is since international airports and flights, essentially playing the roles of bridge nodes and bridge links between countries as individual communities, dominate the epidemic spreading characteristics in the whole multi…
▽ More
One of the most effective strategies to mitigate the global spreading of a pandemic (e.g., COVID-19) is to shut down international airports. From a network theory perspective, this is since international airports and flights, essentially playing the roles of bridge nodes and bridge links between countries as individual communities, dominate the epidemic spreading characteristics in the whole multi-community system. Among all epidemic characteristics, the peak fraction of infected, $I_{\max}$, is a decisive factor in evaluating an epidemic strategy given limited capacity of medical resources, but is seldom considered in multi-community models. In this paper, we study a general two-community system interconnected by a fraction $r$ of bridge nodes and its dynamic properties, especially $I_{\max}$, under the evolution of the Susceptible-Infected-Recovered (SIR) model. Comparing the characteristic time scales of different parts of the system allows us to analytically derive the asymptotic behavior of $I_{\max}$ with $r$, as $r\rightarrow 0$, which follows different power-law relations in each regime of the phase diagram. We also detect crossovers when $I_{\max}$ changes from one power law to another, crossing different power-law regimes as driven by $r$. Our results enable a better prediction of the effectiveness of strategies acting on bridge nodes, denoted by the power-law exponent $ε_I$ as in $I_{\max}\propto r^{1/ε_I}$.
△ Less
Submitted 20 June, 2022; v1 submitted 12 January, 2022;
originally announced January 2022.
-
Cascading failures in isotropic and anisotropic spatial networks induced by localized attacks and overloads
Authors:
I. A. Perez,
D. Vaknin Ben Porath,
C. E. La Rocca,
S. V. Buldyrev,
L. A. Braunstein,
S. Havlin
Abstract:
In this paper we study the Motter-Lai model of cascading failures induced by overloads in both isotropic and anisotropic spatial networks, generated by placing nodes in a square lattice and using various distributions of link lengths and angles. Anisotropy has not been earlier considered in the Motter-Lai model and is a real feature that may affect the cascading failures. This could reflect the ex…
▽ More
In this paper we study the Motter-Lai model of cascading failures induced by overloads in both isotropic and anisotropic spatial networks, generated by placing nodes in a square lattice and using various distributions of link lengths and angles. Anisotropy has not been earlier considered in the Motter-Lai model and is a real feature that may affect the cascading failures. This could reflect the existence of a preferred direction in which a given attribute of the system manifests, such as power lines that follow a city built parallel to the coast. We show that the anisotropy causes a greater spread of damage along the preferential direction of links. We also identify the critical linear size, $l_c$, for a square shaped localized attack, which satisfies with high probability that above $l_c$ the cascading disrupts the giant component of functional nodes, while below $l_c$ the damage does not spread. We find that, for networks with any characteristic link length, their robustness decreases with the strength of the anisotropy. We show that the value of $l_c$ is finite and independent of the system size (for large systems), both for isotropic and anisotropic networks. Thus, in contrast to random attacks, where the critical fraction of nodes that survive the initial attack, $p_c$, is usually below 1, here $p_c = 1$. Note that the analogy to $p_c = 1$ is also found for localized attacks in interdependent spatial networks. Finally, we measure the final distribution of functional cluster sizes and find a power-law behavior, with exponents similar to regular percolation. This indicates that, after the cascade which destroys the giant component, the system is at a percolation critical point. Additionally, we observe a crossover in the value of the distribution exponent, from critical percolation in a two-dimensional lattice for strong spatial embedding, to mean-field percolation for weak embedding.
△ Less
Submitted 16 March, 2022; v1 submitted 21 December, 2021;
originally announced December 2021.
-
A Bayesian generative neural network framework for epidemic inference problems
Authors:
Indaco Biazzo,
Alfredo Braunstein,
Luca Dall'Asta,
Fabio Mazza
Abstract:
The reconstruction of missing information in epidemic spreading on contact networks can be essential in the prevention and containment strategies. The identification and warning of infectious but asymptomatic individuals (i.e., contact tracing), the well-known patient-zero problem, or the inference of the infectivity values in structured populations are examples of significant epidemic inference p…
▽ More
The reconstruction of missing information in epidemic spreading on contact networks can be essential in the prevention and containment strategies. The identification and warning of infectious but asymptomatic individuals (i.e., contact tracing), the well-known patient-zero problem, or the inference of the infectivity values in structured populations are examples of significant epidemic inference problems. As the number of possible epidemic cascades grows exponentially with the number of individuals involved and only an almost negligible subset of them is compatible with the observations (e.g., medical tests), epidemic inference in contact networks poses incredible computational challenges. We present a new generative neural networks framework that learns to generate the most probable infection cascades compatible with observations. The proposed method achieves better (in some cases, significantly better) or comparable results with existing methods in all problems considered both in synthetic and real contact networks. Given its generality, clear Bayesian and variational nature, the presented framework paves the way to solve fundamental inference epidemic problems with high precision in small and medium-sized real case scenarios such as the spread of infections in workplaces and hospitals.
△ Less
Submitted 18 November, 2022; v1 submitted 5 November, 2021;
originally announced November 2021.
-
Emergent networks in fractional percolation
Authors:
L. D. Valdez,
L. A. Braunstein
Abstract:
Real networks are vulnerable to random failures and malicious attacks. However, when a node is harmed or damaged, it may remain partially functional, which helps to maintain the overall network structure and functionality. In this paper, we study the network structure for a fractional percolation process [Shang, Phys. Rev. E 89, 012813 (2014)], in which the state of a node can be either fully func…
▽ More
Real networks are vulnerable to random failures and malicious attacks. However, when a node is harmed or damaged, it may remain partially functional, which helps to maintain the overall network structure and functionality. In this paper, we study the network structure for a fractional percolation process [Shang, Phys. Rev. E 89, 012813 (2014)], in which the state of a node can be either fully functional (FF), partially functional (PF), or dysfunctional (D). We develop new equations to calculate the relative size of the percolating cluster of FF and PF nodes, that are in agreement with our stochastic simulations. In addition, we find a regime in which the percolating cluster can be described as a coarse-grained bipartite network, namely, as a set of finite groups of FF nodes connected by PF nodes. Moreover, these groups behave as a set of "supernodes" with a power-law degree distribution. Finally, we show how this emergent structure explains the values of several critical exponents around the percolation threshold.
△ Less
Submitted 10 January, 2022; v1 submitted 5 October, 2021;
originally announced October 2021.
-
Cascading failures in anisotropic interdependent networks of spatial modular structures
Authors:
Dana Vaknin,
Amir Bashan,
Lidia A. Braunstein,
Sergey V. Buldyrev,
Shlomo Havlin
Abstract:
The structure of real-world multilayer infrastructure systems usually exhibits anisotropy due to constraints of the embedding space. For example, geographical features like mountains, rivers and shores influence the architecture of critical infrastructure networks. Moreover, such spatial networks are often non-homogeneous but rather have a modular structure with dense connections within communitie…
▽ More
The structure of real-world multilayer infrastructure systems usually exhibits anisotropy due to constraints of the embedding space. For example, geographical features like mountains, rivers and shores influence the architecture of critical infrastructure networks. Moreover, such spatial networks are often non-homogeneous but rather have a modular structure with dense connections within communities and sparse connections between neighboring communities. When the networks of the different layers are interdependent, local failures and attacks may propagate throughout the system. Here we study the robustness of spatial interdependent networks which are both anisotropic and heterogeneous. We also evaluate the effect of localized attacks having different geometrical shapes. We find that anisotropic networks are more robust against localized attacks and that anisotropic attacks, surprisingly, even on isotropic structures, are more effective than isotropic attacks.
△ Less
Submitted 26 June, 2021;
originally announced June 2021.
-
Relationship between fitness and heterogeneity in exponentially growing microbial populations
Authors:
Anna Paola Muntoni,
Alfredo Braunstein,
Andrea Pagnani,
Daniele De Martino,
Andrea De Martino
Abstract:
Despite major environmental and genetic differences, microbial metabolic networks are known to generate consistent physiological outcomes across vastly different organisms. This remarkable robustness suggests that, at least in bacteria, metabolic activity may be guided by universal principles. The constrained optimization of evolutionarily-motivated objective functions like the growth rate has eme…
▽ More
Despite major environmental and genetic differences, microbial metabolic networks are known to generate consistent physiological outcomes across vastly different organisms. This remarkable robustness suggests that, at least in bacteria, metabolic activity may be guided by universal principles. The constrained optimization of evolutionarily-motivated objective functions like the growth rate has emerged as the key theoretical assumption for the study of bacterial metabolism. While conceptually and practically useful in many situations, the idea that certain functions are optimized is hard to validate in data. Moreover, it is not always clear how optimality can be reconciled with the high degree of single-cell variability observed in experiments within microbial populations. To shed light on these issues, we develop an inverse modeling framework that connects the fitness of a population of cells (represented by the mean single-cell growth rate) to the underlying metabolic variability through the Maximum-Entropy inference of the distribution of metabolic phenotypes from data. While no clear objective function emerges, we find that, as the medium gets richer, the fitness and inferred variability for Escherichia coli populations follow and slowly approach the theoretically optimal bound defined by minimal reduction of variability at given fitness. These results suggest that bacterial metabolism may be crucially shaped by a population-level trade-off between growth and heterogeneity.
△ Less
Submitted 7 April, 2022; v1 submitted 6 April, 2021;
originally announced April 2021.
-
An epidemic model for COVID-19 transmission in Argentina: Exploration of the alternating quarantine and massive testing strategies
Authors:
Lautaro Vassallo,
Ignacio A. Perez,
Lucila G. Alvarez-Zuzek,
Julián Amaya,
Marcos F. Torres,
Lucas D. Valdez,
Cristian E. La Rocca,
Lidia A. Braunstein
Abstract:
The COVID-19 pandemic has challenged authorities at different levels of government administration around the globe. When faced with diseases of this severity, it is useful for the authorities to have prediction tools to estimate in advance the impact on the health system and the human, material, and economic resources that will be necessary. In this paper, we construct an extended Susceptible-Expo…
▽ More
The COVID-19 pandemic has challenged authorities at different levels of government administration around the globe. When faced with diseases of this severity, it is useful for the authorities to have prediction tools to estimate in advance the impact on the health system and the human, material, and economic resources that will be necessary. In this paper, we construct an extended Susceptible-Exposed-Infected-Recovered model that incorporates the social structure of Mar del Plata, the $4^\circ$ most inhabited city in Argentina and head of the Municipality of General Pueyrredón. Moreover, we consider detailed partitions of infected individuals according to the illness severity, as well as data of local health resources, to bring these predictions closer to the local reality. Tuning the corresponding epidemic parameters for COVID-19, we study an alternating quarantine strategy, in which a part of the population can circulate without restrictions at any time, while the rest is equally divided into two groups and goes on successive periods of normal activity and lockdown, each one with a duration of $τ$ days. Besides, we implement a random testing strategy over the population. We found that $τ= 7$ is a good choice for the quarantine strategy since it matches with the weekly cycle as it reduces the infected population. Focusing on the health system, projecting from the situation as of September 30, we foresee a difficulty to avoid saturation of ICU, given the extremely low levels of mobility that would be required. In the worst case, our model estimates that four thousand deaths would occur, of which 30\% could be avoided with proper medical attention. Nonetheless, we found that aggressive testing would allow an increase in the percentage of people that can circulate without restrictions, being the equipment required to deal with the additional critical patients relatively low.
△ Less
Submitted 16 July, 2021; v1 submitted 4 December, 2020;
originally announced December 2020.
-
A Density Consistency approach to the inverse Ising problem
Authors:
Alfredo Braunstein,
Giovanni Catania,
Luca Dall'Asta,
Anna Paola Muntoni
Abstract:
We propose a novel approach to the inverse Ising problem which employs the recently introduced Density Consistency approximation (DC) to determine the model parameters (couplings and external fields) maximizing the likelihood of given empirical data. This method allows for closed-form expressions of the inferred parameters as a function of the first and second empirical moments. Such expressions h…
▽ More
We propose a novel approach to the inverse Ising problem which employs the recently introduced Density Consistency approximation (DC) to determine the model parameters (couplings and external fields) maximizing the likelihood of given empirical data. This method allows for closed-form expressions of the inferred parameters as a function of the first and second empirical moments. Such expressions have a similar structure to the small-correlation expansion derived by Sessak and Monasson, of which they provide an improvement in the case of non-zero magnetization at low temperatures, as well as in presence of random external fields. The present work provides an extensive comparison with most common inference methods used to reconstruct the model parameters in several regimes, i.e. by varying both the network topology and the distribution of fields and couplings. The comparison shows that no method is uniformly better than every other one, but DC appears nevertheless as one of the most accurate and reliable approaches to infer couplings and fields from first and second moments in a significant range of parameters.
△ Less
Submitted 19 January, 2021; v1 submitted 26 October, 2020;
originally announced October 2020.
-
Expectation propagation on the diluted Bayesian classifier
Authors:
Alfredo Braunstein,
Thomas Gueudré,
Andrea Pagnani,
Mirko Pieropan
Abstract:
Efficient feature selection from high-dimensional datasets is a very important challenge in many data-driven fields of science and engineering. We introduce a statistical mechanics inspired strategy that addresses the problem of sparse feature selection in the context of binary classification by leveraging a computational scheme known as expectation propagation (EP). The algorithm is used in order…
▽ More
Efficient feature selection from high-dimensional datasets is a very important challenge in many data-driven fields of science and engineering. We introduce a statistical mechanics inspired strategy that addresses the problem of sparse feature selection in the context of binary classification by leveraging a computational scheme known as expectation propagation (EP). The algorithm is used in order to train a continuous-weights perceptron learning a classification rule from a set of (possibly partly mislabeled) examples provided by a teacher perceptron with diluted continuous weights. We test the method in the Bayes optimal setting under a variety of conditions and compare it to other state-of-the-art algorithms based on message passing and on expectation maximization approximate inference schemes. Overall, our simulations show that EP is a robust and competitive algorithm in terms of variable selection properties, estimation accuracy and computational complexity, especially when the student perceptron is trained from correlated patterns that prevent other iterative methods from converging. Furthermore, our numerical tests demonstrate that the algorithm is capable of learning online the unknown values of prior parameters, such as the dilution level of the weights of the teacher perceptron and the fraction of mislabeled examples, quite accurately. This is achieved by means of a simple maximum likelihood strategy that consists in minimizing the free energy associated with the EP algorithm.
△ Less
Submitted 30 January, 2021; v1 submitted 20 September, 2020;
originally announced September 2020.
-
Epidemic mitigation by statistical inference from contact tracing data
Authors:
Antoine Baker,
Indaco Biazzo,
Alfredo Braunstein,
Giovanni Catania,
Luca Dall'Asta,
Alessandro Ingrosso,
Florent Krzakala,
Fabio Mazza,
Marc Mézard,
Anna Paola Muntoni,
Maria Refinetti,
Stefano Sarao Mannelli,
Lenka Zdeborová
Abstract:
Contact-tracing is an essential tool in order to mitigate the impact of pandemic such as the COVID-19. In order to achieve efficient and scalable contact-tracing in real time, digital devices can play an important role. While a lot of attention has been paid to analyzing the privacy and ethical risks of the associated mobile applications, so far much less research has been devoted to optimizing th…
▽ More
Contact-tracing is an essential tool in order to mitigate the impact of pandemic such as the COVID-19. In order to achieve efficient and scalable contact-tracing in real time, digital devices can play an important role. While a lot of attention has been paid to analyzing the privacy and ethical risks of the associated mobile applications, so far much less research has been devoted to optimizing their performance and assessing their impact on the mitigation of the epidemic. We develop Bayesian inference methods to estimate the risk that an individual is infected. This inference is based on the list of his recent contacts and their own risk levels, as well as personal information such as results of tests or presence of syndromes. We propose to use probabilistic risk estimation in order to optimize testing and quarantining strategies for the control of an epidemic. Our results show that in some range of epidemic spreading (typically when the manual tracing of all contacts of infected people becomes practically impossible, but before the fraction of infected people reaches the scale where a lock-down becomes unavoidable), this inference of individuals at risk could be an efficient way to mitigate the epidemic. Our approaches translate into fully distributed algorithms that only require communication between individuals who have recently been in contact. Such communication may be encrypted and anonymized and thus compatible with privacy preserving standards. We conclude that probabilistic risk estimation is capable to enhance performance of digital contact tracing and should be considered in the currently developed mobile applications.
△ Less
Submitted 20 September, 2020;
originally announced September 2020.
-
Cascading Failures in Complex Networks
Authors:
Lucas D. Valdez,
Louis Shekhtman,
Cristian E. La Rocca,
Xin Zhang,
Sergey V. Buldyrev,
Paul A. Trunfio,
Lidia A. Braunstein,
Shlomo Havlin
Abstract:
Cascading failure is a potentially devastating process that spreads on real-world complex networks and can impact the integrity of wide-ranging infrastructures, natural systems, and societal cohesiveness. One of the essential features that create complex network vulnerability to failure propagation is the dependency among their components, exposing entire systems to significant risks from destabil…
▽ More
Cascading failure is a potentially devastating process that spreads on real-world complex networks and can impact the integrity of wide-ranging infrastructures, natural systems, and societal cohesiveness. One of the essential features that create complex network vulnerability to failure propagation is the dependency among their components, exposing entire systems to significant risks from destabilizing hazards such as human attacks, natural disasters or internal breakdowns. Developing realistic models for cascading failures as well as strategies to halt and mitigate the failure propagation can point to new approaches to restoring and strengthening real-world networks. In this review, we summarize recent progress on models developed based on physics and complex network science to understand the mechanisms, dynamics and overall impact of cascading failures. We present models for cascading failures in single networks and interdependent networks and explain how different dynamic propagation mechanisms can lead to an abrupt collapse and a rich dynamic behavior. Finally, we close the review with novel emerging strategies for containing cascades of failures and discuss open questions that remain to be addressed.
△ Less
Submitted 21 July, 2020;
originally announced July 2020.
-
Role of bridge nodes in epidemic spreading: Different regimes and crossovers
Authors:
Jing Ma,
Lucas D. Valdez,
Lidia A. Braunstein
Abstract:
Power-law behaviors are common in many disciplines, especially in network science. Real-world networks, like disease spreading among people, are more likely to be interconnected communities, and show richer power-law behaviors than isolated networks. In this paper, we look at the system of two communities which are connected by bridge links between a fraction $r$ of bridge nodes, and study the eff…
▽ More
Power-law behaviors are common in many disciplines, especially in network science. Real-world networks, like disease spreading among people, are more likely to be interconnected communities, and show richer power-law behaviors than isolated networks. In this paper, we look at the system of two communities which are connected by bridge links between a fraction $r$ of bridge nodes, and study the effect of bridge nodes to the final state of the Susceptible-Infected-Recovered model, by mapping it to link percolation. By keeping a fixed average connectivity, but allowing different transmissibilities along internal and bridge links, we theoretically derive different power-law asymptotic behaviors of the total fraction of the recovered $R$ in the final state as $r$ goes to zero, for different combinations of internal and bridge link transmissibilities. We also find crossover points where $R$ follows different power-law behaviors with $r$ on both sides when the internal transmissibility is below but close to its critical value, for different bridge link transmissibilities. All of these power-law behaviors can be explained through different mechanisms of how finite clusters in each community are connected into the giant component of the whole system, and enable us to pick effective epidemic strategies and to better predict their impacts.
△ Less
Submitted 28 September, 2020; v1 submitted 28 May, 2020;
originally announced May 2020.
-
Disease spreading with social distancing: A prevention strategy in disordered multiplex networks
Authors:
I. A. Perez,
M. A. Di Muro,
C. E. La Rocca,
L. A. Braunstein
Abstract:
The frequent emergence of diseases with the potential to become threats at local and global scales, such as influenza A(H1N1), SARS, MERS, and recently COVID-19 disease, makes it crucial to keep designing models of disease propagation and strategies to prevent or mitigate their effects in populations. Since isolated systems are exceptionally rare to find in any context, especially in human contact…
▽ More
The frequent emergence of diseases with the potential to become threats at local and global scales, such as influenza A(H1N1), SARS, MERS, and recently COVID-19 disease, makes it crucial to keep designing models of disease propagation and strategies to prevent or mitigate their effects in populations. Since isolated systems are exceptionally rare to find in any context, especially in human contact networks, here we examine the susceptible-infected-recovered model of disease spreading in a multiplex network formed by two distinct networks or layers, interconnected through a fraction $q$ of shared individuals (overlap). We model the interactions through weighted networks, because person-to-person interactions are diverse (or disordered); weights represent the contact times of the interactions. Using branching theory supported by simulations, we analyze a social distancing strategy that reduces the average contact time in both layers, where the intensity of the distancing is related to the topology of the layers. We find that the critical values of the distancing intensities, above which an epidemic can be prevented, increase with the overlap $q$. Also we study the effect of the social distancing on the mutual giant component of susceptible individuals, which is crucial to keep the functionality of the system. In addition, we find that for relatively small values of the overlap $q$, social distancing policies might not be needed at all to maintain the functionality of the system.
△ Less
Submitted 26 August, 2020; v1 submitted 22 April, 2020;
originally announced April 2020.
-
Reversible bootstrap percolation: Fake news and fact checking
Authors:
M. A. Di Muro,
S. V. Buldyrev,
L. A. Braunstein
Abstract:
Bootstrap percolation has been used to describe opinion formation in society and other social and natural phenomena. The formal equation of the bootstrap percolation may have more than one solution, corresponding to several stable fixed points of the corresponding iteration process. We construct a reversible bootstrap percolation process, which converges to these extra solutions displaying a hyste…
▽ More
Bootstrap percolation has been used to describe opinion formation in society and other social and natural phenomena. The formal equation of the bootstrap percolation may have more than one solution, corresponding to several stable fixed points of the corresponding iteration process. We construct a reversible bootstrap percolation process, which converges to these extra solutions displaying a hysteresis typical of discontinuous phase transitions. This process provides a reasonable model for fake news spreading and the effectiveness of fact checking. We show that sometimes it is not sufficient to discard all the sources of fake news in order to reverse the belief of a population that formed under the influence of these sources.
△ Less
Submitted 6 May, 2020; v1 submitted 21 October, 2019;
originally announced October 2019.
-
Epidemic spreading on modular networks: The fear to declare a pandemic
Authors:
L. D. Valdez,
L. A. Braunstein,
S. Havlin
Abstract:
In the past few decades, the frequency of pandemics has been increased due to the growth of urbanization and mobility among countries. Since a disease spreading in one country could become a pandemic with a potential worldwide humanitarian and economic impact, it is important to develop models to estimate the probability of a worldwide pandemic. In this paper, we propose a model of disease spreadi…
▽ More
In the past few decades, the frequency of pandemics has been increased due to the growth of urbanization and mobility among countries. Since a disease spreading in one country could become a pandemic with a potential worldwide humanitarian and economic impact, it is important to develop models to estimate the probability of a worldwide pandemic. In this paper, we propose a model of disease spreading in a structural modular complex network (having communities) and study how the number of bridge nodes $n$ that connect communities affects disease spread. We find that our model can be described at a global scale as an infectious transmission process between communities with global infectious and recovery time distributions that depend on the internal structure of each community and $n$. We find that near the critical point as $n$ increases, the disease reaches most of the communities, but each community has only a small fraction of recovered nodes. In addition, we obtain that in the limit $n \to \infty$, the probability of a pandemic increases abruptly at the critical point. This scenario could make the decision on whether to launch a pandemic alert or not more difficult. Finally, we show that link percolation theory can be used at a global scale to estimate the probability of a pandemic since the global transmissibility between communities has a weak dependence on the global recovery time.
△ Less
Submitted 23 March, 2020; v1 submitted 20 September, 2019;
originally announced September 2019.
-
Controlling distant contacts to reduce disease spreading on disordered complex networks
Authors:
Ignacio A. Perez,
Paul A. Trunfio,
Cristian E. La Rocca,
Lidia A. Braunstein
Abstract:
In real social networks, person-to-person interactions are known to be heterogeneous, which can affect the way a disease spreads through a population, reaches a tipping point in the fraction of infected individuals, and becomes an epidemic. This property, called disorder, is usually associated with contact times between individuals and can be modeled by a weighted network, where the weights are re…
▽ More
In real social networks, person-to-person interactions are known to be heterogeneous, which can affect the way a disease spreads through a population, reaches a tipping point in the fraction of infected individuals, and becomes an epidemic. This property, called disorder, is usually associated with contact times between individuals and can be modeled by a weighted network, where the weights are related to normalized contact times $ω$. In this paper, we study the SIR model for disease spreading when both close and distant types of interactions are present. We develop a mitigation strategy that reduces only the time duration of distant contacts, which are easier to alter in practice. Using branching theory, supported by simulations, we found that the effectiveness of the strategy increases when the density $f_1$ of close contacts decreases. Moreover, we found a threshold $\tilde{f}_1 = T_c / β$ below which the strategy can bring the system from an epidemic to a non-epidemic phase, even when close contacts have the longest time durations.
△ Less
Submitted 11 May, 2020; v1 submitted 16 August, 2019;
originally announced August 2019.
-
On the growth of non-motile bacteria colonies: an agent-based model for pattern formation
Authors:
Lautaro Vassallo,
David Hansmann,
Lidia A. Braunstein
Abstract:
In the growth of bacterial colonies, a great variety of complex patterns are observed in experiments, depending on external conditions and the bacterial species. Typically, existing models employ systems of reaction-diffusion equations or consist of growth processes based on rules, and are limited to a discrete lattice. In contrast, the two-dimensional model proposed here is an off-lattice simulat…
▽ More
In the growth of bacterial colonies, a great variety of complex patterns are observed in experiments, depending on external conditions and the bacterial species. Typically, existing models employ systems of reaction-diffusion equations or consist of growth processes based on rules, and are limited to a discrete lattice. In contrast, the two-dimensional model proposed here is an off-lattice simulation, where bacteria are modelled as rigid circles and nutrients are point-like, Brownian particles. Varying the nutrient diffusion and concentration, we simulate a wide range of morphologies compatible with experimental observations, from round and compact to extremely branched patterns. A scaling relationship is found between the number of cells in the interface and the total number of cells, with two characteristic regimes. These regimes correspond to the compact and branched patterns, which are exhibited for sufficiently small and large colonies, respectively. In addition, we characterise the screening effect observed in the structures by analysing the multifractal properties of the growth probability.
△ Less
Submitted 11 November, 2019; v1 submitted 10 May, 2019;
originally announced May 2019.
-
Containing misinformation spreading in temporal social networks
Authors:
Wei Wang,
Yuanhui Ma,
Tao Wu,
Yang Dai,
Xingshu Chen,
Lidia A. Braunstein
Abstract:
Many researchers from a variety of fields including computer science, network science and mathematics have focused on how to contain the outbreaks of Internet misinformation that threaten social systems and undermine societal health. Most research on this topic treats the connections among individuals as static, but these connections change in time, and thus social networks are also temporal netwo…
▽ More
Many researchers from a variety of fields including computer science, network science and mathematics have focused on how to contain the outbreaks of Internet misinformation that threaten social systems and undermine societal health. Most research on this topic treats the connections among individuals as static, but these connections change in time, and thus social networks are also temporal networks. Currently there is no theoretical approach to the problem of containing misinformation outbreaks in temporal networks. We thus propose a misinformation spreading model for temporal networks and describe it using a new theoretical approach. We propose a heuristic-containing (HC) strategy based on optimizing final outbreak size that outperforms simplified strategies such as those that are random-containing (RC) and targeted-containing (TC). We verify the effectiveness of our HC strategy on both artificial and real-world networks by performing extensive numerical simulations and theoretical analyses. We find that the HC strategy greatly increases the outbreak threshold and decreases the final outbreak threshold.
△ Less
Submitted 24 April, 2019;
originally announced April 2019.
-
Compressed sensing reconstruction using Expectation Propagation
Authors:
Alfredo Braunstein,
Anna Paola Muntoni,
Andrea Pagnani,
Mirko Pieropan
Abstract:
Many interesting problems in fields ranging from telecommunications to computational biology can be formalized in terms of large underdetermined systems of linear equations with additional constraints or regularizers. One of the most studied ones, the Compressed Sensing problem (CS), consists in finding the solution with the smallest number of non-zero components of a given system of linear equati…
▽ More
Many interesting problems in fields ranging from telecommunications to computational biology can be formalized in terms of large underdetermined systems of linear equations with additional constraints or regularizers. One of the most studied ones, the Compressed Sensing problem (CS), consists in finding the solution with the smallest number of non-zero components of a given system of linear equations $\boldsymbol y = \mathbf{F} \boldsymbol{w}$ for known measurement vector $\boldsymbol{y}$ and sensing matrix $\mathbf{F}$. Here, we will address the compressed sensing problem within a Bayesian inference framework where the sparsity constraint is remapped into a singular prior distribution (called Spike-and-Slab or Bernoulli-Gauss). Solution to the problem is attempted through the computation of marginal distributions via Expectation Propagation (EP), an iterative computational scheme originally developed in Statistical Physics. We will show that this strategy is comparatively more accurate than the alternatives in solving instances of CS generated from statistically correlated measurement matrices. For computational strategies based on the Bayesian framework such as variants of Belief Propagation, this is to be expected, as they implicitly rely on the hypothesis of statistical independence among the entries of the sensing matrix. Perhaps surprisingly, the method outperforms uniformly also all the other state-of-the-art methods in our tests.
△ Less
Submitted 3 August, 2019; v1 submitted 10 April, 2019;
originally announced April 2019.
-
Insights into bootstrap percolation: Its equivalence with k-core percolation and the giant component
Authors:
M. A. Di Muro,
L. D. Valdez,
S. V. Buldyrev,
H. E. Stanley,
L. A. Braunstein
Abstract:
K-core and bootstrap percolation are widely studied models that have been used to represent and understand diverse deactivation and activation processes in natural and social systems. Since these models are considerably similar, it has been suggested in recent years that they could be complementary. In this manuscript we provide a rigorous analysis that shows that for any degree and threshold dist…
▽ More
K-core and bootstrap percolation are widely studied models that have been used to represent and understand diverse deactivation and activation processes in natural and social systems. Since these models are considerably similar, it has been suggested in recent years that they could be complementary. In this manuscript we provide a rigorous analysis that shows that for any degree and threshold distributions heterogeneous bootstrap percolation can be mapped into heterogeneous k-core percolation and vice versa, if the functionality thresholds in both processes satisfy a complementary relation. Another interesting problem in bootstrap and k-core percolation is the fraction of nodes belonging to their giant connected components $P_{\infty b}$ and $P_{\infty c}$, respectively. We solve this problem analytically for arbitrary randomly connected graphs and arbitrary threshold distributions, and we show that $P_{\infty b}$ and $P_{\infty c}$ are not complementary. Our theoretical results coincide with computer simulations in the limit of very large graphs. In bootstrap percolation, we show that when using the branching theory to compute the size of the giant component, we must consider two different types of links, which are related to distinct spanning branches of active nodes.
△ Less
Submitted 24 February, 2019; v1 submitted 9 November, 2018;
originally announced November 2018.
-
Loop corrections in spin models through density consistency
Authors:
Alfredo Braunstein,
Giovanni Catania,
Luca Dall'Asta
Abstract:
Computing marginal distributions of discrete or semidiscrete Markov random fields (MRFs) is a fundamental, generally intractable problem with a vast number of applications in virtually all fields of science. We present a new family of computational schemes to approximately calculate the marginals of discrete MRFs. This method shares some desirable properties with belief propagation, in particular,…
▽ More
Computing marginal distributions of discrete or semidiscrete Markov random fields (MRFs) is a fundamental, generally intractable problem with a vast number of applications in virtually all fields of science. We present a new family of computational schemes to approximately calculate the marginals of discrete MRFs. This method shares some desirable properties with belief propagation, in particular, providing exact marginals on acyclic graphs, but it differs with the latter in that it includes some loop corrections; i.e., it takes into account correlations coming from all cycles in the factor graph. It is also similar to the adaptive Thouless-Anderson-Palmer method, but it differs with the latter in that the consistency is not on the first two moments of the distribution but rather on the value of its density on a subset of values. The results on finite-dimensional Isinglike models show a significant improvement with respect to the Bethe-Peierls (tree) approximation in all cases and with respect to the plaquette cluster variational method approximation in many cases. In particular, for the critical inverse temperature $β_{c}$ of the homogeneous hypercubic lattice, the expansion of $\left(dβ_{c}\right)^{-1}$ around $d=\infty$ of the proposed scheme is exact up to the $d^{-4}$ order, whereas the two latter are exact only up to the $d^{-2}$ order.
△ Less
Submitted 23 July, 2019; v1 submitted 24 October, 2018;
originally announced October 2018.
-
Contamination Source Detection in Water Distribution Networks using Belief Propagation
Authors:
Ernesto Ortega,
Alfredo Braunstein,
Alejandro Lage-Castellanos
Abstract:
We present a Bayesian approach for the Contamination Source Detection problem in Water Distribution Networks. Given an observation of contaminants in one or more nodes in the network, we try to give probable explanation for it assuming that contamination is a rare event. We introduce extra variables to characterize the place and pattern of the first contamination event. Then we write down the post…
▽ More
We present a Bayesian approach for the Contamination Source Detection problem in Water Distribution Networks. Given an observation of contaminants in one or more nodes in the network, we try to give probable explanation for it assuming that contamination is a rare event. We introduce extra variables to characterize the place and pattern of the first contamination event. Then we write down the posterior distribution for these extra variables given the observation obtained by the sensors. Our method relies on Belief Propagation for the evaluation of the marginals of this posterior distribution and the determination of the most likely origin. The method is implemented on a simplified binary forward-in-time dynamics. Simulations on data coming from the realistic simulation software EPANET on two networks show that the simplified model is nevertheless flexible enough to capture crucial information about contaminant sources.
△ Less
Submitted 27 September, 2018;
originally announced September 2018.
-
Non-convex image reconstruction via Expectation Propagation
Authors:
Anna Paola Muntoni,
Rafael Díaz Hernández Rojas,
Alfredo Braunstein,
Andrea Pagnani,
Isaac Pérez Castillo
Abstract:
Tomographic image reconstruction can be mapped to a problem of finding solutions to a large system of linear equations which maximize a function that includes \textit{a priori} knowledge regarding features of typical images such as smoothness or sharpness. This maximization can be performed with standard local optimization tools when the function is concave, but it is generally intractable for rea…
▽ More
Tomographic image reconstruction can be mapped to a problem of finding solutions to a large system of linear equations which maximize a function that includes \textit{a priori} knowledge regarding features of typical images such as smoothness or sharpness. This maximization can be performed with standard local optimization tools when the function is concave, but it is generally intractable for realistic priors, which are non-concave. We introduce a new method to reconstruct images obtained from Radon projections by using Expectation Propagation, which allows us to reframe the problem from an Bayesian inference perspective. We show, by means of extensive simulations, that, compared to state-of-the-art algorithms for this task, Expectation Propagation paired with very simple but non log-concave priors, is often able to reconstruct images up to a smaller error while using a lower amount of information per pixel. We provide estimates for the critical rate of information per pixel above which recovery is error-free by means of simulations on ensembles of phantom and real images.
△ Less
Submitted 11 September, 2018;
originally announced September 2018.
-
Multiple outbreaks in epidemic spreading with local vaccination and limited vaccines
Authors:
M. A. Di Muro,
L. G. Alvarez-Zuzek,
S. Havlin,
L. A. Braunstein
Abstract:
How to prevent the spread of human diseases is a great challenge for the scientific community and so far there are many studies in which immunization strategies have been developed. However, these kind of strategies usually do not consider that medical institutes may have limited vaccine resources available. In this manuscript, we explore the Susceptible-Infected-Recovered (SIR) model with local d…
▽ More
How to prevent the spread of human diseases is a great challenge for the scientific community and so far there are many studies in which immunization strategies have been developed. However, these kind of strategies usually do not consider that medical institutes may have limited vaccine resources available. In this manuscript, we explore the Susceptible-Infected-Recovered (SIR) model with local dynamic vaccination, and considering limited vaccines. In this model, susceptibles in contact with an infected individual, are vaccinated -with probability $ω$- and then get infected -with probability $β$. However, when the fraction of immunized individuals reaches a threshold $V_L$, the vaccination stops, after which only the infection is possible. In the steady state, besides the critical points $β_c$ and $ω_c$ that separate a non-epidemic from an epidemic phase, we find for a range of $V_L$ another transition points, $β^*>β_c$ and $ω^*<ω_c$, which correspond to a novel discontinuous phase transition. This critical value separates a phase where the amount of vaccines is sufficient, from a phase where the disease is strong enough to exhaust all the vaccination units. For a disease with fixed $β$, the vaccination probability $ω$ can be controlled in order to drastically reduce the number of infected individuals, using efficiently the available vaccines.
Furthermore, the temporal evolution of the system close to $β^*$ or $ω^*$, shows that after a peak of infection the system enters into a quasi-stationary state, with only a few infected cases. But if there are no more vaccines, these few infected individuals could originate a second outbreak, represented by a second peak of infection. This state of apparent calm, could be dangerous since it may lead to misleading conclusions and to an abandon of the strategies to control the disease.
△ Less
Submitted 21 August, 2018; v1 submitted 3 May, 2018;
originally announced May 2018.
-
Optimal community structure for social contagions
Authors:
Zhen Su,
Wei Wang,
Lixiang Li,
H. Eugene Stanley,
Lidia A. Braunstein
Abstract:
Community structure is an important factor in the behavior of real-world networks because it strongly affects the stability and thus the phase transition order of the spreading dynamics. We here propose a reversible social contagion model of community networks that includes the factor of social reinforcement. In our model an individual adopts a social contagion when the number of received units of…
▽ More
Community structure is an important factor in the behavior of real-world networks because it strongly affects the stability and thus the phase transition order of the spreading dynamics. We here propose a reversible social contagion model of community networks that includes the factor of social reinforcement. In our model an individual adopts a social contagion when the number of received units of information exceeds its adoption threshold. We use mean-field approximation to describe our proposed model, and the results agree with numerical simulations. The numerical simulations and theoretical analyses both indicate that there is a first-order phase transition in the spreading dynamics, and that a hysteresis loop emerges in the system when there is a variety of initially-adopted seeds. We find an optimal community structure that maximizes spreading dynamics. We also find a rich phase diagram with a triple point that separates the no-diffusion phase from the two diffusion phases.
△ Less
Submitted 1 May, 2018;
originally announced May 2018.
-
Dynamic vaccination in partially overlapped multiplex network
Authors:
L. G. Alvarez-Zuzek,
M. A. Di Muro,
S. Havlin,
L. A. Braunstein
Abstract:
In this work we propose and investigate a new strategy of vaccination, which we call "dynamic vaccination". In our model, susceptible people become aware that one or more of their contacts are infected, and thereby get vaccinated with probability $ω$, before having physical contact with any infected patient. Then, the non-vaccinated individuals will be infected with probability $β$. We apply the s…
▽ More
In this work we propose and investigate a new strategy of vaccination, which we call "dynamic vaccination". In our model, susceptible people become aware that one or more of their contacts are infected, and thereby get vaccinated with probability $ω$, before having physical contact with any infected patient. Then, the non-vaccinated individuals will be infected with probability $β$. We apply the strategy to the SIR epidemic model in a multiplex network composed by two networks, where a fraction $q$ of the nodes acts in both networks. We map this model of dynamic vaccination into bond percolation model, and use the generating functions framework to predict theoretically the behavior of the relevant magnitudes of the system at the steady state. We find a perfect agreement between the solutions of the theoretical equations and the results of stochastic simulations. In addition, we find an interesting phase diagram in the plane $β-ω$, which is composed by an epidemic and a non-epidemic phases, separated by a critical threshold line $β_c$, which depends on $q$. Wefind that, for all values of $q$, a region in the diagram where the vaccination is so efficient that, regardless of the virulence of the disease, it never becomes an epidemic. We compare our strategy with random immunization and find that using the same amount of vaccines for both scenarios, we obtain that the spread of the disease is much lower in the case of dynamic vaccination when compared to random immunization. Furthermore, we also compare our strategy with targeted immunization and we find that, depending on $ω$, dynamic vaccination will perform significantly better, and in some cases will stop the disease before it becomes an epidemic.
△ Less
Submitted 8 January, 2019; v1 submitted 27 April, 2018;
originally announced April 2018.
-
Strategy for stopping failure cascades in interdependent networks
Authors:
Cristian E. La Rocca,
H. Eugene Stanley,
Lidia A. Braunstein
Abstract:
Interdependencies are ubiquitous throughout the world. Every real-world system interacts with and is dependent on other systems, and this interdependency affects their performance. In particular, interdependencies among networks make them vulnerable to failure cascades, the effects of which are often catastrophic. Failure propagation fragments network components, disconnects them, and may cause co…
▽ More
Interdependencies are ubiquitous throughout the world. Every real-world system interacts with and is dependent on other systems, and this interdependency affects their performance. In particular, interdependencies among networks make them vulnerable to failure cascades, the effects of which are often catastrophic. Failure propagation fragments network components, disconnects them, and may cause complete systemic failure. We propose a strategy of avoiding or at least mitigating the complete destruction of a system of interdependent networks experiencing a failure cascade. Starting with a fraction $1-p$ of failing nodes in one network, we reconnect with a probability $γ$ every isolated component to a functional giant component (GC), the largest connected cluster. We find that as $γ$ increases the resilience of the system to cascading failure also increases. We also find that our strategy is more effective when it is applied in a network of low average degree. We solve the problem theoretically using percolation theory, and we find that the solution agrees with simulation results.
△ Less
Submitted 6 July, 2018; v1 submitted 4 April, 2018;
originally announced April 2018.
-
Optimal resource diffusion for suppressing disease spreading in multiplex networks
Authors:
Xiaolong Chen,
Wei Wang,
Shimin Cai,
H. Eugene Stanley,
Lidia A. Braunstein
Abstract:
Resource diffusion is an ubiquitous phenomenon, but how it impacts epidemic spreading has received little study. We propose a model that couples epidemic spreading and resource diffusion in multiplex networks. The spread of disease in a physical contact layer and the recovery of the infected nodes are both strongly dependent upon resources supplied by their counterparts in the social layer. The ge…
▽ More
Resource diffusion is an ubiquitous phenomenon, but how it impacts epidemic spreading has received little study. We propose a model that couples epidemic spreading and resource diffusion in multiplex networks. The spread of disease in a physical contact layer and the recovery of the infected nodes are both strongly dependent upon resources supplied by their counterparts in the social layer. The generation and diffusion of resources in the social layer are in turn strongly dependent upon the state of the nodes in the physical contact layer. Resources diffuse preferentially or randomly in this model. To quantify the degree of preferential diffusion, a bias parameter that controls the resource diffusion is proposed. We conduct extensive simulations and find that the preferential resource diffusion can change phase transition type of the fraction of infected nodes. When the degree of interlayer correlation is below a critical value, increasing the bias parameter changes the phase transition from double continuous to single continuous. When the degree of interlayer correlation is above a critical value, the phase transition changes from multiple continuous to first discontinuous and then to hybrid. We find hysteresis loops in the phase transition. We also find that there is an optimal resource strategy at each fixed degree of interlayer correlation where the threshold reaches a maximum and under which the disease can be maximally suppressed. In addition, the optimal controlling parameter increases as the degree of inter-layer correlation increases.
△ Less
Submitted 10 January, 2018;
originally announced January 2018.
-
The cavity approach for Steiner trees packing problems
Authors:
Alfredo Braunstein,
Anna Paola Muntoni
Abstract:
The Belief Propagation approximation, or cavity method, has been recently applied to several combinatorial optimization problems in its zero-temperature implementation, the max-sum algorithm. In particular, recent developments to solve the edge-disjoint paths problem and the prize-collecting Steiner tree problem on graphs have shown remarkable results for several classes of graphs and for benchmar…
▽ More
The Belief Propagation approximation, or cavity method, has been recently applied to several combinatorial optimization problems in its zero-temperature implementation, the max-sum algorithm. In particular, recent developments to solve the edge-disjoint paths problem and the prize-collecting Steiner tree problem on graphs have shown remarkable results for several classes of graphs and for benchmark instances. Here we propose a generalization of these techniques for two variants of the Steiner trees packing problem where multiple "interacting" trees have to be sought within a given graph. Depending on the interaction among trees we distinguish the vertex-disjoint Steiner trees problem, where trees cannot share nodes, from the edge-disjoint Steiner trees problem, where edges cannot be shared by trees but nodes can be members of multiple trees. Several practical problems of huge interest in network design can be mapped into these two variants, for instance, the physical design of Very Large Scale Integration (VLSI) chips. The formalism described here relies on two components edge-variables that allows us to formulate a massage-passing algorithm for the V-DStP and two algorithms for the E-DStP differing in the scaling of the computational time with respect to some relevant parameters. We will show that one of the two formalisms used for the edge-disjoint variant allow us to map the max-sum update equations into a weighted maximum matching problem over proper bipartite graphs. We developed a heuristic procedure based on the max-sum equations that shows excellent performance in synthetic networks (in particular outperforming standard multi-step greedy procedures by large margins) and on large benchmark instances of VLSI for which the optimal solution is known, on which the algorithm found the optimum in two cases and the gap to optimality was never larger than 4 %.
△ Less
Submitted 3 January, 2019; v1 submitted 19 December, 2017;
originally announced December 2017.
-
Contamination source inference in water distribution networks
Authors:
Alfredo Braunstein,
Alejandro Lage-Castellanos,
Ernesto Ortega
Abstract:
We study the inference of the origin and the pattern of contamination in water distribution networks. We assume a simplified model for the dyanmics of the contamination spread inside a water distribution network, and assume that at some random location a sensor detects the presence of contaminants. We transform the source location problem into an optimization problem by considering discrete times…
▽ More
We study the inference of the origin and the pattern of contamination in water distribution networks. We assume a simplified model for the dyanmics of the contamination spread inside a water distribution network, and assume that at some random location a sensor detects the presence of contaminants. We transform the source location problem into an optimization problem by considering discrete times and a binary contaminated/not contaminated state for the nodes of the network. The resulting problem is solved by Mixed Integer Linear Programming. We test our results on random networks as well as in the Modena city network.
△ Less
Submitted 5 December, 2017; v1 submitted 1 December, 2017;
originally announced December 2017.
-
Suppressing epidemic spreading in multiplex networks with social-support
Authors:
Xiaolong Chen,
Ruijie Wang,
Ming Tang,
Shimin Cai,
H. Eugene Stanley,
Lidia A. Braunstein
Abstract:
Although suppressing the spread of a disease is usually achieved by investing in public resources, in the real world only a small percentage of the population have access to government assistance when there is an outbreak, and most must rely on resources from family or friends. We study the dynamics of disease spreading in social-contact multiplex networks when the recovery of infected nodes depen…
▽ More
Although suppressing the spread of a disease is usually achieved by investing in public resources, in the real world only a small percentage of the population have access to government assistance when there is an outbreak, and most must rely on resources from family or friends. We study the dynamics of disease spreading in social-contact multiplex networks when the recovery of infected nodes depends on resources from healthy neighbors in the social layer. We investigate how degree heterogeneity affects the spreading dynamics. Using theoretical analysis and simulations we find that degree heterogeneity promotes disease spreading. The phase transition of the infected density is hybrid and increases smoothly from zero to a finite small value at the first invasion threshold and then suddenly jumps at the second invasion threshold. We also find a hysteresis loop in the transition of the infected density. We further investigate how an overlap in the edges between two layers affects the spreading dynamics. We find that when the amount of overlap is smaller than a critical value the phase transition is hybrid and there is a hysteresis loop, otherwise the phase transition is continuous and the hysteresis loop vanishes. In addition, the edge overlap allows an epidemic outbreak when the transmission rate is below the first invasion threshold, but suppresses any explosive transition when the transmission rate is above the first invasion threshold.
△ Less
Submitted 8 August, 2017;
originally announced August 2017.
-
Social contagions with communication channels alternation on multiplex networks
Authors:
Wei Wang,
Ming Tang,
H. Eugene Stanley,
Lidia A. Braunstein
Abstract:
Internet communication channels, e.g., Facebook, Twitter, and email, are multiplex networks that facilitate interaction and information-sharing among individuals. During brief time periods users often use a single communication channel, but then communication channel alteration (CCA) occurs. This means that we must refine our understanding of the dynamics of social contagions. We propose a non-Mar…
▽ More
Internet communication channels, e.g., Facebook, Twitter, and email, are multiplex networks that facilitate interaction and information-sharing among individuals. During brief time periods users often use a single communication channel, but then communication channel alteration (CCA) occurs. This means that we must refine our understanding of the dynamics of social contagions. We propose a non-Markovian behavior spreading model in multiplex networks that takes into account the CCA mechanism, and we develop a generalized edge-based compartmental method to describe the spreading dynamics. Through extensive numerical simulations and theoretical analyses we find that the time delays induced by CCA slow the behavior spreading but do not affect the final adoption size. We also find that the CCA suppresses behavior spreading. On two coupled random regular networks, the adoption size exhibits hybrid growth, i.e., it grows first continuously and then discontinuously with the information transmission probability. CCA in ER-SF multiplex networks in which two subnetworks are Erdős-Rényi (ER) and scale-free (SF) introduces a crossover from continuous to hybrid growth in adoption size versus information transmission probability. Our results extend our understanding of the role of CCA in spreading dynamics, and may elicit further research.
△ Less
Submitted 19 December, 2018; v1 submitted 5 August, 2017;
originally announced August 2017.
-
Cascading Failures in Interdependent Networks with Multiple Supply-Demand Links and Functionality Thresholds
Authors:
M. A. Di Muro,
L. D. Valdez,
H. H. A. Rêgo,
S. V. Buldyrev,
H. E. Stanley,
L. A. Braunstein
Abstract:
Various social, financial, biological and technological systems can be modeled by interdependent networks. It has been assumed that in order to remain functional, nodes in one network must receive the support from nodes belonging to different networks. So far these models have been limited to the case in which the failure propagates across networks only if the nodes lose all their supply nodes. In…
▽ More
Various social, financial, biological and technological systems can be modeled by interdependent networks. It has been assumed that in order to remain functional, nodes in one network must receive the support from nodes belonging to different networks. So far these models have been limited to the case in which the failure propagates across networks only if the nodes lose all their supply nodes. In this paper we develop a more realistic model for two interdependent networks in which each node has its own supply threshold, i.e., they need the support of a minimum number of supply nodes to remain functional. In addition, we analyze different conditions of internal node failure due to disconnection from nodes within its own network. We show that several local internal failure conditions lead to similar nontrivial results. When there are no internal failures the model is equivalent to a bipartite system, which can be useful to model a financial market. We explore the rich behaviors of these models that include discontinuous and continuous phase transitions. Using the generating functions formalism, we analytically solve all the models in the limit of infinitely large networks and find an excellent agreement with the stochastic simulations.
△ Less
Submitted 30 November, 2017; v1 submitted 1 August, 2017;
originally announced August 2017.
-
Epidemic spreading in multiplex networks influenced by opinion exchanges on vaccination
Authors:
L. G. Alvarez-Zuzek,
Cristian E. La Rocca,
J. R. Iglesias,
L. A. Braunstein
Abstract:
We study the changes of opinions about vaccination together with the evolution of a disease. In our model we consider a multiplex network consisting of two layers. One of the layers corresponds to a social network where people share their opinions and influence others opinions. The social model that rules the dynamic is the M-model, which takes into account two different processes that occurs in a…
▽ More
We study the changes of opinions about vaccination together with the evolution of a disease. In our model we consider a multiplex network consisting of two layers. One of the layers corresponds to a social network where people share their opinions and influence others opinions. The social model that rules the dynamic is the M-model, which takes into account two different processes that occurs in a society: persuasion and compromise. This two processes are related through a parameter $r$, $r<1$ describes a moderate and committed society, for $r>1$ the society tends to have extremist opinions, while $r=1$ represents a neutral society. This social network may be of real or virtual contacts. On the other hand, the second layer corresponds to a network of physical contacts where the disease spreading is described by the SIR-Model. In this model the individuals may be in one of the following four states: Susceptible ($S$), Infected($I$), Recovered ($R$) or Vaccinated ($V$). A Susceptible individual can: i) get vaccinated, if his opinion in the other layer is totally in favor of the vaccine, ii) get infected, with probability $β$ if he is in contact with an infected neighbor. Those $I$ individuals recover after a certain period $t_r=6$. Vaccinated individuals have an extremist positive opinion that does not change. We consider that the vaccine has a certain effectiveness $ω$ and as a consequence vaccinated nodes can be infected with probability $β(1 - ω)$ if they are in contact with an infected neighbor. In this case, if the infection process is successful, the new infected individual changes his opinion from extremist positive to totally against the vaccine. We find that depending on the trend in the opinion of the society, which depends on $r$, different behaviors in the spread of the epidemic occurs. An epidemic threshold was found.
△ Less
Submitted 30 November, 2017; v1 submitted 23 May, 2017;
originally announced May 2017.
-
Promoting information spreading by using contact memory
Authors:
Lei Gao,
Wei Wang,
Panpan Shu,
Hui Gao,
Lidia A. Braunstein
Abstract:
Promoting information spreading is a booming research topic in network science community. However, the exiting studies about promoting information spreading seldom took into account the human memory, which plays an important role in the spreading dynamics. In this paper we propose a non-Markovian information spreading model on complex networks, in which every informed node contacts a neighbor by u…
▽ More
Promoting information spreading is a booming research topic in network science community. However, the exiting studies about promoting information spreading seldom took into account the human memory, which plays an important role in the spreading dynamics. In this paper we propose a non-Markovian information spreading model on complex networks, in which every informed node contacts a neighbor by using the memory of neighbor's accumulated contact numbers in the past. We systematically study the information spreading dynamics on uncorrelated configuration networks and a group of $22$ real-world networks, and find an effective contact strategy of promoting information spreading, i.e., the informed nodes preferentially contact neighbors with small number of accumulated contacts. According to the effective contact strategy, the high degree nodes are more likely to be chosen as the contacted neighbors in the early stage of the spreading, while in the late stage of the dynamics, the nodes with small degrees are preferentially contacted. We also propose a mean-field theory to describe our model, which qualitatively agrees well with the stochastic simulations on both artificial and real-world networks.
△ Less
Submitted 19 March, 2017;
originally announced March 2017.
-
An analytic approximation of the feasible space of metabolic networks
Authors:
Alfredo Braunstein,
Anna Paola Muntoni,
Andrea Pagnani
Abstract:
Assuming a steady-state condition within a cell, metabolic fluxes satisfy an under-determined linear system of stoichiometric equations. Characterizing the space of fluxes that satisfy such equations along with given bounds (and possibly additional relevant constraints) is considered of utmost importance for the understanding of cellular metabolism. Extreme values for each individual flux can be c…
▽ More
Assuming a steady-state condition within a cell, metabolic fluxes satisfy an under-determined linear system of stoichiometric equations. Characterizing the space of fluxes that satisfy such equations along with given bounds (and possibly additional relevant constraints) is considered of utmost importance for the understanding of cellular metabolism. Extreme values for each individual flux can be computed with Linear Programming (as Flux Balance Analysis), and their marginal distributions can be approximately computed with Monte-Carlo sampling. Here we present an approximate analytic method for the latter task based on Expectation Propagation equations that does not involve sampling and can achieve much better predictions than other existing analytic methods. The method is iterative, and its computation time is dominated by one matrix inversion per iteration. With respect to sampling, we show through extensive simulation that it has some advantages including computation time, and the ability to efficiently fix empirically estimated distributions of fluxes.
△ Less
Submitted 6 April, 2017; v1 submitted 17 February, 2017;
originally announced February 2017.
-
Unification of theoretical approaches for epidemic spreading on complex networks
Authors:
Wei Wang,
Ming Tang,
H. Eugene Stanley,
Lidia A. Braunstein
Abstract:
Models of epidemic spreading on complex networks have attracted great attention among researchers in physics, mathematics, and epidemiology due to their success in predicting and controlling scenarios of epidemic spreading in real-world scenarios. To understand the interplay between epidemic spreading and the topology of a contact network, several outstanding theoretical approaches have been devel…
▽ More
Models of epidemic spreading on complex networks have attracted great attention among researchers in physics, mathematics, and epidemiology due to their success in predicting and controlling scenarios of epidemic spreading in real-world scenarios. To understand the interplay between epidemic spreading and the topology of a contact network, several outstanding theoretical approaches have been developed. An accurate theoretical approach describing the spreading dynamics must take both the network topology and dynamical correlations into consideration at the expense of increasing the complexity of the equations. In this short survey we unify the most widely used theoretical approaches for epidemic spreading on complex networks in terms of increasing complexity, including the mean-field, the heterogeneous mean-field, the quench mean-field, dynamical message-passing, link percolation, and pairwise approximation. We build connections among these approaches to provide new insights into developing an accurate theoretical approach to spreading dynamics on complex networks.
△ Less
Submitted 13 December, 2016;
originally announced December 2016.
-
Network reconstruction from infection cascades
Authors:
Alfredo Braunstein,
Alessandro Ingrosso,
Anna Paola Muntoni
Abstract:
Accessing the network through which a propagation dynamics diffuse is essential for understanding and controlling it. In a few cases, such information is available through direct experiments or thanks to the very nature of propagation data. In a majority of cases however, available information about the network is indirect and comes from partial observations of the dynamics, rendering the network…
▽ More
Accessing the network through which a propagation dynamics diffuse is essential for understanding and controlling it. In a few cases, such information is available through direct experiments or thanks to the very nature of propagation data. In a majority of cases however, available information about the network is indirect and comes from partial observations of the dynamics, rendering the network reconstruction a fundamental inverse problem. Here we show that it is possible to reconstruct the whole structure of an interaction network and to simultaneously infer the complete time course of activation spreading, relying just on single epoch (i.e. snapshot) or time-scattered observations of a small number of activity cascades. The method that we present is built on a Belief Propagation approximation, that has shown impressive accuracy in a wide variety of relevant cases, and is able to infer interactions in presence of incomplete time-series data by providing a detailed modeling of the posterior distribution of trajectories conditioned to the observations. Furthermore, we show by experiments that the information content of full cascades is relatively smaller than that of sparse observations or single snapshots.
△ Less
Submitted 12 February, 2018; v1 submitted 1 September, 2016;
originally announced September 2016.