-
Static network structure cannot stabilize cooperation among Large Language Model agents
Authors:
Jin Han,
Balaraju Battu,
Ivan Romić,
Talal Rahwan,
Petter Holme
Abstract:
Large language models (LLMs) are increasingly used to model human social behavior, with recent research exploring their ability to simulate social dynamics. Here, we test whether LLMs mirror human behavior in social dilemmas, where individual and collective interests conflict. Humans generally cooperate more than expected in laboratory settings, showing less cooperation in well-mixed populations b…
▽ More
Large language models (LLMs) are increasingly used to model human social behavior, with recent research exploring their ability to simulate social dynamics. Here, we test whether LLMs mirror human behavior in social dilemmas, where individual and collective interests conflict. Humans generally cooperate more than expected in laboratory settings, showing less cooperation in well-mixed populations but more in fixed networks. In contrast, LLMs tend to exhibit greater cooperation in well-mixed settings. This raises a key question: Are LLMs about to emulate human behavior in cooperative dilemmas on networks? In this study, we examine networked interactions where agents repeatedly engage in the Prisoner's Dilemma within both well-mixed and structured network configurations, aiming to identify parallels in cooperative behavior between LLMs and humans. Our findings indicate critical distinctions: while humans tend to cooperate more within structured networks, LLMs display increased cooperation mainly in well-mixed environments, with limited adjustment to networked contexts. Notably, LLM cooperation also varies across model types, illustrating the complexities of replicating human-like social adaptability in artificial agents. These results highlight a crucial gap: LLMs struggle to emulate the nuanced, adaptive social strategies humans deploy in fixed networks. Unlike human participants, LLMs do not alter their cooperative behavior in response to network structures or evolving social contexts, missing the reciprocity norms that humans adaptively employ. This limitation points to a fundamental need in future LLM design -- to integrate a deeper comprehension of social norms, enabling more authentic modeling of human-like cooperation and adaptability in networked environments.
△ Less
Submitted 15 November, 2024;
originally announced November 2024.
-
Where postdoctoral journeys lead
Authors:
Yueran Duan,
Shahan Ali Memon,
Bedoor AlShebli,
Qing Guan,
Petter Holme,
Talal Rahwan
Abstract:
Postdoctoral training is a career stage often described as a demanding and anxiety-laden time when many promising PhDs see their academic dreams slip away due to circumstances beyond their control. We use a unique data set of academic publishing and careers to chart the more or less successful postdoctoral paths. We build a measure of academic success on the citation patterns two to five years int…
▽ More
Postdoctoral training is a career stage often described as a demanding and anxiety-laden time when many promising PhDs see their academic dreams slip away due to circumstances beyond their control. We use a unique data set of academic publishing and careers to chart the more or less successful postdoctoral paths. We build a measure of academic success on the citation patterns two to five years into a faculty career. Then, we monitor how students' postdoc positions -- in terms of relocation, change of topic, and early well-cited papers -- relate to their early-career success. One key finding is that the postdoc period seems more important than the doctoral training to achieve this form of success. This is especially interesting in light of the many studies of academic faculty hiring that link Ph.D. granting institutions and hires, omitting the postdoc stage. Another group of findings can be summarized as a Goldilocks principle: it seems beneficial to change one's direction, but not too much.
△ Less
Submitted 6 November, 2024;
originally announced November 2024.
-
Beyond a binary theorizing of prosociality
Authors:
Chen Shen,
Zhixue He,
Hao Guo,
Shuyue Hu,
Jun Tanimoto,
Lei Shi,
Petter Holme
Abstract:
A stylized experiment, the public goods game, has taught us the peculiar reproducible fact that humans tend to contribute more to shared resources than expected from economically rational assumptions. There have been two competing explanations for this phenomenon: either contributing to the public good is an innate human trait (the prosocial preference hypothesis) or a transitory effect while lear…
▽ More
A stylized experiment, the public goods game, has taught us the peculiar reproducible fact that humans tend to contribute more to shared resources than expected from economically rational assumptions. There have been two competing explanations for this phenomenon: either contributing to the public good is an innate human trait (the prosocial preference hypothesis) or a transitory effect while learning the game (the confused learner hypothesis). We use large-scale experimental data from a novel experimental design to distinguish between these two hypotheses. By monitoring the effects of zealots (persistently cooperating bots) and varying the participants' awareness of them, we find a considerably more complex scenario than previously reported. People indeed have a prosocial bias, but not to the degree that they always forego taking action to increase their profit. While our findings end the simplistic theorizing of prosociality in the public goods game, an observed positive, cooperative response to zealots has actionable policy implications.
△ Less
Submitted 6 June, 2024;
originally announced June 2024.
-
Modularity-based selection of the number of slices in temporal network clustering
Authors:
Patrik Seiron,
Axel Lindegren,
Matteo Magnani,
Christian Rohner,
Tsuyoshi Murata,
Petter Holme
Abstract:
A popular way to cluster a temporal network is to transform it into a sequence of networks, also called slices, where each slice corresponds to a time interval and contains the vertices and edges existing in that interval. A reason to perform this transformation is that after a network has been sliced, existing algorithms designed to find clusters in multilayer networks can be used. However, to us…
▽ More
A popular way to cluster a temporal network is to transform it into a sequence of networks, also called slices, where each slice corresponds to a time interval and contains the vertices and edges existing in that interval. A reason to perform this transformation is that after a network has been sliced, existing algorithms designed to find clusters in multilayer networks can be used. However, to use this approach, we need to know how many slices to generate. This chapter discusses how to select the number of slices when generalized modularity is used to identify the clusters.
△ Less
Submitted 24 November, 2023;
originally announced November 2023.
-
Temporal link prediction methods based on behavioral synchrony
Authors:
Yueran Duan,
Qing Guan,
Petter Holme,
Yacheng Yang,
Wei Guan
Abstract:
Link prediction -- to identify potential missing or spurious links in temporal network data -- has typically been based on local structures, ignoring long-term temporal effects. In this chapter, we propose link-prediction methods based on agents' behavioral synchrony. Since synchronous behavior signals similarity and similar agents are known to have a tendency to connect in the future, behavioral…
▽ More
Link prediction -- to identify potential missing or spurious links in temporal network data -- has typically been based on local structures, ignoring long-term temporal effects. In this chapter, we propose link-prediction methods based on agents' behavioral synchrony. Since synchronous behavior signals similarity and similar agents are known to have a tendency to connect in the future, behavioral synchrony could function as a precursor of contacts and, thus, as a basis for link prediction. We use four data sets of different sizes to test the algorithm's accuracy. We compare the results with traditional link prediction models involving both static and temporal networks. Among our findings, we note that the proposed algorithm is superior to conventional methods, with the average accuracy improved by approximately 2% - 5%. We identify different evolution patterns of four network topologies -- a proximity network, a communication network, transportation data, and a collaboration network. We found that: (1) timescale similarity contributes more to the evolution of the human contact network and the human communication network; (2) such contribution is not observed through a transportation network whose evolution pattern is more dependent on network structure than on the behavior of regional agents; (3) both timescale similarity and local structural similarity contribute to the collaboration network.
△ Less
Submitted 24 November, 2023;
originally announced November 2023.
-
The nature of epidemic criticality in temporal networks
Authors:
Chao-Ran Cai,
Yuan-Yuan Nie,
Petter Holme
Abstract:
Analytical studies of network epidemiology almost exclusively focus on the extreme situations where the time scales of network dynamics are well separated (longer or shorter) from that of epidemic propagation. In realistic scenarios, however, these time scales could be similar, which has profound implications for epidemic modeling (e.g., one can no longer reduce the dimensionality of epidemic mode…
▽ More
Analytical studies of network epidemiology almost exclusively focus on the extreme situations where the time scales of network dynamics are well separated (longer or shorter) from that of epidemic propagation. In realistic scenarios, however, these time scales could be similar, which has profound implications for epidemic modeling (e.g., one can no longer reduce the dimensionality of epidemic models). We build a theory for the critical behavior of susceptible-infected-susceptible (SIS) epidemics in the vicinity of the critical threshold on the activity-driven model of temporal networks. We find that the persistence of links in the network leads to increasing recovery rates reducing the threshold. Dynamic correlations (coming from being close to infected nodes increases the likelihood of infection) drive the threshold in the opposite direction. These two counteracting effects make epidemic criticality in temporal networks a remarkably complex phenomenon.
△ Less
Submitted 20 November, 2023;
originally announced November 2023.
-
The nature and nurture of network evolution
Authors:
Bin Zhou,
Petter Holme,
Zaiwu Gong,
Choujun Zhan,
Yao Huang,
Xin Lu,
Xiangyi Meng
Abstract:
Although the origin of the fat-tail characteristic of the degree distribution in complex networks has been extensively researched, the underlying cause of the degree distribution characteristic across the complete range of degrees remains obscure. Here, we propose an evolution model that incorporates only two factors: the node's weight, reflecting its innate attractiveness (nature), and the node's…
▽ More
Although the origin of the fat-tail characteristic of the degree distribution in complex networks has been extensively researched, the underlying cause of the degree distribution characteristic across the complete range of degrees remains obscure. Here, we propose an evolution model that incorporates only two factors: the node's weight, reflecting its innate attractiveness (nature), and the node's degree, reflecting the external influences (nurture). The proposed model provides a good fit for degree distributions and degree ratio distributions of numerous real-world networks and reproduces their evolution processes. Our results indicate that the nurture factor plays a dominant role in the evolution of social networks. In contrast, the nature factor plays a dominant role in the evolution of non-social networks, suggesting that whether nodes are people determines the dominant factor influencing the evolution of real-world networks.
△ Less
Submitted 5 November, 2023;
originally announced November 2023.
-
The toughness, elasticity, color, and consistency of cooperation
Authors:
Petter Holme
Abstract:
This is a comment on a recent review article about reputation and reciprocity as mechanisms promoting cooperation. I also discuss the necessary changes for the currently game-theory-based cooperation studies to become a complete theory of cooperation in our contemporary society.
This is a comment on a recent review article about reputation and reciprocity as mechanisms promoting cooperation. I also discuss the necessary changes for the currently game-theory-based cooperation studies to become a complete theory of cooperation in our contemporary society.
△ Less
Submitted 28 May, 2023;
originally announced July 2023.
-
What complexity science is, and why
Authors:
Petter Holme
Abstract:
This is an essay about understanding complexity science, via some peculiarities of the field, as a meeting place for a special kind of scientist. It comes out of my hobby of reading popular-science complex systems books, and builds on notes that have been collecting dust for almost a decade.
This is an essay about understanding complexity science, via some peculiarities of the field, as a meeting place for a special kind of scientist. It comes out of my hobby of reading popular-science complex systems books, and builds on notes that have been collecting dust for almost a decade.
△ Less
Submitted 10 January, 2022;
originally announced January 2022.
-
Cost-effective Network Disintegration through Targeted Enumeration
Authors:
Zhigang Wang,
Ye Deng,
Petter Holme,
Zengru Di,
Linyuan Lv,
Jun Wu
Abstract:
Finding an optimal subset of nodes or links to disintegrate harmful networks is a fundamental problem in network science, with potential applications to anti-terrorism, epidemic control, and many other fields of study. The challenge of the network disintegration problem is to balance the effectiveness and efficiency of strategies. In this paper, we propose a cost-effective targeted enumeration met…
▽ More
Finding an optimal subset of nodes or links to disintegrate harmful networks is a fundamental problem in network science, with potential applications to anti-terrorism, epidemic control, and many other fields of study. The challenge of the network disintegration problem is to balance the effectiveness and efficiency of strategies. In this paper, we propose a cost-effective targeted enumeration method for network disintegration. The proposed approach includes two stages: searching for candidate objects and identifying an optimal solution. In the first stage, we use rank aggregation to generate a comprehensive ranking of node importance, upon which we identify a small-scale candidate set of nodes to remove. In the second stage, we use an enumeration method to find an optimal combination among the candidate nodes. Extensive experimental results on synthetic and real-world networks demonstrate that the proposed method achieves a satisfying trade-off between effectiveness and efficiency. The introduced two-stage targeted enumeration framework can also be applied to other computationally intractable combinational optimization problems, from team assembly via portfolio investment to drug design.
△ Less
Submitted 26 August, 2022; v1 submitted 4 November, 2021;
originally announced November 2021.
-
Measuring and utilizing temporal network dissimilarity
Authors:
Xiu-Xiu Zhan,
Chuang Liu,
Zhipeng Wang,
Huijuang Wang,
Petter Holme,
Zi-Ke Zhang
Abstract:
Quantifying the structural and functional differences of temporal networks is a fundamental and challenging problem in the era of big data. This work proposes a temporal dissimilarity measure for temporal network comparison based on the fastest arrival distance distribution and spectral entropy based Jensen-Shannon divergence. Experimental results on both synthetic and empirical temporal networks…
▽ More
Quantifying the structural and functional differences of temporal networks is a fundamental and challenging problem in the era of big data. This work proposes a temporal dissimilarity measure for temporal network comparison based on the fastest arrival distance distribution and spectral entropy based Jensen-Shannon divergence. Experimental results on both synthetic and empirical temporal networks show that the proposed measure could discriminate diverse temporal networks with different structures by capturing various topological and temporal properties. Moreover, the proposed measure can discern the functional distinctions and is found effective applications in temporal network classification and spreadability discrimination.
△ Less
Submitted 1 November, 2021;
originally announced November 2021.
-
Social physics
Authors:
Marko Jusup,
Petter Holme,
Kiyoshi Kanazawa,
Misako Takayasu,
Ivan Romic,
Zhen Wang,
Suncana Gecek,
Tomislav Lipic,
Boris Podobnik,
Lin Wang,
Wei Luo,
Tin Klanjscek,
Jingfang Fan,
Stefano Boccaletti,
Matjaz Perc
Abstract:
Recent decades have seen a rise in the use of physics methods to study different societal phenomena. This development has been due to physicists venturing outside of their traditional domains of interest, but also due to scientists from other disciplines taking from physics the methods that have proven so successful throughout the 19th and the 20th century. Here we dub this field 'social physics'…
▽ More
Recent decades have seen a rise in the use of physics methods to study different societal phenomena. This development has been due to physicists venturing outside of their traditional domains of interest, but also due to scientists from other disciplines taking from physics the methods that have proven so successful throughout the 19th and the 20th century. Here we dub this field 'social physics' and pay our respect to intellectual mavericks who nurtured it to maturity. We do so by reviewing the current state of the art. Starting with a set of topics that are at the heart of modern human societies, we review research dedicated to urban development and traffic, the functioning of financial markets, cooperation as the basis for our evolutionary success, the structure of social networks, and the integration of intelligent machines into these networks. We then shift our attention to a set of topics that explore potential threats to society. These include criminal behaviour, large-scale migrations, epidemics, environmental challenges, and climate change. We end the coverage of each topic with promising directions for future research. Based on this, we conclude that the future for social physics is bright. Physicists studying societal phenomena are no longer a curiosity, but rather a force to be reckoned with. Notwithstanding, it remains of the utmost importance that we continue to foster constructive dialogue and mutual respect at the interfaces of different scientific disciplines.
△ Less
Submitted 11 January, 2022; v1 submitted 5 October, 2021;
originally announced October 2021.
-
Hiding in Temporal Networks
Authors:
Marcin Waniek,
Petter Holme,
Talal Rahwan
Abstract:
Social network analysis tools can infer various attributes just by scrutinizing one's connections. Several researchers have studied the problem faced by an evader whose goal is to strategically rewire their social connections in order to mislead such tools, thereby concealing their private attributes. However, to date, this literature has only considered static networks, while neglecting the more…
▽ More
Social network analysis tools can infer various attributes just by scrutinizing one's connections. Several researchers have studied the problem faced by an evader whose goal is to strategically rewire their social connections in order to mislead such tools, thereby concealing their private attributes. However, to date, this literature has only considered static networks, while neglecting the more general case of temporal networks, where the structure evolves over time. Driven by this observation, we study how the evader can conceal their importance from an adversary armed with temporal centrality measures. We consider computational and structural aspects of this problem: Is it computationally feasible to calculate optimal ways of hiding? If it is, what network characteristics facilitate hiding? This topic has been studied in static networks, but in this work, we add realism to the problem by considering temporal networks of edges changing in time. We find that it is usually computationally infeasible to find the optimal way of hiding. On the other hand, by manipulating one's contacts, one could add a surprising amount of privacy. Compared to static networks, temporal networks offer more strategies for this type of manipulation and are thus, to some extent, easier to hide in.
△ Less
Submitted 28 July, 2021;
originally announced July 2021.
-
The global migration network of sex-workers
Authors:
Luis E C Rocha,
Petter Holme,
Claudio D G Linhares
Abstract:
Differences in the social and economic environment across countries encourage humans to migrate in search of better living conditions, including job opportunities, higher salaries, security and welfare. Quantifying global migration is, however, challenging because of poor recording, privacy issues and residence status. This is particularly critical for some classes of migrants involved in stigmati…
▽ More
Differences in the social and economic environment across countries encourage humans to migrate in search of better living conditions, including job opportunities, higher salaries, security and welfare. Quantifying global migration is, however, challenging because of poor recording, privacy issues and residence status. This is particularly critical for some classes of migrants involved in stigmatised, unregulated or illegal activities. Escorting services or high-end prostitution are well-paid activities that attract workers all around the world. In this paper, we study international migration patterns of sex-workers by using network methods. Using an extensive international online advertisement directory of escorting services and information about individual escorts, we reconstruct a migrant flow network where nodes represent either origin or destination countries. The links represent the direct routes between two countries. The migration network of sex-workers shows different structural patterns than the migration of the general population. The network contains a strong core where mutual migration is often observed between a group of high-income European countries, yet Europe is split into different network communities with specific ties to non-European countries. We find non-reciprocal relations between countries, with some of them mostly offering while others attract workers. The GDP per capita is a good indicator of country attractiveness for incoming workers and service rates but is unrelated to the probability of emigration. The median financial gain of migrating, in comparison to working at the home country, is 15.9%. Only sex-workers coming from 77% of the countries have financial gains with migration and average gains decrease with the GDPc of the country of origin. Our results shows that high-end sex-worker migration is regulated by economic, geographic and cultural aspects.
△ Less
Submitted 6 July, 2021;
originally announced July 2021.
-
Networks of climate change: Connecting causes and consequences
Authors:
Petter Holme,
Juan C. Rocha
Abstract:
Understanding the causes and consequences of, and devising countermeasures to, global warming is a profoundly complex problem. Network representations are sometimes the only way forward, and sometimes able to reduce the complexity of the original problem. Networks are both necessary and natural elements of climate science. Furthermore, networks form a mathematical foundation for a multitude of com…
▽ More
Understanding the causes and consequences of, and devising countermeasures to, global warming is a profoundly complex problem. Network representations are sometimes the only way forward, and sometimes able to reduce the complexity of the original problem. Networks are both necessary and natural elements of climate science. Furthermore, networks form a mathematical foundation for a multitude of computational and analytical techniques. We are only beginning to see the benefits of this connection between the sciences of climate change and network science. In this review, we cover the wide spectrum of network applications in the climate-change literature -- what they represent, how they are analyzed, and what insights they bring. We also discuss network data, tools, and problems yet to be explored.
△ Less
Submitted 27 May, 2022; v1 submitted 20 May, 2021;
originally announced May 2021.
-
A map of approaches to temporal networks
Authors:
Petter Holme,
Jari Saramäki
Abstract:
The study of temporal networks is motivated by the simple and important observation that just as network structure can affect dynamics, so can structure in time. Just as network topology can teach us about the system in question, so can its temporal characteristics. In many cases, leaving out either one of these components would lead to an incomplete understanding of the system or poor predictions…
▽ More
The study of temporal networks is motivated by the simple and important observation that just as network structure can affect dynamics, so can structure in time. Just as network topology can teach us about the system in question, so can its temporal characteristics. In many cases, leaving out either one of these components would lead to an incomplete understanding of the system or poor predictions. We argue that including time into network modeling inevitably leads researchers away from the trodden paths of network science. Temporal network theory requires something different -- new methods, new concepts, new questions -- compared to static networks. In this introductory chapter, we overview the ideas that the field of temporal networks has brought forward in the last decade. We also place the contributions to the current volume on this map of temporal-network approaches.
△ Less
Submitted 25 March, 2021;
originally announced March 2021.
-
A temporal network version of Watts's cascade model
Authors:
Fariba Karimi,
Petter Holme
Abstract:
Threshold models of cascades in the social sciences and economics explain the spread of opinion and innovation due to social influence. In threshold cascade models, fads or innovations spread between agents as determined by their interactions with other agents and their personal threshold of resistance. Typically, these models do not account for structure in the timing of interaction between the u…
▽ More
Threshold models of cascades in the social sciences and economics explain the spread of opinion and innovation due to social influence. In threshold cascade models, fads or innovations spread between agents as determined by their interactions with other agents and their personal threshold of resistance. Typically, these models do not account for structure in the timing of interaction between the units. In this work, we extend a model of social cascades by Duncan Watts to temporal interaction networks. In our model, we assume friends and acquaintances influence agents for a certain time into the future. That is the influence of the past ages and becomes unimportant. Thus, our modified cascade model has an effective time window of influence. We explore two types of thresholds -- thresholds to fractions of the neighbors or absolute numbers. We try our model on six empirical datasets and compare them with null models.
△ Less
Submitted 25 March, 2021;
originally announced March 2021.
-
Temporal networks as a modeling framework
Authors:
Petter Holme,
Jari Saramäki
Abstract:
To understand large, connected systems, we cannot only zoom into the details. We also need to see the large-scale features from afar. One way to take a step back and get the whole picture is to model the systems as a network. However, many systems are not static, but consisting of contacts that are off and on as time progresses. This Chapter introduces the mathematical and computational modeling o…
▽ More
To understand large, connected systems, we cannot only zoom into the details. We also need to see the large-scale features from afar. One way to take a step back and get the whole picture is to model the systems as a network. However, many systems are not static, but consisting of contacts that are off and on as time progresses. This Chapter introduces the mathematical and computational modeling of such systems and thus an introduction to the rest of the book. We will cover some of the earlier developments that form the foundation for the more specialized topics of the other Chapters.
△ Less
Submitted 24 March, 2021;
originally announced March 2021.
-
Multistage onset of epidemics in heterogeneous networks
Authors:
Chao-Ran Cai,
Zhi-Xi Wu,
Petter Holme
Abstract:
We develop a theory for the susceptible-infected-susceptible (SIS) epidemic model on networks that incorporate both network structure and dynamic correlations. This theory can account for the multistage onset of the epidemic phase in scale-free networks. This phenomenon is characterized by multiple peaks in the susceptibility as a function of the infection rate. It can be explained by that, even u…
▽ More
We develop a theory for the susceptible-infected-susceptible (SIS) epidemic model on networks that incorporate both network structure and dynamic correlations. This theory can account for the multistage onset of the epidemic phase in scale-free networks. This phenomenon is characterized by multiple peaks in the susceptibility as a function of the infection rate. It can be explained by that, even under the global epidemic threshold, a hub can sustain the epidemics for an extended period. Moreover, our approach improves theoretical calculations of prevalence close to the threshold in heterogeneous networks and also can predict the average risk of infection for neighbors of nodes with different degree and state on uncorrelated static networks.
△ Less
Submitted 10 March, 2021;
originally announced March 2021.
-
Social Diffusion Sources Can Escape Detection
Authors:
Marcin Waniek,
Manuel Cebrian,
Petter Holme,
Talal Rahwan
Abstract:
Influencing (and being influenced by) others through social networks is fundamental to all human societies. Whether this happens through the diffusion of rumors, opinions, or viruses, identifying the diffusion source (i.e., the person that initiated it) is a problem that has attracted much research interest. Nevertheless, existing literature has ignored the possibility that the source might strate…
▽ More
Influencing (and being influenced by) others through social networks is fundamental to all human societies. Whether this happens through the diffusion of rumors, opinions, or viruses, identifying the diffusion source (i.e., the person that initiated it) is a problem that has attracted much research interest. Nevertheless, existing literature has ignored the possibility that the source might strategically modify the network structure (by rewiring links or introducing fake nodes) to escape detection. Here, without restricting our analysis to any particular diffusion scenario, we close this gap by evaluating two mechanisms that hide the source-one stemming from the source's actions, the other from the network structure itself. This reveals that sources can easily escape detection, and that removing links is far more effective than introducing fake nodes. Thus, efforts should focus on exposing concealed ties rather than planted entities; such exposure would drastically improve our chances of detecting the diffusion source.
△ Less
Submitted 11 November, 2021; v1 submitted 21 February, 2021;
originally announced February 2021.
-
Autopoietic influence hierarchies in pancreatic $β$-cells
Authors:
Dean Korošak,
Marko Jusup,
Boris Podobnik,
Andraž Stožer,
Jurij Dolenšek,
Petter Holme,
Marjan Slak Rupnik
Abstract:
$β…
▽ More
$β$-cells are biologically essential for humans and other vertebrates. Because their functionality arises from cell-cell interactions, they are also a model system for collective organization among cells. There are currently two contradictory pictures of this organization: the hub-cell idea pointing at leaders who coordinate the others, and the electrophysiological theory describing all cells as equal. We use new data and computational modeling to reconcile these pictures. We find via a network representation of interacting $β$-cells that leaders emerge naturally (confirming the hub-cell idea), yet all cells can take the hub role following a perturbation (in line with electrophysiology). A useful network representation of complex systems is via pairwise cross-correlations between a system's constituents. Recently, attempts have been made at representing pancreatic $β$-cells collectives as networks, giving birth to the concept of hub cells, which contradicts established electrophysiological theory. Here, we reconcile the hub-cell idea with electrophysiology using empirical and computational methods. While the former reveals the functional importance of hubs, the latter show that hubs are an emergent property of communication among identical peers. Thus, individual cells are perfectly capable of playing the hub role, but in line with electrophysiology, they do not have to be genetically predisposed to do so. This points to an ultra-robust architecture of $β$-cell collectives and underpins some of their vital features.
△ Less
Submitted 6 January, 2021;
originally announced January 2021.
-
Concurrency measures in the era of temporal network epidemiology: A review
Authors:
Naoki Masuda,
Joel C. Miller,
Petter Holme
Abstract:
Diseases spread over temporal networks of interaction events between individuals. Structures of these temporal networks hold the keys to understanding epidemic propagation. One early concept of the literature to aid in discussing these structures is concurrency -- quantifying individuals' tendency to form time-overlapping "partnerships". Although conflicting evaluations and an overabundance of ope…
▽ More
Diseases spread over temporal networks of interaction events between individuals. Structures of these temporal networks hold the keys to understanding epidemic propagation. One early concept of the literature to aid in discussing these structures is concurrency -- quantifying individuals' tendency to form time-overlapping "partnerships". Although conflicting evaluations and an overabundance of operational definitions have marred the history of concurrency, it remains important, especially in the area of sexually transmitted infections. Today, much of theoretical epidemiology uses more direct models of contact patterns, and there is an emerging body of literature trying to connect methods to the concurrency literature. In this review, we will cover the development of the concept of concurrency and these new approaches.
△ Less
Submitted 3 June, 2021; v1 submitted 24 December, 2020;
originally announced December 2020.
-
Building surrogate temporal network data from observed backbones
Authors:
Charley Presigny,
Petter Holme,
Alain Barrat
Abstract:
In many data sets, crucial elements co-exist with non-essential ones and noise. For data represented as networks in particular, several methods have been proposed to extract a "network backbone", i.e., the set of most important links. However, the question of how the resulting compressed views of the data can effectively be used has not been tackled. Here we address this issue by putting forward a…
▽ More
In many data sets, crucial elements co-exist with non-essential ones and noise. For data represented as networks in particular, several methods have been proposed to extract a "network backbone", i.e., the set of most important links. However, the question of how the resulting compressed views of the data can effectively be used has not been tackled. Here we address this issue by putting forward and exploring several systematic procedures to build surrogate data from various kinds of temporal network backbones. In particular, we explore how much information about the original data need to be retained alongside the backbone so that the surrogate data can be used in data-driven numerical simulations of spreading processes. We illustrate our results using empirical temporal networks with a broad variety of structures and properties.
△ Less
Submitted 6 December, 2020;
originally announced December 2020.
-
Weighted network motifs as random walk patterns
Authors:
Francesco Picciolo,
Franco Ruzzenenti,
Petter Holme,
Rossana Mastrandrea
Abstract:
Over the last two decades, network theory has shown to be a fruitful paradigm in understanding the organization and functioning of real-world complex systems. One technique helpful to this endeavor is identifying functionally influential subgraphs, shedding light on underlying evolutionary processes. Such overrepresented subgraphs, "motifs", have received much attention in simple networks, where e…
▽ More
Over the last two decades, network theory has shown to be a fruitful paradigm in understanding the organization and functioning of real-world complex systems. One technique helpful to this endeavor is identifying functionally influential subgraphs, shedding light on underlying evolutionary processes. Such overrepresented subgraphs, "motifs", have received much attention in simple networks, where edges are either on or off. However, for weighted networks, motif analysis is still undeveloped. Here, we proposed a novel methodology - based on a random walker taking a fixed maximum number of steps - to study weighted motifs of limited size. We introduce a sink node to balance the network and allow the detection of configurations within an a priori fixed number of steps for the random walker. We applied this approach to different real networks and selected a specific benchmark model based on maximum entropy to test the significance of weighted motifs occurrence. We found that identified similarities enable the classifications of systems according to functioning mechanisms associated with specific configurations: economic networks exhibit close patterns while differentiating from ecological systems without any a priori assumption.
△ Less
Submitted 21 January, 2022; v1 submitted 2 December, 2020;
originally announced December 2020.
-
Exit rights open complex pathways to cooperation
Authors:
Chen Shen,
Marko Jusup,
Lei Shi,
Zhen Wang,
Matjaz Perc,
Petter Holme
Abstract:
We study the evolutionary dynamics of the prisoner's dilemma game in which cooperators and defectors interact with another actor type called exiters. Rather than being exploited by defectors, exiters exit the game in favour of a small payoff. We find that this simple extension of the game allows cooperation to flourish in well-mixed populations when iterations or reputation are added. In networked…
▽ More
We study the evolutionary dynamics of the prisoner's dilemma game in which cooperators and defectors interact with another actor type called exiters. Rather than being exploited by defectors, exiters exit the game in favour of a small payoff. We find that this simple extension of the game allows cooperation to flourish in well-mixed populations when iterations or reputation are added. In networked populations, however, the exit option is less conducive to cooperation. Instead, it enables the coexistence of cooperators, defectors, and exiters through cyclic dominance. Other outcomes are also possible as the exit payoff increases or the network structure changes, including network-wide oscillations in actor abundances that may cause the extinction of exiters and the domination of defectors, although game parameters should favour exiting. The complex dynamics that emerges in the wake of a simple option to exit the game implies that nuances matter even if our analyses are restricted to incentives for rational behaviour.
△ Less
Submitted 6 December, 2020; v1 submitted 30 September, 2020;
originally announced September 2020.
-
Flexible imitation suppresses epidemics through better vaccination
Authors:
Soya Miyoshi,
Marko Jusup,
Petter Holme
Abstract:
The decision of whether or not to vaccinate is a complex one. It involves the contribution both to a social good -- herd immunity -- and to one's own well being. It is informed by social influence, personal experience, education, and mass media. In our work, we investigate a situation in which individuals make their choice based on how social neighbourhood responded to previous epidemics. We do th…
▽ More
The decision of whether or not to vaccinate is a complex one. It involves the contribution both to a social good -- herd immunity -- and to one's own well being. It is informed by social influence, personal experience, education, and mass media. In our work, we investigate a situation in which individuals make their choice based on how social neighbourhood responded to previous epidemics. We do this by proposing a minimalistic model using components from game theory, network theory and the modelling of epidemic spreading, and opinion dynamics. Individuals can use the information about the neighbourhood in two ways -- either they follow the majority or the best-performing neighbour. Furthermore, we let individuals learn which of these two decision-making strategies to follow from their experience. Our results show that the flexibility of individuals to chose how to integrate information from the neighbourhood increases the vaccine uptake and decreases the epidemic severity if the following conditions are fulfilled. First, the initial fraction of individuals who imitate the neighbourhood majority should be limited, and second, the memory of previous outbreaks should be sufficiently long. These results have implications for the acceptance of novel vaccines and raising awareness about vaccination, while also pointing to promising future research directions.
△ Less
Submitted 12 October, 2020; v1 submitted 1 September, 2020;
originally announced September 2020.
-
Fast and principled simulations of the SIR model on temporal networks
Authors:
Petter Holme
Abstract:
The Susceptible-Infectious-Recovered (SIR) model is the canonical model of epidemics of infections that make people immune upon recovery. Many of the open questions in computational epidemiology concern the underlying contact structure's impact on models like the SIR model. Temporal networks constitute a theoretical framework capable of encoding structures both in the networks of who could infect…
▽ More
The Susceptible-Infectious-Recovered (SIR) model is the canonical model of epidemics of infections that make people immune upon recovery. Many of the open questions in computational epidemiology concern the underlying contact structure's impact on models like the SIR model. Temporal networks constitute a theoretical framework capable of encoding structures both in the networks of who could infect whom and when these contacts happen. In this article, we discuss the detailed assumptions behind such simulations -- how to make them comparable with analytically tractable formulations of the SIR model, and at the same time, as realistic as possible. We also present a highly optimized, open-source code for this purpose and discuss all steps needed to make the program as fast as possible.
△ Less
Submitted 2 October, 2020; v1 submitted 28 July, 2020;
originally announced July 2020.
-
SI-spreading-based network embedding in static and temporal networks
Authors:
Xiu-Xiu Zhan,
Ziyu Li,
Naoki Masuda,
Petter Holme,
Huijuan Wang
Abstract:
Link prediction can be used to extract missing information, identify spurious interactions as well as forecast network evolution. Network embedding is a methodology to assign coordinates to nodes in a low dimensional vector space. By embedding nodes into vectors, the link prediction problem can be converted into a similarity comparison task. Nodes with similar embedding vectors are more likely to…
▽ More
Link prediction can be used to extract missing information, identify spurious interactions as well as forecast network evolution. Network embedding is a methodology to assign coordinates to nodes in a low dimensional vector space. By embedding nodes into vectors, the link prediction problem can be converted into a similarity comparison task. Nodes with similar embedding vectors are more likely to be connected. Classic network embedding algorithms are random-walk-based. They sample trajectory paths via random walks and generate node pairs from the trajectory paths. The node pair set is further used as the input for a Skip-Gram model, a representative language model that embeds nodes (which are regarded as words) into vectors. In the present study, we propose to replace random walk processes by a spreading process, namely the susceptible-infected (SI) model, to sample paths. Specifically, we propose two SI-spreading-based algorithms, SINE and TSINE, to embed static and temporal networks, respectively. The performance of our algorithms is evaluated by the missing link prediction task in comparison with state-of-the-art static and temporal network embedding algorithms. Results show that SINE and TSINE outperform the baselines across all six empirical datasets. We further find that the performance of SINE is mostly better than TSINE, suggesting that temporal information does not necessarily improve the embedding for missing link prediction. Moreover, we study the effect of the sampling size, quantified as the total length of the trajectory paths, on the performance of the embedding algorithms. The better performance of SINE and TSINE requires a smaller sampling size in comparison with the baseline algorithms. Hence, SI-spreading-based embedding tends to be more applicable to large-scale networks.
△ Less
Submitted 14 April, 2020;
originally announced April 2020.
-
The free and freer XY models
Authors:
Petter Holme,
Yérali Gandica
Abstract:
We study two versions of the XY model where the spins but also the interaction topology is allowed to change. In the free XY model, the number of links is fixed, but their positions in the network are not. We also study a more relaxed version where even the number of links is allowed to vary, we call it the freer XY model. When the interaction networks are dense enough, both models have phase tran…
▽ More
We study two versions of the XY model where the spins but also the interaction topology is allowed to change. In the free XY model, the number of links is fixed, but their positions in the network are not. We also study a more relaxed version where even the number of links is allowed to vary, we call it the freer XY model. When the interaction networks are dense enough, both models have phase transitions visible both in spin configurations and the network structure. The low-temperature phase in the free XY model, is characterized by tightly connected clusters of spins pointing in the same direction, and isolated spins disconnected from the rest. For the freer XY model the low-temperature phase is almost completely connected. In both models, exponents describing the magnetic ordering are mostly consistent with values of the mean-field theory of the standard XY model.
△ Less
Submitted 2 January, 2020;
originally announced January 2020.
-
Small inter-event times govern epidemic spreading on temporal networks
Authors:
Naoki Masuda,
Petter Holme
Abstract:
Just like the degrees of human and animal interaction networks, the distribution of the times between interactions is known to often be right-skewed and fat-tailed. Both these distributions affect epidemic dynamics strongly, but, as we show in this Letter, for very different reasons. Whereas the high degrees of the tail are critical for facilitating epidemics, it is the small interevent times that…
▽ More
Just like the degrees of human and animal interaction networks, the distribution of the times between interactions is known to often be right-skewed and fat-tailed. Both these distributions affect epidemic dynamics strongly, but, as we show in this Letter, for very different reasons. Whereas the high degrees of the tail are critical for facilitating epidemics, it is the small interevent times that control the dynamics of epidemics. We investigate this effect both analytically and numerically for different versions of the Susceptible-Infected-Recovered model on different types of networks.
△ Less
Submitted 9 April, 2020; v1 submitted 10 November, 2019;
originally announced November 2019.
-
Beyond the Coverage of Information Spreading: Analytical and Empirical Evidence of Re-exposure in Large-scale Online Social Networks
Authors:
Xin Lu,
Shuo Qin,
Petter Holme,
Fanhui Meng,
Yanqing Hu,
Fredrik Liljeros,
Gad Allon
Abstract:
Peer influence and social contagion are key denominators in the adoption and participation of information spreading, such as news propagation, word-of-mouth or viral marketing. In this study, we argue that it is biased to only focus on the scale and coverage of information spreading, and propose that the level of influence reinforcement, quantified by the re-exposure rate, i.e., the rate of indivi…
▽ More
Peer influence and social contagion are key denominators in the adoption and participation of information spreading, such as news propagation, word-of-mouth or viral marketing. In this study, we argue that it is biased to only focus on the scale and coverage of information spreading, and propose that the level of influence reinforcement, quantified by the re-exposure rate, i.e., the rate of individuals who are repeatedly exposed to the same information, should be considered together to measure the effectiveness of spreading. We show that local network structural characteristics significantly affects the probability of being exposed or re-exposed to the same information. After analyzing trending news on the super large-scale online network of Sina Weibo (China's Twitter) with 430 million connected users, we find a class of users with extremely low exposure rate, even they are following tens of thousands of others; and the re-exposure rate is substantially higher for news with more transmission waves and stronger secondary forwarding. While exposure and re-exposure rate typically grow together with the scale of spreading, we find exceptional cases where it is possible to achieve a high exposure rate while maintaining low re-exposure rate, or vice versa.
△ Less
Submitted 25 July, 2019;
originally announced July 2019.
-
Periodicity in Movement Patterns Shapes Epidemic Risk in Urban Environments
Authors:
Zhanwei Du,
Spencer J Fox,
Petter Holme,
Jiming Liu,
Alison P. Galvani,
Lauren Ancel Meyers
Abstract:
Daily variation in human mobility modulates the speed and severity of emerging outbreaks, yet most epidemiological studies assume static contact patterns. With a highly mobile population exceeding 24 million people, Shanghai, China is a transportation hub at high risk for the importation and subsequent global propagation of infectious diseases. Here, we use a dynamic metapopulation model informed…
▽ More
Daily variation in human mobility modulates the speed and severity of emerging outbreaks, yet most epidemiological studies assume static contact patterns. With a highly mobile population exceeding 24 million people, Shanghai, China is a transportation hub at high risk for the importation and subsequent global propagation of infectious diseases. Here, we use a dynamic metapopulation model informed by hourly transit data for Shanghai to estimate epidemic risks across thousands of outbreak scenarios. We find that the rate of initial epidemic growth varies by more than twenty-fold, depending on the hour and neighborhood of disease introduction. The riskiest introductions are those occurring close to the city center and on Fridays--which bridge weekday and weekend transit patterns and thereby connect otherwise disconnected portions of the population. The identification of these spatio-temporal hotspots can inform more efficient targets for sentinel surveillance and strategies for mitigating transmission.
△ Less
Submitted 13 September, 2018;
originally announced September 2018.
-
Impact of perception models on friendship paradox and opinion formation
Authors:
Eun Lee,
Sungmin Lee,
Young-Ho Eom,
Petter Holme,
Hang-Hyun Jo
Abstract:
Topological heterogeneities of social networks have a strong impact on the individuals embedded in those networks. One of the interesting phenomena driven by such heterogeneities is the friendship paradox (FP), stating that the mean degree of one's neighbors is larger than the degree of oneself. Alternatively, one can use the median degree of neighbors as well as the fraction of neighbors having a…
▽ More
Topological heterogeneities of social networks have a strong impact on the individuals embedded in those networks. One of the interesting phenomena driven by such heterogeneities is the friendship paradox (FP), stating that the mean degree of one's neighbors is larger than the degree of oneself. Alternatively, one can use the median degree of neighbors as well as the fraction of neighbors having a higher degree than oneself. Each of these reflects on how people perceive their neighborhoods, i.e., their perception models, hence how they feel peer pressure. In our paper, we study the impact of perception models on the FP by comparing three versions of the perception model in networks generated with a given degree distribution and a tunable degree-degree correlation or assortativity. The increasing assortativity is expected to decrease network-level peer pressure, while we find a nontrivial behavior only for the mean-based perception model. By simulating opinion formation, in which the opinion adoption probability of an individual is given as a function of individual peer pressure, we find that it takes the longest time to reach consensus when individuals adopt the median-based perception model, compared to other versions. Our findings suggest that one needs to consider the proper perception model for better modeling human behaviors and social dynamics.
△ Less
Submitted 10 May, 2019; v1 submitted 13 August, 2018;
originally announced August 2018.
-
Urban contact structures for epidemic simulations: Correcting biases in data-driven approaches
Authors:
Zhanwei Du,
Chao Gao,
Yuan Bai,
Yongjian Yang,
Petter Holme
Abstract:
Epidemics are emergent phenomena depending on the epidemiological characteristics of pathogens and the interaction and movement of people. Public transit systems have provided much important information about the movement of people, but there are also other means of transportation (e.g., bicycle and private car), that are invisible to public transit data. This discrepancy can induce a bias in dise…
▽ More
Epidemics are emergent phenomena depending on the epidemiological characteristics of pathogens and the interaction and movement of people. Public transit systems have provided much important information about the movement of people, but there are also other means of transportation (e.g., bicycle and private car), that are invisible to public transit data. This discrepancy can induce a bias in disease models that leads to mispredictions of epidemic growth (e.g., peak prevalence and time). In our study, we aim to advance and compare the epidemic spreading dynamics using public transit trips, in contrast to more accurate estimates of population movement using mobile phones traces. In our study, we simulate epidemic outbreaks in a cohort of two million mobile phone users. We use a metapopulation model incorporating susceptible-infected-recovered dynamics to analyze and compare different effective contract matrices, constructed by the public transit systems and mobile phones respectively, on the process of epidemics. We find that epidemic outbreaks using public transit trips tend to be underestimated in terms of the epidemic spreading dynamics, reaching epidemic peaks weaker and later. This is rooted in a later introduction of new infectious people into uninfected locations.
△ Less
Submitted 21 September, 2018; v1 submitted 27 April, 2018;
originally announced April 2018.
-
Objective measures for sentinel surveillance in network epidemiology
Authors:
Petter Holme
Abstract:
Assume one has the capability of determining whether a node in a network is infectious or not by probing them. Then problem of optimizing sentinel surveillance in networks is to identify the nodes to probe such that an emerging disease outbreak can be discovered early or reliably. Whether the emphasis should be on early or reliable detection depends on the scenario in question. We investigate thre…
▽ More
Assume one has the capability of determining whether a node in a network is infectious or not by probing them. Then problem of optimizing sentinel surveillance in networks is to identify the nodes to probe such that an emerging disease outbreak can be discovered early or reliably. Whether the emphasis should be on early or reliable detection depends on the scenario in question. We investigate three objective measures from the literature quantifying the performance of nodes in sentinel surveillance -- the time to detection or extinction, the time to detection, and the frequency of detection. As a basis for the comparison, we use the susceptible-infectious-recovered model on static and temporal networks of human contacts. We show that, for some regions of parameter space, the three objective measures can rank the nodes very differently. This means sentinel surveillance is a class of problems, and solutions need to chose an objective measure for the particular scenario in question. As opposed to other problems in network epidemiology, we draw similar conclusions from the static and temporal networks. Furthermore, we do not find one type of network structure that predicts the objective measures -- that depends both on the data set and the SIR parameter values.
△ Less
Submitted 23 May, 2018; v1 submitted 28 March, 2018;
originally announced March 2018.
-
Detecting sequences of system states in temporal networks
Authors:
Naoki Masuda,
Petter Holme
Abstract:
Many time-evolving systems in nature, society and technology leave traces of the interactions within them. These interactions form temporal networks that reflect the states of the systems. In this work, we pursue a coarse-grained description of these systems by proposing a method to assign discrete states to the systems and inferring the sequence of such states from the data. Such states could, fo…
▽ More
Many time-evolving systems in nature, society and technology leave traces of the interactions within them. These interactions form temporal networks that reflect the states of the systems. In this work, we pursue a coarse-grained description of these systems by proposing a method to assign discrete states to the systems and inferring the sequence of such states from the data. Such states could, for example, correspond to a mental state (as inferred from neuroimaging data) or the operational state of an organization (as inferred by interpersonal communication). Our method combines a graph distance measure and hierarchical clustering. Using several empirical data sets of social temporal networks, we show that our method is capable of inferring the system's states such as distinct activities in a school and a weekday state as opposed to a weekend state. We expect the methods to be equally useful in other settings such as temporally varying protein interactions, ecological interspecific interactions, functional connectivity in the brain and adaptive social networks.
△ Less
Submitted 6 February, 2019; v1 submitted 13 March, 2018;
originally announced March 2018.
-
Three faces of node importance in network epidemiology: Exact results for small graphs
Authors:
Petter Holme
Abstract:
We investigate three aspects of the importance of nodes with respect to Susceptible-Infectious-Removed (SIR) disease dynamics: influence maximization (the expected outbreak size given a set of seed nodes), the effect of vaccination (how much deleting nodes would reduce the expected outbreak size) and sentinel surveillance (how early an outbreak could be detected with sensors at a set of nodes). We…
▽ More
We investigate three aspects of the importance of nodes with respect to Susceptible-Infectious-Removed (SIR) disease dynamics: influence maximization (the expected outbreak size given a set of seed nodes), the effect of vaccination (how much deleting nodes would reduce the expected outbreak size) and sentinel surveillance (how early an outbreak could be detected with sensors at a set of nodes). We calculate the exact expressions of these quantities, as functions of the SIR parameters, for all connected graphs of three to seven nodes. We obtain the smallest graphs where the optimal node sets are not overlapping. We find that: node separation is more important than centrality for more than one active node, that vaccination and influence maximization are the most different aspects of importance, and that the three aspects are more similar when the infection rate is low.
△ Less
Submitted 14 October, 2017; v1 submitted 21 August, 2017;
originally announced August 2017.
-
Sampling of Temporal Networks: Methods and Biases
Authors:
Luis E C Rocha,
Naoki Masuda,
Petter Holme
Abstract:
Temporal networks have been increasingly used to model a diversity of systems that evolve in time; for example human contact structures over which dynamic processes such as epidemics take place. A fundamental aspect of real-life networks is that they are sampled within temporal and spatial frames. Furthermore, one might wish to subsample networks to reduce their size for better visualization or to…
▽ More
Temporal networks have been increasingly used to model a diversity of systems that evolve in time; for example human contact structures over which dynamic processes such as epidemics take place. A fundamental aspect of real-life networks is that they are sampled within temporal and spatial frames. Furthermore, one might wish to subsample networks to reduce their size for better visualization or to perform computationally intensive simulations. The sampling method may affect the network structure and thus caution is necessary to generalize results based on samples. In this paper, we study four sampling strategies applied to a variety of real-life temporal networks. We quantify the biases generated by each sampling strategy on a number of relevant statistics such as link activity, temporal paths and epidemic spread. We find that some biases are common in a variety of networks and statistics, but one strategy, uniform sampling of nodes, shows improved performance in most scenarios. Our results help researchers to better design network data collection protocols and to understand the limitations of sampled temporal network data.
△ Less
Submitted 7 July, 2017;
originally announced July 2017.
-
Probing empirical contact networks by simulation of spreading dynamics
Authors:
Petter Holme
Abstract:
Disease, opinions, ideas, gossip, etc. all spread on social networks. How these networks are connected (the network structure) influences the dynamics of the spreading processes. By investigating these relationships one gains understanding both of the spreading itself and the structure and function of the contact network. In this chapter, we will summarize the recent literature using simulation of…
▽ More
Disease, opinions, ideas, gossip, etc. all spread on social networks. How these networks are connected (the network structure) influences the dynamics of the spreading processes. By investigating these relationships one gains understanding both of the spreading itself and the structure and function of the contact network. In this chapter, we will summarize the recent literature using simulation of spreading processes on top of empirical contact data. We will mostly focus on disease simulations on temporal proximity networks -- networks recording who is close to whom, at what time -- but also cover other types of networks and spreading processes. We analyze 29 empirical networks to illustrate the methods.
△ Less
Submitted 27 June, 2017;
originally announced June 2017.
-
Ranking influential spreaders is an ill-defined problem
Authors:
Jain Gu,
Sungmin Lee,
Jari Saramäki,
Petter Holme
Abstract:
Finding influential spreaders of information and disease in networks is an important theoretical problem, and one of considerable recent interest. It has been almost exclusively formulated as a node-ranking problem -- methods for identifying influential spreaders rank nodes according to how influential they are. In this work, we show that the ranking approach does not necessarily work: the set of…
▽ More
Finding influential spreaders of information and disease in networks is an important theoretical problem, and one of considerable recent interest. It has been almost exclusively formulated as a node-ranking problem -- methods for identifying influential spreaders rank nodes according to how influential they are. In this work, we show that the ranking approach does not necessarily work: the set of most influential nodes depends on the number of nodes in the set. Therefore, the set of $n$ most important nodes to vaccinate does not need to have any node in common with the set of $n+1$ most important nodes. We propose a method for quantifying the extent and impact of this phenomenon, and show that it is common in both empirical and model networks.
△ Less
Submitted 16 March, 2017;
originally announced March 2017.
-
Morphology of travel routes and the organization of cities
Authors:
Minjin Lee,
Hugo Barbosa,
Hyejin Youn,
Petter Holme,
Gourab Ghoshal
Abstract:
The city is a complex system that evolves through its inherent social and economic interactions. Mediating the movements of people and resources, urban street networks offer a spatial footprint of these activities; consequently their structural characteristics have been of great interest in the literature. In comparison, relatively limited attention has been devoted to the interplay between street…
▽ More
The city is a complex system that evolves through its inherent social and economic interactions. Mediating the movements of people and resources, urban street networks offer a spatial footprint of these activities; consequently their structural characteristics have been of great interest in the literature. In comparison, relatively limited attention has been devoted to the interplay between street structure and its functional usage, i.e., the movement patterns of people and resources. To address this, we study the shape of 472,040 spatiotemporally optimized travel routes in the 92 most populated cities in the world. The routes are sampled in a geographically unbiased way such that their properties can be mapped on to each city, with their summary statistics capturing mesoscale connectivity patterns representing the complete space of possible movement in cities. The collective morphology of routes exhibits a directional bias that could be described as influenced by the attractive (or repulsive) forces resulting from congestion, accessibility and travel demand that relate to various socioeconomic factors. To capture this feature, we propose a simple metric, inness, that maps this force field. An analysis of the morphological patterns of individual cities reveals structural and socioeconomic commonalities among cities with similar inness patterns, in particular that they cluster into groups that are correlated with their size and putative stage of urban development as measured by a series of socioeconomic and infrastructural indicators. Our results lend weight to the insight that levels of urban socioeconomic development are intrinsically tied to increasing physical connectivity and diversity of road hierarchies.
△ Less
Submitted 25 September, 2017; v1 submitted 11 January, 2017;
originally announced January 2017.
-
Social contagion with degree-dependent thresholds
Authors:
Eun Lee,
Petter Holme
Abstract:
We investigate opinion spreading by a threshold model in a situation where the influence of people is heterogeneously distributed. We focus on the response of the average opinion as a function between the trend between out-degree (number of neighbors)---effectively the strength of influence of a node---and the threshold for adopting a new product or opinion. We find that if the coupling is very po…
▽ More
We investigate opinion spreading by a threshold model in a situation where the influence of people is heterogeneously distributed. We focus on the response of the average opinion as a function between the trend between out-degree (number of neighbors)---effectively the strength of influence of a node---and the threshold for adopting a new product or opinion. We find that if the coupling is very positive, the final state of the system will be a mix of different opinions otherwise it will it converges to a consensus state. We find that this cannot be simply explained as a phase transition, but emerges from a combination of mechanisms and their relative dominance in different regions of parameter space.
△ Less
Submitted 26 December, 2016;
originally announced December 2016.
-
Cost-efficient vaccination protocols for network epidemiology
Authors:
Petter Holme,
Nelly Litvak
Abstract:
We investigate methods to vaccinate contact networks -- i.e. removing nodes in such a way that disease spreading is hindered as much as possible -- with respect to their cost-efficiency. Any real implementation of such protocols would come with costs related both to the vaccination itself, and gathering of information about the network. Disregarding this, we argue, would lead to erroneous evaluati…
▽ More
We investigate methods to vaccinate contact networks -- i.e. removing nodes in such a way that disease spreading is hindered as much as possible -- with respect to their cost-efficiency. Any real implementation of such protocols would come with costs related both to the vaccination itself, and gathering of information about the network. Disregarding this, we argue, would lead to erroneous evaluation of vaccination protocols. We use the susceptible-infected-recovered model -- the generic model for diseases making patients immune upon recovery -- as our disease-spreading scenario, and analyze outbreaks on both empirical and model networks. For different relative costs, different protocols dominate. For high vaccination costs and low costs of gathering information, the so-called acquaintance vaccination is the most cost efficient. For other parameter values, protocols designed for query-efficient identification of the network's largest degrees are most efficient.
△ Less
Submitted 20 May, 2017; v1 submitted 21 December, 2016;
originally announced December 2016.
-
Solving the Dynamic Correlation Problem of the Susceptible-Infected-Susceptible Model on Networks
Authors:
Chao-Ran Cai,
Zhi-Xi Wu,
Michael Z. Q. Chen,
Petter Holme,
Jian-Yue Guan
Abstract:
The Susceptible-Infected-Susceptible model is a canonical model for emerging disease outbreaks. Such outbreaks are naturally modeled as taking place on networks. A theoretical challenge in network epidemiology is the dynamic correlations coming from that if one node is occupied, or infected (for disease spreading models), then its neighbors are likely to be occupied. By combining two theoretical a…
▽ More
The Susceptible-Infected-Susceptible model is a canonical model for emerging disease outbreaks. Such outbreaks are naturally modeled as taking place on networks. A theoretical challenge in network epidemiology is the dynamic correlations coming from that if one node is occupied, or infected (for disease spreading models), then its neighbors are likely to be occupied. By combining two theoretical approaches---the heterogeneous mean-field theory and the effective degree method---we are able to include these correlations in an analytical solution of the SIS model. We derive accurate expressions for the average prevalence (fraction of infected) and epidemic threshold. We also discuss how to generalize the approach to a larger class of stochastic population models.
△ Less
Submitted 28 June, 2016; v1 submitted 7 June, 2016;
originally announced June 2016.
-
Temporal network structures controlling disease spreading
Authors:
Petter Holme
Abstract:
We investigate disease spreading on eight empirical data sets of human contacts (mostly proximity networks recording who is close to whom, at what time). We compare three levels of representations of these data sets: temporal networks, static networks and a fully connected topology. We notice that the difference between the static and fully-connected networks -- with respect to time to extinction…
▽ More
We investigate disease spreading on eight empirical data sets of human contacts (mostly proximity networks recording who is close to whom, at what time). We compare three levels of representations of these data sets: temporal networks, static networks and a fully connected topology. We notice that the difference between the static and fully-connected networks -- with respect to time to extinction and average outbreak size -- is smaller than between the temporal and static topologies. This suggests that, for these data sets, temporal structures influence disease spreading more than static network structures. To explain the details in the differences between the representations, we use 32 network measures. This study concur that long-time temporal structures, like the turnover of nodes and links, are the most important for the spreading dynamics.
△ Less
Submitted 3 May, 2016;
originally announced May 2016.
-
Collective decision making with a mix of majority and minority seekers
Authors:
Petter Holme,
Hang-Hyun Jo
Abstract:
We study a model of a population making a binary decision based on information spreading within the population, which is fully connected or covering a square grid. We assume that a fraction of the population wants to make the choice of the majority, while the rest want to make the minority choice. This resembles opinion spreading with "contrarian" agents, but has the game theoretic aspect that age…
▽ More
We study a model of a population making a binary decision based on information spreading within the population, which is fully connected or covering a square grid. We assume that a fraction of the population wants to make the choice of the majority, while the rest want to make the minority choice. This resembles opinion spreading with "contrarian" agents, but has the game theoretic aspect that agents try to optimize their own situation in ways that are incompatible with the common good. When this fraction is less than 1/2, the population can efficiently self-organize to a state where agents get what they want -- the majority (i.e. the majority seekers) have one opinion, the minority seekers have the other. If the fraction is larger than 1/2, there is a frustration in the population that dramatically changes the dynamics. In this region, the population converges, through some distinct phases, to a state of approximately equal-sized opinions. Just over the threshold the state of the population is furthest from the collectively optimal solution.
△ Less
Submitted 11 May, 2016; v1 submitted 25 March, 2016;
originally announced March 2016.
-
Modeling the dynamics of dissent
Authors:
Eun Lee,
Petter Holme,
Sang Hoon Lee
Abstract:
We investigate the formation of opinion against authority in an authoritarian society composed of agents with different levels of authority. We explore a "dissenting" opinion, held by lower-ranking, obedient, or less authoritative people, spreading in an environment of an "affirmative" opinion held by authoritative leaders. A real-world example would be a corrupt society where people revolt agains…
▽ More
We investigate the formation of opinion against authority in an authoritarian society composed of agents with different levels of authority. We explore a "dissenting" opinion, held by lower-ranking, obedient, or less authoritative people, spreading in an environment of an "affirmative" opinion held by authoritative leaders. A real-world example would be a corrupt society where people revolt against such leaders, but it can be applied to more general situations. In our model, agents can change their opinion depending on their authority relative to their neighbors and their own confidence level. In addition, with a certain probability, agents can override the affirmative opinion to take the dissenting opinion of a neighbor. Based on analytic derivation and numerical simulations, we observe that both the network structure and heterogeneity in authority, and their correlation, significantly affect the possibility of the dissenting opinion to spread through the population. In particular, the dissenting opinion is suppressed when the authority distribution is very heterogeneous and there exists a positive correlation between the authority and the number of neighbors of people (degree). Except for such an extreme case, though, spreading of the dissenting opinion takes place when people have the tendency to override the authority to hold the dissenting opinion, but the dissenting opinion can take a long time to spread to the entire society, depending on the model parameters. We argue that the internal social structure of agents sets the scale of the time to reach consensus, based on the analysis of the underlying structural properties of opinion spreading.
△ Less
Submitted 9 April, 2018; v1 submitted 7 March, 2016;
originally announced March 2016.
-
Building blocks of the basin stability of power grids
Authors:
Heetae Kim,
Sang Hoon Lee,
Petter Holme
Abstract:
Given a power grid and a transmission (coupling) strength, basin stability is a measure of synchronization stability for individual nodes. Earlier studies have focused on the basin stability's dependence of the position of the nodes in the network for single values of transmission strength. Basin stability grows from zero to one as transmission strength increases, but often in a complex, nonmonoto…
▽ More
Given a power grid and a transmission (coupling) strength, basin stability is a measure of synchronization stability for individual nodes. Earlier studies have focused on the basin stability's dependence of the position of the nodes in the network for single values of transmission strength. Basin stability grows from zero to one as transmission strength increases, but often in a complex, nonmonotonous way. In this study, we investigate the entire functional form of the basin stability's dependence on transmission strength. To be able to perform a systematic analysis, we restrict ourselves to small networks. We scan all isomorphically distinct networks with an equal number of power producers and consumers of six nodes or less. We find that the shapes of the basin stability fall into a few, rather well-defined classes, that could be characterized by the number of edges and the betweenness of the nodes, whereas other network positional quantities matter less.
△ Less
Submitted 30 June, 2016; v1 submitted 4 February, 2016;
originally announced February 2016.
-
Impact of mobility structure on the optimization of small-world networks of mobile agents
Authors:
Eun Lee,
Petter Holme
Abstract:
In ad hoc wireless networking, units are connected to each other rather than to a central, fixed, infrastructure. Constructing and maintaining such networks create several trade-off problems between robustness, communication speed, power consumption, etc., that bridges engineering, computer science and the physics of complex systems. In this work, we address the role of mobility patterns of the ag…
▽ More
In ad hoc wireless networking, units are connected to each other rather than to a central, fixed, infrastructure. Constructing and maintaining such networks create several trade-off problems between robustness, communication speed, power consumption, etc., that bridges engineering, computer science and the physics of complex systems. In this work, we address the role of mobility patterns of the agents on the optimal tuning of a small-world type network construction method. By this method, the network is updated periodically and held static between the updates. We investigate the optimal updating times for different scenarios of the movement of agents (modeling, for example, the fat-tailed trip distances, and periodicities, of human travel). We find that these mobility patterns affect the power consumption in non-trivial ways and discuss how these effects can best be handled.
△ Less
Submitted 5 February, 2016; v1 submitted 1 September, 2015;
originally announced September 2015.
-
Modern temporal network theory: A colloquium
Authors:
Petter Holme
Abstract:
The power of any kind of network approach lies in the ability to simplify a complex system so that one can better understand its function as a whole. Sometimes it is beneficial, however, to include more information than in a simple graph of only nodes and links. Adding information about times of interactions can make predictions and mechanistic understanding more accurate. The drawback, however, i…
▽ More
The power of any kind of network approach lies in the ability to simplify a complex system so that one can better understand its function as a whole. Sometimes it is beneficial, however, to include more information than in a simple graph of only nodes and links. Adding information about times of interactions can make predictions and mechanistic understanding more accurate. The drawback, however, is that there are not so many methods available, partly because temporal networks is a relatively young field, partly because it more difficult to develop such methods compared to for static networks. In this colloquium, we review the methods to analyze and model temporal networks and processes taking place on them, focusing mainly on the last three years. This includes the spreading of infectious disease, opinions, rumors, in social networks; information packets in computer networks; various types of signaling in biology, and more. We also discuss future directions.
△ Less
Submitted 31 August, 2015; v1 submitted 6 August, 2015;
originally announced August 2015.