Publications by authors named "Boleslaw K Szymanski"

To better understand the temporal characteristics and the lifetime of fluctuations in stochastic processes in networks, we investigated diffusive persistence in various graphs. Global diffusive persistence is defined as the fraction of nodes for which the diffusive field at a site (or node) has not changed sign up to time t (or, in general, that the node remained active or inactive in discrete models). Here we investigate disordered and random networks and show that the behavior of the persistence depends on the topology of the network.

View Article and Find Full Text PDF

Clustering molecular data into informative groups is a primary step in extracting robust conclusions from big data. However, due to foundational issues in how they are defined and detected, such clusters are not always reliable, leading to unstable conclusions. We compare popular clustering algorithms across thousands of synthetic and real biological datasets, including a new consensus clustering algorithm-SpeakEasy2: Champagne.

View Article and Find Full Text PDF

Most of studied social interactions arise from dyadic relations. An exception is Heider Balance Theory that postulates the existence of triad dynamics, which however has been elusive to observe. Here, we discover a sufficient condition for the Heider dynamics observability: assigning the edge signs according to multiple opinions of connected agents.

View Article and Find Full Text PDF

Mapping network nodes and edges to communities and network functions is crucial to gaining a higher level of understanding of the network structure and functions. Such mappings are particularly challenging to design for covert social networks, which intentionally hide their structure and functions to protect important members from attacks or arrests. Here, we focus on correctly inferring the structures and functions of such networks, but our methodology can be broadly applied.

View Article and Find Full Text PDF

Social media has been transforming political communication dynamics for over a decade. Here using nearly a billion tweets, we analyse the change in Twitter's news media landscape between the 2016 and 2020 US presidential elections. Using political bias and fact-checking tools, we measure the volume of politically biased content and the number of users propagating such information.

View Article and Find Full Text PDF

The emergence of streaming services, e.g., Spotify, has changed the way people listen to music and the way professional musicians achieve fame and success.

View Article and Find Full Text PDF

This work develops the concept of the temporal network epistemology model enabling the simulation of the learning process in dynamic networks. The results of the research, conducted on the temporal social network generated using the CogSNet model and on the static topologies as a reference, indicate a significant influence of the network temporal dynamics on the outcome and flow of the learning process. It has been shown that not only the dynamics of reaching consensus is different compared to baseline models but also that previously unobserved phenomena appear, such as uninformed agents or different consensus states for disconnected components.

View Article and Find Full Text PDF

We study how public transportation data can inform the modeling of the spread of infectious diseases based on SIR dynamics. We present a model where public transportation data is used as an indicator of broader mobility patterns within a city, including the use of private transportation, walking etc. The mobility parameter derived from this data is used to model the infection rate.

View Article and Find Full Text PDF

In recent years, research on methods for locating a source of spreading phenomena in complex networks has seen numerous advances. Such methods can be applied not only to searching for the "patient zero" in epidemics, but also finding the true sources of false or malicious messages circulating in the online social networks. Many methods for solving this problem have been established and tested in various circumstances.

View Article and Find Full Text PDF

We focus on organizational structures in covert networks, such as criminal or terrorist networks. Their members engage in illegal activities and attempt to hide their association and interactions with these networks. Hence, data about such networks are incomplete.

View Article and Find Full Text PDF

Online social media provides massive open-ended platforms for users of a wide variety of backgrounds, interests, and beliefs to interact and debate, facilitating countless discussions across a myriad of subjects. With numerous unique voices being lent to the ever-growing information stream, it is essential to consider how the types of conversations that result from a social media post represent the post itself. We hypothesize that the biases and predispositions of users cause them to react to different topics in different ways not necessarily entirely intended by the sender.

View Article and Find Full Text PDF

Research has documented increasing partisan division and extremist positions that are more pronounced among political elites than among voters. Attention has now begun to focus on how polarization might be attenuated. We use a general model of opinion change to see if the self-reinforcing dynamics of influence and homophily may be characterized by tipping points that make reversibility problematic.

View Article and Find Full Text PDF

Many critical complex systems and networks are continuously monitored, creating vast volumes of data describing their dynamics. To understand and optimize their performance, we need to discover and formalize their dynamics to enable their control. Here, we introduce a multidisciplinary framework using network science and control theory to accomplish these goals.

View Article and Find Full Text PDF

Understanding why people join, stay, or leave social groups is a central question in the social sciences, including computational social systems, while modeling these processes is a challenge in complex networks. Yet, the current empirical studies rarely focus on group dynamics for lack of data relating opinions to group membership. In the NetSense data, we find hundreds of face-to-face groups whose members make thousands of changes of memberships and opinions.

View Article and Find Full Text PDF

Milgram empirically showed that people knowing only connections to their friends could locate any person in the U.S. in a few steps.

View Article and Find Full Text PDF

Data-driven risk networks describe many complex system dynamics arising in fields such as epidemiology and ecology. They lack explicit dynamics and have multiple sources of cost, both of which are beyond the current scope of traditional control theory. We construct the global economy risk network by combining the consensus of experts from the World Economic Forum with risk activation data to define its topology and interactions.

View Article and Find Full Text PDF

Increasing evidence demonstrates that in many places language coexistence has become ubiquitous and essential for supporting language and cultural diversity and associated with its financial and economic benefits. The competitive evolution among multiple languages determines the evolution outcome, either coexistence, or decline, or extinction. Here, we extend the Abrams-Strogatz model of language competition to multiple languages and then validate it by analyzing the behavioral transitions of language usage over the recent several decades in Singapore and Hong Kong.

View Article and Find Full Text PDF

The stochastic block model is able to generate random graphs with different types of network partitions, ranging from the traditional assortative structures to the disassortative structures. Since the stochastic block model does not specify which mixing pattern is desired, the inference algorithms discover the locally most likely nodes' partition, regardless of its type. Here we introduce a new model constraining nodes' internal degree ratios in the objective function to guide the inference algorithms to converge to the desired type of structure in the observed network data.

View Article and Find Full Text PDF

The polarization of political opinions among members of the US legislative chambers measured by their voting records is greater today than it was 30 years ago. Previous research efforts to find causes of such increase have suggested diverse contributors, like growth of online media, echo chamber effects, media biases or disinformation propagation. Yet, we lack theoretic tools to understand, quantify and predict the emergence of high political polarization among voters and their legislators.

View Article and Find Full Text PDF

Understanding criminal activities, their structure and dynamics are fundamental for designing tools for crime prediction that can also guide crime prevention. Here, we study crimes committed in city community areas based on police crime reports and demographic data for the City of Chicago collected over 16 consecutive years. Our goal is to understand how the network of city community areas shapes dynamics of criminal offenses and demographic characteristics of their inhabitants.

View Article and Find Full Text PDF

Human communication is commonly represented as a temporal social network, and evaluated in terms of its uniqueness. We propose a set of new entropy-based measures for human communication dynamics represented within the temporal social network as event sequences. Using real world datasets and random interaction series of different types we find that real human contact events always significantly differ from random ones.

View Article and Find Full Text PDF

We consider here information spread which propagates with certain probability from nodes just activated to their not yet activated neighbors. Diffusion cascades can be triggered by activation of even a small set of nodes. Such activation is commonly performed in a single stage.

View Article and Find Full Text PDF

Spread over complex networks is a ubiquitous process with increasingly wide applications. Locating spread sources is often important, e.g.

View Article and Find Full Text PDF

A correction to this article has been published and is linked from the HTML version of this paper. The error has not been fixed in the paper.

View Article and Find Full Text PDF