Recent advances in machine learning research have produced powerful neural graph embedding methods, which learn useful, low-dimensional vector representations of network data. These neural methods for graph embedding excel in graph machine learning tasks and are now widely adopted. However, how and why these methods work-particularly how network structure gets encoded in the embedding-remain largely unexplained.
View Article and Find Full Text PDFWe propose a bond-percolation model intended to describe the consumption, and eventual exhaustion, of resources in transport networks. Edges forming minimum-length paths connecting demanded origin-destination nodes are removed if below a certain budget. As pairs of nodes are demanded and edges are removed, the macroscopic connected component of the graph disappears, i.
View Article and Find Full Text PDFEngineering multilayer networks that efficiently connect sets of points in space is a crucial task in all practical applications that concern the transport of people or the delivery of goods. Unfortunately, our current theoretical understanding of the shape of such optimal transport networks is quite limited. Not much is known about how the topology of the optimal network changes as a function of its size, the relative efficiency of its layers, and the cost of switching between layers.
View Article and Find Full Text PDFMultiplex networks are collections of networks with identical nodes but distinct layers of edges. They are genuine representations of a large variety of real systems whose elements interact in multiple fashions or flavors. However, multiplex networks are not always simple to observe in the real world; often, only partial information on the layer structure of the networks is available, whereas the remaining information is in the form of aggregated, single-layer networks.
View Article and Find Full Text PDFEstimating the influence that individual nodes have on one another in a Boolean network is essential to predict and control the system's dynamical behaviour, for example, detecting key therapeutic targets to control pathways in models of biological signalling and regulation. Exact estimation is generally not possible due to the fact that the number of configurations that must be considered grows exponentially with the system size. However, approximate, scalable methods exist in the literature.
View Article and Find Full Text PDFMessage passing (MP) is a computational technique used to find approximate solutions to a variety of problems defined on networks. MP approximations are generally accurate in locally treelike networks but require corrections to maintain their accuracy level in networks rich with short cycles. However, MP may already be computationally challenging on very large networks and additional costs incurred by correcting for cycles could be prohibitive.
View Article and Find Full Text PDFThe problem of influence maximization, i.e., finding the set of nodes having maximal influence on a network, is of great importance for several applications.
View Article and Find Full Text PDFA multiplex is a collection of network layers, each representing a specific type of edges. This appears to be a genuine representation of many real-world systems. However, due to a variety of potential factors, such as limited budget and equipment, or physical impossibility, multiplex data can be difficult to observe directly.
View Article and Find Full Text PDFWe investigate the avalanche temporal statistics of the susceptible-infected-susceptible (SIS) model when the dynamics is critical and takes place on finite random networks. By considering numerical simulations on annealed topologies we show that the survival probability always exhibits three distinct dynamical regimes. Size-dependent crossover timescales separating them scale differently for homogeneous and for heterogeneous networks.
View Article and Find Full Text PDFPercolation establishes the connectivity of complex networks and is one of the most fundamental critical phenomena for the study of complex systems. On simple networks, percolation displays a second-order phase transition; on multiplex networks, the percolation transition can become discontinuous. However, little is known about percolation in networks with higher-order interactions.
View Article and Find Full Text PDFWe study influence maximization on temporal networks. This is a special setting where the influence function is not submodular, and there is no optimality guarantee for solutions achieved via greedy optimization. We perform an exhaustive analysis on both real and synthetic networks.
View Article and Find Full Text PDFThe optimization problem aiming at the identification of minimal sets of nodes able to drive the dynamics of Boolean networks toward desired long-term behaviors is central for some applications, as for example the detection of key therapeutic targets to control pathways in models of biological signaling and regulatory networks. Here, we develop a method to solve such an optimization problem taking inspiration from the well-studied problem of influence maximization for spreading processes in social networks. We validate the method on small gene regulatory networks whose dynamical landscapes are known by means of brute-force analysis.
View Article and Find Full Text PDFStatistical laws of information avalanches in social media appear, at least according to existing empirical studies, not robust across systems. As a consequence, radically different processes may represent plausible driving mechanisms for information propagation. Here, we analyze almost one billion time-stamped events collected from several online platforms - including Telegram, Twitter and Weibo - over observation windows longer than ten years, and show that the propagation of information in social media is a universal and critical process.
View Article and Find Full Text PDFNetwork embedding techniques aim to represent structural properties of graphs in geometric space. Those representations are considered useful in downstream tasks such as link prediction and clustering. However, the number of graph embedding methods available on the market is large, and practitioners face the nontrivial choice of selecting the proper approach for a given application.
View Article and Find Full Text PDFNetwork embedding is a general-purpose machine learning technique that encodes network structure in vector spaces with tunable dimension. Choosing an appropriate embedding dimension - small enough to be efficient and large enough to be effective - is challenging but necessary to generate embeddings applicable to a multitude of tasks. Existing strategies for the selection of the embedding dimension rely on performance maximization in downstream tasks.
View Article and Find Full Text PDFGraph embedding methods are becoming increasingly popular in the machine learning community, where they are widely used for tasks such as node classification and link prediction. Embedding graphs in geometric spaces should aid the identification of network communities as well because nodes in the same community should be projected close to each other in the geometric space, where they can be detected via standard data clustering algorithms. In this paper, we test the ability of several graph embedding techniques to detect communities on benchmark graphs.
View Article and Find Full Text PDFWe investigate how the properties of inhomogeneous patterns of activity, appearing in many natural and social phenomena, depend on the temporal resolution used to define individual bursts of activity. To this end, we consider time series of microscopic events produced by a self-exciting Hawkes process, and leverage a percolation framework to study the formation of macroscopic bursts of activity as a function of the resolution parameter. We find that the very same process may result in different distributions of avalanche size and duration, which are understood in terms of the competition between the 1D percolation and the branching process universality class.
View Article and Find Full Text PDFThe fundamental idea of embedding a network in a metric space is rooted in the principle of proximity preservation. Nodes are mapped into points of the space with pairwise distance that reflects their proximity in the network. Popular methods employed in network embedding either rely on implicit approximations of the principle of proximity preservation or implement it by enforcing the geometry of the embedding space, thus hindering geometric properties that networks may spontaneously exhibit.
View Article and Find Full Text PDFContainment measures implemented by some countries to suppress the spread of COVID-19 have resulted in a slowdown of the epidemic characterized by time series of daily infections plateauing over extended periods of time. We prove that such a dynamical pattern is compatible with critical susceptible-infected-removed (SIR) dynamics. In traditional analyses of the critical SIR model, the critical dynamical regime is started from a single infected node.
View Article and Find Full Text PDFWe consider the optimization problem of seeding a spreading process on a temporal network so that the expected size of the resulting outbreak is maximized. We frame the problem for a spreading process following the rules of the susceptible-infected-recovered model with temporal scale equal to the one characterizing the evolution of the network topology. We perform a systematic analysis based on a corpus of 12 real-world temporal networks and quantify the performance of solutions to the influence maximization problem obtained using different level of information about network topology and dynamics.
View Article and Find Full Text PDFInfluence maximization is the problem of finding the set of nodes of a network that maximizes the size of the outbreak of a spreading process occurring on the network. Solutions to this problem are important for strategic decisions in marketing and political campaigns. The typical setting consists in the identification of small sets of initial spreaders in very large networks.
View Article and Find Full Text PDFExperimental and computational studies provide compelling evidence that neuronal systems are characterized by power-law distributions of neuronal avalanche sizes. This fact is interpreted as an indication that these systems are operating near criticality, and, in turn, typical properties of critical dynamical processes, such as optimal information transmission and stability, are attributed to neuronal systems. The purpose of this Rapid Communication is to show that the presence of power-law distributions for the size of neuronal avalanches is not a sufficient condition for the system to operate near criticality.
View Article and Find Full Text PDFSeveral studies have suggested that functional connectivity (FC) is constrained by the underlying structural connectivity (SC) and mutually correlated. However, not many studies have focused on differences in the network organization of SC and FC, and on how these differences may inform us about their mutual interaction. To explore this issue, we adopt a multi-layer framework, with SC and FC, constructed using Magnetic Resonance Imaging (MRI) data from the Human Connectome Project, forming a two-layer multiplex network.
View Article and Find Full Text PDFProc Natl Acad Sci U S A
December 2018
Contemporary science has been characterized by an exponential growth in publications and a rise of team science. At the same time, there has been an increase in the number of awarded PhD degrees, which has not been accompanied by a similar expansion in the number of academic positions. In such a competitive environment, an important measure of academic success is the ability to maintain a long active career in science.
View Article and Find Full Text PDF