August 2024
·
10 Reads
·
1 Citation
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
August 2024
·
10 Reads
·
1 Citation
May 2024
·
3 Reads
·
2 Citations
October 2022
·
11 Reads
·
1 Citation
Theoretical Computer Science
The degree distributions of complex networks are usually considered to follow a power law distribution. However, it is not the case for a large number of them. We thus propose a new model able to build random growing networks with (almost) any wanted degree distribution. The degree distribution can either be theoretical or extracted from a real-world network. The main idea is to invert the recurrence equation commonly used to compute the degree distribution in order to find a convenient attachment function for node connections - commonly chosen as linear. We compute this attachment function for some classical distributions, as the power-law, the broken power-law, and the geometric distributions. We also use the model on an undirected version of the Twitter network, for which the degree distribution has an unusual shape. We finally show that the divergence of chosen attachment functions is directly linked to the heavy-tailed property of the obtained degree distributions.
July 2022
·
3 Reads
·
9 Citations
We study opinion dynamics in multi-agent networks where agents hold binary opinions and are influenced by their neighbors while being biased towards one of the two opinions, called the superior opinion. The dynamics is modeled by the following process: at each round, a randomly selected agent chooses the superior opinion with some probability α, and with probability 1-α it conforms to the opinion manifested by the majority of its neighbors. In this work, we exhibit classes of network topologies for which we prove that the expected time for consensus on the superior opinion can be exponential. This answers an open conjecture in the literature. In contrast, we show that in all cubic graphs, convergence occurs after a polynomial number of rounds for every α. We rely on new structural graph properties by characterizing the opinion formation in terms of multiple domination, stable and decreasing structures in graphs, providing an interplay between bias, consensus and network structure. Finally, we provide both theoretical and experimental evidence for the existence of decreasing structures and relate it to the rich behavior observed on the expected convergence time of the opinion diffusion model.
December 2021
·
19 Reads
·
13 Citations
Journal of Complex Networks
The clustering coefficient has been introduced to capture the social phenomena that a friend of a friend tends to be my friend. This metric has been widely studied and has shown to be of great interest to describe the characteristics of a social graph. But, the clustering coefficient is originally defined for a graph in which the links are undirected, such as friendship links (Facebook) or professional links (LinkedIn). For a graph in which links are directed from a source of information to a consumer of information, it is no more adequate. We show that former studies have missed much of the information contained in the directed part of such graphs. In this article, we introduce a new metric to measure the clustering of directed social graphs with interest links, namely the interest clustering coefficient. We compute it (exactly and using sampling methods) on a very large social graph, a Twitter snapshot with 505 million users and 23 billion links, as well as other various datasets. We additionally provide the values of the formerly introduced directed and undirected metrics, a first on such a large snapshot. We observe a higher value of the interest clustering coefficient than classic directed clustering coefficients, showing the importance of this metric. By studying the bidirectional edges of the Twitter graph, we also show that the interest clustering coefficient is more adequate to capture the interest part of the graph while classic ones are more adequate to capture the social part. We also introduce a new model able to build random networks with a high value of interest clustering coefficient. We finally discuss the interest of this new metric for link recommendation.
May 2021
·
41 Reads
·
3 Citations
Algorithmica
In the eternal domination game played on graphs, an attacker attacks a vertex at each turn and a team of guards must move a guard to the attacked vertex to defend it. The guards may only move to adjacent vertices on their turn. The goal is to determine the eternal domination number of a graph, which is the minimum number of guards required to defend against an infinite sequence of attacks. This paper first continues the study of the eternal domination game on strong grids . Cartesian grids have been vastly studied with tight bounds existing for small grids such as grids for . It was recently proven that where is the domination number of which lower bounds the eternal domination number [Lamprou et al. Eternally dominating large grids. Theoretical Computer Science, 794:27–46, 2019]. We prove that, for all such that , (note that is the domination number of ). We then generalise our technique to prove that for all graphs , where is a large family of D-dimensional grids which are supergraphs of the D-dimensional Cartesian grid and subgraphs of the D-dimensional strong grid. In particular, includes both the D-dimensional Cartesian grid and the D-dimensional strong grid.
April 2021
·
13 Reads
·
6 Citations
Computer Networks
More than ever, data networks have demonstrated their central role in the world economy, but also in the well-being of humanity that needs fast and reliable networks. In parallel, with the emergence of Network Function Virtualization (NFV) and Software Defined Networking (SDN), efficient network algorithms considered too hard to be put in practice in the past now have a second chance to be considered again. In this context, as new networks will be deployed and current ones get significant upgrades, it is thus time to rethink the network dimensioning problem with protection against failures. In this paper, we consider a path-based protection scheme with the global rerouting strategy in which, for each failure situation, there may be a new routing of all the demands. Our optimization task is to minimize the needed amount of bandwidth. After discussing the hardness of the problem, we develop two scalable mathematical models that we handle using both Column Generation and Benders Decomposition techniques. Through extensive simulations on real-world IP network topologies and on randomly generated instances, we show the effectiveness of our methods: they lead to savings of 40 to 48% of the bandwidth to be installed in a network to protect against failures compared to traditional schemes. Finally, our implementation in OpenDaylight demonstrates the feasibility of the approach. Its evaluation with Mininet shows that our solution provides sub-second recovery times, but the way it is implemented may greatly impact the amount of signaling traffic exchanged. In our evaluations, the recovery phase requires only a few tens of milliseconds for the fastest implementation, compared to a few hundreds of milliseconds for the slowest one.
January 2021
·
9 Reads
Studies in Computational Intelligence
The degree distributions of complex networks are usually considered to be power law. However, it is not the case for a large number of them. We thus propose a new model able to build random growing networks with (almost) any wanted degree distribution. The degree distribution can either be theoretical or extracted from a real-world network. The main idea is to invert the recurrence equation commonly used to compute the degree distribution in order to find a convenient attachment function for node connections - commonly chosen as linear. We compute this attachment function for some classical distributions, as the power-law, broken power-law, geometric and Poisson distributions. We also use the model on an undirected version of the Twitter network, for which the degree distribution has an unusual shape.
January 2021
·
33 Reads
·
9 Citations
Studies in Computational Intelligence
We study here the clustering of directed social graphs. The clustering coefficient has been introduced to capture the social phenomena that a friend of a friend tends to be my friend. This metric has been widely studied and has shown to be of great interest to describe the characteristics of a social graph. In fact, the clustering coefficient is adapted for a graph in which the links are undirected, such as friendship links (Facebook) or professional links (LinkedIn). For a graph in which links are directed from a source of information to a consumer of information, it is no longer adequate. We show that former studies have missed much of the information contained in the directed part of such graphs. We thus introduce a new metric to measure the clustering of a directed social graph with interest links, namely the interest clustering coefficient. We compute it (exactly and using sampling methods) on a very large social graph, a Twitter snapshot with 505 million users and 23 billion links. We additionally provide the values of the formerly introduced directed and undirected metrics, a first on such a large snapshot. We exhibit that the interest clustering coefficient is larger than classic directed clustering coefficients introduced in the literature. This shows the relevancy of the metric to capture the informational aspects of directed graphs.
October 2020
·
92 Reads
·
9 Citations
Algorithmica
In the localization game, introduced by Seager in 2013, an invisible and immobile target is hidden at some vertex of a graph G. At every step, one vertex v of G can be probed which results in the knowledge of the distance between v and the secret location of the target. The objective of the game is to minimize the number of steps needed to locate the target whatever be its location. We address the generalization of this game where vertices can be probed at every step. Our game also generalizes the notion of the metric dimension of a graph. Precisely, given a graph G and two integers , the Localization problem asks whether there exists a strategy to locate a target hidden in G in at most steps and probing at most k vertices per step. We first show that, in general, this problem is NP-complete for every fixed (resp., ). We then focus on the class of trees. On the negative side, we prove that the Localization problem is NP-complete in trees when k and are part of the input. On the positive side, we design a -approximation algorithm for the problem in n-node trees, i.e., an algorithm that computes in time (independent of k) a strategy to locate the target in at most one more step than an optimal strategy. This algorithm can be used to solve the Localization problem in trees in polynomial time if k is fixed. We also consider some of these questions in the context where, upon probing the vertices, the relative distances to the target are retrieved. This variant of the problem generalizes the notion of the centroidal dimension of a graph.
... Existing works largely focus on inference serving in public clouds or other settings which support hardware scaling [8], [9], [10], [11], [12], [13], [2]. A few recent works have proposed accuracy scaling as an alternative approach when resource elasticity is unavailable [14], [7], [15], [16]. ...
May 2024
... These techniques include adaptive sampling, task scheduling, predictive behavior modeling, and federated learning. By analyzing their implementation and effectiveness, this review highlights best practices for energy saving while maintaining the core functionalities of mHealth applications by analyzing their implementation and effectiveness, particularly in the context of chronic disease management (Almotiri et al., 2016;Basaklar et al., 2024;Da Silva Barros et al., 2024;Hashmi et al., 2024;Islam et al., 2023;Kwak et al., 2023;Lee-Kan et al., 2024;Mazumder et al., 2024;Rehman et al., 2021;Sadeghian et al., 2024;Torkamaan & Ziegler, 2022;Wu & Solangi, 2024;Zheng et al., 2023). ...
August 2024
... The evaluation indicators based on the complex network topology structure include betweenness centrality (BC), efficiency of a network [48], degree and degree distribution [49,50], clustering coefficient [51], maximum connected subgraph [52], connectivity [53], etc. These indicators mainly evaluate the importance of network components (nodes, sections, etc.) from the perspective of complex network geometry and topology, with particular emphasis on the adjacency status and the spatial distance between elements. ...
October 2022
Theoretical Computer Science
... So, we can formulate the probability of occurring a complete set of edges E = V × V as Eq. (5). ...
December 2021
Journal of Complex Networks
... Particularly, the majority-based models, where each node chooses the most frequent color among its neighbors, have received a substantial amount of attention, cf. [14,22,25,32,49]. This imitating behavior can be explained in several ways: an agent that sees a majority agreeing on an opinion might think that her neighbors have access to some information unknown to her and hence they have made the better choice; also agents can directly benefit from adopting the same behavior as their friends (e.g., prices going down). ...
July 2022
... Shared Risk Link Groups (SRLGs) help to express the relationships of complex failures. The research work [39] addressed the problem of various SRLG failure scenarios. Along with SRLGs constraints, this paper is the first attempt to provide the protection mechanisms against failures in the SDN/NFV environment. ...
April 2021
Computer Networks
... Since then, several results have focused on finding bounds on γ ∞ m under different conditions or graph classes. Among the studied graph classes are trees [12,8,14], grids [4,18,16,10,5,9,15], and interval graphs [2,17]. For a good survey of other related results and topics, see Klostermeyer and Mynhardt [13]. ...
May 2021
Algorithmica
... -Interest clustering coefficient [87]. An interest clustering coefficient is introduced to measure the "clustering of interest links" in directed social networks. ...
January 2021
Studies in Computational Intelligence
... Different from previous studies on failure recovery, we present a simple and bandwidth-optimal approach based on multiple backup paths to protect the network against SRLG failures where SDN switches are deployed. Our concept was previously introduced in [20,21]. ...
November 2019
... Metric Dimension was introduced in the 1970s independently by Harary and Melter [53] and Slater [88] as a network monitoring problem. Metric Dimension and its variants (see, e.g., [10,11,36,46,52,61,87,89]) are very well-studied and have numerous applications such as in graph isomorphism testing [6], network discovery [8], image processing [77], chemistry [59], graph reconstruction [76] or genomics [90]. In fact, Metric Dimension was first shown to be NP-complete in general graphs in Garey and Johnson's book [49], and this was later extended to unit disk graphs [56], split graphs, bipartite graphs, co-bipartite graphs, and line graphs of bipartite graphs [35], bounded-degree planar graphs [28], and interval and permutation graphs of diameter 2 [44]. ...
October 2020
Algorithmica