Detection of Core-Periphery Structure in Networks Using Spectral Methods and Geodesic Paths
نویسندگان
چکیده
MIHAI CUCURINGU, PUCK ROMBACH, SANG HOON LEE and MASON A. PORTER 1Department of Mathematics, UCLA, Los Angeles, CA, USA emails: [email protected], [email protected] 2Oxford Centre for Industrial and Applied Mathematics, Mathematical Institute, University of Oxford, Oxford, UK email: [email protected] 3School of Physics, Korea Institute for Advanced Study, Seoul, Korea email: [email protected] 4CABDyN Complexity Centre, University of Oxford, Oxford, UK
منابع مشابه
Identification of core-periphery structure in networks
Many networks can be usefully decomposed into a dense core plus an outlying, loosely connected periphery. Here we propose an algorithm for performing such a decomposition on empirical network data using methods of statistical inference. Our method fits a generative model of core-periphery structure to observed data using a combination of an expectation-maximization algorithm for calculating the...
متن کاملTree decompositions and social graphs
Recent work has established that large informatics graphs such as social and information networks have a nontrivial treelike structure when viewed at moderate-size scales. Here, we present results from the first detailed empirical evaluation of the use of tree decomposition (TD) heuristics for structure identification and extraction in social graphs. Although TDs have historically been used in ...
متن کاملA Unified Method of Detecting Core-Periphery Structure and Community Structure in Networks
The core-periphery structure and the community structure are two typical meso-scale structures in complex networks. Although community detection has been extensively investigated from different perspectives, the definition and the detection of the core-periphery structure have not received much attention. Furthermore, the detection problems of the core-periphery and community structure were sep...
متن کاملIntrusion Detection in Wireless Sensor Networks using Genetic Algorithm
Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...
متن کاملCore-Periphery Structure in Networks
Intermediate-scale (or “meso-scale”) structures in networks have received considerable attention, as the algorithmic detection of such structures makes it possible to discover network features that are not apparent either at the local scale of nodes and edges or at the global scale of summary statistics. Numerous types of meso-scale structures can occur in networks, but investigations of such f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1410.6572 شماره
صفحات -
تاریخ انتشار 2014