lecture 7 cs 728 searchable networks. errata: differences between copying and preferential...

10
Lecture 7 CS 728 Searchable Networks

Upload: amanda-gordon

Post on 18-Dec-2015

213 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Lecture 7 CS 728 Searchable Networks. Errata: Differences between Copying and Preferential Attachment In generative model: let p k be fraction of nodes

Lecture 7CS 728

Searchable Networks

Page 2: Lecture 7 CS 728 Searchable Networks. Errata: Differences between Copying and Preferential Attachment In generative model: let p k be fraction of nodes

Errata: Differences between Copying and Preferential Attachment

• In generative model: let pk be fraction of nodes with (in)degree k

• Consider the degree distribution of attaching new node to target of randomly chosen edge.– Answer is not pk but proportional to kpk why??

• But in copying model we take target from a random edge from a random vertex!– In this case probability of connecting to a node is 1/n

sum (1/outdegrees) of k parents– So preferential attachment to nodes of high indegree

whose parents have low outdegree

Page 3: Lecture 7 CS 728 Searchable Networks. Errata: Differences between Copying and Preferential Attachment In generative model: let p k be fraction of nodes

Searchable Networks

• Questions: • Social: How does a person in a small world find

their soul mate?• Comp Sci: How does the notion of long and

short edges in a “random” network impact ability to find key nodes?

• Just because a short path exists, doesn’t mean you can easily find it (using only local info).

• You don’t know all of the people whom your friends know.

• Under what conditions is a network searchable?

Page 4: Lecture 7 CS 728 Searchable Networks. Errata: Differences between Copying and Preferential Attachment In generative model: let p k be fraction of nodes

Searchable Networks

Variation of Watts’s model and Waxman’s model:

– Lattice is d-dimensional (d=2).

– One random link per node.– Parameter r controls

probability of random link – greater for closer nodes.

– node u is connected to node v with probability proportional to d(u,v)^-r

Kleinberg (2000)

Page 5: Lecture 7 CS 728 Searchable Networks. Errata: Differences between Copying and Preferential Attachment In generative model: let p k be fraction of nodes

• Lower bound

Page 6: Lecture 7 CS 728 Searchable Networks. Errata: Differences between Copying and Preferential Attachment In generative model: let p k be fraction of nodes

Fundamental consequences of model• When long range contacts are formed

independently of the geometry of the grid, short chains will exist but the nodes, operating at a local level, will not be able to find them.

• When long range contacts are formed by a process that is related to the geometry of the grid in a specific way, however, then short chains will still form and nodes operating with local knowledge will be able to construct them.

Page 7: Lecture 7 CS 728 Searchable Networks. Errata: Differences between Copying and Preferential Attachment In generative model: let p k be fraction of nodes

• Theorem 1: Effective routing is impossible in uniformly random graphs.

When r = 0, the expected delivery time of any decentralized algorithm is at least O(n^2/3), and hence exponential in the expected minimum path length.

• Theorem 2: Greedy routing is effective in certain random graphs.

When r = 2, there is a decentralized (greedy) algorithm, so that the expected delivery time is at most O( logn^2), hence quadratic in expected path length.

Page 8: Lecture 7 CS 728 Searchable Networks. Errata: Differences between Copying and Preferential Attachment In generative model: let p k be fraction of nodes

Proof Sketch for Lower Bound

The impossibility result is based on the fact that the uniform distribution prevents a decentralized algorithm from using any “clues'' provided by the geometry of the grid.

Consider the set U of all nodes within lattice distance n^2/3 of destination t.

With high probability, the source s will lie outside of U, and if the message is never passed from a node to a long-range contact in U , the number of steps needed to reach t will be at least proportional to n^2/3 .

But the probability that any message holder has a long-range contact in U is roughly n^(4/3)/n^2 = n^-2/3 , so the expected number of steps before a long-range contact in U is found is at least proportional to n^2/3 as well.

Page 9: Lecture 7 CS 728 Searchable Networks. Errata: Differences between Copying and Preferential Attachment In generative model: let p k be fraction of nodes

Proof Sketch for Upper Bound Th. 2

• Greedy algorithm always moves us closer. Consider phases that move the message half the distance to destination.

(Recall Zeno’s paradox).• Probability of connecting to a node at

distance d is ~ 1/(d^2 lgn) and there are ~ d^2 nodes at distance d from destination. Thus ~lg n steps will end the phase.

• So with lg n phases we are done lg^2 n time

Page 10: Lecture 7 CS 728 Searchable Networks. Errata: Differences between Copying and Preferential Attachment In generative model: let p k be fraction of nodes

Searchable Networks

Watts, Dodds, Newman (2002) show that for d = 2 or 3, real networks are quite searchable.

Killworth and Bernard (1978) found that people tended to search their networks by d = 2: geography and profession.

Kleinberg (2000)

The Watts-Dodds-Newman modelclosely fitting a real-world experiment