This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Random node reinforcement and KK-core structure of complex networks

Rui Ma1,2    Yanqing Hu3    Jin-Hua Zhao1,2,4 [email protected] 1Guangdong Provincial Key Laboratory of Nuclear Science, Institute of Quantum Matter, South China Normal University, Guangzhou 510006, China 2Guangdong-Hong Kong Joint Laboratory of Quantum Matter, Southern Nuclear Science Computing Center, South China Normal University, Guangzhou 510006, China 3Department of Statistics and Data Science, College of Science, Southern University of Science and Technology, Shenzhen 518055, China 4School of Data Science and Engineering, South China Normal University, Shanwei 516622, China
Abstract

To enhance robustness of complex networked systems, a simple method is introducing reinforced nodes which always function during failure propagation. A random scheme of node reinforcement can be considered as a benchmark for finding an optimal reinforcement solution. Yet there still lacks a systematic evaluation on how node reinforcement affects network structure at a mesoscopic level upon failures. Here we study this problem through the lens of KK-cores of networks. Based on an analytical percolation framework, we first show that, on uncorrelated random graphs, with a critical size of reinforced nodes, an abrupt emergence of KK-cores is smoothed out to a continuous one, and a detailed phase diagram is derived. We then show that, with a cost-benefit analysis on random reinforcement, for proper weight factors in cost functions with constant and increasing marginal costs, a gain function shows a unimodality, thus we can analytically find an optimal reinforcement fraction by locating the maximal gain. In all, our framework offers a gain-oriented analytical perspective to designing robust interconnected systems.

I Introduction

Measuring and improving robustness of complex functioning systems against noise and attacks is vital in complex systems research, both as theoretical and application challenges Scheffer-2009 . This topic becomes increasingly important for real-world systems with intricate interaction patterns, such as interdependency Buldyrev.etal-Nature-2010 ; Gao.etal-NatPhys-2012 and higher-order interactions Battiston.etal-NatPhys-2021 between interacting constituents. Many external interventions are developed to protect a system from dysfunction or collapse, such as rewiring links in a system Schneider.etal-PNAS-2011 , reinforcing nodes to remove abrupt collapse Yuan.Hu.Stanley.Havlin-PNAS-2017 ; Xie.etal-Chaos-2019 , introducing redundant interdependency among layers in multiplex networks Radicchi.Binaconi-PRX-2017 , and so on.

A typical analytical tool to study robustness of complex systems is a percolation model on graphs/networks Stauffer.Aharony-1994 ; Newman-2018 ; Li.etal-PhysRep-2021 , such as site percolation on networks Albert.Jeong.Barabasi-Nature-2000 ; Cohen.etal-PRL-2000 ; Callaway.etal-PRL-2000 in which a fraction of nodes are removed and the giant component (GC) of the residual graph is considered as an indicator of macroscopic connectedness. While percolation models are usually defined in a random setting, such as a random failure of nodes in networks, the problem of enhancing network robustness intrinsically has an optimization formulation.

In this paper, we study the node reinforcement scheme on networks, a typical measure to improve network robustness. In an optimization version, the problem can be formulated as finding an optimal scheme of selecting and reinforcing nodes to generate GCs with the largest average size under a given failure model. While in its random version, the problem can be stated to characterize structural properties of networks under a random node reinforcement scheme, in which a fraction of nodes are randomly selected and reinforced. A random reinforcement scheme can be considered as a benchmark for developing sophisticated optimal ones. This scheme was adopted to eradicate abrupt transitions in networks with interdependency or group interactions at a macroscopic GC level Yuan.Hu.Stanley.Havlin-PNAS-2017 ; Xie.etal-Chaos-2019 . Yet how the random scheme affects a network at a level of mesoscopic structure still lacks of study. Here, we approach this problem through the lens of KK-cores Dorogovtsev.Goltsev.Mendes-PRL-2006 ; Baxter.etal-PRX-2015 . Specifically, we study how KK-cores of networks evolve under random reinforcement scheme upon random node failures. The KK-core of a graph is the subgraph after an iterative removal of any node with a degree <K<K, and its original form and variants act as a structural basis for various processes on networks, such as a decomposition method to reveal hierarchical and nested structure Carmi.etal-PNAS-2007 , structural stability with different interaction patterns Zhao.Zhou.Liu-NatCommun-2013 ; Zhao-JStatMech-2017 ; Morone.Ferraro.Makse-NatPhys-2019 , and epidemic and behaviourial spreading processes Kitsak.etal-NatPhys-2010 ; Xie.etal-PNAS-2022 . By combining the original KK-pruning process with the greedy leaf removal procedure Karp.Sipser-IEEE-1981 , a KK-leaf removal process is defined AzimiTafreshi.Osat.Dorogovtsev-PRE-2019 . Its significance in network robustness in different structural features and attack settings is further studied Shang-PRE-2020 ; Shang-SIAMJAppMath-2020 ; Shang-CSF-2021 .

Our main contribution here starts from a model of KK-core percolation under node reinforcement and a mean-field theory of the model in a random scheme on uncorrelated random graphs. Based on analytical results, we first show a picture different from typical KK-core percolation, in which with an increasing fraction of reinforced nodes, a former hybrid phase transition (a first-order or discontinuous one with a critical singularity) gradually reduces to a continuous one, in between there is a mixed case with a new continuous one preceding a hybrid one. Then, we define a gain function from a cost-benefit perspective for node reinforcement. By designating an optimal reinforcement fraction to reach the largest gain, we provide a unified framework to compare schemes of different origins to find an optimal one.

Here is a layout of the paper. In Sec.II, we present our model of KK-cores on networks with reinforced nodes. In Sec.III, we develop a mean-field theory for KK-cores and their GCs on random graphs with randomly distributed reinforced nodes. In Sec.IV, we test our analytical theory on some typical random graph models and real-world networks. In Sec.V, we present a cost-benefit analysis on random node reinforcement. In Sec.VI, we conclude the paper with discussion.

II Model

Refer to caption
Figure 1: Schematics of KK-cores on an undirected graph with node reinforcement. (a) A small graph has 1616 nodes and 2121 links, and clusters into two components. (b) Following the typical KK-core percolation model, in an initial removal process 44 nodes are chosen and removed as indicated in dotted circles. (c) After KK-core pruning process on (b), the 22-core is shown in blue solid circle. Beware that there is no 33-core here. (d) Following our model, starting from the graph in (a), 22 nodes are selected and reinforced as marked with crosses in circles. (e) An initial removal of 44 nodes is applied as the same as in (b). Beware that a reinforced node is also chosen in the initial removal, yet by definition in our model it cannot be removed. (f) After KK-core pruning process in (e), the 22-core and the 33-core are enclosed in blue solid and red dashed circles respectively. Comparing (c) and (f), we can see that, after reinforcing 22 nodes, the sizes of 22-core and 33-core respectively increase by 33 and 66, and the sizes of their GCs respectively increase by 22 and 55.

We consider an undirected graph G=(V,E)G=(V,E) with a node set VV(|V|N|V|\equiv N) and a link set EE (|E|M|E|\equiv M). For a node iVi\in V, its nearest neighbors constitute a set i\partial i, and its cardinality is the degree of ii as ki|i|k_{i}\equiv|\partial i|. The degree distribution P(k)P(k) of GG is the probability that a randomly chosen node having a degree kk. The mean degree of GG is simply c=2M/N=k=0+P(k)kc=2M/N=\sum_{k=0}^{+\infty}P(k)k. A closely related quantity to P(k)P(k) common in a percolation theory on graphs is the excess degree distribution Q(k)Q(k), which is the probability that, following a randomly chosen link, an endnode has a degree kk. It can be found that Q(k)=kP(k)/cQ(k)=kP(k)/c.

In the typical KK-core percolation on a network Dorogovtsev.Goltsev.Mendes-PRL-2006 , the basic step is to remove any node with a degree <K<K along with all its adjacent links, leaving the residual subgraph as the KK-core. In this paper, we randomly introduce reinforced nodes into a network Yuan.Hu.Stanley.Havlin-PNAS-2017 . A reinforced node functions itself, immune to any removal process, and further supports its nearest neighbors. In our percolation model, initially a fraction q(0,1)q\in(0,1) of nodes are randomly chosen and assigned as being reinforced. Then an initial removal process follows in which a fraction 1p1-p (p(0,1)p\in(0,1) as the initial fraction) of nodes are randomly selected. The initial removal can be considered as a random failure process, and the ratio 1p1-p is the strength parameter of failures. In the initial removal, a selected node can be removed only if it is not reinforced. On the configuration after reinforcing nodes and the initial removal, an iterative KK-core pruning process is carried out. Beware that, these reinforced nodes cannot be removed in the KK-core pruning process. Thus in the residual graph consisting of all functioning nodes, there are probably reinforced nodes with a degree <K<K. For the ease of notation, we still name the residual graph as a KK-core. Its GC can be easily found with graph search algorithms. See Fig.1 for an illustration.

Our model is intrinsically a deterministically irreversible binary-state model on graphs. Like many existing percolation models, with a given configuration of node reinforcement and initial node failures, the final KK-core structure is independent of order of node removal. This can be proved with a proof by contradiction, which first assumes two distinct final KK-core configurations, and deduces that there has to be some seed nodes whose different states directly lead to the two distinct configurations, which is actually impossible in deterministically irreversible models.

Here we compare our model with the heterogeneous KK-core (HKC) model Baxter.etal-PRE-2011 ; Cellai.etal-PRL-2011 ; Cellai.etal-PRE-2013 . For a reinforced node in our model, its threshold in KK-core percolation can be effectively defined as K=0K=0 or 11 when considering GC of KK-cores. In these two models, there are both initial removal process and a KK-core pruning process depending on the threshold of each node. Yet the fundamental difference between them is that, in the HKC model, the initial removal process takes place before randomly assigning thresholds to nodes in a residual graph, while in our model, the initial removal comes in after randomly reinforcing nodes (equivalent to assigning two thresholds, KK and 0/10/1, randomly to nodes). With the same parameters of graphs and algorithms, GCs of KK-cores in our model are larger than those in the HKC model. In short, our model has a nontrivial background from network robustness, and is essentially different from HKC model as a purely extended KK-core percolation model.

III Theory

The basic question for our model is to quantitatively estimate sizes of KK-core and its GC on a graph after random node reinforcement. On uncorrelated random graphs, we can develop a mean-field theory to calculate them in an analytical way.

Our mean-field framework is based on cavity method Mezard.Montanari-2009 , in which with an assumption of locally tree-like structure of large sparse graphs, we adopt the Bethe-Peierls approximation Bethe-PRSLA-1935 . This approximation assumes the independence between nodal states of nearest neighbors i\partial i of any node iGi\in G with a prescribed state on a large sparse graph GG due to long loops between these neighbors. In a typical message passing formalism of cavity method for a graphical problem, such as the belief propagation algorithm Kschischang.Frey.Loeliger-IEEETransInfTheor-2001 , a dimension of 2M2M messages (cavity probabilities) are defined on links of a graph instance and their coupled equations are established. The fixed points of messages after iterations are connected to solutions of the problem. This message passing formalism presents itself often in devising fast algorithms and charactering phase transitions for hard satisfiability and combinatorial optimization problems Mezard.Montanari-2009 . Yet in the context of percolation problems on random graphs Newman.Strogatz.Watts-PRE-2001 , due to simple underlying graphical structure, a much simpler formalism with only O(1)O(1) coarse-grained cavity probabilities is possible.

In our percolation model on a graph GG, two target quantities are fractions of nodes in a KK-core and those in its GC, denoted as nn and ngn_{\rm g}, respectively. For GG, we first define two cavity probabilities {x,xg}[0,1]\{x,x_{{\rm g}}\}\in[0,1] tailored to dynamical process in our percolation model. On a randomly chosen link (i,j)G(i,j)\in G between nodes ii and jj, from ii to jj given that ii is in the KK-core of GG, we define xx and xgx_{{\rm g}}, respectively, as the probability that jj is in KK-core and in its GC. Under the Bethe-Peierls approximation, we derive self-consistent equations for xx and xgx_{\rm g}. With their stable fixed solutions, we finally calculate nn and ngn_{\rm g}. All the relevant equations are listed as below.

x\displaystyle x =q+(1q)pk=K+Q(k)s=K1k1(k1s)xs(1x)k1s,\displaystyle=q+(1-q)p\sum_{k=K}^{+\infty}Q(k)\sum_{s=K-1}^{k-1}{k-1\choose s}x^{s}(1-x)^{k-1-s}, (1)
xg\displaystyle x_{{\rm g}} =qk=1+Q(k)s=1k1(k1s)[xs(xxg)s](1x)k1s\displaystyle=q\sum_{k=1}^{+\infty}Q(k)\sum_{s=1}^{k-1}{k-1\choose s}[x^{s}-(x-x_{\rm g})^{s}](1-x)^{k-1-s} (2)
+(1q)pk=K+Q(k)s=K1k1(k1s)[xs(xxg)s](1x)k1s,\displaystyle+(1-q)p\sum_{k=K}^{+\infty}Q(k)\sum_{s=K-1}^{k-1}{k-1\choose s}[x^{s}-(x-x_{\rm g})^{s}](1-x)^{k-1-s},
n\displaystyle n =q+(1q)pk=K+P(k)s=Kk(ks)xs(1x)ks,\displaystyle=q+(1-q)p\sum_{k=K}^{+\infty}P(k)\sum_{s=K}^{k}{k\choose s}x^{s}(1-x)^{k-s}, (3)
ng\displaystyle n_{{\rm g}} =qk=1+P(k)s=1k(ks)[xs(xxg)s](1x)ks\displaystyle=q\sum_{k=1}^{+\infty}P(k)\sum_{s=1}^{k}{k\choose s}[x^{s}-(x-x_{\rm g})^{s}](1-x)^{k-s} (4)
+(1q)pk=K+P(k)s=Kk(ks)[xs(xxg)s](1x)ks.\displaystyle+(1-q)p\sum_{k=K}^{+\infty}P(k)\sum_{s=K}^{k}{k\choose s}[x^{s}-(x-x_{\rm g})^{s}](1-x)^{k-s}.

We first briefly explain Eqs.(1) and (2). We follow the setting in defining xx and xgx_{\rm g} with a randomly chosen link (i,j)G(i,j)\in G from ii to jj. For Eq.(1), if jj is in KK-core, there are two possibilities. First, jj is a reinforced node, then it is surely in KK-core. Thus we have the first term on right-hand side (RHS) of Eq.(1). Second, jj is not a reinforced node, and survives the initial removal. For jj to be further in KK-core, it must have at least K1K-1 nodes among its nearest neighbors also in KK-core besides ii, since ii is already in KK-core. Thus we have the second term on RHS of Eq.(1). For Eq.(2), if jj is in GC of KK-core, it must first be in KK-core. Correspondingly, there are also two possibilities. First, jj is a reinforced node. For jj to be further in GC of KK-core, it must have at least one nearest neighbor which are in GC of KK-core besides ii, since by definition we don’t specify that ii is in GC of KK-core or not. Thus we have the first term on RHS of Eq.(2). Second, jj is not a reinforced node, and remains after the initial removal. For jj to first in KK-core and then in its GC, it must have at least K1K-1 nearest neighbors also in KK-core besides ii since ii is already in KK-core, among which there are at least one neighbor in GC of KK-core. Thus we have the second term on RHS of Eq.(2).

In Eqs.(3) and (4), we estimate the possibility of a randomly chosen node iGi\in G to be in KK-core and in GC of KK-core respectively, which follows a similar logic in Eqs.(1) and (2). A major difference in their probabilistic forms is that, in formulating Eqs.(1) and (2), we follow a randomly chosen link (i,j)(i,j) and consider the probability of jj’s state. Thus in establishing them we adopt the excess degree distribution Q(k)Q(k). Yet in Eqs.(3) and (4), we calculate the probability of state of a randomly chosen node in GG, thus we adopt the degree distribution P(k)P(k).

In Appendix, we modify those summation terms on degrees in Eqs.(1) - (4) into a form with generating functions of degree distributions, which are more explicit in performing numerical calculation.

Refer to caption
Figure 2: KK-cores on ER random graphs with random node reinforcement. (a)-(b) Fractions of KK-core nn and its GC ngn_{\rm g} on ER random graphs with c=10c=10 for K=2K=2. (c)-(d) nn and ngn_{\rm g} on ER random graphs with p=1p=1 for K=2K=2. (e)-(h) and (i)-(l) have a similar format with (a)-(d) yet are for K=3K=3 and 44, respectively. In (f), (h), (j), and (l), qq are chosen with values in the five cases of q=0,qqt,qt<q<qc,qqc,qc<qq=0,q\approx q^{t},q^{t}<q<q^{c},q\approx q^{c},q^{c}<q. See in the main text. Each sign is a result from simulation on a graph instance with a node size N=105N=10^{5}. Solid lines are results from analytical theory on infinitely large graphs, and dotted lines denote jumps in analytical results.
Refer to caption
Figure 3: Fixed point analysis of self-consistent equations on ER random graphs. We have K=3K=3 and p=1.0p=1.0. In (a)-(b), (c)-(d), and (e)-(f), we consider q=0.05,0.08,0.1q=0.05,0.08,0.1, respectively, in which f(x)f(x) is shown in an upper subfigure, and g(xg)g(x_{\rm g}) is shown in a lower subfigure with corresponding stable xx. In the legend, cc with four significant digits are thresholds of continuous or hybrid transitions depending on the scenario of fixed point behaviors with corresponding qq. Lines are results from analytical theory on infinitely large graphs.
Refer to caption
Figure 4: Phase diagrams from our analytical framework on ER random and RR graphs with an infinitely large size. (a) Phase diagram on ER random graphs with c=10c=10 for K=3K=3. Line segment BD denotes continuous transition points of KK-cores, AB hybrid transition points preceded by continuous ones, and BC proper hybrid transition points with jumps starting from 0. P, F1, and F2 respectively denote phases in which there is no percolation, percolation after a hybrid transition, and percolation after a second-order transition. (b) Same with (a) yet with K=3,4,5,6K=3,4,5,6 on a larger scale. (c)-(d) Similar with (a)-(b) for phase diagrams on ER random graphs with p=1p=1 on varying cc. (e)-(f) Similar with (a)-(b) for phase diagrams on RR graphs with k0=10k_{0}=10. (g)-(h) Similar with (c)-(d) for phase diagrams on diluted RR graphs with k0=10k_{0}=10 and p=1p=1.
Refer to caption
Figure 5: KK-cores on RR graphs with random node reinforcement. (a)-(b) Fractions of KK-core nn and its GC ngn_{\rm g} on RR graphs with k0=10k_{0}=10 for K=2K=2. (c)-(d) nn and ngn_{\rm g} on diluted RR graphs with k0=10k_{0}=10 and p=1p=1 for K=2K=2. (e)-(h) and (i)-(l) have a similar format with (a)-(d) yet are for K=3K=3 and 44, respectively. In (f), (h), (j), and (l), qq are chosen with values in the five cases of q=0,qqt,qt<q<qc,qqc,qc<qq=0,q\approx q^{t},q^{t}<q<q^{c},q\approx q^{c},q^{c}<q. See in the main text. Each sign is a result from simulation on a graph instance with a node size N=105N=10^{5}. Solid lines are results from analytical theory on infinitely large graphs, and dotted lines denote jumps in analytical results.
Refer to caption
Figure 6: KK-cores on SF networks with random node reinforcement. (a)-(b) Fractions of KK-core nn and its GC ngn_{\rm g} on a SF network instance generated with configuration model with a degree exponent γ=2.5\gamma=2.5 and a node size N=105N=10^{5} for K=2K=2. In the graph construction, we have kmin=6k_{{\rm min}}=6 and kmax=Nk_{{\rm max}}=\sqrt{N}. Each sign is a result from simulation on the given graph instance with a node size N=105N=10^{5}. Lines are results from analytical theory based on the empirical degree distribution of the graph instance. (c)-(d) nn and ngn_{\rm g} on asymptotical SF networks generated with static model with γ=3.0\gamma=3.0 for K=2K=2. Each sign is a result from simulation on a graph instance with a node size N=105N=10^{5}. Lines are results from analytical theory on infinitely large graphs. (e)-(h) and (i)-(l) have a similar format with (a)-(d) yet for K=3K=3 and 44, respectively.
Refer to caption
Figure 7: KK-cores on a protein interaction network with random node reinforcement. In (a)-(c), we consider the cases of K=4,5,6K=4,5,6, respectively. Signs are average results with standard deviations for ngn_{g} from simulation of our percolation model on the network instance. For each simulation result of ngn_{g}, we generate 100100 different configurations of node reinforcement and initial removal to calculate their average and standard deviation. Solid lines are for the analytical prediction of ngn_{g} based on our mean-field framework.
Refer to caption
Figure 8: Gain function on random graphs and a real-world network. The initial removal fraction is p=0.7p=0.7. In the cost term, α=0.8\alpha=0.8. Results of our model with K=2,3,4K=2,3,4 are listed in columns from left to right, respectively. (a-c) Gain function on ER random graphs with c=10c=10. Solid line are results from mean-field theory on infinitely large graphs. (d-f) Gain function on SF networks generated by static model with γ=3.0\gamma=3.0 and c=10c=10. Solid lines are also results from mean-field theory on infinitely large graphs. (g-i) Gain function on a protein interaction network with a mean degree c10.3c\approx 10.3. Each sign is a simulation result averaged on 10001000 realizations of node reinforcement and initial removal configurations.
Refer to caption
Figure 9: Same with Fig.8, yet in the cost term α=1\alpha=1.
Refer to caption
Figure 10: Same with Fig.8, yet in the cost term α=1.5\alpha=1.5.

IV Result: A percolation analysis

We test our mean-field theory of percolation model on some typical random graph models. First we consider Erdös-Rényi (ER) random graphs Erdos.Renyi-PublMath-1959 ; Erdos.Renyi-Hungary-1960 . For ER random graphs with a mean degree cc, we have a Poisson degree distribution as

P(k)=ecckk!.\displaystyle P(k)={\rm e}^{-c}\frac{c^{k}}{k!}. (5)

Results of KK-core sizes are shown in Fig.2. We can see that theoretical and simulation results agree very well. The general effect of reinforced nodes on KK-core formation is that, they act as seeds of disconnected functioning clusters. Only when the mean degree cc of an original graph and a reinforcement fraction qq are large enough, those disconnected components can merge into a macroscopic one. There are three points in the general picture of these results we would emphasize. The first point is shown in the first and third rows in Fig.2. We show that, with a nontrivial qq a significant difference between nn and ngn_{\rm g} exists when a mean degree cc is relatively small, while in the original KK-core percolation on ER random graphs, there is only an indiscernible difference between them. The second point is shown in the second and fourth rows in Fig.2. We show that qq pushes up ngn_{\rm g} especially significantly around transition points, and moves the birth point of a KK-core to a smaller pp or cc. The third point is specifically for those hybrid transitions in the cases of K3K\geqslant 3. A detailed analysis shows that with an increasing qq from zero, ngn_{\rm g} consecutively shows a hybrid transition, a two-stage process in which a new continuous one precedes a hybrid one, and finally a fully continuous one. Correspondingly, we denote two critical values for qq: qtq_{t} as the qq at which a new continuous transition first sets in, and qcq_{c} as the qq at which a hybrid transition recedes into a continuous one. This scenario of smoothing an abrupt transition into a continuous one by tuning a control parameter also shows in other percolation problems, such as introducing reinforced nodes into multilayer networks Yuan.Hu.Stanley.Havlin-PNAS-2017 or single networks with group dependency Xie.etal-Chaos-2019 , a percolation model with interactions among next-nearest neighbors on single networks with both unidirectional and undirected links Xie.etal-PNAS-2022 , interdependent networks with variable coupling strengths Parshani.Buldyrev.Havlin-PRL-2010 , single networks with both dependency and connectivity links Parshani.etal-PNAS-2011 , and weak percolation on multiplex networks with overlapping edges Baxter.etal-CSF-2022 . An intuitive explanation for this scenario is that, all these models are driven by two competing adversary forces with different transition patterns. For example, in our model, the two forces are the KK-core pruning process which leads to a shrinkage of functioning components, and the node reinforcement which connects separate functioning components to form a larger one. The former behaves in a discontinuous way with K3K\geqslant 3 on uncorrelated random graphs, yet the latter works in a continuous manner when it follows a random scheme. By tuning a relative strength parameter between two driving forces, as the reinforcement fraction qq in our model, a smooth crossover between hybrid and continuous transitions underlying the two forces can be realized.

Here we elucidate the phase transition behavior through a fixed point analysis. We denote F(x;q)F(x;q) and G(xg,x;q)G(x_{\rm g},x;q) respectively as the right-hand side of Eqs.(1) and (2), and define f(x)x+F(x;q)f(x)\equiv-x+F(x;q) and g(xg)xg+G(xg,x;q)g(x_{\rm g})\equiv-x_{\rm g}+G(x_{\rm g},x;q). From f(x)=0f(x)=0 and g(xg)=0g(x_{\rm g})=0, we can read fixed xx and xgx_{\rm g}. In Fig.3, we show the fixed points of xx and xgx_{\rm g} on ER random graphs for K=3K=3 and p=1.0p=1.0. We test some representative qq in cases of [0,qt),(qt,qc),(qc,1][0,q_{t}),(q_{t},q_{c}),(q_{c},1], respectively. From the behavior of fixed points we ascertain orders and thresholds of transitions. Here we only explain the case in q=0.08(qt,qc)q=0.08\in(q_{t},q_{c}) in Figs.3 (c) and (d). At c<2.820c<2.820, there is only one fixed solution for xx and the corresponding stable xg=0x_{\rm g}=0. At 2.820<c<3.0712.820<c<3.071, there is also only one fixed solution for xx, yet a second (and stable) fixed solution of xgx_{\rm g} emerges continuously, leading to a small yet nontrivial ngn_{\rm g}. At c3.071c\approx 3.071, a second (and stable) fixed solution of xx shows after a jump from x0.164x\approx 0.164 to x0.424x\approx 0.424, further leads to sudden jumps in xgx_{\rm g}, nn, and ngn_{\rm g}. See the bulge in formation in f(x)f(x) when x>0.2x>0.2. At c>3.071c>3.071, the stable xx and xgx_{\rm g} increase continuously thereafter. We can see that, a jump in KK-core fractions here is mainly driven by the abrupt behavior of stable solution of xx, and a continuous transition is mainly driven by the instability of the trivial fixed point xg=0x_{\rm g}=0.

For the above physical picture of phase transitions on general random graphs, there are conditions to calculate their critical values. In the case of qqcq\leqslant q_{c}, we can calculate the hybrid phase transition point (cI,xI)(c^{\rm I},x^{\rm I}) or (pI,xI)(p^{\rm I},x^{\rm I}). Take (cI,xI)(c^{\rm I},x^{\rm I}) for an example, it satisfies the condition as:

F(x;q)x|c=cI,x=xI=1.\displaystyle\frac{\partial F(x;q)}{\partial x}\bigg{|}_{c=c^{\rm I},x=x^{\rm I}}=1. (6)

To further calculate qcq_{c}, we have

dcIdxI|q=qc=0.\displaystyle\frac{{\rm d}c^{\rm I}}{{\rm d}x^{\rm I}}\bigg{|}_{q=q_{c}}=0. (7)

In the case of qqtq\geqslant q_{t}, we can calculate the continuous phase transition point (cII,xII)(c^{\rm II},x^{\rm II}) or (pII,xII)(p^{\rm II},x^{\rm II}). Take (cII,xII)(c^{\rm II},x^{\rm II}) for an example, it satisfies the condition as:

G(xg,x;q)xg|c=cII,x=xII,xg=0=1.\displaystyle\frac{\partial G(x_{\rm g},x;q)}{\partial x_{\rm g}}\bigg{|}_{c=c^{\rm II},x=x^{\rm II},x_{\rm g}=0}=1. (8)

To further calculate qtq_{t}, we have

dcIIdxII|q=qt=0.\displaystyle\frac{{\rm d}c^{\rm II}}{{\rm d}x^{\rm II}}\bigg{|}_{q=q_{t}}=0. (9)

The above transition points and the critical values of qq can be calculated by these conditions together with Eqs.(1) and (2).

We further clarify the hybrid phase transition behavior in our model with phase diagrams. With an increasing qq, we list and connect all its critical control parameters. In Fig.4, we show three branches of critical parameters denoting second-order transitions, hybrid ones, and hybrid ones preceded by continuous ones. These branches act as boundaries between three phases, which are a non-percolated phase with ng=0n_{\rm g}=0 (P), a percolated phase with ng>0n_{\rm g}>0 after hybrid transitions (F1), and a percolated phase with ng>0n_{\rm g}>0 after second-order transitions (F2). It is easy to see that, points A correspond to the largest qq on hybrid transition lines, equivalently qcq_{c}, and points B correspond to the smallest qq on second-order transition lines, equivalently qtq_{t}.

We then consider our analytical framework on regular random (RR) graphs. A RR graph has a uniform degree distribution P(k)=δ(k,k0)P(k)=\delta(k,k_{0}) with k02k_{0}\geqslant 2. To generate a graph instance with a heterogeneous degree profile, we dilute a RR graph by randomly removing a fraction 1ρ1-\rho (0,1)\in(0,1) of its links. For a diluted graph instance, the mean degree is c=ρk0c=\rho k_{0} and the degree distribution is

P(k)=(k0k)ρk(1ρ)k0k.\displaystyle P(k)={k_{0}\choose k}\rho^{k}(1-\rho)^{k_{0}-k}. (10)

Results of KK-core sizes are shown in Fig.5, and a phase diagram is shown in Fig.4. Their physical picture is qualitatively similar with that on ER random graphs.

We then consider scale-free (SF) networks Barabasi.Albert-Science-1999 which follow a power-law degree distribution as P(k)kγP(k)\propto k^{-\gamma} with γ\gamma as a degree exponent. The SF property is ubiquitous in real-world datasets as a partial result of rich dynamics in network formation processes. Two typical ways to construct SF networks are the configuration model Newman.Strogatz.Watts-PRE-2001 and the static model Goh.Kahng.Kim-PRL-2001 ; Catanzaro.PastorSatorras-EPJB-2005 . Both models can generate SF networks with a wide range of degree exponents as γ>2.0\gamma>2.0. They intrinsically represent two complementary approaches to SF networks: the former empirically reflects SF property of degree profiles yet only applies to a finite graph size, while the latter approximates SF property of degrees asymptotically yet naturally offers an analytical way to tackle degree property on infinitely large SF networks.

First we consider the configuration model, which can approximately generate a graph instance with any proper degree distribution. This model first generates a degree sequence based on the given degree distribution, then assigns nodes in a null graph with degrees sampled from the degree sequence, and finally establishes proper links among nodes to constructs a network instance. The key parameters for SF networks in this model are γ\gamma as the degree exponent, NN the node size, kmink_{\rm{min}} the minimal degree of nodes, and kmaxk_{\rm{max}} the maximal degree of nodes. For simplicity, we set kmax=Nk_{\rm{max}}=\sqrt{N} to remove degree-degree correlation in networks. For an analytical result on SF network instances generated with this model, we simply read a SF network instance, count its empirical degree distribution, and feed it into our theoretical equations.

We then consider the static model to construct asymptotical SF networks. This model is generally a random process of establishing links between node pairs with probabilities proportional to their node weights following a power-law distribution. To construct a SF network with a degree exponent γ\gamma and a node size NN of a set V={1,2,,N}V=\{1,2,...,N\}, the weight of a node iVi\in V is wiiξw_{i}\propto i^{-\xi} with an intermediary parameter ξ1/(γ1)\xi\equiv 1/(\gamma-1). For γ3.0\gamma\geqslant 3.0, the degree-degree correlation in those generated networks is negligible. Static model, unlike configuration model, admits an explicitly analytical form of degree distribution for large graph instances. The degree distribution of SF networks from static model is

P(k)=1ξ[c(1ξ)]kk!Ek+1+1ξ[c(1ξ)].\displaystyle P(k)=\frac{1}{\xi}\frac{[c(1-\xi)]^{k}}{k!}{\rm E}_{-k+1+\frac{1}{\xi}}[c(1-\xi)]. (11)

The special function Ea(x){\rm E}_{a}(x) is a general exponential integral function as Ea(x)1dtextta{\rm E}_{a}(x)\equiv\int_{1}^{\infty}\mathrm{d}te^{-xt}t^{-a} with a,x>0a,x>0. For large kk, we have P(k)kγP(k)\propto k^{-\gamma}.

Results on SF networks with the two generation models are shown in Fig.6. Its physical picture is quite similar to that in ER random and RR graphs with K=2K=2, since there is no abrupt emergence of KK-cores due to the statistical property of power-law degree distributions of SF networks Dorogovtsev.Goltsev.Mendes-PRL-2006 .

We further test our model on a real-world network instance Vinayagam.etal-ScienceSignaling-2011 . The original protein interaction network is intrinsically a directed one involving both directional links (an ordered node pair as a node pointing to the other) and multi-edges (more than one directional links between an ordered node pair). To extract the underlying interaction topology of the network, we ignore directions of links and merge multi-edges between node pairs. Finally, the original network dataset reduces to an undirected network with a node size N=6339N=6339 and a link size M=32706M=32706, equivalently c10.3c\approx 10.3. To make an analytical prediction for GC of KK-core on a real-world network, just like on SF network instances generated with configuration model, we input its empirical degree distribution into the mean-field framework to calculate ngn_{g}. Results of KK-core sizes are shown in Fig.7. We can see that, even there are rich structural features in real-world networks beyond the description power of degree distribution, for the network considered here, simulation result and analytical prediction correspond very well. For the transition behavior, we can find a quite similar picture with that on SF networks and on ER random and RR graphs with K=2K=2.

V Result: A cost-benefit analysis

We present here a cost-benefit analysis of node reinforcement. A random node reinforcement leads to the benefit of an increase in GC of KK-cores ngn_{\rm g} at the cost of a fraction qq of reinforced nodes. An evaluation taking both the benefit and its cost into consideration can be a better measure of algorithm performance for different node reinforcement schemes. On a given graph instance GG with a node reinforcement fraction qq upon an initial fraction pp in KK-core percolation, we define a gain function g(q;G,p)g(q;G,p) being a benefit term b(q;G,q)b(q;G,q) minus a cost term t(q;G)t(q;G) as

g(q;G,p)=b(q;G,p)t(q;G).\displaystyle g(q;G,p)=b(q;G,p)-t(q;G). (12)

Here, GG also represents structural parameters of a graph, including degree distribution. The benefit term is defined as the increase of ngn_{g} due to node reinforcement as

b(q;G,p)=ng(q;G,p)ng(0;G,p).\displaystyle b(q;G,p)=n_{\rm g}(q;G,p)-n_{\rm g}(0;G,p). (13)

The cost term t(q,G)t(q,G) depends only on reinforced nodes and underlying graph topology. In a random node reinforcement, we consider it being polynomial of the size of reinforced nodes qq as

t(q;G)\displaystyle t(q;G) =wqα,\displaystyle=wq^{\alpha}, (14)

in which the coefficient w(>0)w(>0) is a relative weight factor between benefit and cost terms, and the dependence parameter α>0\alpha>0. In the language of economics Samuelson.Nordhaus-2010-19e , the cost term with α<1\alpha<1, α=1\alpha=1, and α>1\alpha>1 respectively corresponds to a situation with diminishing, constant, and increasing marginal cost in reinforcing nodes (simply the derivative of cost term with respect to qq).

We can see that, g(0;G,p)=0g(0;G,p)=0. Based on the above model, given an affordable maximal reinforcement fraction qM(0,1]q_{M}\in(0,1], the optimal choice of random reinforcement corresponds to qq^{\ast} with the largest gain g(q;G,p)g(q;G,p), equivalently

q=argmaxq[0,qM]g(q;G,p).\displaystyle q^{\ast}={\rm argmax}_{q\in[0,q_{M}]}g(q;G,p). (15)

Thus, Eqs.(1) - (4), (12) - (15) establish an analytical approach to locate the optimal fraction in random node reinforcement on uncorrelated random graphs. For convenience, we set qM=1q_{M}=1 in the following discussion.

In Fig.8, we show the evolution of g(q;G,p)g(q;G,p) with qq under a cost term with α=0.8\alpha=0.8 on two random graph models and a real-world network instance. Its general picture of result is straightforward. When ww(b)w\leqslant w^{(b)}, the benefit term dominates the gain function, and correspondingly q=1q^{\ast}=1. Yet when ww(c)w\geqslant w^{(c)}, the cost term dominates the gain function, and correspondingly q=0q^{\ast}=0 with g(q;G,p)=0g(q^{\ast};G,p)=0. Here, w(b)w^{(b)} and w(c)w^{(c)} are boundary parameters for different regimes of qq^{\ast}. In most cases of this result, w(b)=w(c)w^{(b)}=w^{(c)}. Yet in Fig.8 (f), when q=0.5q=0.5 and 0.550.55, q(0,1)q^{\ast}\in(0,1), signifying a nontrivial yet narrow (w(b),w(c))(w^{(b)},w^{(c)}).

In Fig.9, we show the same cases of Fig.8 with α=1\alpha=1. A quite similar scenario happens, while a clearly discernible (w(b),w(c))(w^{(b)},w^{(c)}) exists in all cases. For example, in Fig.9 (b) for ER random graphs with K=3K=3, w(b)0.3021w^{(b)}\approx 0.3021, and w(c)0.3725w^{(c)}\approx 0.3725. When w=0.31(w(b),w(c))w=0.31\in(w^{(b)},w^{(c)}), the maximal g=0.0134535g=0.0134535 when q0.606q^{\ast}\approx 0.606.

In Fig.10, we show the same cases of Fig.8 with α=1.5\alpha=1.5. We can see that w(c)w^{(c)} disappears here, equivalently w(c)+w^{(c)}\to+\infty. The reason is that for very small qq, the cost term is negligible, leading to a positive gain function, thus there is no regime of q=0q^{\ast}=0 in this case. A proper w(b)w^{(b)} still exists, and when w>w(b)w>w^{(b)}, q(0,1)q^{\ast}\in(0,1). For example, in Fig.10 (b) for ER random graphs with K=3K=3, w(b)0.2016w^{(b)}\approx 0.2016. When w=0.3(>w(b))w=0.3(>w^{(b)}), the maximal g=0.0621818g=0.0621818 when q0.490q^{\ast}\approx 0.490.

Summing the main conclusion in Figs.8 - 10, for cost terms with linear and superlinear forms, respectively cases with constant and increasing marginal costs, with an intermediate weight factor w(w(b),w(c))w\in(w^{(b)},w^{(c)}), the gain function shows a unimodality, and a nontrivial optimal reinforcement fraction q(0,1)q^{\ast}\in(0,1) can be identified from the maximal gain function with simple numerical methods.

Besides, there are two more observations. The second observation is that, for a given KK, the ER random graphs, the SF networks, and the real-world network show an increasing weight factor ww when we achieve the same maximal gain function. It partially originates from their increasing heterogeneity of degree profiles and the nontrivial higher-order structure ubiquitous in real-world networks. The third observation is that, on a given graph instance, when KK increases, the range of large gains around the maximum of gain function becomes smaller, leading to a narrower region of qq in which we can operate at a level of large gains.

We should mention here that, other than reinforcing nodes, reinforcement procedures in different natures can be defined, such as reinforcing links to join non-neighboring functioning clusters into one, or cooperatively reinforcing multiple nodes other than a single node in a reinforcement step. After choosing proper forms for cost functions in Eq.(12), a comparison of performances between different network reinforcement schemes and finding the optimal one can be carried out in a systematic and quantitative way.

VI Conclusion

In this paper, we consider how a random node reinforcement in a network reshapes its mesoscopic structure through the lens of KK-cores upon random failures. Combining our mean-field theory with simulation, we first show that random node reinforcement increases sizes of KK-cores, moves their birth points to a smaller control parameter, and smoothes a former sudden emergence of KK-cores gradually into a continuous one. We then present a cost-benefit analysis for random reinforcement scheme, and show that given a cost function with a weight factor, we can numerically find the optimal reinforcement fraction to achieve the largest gain, thus further make possible comparing various network reinforcement schemes in a single framework.

In all, our framework helps to understand how the methods to enhance network robustness affect network structure at a refined level and to develop optimal schemes for a targeted approach based on KK-core structure to build robust artificial systems.

Acknowledgements

J.-H. Zhao is supported by Guangdong Major Project of Basic and Applied Basic Research No. 2020B0301030008, Guangdong Basic and Applied Basic Research Foundation (Grant No. 2022A1515011765), and National Natural Science Foundation of China (Grant No. 12171479). Y. Hu is supported by Natural Science Foundation of Guangdong for Distinguished Youth Scholar, Guangdong Provincial Department of Science and Technology (Grant No. 2020B1515020052), Guangdong High-Level Personnel of Special Support Program, Young TopNotch Talents in Technological Innovation (Grant No. 2019TQ05X138), and National Natural Science Foundation of China (Grant No. 12275118).

Appendix

We modify Eqs.(1) - (4) in the main text as

x\displaystyle x =[q+(1q)p](1q)ps=0K2xsQ(s)(1x),\displaystyle=[q+(1-q)p]-(1-q)p\sum_{s=0}^{K-2}x^{s}Q^{(s)}(1-x), (16)
xg\displaystyle x_{\rm g} =[q+(1q)p][q+(1q)p]Q(0)(1xg)\displaystyle=[q+(1-q)p]-[q+(1-q)p]Q^{(0)}(1-x_{\rm g}) (17)
(1q)ps=0K2[xs(xxg)s]Q(s)(1x),\displaystyle-(1-q)p\sum_{s=0}^{K-2}[x^{s}-(x-x_{\rm g})^{s}]Q^{(s)}(1-x),
n\displaystyle n =[q+(1q)p](1q)ps=0K1xsP(s)(1x),\displaystyle=[q+(1-q)p]-(1-q)p\sum_{s=0}^{K-1}x^{s}P^{(s)}(1-x), (18)
ng\displaystyle n_{\rm g} =[q+(1q)p][q+(1q)p]P(0)(1xg)\displaystyle=[q+(1-q)p]-[q+(1-q)p]P^{(0)}(1-x_{\rm g}) (19)
(1q)ps=0K1[xs(xxg)s]P(s)(1x).\displaystyle-(1-q)p\sum_{s=0}^{K-1}[x^{s}-(x-x_{\rm g})^{s}]P^{(s)}(1-x).

In the above equations, we define generating functions for Q(k)Q(k) and P(k)P(k) respectively as Q(s)(x)k=s+1+Q(k)(k1s)xk1sQ^{(s)}(x)\equiv\sum_{k=s+1}^{+\infty}Q(k){k-1\choose s}x^{k-1-s} and P(s)(x)k=s+P(k)(ks)xksP^{(s)}(x)\equiv\sum_{k=s}^{+\infty}P(k){k\choose s}x^{k-s}, with s{0,1,}s\in\{0,1,\cdots\}.

References

  • (1) Scheffer M. Critical Transitions in Nature and Society (Princeton: Princeton University Press, 2009).
  • (2) Buldyrev S V, Parshani R, Paul G, Stanley H E, and Havlin S. Catastrophic cascade of failures in interdependent networks. Nature 2010; 464: 1025-8.
  • (3) Gao J, Buldyrev S V, Stanley H E, and Havlin S. Networks formed from interdependent networks. Nat Phys 2012; 8: 40-8.
  • (4) Battiston F, Amico E, Barrat A, Bianconi G, de Arruda G F, Franceschiello B, et al. The physics of higher-order interactions in complex systems. Nat Phys 2021; 17: 1093-8.
  • (5) Schneider C M, Moreira A, Anderde J S Jr., Havlin S, and Hermann H J. Mitigation of malicious attacks on networks. Proc Natl Acad Sci of USA 2011; 108: 3838-41.
  • (6) Yuan X, Hu Y, Stanley H E, and Havlin S. Eradicating catastrophic collapse in interdependent networks via reinforced nodes. Proc Natl Acad Sci of USA 2017; 114: 3311-5.
  • (7) Xie J, Yuan Y, Fan Z, Wang J, Wu J, and Hu Y. Eradicating abrupt collapse on single network with dependency groups. Chaos 2019; 29: 083111.
  • (8) Radicchi F and Bianconi G. Redundant interdependencies boost the robustness of multiplex networks. Phys Rev X 2017; 7: 011013.
  • (9) Stauffer D and Aharony A. Introduction to Percolation Theory Revised 2nd Edition (London: Taylor & Francis, 1994).
  • (10) Newman M E J. Networks 2nd Edition (New York: Oxford University Press, 2018).
  • (11) Li M, Liu R-R, Lü L, Hu M-B, Xu S, and Zhang Y-C. Percolation on complex networks: Theory and application. Phys Rep 2021; 907: 1-68.
  • (12) Albert R, Jeong H, and Barabási A-L. Error and attack tolerance of complex networks. Nature 2000; 406: 378-82.
  • (13) Cohen R, Erez K, ben-Avraham D, and Havlin S. Resilience of the Internet to random breakdowns. Phys Rev Lett 2000; 85: 4626-8.
  • (14) Callaway D S, Newman M E J, Strogatz S H and Watts D J. Network robustness and fragility: Percolation on random graphs. Phys Rev Lett 2000; 85: 5468-71.
  • (15) Dorogovtsev S N, Goltsev A V and Mendes J F F. kk-core organization of complex networks. Phys Rev Lett 2006; 96: 040601.
  • (16) Baxter G J, Dorogovtsev S N, Lee K-E, Mendes J F F and Goltsev A V. Critical dynamics of the kk-core pruning process. Phys Rev X 2015; 5: 031017.
  • (17) Carmi S, Havlin S, Kirkpatrick S, Shavitt Y and Shir E. A model of Internet topology using kk-shell decomposition. Proc Natl Acad Sci of USA 2007; 104: 11150-4.
  • (18) Zhao J-H, Zhou H-J, and Liu Y-L. Inducing effect on the percolation transition in complex networks. Nat Commun 2013; 4: 2412.
  • (19) Zhao J-H. Generalized kk-core pruning process on directed networks. J Stat Mech 2017; 063407.
  • (20) Morone F, Del Ferraro G, and Makse H. The k-core as a predictor of structural collapse in mutualistic ecosystems. Nat Phys 2019; 15: 95-102.
  • (21) Kitsak M, Gallos L K, Havlin S, Liljeros F, Muchnik L, Stanley H E and Makse H A. Identification of influential spreaders in complex networks. Nat Phys 2010; 6: 888-93.
  • (22) Xie J, Wang X, Feng L, Zhao J-H, Liu W, Moreno Y, and Hu Y. Indirect influence in social networks as an induced percolation phenomenon. Proc Natl Acad Sci of USA 2022; 119: e2100151119.
  • (23) Karp R M and Sipser M. Maximum matchings in sparse random graphs in Proceedings of the 22nd IEEE Annual Symposium on Foundations of Computer Science, pp 364-75 (Nashville USA, October 1981).
  • (24) Azimi-Tafreshi N, Osat S and Dorogovtsev S N. Generalization of core percolation on complex networks. Phys Rev E 2019; 99: 022312.
  • (25) Shang Y. Generalized k-core percolation on correlated and uncorrelated multiplex networks. Phys Rev E 2020;101: 042306.
  • (26) Shang Y. Generalized K-core Percolation in Networks with Community Structure. SIAM J Appl Math 2020; 80: 1272-89.
  • (27) Shang Y. Generalized kk-cores of networks under attack with limited knowledge. Chaos, Solitons and Fractals 2021; 152: 111305.
  • (28) Baxter G J, Dorogovtsev S N, Goltsev A V, and Mendes J F F. Heterogeneous kk-core versus bootstrap percolation on complex networks. Phys Rev E 2011; 83: 051134.
  • (29) Cellai D, Lawlor A, Dawson K A, and Glesson J P. Tricritical Point in Heterogeneous kk-Core Percolation. Phys Rev Lett 2011; 107: 175703.
  • (30) Cellai D, Lawlor A, Dawson K A, and Glesson J P. Critical phenomena in heterogeneous kk-core percolation. Phys Rev E 2013; 87:022134.
  • (31) Mézard M and Montanari A. Information, Physics, and Computation (New York: Oxford University Press, 2009).
  • (32) Bethe H A. Statistical theory of superlattices. Proc R Soc Lond A 1935; 150: 552–75.
  • (33) Kschischang F R, Frey B J and Loeliger H-A. Factor graphs and the sum-product algorithm. IEEE Trans Inf Theor 2001; 47: 498–519.
  • (34) Newman M E J, Strogatz S H and Watts D J. Random graphs with arbitrary degree distributions and their applications. Phys Rev E 2001; 64, 026118.
  • (35) Erdös P and Rényi A. On random graphs, I. Publ Math 1959; 6: 290-7.
  • (36) Erdös P and Rényi A. On the evolution of random graphs. Publ Math Inst Hung Acad Sci 1960; 5: 17-61.
  • (37) Parshani R, Buldyrev S V, and Havlin S. Interdependent Networks: Reducing the Coupling Strength Leads to a Change from a First to Second Order Percolation Transition. Phys Rev Lett 2010; 105: 048701.
  • (38) Parshani R, Buldyrev S V, and Havlin S. Critical effect of dependency groups on the function of networks. Proc Natl Acad Sci of USA 2011; 108: 1007-10.
  • (39) Baxter G J, da Costa R A, Dorogovtsev S N, and Mendes J F F. Weak percolation on multiplex networks with overlapping edges, Chaos, Solitons and Fractals 2022; 164, 112619.
  • (40) Barabási A-L and Albert R. Emergence of scaling in random networks. Science 1999; 286: 509-12.
  • (41) Goh K-I, Kahng B, and Kim D. Universal behavior of load distribution in scale-free networks. Phys Rev Lett 2001; 87: 278701.
  • (42) Catanzaro M and Pastor-Satorras R. Analytic solution of a static scale-free network model. Eur Phys J B 2005; 44: 241-8.
  • (43) Vinayagam A, Stelzl U, Foulle R, Plassmann S, Zenkner M, Timm J, et al. A directed protein interaction network for investigating intracellular signal transduction. Sci Signal 2011; 4: rs8.
  • (44) Samuelson P A and Nordhaus W D. Economics 19th Edition (New York: McGraw-Hill/Irwin, 2010).