Academic literature on the topic 'Preferential attachment'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Preferential attachment.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Preferential attachment"
Tameirão, Cinthya Rocha, Sérgio Fernando Loureiro Rezende, and Luciana Pereira de Assis. "Ligação Preferencial e Aptidão na Evolução da Rede de Filmes Brasileiros." Organizações & Sociedade 28, no. 99 (December 2021): 888–916. http://dx.doi.org/10.1590/1984-92302021v28n9907pt.
Full textJanson, Svante, Subhabrata Sen, and Joel Spencer. "Preferential attachment when stable." Advances in Applied Probability 51, no. 4 (November 15, 2019): 1067–108. http://dx.doi.org/10.1017/apr.2019.42.
Full textHaslegrave, John, and Jonathan Jordan. "Preferential attachment with choice." Random Structures & Algorithms 48, no. 4 (November 28, 2015): 751–66. http://dx.doi.org/10.1002/rsa.20616.
Full textChen, Chen. "The origin of preferential attachment and the generalized preferential attachment for weighted networks." Physica A: Statistical Mechanics and its Applications 377, no. 2 (April 2007): 709–16. http://dx.doi.org/10.1016/j.physa.2006.11.082.
Full textWu, Yan, Tom Z. J. Fu, and Dah Ming Chiu. "Generalized preferential attachment considering aging." Journal of Informetrics 8, no. 3 (July 2014): 650–58. http://dx.doi.org/10.1016/j.joi.2014.06.002.
Full textANTUNOVIĆ, TONĆI, ELCHANAN MOSSEL, and MIKLÓS Z. RÁCZ. "Coexistence in Preferential Attachment Networks." Combinatorics, Probability and Computing 25, no. 6 (February 9, 2016): 797–822. http://dx.doi.org/10.1017/s0963548315000383.
Full textde Blasio, B. F., A. Svensson, and F. Liljeros. "Preferential attachment in sexual networks." Proceedings of the National Academy of Sciences 104, no. 26 (June 19, 2007): 10762–67. http://dx.doi.org/10.1073/pnas.0611337104.
Full textGaravaglia, Alessandro, and Clara Stegehuis. "Subgraphs in preferential attachment models." Advances in Applied Probability 51, no. 03 (September 2019): 898–926. http://dx.doi.org/10.1017/apr.2019.36.
Full textLim, Chjan, and Weituo Zhang. "Relevance and Importance Preferential Attachment." Complex Systems 28, no. 3 (October 15, 2019): 333–56. http://dx.doi.org/10.25088/complexsystems.28.3.333.
Full textLehmann, S., A. D. Jackson, and B. Lautrup. "Life, death and preferential attachment." Europhysics Letters (EPL) 69, no. 2 (January 2005): 298–303. http://dx.doi.org/10.1209/epl/i2004-10331-2.
Full textDissertations / Theses on the topic "Preferential attachment"
Mönch, Christian. "Distances in preferential attachment networks." Thesis, University of Bath, 2013. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.607617.
Full textPeterson, Nicholas Richard. "On Random k-Out Graphs with Preferential Attachment." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1370527839.
Full textHébert-Dufresne, Laurent. "On the growth and structure of social systems following preferential attachment." Doctoral thesis, Université Laval, 2014. http://hdl.handle.net/20.500.11794/25331.
Full textSocial systems are notoriously unfair. In this thesis, we focus on the distribution and structure of shared resources and activities. Through this lens, their extreme inequalities tend to roughly follow a universal pattern known as scale independence which manifests itself through the absence of a characteristic scale. In physical systems, scale-independent organizations are known to occur at critical points in phase transition theory. The position of this critical behaviour being very specific, it is reasonable to expect that the distribution of a social resource might also imply specific mechanisms. This analogy is the basis of this work, whose goal is to apply tools of statistical physics to varied social activities. As a first step, we show that a system whose resource distribution is growing towards scale independence is subject to two constraints. The first is the well-known preferential attachment principle, a mathematical principle roughly stating that the rich get richer. The second is a new general form of delayed temporal scaling between the population size and the amount of available resource. These constraints pave a precise evolution path, such that even an instantaneous snapshot of a distribution is enough to reconstruct its temporal evolution and predict its future states. We validate our approach on diverse spheres of human activities ranging from scientific and artistic productivity, to sexual relations and online traffic. We then broaden our framework to not only focus on resource distribution, but to also consider the resulting structure. We thus apply our framework to the theory of complex networks which describes the connectivity structure of social, technological or biological systems. In so doing, we propose that an important class of complex systems can be modelled as a construction of potentially infinitely many levels of organization all following the same universal growth principle known as preferential attachment. We show how real complex networks can be interpreted as a projection of our model, from which naturally emerge not only their scale independence, but also their clustering or modularity, their hierarchy, their fractality and their navigability. Our results suggest that social networks can be quite simple, and that the apparent complexity of their structure is largely a reflection of the complex hierarchical nature of our world.
Chin-Lee, Jao-ke. "How to Win Ratings and Influence Reviewers: Preferential Attachment in Rating Systems." Thesis, Harvard University, 2015. http://nrs.harvard.edu/urn-3:HUL.InstRepos:14398548.
Full textYoussef, Bassant El Sayed. "Models for the Generation of Heterogeneous Complex Networks." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/54009.
Full textPh. D.
Maia, Rodrigo Filev. "Uma arquitetura de controle de qualidade de serviço aplicada a redes heterogêneas e serviços convergentes." Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-16082010-130303/.
Full textOne of the targets of the next generation communication systems is to provide access to any service, to any user, anytime, anywhere, regardless the access network technology or type of user device (mobile phone, PDA, personal computer, and so on). This scenario is called convergence of services by heterogeneous networks, and in such scenario quality of service mechanisms presented in legacy communication systems do not provide mechanisms for interoperability between communication systems nor control data flows after control admission in the border of the communication systems. The heterogeneous handover is also not handled by such QoS architectures. This thesis proposes a QoS control architecture for an heterogeneous communication systems composed by IP backbones and several access networks for several kind of technologies. This architecture is composed by a multiagent system and has controls based on the local behavior of the communication system and supported by complex systems theory. The agent decision algorithm is based on preferential attachment concept and the experimentation results indicate that agents could identify a better path to handle a data flow according to QoS parameters. The agents decided to change the path used to transmit the flow data autonomously and according to quality of service contract between user and service provider. The measurements in the test based on preferential attachment algorithm was useful in order agent change flow data path during data flow transmission to other paths with better conditions according to QoS requisites. The agent decision is based on the parameter values defined between end user and service provider. Considering the control elements from proposed architecture it was achieved end-to-end distributed control.
Dabkowski, Matthew Francis. "Using Network Science to Estimate the Cost of Architectural Growth." Diss., The University of Arizona, 2016. http://hdl.handle.net/10150/612431.
Full textZheng, Huanyang. "SOCIAL NETWORK ARCHITECTURES AND APPLICATIONS." Diss., Temple University Libraries, 2017. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/470889.
Full textPh.D.
Rather than being randomly wired together, the components of complex network systems are recently reported to represent a scale-free architecture, in which the node degree distribution follows power-law. While social networks are scale-free, it is natural to utilize their structural properties in some social network applications. As a result, this dissertation explores social network architectures, and in turn, leverages these architectures to facilitate some influence and information propagation applications. Social network architectures are analyzed in two different aspects. The first aspect focuses on the node degree snowballing effects (i.e., degree growth effects) in social networks, which is based on an age-sensitive preferential attachment model. The impact of the initial links is explored, in terms of accelerating the node degree snowballing effects. The second aspect focuses on Nested Scale-Free Architectures (NSFAs) for social networks. The scale-free architecture is a classic concept, which means that the node degree distribution follows the power-law distribution. `Nested' indicates that the scale-free architecture is preserved when low-degree nodes and their associated connections are iteratively removed. NSFA has a bounded hierarchy. Based on the social network structure, this dissertation explores two influence propagation applications for the Social Influence Maximization Problem (SIMP). The first application is a friend recommendation strategy with the perspective of social influence maximization. For the system provider, the objective is to recommend a fixed number of new friends to a given user, such that the given user can maximize his/her social influence through making new friends. This problem is proved to be NP-hard by reduction from the SIMP. A greedy friend recommendation algorithm with an approximation ratio of $1-e^{-1}$ is proposed. The second application studies the SIMP with the crowd influence, which is NP-hard, monotone, non-submodular, and inapproximable in general graphs. However, since user connections in Online Social Networks (OSNs) are not random, approximations can be obtained by leveraging the structural properties of OSNs. The modularity, denoted by $\Delta$, is proposed to measure to what degree this problem violates the submodularity. Two approximation algorithms are proposed with ratios of $\frac{1}{\Delta+2}$ and $1-e^{-1/(\Delta+1)}$, respectively. Beside the influence propagation applications, this dissertation further explores three different information propagation applications. The first application is a social network quarantine strategy, which can eliminate epidemic outbreaks with minimal isolation costs. This problem is NP-hard. An approximation algorithm with a ratio of 2 is proposed through utilizing the problem properties of feasibility and minimality. The second application is a rating prediction scheme, called DynFluid, based on the fluid dynamics. DynFluid analogizes the rating reference among the users in OSNs to the fluid flow among containers. The third application is an information cascade prediction framework: given the social current cascade and social topology, the number of propagated users at a future time slot is predicted. To reduce prediction time complexities, the spatiotemporal cascade information (a larger size of data) is decomposed to user characteristics (a smaller size of data) for subsequent predictions. All these three applications are based on the social network structure.
Temple University--Theses
Luo, Hongwei, and Hongwei luo@rmit edu au. "Modelling and simulation of large-scale complex networks." RMIT University. Mathematical and Geospatial Sciences, 2007. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20080506.142224.
Full textSantos, Bruno Vitorio dos. "Múltiplos assuntos no modelo de opiniões contínuas e ações discretas (CODA)." Universidade de São Paulo, 2013. http://www.teses.usp.br/teses/disponiveis/100/100132/tde-11122013-163456/.
Full textUnderstanding processes leading to extremism is invaluable to prevent violence outbursts. Models are useful tools that allow for identifying patterns related to those processes. Nevertheless, discrete models and bounded-confidence continuous models are unfit for studying diversion-based dynamics. We present a cultural extension of CODA model, with multiple subjects selected through a preferential attachment rule. Agents are influenced in their opinions and relevance attributed to different subjects. The most notable results of the dynamics are the establishment of local subject preferences and consensus, associated with more extreme opinions. On the other hand, there is persistence of immature undeveloped opinion in the locally less regarded subjects. The study of parametric space has shown that settings reducing the locality of interactions both increase the majority size and make opinions less extreme. Two distinct debate strategies were simulated. Zealots increase conversions when spread throughout the network. In contrast, subject avoiders decrease the number of unwanted interactions by grouping together. Some ideas for introducing media influence to the model were outlined
Books on the topic "Preferential attachment"
Newman, Mark. Models of network formation. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198805090.003.0013.
Full textCoolen, A. C. C., A. Annibale, and E. S. Roberts. Network growth algorithms. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198709893.003.0008.
Full textCoolen, Ton, Alessia Annibale, and Ekaterina Roberts. Generating Random Networks and Graphs. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198709893.001.0001.
Full textMarandiuc, Natalia. Human and Divine Love Cocreating the Self. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190674502.003.0005.
Full textBook chapters on the topic "Preferential attachment"
Berger, N., C. Borgs, J. T. Chayes, R. M. D’Souza, and R. D. Kleinberg. "Competition-Induced Preferential Attachment." In Automata, Languages and Programming, 208–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-27836-8_20.
Full textAvin, Chen, and Yuri Lotker. "De-evolution of Preferential Attachment Trees." In Complex Networks & Their Applications IX, 508–19. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-65351-4_41.
Full textJacob, Emmanuel, and Peter Mörters. "Robustness of Spatial Preferential Attachment Networks." In Lecture Notes in Computer Science, 3–14. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26784-5_1.
Full textKrot, Alexander, and Liudmila Ostroumova Prokhorenkova. "Assortativity in Generalized Preferential Attachment Models." In Lecture Notes in Computer Science, 9–21. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49787-7_2.
Full textNahum, Yinon. "Rich-Clubs in Preferential Attachment Networks." In Studies in Computational Intelligence, 67–79. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05414-4_6.
Full textPoncela Casasnovas, Julia. "Complex Networks from Evolutionary Preferential Attachment." In Evolutionary Games in Complex Topologies, 117–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30117-9_7.
Full textSwarup, Samarth, and Les Gasser. "Noisy Preferential Attachment and Language Evolution." In From Animals to Animats 9, 765–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11840541_63.
Full textSidorov, Sergei, Sergei Mironov, Igor Malinskii, and Dmitry Kadomtsev. "Local Degree Asymmetry for Preferential Attachment Model." In Complex Networks & Their Applications IX, 450–61. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-65351-4_36.
Full textAbdullah, Mohammed Amin, Michel Bode, and Nikolaos Fountoulakis. "Local Majority Dynamics on Preferential Attachment Graphs." In Lecture Notes in Computer Science, 95–106. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26784-5_8.
Full textDoerr, Benjamin, Mahmoud Fouz, and Tobias Friedrich. "Asynchronous Rumor Spreading in Preferential Attachment Graphs." In Algorithm Theory – SWAT 2012, 307–15. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31155-0_27.
Full textConference papers on the topic "Preferential attachment"
Avin, Chen, Zvi Lotker, Yinon Nahum, and David Peleg. "Random preferential attachment hypergraph." In ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3341161.3342867.
Full textDevlin, David, and Barry O'Sullivan. "Preferential Attachment in Constraint Networks." In 2009 21st IEEE International Conference on Tools with Artificial Intelligence (ICTAI). IEEE, 2009. http://dx.doi.org/10.1109/ictai.2009.91.
Full textLuczak, Tomasz, Abram Magner, and Wojciech Szpankowski. "Compression of Preferential Attachment Graphs." In 2019 IEEE International Symposium on Information Theory (ISIT). IEEE, 2019. http://dx.doi.org/10.1109/isit.2019.8849739.
Full textKunegis, Jérôme, Marcel Blattner, and Christine Moser. "Preferential attachment in online networks." In the 5th Annual ACM Web Science Conference. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2464464.2464514.
Full textAvin, Chen, Avi Cohen, Pierre Fraigniaud, Zvi Lotker, and David Peleg. "Preferential Attachment as a Unique Equilibrium." In the 2018 World Wide Web Conference. New York, New York, USA: ACM Press, 2018. http://dx.doi.org/10.1145/3178876.3186122.
Full textZhizhong, Yang, and Zhao Qinggui. "The Stability of p Preferential Attachment Networks." In 2010 International Conference on Intelligent System Design and Engineering Application (ISDEA). IEEE, 2010. http://dx.doi.org/10.1109/isdea.2010.217.
Full textZadorozhnyi, Vladimir N. "Preferential attachment random graphs with vertices losses." In 2017 International Siberian Conference on Control and Communications (SIBCON). IEEE, 2017. http://dx.doi.org/10.1109/sibcon.2017.7998456.
Full textOliva, Gabriele, and Stefano Panzieri. "Modeling real networks with deterministic preferential attachment." In Automation (MED 2011). IEEE, 2011. http://dx.doi.org/10.1109/med.2011.5983122.
Full textAtwood, James, Bruno Ribeiro, and Don Towsley. "Efficient network generation under general preferential attachment." In the 23rd International Conference. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2567948.2579357.
Full textManchanda, Saurav, Pranjul Yadav, Khoa Doan, and S. Sathiya Keerthi. "Targeted display advertising: the case of preferential attachment." In 2019 IEEE International Conference on Big Data (Big Data). IEEE, 2019. http://dx.doi.org/10.1109/bigdata47090.2019.9006184.
Full textReports on the topic "Preferential attachment"
Perumalla, Kalyan S., and Maksudul Alam. Generating Billion-Edge Scale-Free Networks in Seconds: Performance Study of a Novel GPU-based Preferential Attachment Model. Office of Scientific and Technical Information (OSTI), October 2017. http://dx.doi.org/10.2172/1399438.
Full text