Deep Learning on Graphs: a Survey
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Beta Current Flow Centrality for Weighted Networks Konstantin Avrachenkov, Vladimir Mazalov, Bulat Tsynguev
Beta Current Flow Centrality for Weighted Networks Konstantin Avrachenkov, Vladimir Mazalov, Bulat Tsynguev To cite this version: Konstantin Avrachenkov, Vladimir Mazalov, Bulat Tsynguev. Beta Current Flow Centrality for Weighted Networks. 4th International Conference on Computational Social Networks (CSoNet 2015), Aug 2015, Beijing, China. pp.216-227, 10.1007/978-3-319-21786-4_19. hal-01258658 HAL Id: hal-01258658 https://hal.inria.fr/hal-01258658 Submitted on 19 Jan 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Beta Current Flow Centrality for Weighted Networks Konstantin E. Avrachenkov1, Vladimir V. Mazalov2, Bulat T. Tsynguev3 1 INRIA, 2004 Route des Lucioles, Sophia-Antipolis, France [email protected] 2 Institute of Applied Mathematical Research, Karelian Research Center, Russian Academy of Sciences, 11, Pushkinskaya st., Petrozavodsk, Russia, 185910 [email protected] 3 Transbaikal State University, 30, Aleksandro-Zavodskaya st., Chita, Russia, 672039 [email protected] Abstract. Betweenness centrality is one of the basic concepts in the analysis of social networks. Initial definition for the betweenness of a node in a graph is based on the fraction of the number of geodesics (shortest paths) between any two nodes that given node lies on, to the total number of the shortest paths connecting these nodes. -
1. Directed Graphs Or Quivers What Is Category Theory? • Graph Theory on Steroids • Comic Book Mathematics • Abstract Nonsense • the Secret Dictionary
1. Directed graphs or quivers What is category theory? • Graph theory on steroids • Comic book mathematics • Abstract nonsense • The secret dictionary Sets and classes: For S = fX j X2 = Xg, have S 2 S , S2 = S Directed graph or quiver: C = (C0;C1;@0 : C1 ! C0;@1 : C1 ! C0) Class C0 of objects, vertices, points, . Class C1 of morphisms, (directed) edges, arrows, . For x; y 2 C0, write C(x; y) := ff 2 C1 j @0f = x; @1f = yg f 2C1 tail, domain / @0f / @1f o head, codomain op Opposite or dual graph of C = (C0;C1;@0;@1) is C = (C0;C1;@1;@0) Graph homomorphism F : D ! C has object part F0 : D0 ! C0 and morphism part F1 : D1 ! C1 with @i ◦ F1(f) = F0 ◦ @i(f) for i = 0; 1. Graph isomorphism has bijective object and morphism parts. Poset (X; ≤): set X with reflexive, antisymmetric, transitive order ≤ Hasse diagram of poset (X; ≤): x ! y if y covers x, i.e., x 6= y and [x; y] = fx; yg, so x ≤ z ≤ y ) z = x or z = y. Hasse diagram of (N; ≤) is 0 / 1 / 2 / 3 / ::: Hasse diagram of (f1; 2; 3; 6g; j ) is 3 / 6 O O 1 / 2 1 2 2. Categories Category: Quiver C = (C0;C1;@0 : C1 ! C0;@1 : C1 ! C0) with: • composition: 8 x; y; z 2 C0 ; C(x; y) × C(y; z) ! C(x; z); (f; g) 7! g ◦ f • satisfying associativity: 8 x; y; z; t 2 C0 ; 8 (f; g; h) 2 C(x; y) × C(y; z) × C(z; t) ; h ◦ (g ◦ f) = (h ◦ g) ◦ f y iS qq <SSSS g qq << SSS f qqq h◦g < SSSS qq << SSS qq g◦f < SSS xqq << SS z Vo VV < x VVVV << VVVV < VVVV << h VVVV < h◦(g◦f)=(h◦g)◦f VVVV < VVV+ t • identities: 8 x; y; z 2 C0 ; 9 1y 2 C(y; y) : 8 f 2 C(x; y) ; 1y ◦ f = f and 8 g 2 C(y; z) ; g ◦ 1y = g f y o x MM MM 1y g MM MMM f MMM M& zo g y Example: N0 = fxg ; N1 = N ; 1x = 0 ; 8 m; n 2 N ; n◦m = m+n ; | one object, lots of arrows [monoid of natural numbers under addition] 4 x / x Equation: 3 + 5 = 4 + 4 Commuting diagram: 3 4 x / x 5 ( 1 if m ≤ n; Example: N1 = N ; 8 m; n 2 N ; jN(m; n)j = 0 otherwise | lots of objects, lots of arrows [poset (N; ≤) as a category] These two examples are small categories: have a set of morphisms. -
General Approach to Line Graphs of Graphs 1
DEMONSTRATIO MATHEMATICA Vol. XVII! No 2 1985 Antoni Marczyk, Zdzislaw Skupien GENERAL APPROACH TO LINE GRAPHS OF GRAPHS 1. Introduction A unified approach to the notion of a line graph of general graphs is adopted and proofs of theorems announced in [6] are presented. Those theorems characterize five different types of line graphs. Both Krausz-type and forbidden induced sub- graph characterizations are provided. So far other authors introduced and dealt with single spe- cial notions of a line graph of graphs possibly belonging to a special subclass of graphs. In particular, the notion of a simple line graph of a simple graph is implied by a paper of Whitney (1932). Since then it has been repeatedly introduc- ed, rediscovered and generalized by many authors, among them are Krausz (1943), Izbicki (1960$ a special line graph of a general graph), Sabidussi (1961) a simple line graph of a loop-free graph), Menon (1967} adjoint graph of a general graph) and Schwartz (1969; interchange graph which coincides with our line graph defined below). In this paper we follow another way, originated in our previous work [6]. Namely, we distinguish special subclasses of general graphs and consider five different types of line graphs each of which is defined in a natural way. Note that a similar approach to the notion of a line graph of hypergraphs can be adopted. We consider here the following line graphsi line graphs, loop-free line graphs, simple line graphs, as well as augmented line graphs and augmented loop-free line graphs. - 447 - 2 A. Marczyk, Z. -
Graph Theory
1 Graph Theory “Begin at the beginning,” the King said, gravely, “and go on till you come to the end; then stop.” — Lewis Carroll, Alice in Wonderland The Pregolya River passes through a city once known as K¨onigsberg. In the 1700s seven bridges were situated across this river in a manner similar to what you see in Figure 1.1. The city’s residents enjoyed strolling on these bridges, but, as hard as they tried, no residentof the city was ever able to walk a route that crossed each of these bridges exactly once. The Swiss mathematician Leonhard Euler learned of this frustrating phenomenon, and in 1736 he wrote an article [98] about it. His work on the “K¨onigsberg Bridge Problem” is considered by many to be the beginning of the field of graph theory. FIGURE 1.1. The bridges in K¨onigsberg. J.M. Harris et al., Combinatorics and Graph Theory , DOI: 10.1007/978-0-387-79711-3 1, °c Springer Science+Business Media, LLC 2008 2 1. Graph Theory At first, the usefulness of Euler’s ideas and of “graph theory” itself was found only in solving puzzles and in analyzing games and other recreations. In the mid 1800s, however, people began to realize that graphs could be used to model many things that were of interest in society. For instance, the “Four Color Map Conjec- ture,” introduced by DeMorgan in 1852, was a famous problem that was seem- ingly unrelated to graph theory. The conjecture stated that four is the maximum number of colors required to color any map where bordering regions are colored differently. -
An Application of Graph Theory in Markov Chains Reliability Analysis
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by DSpace at VSB Technical University of Ostrava STATISTICS VOLUME: 12 j NUMBER: 2 j 2014 j JUNE An Application of Graph Theory in Markov Chains Reliability Analysis Pavel SKALNY Department of Applied Mathematics, Faculty of Electrical Engineering and Computer Science, VSB–Technical University of Ostrava, 17. listopadu 15/2172, 708 33 Ostrava-Poruba, Czech Republic [email protected] Abstract. The paper presents reliability analysis which the production will be equal or greater than the indus- was realized for an industrial company. The aim of the trial partner demand. To deal with the task a Monte paper is to present the usage of discrete time Markov Carlo simulation of Discrete time Markov chains was chains and the flow in network approach. Discrete used. Markov chains a well-known method of stochastic mod- The goal of this paper is to present the Discrete time elling describes the issue. The method is suitable for Markov chain analysis realized on the system, which is many systems occurring in practice where we can easily not distributed in parallel. Since the analysed process distinguish various amount of states. Markov chains is more complicated the graph theory approach seems are used to describe transitions between the states of to be an appropriate tool. the process. The industrial process is described as a graph network. The maximal flow in the network cor- Graph theory has previously been applied to relia- responds to the production. The Ford-Fulkerson algo- bility, but for different purposes than we intend. -
P2k-Factorization of Complete Bipartite Multigraphs
P2k-factorization of complete bipartite multigraphs Beiliang Du Department of Mathematics Suzhou University Suzhou 215006 People's Republic of China Abstract We show that a necessary and sufficient condition for the existence of a P2k-factorization of the complete bipartite- multigraph )"Km,n is m = n == 0 (mod k(2k - l)/d), where d = gcd()", 2k - 1). 1. Introduction Let Km,n be the complete bipartite graph with two partite sets having m and n vertices respectively. The graph )"Km,n is the disjoint union of ).. graphs each isomorphic to Km,n' A subgraph F of )"Km,n is called a spanning subgraph of )"Km,n if F contains all the vertices of )"Km,n' It is clear that a graph with no isolated vertices is uniquely determined by the set of its edges. So in this paper, we consider a graph with no isolated vertices to be a set of 2-element subsets of its vertices. For positive integer k, a path on k vertices is denoted by Pk. A Pk-factor of )'Km,n is a spanning subgraph F of )"Km,n such that every component of F is a Pk and every pair of Pk's have no vertex in common. A Pk-factorization of )"Km,n is a set of edge-disjoint Pk-factors of )"Km,n which is a partition of the set of edges of )'Km,n' (In paper [4] a Pk-factorization of )"Km,n is defined to be a resolvable (m, n, k,)..) bipartite Pk design.) The multigraph )"Km,n is called Ph-factorable whenever it has a Ph-factorization. -
Trees and Graphs
Module 8: Trees and Graphs Theme 1: Basic Properties of Trees A (rooted) tree is a finite set of nodes such that ¯ there is a specially designated node called the root. ¯ d Ì ;Ì ;::: ;Ì ½ ¾ the remaining nodes are partitioned into disjoint sets d such that each of these Ì ;Ì ;::: ;Ì d ½ ¾ sets is a tree. The sets d are called subtrees,and the degree of the root. The above is an example of a recursive definition, as we have already seen in previous modules. A Ì Ì Ì B C ¾ ¿ Example 1: In Figure 1 we show a tree rooted at with three subtrees ½ , and rooted at , and D , respectively. We now introduce some terminology for trees: ¯ A tree consists of nodes or vertices that store information and often are labeled by a number or a letter. In Figure 1 the nodes are labeled as A;B;:::;Å. ¯ An edge is an unordered pair of nodes (usually denoted as a segment connecting two nodes). A; B µ For example, ´ is an edge in Figure 1. A ¯ The number of subtrees of a node is called its degree. For example, node is of degree three, while node E is of degree two. The maximum degree of all nodes is called the degree of the tree. Ã ; Ä; F ; G; Å ; Á Â ¯ A leaf or a terminal node is a node of degree zero. Nodes and are leaves in Figure 1. B ¯ A node that is not a leaf is called an interior node or an internal node (e.g., see nodes and D ). -
Sphere-Cut Decompositions and Dominating Sets in Planar Graphs
Sphere-cut Decompositions and Dominating Sets in Planar Graphs Michalis Samaris R.N. 201314 Scientific committee: Dimitrios M. Thilikos, Professor, Dep. of Mathematics, National and Kapodistrian University of Athens. Supervisor: Stavros G. Kolliopoulos, Dimitrios M. Thilikos, Associate Professor, Professor, Dep. of Informatics and Dep. of Mathematics, National and Telecommunications, National and Kapodistrian University of Athens. Kapodistrian University of Athens. white Lefteris M. Kirousis, Professor, Dep. of Mathematics, National and Kapodistrian University of Athens. Aposunjèseic sfairik¸n tom¸n kai σύνοla kuriarqÐac se epÐpeda γραφήματa Miχάλης Σάμαρης A.M. 201314 Τριμελής Epiτροπή: Δημήτρioc M. Jhlυκός, Epiblèpwn: Kajhγητής, Tm. Majhmatik¸n, E.K.P.A. Δημήτρioc M. Jhlυκός, Staύρoc G. Kolliόποuloc, Kajhγητής tou Τμήμatoc Anaπληρωτής Kajhγητής, Tm. Plhroforiκής Majhmatik¸n tou PanepisthmÐou kai Thl/ni¸n, E.K.P.A. Ajhn¸n Leutèrhc M. Kuroύσης, white Kajhγητής, Tm. Majhmatik¸n, E.K.P.A. PerÐlhyh 'Ena σημαντικό apotèlesma sth JewrÐa Γραφημάτwn apoteleÐ h apόdeixh thc eikasÐac tou Wagner από touc Neil Robertson kai Paul D. Seymour. sth σειρά ergasi¸n ‘Ελλάσσοna Γραφήματα’ apo to 1983 e¸c to 2011. H eikasÐa αυτή lèei όti sthn κλάση twn γραφημάtwn den υπάρχει άπειρη antialusÐda ¸c proc th sqèsh twn ελλασόnwn γραφημάτwn. H JewrÐa pou αναπτύχθηκε gia thn απόδειξη αυτής thc eikasÐac eÐqe kai èqei ακόμα σημαντικό antÐktupo tόσο sthn δομική όσο kai sthn algoriθμική JewrÐa Γραφημάτwn, άλλα kai se άλλα pedÐa όπως h Παραμετρική Poλυπλοκόthta. Sta πλάιsia thc απόδειξης oi suggrafeÐc eiσήγαγαν kai nèec paramètrouc πλά- touc. Se autèc ήτan h κλαδοαποσύνθεση kai to κλαδοπλάτoc ενός γραφήματoc. H παράμετρος αυτή χρησιμοποιήθηκε idiaÐtera sto σχεδιασμό algorÐjmwn kai sthn χρήση thc τεχνικής ‘διαίρει kai basÐleue’. -
Modeling Multiple Relationships in Social Networks
Asim AnsAri, Oded KOenigsberg, and FlOriAn stAhl * Firms are increasingly seeking to harness the potential of social networks for marketing purposes. therefore, marketers are interested in understanding the antecedents and consequences of relationship formation within networks and in predicting interactivity among users. the authors develop an integrated statistical framework for simultaneously modeling the connectivity structure of multiple relationships of different types on a common set of actors. their modeling approach incorporates several distinct facets to capture both the determinants of relationships and the structural characteristics of multiplex and sequential networks. they develop hierarchical bayesian methods for estimation and illustrate their model with two applications: the first application uses a sequential network of communications among managers involved in new product development activities, and the second uses an online collaborative social network of musicians. the authors’ applications demonstrate the benefits of modeling multiple relations jointly for both substantive and predictive purposes. they also illustrate how information in one relationship can be leveraged to predict connectivity in another relation. Keywords : social networks, online networks, bayesian, multiple relationships, sequential relationships modeling multiple relationships in social networks The rapid growth of online social networks has led to a social commerce (Stephen and Toubia 2010; Van den Bulte resurgence of interest in the marketing -
Graph Algorithms in Bioinformatics an Introduction to Bioinformatics Algorithms Outline
An Introduction to Bioinformatics Algorithms www.bioalgorithms.info Graph Algorithms in Bioinformatics An Introduction to Bioinformatics Algorithms www.bioalgorithms.info Outline 1. Introduction to Graph Theory 2. The Hamiltonian & Eulerian Cycle Problems 3. Basic Biological Applications of Graph Theory 4. DNA Sequencing 5. Shortest Superstring & Traveling Salesman Problems 6. Sequencing by Hybridization 7. Fragment Assembly & Repeats in DNA 8. Fragment Assembly Algorithms An Introduction to Bioinformatics Algorithms www.bioalgorithms.info Section 1: Introduction to Graph Theory An Introduction to Bioinformatics Algorithms www.bioalgorithms.info Knight Tours • Knight Tour Problem: Given an 8 x 8 chessboard, is it possible to find a path for a knight that visits every square exactly once and returns to its starting square? • Note: In chess, a knight may move only by jumping two spaces in one direction, followed by a jump one space in a perpendicular direction. http://www.chess-poster.com/english/laws_of_chess.htm An Introduction to Bioinformatics Algorithms www.bioalgorithms.info 9th Century: Knight Tours Discovered An Introduction to Bioinformatics Algorithms www.bioalgorithms.info 18th Century: N x N Knight Tour Problem • 1759: Berlin Academy of Sciences proposes a 4000 francs prize for the solution of the more general problem of finding a knight tour on an N x N chessboard. • 1766: The problem is solved by Leonhard Euler (pronounced “Oiler”). • The prize was never awarded since Euler was Director of Mathematics at Berlin Academy and was deemed ineligible. Leonhard Euler http://commons.wikimedia.org/wiki/File:Leonhard_Euler_by_Handmann.png An Introduction to Bioinformatics Algorithms www.bioalgorithms.info Introduction to Graph Theory • A graph is a collection (V, E) of two sets: • V is simply a set of objects, which we call the vertices of G. -
Graph Theory Approach to the Vulnerability of Transportation Networks
algorithms Article Graph Theory Approach to the Vulnerability of Transportation Networks Sambor Guze Department of Mathematics, Gdynia Maritime University, 81-225 Gdynia, Poland; [email protected]; Tel.: +48-608-034-109 Received: 24 November 2019; Accepted: 10 December 2019; Published: 12 December 2019 Abstract: Nowadays, transport is the basis for the functioning of national, continental, and global economies. Thus, many governments recognize it as a critical element in ensuring the daily existence of societies in their countries. Those responsible for the proper operation of the transport sector must have the right tools to model, analyze, and optimize its elements. One of the most critical problems is the need to prevent bottlenecks in transport networks. Thus, the main aim of the article was to define the parameters characterizing the transportation network vulnerability and select algorithms to support their search. The parameters proposed are based on characteristics related to domination in graph theory. The domination, edge-domination concepts, and related topics, such as bondage-connected and weighted bondage-connected numbers, were applied as the tools for searching and identifying the bottlenecks in transportation networks. Furthermore, the algorithms for finding the minimal dominating set and minimal (maximal) weighted dominating sets are proposed. This way, the exemplary academic transportation network was analyzed in two cases: stationary and dynamic. Some conclusions are presented. The main one is the fact that the methods given in this article are universal and applicable to both small and large-scale networks. Moreover, the approach can support the dynamic analysis of bottlenecks in transport networks. Keywords: vulnerability; domination; edge-domination; transportation networks; bondage-connected number; weighted bondage-connected number 1. -
Graph Theory: Network Flow
University of Washington Math 336 Term Paper Graph Theory: Network Flow Author: Adviser: Elliott Brossard Dr. James Morrow 3 June 2010 Contents 1 Introduction ...................................... 2 2 Terminology ...................................... 2 3 Shortest Path Problem ............................... 3 3.1 Dijkstra’sAlgorithm .............................. 4 3.2 ExampleUsingDijkstra’sAlgorithm . ... 5 3.3 TheCorrectnessofDijkstra’sAlgorithm . ...... 7 3.3.1 Lemma(TriangleInequalityforGraphs) . .... 8 3.3.2 Lemma(Upper-BoundProperty) . 8 3.3.3 Lemma................................... 8 3.3.4 Lemma................................... 9 3.3.5 Lemma(ConvergenceProperty) . 9 3.3.6 Theorem (Correctness of Dijkstra’s Algorithm) . ....... 9 4 Maximum Flow Problem .............................. 10 4.1 Terminology.................................... 10 4.2 StatementoftheMaximumFlowProblem . ... 12 4.3 Ford-FulkersonAlgorithm . .. 12 4.4 Example Using the Ford-Fulkerson Algorithm . ..... 13 4.5 The Correctness of the Ford-Fulkerson Algorithm . ........ 16 4.5.1 Lemma................................... 16 4.5.2 Lemma................................... 16 4.5.3 Lemma................................... 17 4.5.4 Lemma................................... 18 4.5.5 Lemma................................... 18 4.5.6 Lemma................................... 18 4.5.7 Theorem(Max-FlowMin-CutTheorem) . 18 5 Conclusion ....................................... 19 1 1 Introduction An important study in the field of computer science is the analysis of networks. Internet service providers (ISPs), cell-phone companies, search engines, e-commerce sites, and a va- riety of other businesses receive, process, store, and transmit gigabytes, terabytes, or even petabytes of data each day. When a user initiates a connection to one of these services, he sends data across a wired or wireless network to a router, modem, server, cell tower, or perhaps some other device that in turn forwards the information to another router, modem, etc. and so forth until it reaches its destination.