P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

The following pages contain scaled artwork proofs and are intended primarily for your review of figure/illustration sizing and overall quality. The bounding box shows the type area dimensions defined by the design specification for your book. The figures are not necessarily placed as they will appear with the text in page proofs. Design specification and page makeup parameters determine actual figure placement relative to callouts on actual page proofs, which you will review later. If you are viewing these art proofs as hard-copy printouts rather than as a PDF file, please note the pages were printed at 600 dpi on a laser printer. You should be able to adequately judge if there are any substantial quality problems with the artwork, but also note that the overall quality of the artwork in the finished bound book will be better because of the much higher resolution of the book printing process. You will be reviewing copyedited manuscript/typescript for your book, so please refrain from marking editorial changes or corrections to the captions on these pages; defer caption corrections until you review copyedited manuscript. The captions here are intended simply to confirm the correct images are present. Please be as specific as possible in your markup or comments to the artwork proofs.

0 P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

1

27 23 15

10 20

16 4 31 13 11 30 34 14 6

1 12 17 9 21 33 7 29 3 18 5

22 19 2 28 25 8 24 32

26

Figure 1.1. The of friendships within a 34-person karate club [409]. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

2

Figure 1.2. Social networks based on communication and interaction can also be constructed from the traces left by on-line data. In this case, the pattern of e- mail communication among 436 employees of Hewlett Packard Research Lab is su- perimposed on the official organizational hierarchy [6]. (Image from http://www- personal.umich.edu/ ladamic/img/hplabsemailhierarchy.jpg) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

3

GSCC

GWCC

GIN GOUT

DC

Tendr il

Figure 1.3. The network of loans among financial institutions can be used to analyze the roles that different participants play in the financial system, and how the interactions among these roles affect the health of individual participants and the system as a whole The network here is annotated in a way that reveals its dense core, according to a scheme we will encounter in Chapter 13. (Image from Bech and Atalay [49].) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

4

Figure 1.4. The links among Web pages can reveal densely-knit communities and prominent sites. In this case, the network structure of political blogs prior to the 2004 U.S. Presiden- tial election reveals two natural and well-separated clusters [5]. (Image from http://www- personal.umich.edu/ ladamic/img/politicalblogs.jpg) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

5

Search volume for YouTube Google Trends

2.0

1.0

2006 2007 2008

Figure 1.5. The rapidly growing popularity of YouTube is characteristic of the way in which new products, technologies, or innovations rise to prominence, through feedback effects in the behavior of many individuals across a population. The plot depicts the number of Google queries for YouTube over time. The image comes from the site Google Trends (http://www.google.com/trends?q=youtube); by design, the units on the y-axis are suppressed in the output from this site. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

6

Search volume for Flickr

2.0

1.0

2005 2006 2007 2008

Figure 1.6. This companion to Figure 1.5 shows the rise of the site Flickr; the growth in popularity has a very similar pattern to that of other sites including YouTube. (Image from Google Trends, http://www.google.com/trends?q=flickr) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

7

27 23 15

10 20

16 4 31 13 11 30 34 14 6

1 12 17 9 21 33 7 29 3 18 5

22 19 28 2 25 8 24 32

26

Figure 1.7. From the social network of friendships in the karate club from Figure 1.1, we can find clues to the latent schism that eventually split the group into two separate clubs (indicated by the two different shadings of individuals in the picture). P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

8

MEX BRA USA World Trade 1994 CAN Residuals Model 1 2.33 1.77 1.21 0.65 0.09 -0.46 -1.02 -1.58 -2.14 -2.71

1272226 65 125 190238

IRL FRA ESP GBR JPN NOR

NLD SWE CHN KOR CHE AUS DNK FIN ITA AUT HKG

THA

SAU

IDN SGP MYS © Lothar Krempel, Max Planck Institute for the Study of Societies, Cologne the Study of Societies, Institute for © Lothar Krempel, Max Planck

Figure 1.8. In a network representing international trade, one can look for countries that occupy powerful positions and derive economic benefits from these positions [258]. (Image from http://www.cmu.edu/joss/content/articles/volume4/KrempelPlumper.html) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

9

20 15 10 5 0 5 10 15 20 25 30 35 40 45 5055 60 Bergen Oslo

Reval Novogorod

Berwick Visby Riga 50 York

Chester

Lübeck Danzig London Hamburg Southampton

Bruges Cologne Leipzig Frankfurt 45 Erfurt Crakow Kiev Paris Prague Lvov

Augsburg Basel Budapest Vienna Bordeaux Lyon Akkerman Santiago Milan Venice Caffa 40 Genoa Beograd Marseilles Florence

Lisbon Barcelona Ragusa Trebizond Toledo Rome Valencia Constantinople Naples Cordova Palma 35 Cadiz Corfu

Messina Algiers Tunis Antioch

Rhodes Famagusta

Canea Tyre 30

Tripoli

Alexandria

Figure 1.9. In some settings, such as this map of Medieval trade routes, phys- ical networks constrain the patterns of interaction, giving certain participants an intrinsic economic advantage based on their network position. (Image from http://upload.wikimedia.org/wikipedia/commons/e/e1/Late Medieval Trade Routes.jpg.) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

10

Search Volume Index Google Tr

2.00

1.00

0 2004 2005 2006 2007 2008

Figure 1.10. Cascading adoption of a new technology or service (in this case, the social- networking site MySpace in 2005-2006) can be the result of individual incentives to use the most widespread technology — either based on the informational effects of seeing many other people adopt the technology, or the direct benefits of adopting what many others are already using. (Image from Google Trends, http://www.google.com/trends?q=myspace) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

11

Figure 1.11. When people are influenced by the behaviors their neighbors in the network, the adoption of a new product or innovation can cascade through the network structure. Here, e-mail recommendations for a Japanese graphic novel spread in a kind of informational or social contagion. (Image from Leskovec et al. [267].) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

12

Figure 1.12. The spread of an epidemic disease (such as the tuberculosis outbreak shown here) is another form of cascading behavior in a network. The similarities and contrasts between biological and social contagion lead to interesting research questions. (Image from Andre et al. [17].) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

13

100

90

80

70

60

50

40

30

20

10

0 16-Jul-08 01-Oct-07 19-Oct-07 17-Apr-08 14-Oct-08 18-Jan-08 10-Jun-08 28-Jun-08 05-Feb-08 23-Feb-08 12-Mar-08 30-Mar-08 03-Aug-08 21-Aug-08 07-Nov-07 25-Nov-07 07-Nov-08 13-Dec-07 31-Dec-07 08-Sep-08 26-Sep-08 05-May-08 23-May-08

Figure 1.13. Prediction markets, as well as markets for financial assets such as stocks, can synthesize individual beliefs about future events into a price that captures the ag- gregate of these beliefs. The plot here depicts the varying price over time for two as- sets that paid $1 in the respective events that the Democratic or Republican nom- inee won the 2008 U.S. Presidential election. (Image from Iowa Electronic Markets, http://iemweb.biz.uiowa.edu/graphs/graph PRES08 WTA.cfm.) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

14

A A

B B

C D C D

(a) (b)

Figure 2.1. Two graphs: (a) an undirected graphs, and (b) a directed graph. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

15

LINCOLN MIT

CASE BBN UTAH SRI HARVARD STANFORD CARNEGIE

UCLA

UCSB SDC

RAND

Figure 2.2. A network depicting the sites on the Internet, then known as the Arpanet, in December 1970. (Image from F. Heart, A. McKenzie, J. McQuillian, and D. Walden [212]; on-line at http://som.csudh.edu/cis/lpress/history/arpamaps/.) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

16

SRI UTAH LINC

MIT CASE

UCSB STAN SDC

BBN CARN

UCLA RAND HARV

Figure 2.3. An alternate drawing of the 13-node Internet graph from December 1970. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

17

(a) (b)

(c) (d)

Figure 2.4. Images of graphs arising in different domains. The depictions of airline and sub- way systems in (a) and (b) are examples of transportation networks, in which nodes are destinations and edges represent direct connections. Much of the terminology surrounding graphs derives from metaphors based on transportation through a network of roads, rail lines, or airline flights. The prerequisites among college courses in (c) is an example of a depen- dency network, in which nodes are tasks and directed edges indicate that one task must be performed before another. The design of complex software systems and industrial pro- cesses often requires the analysis of enormous dependency networks, with important con- sequences for efficient scheduling in these settings. The sculptural art in (d) is an example of a structural network, with joints as nodes and physical linkages as edges. The internal frameworks of mechanical structures such as buildings, vehicles, or human bodies are based on such networks, and the area of rigidity theory, at the intersection of geometry and me- chanical engineering, studies the stability of such structures from a graph-based perspective [382]. (Images: (a) www.airlineroutemaps.com/USA/Northwest Airlines asia pacific.shtml, (b) www.wmata.com/metrorail/systemmap.cfm, (c) www.cs.cornell.edu/ugrad/flowchart.htm, (d) www.stormking.org/free ride home.htm.) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

18

D C A

E B F

G H

M J I L

K

Figure 2.5. A graph with three connected components. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

19

Figure 2.6. The collaboration graph of the biological research center Structural Genomics of Pathogenic Protozoa (SGPP) [133], which consists of three distinct connected components. This graph was part of a comparative study of the collaboration patterns graphs of nine research centers supported by NIH’s Protein Structure Initiative; SGPP was an intermediate case between centers whose collaboration graph was connected and those for which it was fragmented into many small components. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

20

2

12 9

63

Male Female

Figure 2.7. A network in which the nodes are students in a large American high school, and an edge joins two who had a romantic relationship at some point during the 18-month period in which the study was conducted [48]. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

21

you

distance 1 your friends

distance 2 friends of friends

distance 3 friends of friends of friends

all nodes, not already discovered, that have an edge to some node in the previous layer

Figure 2.8. Breadth-first search discovers distances to nodes one “layer” at a time; each layer is built of nodes that have an edge to at least one node in the previous layer. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

22

MIT

distance 1 UTAH BBN LINC

CASE distance 2 SRI SDC RAND HARV

CARN distance 3 UCSB STAN UCLA

Figure 2.9. The layers arising from a breadth-first of the December 1970 Arpanet, starting at the node mit. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

23

20

15

N = 64 10 NUMBER OF CHAINS

5

0 0 123456 7 8 9 10 11 12 NUMBER OF INTERMEDIARIES

Figure 2.10. A histogram from Travers and Milgram’s paper on their small-world experiment [385]. For each possible length (labeled “number of intermediaries” on the x-axis), the plot shows the number of successfully completed chains of that length. In total, 64 chains reached the target person, with a median length of six. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

24

100

− 10 2

− 10 4

− 10 6

p(l) (Probability) − 10 8

− 10 10

− 10 12 0 5 10 15 20 25 30 l, (Path length in hops)

Figure 2.11. The distribution of distances in the graph of all active Microsoft Instant Messenger user accounts, with an edge joining two users if they communicated at least once during a month-long observation period [269]. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

25

Figure 2.12. Ron Graham’s hand-drawn picture of a part of the mathematics collaboration graph, centered on Paul Erdos¨ [188]. (Image from http://www.oakland.edu/enp/cgraph.jpg) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

26

E A

F B

C D

Figure 2.13. In this example, node B is pivotal for two pairs: the pair consisting of A and C, and the pair consisting of A and D. On the other hand, node D is not pivotal for any pairs. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

27

B E

D A

C F

Figure 2.14. Node A is a gatekeeper. Node D is a local gatekeeper but not a gatekeeper. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

28

G G B B

F C F C

A A

E D E D

(a) (b)

Figure 3.1. The formation of the edge between B and C illustrates the effects of , since they have a common neighbor A. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

29

G G B B

F C F C

A A

E D E D

(a) (b)

Figure 3.2. If we watch a network for a longer span of time, we can see multiple edges forming — some form through triadic closure while others (such as the D-G edge) form even though the two endpoints have no neighbors in common. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

30

C A B

D E

Figure 3.3. The A-B edge is a , meaning that its removal would place A and B in distinct connected components. Bridges provide nodes with access to parts of the network that are unreachable by other means. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

31

J G K

F H

C A B

D E

Figure 3.4. The A-B edge is a local bridge of span 4, since the removal of this edge would increase the distance between A and B to 4. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

32

J S G W K

S S W S

F H

W W W W

C S A W B S

S S S S S S S S

D W E W

Figure 3.5. Each edge of the social network from Figure 3.4 is labeled here as either a strong tie (S)oraweak tie (W), to indicate the strength of the relationship. The labeling in the figure satisfies the Strong Triadic Closure Property at each node: if the node has strong ties to two neighbors, then these neighbors must have at least a weak tie between them. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

33

Strong Triadic Closure says the B-C edge must exist, but the definition of a local bridge says it cannot. C

S

A S B

Figure 3.6. If a node satifies Strong Triadic Closure and is involved in at least two strong ties, then any local bridge it is involved in must be a weak tie. The figure illustrates the reason why: if the A-B edge is a strong tie, then there must also be an edge between B and C, meaning that the A-B edge cannot be a local bridge. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

34

0.2

0.15 w > O < 0.1

0.05

0 0 0.2 0.4 0.6 0.8 1

Pcum(w)

Figure 3.7. A plot of the neighborhood overlap of edges as a function of their percentile in the sorted order of all edges by tie strength. The fact that overlap increases with increasing tie strength is consistent with the theoretical predictions from Section 3.2. (Image from [328].) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

35

Figure 3.8. Four different views of a Facebook user’s network neighborhood, showing the struc- ture of links coresponding respectively to all declared friendships, maintained relationships, one-way communication, and reciprocal (i.e. mutual) communication. (Image from [281].) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

36

Active Network Sizes

Maintained Relationships

40 One-way communication Reciprocal communication

30

20 # of People

10

0

0 100 200 300 400 500 Network Size

Figure 3.9. The number of links corresponding to maintained relationships, one-way commu- nication, and reciprocal communication as a function of the total neighborhood size for users on Facebook. (Image from [281].) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

37

45

40

35

30

25

20

Number of Friends 15

10

5

0 0 200 400 600 800 1000 1200 Number of followees

Figure 3.10. The total number of a user’s strong ties (defined by multiple directed messages) as a function of the number of followees he or she has on Twitter. (Image from [218].) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

38

C

E

B

A

D

F

Figure 3.11. The contrast between densely-knit groups and boundary-spanning links is re- flected in the different positions of nodes A and B in the underyling social network. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

39

Stadler Fell Gleiss

Mukherjee Sreeram Wagner Lassig Dasgupta ChatterjeeChakrabarti Manna Sienkiewicz Berg Sen Fronczak Selman Herrmann Pacheco Penna Holyst Monasson Jedynak GomezWeigt Aleksiejuk Stauffer Zecchina Moukarzel Valverde Barrat Pecora MorenoLeone Szabo Kaski Giacometti Vazquez Vilone Ferrer i Cancho Boguna Lahtinen Barahona Alava Kertesz Sole Maritan Andrade FlamminiVespignani Girvan Rinaldo BarthelemyMoreira Strogatz Kepler Pastor-Satorras Castellano Scala RubiBanavar Callaway Caldarelli Stanley Rozenfeld Cabrales Hopcroft Havlin Guimera Watts Smith Munoz Erez Rothman Cohen Amaral Danon Kleinberg Dodds Bianconi Arenas Newman Capocci Ben-Avraham Camacho Zaliznyak Schwartz SomeraBarabasi Edling Mongru Liljeros Simonsen Moore Leyvraz Rajagopalan Ravasz Redner Tadic Sneppen Oltvai FarkasVicsek Rodgers Maslov Park Podani Krapivsky Yook Albert Kim Neda Kahng Vazquez Eriksen SzathmaryMasonTombor Ergun Jeong Schuster HolmeKim Mendes Bornholdt Dorogovtsev Choi KimOh Klemm HussHan Goh Yoon Minnhagen Goltsev Eguiluz Davidsen Hong Samukhin Trusina Stroud EbelMielsch

Kulkarni Almaas

Figure 3.12. A co-authorship network of physicists and applied mathematicians working on networks [316]. Within this professional community, more tightly-knit subgroups are evident from the network structure. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

40

27 23 15 27 23 15 10 20 10 20 16 4 31 13 16 4 11 30 34 14 31 13 11 6 30 34 14 6 1 12 17 9 33 1 12 17 21 9 7 21 33 29 3 7 18 5 29 3 18 5 22 19 2 28 22 25 19 2 8 28 25 24 8 32 24 32 26 26

(a) (b)

Figure 3.13. A karate club studied by Wayne Zachary [409] — a dispute during the course of the study caused it to split into two clubs. Could the boundaries of the two clubs be predicted from the network structure? P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

41

10 1

9 3 2 11

7 8

6 12 4 13

5 14

(a)

10 1

3 9 2 11

7 8

6 12 4 13

5 14

(b)

Figure 3.14. In many networks, there are tightly-knit regions that are intuitively apparent, and they can even display a nested structure, with smaller regions nesting inside larger ones. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

42

2 9 6

1 4 5 7 8 11

3 10

Figure 3.15. A network can display tightly-knit regions even when there are no bridges or local bridges along which to separate it. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

43

10 10 1 1

3 9 3 9 2 11 2 11

7 8 7 8

6 12 6 12 4 13 4 13

5 14 5 14

(a) (b)

10 1

3 9 2 11

7 8

4 6 12 13

5 14

(c)

Figure 3.16. The steps of the Girvan-Newman method on the network from Figure 3.14(a). P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

44

2 9 2 9 6 6

1 4 5 7 8 11 1 4 5 7 8 11

3 10 3 10

(a) (b)

2 9 2 9 6 6

1 4 5 7 8 11 1 4 5 7 8 11

3 10 3 10

(c) (d)

Figure 3.17. The steps of the Girvan-Newman method on the network from Figure 3.15. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

45

Stadler Fell Gleiss

Mukherjee Sreeram Wagner Lassig Dasgupta ChatterjeeChakrabarti Manna Sienkiewicz Berg Sen Fronczak Selman Herrmann Pacheco Penna Holyst Monasson Jedynak GomezWeigt Aleksiejuk Stauffer Zecchina Moukarzel Valverde Barrat Pecora MorenoLeone Szabo Kaski Giacometti Vazquez Vilone Ferrer i Cancho Boguna Lahtinen Barahona Alava Kertesz Sole Maritan Andrade FlamminiVespignani Girvan Rinaldo BarthelemyMoreira Strogatz Kepler Pastor-Satorras Castellano Scala RubiBanavar Callaway Caldarelli Stanley Rozenfeld Cabrales Havlin Guimera Hopcroft Watts Smith Munoz Erez Rothman Cohen Amaral Kleinberg Dodds Arenas Danon Newman Capocci Bianconi Ben-Avraham Camacho Zaliznyak Schwartz SomeraBarabasi Edling Mongru Liljeros Simonsen Moore Leyvraz Rajagopalan Ravasz Redner Tadic Sneppen Oltvai FarkasVicsek Rodgers Maslov Park Podani Krapivsky Yook Albert Kim Neda Kahng Vazquez Eriksen SzathmaryMasonTombor Ergun Jeong Schuster HolmeKim Mendes Bornholdt Dorogovtsev Choi KimOh Klemm HussHan Goh Yoon Minnhagen Goltsev Eguiluz Davidsen Hong Samukhin Trusina Stroud EbelMielsch

Kulkarni Almaas

Figure 3.18. The tightly-knit regions identified by the Girvan-Newman method in the co- authorship network from Figure 3.12. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

46

A

F

B C D E

B C I F G H

A D G K I J

E H J K

(a) (b)

Figure 3.19. The first step in the efficient method for computing betweenness values is to perform a breadth-first search of the network. Here the results of breadth-first from node A are shown; over the course of the method, breadth-first search is performed from each node in turn. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

47

A

1 B C 111D E

F 212G H

33I J # shortest A-J paths = # shortest A-G paths + # shortest A-H paths # shortest A-I paths = K 6 # shortest A-F paths + # shortest A-G paths # shortest A-K paths = # shortest A-I paths + # shortest A-J paths

Figure 3.20. The second step in computing betweenness values is to count the number of shortest paths from a starting node A to all other nodes in the network. This can be done by adding up counts of shortest paths, moving downward through the breadth-first search structure. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

48

A

2 2 4 2

1 B C 111D E

1 1 2 1 1

F 212G H

1 1/2 1/2 1

33I J

1/2 1/2

K 6

Figure 3.21. The final step in computing betweenness values is to determine the flow values from a starting node A to all other nodes in the network. This is done by working up from the lowest layers of the breadth-first search, dividing up the flow above a node in proportion to the number of shortest paths coming into it on each edge. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

49

W a d S S

e WW f

S S b c ?

Figure 3.22. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

50

B S C

S W

W A S

S W

D S E

Figure 3.23. . P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

51

B S C

S W

A W S

S W

D S E

Figure 3.24. A graph with a strong/weak labeling. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

52

A

S S

B S C

W S

D W E

Figure 3.25. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

53

Figure 4.1. Homophily can produce a division of a social network into densely-connected, homogeneous parts that are weakly connected to each other. In this social network from a town’s middle school and high school, two such divisions in the network are apparent: one based on race (with students of different races drawn as differently colored circles), and the other based on friendships in the middle and high schools respectively [299]. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

54

Figure 4.2. Using a numerical measure, one can determine whether small networks such as this one (with nodes divided into two types) exhibit homophily. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

55

Literacy Anna Volunteers

Karate Daniel Club

Figure 4.3. An affiliation network is a bipartite graph that shows which individuals are affiliated with which groups or activities. Here, Anna participates in both of the social foci on the right, while Daniel participates in only one. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

56

John Doerr

Amazon Shirley Tilghman

Google Arthur Levinson

Al Gore Apple

Steve Jobs Disney

Andrea Jung General Electric

Susan Hockfield

Figure 4.4. One type of affiliation network that has been widely studied is the memberships of people on corporate boards of directors [296]. A very small portion of this network (as of 2009) is shown here. The structural pattern of memberships can reveal subtleties in the interactions among both the board members and the companies. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

57

Claire

Literacy Bob Anna Volunteers

Karate Daniel Club

Figure 4.5. A social-affiliation network shows both the friendships between people and their affiliation with different social foci. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

58

B B C C person person

person person

A A

person focus (a) (b)

B

person C

focus

A

person (c)

Figure 4.6. Each of triadic closure, focal closure, and membership influence corresponds to the closing of a triangle in a social-affiliation network. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

59

Claire

Literacy Bob Anna Volunteers

Karate Daniel Club

Figure 4.7. In a social-affiliation network containing both people and foci, edges can form under the effect of several different kinds of closure processes: two people with a friend in common, two people with a focus in common, or a person joining a focus that a friend is already involved in. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

60

Claire Grace

Literacy Esther Bob Anna Volunteers

Karate Daniel Club

Frank

Figure 4.8. A larger network that contains the example from Figure 4.7. Pairs of people can have more than friend (or more than one focus) in common; how does this increase the likelihood that an edge will form between them? P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

61

0.006

0.005

0.004

0.003

0.002 prob. of link formation prob.

0.001

0

0 2 4 6 8 10 Number of common friends

Figure 4.9. Quantifying the effects of triadic closure in an e-mail dataset [255]. The curve determined from the data is shown in the solid black line; the dotted curves show a comparison to probabilities computed according to two simple baseline models in which common friends provide independent probabilities of link formation. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

62

0.0005

0.0004

0.0003

0.0002 prob. of link formation prob. 0.0001

0

0 1 2 3 4 5 number of common foci

Figure 4.10. Quantifying the effects of focal closure in an e-mail dataset [255]. Again, the curve determined from the data is shown in the solid black line, while the dotted curve provides a comparison to a simple baseline. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

63

Probability of joining a community when k friends are already members 0.025

0.02 0.04

0.015 0.03 probability 0.01 0.02

0.005 0.01

0 0 0 5 10 15 20 25 30 35 40 45 50 0 5 10 15 k k (a) (b)

Figure 4.11. Quantifying the effects of membership closure in two large on-line datasets [32, 121]. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

64

Social influence: continued slower increase in similarity after first contact

Selection: rapid increase in similarity before first contact

Figure 4.12. The average similarity of two editors on Wikipedia, relative to the time (0) at which they first communicated [121]. Time, on the x-axis, is measured in discrete units, where each unit corresponds to a single Wikipedia action taken by either of the two editors. The curve increases both before and after the first contact at time 0, indicating that both selection and social influence play a role; the increase in similarity is steepest just before time 0. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

65

(a) Chicago, 1940 (b) Chicago, 1960

Figure 4.13. The tendency of people to live in racially homogeneous neighborhoods produces spatial patterns of segregation that are apparent both in everyday life and when superimposed on a map — as here, in these maps of Chicago from 1940 and 1960 [297]. In blocks colored yellow and orange the percentage of African-Americans is below 25, while in blocks colored brown and black the percentage is above 75. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

66

X X

XX X O O X O O

X X O O O X X O OO

X O X X X O XX

OO X X X O O X X X

OOO O O O

(a) (b)

Figure 4.14. In Schelling’s segregation model, agents of two different types (X and O) occupy cells on a grid. The neighbor relationships among the cells can be represented very simply as a graph. Agents care about whether they have at least some neighbors of the same type. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

67

X1* X2*

X3 O1* O2

X4 X5 O3 O4 O5*

X6* O6 X7 X8

O7 O8 X9* X10 X11

O9 O10 O11*

(a)

X3 X6 O1 O2

X4 X5 O3 O4

O6 X2 X1 X7 X8

O11 O7 O8 X9 X10 X11

O5 O9 O10*

(b)

Figure 4.15. After arranging agents in cells of the grid, we first determine which agents are unsatisfied, with fewer than t other agents of the same type as neighbors. In one round, each of these agents moves to a cell where they will be satified; this may cause other agents to become unsatisfied, in which case a new round of movement begins. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

68

(a) (b)

Figure 4.16. Two runs of a simulation of the Schelling model with a threshold t of 3, on a 150-by-150 grid with 10, 000 agents of each type. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

69

XX O OXX

X X O O XX

O O X XOO

O O X X OO

X XO O X X

XXOO X X

Figure 4.17. With a threshold of 3, it is possible to arrange agents in an integrated pattern: all agents are satisfied, and everyone who is not on the boundary on the grid has an equal number of neighbors of each type. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

70

(a) (b)

(c) (d)

Figure 4.18. Four intermediate points in a simulation of the Schelling model with a threshold t of 4, on a 150-by-150 grid with 10, 000 agents of each type. As the rounds of movement progress, large homogeneous regions on the grid grow at the expense of smaller, narrower regions. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

71

a

b c d

e

Figure 4.19. A social network where triadic closure may occur. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

72

A

X

B

C Y

D

Z

E

F

Figure 4.20. An affiliation network on six people labeled A–F , and three foci labeled X , Y , and Z. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

73

A B

E

F

C D

Figure 4.21. A graph on people arising from an (unobserved) affiliation network. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

74

A A

++ ++

B C B C + - (a) (b)

A A

+ - --

B C B C - - (c) (d)

Figure 5.1. Structural balance: Each labeled triangle must have 1 or 3 positive edges. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

75

Figure 5.2. The labeled four-node complete graph on the left is balanced; the one on the right is not. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

76

mutual mutual friends antagonism mutual friends inside X between inside Y sets

set X set Y

Figure 5.3. If a complete graph can be divided into two sets of mutual friends, with complete mutual antagonism between the two sets, then it is balanced. Furthermore, this is the only way for a complete graph to be balanced. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

77

B D ?

+ -

? A ?

+ - C E

friends of A enemies of A

Figure 5.4. A schematic illustration of our analysis of balanced networks. (There may be other nodes not illustrated here.) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

78

GB AH GB AH GB AH

Fr Ge Fr Ge Fr Ge

Ru It Ru It Ru It

(a) (b) (c)

GB AH GB AH GB AH

Fr Ge Fr Ge Fr Ge

Ru It Ru It Ru It

(d) (e) (f)

Figure 5.5. The evolution of alliances in Europe, 1872-1907 (the nations GB, Fr, Ru, It, Ge, and AH are Great Britain, France, Russia, Italy, Germany, and Austria-Hungary respectively). Solid dark edges indicate friendship while dotted red edges indicate enmity. Note how the network slides into a balanced labeling — and into World War I. This figure and example are from Antal, Krapivsky, and Redner [21]. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

79

set V

mutual set W friends set X inside V

mutual friends inside X mutual friends inside W

mutual antagonism between all sets

mutual friends mutual inside Z friends inside Y set Z set Y

Figure 5.6. A complete graph is weakly balanced precisely when it can be divided into multiple sets of mutual friends, with complete mutual antagonism between each pair of sets. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

80

B ? D

+ -

? A

+ - C E

friends of A enemies of A

Figure 5.7. A schematic illustration of our analysis of weakly balanced networks. (There may be other nodes not illustrated here.) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

81

1

+ +

2 + 3

- + -

4 5 - 6 - + - 7 - 8 - 9 10 - 11 + + + - - 14 12 + 13 - - 15

Figure 5.8. In graphs that are not complete, we can still define notions of structural balance when the edges that are present have positive or negative signs indicating friend or enemy relations. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

82

1 1

- + - +

5 2 5 - 2 - - + - + + - -

4 + 3 4 + 3

(a) (b)

Y

1 X - +

5 2

+ -

4 + 3

(c)

Figure 5.9. There are two equivalent ways to define structural balance for general (non- complete) graphs. One definition asks whether it is possible to fill in the remaining edges so as to produce a signed complete graph that is balanced. The other definition asks whether it is possible to divide the nodes into two sets X and Y so that all edges inside X and inside Y are positive, and all edges between X and Y are negative. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

83

X

1

X - + X

5 2 label as X or Y - -

4 + 3

Y Y

Figure 5.10. If a signed graph contains a cycle with an odd number of edges, then it is not balanced. Indeed, if we pick of one of the nodes and try to place it in X , then following the set of friend/enemy relations around the cycle will produce a conflict by the time we get to the starting node. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

84

1

+ +

2 + 3

- + -

4 5 - 6 + - 7 - 8 - - 9 10 - 11 + + + - - 14 12 + 13 - - 15

Figure 5.11. To determine if a signed graph is balanced, the first step is to consider only the positive edges, find the connected components using just these edges, and declare each of these components to be a supernode. In any balanced division of the graph into X and Y ,all nodes in the same supernode will have to go into the same set. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

85

A +

- + B + + + +

Figure 5.12. Suppse a negative edge connects two nodes A and B that belong to the same supernode. Since there is also a path consisting entirely of positive edges that connects A and B through the inside of the supernode, putting this negative edge together with the all-positive path produces a cycle with an odd number of negative edges. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

86

Figure 5.13. The second step in determining whether a signed graph is balanced is to look for a labeling of the supernodes so that adjacent supernodes (which necessarily contain mutual enemies) get opposite labels. For this purpose, we can ignore the original nodes of the graph and consider a reduced graph whose nodes are the supernodes of the original graph. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

87

A

- -

B E

- - - F

C - D - -

G

Figure 5.14. A more standard drawing of the reduced graph from the previous figure. A negative cycle is visually apparent in this drawing. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

88

1

+ +

2 + 3

- + -

4 5 - 6 + - 7 - 8 - - 9 10 - 11 + + + - - 14 12 + 13 - - 15

Figure 5.15. Having found a negative cycle through the supernodes, we can then turn this into a cycle in the original graph by filling in paths of positive edges through the inside of the supernodes. The resulting cycle has an odd number of negative edges. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

89

G

D F

C E An odd cycle is formed from two equal-length paths leading to an edge inside a single layer.

B A

Figure 5.16. When we perform a breadth-first search of the reduced graph, there is either an edge connecting two nodes in the same layer or there isn’t. If there isn’t, then we can produce the desired division into X and Y by putting alternate layers in different sets. If there is such an edge (such as the edge joining A and B in the figure), then we can take two paths of the same length leading to the two ends of the edge, which together with the edge itself forms an odd cycle. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

90

mainly negative B D

+ - mainly mainly positive A positive

+ - C E

friends of Aa good node A enemies of A

Figure 5.17. The characterization of approximately balanced complete graphs follows from an analysis similar to the proof of the original Cartwright-Harary Theorem. However, we have to be more careful in dividing the graph by first finding a “good” node that isn’t involved in too many unbalanced triangles. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

91

A

+ +

B - C - -

+ - - +

D + E

Figure 5.18. A network with five positive edges and five negative edges. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

92

A

++

B C +

Figure 5.19. A 3-node social network in which all pairs of nodes know each other, and all pairs of nodes are friendly toward each other. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

93

D D

+++ ---

A A

++ ++

B C B C + + (a) (b)

Figure 5.20. There are two distinct ways in which node D can join the social network from Figure 5.19 without becoming involved in any unbalanced triangles. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

94

A

--

B C -

Figure 5.21. All three nodes are mutual enemies. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

95

A

++

B C -

Figure 5.22. Node A is friends with nodes B and C, who are enemies with each other. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

96

Your Partner Presentation Exam Presentation 90, 90 86, 92 You Exam 92, 86 88, 88 Figure 6.1. Exam or Presentation? P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

97

Suspect 2 NC C NC −1, −1 −10, 0 Suspect 1 C 0, −10 −4, −4 Figure 6.2. Prisoner’s Dilemma P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

98

Athlete 2 Don’t Use Drugs Use Drugs Don’t Use Drugs 3, 3 1, 4 Athlete 1 Use Drugs 4, 1 2, 2 Figure 6.3. Performance-Enhancing Drugs P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

99

Your Partner Presentation Exam Presentation 98, 98 94, 96 You Exam 96, 94 92, 92 Figure 6.4. Exam-or-Presentation Game with an easier exam. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

100

Firm 2 Low-Priced Upscale Low-Priced .48,.12 .60,.40 Firm 1 Upscale .40,.60 .32,.08 Figure 6.5. Marketing Strategy P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

101

Firm 2 ABC A 4, 4 0, 2 0, 2 Firm 1 B 0, 0 1, 1 0, 2 C 0, 0 0, 2 1, 1 Figure 6.6. Three-Client Game P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

102

Your Partner PowerPoint Keynote PowerPoint 1, 1 0, 0 You Keynote 0, 0 1, 1 Figure 6.7. Coordination Game P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

103

Your Partner PowerPoint Keynote PowerPoint 1, 1 0, 0 You Keynote 0, 0 2, 2 Figure 6.8. Unbalanced Coordination Game P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

104

Your Partner PowerPoint Keynote PowerPoint 1, 2 0, 0 You Keynote 0, 0 2, 1 Figure 6.9. Battle of the Sexes P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

105

Hunter 2 Hunt Stag Hunt Hare Hunt Stag 4, 4 0, 3 Hunter 1 Hunt Hare 3, 0 3, 3 Figure 6.10. Stag Hunt P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

106

Your Partner Presentation Exam Presentation 90, 90 82, 88 You Exam 88, 82 88, 88 Figure 6.11. Exam-or-Presentation Game (Stag Hunt version) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

107

Animal 2 DH D 3, 3 1, 5 Animal 1 H 5, 1 0, 0 Figure 6.12. Hawk-Dove Game P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

108

Your Partner Presentation Exam Presentation 90, 90 86, 92 You Exam 92, 86 76, 76 Figure 6.13. Exam or Presentation? (Hawk-Dove version) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

109

Player 2 HT H −1, +1 +1, −1 Player 1 T +1, −1 −1, +1 Figure 6.14. Matching Pennies P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

110

Defense Defend Pass Defend Run Pass 0, 0 10, −10 Offense Run 5, −5 0, 0 Figure 6.15. Run-Pass Game P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

111

Goalie LR L 0.58, −0.58 0.95, −0.95 Kicker R 0.93, −0.93 0.70, −0.70 Figure 6.16. The Penalty-Kick Games (from empirical data [331]). P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

112

Your Partner PowerPoint Keynote PowerPoint 1, 1 0, 0 You Keynote 0, 0 2, 2 Figure 6.17. Unbalanced Coordination Game P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

113

Your Partner Presentation Exam Presentation 90, 90 86, 92 You Exam 92, 86 88, 88 Figure 6.18. Exam or Presentation? P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

114

A B C D E F

Figure 6.19. In the Facility Location Game, each player has strictly dominated strategies but no dominant strategy. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

115

Firm 2 BDF A 1, 5 2, 4 3, 3 Firm 1 C 4, 2 3, 3 4, 2 E 3, 3 2, 4 5, 1 Figure 6.20. Facility Location Game P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

116

Firm 2 BD C 4, 2 3, 3 Firm 1 E 3, 3 2, 4 Figure 6.21. Smaller Facility Location Game P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

117

Firm 2 D Firm 1 C 3, 3 Figure 6.22. Even smaller Facility Location Game P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

118

Hunter 2 Hunt Stag Hunt Hare Hunt Stag 3, 3 0, 3 Hunter 1 Hunt Hare 3, 0 3, 3 Figure 6.23. Stag Hunt: A version with a weakly dominated strategy P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

119

Player 1

AB

Player 2

AB A B

8 12 6 4 4 6 12 2

Figure 6.24. A simple game in extensive form. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

120

Firm 2 AA,AB AA,BB BA,AB BA,BB A 8, 4 8, 4 12, 6 12, 6 Firm 1 B 6, 12 4, 2 6, 12 4, 2 Figure 6.25. Conversion to normal form. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

121

Player 1

Stay Out Enter

Player 2

0 Retaliate Cooperate 2

-1 1 -1 1

Figure 6.26. Extensive-form representation of the Market Entry Game. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

122

Firm 2 RC S 0, 2 0, 2 Firm 1 E −1, −1 1, 1 Figure 6.27. Normal Form of the Market Entry Game P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

123

Player B LMR t 0, 3 6, 2 1, 1 Player A m 2, 3 0, 1 7, 0 b 5, 3 4, 2 3, 1 Figure 6.28. Payoff Matrix P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

124

Player B LR U 1, 2 3, 2 Player A D 2, 4 0, 2 UnFig01-page211. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

125

Player B LMR U 1, 1 2, 3 1, 6 Player A M 3, 4 5, 5 2, 2 D 1, 10 4, 7 0, 4 UnFig02-page211. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

126

Player B LR U 2, 15 4, 20 Player A D 6, 6 10, 8 UnFig03-page212. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

127

Player B LR U 3, 5 4, 3 Player A D 2, 1 1, 6 UnFig04-page212. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

128

Player B LR U 1, 1 4, 2 Player A D 3, 3 2, 2 UnFig05-page212. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

129

Player B LR U 1, 1 3, 2 Player A D 0, 3 4, 4 UnFig06-page213. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

130

Player B LR U 5, 6 0, 10 Player A D 4, 4 2, 2 UnFig07-page213. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

131

Player B LR U 1, 1 0, 0 Player A D 0, 0 4, 4 UnFig08-page213. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

132

Player B LR U 8, 4 5, 5 Player A D 3, 3 4, 8 UnFig09-page214. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

133

Player B LR U 0, 0 −1, 1 Player A D −1, 1 2, −2 UnFig10-page214. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

134

Player B LR U 3, 3 1, 2 Player A D 2, 1 3, 0 UnFig11-page214. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

135

Player B LMR U 2, 4 2, 1 3, 2 Player A D 1, 2 3, 3 2, 4 UnFig12-page215. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

136

Player B LR U 2, 4 3, 2 Player A D 1, 2 2, 4 UnFig13-page215. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

137

Player B LR U 1, 1 1, 1 Player A D 0, 0 2, 1 UnFig14-page216. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

138

Player B LR U 4, 4, 4 0, 0, 1 Player A D 0, 2, 1 2, 1, 0 UnFig15-page217. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

139

Player B LR U 2, 0, 0 1, 1, 1 Player A D 1, 1, 1 2, 2, 2 UnFig16-page217. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

140

Beetle 2 Small Large Small 5, 5 1, 8 Beetle 1 Large 8, 1 3, 3 Figure 7.1. The Body-Size Game P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

141

Virus 2 6 H2 6 1.00, 1.00 0.65, 1.99 Virus 1 H2 1.99, 0.65 0.83, 0.83 Figure 7.2. The Virus Game P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

142

Organism 2 ST S a,a b, c Organism 1 T c, b d,d

Figure 7.3. General Symmetric Game P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

143

Hunter 2 Hunt Stag Hunt Hare Hunt Stag 4, 4 0, 3 Hunter 1 Hunt Hare 3, 0 3, 3 Figure 7.4. Stag Hunt P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

144

Hunter 2 Hunt Stag Hunt Hare Hunt Stag 4, 4 0, 4 Hunter 1 Hunt Hare 4, 0 3, 3 Figure 7.5. Stag Hunt: A version with added benefit from hunting hare alone P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

145

Animal 2 DH D 3, 3 1, 5 Animal 1 H 5, 1 0, 0 Figure 7.6. Hawk-Dove Game P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

146

Virus 2 6 H2 6 1.00, 1.00 0.65, 1.99 Virus 1 H2 1.99, 0.65 0.50, 0.50 Figure 7.7. The Virus Game: Hypothetical payoffs with stronger fitness penalties to H2. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

147

Player B xy x 2, 2 0, 0 Player A y 0, 0 1, 1 UnFig01-page235. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

148

Player B xy x 4, 4 3, 5 Player A y 5, 3 5, 5 UnFig02-page236. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

149

Player B XY X a,a b, c Player A Y c, b d,d UnFig03-page236. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

150

Player B XY X 1, 1 2,x Player A Y x,2 3, 3 UnFig04-page236. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

151

Player B XY X a,a b, c Player A Y c, b d,d UnFig05-page237. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

152

C

45 x/100

A B

45 x/100

D

Figure 8.1. A highway network, with each edge labeled by its travel time (in minutes) when there are x cars using it. When 4000 cars need to get from A to B, they divide evenly over the two routes at equilibrium, and the travel time is 65 minutes. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

153

C

45 x/100

0 A B

45 x/100

D

Figure 8.2. The highway network from the previous figure, after a very fast edge has been added from C to D. Although the highway system has been “upgraded,” the travel time at equilibrium is now 80 minutes, since all cars use the route through C and D. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

154

TT(x)=xC (x)=5 AC CB C

5 x

0 A T CD(x)=0 B A B

5 x

D D TAD (x)=5TDB (x)=x (a) (b)

Figure 8.3. A network annotated with the travel-time function on each edge. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

155

C

5 C x

5 0 A B x

0 5 x A B

5 D x

D

(a) (b)

Figure 8.4. A version of Braess’s Paradox: In the socially optimal traffic pattern (on the left), the social cost is 28, while in the unique Nash equilibrium (on the right), the social cost is 32. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

156

energy = 1+2 energy = 5+5 energy = 1+2 energy = 5 C C

5 5 x x

0 0 A B A B

5 5 x x

D D energy = 5+5 energy = 1+2 energy = 5+5 energy = 1+2+3

(a) (b)

energy = 1+2 C energy = 0 energy = 1+2+3C energy = 0 5 x 5 x 0 A B 0 A B 5 x 5 x D D energy = 5+5 energy = 1+2+3+4 energy = 5 energy = 1+2+3+4

(c) (d)

energy = 1+2+3+4C energy = 0

5 x

0 A B

5 x

D energy = 0 energy = 1+2+3+4 (e)

Figure 8.5. We can track the progress of best-response dynamics in the traffic game by watching how the potential energy changes. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

157

energy = 1+2 energy = 5+5 energy = 1 energy = 5 C C

5 5 x x

0 0 A B A B

5 5 x x

D D energy = 5+5 energy = 1+2 energy = 5+5 energy = 1+2

(a) (b)

energy = 1+2 energy = 5 C

5 x

0 A B

5 x

D energy = 5+5 energy = 1+2+3

(c)

Figure 8.6. When a driver abandons one path in favor of another, the change in potential energy is exactly the improvement in the driver’s travel time. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

158

Te(x)

Te(3) ...... Te(2) Te(1)

Figure 8.7. The potential energy is the area under the shaded rectangles; it is always at least half the total travel time, which is the area inside the enclosing rectangle. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

159

C

x/100 12

A B

12 y/100 D

Figure 8.8. Traffic Network. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

160

C

3.1 x/100

A B

3.1 y/100

D

Figure 8.9. Traffic Network P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

161

Alternate bid bi’ Raised bid affects outcome only if highest other bid bj is in between. If so, i wins but pays more than value.

Truthful bid bi = vi

Lowered bid affects outcome only if highest other bid bk is in between. Alternate bid bi” If so, i loses when it was possible to win with non-negative payoff

Figure 9.1. If bidder i deviates from a truthful bid in a second-price auction, the payoff is only affected if the change in bid changes the win/loss outcome. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

162

Room1 Vikram Room1 Vikram

Room2 Wendy Room2 Wendy

Room3 Xin Room3 Xin

Room4 Yoram Room4 Yoram

Room5 Zoe Room5 Zoe

(a) (b)

Figure 10.1. (a) An example of a bipartite graph. (b) A perfect matching in this graph, indicated via the dark edges. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

163

Room1 Vikram Room1 Vikram

Room2 Wendy Room2 Wendy

Room3 Xin Room3 Xin

Room4 Yoram Room4 Yoram

Room5 Zoe Room5 Zoe

(a) (b)

Figure 10.2. (a) A bipartite graph with no perfect matching. (b) A constricted set demonstrating there is no perfect matching. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

164

Valuations Valuations Room1 Xin 12, 2, 4 Room1 Xin 12, 2, 4

Room2 Yoram 8, 7, 6 Room2 Yoram 8, 7, 6

Room3 Zoe 7, 5, 2 Room3 Zoe 7, 5, 2

(a) (b)

Figure 10.3. (a) A set of valuations. Each person’s valuations for the objects appears as a list next to them. (b) An optimal assignment with respect to these valuations. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

165

Room1 Xin Room1 Xin 1, 1, 0

Room2 Yoram Room2 Yoram 1, 0, 0

Room3 Zoe Room3 Zoe 0, 1, 1

(a) (b)

Figure 10.4. (a) A bipartite graph in which we want to search for a perfect matching. (b) A corresponding set of valuations for the same nodes so that finding the optimal assignment lets us determine whether there is a perfect matching in the original graph. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

166

Sellers Buyers Valuations Prices Sellers Buyers Valuations

a x 12, 4, 2 5 a x 12, 4, 2

b y 8, 7, 6 2 b y 8, 7, 6

c z 7, 5, 2 0 c z 7, 5, 2

(a) (b)

Prices Sellers Buyers Valuations Prices Sellers Buyers Valuations

2 a x 12, 4, 2 3 a x 12, 4, 2

1 b y 8, 7, 6 1 b y 8, 7, 6

0 c z 7, 5, 2 0 c z 7, 5, 2

(c) (d)

Figure 10.5. (a) Three sellers (a, b,andc) and three buyers (x, y,andz). For each buyer node, the valuations for the houses of the respective sellers appear in a list next to the node. (b) Each buyer creates a link to her preferred seller. The resulting set of edges is the preferred-seller graph for this set of prices. (c) The preferred-seller graph for prices 2, 1, 0. (d) The preferred-seller graph for prices 3, 1, 0. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

167

Prices Sellers Buyers Valuations Prices Sellers Buyers Valuations

0 a x 12, 4, 2 1 a x 12, 4, 2

0 b y 8, 7, 6 0 b y 8, 7, 6

0 c z 7, 5, 2 0 c z 7, 5, 2

(a) (b)

Prices Sellers Buyers Valuations Prices Sellers Buyers Valuations

2 a x 12, 4, 2 3 a x 12, 4, 2

0 b y 8, 7, 6 1 b y 8, 7, 6

0 c z 7, 5, 2 0 c z 7, 5, 2

(c) (d)

Figure 10.6. The auction procedure applied to the example from Figure 10.5. Each separate picture shows steps (i) and (ii) of successive rounds, in which the preferred-seller graph for that round is constructed. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

168

Prices Sellers Buyers Valuations Prices Sellers Buyers Valuations

0 a x 3, 0, 0 2 a x 3, 0, 0

0 b y 2, 0, 0 0 b y 2, 0, 0

0 c z 1, 0, 0 0 c z 1, 0, 0

(a) (b)

Figure 10.7. A single-item auction can be represented by the bipartite graph model: the item is represented by one seller node, and then there are additional seller nodes for which all buyers have 0 valuation. (a) The start of the bipartite graph auction. (b) The end of the bipartite graph auction, when buyer x gets the item at the valuation of buyer y. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

169

A W A W A W

B X B X B X

(a) (b) (c)

Figure 10.8. (a) A matching that does not have maximum size. (b) What a matching does not have maximum size, we can try to find an augmenting path that connects unmatched nodes on opposite sides while alternating between non-matching and matching edges. (c) If we then swap the edges on this path — taking out the matching edges on the path and replacing them with the non-matching edges — then we obtain a larger matching. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

170

A W A W A W

B X B X B X

C Y C Y C Y

D Z D Z D Z

(a) (b) (c)

Figure 10.9. The principle used in Figure 10.8 can be applied to larger bipartite graphs as well, sometimes producing long augmenting paths. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

171

A W A W A W

B X B X B X

C Y C Y C Y

D Z D Z D Z z (a) (b) (c)

Figure 10.10. In more complex graphs, finding an augmenting path can require a more careful search, in which choices lead to “dead ends” while others connect two unmatched nodes. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

172

W

A B

X Y

B-Z edge not C D part of search

Z

Figure 10.11. In an alternating breadth-first search, one constructs layers that alternately use non-matching and matching edges; if a unmatched node is ever reached, this results in an augmenting path. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

173

Layer 0 W

Layer 1

equal numbers } of nodes Layer 2

Layer 3

equal numbers } of nodes Layer 4

Figure 10.12. A schematic view of alternating breadth-first search, which produces pairs of layers of equal size. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

174

A W A W

W B X B X

A B C Y C Y

D Z X Y D Z

(a) (b) (c)

Figure 10.13. (a) A matching that has maximum size, but is not perfect. (b) For such a matching, the search for an augment path using alternating breadth-first search will fail. (c) The failure of this search exposes a constricted set: the set of nodes belonging to the even layers. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

175

A W

B X

C Y

D Z

Figure 10.14. If the alternating breadth-first search fails from any node on the right-hand side, this is enough to expose a constricted set and hence prove there is no perfect matching. However, it is still possible that an alternating breadth-first search could still succeed from some other node. (In this case, the search from W would fail, but the search from Y would succeed.) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

176

28 JamesBack St ey 4

Clarendon St Public All g Exeter St ey 419 Marlborou Storrow Dr Public All ll Dartmouth Public A Back St

Public Alley 418 BeaconB Ct St e Public Alley 424 a Beacon St r c D o lborough St al Fairfield St ori n Mar m Me C Public Alley 417 rrow t Public Alley 425 Commonwealth Ave Sto s J ey 416 Jame Public All

Dartmouth St 2A ey 415 Public Alley 426 Public Alley 435 St Exeter St Beacon Public All lborough St Mar CommonwealthCommonCommonwealthealth ey 434 Newbury St 2 MallMall Public All Public Alley 414 OldOld SouthSouth Public Alley 439 ChurchChurch Public Alley 428 ey 433 CopleyCCoplopley y 901 Fairfield Marlborough St Public All ey 429 2 M Gloucester St Public All ey 432 Newbury St BostonBoston Commonwealth Ave St Public All PublicPublic LibraryLibrary Av

Hereford St Public Alley 441 St JamesT Dartmouth St rinity Pl Boylston St ey 442 Exeter St Blagden St 2 ey 430 Newbury St Public All Public All Ring Rd Public Alley 443 HynesHynes ey 444 Boylston St CoCConventiononventionention Huntington Ave9 Public All Center/ICACenter/ICA 90 90 M MassachusettsMassachusetts TurnpikeTur npike (Toll(Toll road)road) BuckBuck

90 22 t PrudentialPrudential CoplCCopleyopley

S 111111 HuntingtonHuntington

TowTowerer BackBaBack BayBay a

i PlacePlace l D AvenAvenueue i AmtrakAmtAmtrakak c a Mas e l to t ton St C s n P t S y S le t t p ou d S o rm th an s C a P Havil Y

Figure 10.15. The map for a parking-space market. (Image from Google Maps, http://maps.google.com/) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

177

$5.50 $5.50 ASK $5.00 ASK

$4.00 BID $4.00 BID $3.50 $3.50

(a) (b)

Figure 11.1. (a) A book of limit orders for a stock with a bid of $4 and an ask of $5. (b) A book of limit orders for a stock with a bid of $4 and an ask of $5.50. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

178

B

T

S S B T

S B

Figure 11.2. Trading networks for agricultural markets can be based on geographic constraints, giving certain buyers (nodes labeled B) and sellers (nodes labeled S) greater access to traders (nodes labeled T). P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

179

vi sellers traders buyers vj

0 S1 B1 1

T1

0 S2 B2 1

T2

0 S3 B3 1

Figure 11.3. A standardized view of the trading network from Figure 11.2: Sellers are repre- sented by circles on the left, buyers are represented by circles on the right, and traders are represented by squares in the middle. The value that each seller and buyer places on a copy of the good is written next to the respective node that represents them. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

180

sellers traders buyers sellers traders buyers

0 S1 B1 1 0 S1 B1 1 0.2 0.8 0.2 0.8

T1 T1 0.2 0.8 0.2 0.8

0 S2 B2 1 0 S2 B2 1 0.3 0.7 0.3 0.7

T2 T2 01 01

0 S3 B3 1 0 S3 B3 1

(a) (b)

Figure 11.4. (a) Each trader posts bid prices to the sellers he is connected to, and ask prices to the buyers he is connected to. (b) This in turn determines a flow of goods, as sellers and buyers each choose the offer that is most favorable to them. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

181

sellers traders buyers

0 S1 B1 1 01

T1 0.4 0.6

0 S2 B2 1 0.3 0.7

T2 01

0 S3 B3 1

Figure 11.5. Relative to the choice of strategies in Figure 11.4(b), trader T 1hasawayto improve his payoff by undercutting T 2 and performing the transaction that moves S2’s copy of the good to B2. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

182

sellers traders buyers

01 01S1 T1 B1

Figure 11.6. A simple example of a trading network in which the trader has a monopoly and extracts all of the surplus from trade. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

183

sellers traders buyers

T1 x x

01S1 B1 xx

T2

Figure 11.7. A trading network in which there is perfect competition between the two traders, T1 and T2. The equilibrium has a common bid and ask of x,wherex can be any real number between 0 and 1. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

184

sellers traders buyers

0 S1 B1 1 01

T1 x x

0 S2 B2 1 xx

T2 01

0 S3 B3 1

Figure 11.8. The equilibria for the trading network from Section 11.2. This network can be analyzed using the ideas from the simpler networks representing monopoly and perfect com- petition. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

185

0 S1 x T1 x x B1 1

x T2

x T3

x x B2 1 x T4

0 S2

Figure 11.9. Aformofimplicit perfect competition: all bid/ask spreads will be zero in equilib- rium, even though no trader directly “competes” with any other trader for the same buyer-seller pair. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

186

w T1 B1 w T1 B1 w

x x T2 B2 x x T2 B2 x

0 S1 0 S1 y y T3 B3 y T3 B3 y z

z T4 B4 z T4 B4 z

(a) (b)

Figure 11.10. (a) A single-item auction can be represented using a trading network. (b) Equi- librium prices and flow of goods. The resulting equilibrium implements the second-price rule from Chapter 9. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

187

0 S1 B1 1 0 S1 B1 1 0 1 0 1

T1 T1 0x zy

B2 2 B2 2 0 S2 x 0 S2 y z

T2 3 T2 3 0 0 B3 3 B3 3 4 4 0 S3 0 S3

B4 4 B4 4

(a) (b)

Figure 11.11. (a) Equilibrium before the new S2-T 2 link is added. (b) When the S2-T 2edge is added, a number of changes take place in the equilibrium. Among these changes is the fact that buyer B1 no longer gets a copy of the good, and B3 gets one instead. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

188

0x 0 S1 T1 B1 1 x

x T2

x 1 0 S2 T3 B2 1 x

T4 x 0 x 0 S3 T5 B3 1

Figure 11.12. Whether a trader can make a profit may depend on the choice of equilibrium. In this trading network, when x = 1, traders T 1andT 5makeaprofit,whilewhenx = 0, only trader T 3 makes a profit. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

189

S1 S1 S1 0 0 x x T1 B1 0 T1 B1 0 T1 B1 x x S2 S2 S2

y y

0 y 0 y S3 T2 B2 S3 T2 B2 S3 T2 B2

(a) (b) (c)

Figure 11.13. Despite a form of monopoly power in this network, neither trader can make a profit in any equilibrium. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

190

A B C

D

E

Figure 12.1. A social network on five people, with node B occupying an intuitively powerful position. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

191

A B A B C

(a) (b)

A B C D A B C D E

(c) (d)

Figure 12.2. Paths of lengths 2, 3, 4, and 5 form instructive examples of different phenomena in exchange networks. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

192

D

A B

C

Figure 12.3. An exchange network with a weak power advantage for node B. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

193

A

B C

Figure 12.4. An exchange network in which negotiations never stabilize. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

194

A receives good of value 1: payoff of 1-x

B sells to A for x: payoff of x

C

D

Figure 12.5. An exchange network built from the 4-node path can also be viewed as a buyer- seller network with 2 sellers and 2 buyers. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

195

A B

outside outside option option x y

Figure 12.6. Two nodes bargaining with outside options. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

196

1/2 1/2 0 01 0

A B C A B C

(a) (b)

1/2 1/2 1/4 3/4 1/2 1/2 1/2 1/2

A B C D A B C D

(c) (d)

1/3 2/3 2/3 1/3

A B C D

(e)

Figure 12.7. Some examples of stable and unstable outcomes of network exchange on the 3-node path and the 4-node path. The darkened edges constitute matchings showing who exchanges with whom, and the numbers above the nodes represent the values. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

197

1/2 1/2 1/2 1/2

A B C D

outside outside outside outside option option option option 0 1/2 1/2 0 (a) 1/3 2/3 2/3 1/3

A B C D

outside outside outside outside option option option option 0 1/3 1/3 0 (b) 1/4 3/4 3/4 1/4

A B C D

outside outside outside outside option option option option 0 1/4 1/4 0 (c)

Figure 12.8. The difference between balanced and unbalanced outcomes. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

198

outside option 1/2 1/4

D

1/4 3/4

A B

outside outside C option option 0 1/2 outside 1/2 option 1/4

Figure 12.9. A balanced outcome on the stem graph. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

199

f a b c g

d

e

Figure 12.10. A graph used for a network exchange theory experiment. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

200

a b c

Figure 12.11. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

201

a b c d e

Figure 12.12. A graph used for a network exchange theory experiment. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

202

a b c d

Figure 12.13. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

203

a b c d

Figure 12.14. A 4-node path in a network exchange theory experiment. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

204

a b c a b c d

(a) (b)

Figure 12.15. A 3-node path (right) and a 4-node path (left). P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

205

A

B

C D

E F

Figure 12.16. The graph for the network exchange theory experiment in part (b). P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

206

I teach a class on Networks. Networks Course: We have a class blog Networks Class Blog: This blog post is about Microsoft

Microsoft Home Page

Figure 13.1. A set of four Web pages. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

207

I teach a class on Networks

Networks Course: We have a class blog Networks Class Blog: This blog post is about Microsoft

Microsoft Home Page

Figure 13.2. Information on the Web is organized using a network metaphor: The links among Web pages turn the Web into a directed graph. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

208

Kossinets- Watts 2006

Burt 2004

Burt 2000

Coleman 1988

Granovetter 1985

Feld 1981

Granovetter 1973

Travers- Davis 1963 Milgram 1969

Rapoport Milgram Cartwright- Lazarsfeld- 1953 1967 Harary 1956 Merton 1954

Figure 13.3. The network of citations among a set of research papers forms a directed graph that, like the Web, is a kind of information network. In contrast to the Web, however, the passage of time is much more evident in citation networks, since their links tend to point strictly backward in time. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

209

Nash Game Equilibrium Theory

John Forbes Nash

RAND A Beautiful Mind ( lm)

Apollo 13 Conspiracy Ron Howard ( lm) Theories

NASA

Figure 13.4. The cross-references among a set of articles in an encyclopedia forms another kind of information network that can be represented as a directed graph. The figure shows the cross-references among a set of Wikipedia articles on topic in game theory, and their connections to related topics including popular culture and government agencies. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

210

Figure 13.5. Part of Douglas Hofstadter’s semantic network representing the rela- tionships among concepts in his book Godel,¨ Escher, Bach [217]. (Image from http://caad.arch.ethz.ch/teaching/nds/ws98/script/text/img-text/hofstadter2.gif) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

211

I'm a student I'm applying to Univ. of X at Univ. of X college

My song Classes lyrics USNews College Rankings

I teach at Networks Univ. of X USNews Featured Colleges Networks class blog

Blog post about college rankings Blog post about Company Z

Company Z's home page

Our Press Founders Releases

Contact Us

Figure 13.6. A directed graph formed by the links among a small set of Web pages. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

212

I'm a student I'm a applying to at Univ. of X college

Univ. of X My song lyrics

Classes USNews: College Rankings

I teach at Networks Univ. of X

USNews: Featured Colleges Networks class blog

Blog post about college rankings

Blog post Company Z's about home page Company Z

Our Press Founders Releases

Contact Us

Figure 13.7. A directed graph with its strongly connected components identified. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

213

Tendrils 44 Million nodes

IN SCC OUT

44 Million nodes56 Million nodes 44 Million nodes

Tubes

Disconnected components

Figure 13.8. A schematic picture of the bow-structure of the Web (image from [79]). P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

214

1 5 4 2 3

10 6 8 9 7

16 15 11 12 13 14

17

18

Figure 13.9. A directed graph of Web pages. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

215

SJ Merc News 2 votes

Wall St. 2 votes Journal

New York Times 4 votes

USA Today 3 votes

Facebook 1 vote

Yahoo! 3 votes

Amazon 3 votes

Figure 14.1. Counting in-links to pages for the query “newspapers.” P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

216

SJ Merc News 2 votes 8

Wall St. 2 votes Journal 11

7 New York Times 4 votes 3

6 5 6 USA Today 3 votes

3

Facebook 3 1 vote

Yahoo! 3 votes

Amazon 3 votes

Figure 14.2. Finding good lists for the query “newspapers”: each page’s value as a list is written as a number inside it. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

217

SJ Merc News new score: 19 8

Wall St. new score: 19 Journal 11

7 New York Times new score: 31 3

6 5 6 USA Today new score: 24

3

Facebook 3 new score: 5

Yahoo! new score: 15

Amazon new score: 12

Figure 14.3. Re-weighting votes for the query “newspapers”: each of the labeled page’s new score is equal to the sum of the values of all lists that point to it. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

218

SJ Merc News normalized .152 8

Wall St. normalized .152 Journal 11

7 New York Times normalized .248 3

6 5 6 USA Today normalized .192

3

Facebook 3 normalized .040

Yahoo! normalized .120

Amazon normalized .096

Figure 14.4. Re-weighting votes after normalizing for the query “newspapers.” P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

219

SJ Merc News limit .199...

.249

Wall St. limit .199... Journal .321

.181 New York Times limit .304... .015

.018 .123 .088 USA Today limit .205...

.003

Facebook limit .043... .003

Yahoo! limit .042...

Amazon limit .008...

Figure 14.5. Limiting hub and authority values for the query “newspapers.” P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

220

A

B C

D E F G

H

Figure 14.6. A collection of eight pages: A has the largest PageRank, followed by B and C (which collect endorsements from A). P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

221

A 4/13

2/13 2/13 B C

1/13D 1/13E F 1/13G 1/13

1/13 H

Figure 14.7. Equilibrium PageRank values for the network of eight Web pages from Figure 14.6. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

222

A

B C

D E F G

H

Figure 14.8. The same collection of eight pages, but F and G have changed their links to point to each other instead of to A. Without a smoothing effect, all the PageRank would go to F and G. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

223

Brown v. Mississippi, Miranda v. Arizona, 297 U.S. 278 (1936) 384 U.S. 436 (1966)

Authority Score Escobedo v. Illinois, 378 U.S. 478 (1964) Rhode Island v. Innis, 446 U.S. 291 (1980) 0.00 0.02 0.04 0.06 1940 1950 1960 1970 1980 1990 2000 Year

Figure 14.9. The rising and falling authority of key Fifth Amendment cases from the 20th century illustrates some of the relationships among them. (Image from [165].) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

224

Roe v. Wade, 310 U.S. 113 (1973)

Brown v. Board of Education, Authority Score 347 U.S. 483 (1954) 0.00 0.02 0.04 0.06 0 5 10 15 20 25 30 Years After Decision

Figure 14.10. Roe v. Wade and Brown v. Board of Education acquired authority at very different speeds. (Image from [165].) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

225

node 1 0101

0011 node 2 1000

0010 node 3 node 4

Figure 14.11. The directed hyperlinks among Web pages can be represented using an adja- cency matrix M: the entry Mij is equal to 1 if there is a link from node i to node j ,andMij = 0 otherwise. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

226

node 1 0101 2 9

0011 6 7 = node 2 1 000 4 2

0010 3 4 node 3 node 4

Figure 14.12. By representing the link structure using an adjacency matrix, the Hub and Authority Update Rules become matrix-vector multiplication. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

227

node 1 0 1/2 0 1/2

0 0 1/2 1/2 node 2 1000

0010 node 3 node 4

Figure 14.13. The flow of PageRank under the Basic PageRank Update Rule can be represented using a matrix N derived from the adjacency matrix M: the entry Nij specifies the portion of i ’s PageRank that should be passed to j in one update step. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

228

node 1 .05 .45 .05 .45

.05 .05 .45 .45 node 2 .85 .05 .05 .05

.05 .05 .85 .05 node 3 node 4

Figure 14.14. The flow of PageRank under the Scaled PageRank Update Rule can also be represented using a matrix derived from the adjacency matrix M (shown here with scaling factor s = 0.8). We denote this matrix by N˜ ; the entry N˜ij specifies the portion of i ’s PageRank that should be passed to j in one update step. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

229

C

A

D

B

E

Figure 14.15. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

230

D A

E B

F C

G

H

Figure 14.16. A network of Web pages. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

231

D A

E B

F C

G

H

Figure 14.17. A network of Web pages. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

232

C

A D

E B

F

Figure 14.18. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

233

3/10 A

1/102/10 1/10

B C D

E 3/10

Figure 14.19. A network of Web pages. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

234

1/4 A 1/8 1/8

D G

B C

1/8 1/8

E 1/4

Figure 14.20. A network of Web pages. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

235

.15 .15 A B

.10 .20 .10 C D E

.30 F

Figure 14.21. A collection of 6 Web pages, with possible PageRank values. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

236

C1

A1 B1 C2

A2 B2 C3 D

C4 A3 B3

C5

Figure 14.22. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

237

Figure 15.1. Search engines display paid advertisements (shown on the right-hand side of the page in this example) that match the query issued by a user. These appear alongside the results determined by the search engine’s own ranking method (shown on the left-hand side). An auction procedure determines the selection and ordering of the ads. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

238

clickthrough slots advertisers revenues rates per click 10 a x 3

5 b y 2

2 c z 1

Figure 15.2. In the basic set-up of a search engine’s market for advertising, there are a certain number of advertising slots to be sold to a population of potential advertisers. Each slot has a clickthrough rate: the number of clicks per hour it will receive, with higher slots generally getting higher clickthrough rates. Each advertisers has a revenue per click, the amount of money it expects to receive, on average, each time a user clicks on one of its ads and arrives at its site. We draw the advertisers in descending order of their revenue per click; for now, this is purely a pictorial convention, but in Section 15.2 we will show that the market in fact generally allocates slots to the advertisers in this order. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

239

slots advertisers valuations prices slots advertisers valuations

a x 30, 15, 6 13 a x 30, 15, 6

b y 20, 10, 4 3 b y 20, 10, 4

c z 10, 5, 2 0 c z 10, 5, 2

(a) (b)

Figure 15.3. The allocation of advertising slots to advertisers can be represented as a matching market, in which the slots are the items to be sold, and the advertisers are the buyers. An advertiser’s valuation for a slot is simply the product of its own revenue per click and the clickthrough rate of the slot; these can be used to determine market-clearing prices for the slots. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

240

slots advertisers valuations

a x 30, 15, 6 If x weren't there, y would do better by 20-10=10, and z would do better by 5-2=3, b y 20, 10, 4 for a total harm of 13.

c z 10, 5, 2

(a) slots advertisers valuations

a x 30, 15, 6 If y weren't there, x would be unaffected, and z would do better by 5-2=3, for a total b y 20, 10, 4 harm of 3.

c z 10, 5, 2

(b)

Figure 15.4. The VCG price an individual buyer pays for an item can be determined by working out how much better off all other buyers would be if this individual buyer were not present. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

241

i j j

h S-i S-h V V B-j B-j

(a) (b)

Figure 15.5. The heart of the proof that the VCG procedure encourages truthful bidding comes down to a comparison of the value of two matchings. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

242

clickthrough slots advertisers revenues rates per click 10 a x 7

4 b y 6

0 c z 1

Figure 15.6. An example of a set of advertisers and slots for which truthful bidding is not an equilibrium in the Generalized Second Price auction. Moreover, this example possesses multiple equilibria, some of which are not socially optimal. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

243

slots advertisers valuations

a x 70, 28, 0

b y 60, 24, 0

c z 10, 4, 0

Figure 15.7. Representing the example in Figure 15.6 as a matching market, with advertiser valuations for the full set of clicks associated with each slot. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

244

prices slots advertisers valuations

40 a x 70, 28, 0

4 b y 60, 24, 0

0 c z 10, 4, 0

Figure 15.8. Determining market-clearing prices for the example in Figure 15.6, starting with its representation as a matching market. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

245

Prices Sellers Buyers Valuations

3 a x 12, 4, 2

1 b y 8, 7, 6

0 c z 7, 5, 2

Figure 15.9. A matching market, with valuations and market-clearing prices specified, and a perfect matching in the preferred-seller graph indicated by the bold edges. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

246

i There is an alternating path, beginning with a non-matching edge, from i to an item (i*) of price 0.

h k

price 0 i* m

Figure 15.10. The key property of the preferred-seller graph for minimum market-clearing prices: for each item of price greater than 0, there is an alternating path, beginning with a non-matching edge, to an item of price 0. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

247

Prices Sellers Buyers Valuations

4 a w 7, 5, 4, 2

3 b x 6, 5, 2, 1

1 c y 5, 6, 2, 2

0 d z 4, 4, 2, 1

Figure 15.11. A matching market with market-clearing prices of minimum total sum. Note how from each item, there is an alternating path, beginning with a non-matching edge, that leads to the item of zero price. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

248

Sellers Buyers Valuations

a w 7, 5, 4, 2

b x 0, 0, 0, 0

c y 5, 6, 2, 2

d z 4, 4, 2, 1

Figure 15.12. If we start with the example in Figure 15.11 and zero out buyer x, the structure of the optimal matching changes significantly. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

249

Prices Sellers Buyers Valuations

4 a w 7, 5, 4, 2

3 b x 0, 0, 0, 0

1 c y 5, 6, 2, 2

0 d z 4, 4, 2, 1

Figure 15.13. However, even after we zero out buyer x, the same set of prices remain market- clearing. This principle is true not just for this example, but in general. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

250

i j

h k ?

Figure 15.14. In order for a matching edge from a buyer k to an item h to leave the preferred- seller graph when the price of i is reduced by 1, it must be that k now strictly prefers i .Inthis case, k must have previously viewed i as comparable in payoff to h, resulting in a non-matching edge to i . P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

251

X (1) No matching edges from a buyer in X to an item not in X. i (2) No non-matching edges from an item in X to a buyer not in X.

h k

m

Figure 15.15. Consider the set X of all nodes that can be reached from i using an alternating path that begins with a non-matching edge. As we argue in the text, if k is buyer in X ,thenthe itemtowhichsheismatchedmustalsobeinX . Also, if h is an item in X , then any buyer to which h is connected by a non-matching edge must also be in X . Here is an equivalent way to phrase this: there cannot be a matching edge connecting a buyer in X to an item not in X , or a non-matching edge connecting an item in X to a buyer not in X , P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

252

X If n was matched to e but now strictly prefers f, then:

(1) n must have had a non-matching edge to f, (2) f must be in X, and (3) e must not be in X.

In this case, either the f-n edge or the e-n edge causes a contradiction.

...... f

e n

Figure 15.16. We can reduce the prices of all items in X by 1 and still retain the market- clearing property: as we argue in the text, the only way this can fail is if some matching edge connects a buyer in X to an item not in X , or some non-matching edge connects an item in X to a buyer not in X . Either of these possibilities would contradict the facts in Figure 15.15. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

253

When j is matched to i in the original market, first find a path to a zero- priced item i*.

i j

h k

i* m

Figure 15.17. The first step in analyzing the market with j zeroed out: find an alternating path from item i — to which buyer j was matched in the original market — to a zero-priced item i ∗. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

254

In the zeroed-out market, j loses its preferred-seller edge to i, but acquires a preferred-seller edge to i*.

i j

h k

i* m

Figure 15.18. The second step in analyzing the market with j zeroed out: build the new preferred-seller graph by rewiring j ’s preferred-seller edges to point to the zero-priced items. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

255

We can still find a perfect matching in this new preferred-seller graph. This means that the same prices are also market-clearing for the zeroed-out market.

i j

h k

i* m

Figure 15.19. The third and final step in analyzing the market with j zeroed out: observe that the rewired preferred-seller graph still contains a perfect matching, in which j is now paired with i ∗. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

256

A AB B

Figure 16.1. Two events A and B in a sample space, and the joint event A ∩ B. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

257

States BG L q 1 − q Signals H 1 − q q Figure 16.2. The probability of receiving a low or high signal, as a function of the two possible states of the world (G or B). P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

258

#acc - #rej 3

cascade starts above this line 2

1

0 people 1234567

-1

-2 cascade starts below this line

-3

Figure 16.3. . P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

259

Price

r(0) y = r(x)

y = p price p

r(1)

Consumers

01x

Figure 17.1. When there are no network efforts, the demand for a product at a fixed market price p can be found by locating the point where the curve y = r (x) intersects the horizontal line y = p. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

260

Price

r(0) y = r(x)

constant cost per unit p* p*

r(1)

Consumers equilibrium 01 quantity x*

Figure 17.2. When copies of a good can be produced at a constant cost p∗ per unit, the equilibrium quantity consumed will be the number x ∗ for which r (x ∗) = p∗. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

261

Price

p*

Consumers 01z' z''

Figure 17.3. Suppose there are network effects and f (0) = 0, so that the good has no value to people when no one is using it. In this case, there can be multiple self-fulfilling expectations equilibria: at z = 0, and also at the points where the curve r (z) f (z) crosses the horizontal line at height p∗. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

262

Outcome z z = g(z)

Shared Expectation z

Figure 17.4. From a model with network effects, we can define a functionz ˆ = g(z): if everyone expects a z fraction of the population to purchase the good, then in fact a g(z) fraction will do so. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

263

z = z Outcome z z = g(z)

Shared Expectation z z' z''

Figure 17.5. When r (x) = 1 − x and f (z) = z, we get the curve for g(z) shown in the plot: g(z) = 1 − p∗/z if z ≥ p∗ and g(z) = 0ifz < p∗. Where the curvez ˆ = g(z) crosses the line zˆ = z, we have self-fulfilling expectations equilibria. Whenz ˆ = g(z) lies below the linez ˆ = z, we have downward pressure on the consumption of the good (indicated by the downward arrows); whenz ˆ = g(z) lies above the linez ˆ = z, we have upward pressure on the consumption of the good (indicated by the upward arrows). This indicates visually why the equilibrium at z is unstable while the equilibrium at z is stable. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

264

z = z Outcome z z = g(z)

Shared Expectation z z' z''

Figure 17.6. This curve g(z), and its relation to the linez ˆ = z, illustrates a pattern that we expect to see in settings more general than just the example used for Figure 17.5. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

265

z = z

z = g(z)

Figure 17.7. A “zoomed-in” region of a curvez ˆ = g(z) and its relation to the linez ˆ = z. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

266

z = z

z = g(z)

(z01 , z ) (z11 , z )

(z00 , z )

Figure 17.8. The audience size changes dynamically as people react to the current audience size. This effect can be tracked using the curvez ˆ = g(z) and the linez ˆ = z. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

267

z = z

(z12 , z ) z = g(z) (z22 , z )

(z01 , z ) (z11 , z )

(z00 , z )

Figure 17.9. Successive updates cause the audience size to converge to a stable equilibrium point (and to move away from the vicinities of unstable ones). P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

268

z = z Outcome z

z = g(z)

Shared Expectation z

Figure 17.10. When f (0) > 0, so that people have value for the product even when they are the only user, the curvez ˆ = g(z) no longer passes through the point (0, 0), and so an audience size of 0 is no longer an equilibrium. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

269

z = z Outcome z stable equilibrium (z**,z**)

z = g(z)

stable equilibrium (z*,z*)

(z11 , z )

(z00 , z ) = (0,0) Shared Expectation z

Figure 17.11. The audience grows dynamically from an initial size of zero to a relatively small stable equilibrium size of z∗. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

270

z = z Outcome stable equilibrium z

z = g(z)

Shared Expectation z

Figure 17.12. If the price is reduced slightly, the curvez ˆ = g(z) shifts upward so that it no longer crosses the linez ˆ = z in the vicinity of the point (z∗, z∗). P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

271

z = z Outcome stable equilibrium z

z = g(z)

(z66 , z )

(z55 , z )

(z44 , z ) (z33 , z ) (z22 , z )

(z11 , z )

(z00 , z ) = (0,0) Shared Expectation z

Figure 17.13. The small reduction in price that shifted the curvez ˆ = g(z) has a huge effect on the equilibrium audience size that is reached starting from zero. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

272

Player 2 Stay Go Stay 0, 0 0,x Player 1 Go x,0 −y,−y Figure 17.14. Two-Player El Farol Problem P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

273

0.5

0.45

0.4

0.35

0.3

0.25

0.2

0.15

0.1

0.05

0 −4 −3 −2 −10 12 34

Figure 18.1. The density of values in the normal distribution. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

274

In-degree (total, remote-only) distr. 1e + 10 Total in-degree 1e + 09 Power law, exponent 2.09 1e + 08 Remote-only in-degree 1e + 07 Power law, exponent 2.1 1e + 06 100000 10000

number of pages number 1000 100 10 1 1 10 100 100000 in-degree

Figure 18.2. A power law distribution (such as this one for the number of Web page in-links, from Broder et al. [79]) shows up as a straight line on a log-log plot. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

275

number of books

There are j books that have sold at least k copies.

j

sales volume k

Figure 18.3. The distribution of popularity. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

276

sales volume

The j-th most popular book has sold k copies.

k

number of books j

Figure 18.4. The distribution of popularity. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

277

w AB A a,a 0, 0 v B 0, 0 b, b Figure 19.1. A-B Coordination Game P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

278

A B

B A

v

B A

(1-p)d B pd neighbors neighbors use A use B

Figure 19.2. v must choose between behavior A and behavior B, based on what its neighbors are doing. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

279

r s r s

v w v w

t u t u

(a) (b)

r s r s

v w v w

t u t u

(c) (d)

Figure 19.3. Starting with v and w as the initial adopters, and payoffs a = 3andb = 2, the new behavior A spreads to all nodes in two steps. Nodes adopting A in a given step are drawn with dark borders; nodes adopting B are drawn with light borders. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

280

4 5 1

2 6 7 8

14 3 9 10

13 17

12 11

16

15

Figure 19.4. A larger example. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

281

4 5 1

2 6 7 8

14 3 9 10

13 17

12 11

16

15

(a)

4 5 1

2 6 7 8

14 3 9 10

13 17

12 11

16

15

(b)

Figure 19.5. Starting with nodes 7 and 8 as the initial adopters, the new behavior A spreads to some but not all of the remaining nodes. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

282

b f j

a d e h i l

c g k

Figure 19.6. A collection of four-node clusters, each of density 2/3. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

283

4 5 1

2 6 7 8

3 14 9 10

13 17

12

11 16

15

Figure 19.7. Two clusters of density 2/3 in the network from Figure 19.4. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

284

cluster

v

Figure 19.8. The spread of a new behavior, when nodes have threshold q, stops when it reaches a cluster of density greater than (1 − q). P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

285

nodes that don't eventually switch to A w

nodes that eventually switch to A

initial adopters

Figure 19.9. If the spread of A stops before filling out the whole network, the set of nodes that remain with B form a cluster of density greater than 1 − q. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

286

40

35 Percent hearing Percent accepting 30

25

20

Percent 15

10

5

0 192425 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 Never accepted

Figure 19.10. The years of first awareness and first adoption for hybrid seed corn in the Ryan- Gross study. (Image from [352].) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

287

u

w

x

v

Figure 19.11. The u-w and v-w edges are more likely to act as conduits for information than for high-threshold innovations. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

288

w AB A a ,a 0, 0 v v w B 0, 0 bv,bw Figure 19.12. A-B Coordination Game P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

289

.4 2

.1 .7 3 4 .3 1 7 .1 9

.4 .5 5 6 .4 8 .1 10

(a)

.4 2

.1 .7 3 4 .3 1 7 .1 9

.4 .5 5 6 .4 8 .1 10

(b)

Figure 19.13. Starting with node 1 as the unique initial adopter, the new behavior A spreads to some but not all of the remaining nodes. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

290

233333 u v u v u v

4 3333 w w x w x

(a) (b) (c)

Figure 19.14. Each node in the network has a threshold for participation, but only knows the threshold of itself and its neighbors. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

291

x v u w

Figure 19.15. An infinite path with a set of early adopters of behavior A (shaded). P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

292

a b c d e

f g

h i

j k

l m n o p

Figure 19.16. An infinite grid with a set of early adopters of behavior A (shaded). P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

293

v x v x w w

u u

(a) (b)

Figure 19.17. Let the nodes inside the dark oval be the adopters of A. One step of the process is shown, in which v and w adopt A: after they adopt, the size of the interface has strictly decreased. In general, the size of the interface strictly decreases with each step of the process > 1 when q 2 . P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

294

w ABAB A a,a 0, 0 a,a v B 0, 0 b, b b, b AB a,a b, b (a,b)+, (a,b)+ Figure 19.18. A Coordination Game with a bilingual option. Here the notation (a, b)+ denotes the larger of a and b. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

295

z x v r s u w y

Figure 19.19. An infinite path, with nodes r and s as initial adopters of A. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

296

z x v r s u w y

Start B B B A A B B B

Step 1 B B AB A A AB B B

Step 2 B AB AB A A AB AB B

Step 3 AB AB A A A A AB AB

Step 4 AB A A A A A A AB

Figure 19.20. With payoffs a = 5andb = 3 for interaction using A and B respectively, and a cost c = 1 for being bilingual, the strategy A spreads outward from the initial adopters r and s through a two-phase structure. First, the strategy AB spreads, and then behind it, nodes switch permanently from AB to A. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

297

A?B

w

payoff from choosing A: a payoff from choosing B: 1 payoff from choosing AB: a + 1 - c

Figure 19.21. The payoffs to a node on the infinite path with two neighbors using A and B. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

298

c A vs. B c AB vs. B

A B

1 1 A vs. AB

AB

1 a 1 a (a) (b)

Figure 19.22. Given a node with neighbors using A and B, the values of a and c determine which of the strategies A, B,orAB it will choose. (Here, by re-scaling, we can assume b = 1.) We can represent the choice of strategy as a function of a and c by dividing up the (a, c)-plane into regions corresponding to different choices. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

299

AB ? B

w

payoff from choosing A: a payoff from choosing B: 2 payoff from choosing AB: a + 1 - c (if A is better)

Figure 19.23. The payoffs to a node on the infinite path with two neighbors using AB and B. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

300

c A vs. B c AB vs. B

A B 1 1 A vs. AB

AB

12 a 1 2 a (a) Lines showing break-even points between strategies. (b) Regions defining the best choice of strategy.

Figure 19.24. Given a node with neighbors using AB and B, the values of a and c determine which of the strategies A, B,orAB it will choose, as shown by this division of the (a, c)-plane into regions. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

301

c

A spreads directly (no adoption of AB) neither A nor AB spreads

1

AB spreads AB spreads indefinitely, but then followed by A stops (B becomes vestigial)

12 a

Figure 19.25. There are four possible outcomes for how A spreads or fails to spread on the infinite path, indicated by this division of the (a, c)-plane into four regions. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

302

c

The region where a cascade 1 of A's can occur

1 2 a

Figure 19.26. The set of values for which a cascade of A’s can occur defines a region in the (a, c)-plane consisting of a vertical line with a triangular “cut-out.” P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

303

c d

e f g h

i j

k

Figure 19.27. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

304

h

e

c i

f

d j

g

k

Figure 19.28. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

305

c d

e f

g h i j

k l

m n

Figure 19.29. A social network in which a new behavior is spreading. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

306

3 2 1 9

6 7 8 5

4

12 10 11

15

13 14

16

Figure 19.30. A social network on which a new behavior diffuses. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

307

E

B A

C

D

Figure 19.31. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

308

you

your friends

friends of your friends

(a)

you

your friends

friends of your friends

(b)

Figure 20.1. Social networks expand to reach many people in only a few steps. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

309

(a) (b)

Figure 20.2. The Watts-Strogatz model arises from a highly clustered network (such as the grid), with a small number of random links added in. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

310

Figure 20.3. The general conclusions of the Watts-Strogatz model still follow even if only a small fraction of the nodes on the grid each have a single random link. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

311

Figure 20.4. A drawing of one of the successful paths converging on the target person, from Milgram’s original article in Psychology Today. (Image from [292].) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

312

(a) (b)

Figure 20.5. With a small clustering exponent, the random edges tend to span long distances on the grid; as the clustering exponent increases, the random edges become shorter. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

313

7.0

ln T

6.0

5.0

0.0 1.0 2.0 exponent q

Figure 20.6. Simulation of decentralized search in the grid-based model with clustering expo- nent q. Each point is the average of 1000 runs on (a slight variant of) a grid with 400 million nodes. The delivery time is best in the vicinity of exponent q = 2, as expected; but even with this number of nodes, the delivery time is comparable over the range between 1.5 and 2 [244]. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

314

number of nodes is 2 proportional to d

probability of linking to each is proportional to d-2

v 2d d

Figure 20.7. The concentric scales of resolution around a particular node. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

315

Figure 20.8. The population of the LiveJournal network studied by Liben-Nowell et al. (Image from [272].) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

316

distance d

rank ~ d 2

(a) (b)

Figure 20.9. When the population density is non-uniform, it can be useful to understand how far w is from v in terms of its rank rather than its physical distance. In (a), we say that w has rank 7 with respect to v because it is the 7th closest node to v, counting outward in order of distance. In (b), we see that for the original case in which the nodes have a uniform population density, a node w at distance d from v will have a rank that is proportional to d2, since all the nodes inside the circle of radius d will be closer to v than w is. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

317

1e-06 1.05 P(r) ∝ 1/r 1e-07 West Coast East Coast ∝ 1e-08 P(r) 1/r

1e-02 B P(r) 1e-03 1e-09 1e-04 1e-05 ∝ −1.2+ε 1e-10 P(r) r 2 3 4 5 6 − 10 10 10 10 10 1e-06 P(r) ∝ r 1.15 rank r (a) (b)

Figure 20.10. The probability of a friendship as a function of geographic rank on the blogging site LiveJournal. (Image from [272].) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

318

v

Figure 20.11. When nodes belong to multiple foci, we can define the social distance between two nodes to be the smallest focus that contains both of them. In the figure, the foci are represented by ovals; the node labeled v belongs to five foci of sizes 2, 3, 5, 7, and 9 (with the largest focus containing all the nodes shown). P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

319

Figure 20.12. The pattern of e-mail communication among 436 employees of Hewlett Packard Research Lab is superimposed on the official organizational hierarchy, show- ing how network links span different social foci [6]. (Image from http://www- personal.umich.edu/ ladamic/img/hplabsemailhierarchy.jpg) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

320

core

periphery

Figure 20.13. The core-periphery structure of social networks. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

321

a a p b p b

o c o c

n d n d

m e m e

l f l f

k g k g

j h j h i i

(a) (b)

Figure 20.14. The analysis of decentralized search is a bit cleaner in one dimension than in two, although it is conceptually easy to adapt the arguments to two dimensions. As a result, we focus most of the discussion on a one-dimensional ring augmented with random long-range links. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

322

a p b

o c

n d

m e

l f

k g

j h i

Figure 20.15. In myopic search, the current message-holder chooses the contact the lies closest to the target (as measured on the ring), and it forwards the message to this contact. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

323

s

j+1 2

2j phase j t j-1 2

phase j-1

Figure 20.16. We analyze the progress of myopic search in phases. Phase j consists of the portion of the search in which the message’s distance from the target is between 2 j and 2 j +1. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

324

y = 1/x

1

1/2 1/3

1 234

Figure 20.17. Determining the normalizing constant for the probability of links involves eval- uating the sum of the first n/2 reciprocals. An upper bound on the value of this sum can be determined from the area under the curve y = 1/x. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

325

s

j+1 2 v

w distance d 2j t j-1 2

distance at most d/2?

Figure 20.18. At any given point in time, the search is in some phase j , with the message residing at a node v at distance d from the target. The phase will come to an end if v’s long- range contact lies at distance ≤ d/2 from the target t, and so arguing that the probability of this event is large provides a way to show that the phase will not last too long. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

326

s

v

distance d

w distance d/2 t distance d/2

there are d+1 nodes within distance d/2 of t, and each has prob. at least proportional to 1/(d log n)

Figure 20.19. Showing that, with reasonable probability, v’s long-range contact lies within half the distance to the target. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

327

v

w

distance d

t radius d/2

Figure 20.20. The analysis for the one-dimensional ring can be carried over almost directly to the two-dimensional grid. In two dimensions, with the message at a current distance d from the target t, we again look at the set of nodes within distance d/2oft, and argue that the probability of entering this set in a single step is reasonably large. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

328

s

v

K

distance n t distance n

It takes a long-time for the search to find a long-range link into K, and crossing K via local contacts is slow too.

Figure 20.21. To show that decentralized search strategies require large amounts√ of time with exponent q = 0, we argue that it is difficult for the search to cross the set of n nodes closest to the target. Similar arguments hold for other exponents q < 1. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

329

(a)

(b)

(c)

Figure 21.1. The branching process model is a simple framework for reasoning about the spread of an epidemic as one varies both the amount of contact among individuals and the level of contagion. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

330

t t

s u s u y y

x z x z

r v r v

w w

(a) (b)

t t

s u s u y y

x z x z

r v r v

w w

(c) (d)

Figure 21.2. The course of an SIR epidemic in which each node remains infectious for a number of steps equal to tI = 1. Starting with nodes y and z initially infected, the epidemic spreads to some but not all of the remaining nodes. In each step, shaded nodes with dark borders are in the Infectious (I ) state and shaded nodes with thin borders are in the Removed (R) state. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

331

Figure 21.3. In this network, the epidemic is forced to pass through a narrow “channel” of nodes. In such a structure, even a highly contagious disease will tend to die out relatively quickly. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

332

t

s u y

x z

r v

w

Figure 21.4. An equivalent way to view an SIR epidemic is in terms of percolation,where we decide in advance which edges will transmit infection (should the opportunity arise) and which will not. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

333

u u u u u

v v v v v

w w w w w

(a) (b) (c) (d) (e)

Figure 21.5. In an SIS epidemic, nodes can be infected, recover, and then be infected again. In each step, the nodes in the Infectious state are shaded. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

334

u u u u u

v v v v v

w w w w w

step 0 step 1 step 2 step 3 step 4 (a)

u u u u u

v v v v v

w w w w w

step 0 step 1 step 2 step 3 step 4 (b)

Figure 21.6. An SIS epidemic can be represented in the SIR model by creating a separate copy of the contact network for each time step: a node at time t can infect its contact neighbors at time t + 1. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

335

0.4 c = 0.01

0.2

0.0 0.4 c = 0.2 ) t (

inf 0.2 n

0.0 0.4 c = 0.9

0.2

0.0 5200 5300 5400 5500 5600 t

Figure 21.7. These plots depict the number of infected people over time (the quantity ninf(t)on the y-axis) by SIRS epidemics in networks with different proportions of long-range links. With c representing the fraction of long-range links, we see an abscence of oscillations for small c (c = 0.01), wide oscillations for large c (c = 0.9), and a transitional region (c = 0.2) where oscillations intermittently appear and then disappear. (Results and image from [263].) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

336

u x u x

[1,5] [1,5] [2,6] [2,6] [7,11] [12,16] v w v w

[12,16] [7,11]

y y

(a) (b)

Figure 21.8. Different timings for the edges in a contact network can affect the potential for a disease to spread among individuals. For example, in (a) the disease can potentially pass all the way from u to y, while in (b) it cannot. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

337

[1,5] [6,10] [1,5] [2,6] u v w u v w

(a) (b)

Figure 21.9. A disease tends to be able to spread more widely with concurrent partnerships (b) than with serial partnerships (a). P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

338

u x u x

[1,5] [1,5] [2,6] [2,6] [12,16] [3,7] v w v w

[7,11] [1,5]

y y

(a) (b)

Figure 21.10. In larger networks, the effects of concurrency on disease spreading can become particularly pronounced. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

339

current generation

new generation

each offspring comes from a single parent chosen uniformly at random

Figure 21.11. In the basic Wright-Fisher model of single-parent ancestry, time moves step- by-step in generations; there are a fixed number of individuals in each generation; and each offspring in a new generation comes from a single parent in the current generation. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

340

s t u v w x y z

Figure 21.12. We can run the model forward in time through a sequence of generations, ending in a set of present-day individuals. Each present-day individual can then follow its single-parent lineage by following edges leading upward through the network. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

341

s t u v w x y z

Figure 21.13. A re-drawing of the single-parent network fom Figure 21.12. As we move back in time, lineages of different present-day individuals coalesce until they have all converged at the most recent common ancestor. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

342

j

Individual j is infected if each contact from the root to j successfully transmits the disease

Figure 21.14. To determine the probability that a particular node is infected, we multiply the (independent) probabilities of infection on each edge leading from the root to the node. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

343

probability p n of each being infected

n k individuals

Figure 21.15. The expected number of individuals infected at level n is the product of the number of individuals at that level (kn) and the probability that each is infected (pn). P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

344

prob p

j

prob. q n-1

n-1 levels

Figure 21.16. In order for there to be an infection at level n, the root must infect one of its immediate descendents, and then this descendent must, recursively, produce an infection at level n − 1. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

345

1 y = x

y = f(x)

0 1

Figure 21.17. To determine the limiting probability of an infection at depth n,asn goes to infinity, we need to repeatedly apply the function f (x) = 1 − (1 − px)k, which is the basis for the recurrence qn = f (qn−1). P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

346

1 y = x

y = f(x)

0 1

Figure 21.18. When we repeatedly apply the function f (x), starting at x = 1, we can follow its trajectory by tracing out the sequence of steps between the curves y = f (x)andy = x. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

347

1 y = x

y = f(x)

0 1

Figure 21.19. When y = f (x) only intersects y = x at zero, the repeated application of f (x) starting at x = 1 converges to 0. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

348

Figure 21.20. We can view the search for coalescence as a backward walk through a sequence of earlier generations, following lineages as they collide with each other. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

349

From 2 to 1: waiting for an event of prob. 1/N

From 3 to 2: waiting for an event of prob. 3/N

From 4 to 3: waiting for an event of prob. 6/N

From 5 to 4: waiting for an event of prob. 10/N From 6 to 5: waiting for an event of prob. 15/N

Figure 21.21. Assuming that no three lineages ever collide simultaneously, the time to coa- lescence can be computed as the time for a sequence of distinct collision events to occur. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

350

u x

[4,8] [1,3] [14,18]

[5,9] s v y

[12,16] [7,12] [10,16]

w z

Figure 21.22. Contacts among a set of people, with time intervals showing when the contacts occurred. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

351

a b c d e

Figure 21.23. A contact graph on five people. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

352

payoff

w

Figure 22.1. When we assume that an individual’s utility is logarithmic in his wealth, this means that utility grows at a decreasing rate as wealth increases. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

353

-0.5

-1

-1.5

-2

-2.5

-3

-3.5 0 0.2 0.4 0.6 0.8 1

Figure 22.2. A plot of a ln(r ) + bln(1 − r ) as a function of r ,whena = 0.75. The maximum is achieved when r = a. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

354

Then by transitivity, W defeats Suppose X defeats the most everything X defeats, plus X other alternatives, but W itself. So W defeats more defeats X. than X does.

W W

X X

(a) (b)

Figure 23.1. With complete and transitive preferences, the alternative X that defeats the most others in fact defeats all of them. If not, some other alternative W would defeat X (as in (a)), but then by transitivity W would alternatives than X does (as in (b)). P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

355

College National Ranking Average Class Size Scholarship Money Offered X 4 40 $3000 Y 8 18 $1000 Z 12 24 $8000

Figure 23.2. When a single individual is making decisions based on multiple criteria, the Condorcet Paradox can lead to non-transitive preferences. Here, if a college applicants wants a school with a high ranking, small average class size, and a large scholarship offer, it is possible for each option to be defeated by one of the others on a majority of the criteria. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

356

Overall group favorite

Outcome of A-B winner vs. C

D

Winner of A vs. B

C

A B

(a)

Overall group favorite

Winner of Winner of A vs. B C vs. D

A B C D

(b)

Figure 23.3. One can use majority rule for pairs to build voting systems on three of more alternatives. The alternatives are considered according to a particular “agenda” (in the form of an elimination tournament), and they are eliminated by pairwise majority vote according to this agenda. This produces an eventual winner that serves as the overall group favorite. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

357

Z wins X wins overall overall

X wins Y wins here here

Z X

X Y Z Y

(a) (b)

Figure 23.4. With individual rankings as in the Condorcet Paradox, the winner of the elimina- tion tournament depends entirely on how the agenda is set. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

358

rank rank 1 1 2 2 3 3

4 4 5 5

alternatives alternatives X1 X2 X3 X4 X5 X1 X2 X3 X4 X5

(a) (b) rank 1 2 3

4 5

alternatives X1 X2 X3 X4 X5

(c)

Figure 23.5. With single-peaked preferences, each voter’s ranking of alternatives decreases on both sides of a “peak” corresponding to her favorite choice. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

359

All voters with peaks left of Xm prefer Xm to Xt

Xm Xt rank

alternatives

Figure 23.6. The proof that the median individual favorite X m defeats every other alternative X t in a pairwise majority vote: if X t is to the right of X m,thenX m is preferred by all voters whose peak is on X m or to its left. (The symmetric argument applies when X t is to the left of X m.) P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

360

Profile 1: Individual Ranking Ranking restricted to X and Y 1 W  X  Y  Z X  Y 2 W  Z  Y  X Y  X 3 X  W  Z  Y X  Y

Profile 2: Individual Ranking Ranking restricted to X and Y 1 X  Y  W  Z X  Y 2 Z  Y  X  W Y  X 3 W  X  Y  Z X  Y

Figure 23.7. The two profiles above involve quite different rankings, but for each individual, her ranking restricted to X and Y in the first profile is the same as her ranking restricted to X and Y in the second profile. If the voting system satisfies IIA, then it must produce the same ordering of X and Y in the group ranking for both profiles. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

361

Profile P : Individual Ranking 1 X ···Y ···Z ··· 2 X ···Z ···Y ··· 3 ···Y ···Z ···X

Profile P : Individual Ranking 1 X ···Z  Y ··· 2 X ···Z ···Y ··· 3 ···Z  Y ···X

Figure 23.8. A polarizing alternative is one that appears at the beginning or end of every indi- vidual ranking. A voting system that satisfies IIA must put such an alternative at the beginning or end of the group ranking as well. The figure shows the key step in the proof of this fact, based on rearranging individual rankings while keeping the polarizing alternative in its original position. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

362

Profile P0: Individual Ranking 1 ···Y ···Z ···X 2 ···Z ···Y ···X 3 ···Y ···Z ···X

Profile P1: Individual Ranking 1 X ···Y ···Z ··· 2 ···Z ···Y ···X 3 ···Y ···Z ···X

Profile P2: Individual Ranking 1 X ···Y ···Z ··· 2 X ···Z ···Y ··· 3 ···Y ···Z ···X

Profile P3: Individual Ranking 1 X ···Y ···Z ··· 2 X ···Z ···Y ··· 3 X ···Y ···Z ···

Figure 23.9. To find a potential dictator, one can study how a voting system behaves when we start with an alternative at the end of each individual ranking, and then gradually (one person at a time) move it to the front of people’s rankings. P1: SBT cuus984-net CUUS984-Easley 0 521 19533 1 November 30, 2009 16:2

363

Total Revenue

Optimal utilization

Over-utilization

Fraction of population 0 c/2 c using commons

Figure 24.1. In the Tragedy of the Commons, a freely shared resource can easily be overused unless some form of property rights are established.