On the Complexity of Boolean Networks

Total Page:16

File Type:pdf, Size:1020Kb

On the Complexity of Boolean Networks On the Complexity of Boolean Networks Author Edgar Alberto Z´u~nigaP´erez Supervisors Dr. Edgardo Ugalde Salda~na Dr. Jes´usUr´ıasHermosillo A thesis presented for the degree of Master of Science in Physics Universidad Aut´onomade San Luis Potos´ı Posgrado en F´ısica Facultad de Ciencias San Luis Potos´ı,S.L.P., M´exico Agosto, 2019 On the Complexity of Boolean Networks Edgar Alberto Z´u~nigaP´erez Abstract The Boolean Networks are a model which has proven to be useful to model real- world systems. The Random Boolean Network model introduced by Kauffman in 1969 has been extensively used to model regulatory genetic networks and other types of systems. In this thesis, we propose the existence of a correlation between the complexity of a Boolean Network and the complexity of its constituents, i.e., the complexity of its topology and its set of updating functions. This hypothesis was tested by performing a series of experiments with the help of the implementation to approximate Kolmogorov complexity called Block Decomposition Method (BDM). First, we present a method to measure the complexity of the individual components of a Boolean Network and then, we propose a representation which can be used to measure the complexity of a Boolean Network. The results showed that this hypothesis was correct for Random Boolean Networks with small topologies given a sufficiently large set of Boolean Networks. However, it could not be generalized to larger topologies because of the enormous computational time required by the implementation of the BDM to approximate Kolmogorov complexity. Finally, the difficulties to measure the complexities of Random Boolean Networks with larger topologies inspired us to propose a novel method to measure Kolmogorov complexity. We have called this method the Block Decomposition Method with Neural Networks (BDMNN) and is based on the use of Neural Networks to perform a regression that approximates Kolmogorov complexity. These Neural Networks were trained by using random sequences for which its complexity was computed using the original BDM implementation to approximate Kolmogorov complexity. Our implementation was evaluated by performing some experiments with random sequences of bits. The results showed that our implementation is faster and requires less computational power to approximate Kolmogorov complexity than the original implementation. The only cost to be paid is a decrease in the accuracy of the results, however, we expect this error can be easily reduced with some little modifications to the method. iii Dedication I dedicate this thesis to all my teachers. v Acknowledgments I want to thank to the Universidad Aut´onomade San Luis Potos´ı,especially to the staff of its Physics Institute for their support and facilities to write this thesis. The knowledge that I acquired from my teachers in the graduate program was priceless and its dedication has paid off with this work. Finally, I also would like to thank the Consejo Nacional de Ciencia y Tecnolog´ıa(CONACYT) for their financial support throughout my studies to get the master's degree. vi Contents 1 Introduction 1 2 Review of Graph Theory 3 2.1 What is a Graph? . 3 2.2 The Vertex Degree . 5 2.2.1 Some Basic Definitions . 5 2.2.2 The Handshaking Lemma . 7 2.3 Adjacency and Incidence Matrices . 7 2.3.1 The Adjacency Matrix . 8 2.3.2 The Incidence Matrix . 8 2.4 Isomorphic Graphs . 9 2.5 Paths and Cycles . 10 2.6 Some Families of Graphs . 10 2.6.1 Null Graphs . 12 2.6.2 Complete Graphs . 12 2.6.3 Cycle Graphs . 13 2.6.4 Path Graphs . 13 2.6.5 Bipartite Graphs . 13 2.6.6 Cube Graphs . 14 2.6.7 Trees . 14 2.6.8 Circulant Graphs . 15 2.7 Counting Graphs . 15 2.7.1 Labeled Graphs . 16 2.7.2 Unlabeled Graphs . 16 2.7.3 Counting Adjacency Matrices . 16 2.8 Directed Graphs . 17 2.8.1 The Underlying Graph . 18 2.8.2 Subdigraphs . 18 2.8.3 Local Degrees in a Digraph . 18 2.8.4 Adjacency and Incidence Matrices for a Digraph . 19 2.8.5 Isomorphic Digraphs . 19 2.8.6 Counting Digraphs . 20 2.9 Random Graphs . 20 2.9.1 The Watts-Strogatz Small-World Graph Distribution . 21 2.9.2 The Barab´asi-Albert Graph Distribution . 22 2.9.3 The Uniform Graph Distribution . 23 2.10 Other Ways of Representing Graphs . 23 vii viii CONTENTS 3 Boolean Networks 25 3.1 Boolean Networks and The Random Boolean Network Model . 25 3.1.1 Boolean Networks . 25 3.1.2 Random Boolean Networks . 26 3.1.3 Topology . 26 3.1.4 Updating Functions . 28 3.1.5 Counting RBNs . 31 3.1.6 Dynamics: The State Space and Some Basic Definitions . 32 3.2 The Dynamical Phases . 35 3.3 Other Updating Schemes . 37 3.3.1 Asynchronous RBNs . 37 3.3.2 Generalized Asynchronous RBNs . 37 3.3.3 Deterministic Asynchronous RBNs . 38 3.3.4 Deterministic Generalized Asynchronous RBNs . 38 3.3.5 Mixed-context RBNs . 38 3.4 Applications of The RBNs . 38 3.5 Software to Study RBNs . 40 4 Algorithmic Complexity 41 4.1 The Kolmogorov Complexity . 41 4.1.1 The Turing Machine . 43 4.1.2 The Universal Turing Machine . 45 4.1.3 The Halting Problem . 47 4.1.4 The Formal Definition of K-Complexity . 48 4.2 Lossless Compression and Entropy as Approximations to K-Complexity 49 4.2.1 The Lossless Compression . 50 4.2.2 The Shannon Entropy . 51 4.3 Towards a Better Measurement of K-Complexity . 56 4.3.1 The Invariance Theorem . 56 4.3.2 The Algorithmic Probability and The Coding Theorem . 57 4.4 A Library to Measure The K-Complexity . 59 4.4.1 Methodology . 59 4.5 Some Applications of Kolmogorov Complexity . 61 5 The Complexity of Random Boolean Networks 63 5.1 Software and Hardware Features . 64 5.2 The Complexity of Random Sequences of Bits . 64 5.3 The Complexity of Random Graphs . 66 5.3.1 Complexity from The Watts-Strogatz Graph Distribution . 66 5.3.2 Complexity from The Barab´asi-Albert Graph Distribution . 68 5.4 The Complexity of Random Digraphs . 70 5.4.1 The Complexity from Increasing the Vertex In-Degree . 70 5.4.2 The Complexity from The Uniform Digraph Distribution . 72 5.5 The Complexity of Isomorphic Networks . 73 5.5.1 The Complexity of Isomorphic Graphs . 73 5.5.2 The Complexity of Isomorphic Digraphs . 76 5.5.3 The Complexity from The Uniform Digraph Distribution Re- visited by Considering Isomorphisms . 78 5.6 The Complexity of a Set Boolean Functions . 80 CONTENTS ix 5.6.1 The Complexity from Sets of Random Boolean Functions with Increasing Number of Inputs . 81 5.6.2 The Complexity from Sets of Random Boolean Functions with Fixed Number of Inputs . 83 5.7 The Complexity of Boolean Networks . 86 5.7.1 A Lossless Representation for Boolean Networks . 86 5.7.2 The Correlation Between the Complexity of Random Boolean Networks and The Complexity of Its Topology . 88 5.7.3 The Width of the Distribution of Complexities for Random Boolean Networks . 91 5.7.4 The Correlation Between the Complexity of Random Boolean Networks and the Complexity of its Set of Updating Functions 94 5.8 Conclusions . 97 6 A Low-cost and Faster Implementation of Kolmogorov Complexity for Binary Sequences 101 6.1 Theoretical Framework . 102 6.1.1 Machine Learning . 102 6.1.2 Neural Networks . 104 6.1.3 Machine Learning Frameworks . 120 6.2 Methodology . 120 6.2.1 Software and Hardware Features . 122 6.2.2 The Training and Target Sets . 122 6.2.3 Design of The Neural Networks . 123 6.2.4 The Learning Settings . 124 6.2.5 The Block Decomposition Method with Neural Networks . 125 6.3 Results . 126 6.3.1 The Complexity of Random Sequences of Bits . 126 6.3.2 The Error and Computational Time of the BDMNN . 127 6.3.3 The BDMNN Versus a Parallel Implementation of the BDM . 128 6.4 Conclusions . 129 7 General Conclusions 135 A Algorithms 137 A.1 Wolfram Language Algorithms . 137 A.2 Python Algorithms . 148 References 151 List of Figures 2.1 A simple graph versus a graph that is not simple. 4 2.2 Two graph diagrams that look different but represent the same graph. 5 2.3 A subgraph. 5 2.4 Examples of regular graphs. 6 2.5 Basic definitions for a graph. 7 2.6 Adjacency and incidence matrices. 9 2.7 Isomorphic graphs. 11 2.8 Example of a walk. 11 2.9 Examples of connected and disconnected graphs. 12 2.10 The first six null graphs. 12 2.11 The first six complete graphs. 12 2.12 The first six cycle graphs. 13 2.13 The first six path graphs. 13 2.14 Two examples of bipartite graphs. 14 2.15 Examples of complete bipartite graphs. 14 2.16 The first four cube graphs. 14 2.17 Two examples of tree graphs..
Recommended publications
  • Group-In-A-Box Layout for Multi-Faceted Analysis of Communities
    2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing Group-In-a-Box Layout for Multi-faceted Analysis of Communities Eduarda Mendes Rodrigues*, Natasa Milic-Frayling †, Marc Smith‡, Ben Shneiderman§, Derek Hansen¶ * Dept. of Informatics Engineering, Faculty of Engineering, University of Porto, Portugal [email protected] † Microsoft Research, Cambridge, UK [email protected] ‡ Connected Action Consulting Group, Belmont, California, USA [email protected] § Dept. of Computer Science & Human-Computer Interaction Lab University of Maryland, College Park, Maryland, USA [email protected] ¶ College of Information Studies & Center for the Advanced Study of Communities and Information University of Maryland, College Park, Maryland, USA [email protected] Abstract—Communities in social networks emerge from One particularly important aspect of social network interactions among individuals and can be analyzed through a analysis is the detection of communities, i.e., sub-groups of combination of clustering and graph layout algorithms. These individuals or entities that exhibit tight interconnectivity approaches result in 2D or 3D visualizations of clustered among the wider population. For example, Twitter users who graphs, with groups of vertices representing individuals that regularly retweet each other’s messages may form cohesive form a community. However, in many instances the vertices groups within the Twitter social network. In a network have attributes that divide individuals into distinct categories visualization they would appear as clusters or sub-graphs, such as gender, profession, geographic location, and similar. It often colored distinctly or represented by a different vertex is often important to investigate what categories of individuals shape in order to convey their group identity.
    [Show full text]
  • Joint Estimation of Preferential Attachment and Node Fitness In
    www.nature.com/scientificreports OPEN Joint estimation of preferential attachment and node fitness in growing complex networks Received: 15 April 2016 Thong Pham1, Paul Sheridan2 & Hidetoshi Shimodaira1 Accepted: 09 August 2016 Complex network growth across diverse fields of science is hypothesized to be driven in the main by Published: 07 September 2016 a combination of preferential attachment and node fitness processes. For measuring the respective influences of these processes, previous approaches make strong and untested assumptions on the functional forms of either the preferential attachment function or fitness function or both. We introduce a Bayesian statistical method called PAFit to estimate preferential attachment and node fitness without imposing such functional constraints that works by maximizing a log-likelihood function with suitably added regularization terms. We use PAFit to investigate the interplay between preferential attachment and node fitness processes in a Facebook wall-post network. While we uncover evidence for both preferential attachment and node fitness, thus validating the hypothesis that these processes together drive complex network evolution, we also find that node fitness plays the bigger role in determining the degree of a node. This is the first validation of its kind on real-world network data. But surprisingly the rate of preferential attachment is found to deviate from the conventional log-linear form when node fitness is taken into account. The proposed method is implemented in the R package PAFit. The study of complex network evolution is a hallmark of network science. Research in this discipline is inspired by empirical observations underscoring the widespread nature of certain structural features, such as the small-world property1, a high clustering coefficient2, a heavy tail in the degree distribution3, assortative mixing patterns among nodes4, and community structure5 in a multitude of biological, societal, and technological networks6–11.
    [Show full text]
  • Modern Discrete Probability I
    Preliminaries Some fundamental models A few more useful facts about... Modern Discrete Probability I - Introduction Stochastic processes on graphs: models and questions Sebastien´ Roch UW–Madison Mathematics September 6, 2017 Sebastien´ Roch, UW–Madison Modern Discrete Probability – Models and Questions Preliminaries Review of graph theory Some fundamental models Review of Markov chain theory A few more useful facts about... 1 Preliminaries Review of graph theory Review of Markov chain theory 2 Some fundamental models Random walks on graphs Percolation Some random graph models Markov random fields Interacting particles on finite graphs 3 A few more useful facts about... ...graphs ...Markov chains ...other things Sebastien´ Roch, UW–Madison Modern Discrete Probability – Models and Questions Preliminaries Review of graph theory Some fundamental models Review of Markov chain theory A few more useful facts about... Graphs Definition (Undirected graph) An undirected graph (or graph for short) is a pair G = (V ; E) where V is the set of vertices (or nodes, sites) and E ⊆ ffu; vg : u; v 2 V g; is the set of edges (or bonds). The V is either finite or countably infinite. Edges of the form fug are called loops. We do not allow E to be a multiset. We occasionally write V (G) and E(G) for the vertices and edges of G. Sebastien´ Roch, UW–Madison Modern Discrete Probability – Models and Questions Preliminaries Review of graph theory Some fundamental models Review of Markov chain theory A few more useful facts about... An example: the Petersen graph Sebastien´ Roch, UW–Madison Modern Discrete Probability – Models and Questions Preliminaries Review of graph theory Some fundamental models Review of Markov chain theory A few more useful facts about..
    [Show full text]
  • Markov Model Checking of Probabilistic Boolean Networks Representations of Genes
    Markov Model Checking of Probabilistic Boolean Networks Representations of Genes Marie Lluberes1, Jaime Seguel2 and Jaime Ramírez-Vick3 1, 2 Electrical and Computer Engineering Department, University of Puerto Rico, Mayagüez, Puerto Rico 3 General Engineering Department, University of Puerto Rico, Mayagüez, Puerto Rico or, on contrary, to prevent or to stop an undesirable Abstract - Our goal is to develop an algorithm for the behavior. This “guiding” of the network dynamics is automated study of the dynamics of Probabilistic Boolean referred to as intervention. The power to intervene with the Network (PBN) representation of genes. Model checking is network dynamics has a significant impact in diagnostics an automated method for the verification of properties on and drug design. systems. Continuous Stochastic Logic (CSL), an extension of Biological phenomena manifest in the continuous-time Computation Tree Logic (CTL), is a model-checking tool domain. But, in describing such phenomena we usually that can be used to specify measures for Continuous-time employ a binary language, for instance, expressed or not Markov Chains (CTMC). Thus, as PBNs can be analyzed in expressed; on or off; up or down regulated. Studies the context of Markov theory, the use of CSL as a method for conducted restricting genes expression to only two levels (0 model checking PBNs could be a powerful tool for the or 1) suggested that information retained by these when simulation of gene network dynamics. Particularly, we are binarized is meaningful to the extent that it is remains in a interested in the subject of intervention. This refers to the continuous domain [2].
    [Show full text]
  • Online Spectral Clustering on Network Streams Yi
    Online Spectral Clustering on Network Streams By Yi Jia Submitted to the graduate degree program in Electrical Engineering and Computer Science and the Graduate Faculty of the University of Kansas in partial fulfillment of the requirements for the degree of Doctor of Philosophy Jun Huan, Chairperson Swapan Chakrabarti Committee members Jerzy Grzymala-Busse Bo Luo Alfred Tat-Kei Ho Date defended: The Dissertation Committee for Yi Jia certifies that this is the approved version of the following dissertation : Online Spectral Clustering on Network Streams Jun Huan, Chairperson Date approved: ii Abstract Graph is an extremely useful representation of a wide variety of practical systems in data analysis. Recently, with the fast accumulation of stream data from various type of networks, significant research interests have arisen on spectral clustering for network streams (or evolving networks). Compared with the general spectral clustering problem, the data analysis of this new type of problems may have additional requirements, such as short processing time, scalability in distributed computing environments, and temporal variation tracking. However, to design a spectral clustering method to satisfy these requirement cer- tainly presents non-trivial efforts. There are three major challenges for the new algorithm design. The first challenge is online clustering computation. Most of the existing spectral methods on evolving networks are off-line methods, using standard eigensystem solvers such as the Lanczos method. It needs to recompute solutions from scratch at each time point. The second challenge is the paralleliza- tion of algorithms. To parallelize such algorithms is non-trivial since standard eigen solvers are iterative algorithms and the number of iterations can not be pre- determined.
    [Show full text]
  • Inference of a Probabilistic Boolean Network from a Single Observed Temporal Sequence
    Hindawi Publishing Corporation EURASIP Journal on Bioinformatics and Systems Biology Volume 2007, Article ID 32454, 15 pages doi:10.1155/2007/32454 Research Article Inference of a Probabilistic Boolean Network from a Single Observed Temporal Sequence Stephen Marshall,1 Le Yu,1 Yufei Xiao,2 and Edward R. Dougherty2, 3, 4 1 Department of Electronic and Electrical Engineering, Faculty of Engineering, University of Strathclyde, Glasgow, G1 1XW, UK 2 Department of Electrical and Computer Engineering, Texas A&M University, College Station, TX 77843-3128, USA 3 Computational Biology Division, Translational Genomics Research Institute, Phoenix, AZ 85004, USA 4 Department of Pathology, University of Texas M. D. Anderson Cancer Center, Houston, TX 77030, USA Received 10 July 2006; Revised 29 January 2007; Accepted 26 February 2007 Recommended by Tatsuya Akutsu The inference of gene regulatory networks is a key issue for genomic signal processing. This paper addresses the inference of proba- bilistic Boolean networks (PBNs) from observed temporal sequences of network states. Since a PBN is composed of a finite number of Boolean networks, a basic observation is that the characteristics of a single Boolean network without perturbation may be de- termined by its pairwise transitions. Because the network function is fixed and there are no perturbations, a given state will always be followed by a unique state at the succeeding time point. Thus, a transition counting matrix compiled over a data sequence will be sparse and contain only one entry per line. If the network also has perturbations, with small perturbation probability, then the transition counting matrix would have some insignificant nonzero entries replacing some (or all) of the zeros.
    [Show full text]
  • Synthetic Graph Generation for Data-Intensive HPC Benchmarking: Background and Framework
    ORNL/TM-2013/339 Synthetic Graph Generation for Data-Intensive HPC Benchmarking: Background and Framework October 2013 Prepared by Joshua Lothian, Sarah Powers, Blair D. Sullivan, Matthew Baker, Jonathan Schrock, Stephen W. Poole DOCUMENT AVAILABILITY Reports produced after January 1, 1996, are generally available free via the U.S. Department of Energy (DOE) Information Bridge: Web Site: http://www.osti.gov/bridge Reports produced before January 1, 1996, may be purchased by members of the public from the following source: National Technical Information Service 5285 Port Royal Road Springfield, VA 22161 Telephone: 703-605-6000 (1-800-553-6847) TDD: 703-487-4639 Fax: 703-605-6900 E-mail: [email protected] Web site: http://www.ntis.gov/support/ordernowabout.htm Reports are available to DOE employees, DOE contractors, Energy Technology Data Ex- change (ETDE), and International Nuclear Information System (INIS) representatives from the following sources: Office of Scientific and Technical Information P.O. Box 62 Oak Ridge, TN 37831 Telephone: 865-576-8401 Fax: 865-576-5728 E-mail: [email protected] Web site:http://www.osti.gov/contact.html This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or other- wise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or any agency thereof.
    [Show full text]
  • Preferential Attachment Model with Degree Bound and Its Application to Key Predistribution in WSN
    Preferential Attachment Model with Degree Bound and its Application to Key Predistribution in WSN Sushmita Rujy and Arindam Palz y Indian Statistical Institute, Kolkata, India. Email: [email protected] z TCS Innovation Labs, Kolkata, India. Email: [email protected] Abstract—Preferential attachment models have been widely particularly those in the military domain [14]. The resource studied in complex networks, because they can explain the constrained nature of sensors restricts the use of public key formation of many networks like social networks, citation methods to secure communication. Key predistribution [7] networks, power grids, and biological networks, to name a few. Motivated by the application of key predistribution in wireless is a widely used symmetric key management technique in sensor networks (WSN), we initiate the study of preferential which cryptographic keys are preloaded in sensor networks attachment with degree bound. prior to deployment. Sensor nodes find out the common keys Our paper has two important contributions to two different using a shared key discovery phase. Messages are encrypted areas. The first is a contribution in the study of complex by the source node using the shared key and decrypted at the networks. We propose preferential attachment model with degree bound for the first time. In the normal preferential receiving node using the same key. attachment model, the degree distribution follows a power law, The number of keys in each node is to be minimized, in with many nodes of low degree and a few nodes of high degree. order to reduce storage space. Direct communication between In our scheme, the nodes can have a maximum degree dmax, any pair of nodes help in quick and easy transmission of where dmax is an integer chosen according to the application.
    [Show full text]
  • Boolean Network Control with Ideals
    Portland State University PDXScholar Mathematics and Statistics Faculty Fariborz Maseeh Department of Mathematics Publications and Presentations and Statistics 1-2021 Boolean Network Control with Ideals Ian H. Dinwoodie Portland State University, [email protected] Follow this and additional works at: https://pdxscholar.library.pdx.edu/mth_fac Part of the Physical Sciences and Mathematics Commons Let us know how access to this document benefits ou.y Citation Details Dinwoodie, Ian H., "Boolean Network Control with Ideals" (2021). Mathematics and Statistics Faculty Publications and Presentations. 302. https://pdxscholar.library.pdx.edu/mth_fac/302 This Working Paper is brought to you for free and open access. It has been accepted for inclusion in Mathematics and Statistics Faculty Publications and Presentations by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. Boolean Network Control with Ideals I H Dinwoodie Portland State University January 2021 Abstract A method is given for finding controls to transition an initial state x0 to a target set in deterministic or stochastic Boolean network control models. The algorithms use multivariate polynomial algebra. Examples illustrate the application. 1 Introduction A Boolean network is a dynamical system on d nodes (or coordinates) with binary node values, and with transition map F : {0, 1}d → {0, 1}d. The c coordinate maps F = (f1,...,fd) may use binary parameters u ∈ {0, 1} that can be adjusted or controlled at each step, so the image can be writ- ten F (x, u) and F takes {0, 1}d+c → {0, 1}d, usually written in logical nota- tion.
    [Show full text]
  • Markov Chain Monte Carlo Estimation of Exponential Random Graph Models
    Markov Chain Monte Carlo Estimation of Exponential Random Graph Models Tom A.B. Snijders ICS, Department of Statistics and Measurement Theory University of Groningen ∗ April 19, 2002 ∗Author's address: Tom A.B. Snijders, Grote Kruisstraat 2/1, 9712 TS Groningen, The Netherlands, email <[email protected]>. I am grateful to Paul Snijders for programming the JAVA applet used in this article. In the revision of this article, I profited from discussions with Pip Pattison and Garry Robins, and from comments made by a referee. This paper is formatted in landscape to improve on-screen readability. It is read best by opening Acrobat Reader in a full screen window. Note that in Acrobat Reader, the entire screen can be used for viewing by pressing Ctrl-L; the usual screen is returned when pressing Esc; it is possible to zoom in or zoom out by pressing Ctrl-- or Ctrl-=, respectively. The sign in the upper right corners links to the page viewed previously. ( Tom A.B. Snijders 2 MCMC estimation for exponential random graphs ( Abstract bility to move from one region to another. In such situations, convergence to the target distribution is extremely slow. To This paper is about estimating the parameters of the exponential be useful, MCMC algorithms must be able to make transitions random graph model, also known as the p∗ model, using frequen- from a given graph to a very different graph. It is proposed to tist Markov chain Monte Carlo (MCMC) methods. The exponen- include transitions to the graph complement as updating steps tial random graph model is simulated using Gibbs or Metropolis- to improve the speed of convergence to the target distribution.
    [Show full text]
  • Exploring Healing Strategies for Random Boolean Networks
    Exploring Healing Strategies for Random Boolean Networks Christian Darabos 1, Alex Healing 2, Tim Johann 3, Amitabh Trehan 4, and Am´elieV´eron 5 1 Information Systems Department, University of Lausanne, Switzerland 2 Pervasive ICT Research Centre, British Telecommunications, UK 3 EML Research gGmbH, Heidelberg, Germany 4 Department of Computer Science, University of New Mexico, Albuquerque, USA 5 Division of Bioinformatics, Institute for Evolution and Biodiversity, The Westphalian Wilhelms University of Muenster, Germany. [email protected], [email protected], [email protected], [email protected], [email protected] Abstract. Real-world systems are often exposed to failures where those studied theoretically are not: neuron cells in the brain can die or fail, re- sources in a peer-to-peer network can break down or become corrupt, species can disappear from and environment, and so forth. In all cases, for the system to keep running as it did before the failure occurred, or to survive at all, some kind of healing strategy may need to be applied. As an example of such a system subjected to failure and subsequently heal, we study Random Boolean Networks. Deletion of a node in the network was considered a failure if it affected the functional output and we in- vestigated healing strategies that would allow the system to heal either fully or partially. More precisely, our main strategy involves allowing the nodes directly affected by the node deletion (failure) to iteratively rewire in order to achieve healing. We found that such a simple method was ef- fective when dealing with small networks and single-point failures.
    [Show full text]
  • Percolation Threshold Results on Erdos-Rényi Graphs
    arXiv: arXiv:0000.0000 Percolation Threshold Results on Erd}os-R´enyi Graphs: an Empirical Process Approach Michael J. Kane Abstract: Keywords and phrases: threshold, directed percolation, stochastic ap- proximation, empirical processes. 1. Introduction Random graphs and discrete random processes provide a general approach to discovering properties and characteristics of random graphs and randomized al- gorithms. The approach generally works by defining an algorithm on a random graph or a randomized algorithm. Then, expected changes for each step of the process are used to propose a limiting differential equation and a large deviation theorem is used to show that the process and the differential equation are close in some sense. In this way a connection is established between the resulting process's stochastic behavior and the dynamics of a deterministic, asymptotic approximation using a differential equation. This approach is generally referred to as stochastic approximation and provides a powerful tool for understanding the asymptotic behavior of a large class of processes defined on random graphs. However, little work has been done in the area of random graph research to investigate the weak limit behavior of these processes before the asymptotic be- havior overwhelms the random component of the process. This context is par- ticularly relevant to researchers studying news propagation in social networks, sensor networks, and epidemiological outbreaks. In each of these applications, investigators may deal graphs containing tens to hundreds of vertices and be interested not only in expected behavior over time but also error estimates. This paper investigates the connectivity of graphs, with emphasis on Erd}os- R´enyi graphs, near the percolation threshold when the number of vertices is not asymptotically large.
    [Show full text]