On the Complexity of Boolean Networks
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Group-In-A-Box Layout for Multi-Faceted Analysis of Communities
2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing Group-In-a-Box Layout for Multi-faceted Analysis of Communities Eduarda Mendes Rodrigues*, Natasa Milic-Frayling †, Marc Smith‡, Ben Shneiderman§, Derek Hansen¶ * Dept. of Informatics Engineering, Faculty of Engineering, University of Porto, Portugal [email protected] † Microsoft Research, Cambridge, UK [email protected] ‡ Connected Action Consulting Group, Belmont, California, USA [email protected] § Dept. of Computer Science & Human-Computer Interaction Lab University of Maryland, College Park, Maryland, USA [email protected] ¶ College of Information Studies & Center for the Advanced Study of Communities and Information University of Maryland, College Park, Maryland, USA [email protected] Abstract—Communities in social networks emerge from One particularly important aspect of social network interactions among individuals and can be analyzed through a analysis is the detection of communities, i.e., sub-groups of combination of clustering and graph layout algorithms. These individuals or entities that exhibit tight interconnectivity approaches result in 2D or 3D visualizations of clustered among the wider population. For example, Twitter users who graphs, with groups of vertices representing individuals that regularly retweet each other’s messages may form cohesive form a community. However, in many instances the vertices groups within the Twitter social network. In a network have attributes that divide individuals into distinct categories visualization they would appear as clusters or sub-graphs, such as gender, profession, geographic location, and similar. It often colored distinctly or represented by a different vertex is often important to investigate what categories of individuals shape in order to convey their group identity. -
Joint Estimation of Preferential Attachment and Node Fitness In
www.nature.com/scientificreports OPEN Joint estimation of preferential attachment and node fitness in growing complex networks Received: 15 April 2016 Thong Pham1, Paul Sheridan2 & Hidetoshi Shimodaira1 Accepted: 09 August 2016 Complex network growth across diverse fields of science is hypothesized to be driven in the main by Published: 07 September 2016 a combination of preferential attachment and node fitness processes. For measuring the respective influences of these processes, previous approaches make strong and untested assumptions on the functional forms of either the preferential attachment function or fitness function or both. We introduce a Bayesian statistical method called PAFit to estimate preferential attachment and node fitness without imposing such functional constraints that works by maximizing a log-likelihood function with suitably added regularization terms. We use PAFit to investigate the interplay between preferential attachment and node fitness processes in a Facebook wall-post network. While we uncover evidence for both preferential attachment and node fitness, thus validating the hypothesis that these processes together drive complex network evolution, we also find that node fitness plays the bigger role in determining the degree of a node. This is the first validation of its kind on real-world network data. But surprisingly the rate of preferential attachment is found to deviate from the conventional log-linear form when node fitness is taken into account. The proposed method is implemented in the R package PAFit. The study of complex network evolution is a hallmark of network science. Research in this discipline is inspired by empirical observations underscoring the widespread nature of certain structural features, such as the small-world property1, a high clustering coefficient2, a heavy tail in the degree distribution3, assortative mixing patterns among nodes4, and community structure5 in a multitude of biological, societal, and technological networks6–11. -
Modern Discrete Probability I
Preliminaries Some fundamental models A few more useful facts about... Modern Discrete Probability I - Introduction Stochastic processes on graphs: models and questions Sebastien´ Roch UW–Madison Mathematics September 6, 2017 Sebastien´ Roch, UW–Madison Modern Discrete Probability – Models and Questions Preliminaries Review of graph theory Some fundamental models Review of Markov chain theory A few more useful facts about... 1 Preliminaries Review of graph theory Review of Markov chain theory 2 Some fundamental models Random walks on graphs Percolation Some random graph models Markov random fields Interacting particles on finite graphs 3 A few more useful facts about... ...graphs ...Markov chains ...other things Sebastien´ Roch, UW–Madison Modern Discrete Probability – Models and Questions Preliminaries Review of graph theory Some fundamental models Review of Markov chain theory A few more useful facts about... Graphs Definition (Undirected graph) An undirected graph (or graph for short) is a pair G = (V ; E) where V is the set of vertices (or nodes, sites) and E ⊆ ffu; vg : u; v 2 V g; is the set of edges (or bonds). The V is either finite or countably infinite. Edges of the form fug are called loops. We do not allow E to be a multiset. We occasionally write V (G) and E(G) for the vertices and edges of G. Sebastien´ Roch, UW–Madison Modern Discrete Probability – Models and Questions Preliminaries Review of graph theory Some fundamental models Review of Markov chain theory A few more useful facts about... An example: the Petersen graph Sebastien´ Roch, UW–Madison Modern Discrete Probability – Models and Questions Preliminaries Review of graph theory Some fundamental models Review of Markov chain theory A few more useful facts about.. -
Markov Model Checking of Probabilistic Boolean Networks Representations of Genes
Markov Model Checking of Probabilistic Boolean Networks Representations of Genes Marie Lluberes1, Jaime Seguel2 and Jaime Ramírez-Vick3 1, 2 Electrical and Computer Engineering Department, University of Puerto Rico, Mayagüez, Puerto Rico 3 General Engineering Department, University of Puerto Rico, Mayagüez, Puerto Rico or, on contrary, to prevent or to stop an undesirable Abstract - Our goal is to develop an algorithm for the behavior. This “guiding” of the network dynamics is automated study of the dynamics of Probabilistic Boolean referred to as intervention. The power to intervene with the Network (PBN) representation of genes. Model checking is network dynamics has a significant impact in diagnostics an automated method for the verification of properties on and drug design. systems. Continuous Stochastic Logic (CSL), an extension of Biological phenomena manifest in the continuous-time Computation Tree Logic (CTL), is a model-checking tool domain. But, in describing such phenomena we usually that can be used to specify measures for Continuous-time employ a binary language, for instance, expressed or not Markov Chains (CTMC). Thus, as PBNs can be analyzed in expressed; on or off; up or down regulated. Studies the context of Markov theory, the use of CSL as a method for conducted restricting genes expression to only two levels (0 model checking PBNs could be a powerful tool for the or 1) suggested that information retained by these when simulation of gene network dynamics. Particularly, we are binarized is meaningful to the extent that it is remains in a interested in the subject of intervention. This refers to the continuous domain [2]. -
Online Spectral Clustering on Network Streams Yi
Online Spectral Clustering on Network Streams By Yi Jia Submitted to the graduate degree program in Electrical Engineering and Computer Science and the Graduate Faculty of the University of Kansas in partial fulfillment of the requirements for the degree of Doctor of Philosophy Jun Huan, Chairperson Swapan Chakrabarti Committee members Jerzy Grzymala-Busse Bo Luo Alfred Tat-Kei Ho Date defended: The Dissertation Committee for Yi Jia certifies that this is the approved version of the following dissertation : Online Spectral Clustering on Network Streams Jun Huan, Chairperson Date approved: ii Abstract Graph is an extremely useful representation of a wide variety of practical systems in data analysis. Recently, with the fast accumulation of stream data from various type of networks, significant research interests have arisen on spectral clustering for network streams (or evolving networks). Compared with the general spectral clustering problem, the data analysis of this new type of problems may have additional requirements, such as short processing time, scalability in distributed computing environments, and temporal variation tracking. However, to design a spectral clustering method to satisfy these requirement cer- tainly presents non-trivial efforts. There are three major challenges for the new algorithm design. The first challenge is online clustering computation. Most of the existing spectral methods on evolving networks are off-line methods, using standard eigensystem solvers such as the Lanczos method. It needs to recompute solutions from scratch at each time point. The second challenge is the paralleliza- tion of algorithms. To parallelize such algorithms is non-trivial since standard eigen solvers are iterative algorithms and the number of iterations can not be pre- determined. -
Inference of a Probabilistic Boolean Network from a Single Observed Temporal Sequence
Hindawi Publishing Corporation EURASIP Journal on Bioinformatics and Systems Biology Volume 2007, Article ID 32454, 15 pages doi:10.1155/2007/32454 Research Article Inference of a Probabilistic Boolean Network from a Single Observed Temporal Sequence Stephen Marshall,1 Le Yu,1 Yufei Xiao,2 and Edward R. Dougherty2, 3, 4 1 Department of Electronic and Electrical Engineering, Faculty of Engineering, University of Strathclyde, Glasgow, G1 1XW, UK 2 Department of Electrical and Computer Engineering, Texas A&M University, College Station, TX 77843-3128, USA 3 Computational Biology Division, Translational Genomics Research Institute, Phoenix, AZ 85004, USA 4 Department of Pathology, University of Texas M. D. Anderson Cancer Center, Houston, TX 77030, USA Received 10 July 2006; Revised 29 January 2007; Accepted 26 February 2007 Recommended by Tatsuya Akutsu The inference of gene regulatory networks is a key issue for genomic signal processing. This paper addresses the inference of proba- bilistic Boolean networks (PBNs) from observed temporal sequences of network states. Since a PBN is composed of a finite number of Boolean networks, a basic observation is that the characteristics of a single Boolean network without perturbation may be de- termined by its pairwise transitions. Because the network function is fixed and there are no perturbations, a given state will always be followed by a unique state at the succeeding time point. Thus, a transition counting matrix compiled over a data sequence will be sparse and contain only one entry per line. If the network also has perturbations, with small perturbation probability, then the transition counting matrix would have some insignificant nonzero entries replacing some (or all) of the zeros. -
Synthetic Graph Generation for Data-Intensive HPC Benchmarking: Background and Framework
ORNL/TM-2013/339 Synthetic Graph Generation for Data-Intensive HPC Benchmarking: Background and Framework October 2013 Prepared by Joshua Lothian, Sarah Powers, Blair D. Sullivan, Matthew Baker, Jonathan Schrock, Stephen W. Poole DOCUMENT AVAILABILITY Reports produced after January 1, 1996, are generally available free via the U.S. Department of Energy (DOE) Information Bridge: Web Site: http://www.osti.gov/bridge Reports produced before January 1, 1996, may be purchased by members of the public from the following source: National Technical Information Service 5285 Port Royal Road Springfield, VA 22161 Telephone: 703-605-6000 (1-800-553-6847) TDD: 703-487-4639 Fax: 703-605-6900 E-mail: [email protected] Web site: http://www.ntis.gov/support/ordernowabout.htm Reports are available to DOE employees, DOE contractors, Energy Technology Data Ex- change (ETDE), and International Nuclear Information System (INIS) representatives from the following sources: Office of Scientific and Technical Information P.O. Box 62 Oak Ridge, TN 37831 Telephone: 865-576-8401 Fax: 865-576-5728 E-mail: [email protected] Web site:http://www.osti.gov/contact.html This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or other- wise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or any agency thereof. -
Preferential Attachment Model with Degree Bound and Its Application to Key Predistribution in WSN
Preferential Attachment Model with Degree Bound and its Application to Key Predistribution in WSN Sushmita Rujy and Arindam Palz y Indian Statistical Institute, Kolkata, India. Email: [email protected] z TCS Innovation Labs, Kolkata, India. Email: [email protected] Abstract—Preferential attachment models have been widely particularly those in the military domain [14]. The resource studied in complex networks, because they can explain the constrained nature of sensors restricts the use of public key formation of many networks like social networks, citation methods to secure communication. Key predistribution [7] networks, power grids, and biological networks, to name a few. Motivated by the application of key predistribution in wireless is a widely used symmetric key management technique in sensor networks (WSN), we initiate the study of preferential which cryptographic keys are preloaded in sensor networks attachment with degree bound. prior to deployment. Sensor nodes find out the common keys Our paper has two important contributions to two different using a shared key discovery phase. Messages are encrypted areas. The first is a contribution in the study of complex by the source node using the shared key and decrypted at the networks. We propose preferential attachment model with degree bound for the first time. In the normal preferential receiving node using the same key. attachment model, the degree distribution follows a power law, The number of keys in each node is to be minimized, in with many nodes of low degree and a few nodes of high degree. order to reduce storage space. Direct communication between In our scheme, the nodes can have a maximum degree dmax, any pair of nodes help in quick and easy transmission of where dmax is an integer chosen according to the application. -
Boolean Network Control with Ideals
Portland State University PDXScholar Mathematics and Statistics Faculty Fariborz Maseeh Department of Mathematics Publications and Presentations and Statistics 1-2021 Boolean Network Control with Ideals Ian H. Dinwoodie Portland State University, [email protected] Follow this and additional works at: https://pdxscholar.library.pdx.edu/mth_fac Part of the Physical Sciences and Mathematics Commons Let us know how access to this document benefits ou.y Citation Details Dinwoodie, Ian H., "Boolean Network Control with Ideals" (2021). Mathematics and Statistics Faculty Publications and Presentations. 302. https://pdxscholar.library.pdx.edu/mth_fac/302 This Working Paper is brought to you for free and open access. It has been accepted for inclusion in Mathematics and Statistics Faculty Publications and Presentations by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. Boolean Network Control with Ideals I H Dinwoodie Portland State University January 2021 Abstract A method is given for finding controls to transition an initial state x0 to a target set in deterministic or stochastic Boolean network control models. The algorithms use multivariate polynomial algebra. Examples illustrate the application. 1 Introduction A Boolean network is a dynamical system on d nodes (or coordinates) with binary node values, and with transition map F : {0, 1}d → {0, 1}d. The c coordinate maps F = (f1,...,fd) may use binary parameters u ∈ {0, 1} that can be adjusted or controlled at each step, so the image can be writ- ten F (x, u) and F takes {0, 1}d+c → {0, 1}d, usually written in logical nota- tion. -
Markov Chain Monte Carlo Estimation of Exponential Random Graph Models
Markov Chain Monte Carlo Estimation of Exponential Random Graph Models Tom A.B. Snijders ICS, Department of Statistics and Measurement Theory University of Groningen ∗ April 19, 2002 ∗Author's address: Tom A.B. Snijders, Grote Kruisstraat 2/1, 9712 TS Groningen, The Netherlands, email <[email protected]>. I am grateful to Paul Snijders for programming the JAVA applet used in this article. In the revision of this article, I profited from discussions with Pip Pattison and Garry Robins, and from comments made by a referee. This paper is formatted in landscape to improve on-screen readability. It is read best by opening Acrobat Reader in a full screen window. Note that in Acrobat Reader, the entire screen can be used for viewing by pressing Ctrl-L; the usual screen is returned when pressing Esc; it is possible to zoom in or zoom out by pressing Ctrl-- or Ctrl-=, respectively. The sign in the upper right corners links to the page viewed previously. ( Tom A.B. Snijders 2 MCMC estimation for exponential random graphs ( Abstract bility to move from one region to another. In such situations, convergence to the target distribution is extremely slow. To This paper is about estimating the parameters of the exponential be useful, MCMC algorithms must be able to make transitions random graph model, also known as the p∗ model, using frequen- from a given graph to a very different graph. It is proposed to tist Markov chain Monte Carlo (MCMC) methods. The exponen- include transitions to the graph complement as updating steps tial random graph model is simulated using Gibbs or Metropolis- to improve the speed of convergence to the target distribution. -
Exploring Healing Strategies for Random Boolean Networks
Exploring Healing Strategies for Random Boolean Networks Christian Darabos 1, Alex Healing 2, Tim Johann 3, Amitabh Trehan 4, and Am´elieV´eron 5 1 Information Systems Department, University of Lausanne, Switzerland 2 Pervasive ICT Research Centre, British Telecommunications, UK 3 EML Research gGmbH, Heidelberg, Germany 4 Department of Computer Science, University of New Mexico, Albuquerque, USA 5 Division of Bioinformatics, Institute for Evolution and Biodiversity, The Westphalian Wilhelms University of Muenster, Germany. [email protected], [email protected], [email protected], [email protected], [email protected] Abstract. Real-world systems are often exposed to failures where those studied theoretically are not: neuron cells in the brain can die or fail, re- sources in a peer-to-peer network can break down or become corrupt, species can disappear from and environment, and so forth. In all cases, for the system to keep running as it did before the failure occurred, or to survive at all, some kind of healing strategy may need to be applied. As an example of such a system subjected to failure and subsequently heal, we study Random Boolean Networks. Deletion of a node in the network was considered a failure if it affected the functional output and we in- vestigated healing strategies that would allow the system to heal either fully or partially. More precisely, our main strategy involves allowing the nodes directly affected by the node deletion (failure) to iteratively rewire in order to achieve healing. We found that such a simple method was ef- fective when dealing with small networks and single-point failures. -
Percolation Threshold Results on Erdos-Rényi Graphs
arXiv: arXiv:0000.0000 Percolation Threshold Results on Erd}os-R´enyi Graphs: an Empirical Process Approach Michael J. Kane Abstract: Keywords and phrases: threshold, directed percolation, stochastic ap- proximation, empirical processes. 1. Introduction Random graphs and discrete random processes provide a general approach to discovering properties and characteristics of random graphs and randomized al- gorithms. The approach generally works by defining an algorithm on a random graph or a randomized algorithm. Then, expected changes for each step of the process are used to propose a limiting differential equation and a large deviation theorem is used to show that the process and the differential equation are close in some sense. In this way a connection is established between the resulting process's stochastic behavior and the dynamics of a deterministic, asymptotic approximation using a differential equation. This approach is generally referred to as stochastic approximation and provides a powerful tool for understanding the asymptotic behavior of a large class of processes defined on random graphs. However, little work has been done in the area of random graph research to investigate the weak limit behavior of these processes before the asymptotic be- havior overwhelms the random component of the process. This context is par- ticularly relevant to researchers studying news propagation in social networks, sensor networks, and epidemiological outbreaks. In each of these applications, investigators may deal graphs containing tens to hundreds of vertices and be interested not only in expected behavior over time but also error estimates. This paper investigates the connectivity of graphs, with emphasis on Erd}os- R´enyi graphs, near the percolation threshold when the number of vertices is not asymptotically large.