Universal techniques to analyze preferential attachment trees: Global and Local analysis

Subscribers:
344,000
Published on ● Video Link: https://www.youtube.com/watch?v=IgrFJIspkL8



Duration: 1:04:33
246 views
1


We use embeddings in continuous time Branching processes to derive asymptotics for various statistics associated with different models of preferential attachment. This powerful method allows us to deduce, with very little effort, under a common framework, not only local characteristics for a wide class of scale free trees, but also global characteristics such as the height of the tree, maximal degree, and the size and structure of the percolation component attached to the root. We exhibit our computations for a number of different graph models of preferential attachment. En-route we get exact results for a {\bf large} number of preferential attachment models including not only the usual preferential attachment but also the preferential attachment with fitness as introduced by Barabasi et al and analyzed rigorously by Chayes et al and the Competition Induced Preferential attachment of Berger et al to name just two. While most of the techniques currently in vogue gain access to the asymptotic degree distribution of the tree, we show how the embedding techniques reveal significantly more information both on local and global characteristics of these trees. Again very soft arguments give us the asymptotic degree distribution and size of the maximal degree in some Preferential attachment network models (not just trees) formulated by Cooper and Frieze and van der Hofstad et al. In the process we find surprising connections between the degree distributions, Yule processes and $\alpha$-stable subordinators. We end with a number of conjectures for the asymptotics for various statistics of these models including size of the maximal component in percolation on these trees.




Other Videos By Microsoft Research


2016-09-06Lifelong user models, memory and learning
2016-09-06Feedback Arc Sets and Girth in Digraphs
2016-09-06Anomaly Detection in Large Networks using Approximation Techniques [1/7]
2016-09-06Network Visualization: Two new strategies and their case study evaluations
2016-09-06From Sensors to Semantics: Intelligent Context for Situated Computing [1/4]
2016-09-06Learning Models of Human Activities and Interactions using Multi-Modal Wearable Sensors
2016-09-06I heard it on the network: Recent Transformations in Online Music Fandom
2016-09-06Expressive Speech-Driven Facial Animation
2016-09-06Super Crunchers: Why Thinking-by-Numbers is the New Way to Be Smart
2016-09-06Casual Games Discussion
2016-09-06Universal techniques to analyze preferential attachment trees: Global and Local analysis
2016-09-06The Scaling Limit of Diaconis-Fulton Addition
2016-09-06A Game Developer's Perspective On Parallelism
2016-09-06The IonP2P Project: Empirical Characterizations of P2P Systems
2016-09-06Variable-Aperture Photography
2016-09-06Candidate talk: Domain Adaptation with Structural Correspondence Learning
2016-09-06Developmental Programming and Distributed Robot Control
2016-09-06The History and Future of Serious Games         
2016-09-06Machine Learning Exploration Of Brain fMRI Data To Study Inhibitory Control Mechanisms
2016-09-06Combining Static and Dynamic Analysis for Bug Finding
2016-09-06Counterexamples in the Central Limit Theory of Markov Chains



Tags:
microsoft research