Featured Research

from universities, journals, and other organizations

Order of events taking place in complex networks may dramatically alter the way diffusion occurs

Date:
July 15, 2013
Source:
Springer
Summary:
The Internet, motorways and other transport systems, and many social and biological systems are composed of nodes connected by edges. They can therefore be represented as networks. Scientists studying diffusion over such networks over time have now identified the temporal characteristics that affect their diffusion pathways.

The Internet, motorways and other transport systems, and many social and biological systems are composed of nodes connected by edges. They can therefore be represented as networks. Scientists studying diffusion over such networks over time have now identified the temporal characteristics that affect their diffusion pathways.

Related Articles


In a paper about to be published in European Physical Journal B, Renaud Lambiotte and Lionel Tabourier from the University of Namur, Belgium, together with Jean-Charles Delvenne from the Catholic University of Louvain, Belgium, show that one key factor that can dramatically change a diffusion process is the order in which events take place in complex networks.

Since it is now possible to gather data on the timings at which edges of a complex network are activated or not, network dynamics can now be studied more precisely. Empirical evidence in a variety of social and biological systems has shown that the time intervals between the activation of edges are such that it occurs in bursts. As a result, there are broad distributions for the times between these activation events.

So far, a majority of works have relied on computer simulations. However, a purely computational approach is unable to provide a general picture of the problem and to identify important structural and temporal properties. Instead, the authors developed an analytical model to better understand the properties of time-dependent networks that either accelerate or slow down diffusion.

Their analytical study focused on different classes of popular models for diffusion, namely random walks -- which is a mathematical description of a path that consists of a succession of random steps -- and epidemic spread models, and found the way in which the temporal ordering of events matters. They expect these results to help in building more appropriate metrics to understand real-world complex network data.


Story Source:

The above story is based on materials provided by Springer. Note: Materials may be edited for content and length.


Journal Reference:

  1. Renaud Lambiotte, Lionel Tabourier, Jean-Charles Delvenne. Burstiness and spreading on temporal networks. The European Physical Journal B, 2013; 86 (7) DOI: 10.1140/epjb/e2013-40456-9

Cite This Page:

Springer. "Order of events taking place in complex networks may dramatically alter the way diffusion occurs." ScienceDaily. ScienceDaily, 15 July 2013. <www.sciencedaily.com/releases/2013/07/130715114838.htm>.
Springer. (2013, July 15). Order of events taking place in complex networks may dramatically alter the way diffusion occurs. ScienceDaily. Retrieved February 27, 2015 from www.sciencedaily.com/releases/2013/07/130715114838.htm
Springer. "Order of events taking place in complex networks may dramatically alter the way diffusion occurs." ScienceDaily. www.sciencedaily.com/releases/2013/07/130715114838.htm (accessed February 27, 2015).

Share This


More From ScienceDaily



More Computers & Math News

Friday, February 27, 2015

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Lenovo Hack May Be Retaliation For 'Superfish' Vulnerability

Lenovo Hack May Be Retaliation For 'Superfish' Vulnerability

Newsy (Feb. 26, 2015) Lenovo&apos;s website was hacked by what appears to be the infamous Lizard Squad group. The attack seems to be related to Lenovo&apos;s "Superfish" controversy. Video provided by Newsy
Powered by NewsLook.com
Cyber Criminals Holding Phone and Computer Data to Ransom

Cyber Criminals Holding Phone and Computer Data to Ransom

AFP (Feb. 26, 2015) Computer and smartphone viruses are holding an increasing number of devices hostage using “ransomware.” Duration:02:21 Video provided by AFP
Powered by NewsLook.com
China Shuns Big Tech Names

China Shuns Big Tech Names

Reuters - Business Video Online (Feb. 26, 2015) The Chinese government has taken products from major tech firms off its purchase list in favour of smaller domestic players, but experts warn the plan may backfire making them open to security risks. Eve Johnson reports. Video provided by Reuters
Powered by NewsLook.com
Apple Reveals Potential Date For Apple Watch Reveal

Apple Reveals Potential Date For Apple Watch Reveal

Newsy (Feb. 26, 2015) The company sent out announcements for a March 9 media event with a simple message, "Spring forward." Video provided by Newsy
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:

Strange & Offbeat Stories


Space & Time

Matter & Energy

Computers & Math

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins