2021
DOI: 10.1126/sciadv.abc9800
|View full text |Cite
|
Sign up to set email alerts
|

A clarified typology of core-periphery structure in networks

Abstract: Core-periphery structure, the arrangement of a network into a dense core and sparse periphery, is a versatile descriptor of various social, biological, and technological networks. In practice, different core-periphery algorithms are often applied interchangeably despite the fact that they can yield inconsistent descriptions of core-periphery structure. For example, two of the most widely used algorithms, the k-cores decomposition and the classic two-block model of Borgatti and Everett, extract fundamentally di… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 57 publications
(24 citation statements)
references
References 43 publications
0
24
0
Order By: Relevance
“…The concept of a network core-periphery structure was formalized and studied by Borgatti and Everett [4]. As mentioned in this work, and also noted by many subsequent authors [10,11,15], there are several different types of core-periphery structure, and hence detection algorithm, that can be defined. First, we may distinguish between partitions [5,14,32] that map nodes into two sets, the core and the periphery, and orderings [11,21,28,29] that assign a nonnegative "coreness" score to each node.…”
Section: Related Workmentioning
confidence: 86%
See 2 more Smart Citations
“…The concept of a network core-periphery structure was formalized and studied by Borgatti and Everett [4]. As mentioned in this work, and also noted by many subsequent authors [10,11,15], there are several different types of core-periphery structure, and hence detection algorithm, that can be defined. First, we may distinguish between partitions [5,14,32] that map nodes into two sets, the core and the periphery, and orderings [11,21,28,29] that assign a nonnegative "coreness" score to each node.…”
Section: Related Workmentioning
confidence: 86%
“…Figure 1 illustrates the difference between (2) and (3). Here the networks are samples of a stochastic block model [11,15,28,30,32]. We will let SBM(N, M, p 1 , p 2 , p 3 ) denote the stochastic block model with N nodes, a core of size M and core-core, core-periphery and periphery-periphery probabilities of p 1 , p 2 and p 3 , respectively.…”
Section: Objective Functionmentioning
confidence: 99%
See 1 more Smart Citation
“…The other Bayesian method that we describe is from Gallagher et al (2021). Their likelihood is the same as that of Snijders and Nowicki (1997) and Zhang et al (2015) but they give extra attention to the prior on the block probabilities by explicitly enforcing the CP condition into the prior.…”
Section: Bayesianmentioning
confidence: 99%
“…An important feature of our heuristic policy is that the nodes with large degrees tend to form larger facets, resulting in a core-periphery structure [41] with dangling and isolated facets on the fringe. Therefore, the heuristic tends to find a realization with a maximized number of connected components (large β 0 ) and a minimized number of loops (small β 1 ).…”
Section: Rule 3 (Formentioning
confidence: 99%