Proceedings of the 23rd International Conference on World Wide Web 2014
DOI: 10.1145/2567948.2579357
|View full text |Cite
|
Sign up to set email alerts
|

Efficient network generation under general preferential attachment

Abstract: Preferential attachment (PA) models of network structure are widely used due to their explanatory power and conceptual simplicity. PA models are able to account for the scale-free degree distributions observed in many real-world large networks through the remarkably simple mechanism of sequentially introducing nodes that attach preferentially to high-degree nodes. The ability to efficiently generate instances from PA models is a key asset in understanding both the models themselves and the real networks that t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…A similar idea for the simulation of the Yule-Simon process appeared in [20]. Efficient simulation methods for the case where the preferential attachment probabilities are non-linear are studied in [1], where their algorithm trades some efficiency for the flexibility to model non-linear preferential attachment. Using the notation from the introduction, at time t = 0, we initiate with an arbitrary graph G(n 0 ) = (V (n 0 ), E(n 0 )) of n 0 edges, where the elements of E(n 0 ) are represented in form of (v…”
Section: Simulation Algorithmmentioning
confidence: 99%
See 2 more Smart Citations
“…A similar idea for the simulation of the Yule-Simon process appeared in [20]. Efficient simulation methods for the case where the preferential attachment probabilities are non-linear are studied in [1], where their algorithm trades some efficiency for the flexibility to model non-linear preferential attachment. Using the notation from the introduction, at time t = 0, we initiate with an arbitrary graph G(n 0 ) = (V (n 0 ), E(n 0 )) of n 0 edges, where the elements of E(n 0 ) are represented in form of (v…”
Section: Simulation Algorithmmentioning
confidence: 99%
“…Research of the four authors was partially supported by Army MURI grant W911NF-12-1-0385. Don Towsley from University of Massachusetts introduced us to the model and within his group, James Atwood graciously supplied us with a simulation algorithm designed for a class of growth models broader than the one specified in Section 2.1; this later became [1]. Joyjit Roy, formerly of Cornell, created an efficient algorithm designed to capitalize on the linear growth structure.…”
Section: Acknowledgementmentioning
confidence: 99%
See 1 more Smart Citation
“…Sequential RAM implementations of the BB BA algorithm (or variants of it) appear in a number of network analysis frameworks such as NetworkX [163] or NetworKit [316]. In this context, Atwood et al present a generator for generalized non-linear preferential attachment based on augmented heaps and treaps [25]. For advanced models of computation there are various generation algorithms that do not strictly follow the Barabási-Albert generation rules and hence only yield some approximation.…”
Section: Related Workmentioning
confidence: 99%