2021
DOI: 10.1098/rspa.2021.0168
|View full text |Cite
|
Sign up to set email alerts
|

Goal-directed graph construction using reinforcement learning

Abstract: Graphs can be used to represent and reason about systems and a variety of metrics have been devised to quantify their global characteristics. However, little is currently known about how to construct a graph or improve an existing one given a target objective. In this work, we formulate the construction of a graph as a decision-making process in which a central agent creates topologies by trial and error and receives rewards proportional to the value of the target objective. By means of this conceptual framewo… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(11 citation statements)
references
References 58 publications
0
11
0
Order By: Relevance
“…Namely, Darvariu et al . [12] reports a wall clock time that is equivalent to 56 h of a single core of a comparable CPU to train a model on graphs of size N=20 and, due to the complexity of the problem, does not train models directly beyond graphs with N=50. By contrast, on similar computational infrastructure, our proposed SG-UCT requires 11 h on average to optimize a much larger graph with N=200 nodes.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…Namely, Darvariu et al . [12] reports a wall clock time that is equivalent to 56 h of a single core of a comparable CPU to train a model on graphs of size N=20 and, due to the complexity of the problem, does not train models directly beyond graphs with N=50. By contrast, on similar computational infrastructure, our proposed SG-UCT requires 11 h on average to optimize a much larger graph with N=200 nodes.…”
Section: Methodsmentioning
confidence: 99%
“…In particular, we use the definition in [15], which considers the size of the LCC as nodes are removed from the network. We consider only the targeted attack case as previous work has found it is more challenging [12,37]. We define the robustness measure as scriptFRfalse(Gfalse)=double-struckEξfalse[false(1/Nfalse)i=1Ns(G,ξ,i)false], where sfalse(G,ξ,ifalse) denotes the fraction of nodes in the LCC of G after the removal of the first i nodes in the permutation ξ (in which nodes appear in descending order of their degrees).…”
Section: Preliminaries and Backgroundmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition to the methods mentioned above that are more related to our proposed approach, there are other categories of modern graph generation approaches, the most noteworthy of which are autoencoder-based methods [ 18 , 38 – 42 ], RL-based approaches [ 43 – 45 ], GAN-based generating strategies [ 15 , 19 , 46 ], and flow-based models [ 47 , 48 ].…”
Section: Related Workmentioning
confidence: 99%