257 results on '"Temporal graphs"'
Search Results
52. On Finding Separators in Temporal Split and Permutation Graphs
- Author
-
Maack, Nicolas, Molter, Hendrik, Niedermeier, Rolf, Renken, Malte, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Bampis, Evripidis, editor, and Pagourtzis, Aris, editor
- Published
- 2021
- Full Text
- View/download PDF
53. Mengerian Temporal Graphs Revisited
- Author
-
Ibiapina, Allen, Silva, Ana, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Bampis, Evripidis, editor, and Pagourtzis, Aris, editor
- Published
- 2021
- Full Text
- View/download PDF
54. Exploration of k-Edge-Deficient Temporal Graphs
- Author
-
Erlebach, Thomas, Spooner, Jakob T., Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Lubiw, Anna, editor, and Salavatipour, Mohammad, editor
- Published
- 2021
- Full Text
- View/download PDF
55. Edge Exploration of Temporal Graphs
- Author
-
Bumpus, Benjamin Merlin, Meeks, Kitty, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Flocchini, Paola, editor, and Moura, Lucia, editor
- Published
- 2021
- Full Text
- View/download PDF
56. Approximating Multistage Matching Problems
- Author
-
Chimani, Markus, Troost, Niklas, Wiedera, Tilo, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Flocchini, Paola, editor, and Moura, Lucia, editor
- Published
- 2021
- Full Text
- View/download PDF
57. Node Classification in Temporal Graphs Through Stochastic Sparsification and Temporal Structural Convolution
- Author
-
Zheng, Cheng, Zong, Bo, Cheng, Wei, Song, Dongjin, Ni, Jingchao, Yu, Wenchao, Chen, Haifeng, Wang, Wei, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Hutter, Frank, editor, Kersting, Kristian, editor, Lijffijt, Jefrey, editor, and Valera, Isabel, editor
- Published
- 2021
- Full Text
- View/download PDF
58. TG-OUT: temporal outlier patterns detection in Twitter attribute induced graphs.
- Author
-
Dimitriadis, Ilias, Poiitis, Marinos, Faloutsos, Christos, and Vakali, Athena
- Subjects
- *
OUTLIER detection , *MACHINE learning , *SIMPLE machines , *SOCIAL networks , *POWER law (Mathematics) - Abstract
Given a network of Twitter users, can we capture their posting behavior over time, identify patterns that could probably describe, model or predict their activity? Can we identify temporal connectivity patterns that emerge from the use of specific attributes? More challengingly, are there particular attribute usage patterns which indicate an inherent anomaly? This work provides solid answers to all these questions, extending previous work employed on other social networks and attribute types. We propose TG-OUT, a pipeline of methods which : (a) model the temporal evolution of attribute induced graphs to detect peculiar attributes, (b) identify temporal patterns in attribute distributions, (c) investigate differences in patterns emerging from bot and/or non-bot accounts, (d) extract tailored sets of exploitable features. Experimental results show that: most of the individual attribute distributions remain stable over time following mostly power laws norm; the temporal evolution of attribute induced graphs obey certain laws and deviations are outliers; we discover that patterns present deviations which depend on the type of accounts which use each attribute; finally, we show that careful selection of only two features which are used to train a simple machine learning algorithm, produces a model which efficiently identifies attributes mainly used by bots. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
59. Snapshot disjointness in temporal graphs.
- Author
-
Ibiapina, Allen and Silva, Ana
- Subjects
- *
POLYNOMIAL time algorithms , *CUTTING stock problem , *GRAPH labelings - Abstract
In the study of temporal graphs, only paths respecting the flow of time are relevant. In this context, many concepts of walk disjointness have been proposed over the years and the validity of Menger's Theorem, as well as the complexity of related problems, have been investigated. Menger's Theorem states that the maximum number of vertex/edge disjoint paths between two vertices equals the minimum number of vertices/edges required to disconnect them. This paper introduces and investigates a type of disjointness that is only time-dependent. Two walks are said to be snapshot disjoint if they do not use edges active in the same snapshot. The related paths and cut problems are then defined and proved to be W[1]-hard and XP-time solvable when parameterized by the solution size. Additionally, in the light of the definition of Mengerian graphs given by Kempe, Kleinberg, and Kumar in their seminal paper (STOC'2000), we define a snapshot Mengerian graph as a graph G for which there is no time labeling for its edges where Menger's Theorem does not hold in the context of snapshot disjointness. We then characterize Mengerian graphs in terms of forbidden structures and provide a polynomial-time recognition algorithm. All our proofs work on the strict and the non-strict cases. Finally, we also present results about problems defined by similar types of disjointness, namely, multiedge disjointness and departure time disjointness. • A novel type of temporal paths disjointness. • Introduction of related parameters: maximum number of snapshot disjoint paths and minimum size of a snapshot cut. • Tight classification of related problems when parameterized by solution size. • Characterization and polynomial-time recognition of s-Mengerian graphs. • Comparison between parameters and "Mengerian" classes of graphs. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
60. Analysis of Changes in Topological Relations Between Spatial Objects at Different Times
- Author
-
Eremeev, Sergey, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Hu, Zhengbing, editor, Petoukhov, Sergey, editor, and He, Matthew, editor
- Published
- 2020
- Full Text
- View/download PDF
61. An Efficient Index for Reachability Queries in Public Transport Networks
- Author
-
Tesfaye, Bezaye, Augsten, Nikolaus, Pawlik, Mateusz, Böhlen, Michael H., Jensen, Christian S., Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Darmont, Jérôme, editor, Novikov, Boris, editor, and Wrembel, Robert, editor
- Published
- 2020
- Full Text
- View/download PDF
62. Approximating Multistage Matching Problems.
- Author
-
Chimani, Markus, Troost, Niklas, and Wiedera, Tilo
- Subjects
- *
APPROXIMATION algorithms , *NP-hard problems , *CHARTS, diagrams, etc. - Abstract
In multistage perfect matching problems, we are given a sequence of graphs on the same vertex set and are asked to find a sequence of perfect matchings, corresponding to the sequence of graphs, such that consecutive matchings are as similar as possible. More precisely, we aim to maximize the intersections, or minimize the unions between consecutive matchings. We show that these problems are NP-hard even in very restricted scenarios. As our main contribution, we present the first non-trivial approximation algorithms for these problems: On the one hand, we devise a tight approximation on graph sequences of length two (2-stage graphs). On the other hand, we propose several general methods to deduce multistage approximations from blackbox approximations on 2-stage graphs. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
63. Social context-aware and fuzzy preference temporal graph for personalized B2B marketing campaigns recommendations
- Author
-
Patil, Sarita, Vaze, Vinod, Agarkar, Pankaj, and Mahajan, Hemant
- Published
- 2023
- Full Text
- View/download PDF
64. Detecting malicious accounts in permissionless blockchains using temporal graph properties
- Author
-
Rachit Agarwal, Shikhar Barve, and Sandeep Kumar Shukla
- Subjects
Blockchain ,Machine Learning ,Temporal graphs ,Behavior analysis ,Ethereum ,Suspect identification ,Applied mathematics. Quantitative methods ,T57-57.97 - Abstract
Abstract Directed Graph based models of a blockchain that capture accounts as nodes and transactions as edges, evolve over time. This temporal nature of a blockchain model enables us to understand the behavior (malicious or benign) of the accounts. Predictive classification of accounts as malicious or benign could help users of the permissionless blockchain platforms to operate in a secure manner. Motivated by this, we introduce temporal features such as burst and attractiveness on top of several already used graph properties such as the node degree and clustering coefficient. Using identified features, we train various Machine Learning (ML) models and identify the algorithm that performs the best in detecting malicious accounts. We then study the behavior of the accounts over different temporal granularities of the dataset before assigning them malicious tags. For the Ethereum blockchain, we identify that for the entire dataset—the ExtraTreesClassifier performs the best among supervised ML algorithms. On the other hand, using cosine similarity on top of the results provided by unsupervised ML algorithms such as K-Means on the entire dataset, we were able to detect 554 more suspicious accounts. Further, using behavior change analysis for accounts, we identify 814 unique suspicious accounts across different temporal granularities.
- Published
- 2021
- Full Text
- View/download PDF
65. Multistage Vertex Cover.
- Author
-
Fluschnik, Till, Niedermeier, Rolf, Rohm, Valentin, and Zschoche, Philipp
- Subjects
- *
CHARTS, diagrams, etc. , *PARAMETERIZATION , *DATA reduction , *NP-complete problems - Abstract
The NP-complete Vertex Cover problem asks to cover all edges of a graph by a small (given) number of vertices. It is among the most prominent graph-algorithmic problems. Following a recent trend in studying temporal graphs (a sequence of graphs, so-called layers, over the same vertex set but, over time, changing edge sets), we initiate the study of Multistage Vertex Cover. Herein, given a temporal graph, the goal is to find for each layer of the temporal graph a small vertex cover and to guarantee that two vertex cover sets of every two consecutive layers differ not too much (specified by a given parameter). We show that, different from classic Vertex Cover and some other dynamic or temporal variants of it, Multistage Vertex Cover is computationally hard even in fairly restricted settings. On the positive side, however, we also spot several fixed-parameter tractability results based on some of themost natural parameterizations. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
66. Coloring temporal graphs.
- Author
-
Marino, Andrea and Silva, Ana
- Subjects
- *
GRAPH coloring , *GRAPH labelings , *EDGES (Geometry) - Abstract
A temporal graph is a pair (G , λ) where G is a simple graph and λ is a function assigning to each edge time labels telling at which snapshots each edge is active. As recently defined by Mertzios, Molter and Zamaraev (2021), a temporal coloring of (G , λ) is a sequence of colorings of the vertices of the snapshots such that each edge is properly colored at least once. We first focus on t-persistent and t-occurrent temporal graphs. The former (resp. the latter) are temporal graphs where each edge of G stays active for at least t consecutive (resp. not-necessarily consecutive) snapshots. We study which values of t make the problem polynomial-time solvable. We also investigate the complexity of the problem when restricted to temporal graphs (G , λ) such that G has bounded treewidth. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
67. Computing top-k temporal closeness in temporal networks.
- Author
-
Oettershagen, Lutz and Mutzel, Petra
- Subjects
TIME-varying networks ,CHARTS, diagrams, etc. ,APPROXIMATION algorithms ,CENTRALITY - Abstract
The closeness centrality of a vertex in a classical static graph is the reciprocal of the sum of the distances to all other vertices. However, networks are often dynamic and change over time. Temporal distances take these dynamics into account. In this work, we consider the harmonic temporal closeness with respect to the shortest duration distance. We introduce an efficient algorithm for computing the exact top-k temporal closeness values and the corresponding vertices. The algorithm can be generalized to the task of computing all closeness values. Furthermore, we derive heuristic modifications that perform well on real-world data sets and drastically reduce the running times. For the case that edge traversal takes an equal amount of time for all edges, we lift two approximation algorithms to the temporal domain. The algorithms approximate the transitive closure of a temporal graph (which is an essential ingredient for the top-k algorithm) and the temporal closeness for all vertices, respectively, with high probability. We experimentally evaluate all our new approaches on real-world data sets and show that they lead to drastically reduced running times while keeping high quality in many cases. Moreover, we demonstrate that the top-k temporal and static closeness vertex sets differ quite largely in the considered temporal networks. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
68. Speeding Up Reachability Queries in Public Transport Networks Using Graph Partitioning.
- Author
-
Tesfaye, Bezaye, Augsten, Nikolaus, Pawlik, Mateusz, Böhlen, Michael H., and Jensen, Christian S.
- Subjects
PUBLIC transit ,HABITAT partitioning (Ecology) - Abstract
Computing path queries such as the shortest path in public transport networks is challenging because the path costs between nodes change over time. A reachability query from a node at a given start time on such a network retrieves all points of interest (POIs) that are reachable within a given cost budget. Reachability queries are essential building blocks in many applications, for example, group recommendations, ranking spatial queries, or geomarketing. We propose an efficient solution for reachability queries in public transport networks. Currently, there are two options to solve reachability queries. (1) Execute a modified version of Dijkstra's algorithm that supports time-dependent edge traversal costs; this solution is slow since it must expand edge by edge and does not use an index. (2) Issue a separate path query for each single POI, i.e., a single reachability query requires answering many path queries. None of these solutions scales to large networks with many POIs. We propose a novel and lightweight reachability index. The key idea is to partition the network into cells. Then, in contrast to other approaches, we expand the network cell by cell. Empirical evaluations on synthetic and real-world networks confirm the efficiency and the effectiveness of our index-based reachability query solution. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
69. A performance predictor for implementation selection of parallelized static and temporal graph algorithms.
- Author
-
Rehman, Akif, Ahmad, Masab, and Khan, Omer
- Subjects
ARTIFICIAL neural networks ,GRAPHICS processing units ,RANDOM forest algorithms - Abstract
Task‐based execution of graph workloads allows various ordered and unordered implementations, with tasks representing dependencies between graph vertices and edges. This work explores graph algorithms in the context of ordered and unordered task‐based implementations, that trade‐off work‐efficiency with parallelism. The monotonicity of convergent graph solutions is the reason behind the trade‐off between work‐efficiency and parallelism. This trade‐off results in variable performance‐based choices within and across different machines (CPUs and GPUs), graph algorithms, implementations (ordered, relaxed, and unordered). Input graphs also augment this choice space, with this work analyzing temporally changing graphs in addition to the static graphs explored by prior works. These algorithmic and architectural choices are first explored in this work, and it is seen that different graph workload‐input combinations perform optimally on diverse architectural configurations. The resulting choice space is analyzed and this work represents it in the form of characteristic variables that correlate with each choice space. Using these characteristic variables, this work proposes analytical and neural network models to correlate these choice spaces to find the best performing implementation. The variables and the prediction models proposed in this work are also integrated with a state‐of‐the‐art performance predictor on a multiaccelerator setup, and shows geometric performance gains of 54% on a CPU, 14% on a GPU, and 31.5% in a multiaccelerator setup over baseline implementations without performance prediction. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
70. A graph-based framework for malicious software detection and classification utilizing temporal-graphs.
- Author
-
Dounavi, Helen-Maria, Mpanti, Anna, Nikolopoulos, Stavros D., and Polenakis, Iosif
- Subjects
- *
SOFTWARE frameworks , *REPRESENTATIONS of graphs , *CLASSIFICATION , *MALWARE , *MALWARE prevention - Abstract
In this paper we present a graph-based framework that, utilizing relations between groups of System-calls, detects whether an unknown software sample is malicious or benign, and classifies a malicious software to one of a set of known malware families. In our approach we propose a novel graph representation of dependency graphs by capturing their structural evolution over time constructing sequential graph instances, the so-called Temporal Graphs. The partitions of the temporal evolution of a graph defined by specific time-slots, results to different types of graphs representations based upon the information we capture across the capturing of its evolution. The proposed graph-based framework utilizes the proposed types of temporal graphs computing similarity metrics over various graph characteristics in order to conduct the malware detection and classification procedures. Finally, we evaluate the detection rates and the classification ability of our proposed graph-based framework conducting a series of experiments over a set of known malware samples pre-classified into malware families. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
71. Temporal cliques admit sparse spanners.
- Author
-
Casteigts, Arnaud, Peters, Joseph G., and Schoeters, Jason
- Subjects
- *
COMPLETE graphs , *SPARSE graphs , *WRENCHES , *UNDIRECTED graphs , *GRAPH connectivity - Abstract
Let G = (V , E) be an undirected graph on n vertices and λ : E → 2 N a mapping that assigns to every edge a non-empty set of integer labels (discrete times when the edge is present). Such a labelled graph G = (G , λ) is temporally connected if a path exists with non-decreasing times from every vertex to every other vertex. In a seminal paper, Kempe, Kleinberg, and Kumar [17] asked whether, given such a temporally connected graph, a sparse subset of edges always exists whose labels suffice to preserve temporal connectivity – a temporal spanner. Axiotis and Fotakis [5] answered negatively by exhibiting a family of Θ (n 2) -dense temporal graphs which admit no temporal spanner of density o (n 2). In this paper, we give the first positive answer as to the existence of o (n 2) -sparse spanners in a dense class of temporal graphs, by showing (constructively) that if G is a complete graph, then one can always find a temporal spanner with O (n log n) edges. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
72. Finding Temporal Paths Under Waiting Time Constraints.
- Author
-
Casteigts, Arnaud, Himmel, Anne-Sophie, Molter, Hendrik, and Zschoche, Philipp
- Subjects
- *
POLYNOMIAL time algorithms , *TIMESTAMPS , *INFECTIOUS disease transmission , *TELECOMMUNICATION systems , *PSYCHOLOGICAL feedback , *NP-hard problems - Abstract
Computing a (short) path between two vertices is one of the most fundamental primitives in graph algorithmics. In recent years, the study of paths in temporal graphs, that is, graphs where the vertex set is fixed but the edge set changes over time, gained more and more attention. A path is time-respecting, or temporal, if it uses edges with non-decreasing time stamps. We investigate a basic constraint for temporal paths, where the time spent at each vertex must not exceed a given duration Δ , referred to as Δ -restless temporal paths. This constraint arises naturally in the modeling of real-world processes like packet routing in communication networks and infection transmission routes of diseases where recovery confers lasting resistance. While finding temporal paths without waiting time restrictions is known to be doable in polynomial time, we show that the "restless variant" of this problem becomes computationally hard even in very restrictive settings. For example, it is W[1]-hard when parameterized by the distance to disjoint path of the underlying graph, which implies W[1]-hardness for many other parameters like feedback vertex number and pathwidth. A natural question is thus whether the problem becomes tractable in some natural settings. We explore several natural parameterizations, presenting FPT algorithms for three kinds of parameters: (1) output-related parameters (here, the maximum length of the path), (2) classical parameters applied to the underlying graph (e.g., feedback edge number), and (3) a new parameter called timed feedback vertex number, which captures finer-grained temporal features of the input temporal graph, and which may be of interest beyond this work. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
73. Being an influencer is hard: The complexity of influence maximization in temporal graphs with a fixed source.
- Author
-
Deligkas, Argyrios, Döring, Michelle, Eiben, Eduard, Goldsmith, Tiger-Lily, and Skretas, George
- Subjects
- *
COMPUTATIONAL complexity , *SOCIAL networks - Abstract
We consider the influence maximization problem over a temporal graph. We deviate from the standard model of influence maximization, where the goal is to choose the most influential vertices. In our model, we are given a fixed vertex and the goal is to find the best time steps to transmit so that the influence of this vertex is maximized. We frame this problem as a spreading process that follows a variant of the susceptible-infected-susceptible (SIS) model and focus on four objective functions. In the MaxSpread objective, the goal is to maximize the number of vertices that get infected at least once. In MaxViral and MaxViralTstep , the goal is to maximize the number of vertices that are infected at the same time step and at a given time step, respectively. Finally, in MinNonViralTime , the goal is to maximize the number of vertices that are infected in every d time-step window. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
74. Relative Hausdorff distance for network analysis
- Author
-
Sinan G. Aksoy, Kathleen E. Nowak, Emilie Purvine, and Stephen J. Young
- Subjects
Relative Hausdorff distance ,Graph similarity measure ,Cyber anomaly detection ,Temporal graphs ,Applied mathematics. Quantitative methods ,T57-57.97 - Abstract
Abstract Similarity measures are used extensively in machine learning and data science algorithms. The newly proposed graph Relative Hausdorff (RH) distance is a lightweight yet nuanced similarity measure for quantifying the closeness of two graphs. In this work we study the effectiveness of RH distance as a tool for detecting anomalies in time-evolving graph sequences. We apply RH to cyber data with given red team events, as well to synthetically generated sequences of graphs with planted attacks. In our experiments, the performance of RH distance is at times comparable, and sometimes superior, to graph edit distance in detecting anomalous phenomena. Our results suggest that in appropriate contexts, RH distance has advantages over more computationally intensive similarity measures.
- Published
- 2019
- Full Text
- View/download PDF
75. Synchronous Hyperedge Replacement Graph Grammars
- Author
-
Pennycuff, Corey, Sikdar, Satyaki, Vajiac, Catalina, Chiang, David, Weninger, Tim, Hutchison, David, Series Editor, Kanade, Takeo, Series Editor, Kittler, Josef, Series Editor, Kleinberg, Jon M., Series Editor, Mattern, Friedemann, Series Editor, Mitchell, John C., Series Editor, Naor, Moni, Series Editor, Pandu Rangan, C., Series Editor, Steffen, Bernhard, Series Editor, Terzopoulos, Demetri, Series Editor, Tygar, Doug, Series Editor, Weikum, Gerhard, Series Editor, Lambers, Leen, editor, and Weber, Jens, editor
- Published
- 2018
- Full Text
- View/download PDF
76. Deleting edges to restrict the size of an epidemic in temporal networks.
- Author
-
Enright, Jessica, Meeks, Kitty, Mertzios, George B., and Zamaraev, Viktor
- Subjects
- *
TIME-varying networks , *BIOLOGICAL networks , *COMPUTATIONAL complexity , *EPIDEMICS , *EDGES (Geometry) , *COMPUTATIONAL neuroscience - Abstract
Spreading processes on graphs are a natural model for a wide variety of real-world phenomena, including information spread over social networks and biological diseases spreading over contact networks. Often, the networks over which these processes spread are dynamic in nature, and can be modelled with temporal graphs. Here, we study the problem of deleting edges from a given temporal graph in order to reduce the number of vertices (temporally) reachable from a given starting point. This could be used to control the spread of a disease, rumour, etc. in a temporal graph. In particular, our aim is to find a temporal subgraph in which a process starting at any single vertex can be transferred to only a limited number of other vertices using a temporally-feasible path. We introduce a natural edge-deletion problem for temporal graphs and provide positive and negative results on its computational complexity and approximability. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
77. Multistage graph problems on a global budget.
- Author
-
Heeger, Klaus, Himmel, Anne-Sophie, Kammer, Frank, Niedermeier, Rolf, Renken, Malte, and Sajenko, Andrej
- Subjects
- *
LOCAL budgets , *NP-hard problems - Abstract
Time-evolving or temporal graphs gain more and more popularity when exploring complex networks. In this context, the multistage view on computational problems is among the most natural frameworks. Roughly speaking, herein one studies the different (time) layers of a temporal graph (effectively meaning that the edge set may change over time, but the vertex set remains unchanged), and one searches for a solution of a given graph problem for each layer. The twist in the multistage setting is that the solutions found must not differ too much between subsequent layers. We relax on this already established notion by introducing a global instead of the local budget view studied so far. More specifically, we allow for few disruptive changes between subsequent layers but request that overall, that is, summing over all layers, the degree of change is moderate. Studying several classical graph problems (both NP-hard and polynomial-time solvable ones) from a parameterized complexity angle, we encounter both fixed-parameter tractability and parameterized hardness results. Surprisingly, we find that sometimes the global multistage versions of NP-hard problems such as Vertex Cover turn out to be computationally more tractable than the ones of polynomial-time solvable problems such as Matching. In addition to time complexity, we also analyze the space efficiency of our algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
78. [formula omitted]: A distributed engine for scalable path queries over temporal property graphs.
- Author
-
Ramesh, Shriram, Baranawal, Animesh, and Simmhan, Yogesh
- Subjects
- *
AGGREGATION operators , *ENGINES , *DISTRIBUTED algorithms , *TELECOMMUNICATION satellites - Abstract
Property graphs are a common form of linked data, with path queries used to traverse and explore them for enterprise transactions and mining. Temporal property graphs are a recent variant where time is a first-class entity to be queried over, and their properties and structure vary over time. These are seen in social, telecom, transit and epidemic networks. However, current graph databases and query engines have limited support for temporal relations among graph entities, no support for time-varying entities and/or do not scale on distributed resources. We address this gap by extending a linear path query model over property graphs to include intuitive temporal predicates and aggregation operators over temporal graphs. We design a distributed execution model for these temporal path queries using the interval-centric computing model, and develop a novel cost model to select an efficient execution plan from several. We perform detailed experiments of our G r a n i t e distributed query engine using both static and dynamic temporal property graphs as large as 52 M vertices, 218 M edges and 325 M properties, and a 1600-query workload, derived from the LDBC benchmark. We frequently offer sub-second query latencies on a commodity cluster, which is 149 × – 1140 × faster compared to industry-leading Neo4J shared-memory graph database and the JanusGraph/Spark distributed graph query engine. G r a n i t e also completes 100% of the queries for all graphs, compared to only 32–92% workload completion by the baseline systems. Further, our cost model selects a query plan that is within 10% of the optimal execution time in 90% of the cases. Despite the irregular nature of graph processing, we exhibit a weak-scaling efficiency of ≥ 60 % on 8 nodes and ≥ 40 % on 16 nodes, for most query workloads. • Proposes a linear path query model over temporal property graphs. • Provides a distributed execution model which can scale to large graphs. • Includes a novel cost model to choose the optimum execution plan. • Evaluates our distributed engine for diverse query workloads over large property graphs on a commodity cluster. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
79. Temporal walk based centrality metric for graph streams
- Author
-
Ferenc Béres, Róbert Pálovics, Anna Oláh, and András A. Benczúr
- Subjects
Temporal graphs ,Centrality ,Twitter measurement ,Dynamics of social networks ,Social media analysis: blogs and friendship networks ,Applied mathematics. Quantitative methods ,T57-57.97 - Abstract
Abstract A plethora of centrality measures or rankings have been proposed to account for the importance of the nodes of a network. In the seminal study of Boldi and Vigna (2014), the comparative evaluation of centrality measures was termed a difficult, arduous task. In networks with fast dynamics, such as the Twitter mention or retweet graphs, predicting emerging centrality is even more challenging. Our main result is a new, temporal walk based dynamic centrality measure that models temporal information propagation by considering the order of edge creation. Dynamic centrality measures have already started to emerge in publications; however, their empirical evaluation is limited. One of our main contributions is creating a quantitative experiment to assess temporal centrality metrics. In this experiment, our new measure outperforms graph snapshot based static and other recently proposed dynamic centrality measures in assigning the highest time-aware centrality to the actually relevant nodes of the network. Additional experiments over different data sets show that our method perform well for detecting concept drift in the process that generates the graphs.
- Published
- 2018
- Full Text
- View/download PDF
80. Blackout-tolerant temporal spanners.
- Author
-
Bilò, Davide, D'Angelo, Gianlorenzo, Gualà, Luciano, Leucci, Stefano, and Rossi, Mirko
- Subjects
- *
WRENCHES , *ELECTRIC power failures - Abstract
We introduce the notions of blackout-tolerant temporal α -spanner of a temporal graph G which is a subgraph of G that preserves the distances between pairs of vertices of interest in G up to a multiplicative factor of α , even when the graph edges at a single time-instant become unavailable. In particular, we consider the single-source , single-pair , and all-pairs cases and, for each case we look at three quality requirements: exact distances (i.e., α = 1), almost-exact distances (i.e., α = 1 + ε for an arbitrarily small constant ε > 0), and connectivity (i.e., unbounded α). We provide almost tight bounds on the size of such spanners for general temporal graphs and for temporal cliques , showing that they are either very sparse (i.e., they have O ˜ (n) edges) or they must have size Ω (n 2) in the worst case, where n is the number of vertices of G. We also investigate multiple blackouts and k-edge fault-tolerant temporal spanners. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
81. Simple, strict, proper, happy: A study of reachability in temporal graphs.
- Author
-
Casteigts, Arnaud, Corsini, Timothée, and Sarkar, Writika
- Subjects
- *
SELF-expression , *WRENCHES - Abstract
Dynamic networks are a complex subject. Not only do they inherit the complexity of static networks (as a particular case); they are also sensitive to definitional subtleties that are a frequent source of confusion and incomparability of results in the literature. In this paper, we take a step back and examine three such aspects in more details, exploring their impact in a systematic way; namely, whether the temporal paths are required to be strict (i.e., the times along a path must increasing, not just be non-decreasing), whether the time labeling is proper (two adjacent edges cannot be present at the same time) and whether the time labeling is simple (an edge can have only one presence time). In particular, we investigate how different combinations of these features impact the expressivity of the graph in terms of reachability. Our results imply a hierarchy of expressivity for the resulting settings, shedding light on the loss of generality that one is making when considering either combination. Some settings are more general than expected; in particular, proper temporal graphs turn out to be as expressive as general temporal graphs where non-strict paths are allowed. Also, we show that the simplest setting, that of happy temporal graphs (i.e., both proper and simple) remains expressive enough to emulate the reachability of general temporal graphs in a certain (restricted but useful) sense. Furthermore, this setting is advocated as a target of choice for proving negative results. We illustrate this by strengthening two known results to happy graphs (namely, the inexistence of sparse spanners, and the hardness of computing temporal components). Overall, we hope that this article can be seen as a guide for choosing between different settings of temporal graphs, while being aware of the way these choices affect generality. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
82. An Overview of Methods for Handling Evolving Graph Sequences
- Author
-
Kosmatopoulos, Andreas, Giannakopoulou, Kalliopi, Papadopoulos, Apostolos N., Tsichlas, Kostas, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Karydis, Ioannis, editor, Sioutas, Spyros, editor, Triantafillou, Peter, editor, and Tsoumakos, Dimitrios, editor
- Published
- 2016
- Full Text
- View/download PDF
83. Shortest Journeys in Directed Temporal Graphs
- Author
-
Cheng, Siu Wing and Cheng, Siu Wing
- Published
- 2023
84. Continuous-Time Temporal Graph Learning on Provenance Graphs
- Author
-
Reha, Jakub, Lovisotto, Giulio, Russo, Michele, Gravina, Alessio, Grohnfeldt, Claas, Reha, Jakub, Lovisotto, Giulio, Russo, Michele, Gravina, Alessio, and Grohnfeldt, Claas
- Abstract
Recent advances in Graph Neural Networks (GNNs) have matured the field of learning on graphs, making GNNs essential for prediction tasks in complex, interconnected, and evolving systems.In this paper, we focus on self-supervised, inductive learning for continuous-time dynamic graphs. Without compromising generality, we propose an approach to learn representations and mine anomalies in provenance graphs, which are a form of large-scale, heterogeneous, attributed, and continuous-time dynamic graphs used in the cybersecurity domain, syntactically resembling complex temporal knowledge graphs. We modify the Temporal Graph Network (TGN) framework to heterogeneous input data and directed edges, refining it specifically for inductive learning on provenance graphs. We present and release two pioneering large-scale, continuous-time temporal, heterogeneous, attributed benchmark graph datasets. The datasets incorporate expert-labeled anomalies, promoting subsequent research on representation learning and anomaly detection on intricate real-world networks. Comprehensive experimental analyses of modules, datasets, and baselines underscore the effectiveness of TGN-based inductive learning, affirming its practical utility in identifying semantically significant anomalies in real-world systems., Part of ISBN 9798350381641QC 20240307
- Published
- 2023
- Full Text
- View/download PDF
85. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs
- Author
-
Reha, Jakub and Reha, Jakub
- Abstract
Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. Ever-increasingly skilled, organized, and funded threat actors combined with ever-increasing volumes and modalities of data require increasingly sophisticated and innovative cyber defense solutions. Current state-of-the-art security systems conduct threat detection on dynamic graph representations of computer systems and enterprise communication networks known as provenance graphs. Most of these security systems are statistics-based, based on rules defined by domain experts, or discard temporal information, and as such come with a set of drawbacks (e.g., incapability to pinpoint the attack, incapability to adapt to evolving systems, reduced expressibility due to lack of temporal information). At the same time, there is little research in the machine learning community on graphs such as provenance graphs, which are a form of largescale, heterogeneous, and continuous-time dynamic graphs, as most research on graph learning has been devoted to static homogeneous graphs to date. Therefore, this thesis aims to bridge these two fields and investigate the potential of learning-based methods operating on continuous-time dynamic provenance graphs for cyber threat detection. Without loss of generality, this work adopts the general Temporal Graph Networks framework for learning representations and detecting anomalies in such graphs. This method explicitly addresses the drawbacks of current security systems by considering the temporal setting and bringing the adaptability of learning-based methods. In doing so, it also introduces and releases two large-scale, continuoustime temporal, heterogeneous benchmark graph datasets with expert-labeled anomalies to foster future research on representation learning and anomaly detection on complex real-world networks. To the best of the author’s knowledge, these are one of the first, Cyberattacker är allestädes närvarande och blir allt vanligare inom industrin, samhället och statliga myndigheter. De påverkar ekonomin, politiken och enskilda individer. Allt skickligare, organiserade och finansierade hotaktörer i kombination med ständigt ökande volymer och modaliteter av data kräver alltmer sofistikerade och innovativa cyberförsvarslösningar. Dagens avancerade säkerhetssystem upptäcker hot på dynamiska grafrepresentationer (proveniensgrafer) av datorsystem och företagskommunikationsnät. De flesta av dessa säkerhetssystem är statistikbaserade, baseras på regler som definieras av domänexperter eller bortser från temporär information, och som sådana kommer de med en rad nackdelar (t.ex. oförmåga att lokalisera attacken, oförmåga att anpassa sig till system som utvecklas, begränsad uttrycksmöjlighet på grund av brist på temporär information). Samtidigt finns det lite forskning inom maskininlärning om grafer som proveniensgrafer, som är en form av storskaliga, heterogena och dynamiska grafer med kontinuerlig tid, eftersom den mesta forskningen om grafinlärning hittills har ägnats åt statiska homogena grafer. Därför syftar denna avhandling till att överbrygga dessa två områden och undersöka potentialen hos inlärningsbaserade metoder som arbetar med dynamiska proveniensgrafer med kontinuerlig tid för detektering av cyberhot. Utan att för den skull göra avkall på generaliserbarheten använder detta arbete det allmänna Temporal Graph Networks-ramverket för inlärning av representationer och upptäckt av anomalier i sådana grafer. Denna metod tar uttryckligen itu med nackdelarna med nuvarande säkerhetssystem genom att beakta den temporala induktiva inställningen och ge anpassningsförmågan hos inlärningsbaserade metoder. I samband med detta introduceras och släpps också två storskaliga, kontinuerliga temporala, heterogena referensgrafdatauppsättningar med expertmärkta anomalier för att främja framtida forskning om representationsinlärning och anomalidetektering
- Published
- 2023
86. Restless Temporal Path Parameterized Above Lower Bounds
- Author
-
Philipp Zschoche, Zschoche, Philipp, Philipp Zschoche, and Zschoche, Philipp
- Published
- 2023
- Full Text
- View/download PDF
87. An FPT Algorithm for Temporal Graph Untangling
- Author
-
Riccardo Dondi and Manuel Lafond, Dondi, Riccardo, Lafond, Manuel, Riccardo Dondi and Manuel Lafond, Dondi, Riccardo, and Lafond, Manuel
- Abstract
Several classical combinatorial problems have been considered and analysed on temporal graphs. Recently, a variant of Vertex Cover on temporal graphs, called MinTimelineCover, has been introduced to summarize timeline activities in social networks. The problem asks to cover every temporal edge while minimizing the total span of the vertices (where the span of a vertex is the length of the timestamp interval it must remain active in). While the problem has been shown to be NP-hard even in very restricted cases, its parameterized complexity has not been fully understood. The problem is known to be in FPT under the span parameter only for graphs with two timestamps, but the parameterized complexity for the general case is open. We settle this open problem by giving an FPT algorithm that is based on a combination of iterative compression and a reduction to the Digraph Pair Cut problem, a powerful problem that has received significant attention recently.
- Published
- 2023
- Full Text
- View/download PDF
88. Restless Exploration of Periodic Temporal Graphs
- Author
-
Thomas Bellitto and Cyril Conchon-Kerjan and Bruno Escoffier, Bellitto, Thomas, Conchon-Kerjan, Cyril, Escoffier, Bruno, Thomas Bellitto and Cyril Conchon-Kerjan and Bruno Escoffier, Bellitto, Thomas, Conchon-Kerjan, Cyril, and Escoffier, Bruno
- Abstract
A temporal graph is a sequence of graphs, indexed by discrete time steps, with a fixed vertex set but with an edge set that is able to change over time. In the temporal graph exploration problem, an agent wants to visit all the vertices of a given temporal graph. In the classical model, at each time step the agent can either stay where they are, or move along one edge. In this work we add a constraint called restlessness that forces the agent to move along one edge at each time step. We mainly focus on (infinite) periodical temporal graphs. We show that if the period is 2 one can decide in polynomial time whether exploring the whole graph is possible or not, while this problem turns out to be NP-hard for any period p ≥ 3. We also show some time bounds on the explorations of such graphs when the exploration is possible.
- Published
- 2023
- Full Text
- View/download PDF
89. When Should You Wait Before Updating? - Toward a Robustness Refinement
- Author
-
Swan Dubois and Laurent Feuilloley and Franck Petit and Mikaël Rabie, Dubois, Swan, Feuilloley, Laurent, Petit, Franck, Rabie, Mikaël, Swan Dubois and Laurent Feuilloley and Franck Petit and Mikaël Rabie, Dubois, Swan, Feuilloley, Laurent, Petit, Franck, and Rabie, Mikaël
- Abstract
Consider a dynamic network and a given distributed problem. At any point in time, there might exist several solutions that are equally good with respect to the problem specification, but that are different from an algorithmic perspective, because some could be easier to update than others when the network changes. In other words, one would prefer to have a solution that is more robust to topological changes in the network; and in this direction the best scenario would be that the solution remains correct despite the dynamic of the network. In [Arnaud Casteigts et al., 2020], the authors introduced a very strong robustness criterion: they required that for any removal of edges that maintain the network connected, the solution remains valid. They focus on the maximal independent set problem, and their approach consists in characterizing the graphs in which there exists a robust solution (the existential problem), or even stronger, where any solution is robust (the universal problem). As the robustness criteria is very demanding, few graphs have a robust solution, and even fewer are such that all of their solutions are robust. In this paper, we ask the following question: Can we have robustness for a larger class of networks, if we bound the number k of edge removals allowed? To answer this question, we consider three classic problems: maximal independent set, minimal dominating set and maximal matching. For the universal problem, the answers for the three cases are surprisingly different. For minimal dominating set, the class does not depend on the number of edges removed. For maximal matching, removing only one edge defines a robust class related to perfect matchings, but for all other bounds k, the class is the same as for an arbitrary number of edge removals. Finally, for maximal independent set, there is a strict hierarchy of classes: the class for the bound k is strictly larger than the class for bound k+1. For the robustness notion of [Arnaud Casteigts et al., 2
- Published
- 2023
- Full Text
- View/download PDF
90. Complexity of the Temporal Shortest Path Interdiction Problem
- Author
-
Jan Boeckmann and Clemens Thielen and Alina Wittmann, Boeckmann, Jan, Thielen, Clemens, Wittmann, Alina, Jan Boeckmann and Clemens Thielen and Alina Wittmann, Boeckmann, Jan, Thielen, Clemens, and Wittmann, Alina
- Abstract
In the shortest path interdiction problem, an interdictor aims to remove arcs of total cost at most a given budget from a directed graph with given arc costs and traversal times such that the length of a shortest s-t-path is maximized. For static graphs, this problem is known to be strongly NP-hard, and it has received considerable attention in the literature. While the shortest path problem is one of the most fundamental and well-studied problems also for temporal graphs, the shortest path interdiction problem has not yet been formally studied on temporal graphs, where common definitions of a "shortest path" include: latest start path (path with maximum start time), earliest arrival path (path with minimum arrival time), shortest duration path (path with minimum traveling time including waiting times at nodes), and shortest traversal path (path with minimum traveling time not including waiting times at nodes). In this paper, we analyze the complexity of the shortest path interdiction problem on temporal graphs with respect to all four definitions of a shortest path mentioned above. Even though the shortest path interdiction problem on static graphs is known to be strongly NP-hard, we show that the latest start and the earliest arrival path interdiction problems on temporal graphs are polynomial-time solvable. For the shortest duration and shortest traversal path interdiction problems, however, we show strong NP-hardness, but we obtain polynomial-time algorithms for these problems on extension-parallel temporal graphs.
- Published
- 2023
- Full Text
- View/download PDF
91. Proxying Betweenness Centrality Rankings in Temporal Networks
- Author
-
Ruben Becker and Pierluigi Crescenzi and Antonio Cruciani and Bojana Kodric, Becker, Ruben, Crescenzi, Pierluigi, Cruciani, Antonio, Kodric, Bojana, Ruben Becker and Pierluigi Crescenzi and Antonio Cruciani and Bojana Kodric, Becker, Ruben, Crescenzi, Pierluigi, Cruciani, Antonio, and Kodric, Bojana
- Abstract
Identifying influential nodes in a network is arguably one of the most important tasks in graph mining and network analysis. A large variety of centrality measures, all aiming at correctly quantifying a node’s importance in the network, have been formulated in the literature. One of the most cited ones is the betweenness centrality, formally introduced by Freeman (Sociometry, 1977). On the other hand, researchers have recently been very interested in capturing the dynamic nature of real-world networks by studying temporal graphs, rather than static ones. Clearly, centrality measures, including the betweenness centrality, have also been extended to temporal graphs. Buß et al. (KDD, 2020) gave algorithms to compute various notions of temporal betweenness centrality, including the perhaps most natural one - shortest temporal betweenness. Their algorithm computes centrality values of all nodes in time O(n³ T²), where n is the size of the network and T is the total number of time steps. For real-world networks, which easily contain tens of thousands of nodes, this complexity becomes prohibitive. Thus, it is reasonable to consider proxies for shortest temporal betweenness rankings that are more efficiently computed, and, therefore, allow for measuring the relative importance of nodes in very large temporal graphs. In this paper, we compare several such proxies on a diverse set of real-world networks. These proxies can be divided into global and local proxies. The considered global proxies include the exact algorithm for static betweenness (computed on the underlying graph), prefix foremost temporal betweenness of Buß et al., which is more efficiently computable than shortest temporal betweenness, and the recently introduced approximation approach of Santoro and Sarpe (WWW, 2022). As all of these global proxies are still expensive to compute on very large networks, we also turn to more efficiently computable local proxies. Here, we consider temporal versions of the ego-bet
- Published
- 2023
- Full Text
- View/download PDF
92. Sliding into the Future: Investigating Sliding Windows in Temporal Graphs (Invited Talk)
- Author
-
Nina Klobas and George B. Mertzios and Paul G. Spirakis, Klobas, Nina, Mertzios, George B., Spirakis, Paul G., Nina Klobas and George B. Mertzios and Paul G. Spirakis, Klobas, Nina, Mertzios, George B., and Spirakis, Paul G.
- Abstract
Graphs are fundamental tools for modelling relations among objects in various scientific fields. However, traditional static graphs have limitations when it comes to capturing the dynamic nature of real-world systems. To overcome this limitation, temporal graphs have been introduced as a framework to model graphs that change over time. In temporal graphs the edges among vertices appear and disappear at specific time steps, reflecting the temporal dynamics of the observed system, which allows us to analyse time dependent patterns and processes. In this paper we focus on the research related to sliding time windows in temporal graphs. Sliding time windows offer a way to analyse specific time intervals within the lifespan of a temporal graph. By sliding the window along the timeline, we can examine the graph’s characteristics and properties within different time periods. This paper provides an overview of the research on sliding time windows in temporal graphs. Although progress has been made in this field, there are still many interesting questions and challenges to be explored. We discuss some of the open problems and highlight their potential for future research.
- Published
- 2023
- Full Text
- View/download PDF
93. Counting Temporal Paths
- Author
-
Jessica Enright and Kitty Meeks and Hendrik Molter, Enright, Jessica, Meeks, Kitty, Molter, Hendrik, Jessica Enright and Kitty Meeks and Hendrik Molter, Enright, Jessica, Meeks, Kitty, and Molter, Hendrik
- Abstract
The betweenness centrality of a vertex v is an important centrality measure that quantifies how many optimal paths between pairs of other vertices visit v. Computing betweenness centrality in a temporal graph, in which the edge set may change over discrete timesteps, requires us to count temporal paths that are optimal with respect to some criterion. For several natural notions of optimality, including foremost or fastest temporal paths, this counting problem reduces to #TEMPORAL PATH, the problem of counting all temporal paths between a fixed pair of vertices; like the problems of counting foremost and fastest temporal paths, #TEMPORAL PATH is #P-hard in general. Motivated by the many applications of this intractable problem, we initiate a systematic study of the parameterised and approximation complexity of #TEMPORAL PATH. We show that the problem presumably does not admit an FPT-algorithm for the feedback vertex number of the static underlying graph, and that it is hard to approximate in general. On the positive side, we prove several exact and approximate FPT-algorithms for special cases.
- Published
- 2023
- Full Text
- View/download PDF
94. Temporal Brain Networks Dataset
- Author
-
Rossi, Aurora, Deslauriers-Gauthier, Samuel, Natale, Emanuele, Combinatorics, Optimization and Algorithms for Telecommunications (COATI), Inria Sophia Antipolis - Méditerranée (CRISAM), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-COMmunications, Réseaux, systèmes Embarqués et Distribués (Laboratoire I3S - COMRED), Laboratoire d'Informatique, Signaux, et Systèmes de Sophia Antipolis (I3S), Université Nice Sophia Antipolis (1965 - 2019) (UNS), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)-Université Nice Sophia Antipolis (1965 - 2019) (UNS), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)-Laboratoire d'Informatique, Signaux, et Systèmes de Sophia Antipolis (I3S), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA), Modélisation des résaux dynamiques cérébraux (CRONOS), Centre Inria d'Université Côte d'Azur, and ANR-17-EURE-0004,UCA DS4H,UCA Systèmes Numériques pour l'Homme(2017)
- Subjects
[SCCO.NEUR]Cognitive science/Neuroscience ,Temporal Brain Networks ,[INFO]Computer Science [cs] ,Temporal Graphs ,Dynamic Graphs ,Dataset - Abstract
International audience
- Published
- 2023
95. The importance of unexpectedness: Discovering buzzing stories in anomalous temporal graphs.
- Author
-
Bonchi, Francesco, Bordino, Ilaria, Gullo, Francesco, and Stilo, Giovanni
- Subjects
- *
USER-generated content , *FAKE news , *FICTION - Abstract
The real-time nature and massive volume of social-media data has converted news portals and micro-blogging platforms into social sensors, causing a flourishing of research on story or event detection in online user-generated content and social-media text streams. Existing approaches to story identification broadly fall into two categories. Approaches in the first category extract stories as cohesive substructures in a graph representing the strength of association between terms. The latter category includes approaches that analyze the temporal evolution of individual terms and identify stories by grouping terms with similar anomalous temporal behavior. Both categories have their own limitations. Approaches in the first category are unable to distinguish ever-popular concepts from stories that buzz in a time interval of interest, i.e., attract an amount of attention that deviates significantly from the typical level observed. The second category ignores term co-associations and the wealth of information captured by them. In this work we advance the literature on story identification by profitably combining the peculiarities of the two main state-of-the-art approaches. We propose a novel method that characterizes abnormal association between terms in a certain time window and leverages the graph structure induced by such anomalous associations so as to identify stories as subsets of terms that are cohesively associated in this graph. Experiments performed on two datasets extracted from a real-world web-search query log and a news corpus, respectively, attest the superiority of the proposed method over the two main existing story-identification approaches. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
96. On Verifying and Maintaining Connectivity of Interval Temporal Networks.
- Author
-
Akrida, Eleni C. and Spirakis, Paul G.
- Subjects
- *
TIME-varying networks , *GRAPH connectivity , *TREE graphs , *POLYNOMIAL time algorithms , *INFORMATION dissemination , *TIME measurements , *CONTINUOUS time models - Abstract
An interval temporal network is, informally speaking, a network whose links change with time. The term interval means that a link may exist for one or more time intervals, called availability intervals of the link, after which it does not exist (until, maybe, a further moment in time when it starts being available again). In this model, we consider continuous time and high-speed (instantaneous) information dissemination. An interval temporal network is connected during a period of time [ x , y ] , if it is connected for all time instances t ∈ [ x , y ] (instantaneous connectivity). In this work, we study instantaneous connectivity issues of interval temporal networks. We provide a polynomial-time algorithm that answers if a given interval temporal network is connected during a time period. If the network is not connected throughout the given time period, then we also give a polynomial-time algorithm that returns large components of the network that remain connected and remain large during [ x , y ] ; the algorithm also considers the components of the network that start as large at time t = x but dis-connect into small components within the time interval [ x , y ] , and answers how long after time t = x these components stay connected and large. Finally, we examine a case of interval temporal networks on tree graphs where the lifetimes of links and, thus, the failures in the connectivity of the network are not controlled by us; however, we can "feed" the network with extra edges that may re-connect it into a tree when a failure happens, so that its connectivity is maintained during a time period. We show that we can with high probability maintain the connectivity of the network for a long time period by making these extra edges available for re-connection using a randomized approach. Our approach also saves some cost in the design of availabilities of the edges; here, the cost is the sum, over all extra edges, of the length of their availability-to-reconnect interval. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
97. Mengerian graphs: Characterization and recognition.
- Author
-
Ibiapina, Allen and Silva, Ana
- Subjects
- *
POLYNOMIAL time algorithms - Abstract
A temporal graph G is a pair (G , λ) where G is a graph and λ is a function on the edges of G describing when each edge is active. Temporal connectivity then concerns only paths that respect the flow of time. In this context, it is known that Menger's Theorem does not hold. In a seminal paper, Kempe, Kleinberg and Kumar (STOC'2000) defined a graph to be Mengerian if equality holds for every time-function. They then proved that, if each edge is allowed to be active only once in (G , λ) , then G is Mengerian if and only if G has no gem as topological minor. In this paper, we generalize their result by allowing edges to be active more than once, giving a characterization also in terms of forbidden structures. We additionally provide a polynomial time recognition algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
98. Snapshot disjointness in temporal graphs
- Author
-
Ibiapina, Allen and Silva, Ana
- Subjects
FOS: Computer and information sciences ,Temporal graphs ,Mathematics of computing → Paths and connectivity problems ,Discrete Mathematics (cs.DM) ,Snapshot disjointness ,Mathematics of computing → Combinatorics ,Menger’s Theorem ,Computer Science - Discrete Mathematics - Abstract
In the study of temporal graphs, only paths respecting the flow of time are relevant. In this context, many concepts of walks disjointness have been proposed over the years, and the validity of Menger’s Theorem, as well as the complexity of related problems, has been investigated. Menger’s Theorem states that the maximum number of disjoint paths between two vertices is equal to the minimum number of vertices required to disconnect them. In this paper, we introduce and investigate a type of disjointness that is only time dependent. Two walks are said to be snapshot disjoint if they are not active in a same snapshot (also called timestep). The related paths and cut problems are then defined and proved to be W[1]-hard and XP-time solvable when parameterized by the size of the solution. Additionally, in the light of the definition of Mengerian graphs given by Kempe, Kleinberg and Kumar in their seminal paper (STOC'2000), we define a Mengerian graph for time as a graph G for which there is no time labeling for its edges where Menger’s Theorem does not hold in the context of snapshot disjointness. We then give a characterization of Mengerian graphs in terms of forbidden structures and provide a polynomial-time recognition algorithm. Finally, we also prove that, given a temporal graph (G,λ) and a pair of vertices s,z ∈ V(G), deciding whether at most h multiedges can separate s from z is NP-complete, where one multiedge uv is the set of all edges with endpoints u and v., LIPIcs, Vol. 257, 2nd Symposium on Algorithmic Foundations of Dynamic Networks (SAND 2023), pages 1:1-1:20
- Published
- 2023
99. Restless Exploration of Periodic Temporal Graphs
- Author
-
Bellitto, Thomas, Conchon-Kerjan, Cyril, and Escoffier, Bruno
- Subjects
Temporal graphs ,Theory of computation → Graph algorithms analysis ,Graph exploration ,NP-completeness - Abstract
A temporal graph is a sequence of graphs, indexed by discrete time steps, with a fixed vertex set but with an edge set that is able to change over time. In the temporal graph exploration problem, an agent wants to visit all the vertices of a given temporal graph. In the classical model, at each time step the agent can either stay where they are, or move along one edge. In this work we add a constraint called restlessness that forces the agent to move along one edge at each time step. We mainly focus on (infinite) periodical temporal graphs. We show that if the period is 2 one can decide in polynomial time whether exploring the whole graph is possible or not, while this problem turns out to be NP-hard for any period p ≥ 3. We also show some time bounds on the explorations of such graphs when the exploration is possible., LIPIcs, Vol. 257, 2nd Symposium on Algorithmic Foundations of Dynamic Networks (SAND 2023), pages 13:1-13:15
- Published
- 2023
- Full Text
- View/download PDF
100. When Should You Wait Before Updating? - Toward a Robustness Refinement
- Author
-
Dubois, Swan, Feuilloley, Laurent, Petit, Franck, and Rabie, Mikaël
- Subjects
FOS: Computer and information sciences ,maximal matching ,packing/covering problems ,Theory of computation → Design and analysis of algorithms ,perfect matching ,Mathematics of computing → Discrete mathematics ,footprint ,maximal independent set ,temporal graphs ,connectivity ,Computer Science - Data Structures and Algorithms ,edge removal ,dynamic network ,NP-hardness ,Data Structures and Algorithms (cs.DS) ,minimum dominating set ,Robustness - Abstract
Consider a dynamic network and a given distributed problem. At any point in time, there might exist several solutions that are equally good with respect to the problem specification, but that are different from an algorithmic perspective, because some could be easier to update than others when the network changes. In other words, one would prefer to have a solution that is more robust to topological changes in the network; and in this direction the best scenario would be that the solution remains correct despite the dynamic of the network. In [Arnaud Casteigts et al., 2020], the authors introduced a very strong robustness criterion: they required that for any removal of edges that maintain the network connected, the solution remains valid. They focus on the maximal independent set problem, and their approach consists in characterizing the graphs in which there exists a robust solution (the existential problem), or even stronger, where any solution is robust (the universal problem). As the robustness criteria is very demanding, few graphs have a robust solution, and even fewer are such that all of their solutions are robust. In this paper, we ask the following question: Can we have robustness for a larger class of networks, if we bound the number k of edge removals allowed? To answer this question, we consider three classic problems: maximal independent set, minimal dominating set and maximal matching. For the universal problem, the answers for the three cases are surprisingly different. For minimal dominating set, the class does not depend on the number of edges removed. For maximal matching, removing only one edge defines a robust class related to perfect matchings, but for all other bounds k, the class is the same as for an arbitrary number of edge removals. Finally, for maximal independent set, there is a strict hierarchy of classes: the class for the bound k is strictly larger than the class for bound k+1. For the robustness notion of [Arnaud Casteigts et al., 2020], no characterization of the class for the existential problem is known, only a polynomial-time recognition algorithm. We show that the situation is even worse for bounded k: even for k = 1, it is NP-hard to decide whether a graph has a robust maximal independent set., LIPIcs, Vol. 257, 2nd Symposium on Algorithmic Foundations of Dynamic Networks (SAND 2023), pages 7:1-7:15
- Published
- 2023
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.