arXiv:1312.7803v1 [cond-mat.stat-mech] 30 Dec 2013
Choice-Driven Phase Transition in Complex
Networks
P. L. Krapivsky
Department of Physics, Boston University, Boston, MA 02215
S. Redner
Department of Physics, Boston University, Boston, MA 02215 and Santa Fe Institute,
1399 Hyde Park Road, Santa Fe, New Mexico 87501, USA
Abstract. We investigate choice-driven network growth. In this model, nodes are
added one by one according to the following procedure: for each addition event a
set of target nodes is selected, each according to linear preferential attachment, and
a new node attaches to the target with the highest degree. Depending on precise
details of the attachment rule, the resulting networks has three possible outcomes: (i)
a non-universal power-law degree distribution; (ii) a single macroscopic hub (a node
whose degree is of the order of N , the number of network nodes), while the remainder
of the nodes comprises a non-universal power-law degree distribution; (iii) a degree
distribution that decays as (k ln k)−2 at the transition between cases (i) and (ii).
These properties are robust when attachment occurs to the highest-degree node from
at least two targets. When attachment is made to a target whose degree is not the
highest, the degree distribution has the double-exponential form exp(−const. × ek ),
from which the largest degree grows only as ln ln N .
PACS numbers: 02.50.Cw, 05.40.-a, 05.50.+q, 87.18.Sn
Choice-Driven Phase Transition in Complex Networks
2
1. Introduction
Choice plays an essential role in queuing and optimization theory [1–5], in the structure
of random recursive trees [6] and evolving random graphs [7–9], in explosive percolation
[10–18], and in the control of avalanches in self-organized criticality [19]. We all familiar
with choice in grocery checkout, customs, and security lines, where we would like to be
in the line with the shortest waiting time. Picking one of N lines at random results in
a maximal waiting time of the order of ln N. If instead one initially selects two lines at
random and then chooses the line with the smaller number of customers, the maximal
waiting time drops to O(ln ln N). Further increasing the number of initially selected
lines improves the maximal waiting time only by a constant factor, thereby illustrating
the “power of two choices” [1–5].
Growing networks with choice were investigated in [6], where the choice was made
to the node closest to the root. Choice has also been implemented in evolving random
graphs (networks with fixed number of nodes and growing number of links), where it
has been shown that appropriate choice may delay [7] or speed up [8, 9] the appearance
of the giant component. One particular example of choice-driven link addition in
evolving random graphs has recently attracted considerable attention [10–18], as it leads
a percolation transition which is explosive in character.
3
5
Figure 1. Illustration of network growth by greedy choice. Two nodes (shaded) in the
network are selected according to preferential attachment. A new node (solid) attaches
to the target with the larger degree, in this case, degree 5.
In this work, we determine how a degree-based choice affects the growth of complex
networks [20]. Instead of a new node attaching to a target node according to a specified
rate, we select a fixed number of targets according to this rate and the new node attaches
to the target with the largest degree—“greedy” choice (Fig. 1). When the targets are
selected randomly and independent of their degrees [6], it was found that the degree
distribution decays exponentially with degree, but at a slower rate than in the case
with no choice. When the targets are selected according to the preferential attachment
mechanism, the effect of the choice is much more dramatic as we show below.
As an example, consider the situation where two targets are provisionally selected,
each with the probability proportional to Ak = k + λ for a target of degree k. Then our
results can be summarized as follows. For λ > 0, the network has a degree distribution
3
Choice-Driven Phase Transition in Complex Networks
with an algebraic tail that possesses a non-universal exponent (i.e., dependent on λ).
This exponent is smaller than in the case of no choice; thus choice broadens the degree
distribution. For λ = 0 (strictly linear preferential attachment), the degree distribution
has a power-law tail with the smallest exponent that is consistent with the network
remaining sparse. More precisely, the fraction of nodes of degree k asymptotically
decays as (k ln k)−2 , with the logarithmic factor ensuring that the network is sparse. For
−1 < λ < 0, a macrohub (a node whose degree grows linearly with the number of nodes
in the network) emerges; the remainder of the degree distribution is still characterized
by a non-universal algebraic tail. These properties are qualitatively robust for greedy
choice with at least two alternatives, although the critical value of λ depends on the
number of alternatives; in the case when p target nodes are provisionally selected, then
λc = p − 2.
(a)
(b)
Figure 2. Example networks of 104 nodes that are grown by strictly linear preferential
attachment for (a) greedy and (b) meek choice from two alternatives. The maximal
degree is 3399 in (a) and 8 in (b). Red are high-degree nodes.
In contrast, when attachment occurs to a target whose degree is less than the largest
among the target set—which we term “meek choice”—a double-exponential degree
distribution arises, where nk ∼ exp(−const. × ek ). Somewhat surprisingly, this behavior
occurs even if attachment occurs to the second-largest out of a large number of targets.
Thus greedy choice is the unique case and all other less greedy attachment choices lead
to a double-exponential degree distribution. Two examples of small networks grown by
greedy and meek choice from two alternatives are shown in Fig. 2.
Choice-Driven Phase Transition in Complex Networks
4
2. Greedy Choice
2.1. Two Alternatives
We start by studying the degree distribution in networks where growth is driven by
greedy choice between two alternatives. Let Nk (N) be the number of nodes of degree k
when the network contains N total nodes. Although the Nk (N) are random variables,
fluctuations in these quantities are small when the network is large. We thus focus on
the averages hNk (N)i in the limit of large N, where we may replace Nk (N +1) − Nk (N)
by dNk /dN. We also drop the angle brackets henceforth.
The evolution of the degree distribution in this greedy choice model is governed by
the master equations
Ak−1 Nk−1 X Aj Nj
Ak Nk X Aj Nj
dNk
=
−
dN
A
A/2
A j<k A/2
j<k−1
2
2
Ak Nk
Ak−1 Nk−1
−
+ δk,1 .
(1)
+
A
A
Here Ak is the rate at which a node of degree k is selected as a potential target and
P
A = j Aj Nj the total rate. The first term on the right-hand side of Eq. (1) accounts
for the increase in Nk due to the new node attaching to a node of degree k−1. Such an
event occurs if the two initial targets have degrees k−1 and j < k−1. The complementary
gain term has a similar origin, while the quadratic terms on the second line account for
events where the two targets have the same degree. The master equations satisfy the
P
P
sum rules k≥1 Nk = N and k≥1 kNk = 2(N −1).
In the following, we focus on the class of shifted linear attachment rates given by
P
Ak = k + λ. In this case the total rate becomes A = j Aj Nj = (2 + λ)N − 2. We
P
are interested in the N → ∞ limit, so we simply write A =
j Aj Nj = (2 + λ)N.
The fraction of nodes of fixed degree becomes size independent when N → ∞, so that
Nk (N) → Nnk (see, e.g., [21, 22]). Using this fact, we recast (1) into
2
ψk−1
+ ψk2
ψk−1 − ψk X
ψj −
+ δk,1 ,
nk =
(2 + λ)2 /2 j<k
(2 + λ)2
(2)
where ψk ≡ (k+λ)nk
Let us now specialize to strictly linear preferential attachment, or λ = 0. The
solutions to the first few of the recurrences (2) can be found straightforwardly and give
√
n1 = 2 2 − 2 ≈ 0.82843 ,
q
√
1 √
1
n2 = − 2 +
21 − 12 2 ≈ 0.08945 ,
(3)
2
2
r
q
q
√
√
√
2
1 1
21 − 12 2 +
70 − 6 21 − 12 2 − 36 2 ≈ 0.03179 ,
n3 = −
9 3
9
etc. To obtain the asymptotic form of the degree distribution, it is convenient to analyze
(2) in the continuum approximation. To lowest order, we use the asymptotic behavior
Choice-Driven Phase Transition in Complex Networks
5
P
P
j<k jnj → 2 as k → ∞, which follows from
k≥1 kNk = 2(N −1), and we also ignore
the terms on the second line. These approximations simplify Eq. (2) to (knk )′ = −nk ,
P
which gives nk ∼ k −2 . However, this solution cannot be correct, as the sum k≥1 knk
logarithmically diverges. The inconsistency arises because the terms that were dropped
are of the same order, namely k −2 , as those in the approximate equation (knk )′ = −nk .
As will become plausible with hindsight, a logarithmic correction in the asymptotic
degree distribution can be anticipated. We thus seek a solution of the form
nk = k −2 u(ℓ),
ℓ = ln k .
(4)
Substituting this ansatz into (2), keeping all terms, and using the continuum
approximation, gives
Z ℓ
du
dxu(x) − u2 ,
(5a)
2u = u −
dℓ
0
Rℓ
or, in terms of the cumulative variable v(ℓ) = 0 dx u(x),
du
v −u,
(5b)
2 = 1−
dv
where we now view u as a function of v. This equation can be rewritten as
(2 − v)dv + udv + vdu = 0, with solution 2v − 12 v 2 + uv = 2. (The integration constant
P
is set by the sum rule k≥1 knk = 2, which implies v(∞) = 2 and u(∞) = 0.) Thus
Integrating gives
dv
v 2
2
u=
1−
.
=
dℓ
v
2
(5c)
v
ℓ
v
+
= ln 1 −
,
2
2
2−v
(5d)
Rℓ
or 2 − v ≃ 4/ℓ, as ℓ → ∞. Combining this result with v(ℓ) = 0 dx u(x) ultimately
leads to u ≃ 4/ℓ2 , so that the asymptotic degree distribution is (see Fig. 3)
nk ≃
k2
4
.
(ln k)2
(6)
Attempting a power-law fit to the data for nk versus k leads to an effective exponent
that q appears to be slowly changing with k; this is often the symptom of a logarithmic
correction, as predicted by (6).
This slow decay of the degree distribution implies the existence of an almost
macroscopic hub—a node whose degree is nearly of the order of N. To estimate
this maximal degree kmax in a network that contains N nodes, we apply the standard
extremal criterion [23] that there is of the order of one node with degree kmax or larger,
X
k≥kmax
nk ∼
1
,
N
(7)
6
Choice-Driven Phase Transition in Complex Networks
−1
10
−3
10
nk
−5
10
−7
10
−9
10
meek
choice
0
10
no
choice
1
2
10
10
greedy
choice
3
10
4
10
5
10
6
10
k
Figure 3. Influence of choice from two alternatives on the degree distributions of
networks grown by strictly linear preferential attachment. The distribution without
choice asymptotically decays as k −3 . Data are based on 102 realizations of 107 nodes.
to the degree distribution (6) to give
kmax ∼
N
,
(ln N)2
(8)
that is, a maximal degree that is almost of the order of N.
For shifted linear preferential attachment, Ak = k + λ, the degree distribution
without choice has the closed form [21]
nk = (2+λ)
Γ(k+λ)
Γ(3+2λ)
,
Γ(1+λ) Γ(k+3+2λ)
(9)
whose asymptotic behavior is the non-universal power law nk ∼ k −(3+λ) . (Note that
λ > −1, so that attachment can occur to nodes of degree 1.)
A convenient way to implement shifted linear preferential attachment is by the
redirection algorithm [21, 22, 24]. This algorithm consists of: (i) selecting a target node
uniformly at random from the existing network; (ii) a new node either attaches to this
target with probability 1 − r or to the parent of the target with probability r, where
r = (2 + λ)−1 . This algorithm exactly reproduces network growth by shifted linear
preferential attachment with shift λ, where the redirection probability is related to λ
via r = (2 + λ)−1 . This algorithm is extremely simple and efficient, as the time to
simulate a network of N nodes scales linearly with N.
We now determine how greedy choice affects the degree distribution when the
network grows by positive shifted linear preferential attachment, Ak = k + λ with
P
λ > 0. For large k, we again drop the quadratic terms in (2), replace j<k (j +λ)nj by
P
j≥1 (j+λ)nj = 2+λ, and employ the continuum approximation. It may subsequently be
verified that the dropped terms are indeed subdominant when λ > 0. These steps yield
Choice-Driven Phase Transition in Complex Networks
7
(knk )′ = −(2+λ)nk /2, with solution nk ∼ k −(2+λ/2) . As in positive shifted preferential
linear attachment without choice, the asymptotic behavior of the degree distribution is
non-universal, but with a much more slowly decaying tail (Fig. 4).
For negative shifted linear preferential attachment, λ < 0, (corresponding to
1
< r < 1), the same analysis of the recurrence (2) as given above predicts nk ∼ k −2 ,
2
P
which violates the sum rule k≥1 knk = 2. The source of this inconsistency is that our
analysis has ignored the possibility of a transition to a new type of “condensed” network
that contains a macrohub—a node whose degree is of the order of N. Let us assume that
such a macrohub of degree hN exists, with h of the order of 1. To determine the degree
of this macrohub, we now exploit the equivalence between shifted linear attachment and
the redirection algorithm. According to redirection, whenever a random target node is
selected, redirection will lead to the macrohub being chosen with probability hr. The
probability of choosing this hub at least once in the two independent selection events is
1 − (1 − hr)2 . This quantity gives the growth rate of the hub, so that
h = 1 − (1 − hr)2 .
(10)
This equation has two solutions, h = 0, and
h=
2r − 1
.
r2
(11)
The former (trivial) solution is relevant when the redirection probability r ≤ 21 , while
the non-trivial solution (11) is realized when 12 < r < 1.
An important feature of this macrohub is that it is unique. To justify this statement,
suppose that more than one macrohub exists. Denote the degrees of the largest and
second-largest hub by h1 N and h2 N, respectively. The degree of the largest hub is
determined from Eq. (10), whose solution is given by (11). For the second-largest hub,
the same reasoning that led to Eq. (10) now gives
h2 = (1 − h1 r)2 − (1 − h1 r − h2 r)2 .
This equation has two solutions, h2 = 0 and an unphysical solution h2 = −h1 . Thus a
second-largest hub does not exist and greedy choice generates one hub when 12 < r < 1.
To compute the degree distribution, we must now explicitly include the effect of
the macrohub in the recurrence (2) when 21 < r < 1. In particular, when we replace
P
P
→ ∞, the summation must be limited to nodes
j<k (j + λ)nj by
j≥1 (j + λ)nj as kP
of finite degree. Thus we now write j≥1(j + λ)nj = 2 + λ − h, where the last term
represents the contribution of the macrohub. Using the connection λ = 1r − 2 and (11)
to rewrite 2+λ−h as r −2 −r −1 , the recurrence (2) simplifies to
nk = −2(1 − r)
d
(knk ) − 2r 2(knk )2 .
dk
(12)
The second term on the right-hand side is asymptotically negligible and the asymptotic
solution is nk ∼ k −[1+1/(2−2r)] .
8
Choice-Driven Phase Transition in Complex Networks
10
10
0
nk
r=1/3
−2
8
10
−4
6
10
ν3
ν2
4
r=2/3
−6
10
ν1
2
0
−8
10
−10
0
0.2
0.4
0.6
r
0.8
1 10
0
2
10
4
10
(a)
10
6
10
8
k
10
(b)
Figure 4. (a) The exponents ν1 = 2 + r1 , ν2 from Eq. (14), and ν3 from Eq. (23).
(b) Representative degree distributions for shifted linear preferential attachment with
greedy choice for redirection probabilities r = 13 and r = 32 for 50 realizations of a
network of 108 nodes. The dashed line corresponds to exponent ν2 = 2.5, as given
by (14) and (23). For r = 31 , the isolated data point at k = 7.5 × 107 corresponds to
macrohubs whose degree is given by Eq. (11).
To summarize, the degree distribution for greedy choice has the algebraic tail
nk ∼ k −ν2 ,
where the decay exponent is given by (Fig. 4(a))
(
1 + 1/(2r)
ν2 (r) =
1 + 1/(2 − 2r)
(13)
0 < r < 12 ,
1
2
< r < 1.
(14)
and the subscript refers to greedy choice from two alternatives. Unexpectedly, ν2 (r)
satisfies mirror symmetry, ν2 (r) = ν2 (1 − r). Also notice that the two forms for ν2 (r)
coincide when r = 21 . This feature, together with the emergence of a macrohub for r > 12
indicates that a structural transition occurs at r = 21 , and it is natural to anticipate the
appearance of a logarithmic correction at this point, as we postulated to derive Eq. (6).
For comparison, in the situation without choice, the decay exponent is ν1 = 1 + 1r . For
the special case of strictly linear preferential attachment, λ = 0 or r = 12 , the degree
distribution is
(
k −3
no choice,
nk ≃ 4 ×
(15)
−2
(k ln k)
binary choice.
Using the above exponent ν2 in the extremal criterion (7), the maximal degree kmax
9
Choice-Driven Phase Transition in Complex Networks
in a network of N nodes with greedy choice is given by:
2r
0 < r < 21 ,
N
kmax ∼ N(ln N)−2
r = 21 ,
N 2−2r
1
< r < 1.
2
(16)
The latter case actually gives the second-largest degree, as the macrohub has the
maximal degree whose value is hN.
To numerically implement greedy choice for shifted linear preferential attachment,
we simply allow for choice in the redirection algorithm [21]. That is, we independently
identify two target nodes by redirection and the new node attaches to the target with
the higher degree. Figure 4(b) shows representative simulation results for the degree
distribution with greedy choice when r = 31 and r = 32 . According to Eq. (14), the
exponent of the two degree distributions should be the same, as seen in our data. For
r = 23 , a unique macrohub also emerges whose average degree is predicted from Eq. (11)
to be hN, with h = 34 . As an illustration, simulations of 50 realizations of networks of
108 nodes gives h = 0.7503 ± 0.0012, in excellent agreement with the theory.
2.2. More Than Two Alternatives
We may readily generalize to greedy choice with p > 2 options where p target nodes
are selected and attachment occurs to the target with the largest degree. The influence
of the number of options p can be easily determined for the emergence of a macrohub.
Now the analog of (10) is
h = 1 − (1 − hr)p ,
(17)
from which a macrohub emerges when the redirection probability exceeds rc = p1 . For
p = 3, the explicit solution is
√
3r − 4r − 3r 2
h=
(18)
2r 2
for r > 13 , while for arbitrary p
h≃
2(r − rc )
,
rc (1 − rc )
rc =
1
.
p
(19)
near the transition 0 < r − rc ≪ 1. For any p, the macrohub degree grows linearly in
r − rc close to the transition.
For p = 3 choices, the analog of (2) for the degree distribution is
nk = 3
3
2
ψk−1
− ψk3
ψk−1
− ψk2 X
ψk−1 − ψk X 2
ψ
+
ψ
+
3
+ δk,1 ,
j
j
3
3
(2+λ)3
(2+λ)
(2+λ)
j<k
j<k
(20)
with again ψk = (k+λ)nk . The first term accounts for events where a unique maximaldegree node exists from among three choices, while the second and third terms account
10
Choice-Driven Phase Transition in Complex Networks
for events with a two-fold and three-fold degeneracy in the maximal-degree node,
respectively.
When −1 < λ < 1, or equivalently 0 < r < 31 , the terms in the first line of (20) are
dominant and the equation reduces to (knk )′ = − 31 (2 + λ)nk for k → ∞. We thereby
obtain nk ∼ k −[1+1/(3r)] . In the marginal case of r = 13 , we again expect a logarithmic
correction of the form given in (4). With this ansatz, the terms in the first and second
lines of (20) are now of the same order, while the terms in the third line are negligible.
The governing equation for u(v) is
du 2
9= 1−
v − 2uv ,
(21)
dv
which gives u = (3 − v)2 (6 + v)/(3v 2 ). Combining this with u =
the limit of large ℓ, we find
3
nk ≃ 2
.
k (ln k)2
dv
dℓ
and specializing to
(22)
When λ > 1 (equivalently 31 < r < 1), the first term on the right-hand side of
(20) is dominant. However, we should again exclude the macrohub from the sum
P
Σk = j<k (j + λ)nj . Hence Σk → 2 + λ − h and (20) reduces to
nk = −3r[1 − hr]2
d
(knk ) .
dk
Thus for the greedy three-choice model, the degree distribution scales as nk ∼ k −ν3 ,
with
(
1 + 1/(3r)
0 < r < 13 ,
ν3 (r) =
(23)
1
<
r
<
1.
1 + 1/(3r[1 − hr]2 )
3
For arbitrary p ≥ 2, the generalization of (23) is
(
1 + 1/(pr)
νp (r) =
1 + 1/(pr[1 − hr]p−1 )
0<r<
1
p
1
p
,
(24)
< r < 1.
with h = h(r) implicitly determined by (17). In the marginal case of r =
generalization of (22) is
p(2p − 2)!
1
nk ≃
,
2
(p − 2)! k (ln k)2
and the maximal degree kmax in a network of N nodes is
pr
0 < r < 1p ,
N
kmax ∼ N(ln N)−2
r = p1 ,
N pr[1−hr]p−1
1
< r < 1.
p
1
,
p
the
(25)
(26)
As in optimization and queuing theory, the possibility of choosing between more than
two options leads only to quantitative changes compared to the more fundamental case
of two options.
Choice-Driven Phase Transition in Complex Networks
11
2.3. Networks With Loops
Thus far, we studied the situation where every new node attaches to one already existing
node, leading to tree networks. However, we can also treat networks with loops. Here
we outline how to deal with the situation where loops are created when each new node
attaches to m already existing nodes, with each attachment event created by the same
choice-driven algorithm as in the previous section. Limiting ourselves to shifted linear
attachment and focusing on greedy choice from two alternatives, the recursion for nk is
given by (compare with Eq. (2))
nk = m
2
ψk−1
+ ψk2
ψk−1 − ψk X
ψ
−
m
+ δk,m .
j
(2m + λ)2 /2
(2m + λ)2
(27)
j<k
This recurrence can be analyzed using the same methods as in the case of trees.
P
P
For instance when λ > 0, we replace j<k ψj by j≥m ψj = 2m + λ when k ≫ 1, and
then employ the continuum approximation to recast (27) into the differential equation
λ
nk . This equation again has an algebraic solution of the form (13),
(knk )′ = − 1 + 2m
with decay exponent ν2 = 2 + λ/(2m).
A macrohub of degree hN again emerges when λ < 0, with h determined by the
relation
"
2 #
h
,
(28)
h=m 1− 1−
2m + λ
which generalizes (10). Thus
λ(2m + λ)
.
(29)
m
Note that the range of the shift parameter is now λ > −m, since the minimal degree is
m and we must ensure that the attachment to nodes of degree m is non-negative. The
degree distribution associated with the remaining nodes still has an algebraic tail. To
summarize, the decay exponent is given by
(
2 + λ/(2m)
λ > 0,
(30)
ν2 =
(4m + 3λ)/(2m + 2λ)
0 > λ > −m.
h=−
For the special case of strictly linear preferential attachment λ = 0, the tail of the degree
distribution is
(
2m(m + 1) × k −3
no choice,
nk ≃
(31)
4m × (k ln k)−2
binary choice.
3. Meek Choice
The complementary situation of meek choice, where a set of target nodes is first selected
and a new node attaches to a target with less than the largest degree leads to very
different phenomenology. The simplest case is that of first selecting two nodes according
Choice-Driven Phase Transition in Complex Networks
12
to linear preferential attachment and the new nodes attaches to the smaller-degree
target; this specific example was also recently investigated in [25].
We determine the degree distribution in this meek choice model by following the
same approach as in greedy choice. The analog of (2) for the degree distribution is
X
2
ψj + 41 ψk−1
+ ψk2 + δk,1 .
(32)
nk = 12 ψk−1 − ψk
j≥k
P
P
Using identity j≥k jnj = 2 − j<k jnj recasts (32) as a recurrence. In the case of
strictly linear preferential attachment, λ = 0, the solutions for small degrees are:
√
n1 = 4 − 2 3 ≈ 0.53589 ,
q
√
√
1
1
(33)
n2 = − 2 + 3 − 2 25 − 12 3 ≈ 0.20548 ,
r
q
q
√
√
√
n3 = − 91 + 13 25 − 12 3 − 29 79 − 6 25 − 12 3 − 36 3 ≈ 0.11099 ,
etc. Notice that while the first few nk are larger than those for greedy choice in Eqs. (3),
the asymptotic degree distribution decays precipitously with k (Fig. 3). For example,
in simulations of 50 realizations of networks grown to 108 nodes, the largest observed
degree is only 9!
We now exploit this rapid decay to determine the asymptotic behavior of the degree
distribution. For large k, an increase in nk can occur only if the two target nodes have
degree k − 1. Thus we posit that the dominant term in (32) is 14 (k − 1)2 n2k−1 . Keeping
only this term, the asymptotic behavior of the logarithm of the degree distribution is
given by
ln nk ∼ −C × 2k ,
(34)
up to some amplitude C that cannot be determined within this simplified analysis. One
can then verify that the remaining terms in (32) are subdominant. From this asymptotic
degree distribution, we estimate the maximal degree in a network of N nodes to be
kmax ≃ log2 log2 N, as recently proven in Ref. [25].
When p distinct initial target nodes are selected by preferential attachment, there
are p possibilities for the attachment event: to the highest-degree node, to the secondhighest degree node, all the way to the lowest-degree node. While the combinatorics
become unwieldy for the general case of identifying the target node with the mth -largest
degree out of p choices, the dominant contribution to nk for large k arises when m
targets have degree k − 1 and the remaining p − m targets have degrees less than k − 1.
Following the same reasoning as in the case of attaching to the smallest-degree node
out of two choices, the dominant term in the generalization of (32) is proportional to
k
(k − 1)m nm
k−1 . This leads to nk ∼ exp(−const. × m ). Thus for all but greedy choice,
the degree distribution decays precipitously with degree.
Choice-Driven Phase Transition in Complex Networks
13
From this asymptotic degree distribution, the maximal degree grows with N as
greedy choice
N ωp
nd
log2 log2 N 2 highest degree
kmax ∼ log3 log3 N 3rd highest degree
(35)
···
logp logp N smallest degree
for p ≥ 2. The exponent ωp that appears in (35) depends on the number of alternatives
p and on details of the attachment rate. For strictly linear preferential attachment,
ωp = p(1 − h)/(2 − h), where the degree h of the macrohub is the positive solution of the
equation h = 1 − (1 − h/2)p . The other ultra-slow growth laws in (35) are robust with
respect to the details of the attachment rule. These latter behaviors do not depend on
the details of the selection rule as long as the choice is less than greedy.
4. Summary
Incorporating choice in preferential attachment network growth leads to rich
phenomenology in which the effect of preferential attachment can be strongly amplified
or entirely eliminated. We have explored a general class of models in which a set of
target nodes in the network are first selected according to preferential attachment and
then a new node joins the network by attaching to one of these target nodes according
to a specified criterion. In greedy choice, attachment is made to the target with the
largest degree. We also investigated attaching to a node in the target set whose degree
is not the largest. For a target set of p nodes, there are p − 1 possible such choices—to
the 2nd -largest degree node, the 3rd-largest, . . . , to the smallest-degree node. We term
this class of models as meek choice.
Past work on the power of choice on the random recursive tree [6] found that
greedy choice broadens the degree distribution, but only in a quantitative way. We have
shown that greedy choice plays a much more significant role for networks that grow by
preferential attachment. We focused on shifted linear preferential attachment, but our
methods apply to other models with asymptotically linear preferential attachment. The
details depend on the model, but the general outcome is robust. In the sub-critical phase,
the degree distribution has a power law tail that is considerably broader than in the
case of no choice. In the super-critical phase, a macrohub emerges, while the remainder
of the degree distribution is still algebraic. At the boundary between these two phases,
the degree distribution decays as (k ln k)−2 . This form for the degree distribution is
consistent with a finite average degree in the network because of the presence of the
logarithmic factor.
The influence of meek choice is perhaps even more dramatic, as it effectively
counteracts preferential attachment. When p target nodes are initially selected, meek
choice means that the new node attaches to a target whose degree is less than the highest
Choice-Driven Phase Transition in Complex Networks
14
in the target set. For the case where a new node attaches to the mth -largest degree out
of a target set of p nodes that are each selected by linear preferential attachment, meek
choice leads to a double-exponential degree distribution of the form exp(−const. × ek ),
and a maximal degree that is of the order of logm logm N. It is surprising that this sharp
decay should hold for attachment to the target with the 2nd -highest degree out of p ≫ 1
targets. In this case, the degree distribution will initially resemble that of greedy choice
and the crossover to a precipitous decay will occur at an extremely large degree value.
This research was partially supported by the AFOSR and DARPA under grant
#FA9550-12-1-0391 and by NSF grant No. DMR-1205797.
Choice-Driven Phase Transition in Complex Networks
15
[1] N. D. Vvedenskaya, R. L. Dobrushin, and F. I. Karpelevich, Problems Inform. Transmission 32,
15 (1996).
[2] Y. Azar, A. Z. Broder, A. R. Karlin, and E. Upfal, SIAM J. Comp. 29, 180 (1999).
[3] M. Adler, S. Chakarabarti, M. Mitzenmacher, and L. Rasmussen, Rand. Struct. Alg. 13, 159
(1998).
[4] M. Mitzenmacher and E. Upfal, Probability and Computing : Randomized Algorithms and
Probabilistic Analysis (Cambridge University Press, New York, 2005).
[5] M. J. Luczak and C. McDiarmid, Ann. Appl. Probab. 15, 1733 (2005); Ann. Probab. 34, 493
(2006).
[6] R. M. D’Souza, P. L. Krapivsky, and C. Moore, Eur. Phys. J. B 59, 535 (2007).
[7] T. Bohman and A. Frieze, Rand. Struct. Alg. 19, 75 (2001).
[8] T. Bohman and D. Kravitz, Combin. Probab. Comput. 15, 489 (2006).
[9] J. Spencer and N. Wormald, Combinatorica 27, 587 (2007).
[10] D. Achlioptas, R. M. D’Souza, and J. Spencer, Science 323, 1453 (2009).
[11] R. M. Ziff, Phys. Rev. Lett. 103, 045701 (2009); Phys. Rev. E 82, 051105 (2010).
[12] E. J. Friedman and A. S. Landsberg, Phys. Rev. Lett. 103, 255701 (2009).
[13] Y. S. Cho, J. S. Kim, J. Park, B. Kahng, and D. Kim, Phys. Rev. Lett. 103, 135702 (2009); Y. S.
Cho, S.-W. Kim, J. D. Noh, B. Kahng, and D. Kim, Phys. Rev. E 82, 042102 (2010).
[14] F. Radicchi and S. Fortunato, Phys. Rev. Lett. 103, 168701 (2009); F. Radicchi and S. Fortunato,
Phys. Rev. E 81, 036110 (2010).
[15] R. M. D’Souza and M. Mitzenmacher, Phys. Rev. Lett. 104, 195702 (2010).
[16] R. A. da Costa, S. N. Dorogovtsev, A. V. Goltsev, and J. F. F. Mendes, Phys. Rev. Lett. 105,
255701 (2010).
[17] O. Riordan and L. Warnke, Science 333, 322 (2011); Ann. Appl. Probab. 22, 1450 (2012).
[18] P. Grassberger, C. Christensen, G. Bizhani, S.-W. Son, and M. Paczuski, Phys. Rev. Lett. 106,
225701 (2011).
[19] P.-A. Noël, C. D. Brummitt, and R. M. D’Souza, Phys. Rev. Lett. 111, 078701 (2013).
[20] For reviews, see R. Albert and A.-L. Barabási Rev. Mod. Phys. 74, 47 (2002); S. N. Dorogovtsev
and J. F. F. Mendes, Evolution of Networks: From Biological Nets to the Internet and WWW
(Oxford University Press, Oxford, UK, 2003); M. E. J. Newman, Networks: An Introduction
(Oxford University Press, Oxford, UK, 2010).
[21] P. L. Krapivsky and S. Redner, Phys. Rev. E 63, 066123 (2001); J. Phys. A 35, 9517 (2002).
[22] P. L. Krapivsky, S. Redner, and E. Ben-Naim, A Kinetic View of Statistical Physics (Cambridge
University Press, Cambridge, UK, 2010).
[23] E. J. Gumbel, Statistics of Extremes (Columbia University Press, New York, 1958).
[24] J. Kleinberg, R. Kumar, P. Raghavan, S. Rajagopalan, and A. Tomkins, in: Proc. International
Conference on Combinatorics and Computing, Lecture Notes in Computer Science, Vol. 1627,
pp. 1–18 (Springer-Verlag, Berlin, 1999).
[25] Yu. Malyshkin and E. Paquette, arXiv:1311.1091.