Academia.eduAcademia.edu

Choice-driven phase transition in complex networks

2014, Journal of Statistical Mechanics: Theory and Experiment

We investigate choice-driven network growth. In this model, nodes are added one by one according to the following procedure: for each addition event a set of target nodes is selected, each according to linear preferential attachment, and a new node attaches to the target with the highest degree. Depending on precise details of the attachment rule, the resulting networks has three possible outcomes: (i) a non-universal power-law degree distribution; (ii) a single macroscopic hub (a node whose degree is of the order of N , the number of network nodes), while the remainder of the nodes comprises a non-universal power-law degree distribution; (iii) a degree distribution that decays as (k ln k) −2 at the transition between cases (i) and (ii). These properties are robust when attachment occurs to the highest-degree node from at least two targets. When attachment is made to a target whose degree is not the highest, the degree distribution has the double-exponential form exp(−const. × e k ), from which the largest degree grows only as ln ln N .

arXiv:1312.7803v1 [cond-mat.stat-mech] 30 Dec 2013 Choice-Driven Phase Transition in Complex Networks P. L. Krapivsky Department of Physics, Boston University, Boston, MA 02215 S. Redner Department of Physics, Boston University, Boston, MA 02215 and Santa Fe Institute, 1399 Hyde Park Road, Santa Fe, New Mexico 87501, USA Abstract. We investigate choice-driven network growth. In this model, nodes are added one by one according to the following procedure: for each addition event a set of target nodes is selected, each according to linear preferential attachment, and a new node attaches to the target with the highest degree. Depending on precise details of the attachment rule, the resulting networks has three possible outcomes: (i) a non-universal power-law degree distribution; (ii) a single macroscopic hub (a node whose degree is of the order of N , the number of network nodes), while the remainder of the nodes comprises a non-universal power-law degree distribution; (iii) a degree distribution that decays as (k ln k)−2 at the transition between cases (i) and (ii). These properties are robust when attachment occurs to the highest-degree node from at least two targets. When attachment is made to a target whose degree is not the highest, the degree distribution has the double-exponential form exp(−const. × ek ), from which the largest degree grows only as ln ln N . PACS numbers: 02.50.Cw, 05.40.-a, 05.50.+q, 87.18.Sn Choice-Driven Phase Transition in Complex Networks 2 1. Introduction Choice plays an essential role in queuing and optimization theory [1–5], in the structure of random recursive trees [6] and evolving random graphs [7–9], in explosive percolation [10–18], and in the control of avalanches in self-organized criticality [19]. We all familiar with choice in grocery checkout, customs, and security lines, where we would like to be in the line with the shortest waiting time. Picking one of N lines at random results in a maximal waiting time of the order of ln N. If instead one initially selects two lines at random and then chooses the line with the smaller number of customers, the maximal waiting time drops to O(ln ln N). Further increasing the number of initially selected lines improves the maximal waiting time only by a constant factor, thereby illustrating the “power of two choices” [1–5]. Growing networks with choice were investigated in [6], where the choice was made to the node closest to the root. Choice has also been implemented in evolving random graphs (networks with fixed number of nodes and growing number of links), where it has been shown that appropriate choice may delay [7] or speed up [8, 9] the appearance of the giant component. One particular example of choice-driven link addition in evolving random graphs has recently attracted considerable attention [10–18], as it leads a percolation transition which is explosive in character. 3 5 Figure 1. Illustration of network growth by greedy choice. Two nodes (shaded) in the network are selected according to preferential attachment. A new node (solid) attaches to the target with the larger degree, in this case, degree 5. In this work, we determine how a degree-based choice affects the growth of complex networks [20]. Instead of a new node attaching to a target node according to a specified rate, we select a fixed number of targets according to this rate and the new node attaches to the target with the largest degree—“greedy” choice (Fig. 1). When the targets are selected randomly and independent of their degrees [6], it was found that the degree distribution decays exponentially with degree, but at a slower rate than in the case with no choice. When the targets are selected according to the preferential attachment mechanism, the effect of the choice is much more dramatic as we show below. As an example, consider the situation where two targets are provisionally selected, each with the probability proportional to Ak = k + λ for a target of degree k. Then our results can be summarized as follows. For λ > 0, the network has a degree distribution 3 Choice-Driven Phase Transition in Complex Networks with an algebraic tail that possesses a non-universal exponent (i.e., dependent on λ). This exponent is smaller than in the case of no choice; thus choice broadens the degree distribution. For λ = 0 (strictly linear preferential attachment), the degree distribution has a power-law tail with the smallest exponent that is consistent with the network remaining sparse. More precisely, the fraction of nodes of degree k asymptotically decays as (k ln k)−2 , with the logarithmic factor ensuring that the network is sparse. For −1 < λ < 0, a macrohub (a node whose degree grows linearly with the number of nodes in the network) emerges; the remainder of the degree distribution is still characterized by a non-universal algebraic tail. These properties are qualitatively robust for greedy choice with at least two alternatives, although the critical value of λ depends on the number of alternatives; in the case when p target nodes are provisionally selected, then λc = p − 2. (a) (b) Figure 2. Example networks of 104 nodes that are grown by strictly linear preferential attachment for (a) greedy and (b) meek choice from two alternatives. The maximal degree is 3399 in (a) and 8 in (b). Red are high-degree nodes. In contrast, when attachment occurs to a target whose degree is less than the largest among the target set—which we term “meek choice”—a double-exponential degree distribution arises, where nk ∼ exp(−const. × ek ). Somewhat surprisingly, this behavior occurs even if attachment occurs to the second-largest out of a large number of targets. Thus greedy choice is the unique case and all other less greedy attachment choices lead to a double-exponential degree distribution. Two examples of small networks grown by greedy and meek choice from two alternatives are shown in Fig. 2. Choice-Driven Phase Transition in Complex Networks 4 2. Greedy Choice 2.1. Two Alternatives We start by studying the degree distribution in networks where growth is driven by greedy choice between two alternatives. Let Nk (N) be the number of nodes of degree k when the network contains N total nodes. Although the Nk (N) are random variables, fluctuations in these quantities are small when the network is large. We thus focus on the averages hNk (N)i in the limit of large N, where we may replace Nk (N +1) − Nk (N) by dNk /dN. We also drop the angle brackets henceforth. The evolution of the degree distribution in this greedy choice model is governed by the master equations Ak−1 Nk−1 X Aj Nj Ak Nk X Aj Nj dNk = − dN A A/2 A j<k A/2 j<k−1 2  2  Ak Nk Ak−1 Nk−1 − + δk,1 . (1) + A A Here Ak is the rate at which a node of degree k is selected as a potential target and P A = j Aj Nj the total rate. The first term on the right-hand side of Eq. (1) accounts for the increase in Nk due to the new node attaching to a node of degree k−1. Such an event occurs if the two initial targets have degrees k−1 and j < k−1. The complementary gain term has a similar origin, while the quadratic terms on the second line account for events where the two targets have the same degree. The master equations satisfy the P P sum rules k≥1 Nk = N and k≥1 kNk = 2(N −1). In the following, we focus on the class of shifted linear attachment rates given by P Ak = k + λ. In this case the total rate becomes A = j Aj Nj = (2 + λ)N − 2. We P are interested in the N → ∞ limit, so we simply write A = j Aj Nj = (2 + λ)N. The fraction of nodes of fixed degree becomes size independent when N → ∞, so that Nk (N) → Nnk (see, e.g., [21, 22]). Using this fact, we recast (1) into 2 ψk−1 + ψk2 ψk−1 − ψk X ψj − + δk,1 , nk = (2 + λ)2 /2 j<k (2 + λ)2 (2) where ψk ≡ (k+λ)nk Let us now specialize to strictly linear preferential attachment, or λ = 0. The solutions to the first few of the recurrences (2) can be found straightforwardly and give √ n1 = 2 2 − 2 ≈ 0.82843 , q √ 1 √ 1 n2 = − 2 + 21 − 12 2 ≈ 0.08945 , (3) 2 2 r q q √ √ √ 2 1 1 21 − 12 2 + 70 − 6 21 − 12 2 − 36 2 ≈ 0.03179 , n3 = − 9 3 9 etc. To obtain the asymptotic form of the degree distribution, it is convenient to analyze (2) in the continuum approximation. To lowest order, we use the asymptotic behavior Choice-Driven Phase Transition in Complex Networks 5 P P j<k jnj → 2 as k → ∞, which follows from k≥1 kNk = 2(N −1), and we also ignore the terms on the second line. These approximations simplify Eq. (2) to (knk )′ = −nk , P which gives nk ∼ k −2 . However, this solution cannot be correct, as the sum k≥1 knk logarithmically diverges. The inconsistency arises because the terms that were dropped are of the same order, namely k −2 , as those in the approximate equation (knk )′ = −nk . As will become plausible with hindsight, a logarithmic correction in the asymptotic degree distribution can be anticipated. We thus seek a solution of the form nk = k −2 u(ℓ), ℓ = ln k . (4) Substituting this ansatz into (2), keeping all terms, and using the continuum approximation, gives Z ℓ  du dxu(x) − u2 , (5a) 2u = u − dℓ 0 Rℓ or, in terms of the cumulative variable v(ℓ) = 0 dx u(x),   du v −u, (5b) 2 = 1− dv where we now view u as a function of v. This equation can be rewritten as (2 − v)dv + udv + vdu = 0, with solution 2v − 12 v 2 + uv = 2. (The integration constant P is set by the sum rule k≥1 knk = 2, which implies v(∞) = 2 and u(∞) = 0.) Thus Integrating gives dv v 2 2 u= 1− . = dℓ v 2 (5c)  v ℓ v + = ln 1 − , 2 2 2−v (5d) Rℓ or 2 − v ≃ 4/ℓ, as ℓ → ∞. Combining this result with v(ℓ) = 0 dx u(x) ultimately leads to u ≃ 4/ℓ2 , so that the asymptotic degree distribution is (see Fig. 3) nk ≃ k2 4 . (ln k)2 (6) Attempting a power-law fit to the data for nk versus k leads to an effective exponent that q appears to be slowly changing with k; this is often the symptom of a logarithmic correction, as predicted by (6). This slow decay of the degree distribution implies the existence of an almost macroscopic hub—a node whose degree is nearly of the order of N. To estimate this maximal degree kmax in a network that contains N nodes, we apply the standard extremal criterion [23] that there is of the order of one node with degree kmax or larger, X k≥kmax nk ∼ 1 , N (7) 6 Choice-Driven Phase Transition in Complex Networks −1 10 −3 10 nk −5 10 −7 10 −9 10 meek choice 0 10 no choice 1 2 10 10 greedy choice 3 10 4 10 5 10 6 10 k Figure 3. Influence of choice from two alternatives on the degree distributions of networks grown by strictly linear preferential attachment. The distribution without choice asymptotically decays as k −3 . Data are based on 102 realizations of 107 nodes. to the degree distribution (6) to give kmax ∼ N , (ln N)2 (8) that is, a maximal degree that is almost of the order of N. For shifted linear preferential attachment, Ak = k + λ, the degree distribution without choice has the closed form [21] nk = (2+λ) Γ(k+λ) Γ(3+2λ) , Γ(1+λ) Γ(k+3+2λ) (9) whose asymptotic behavior is the non-universal power law nk ∼ k −(3+λ) . (Note that λ > −1, so that attachment can occur to nodes of degree 1.) A convenient way to implement shifted linear preferential attachment is by the redirection algorithm [21, 22, 24]. This algorithm consists of: (i) selecting a target node uniformly at random from the existing network; (ii) a new node either attaches to this target with probability 1 − r or to the parent of the target with probability r, where r = (2 + λ)−1 . This algorithm exactly reproduces network growth by shifted linear preferential attachment with shift λ, where the redirection probability is related to λ via r = (2 + λ)−1 . This algorithm is extremely simple and efficient, as the time to simulate a network of N nodes scales linearly with N. We now determine how greedy choice affects the degree distribution when the network grows by positive shifted linear preferential attachment, Ak = k + λ with P λ > 0. For large k, we again drop the quadratic terms in (2), replace j<k (j +λ)nj by P j≥1 (j+λ)nj = 2+λ, and employ the continuum approximation. It may subsequently be verified that the dropped terms are indeed subdominant when λ > 0. These steps yield Choice-Driven Phase Transition in Complex Networks 7 (knk )′ = −(2+λ)nk /2, with solution nk ∼ k −(2+λ/2) . As in positive shifted preferential linear attachment without choice, the asymptotic behavior of the degree distribution is non-universal, but with a much more slowly decaying tail (Fig. 4). For negative shifted linear preferential attachment, λ < 0, (corresponding to 1 < r < 1), the same analysis of the recurrence (2) as given above predicts nk ∼ k −2 , 2 P which violates the sum rule k≥1 knk = 2. The source of this inconsistency is that our analysis has ignored the possibility of a transition to a new type of “condensed” network that contains a macrohub—a node whose degree is of the order of N. Let us assume that such a macrohub of degree hN exists, with h of the order of 1. To determine the degree of this macrohub, we now exploit the equivalence between shifted linear attachment and the redirection algorithm. According to redirection, whenever a random target node is selected, redirection will lead to the macrohub being chosen with probability hr. The probability of choosing this hub at least once in the two independent selection events is 1 − (1 − hr)2 . This quantity gives the growth rate of the hub, so that h = 1 − (1 − hr)2 . (10) This equation has two solutions, h = 0, and h= 2r − 1 . r2 (11) The former (trivial) solution is relevant when the redirection probability r ≤ 21 , while the non-trivial solution (11) is realized when 12 < r < 1. An important feature of this macrohub is that it is unique. To justify this statement, suppose that more than one macrohub exists. Denote the degrees of the largest and second-largest hub by h1 N and h2 N, respectively. The degree of the largest hub is determined from Eq. (10), whose solution is given by (11). For the second-largest hub, the same reasoning that led to Eq. (10) now gives h2 = (1 − h1 r)2 − (1 − h1 r − h2 r)2 . This equation has two solutions, h2 = 0 and an unphysical solution h2 = −h1 . Thus a second-largest hub does not exist and greedy choice generates one hub when 12 < r < 1. To compute the degree distribution, we must now explicitly include the effect of the macrohub in the recurrence (2) when 21 < r < 1. In particular, when we replace P P → ∞, the summation must be limited to nodes j<k (j + λ)nj by j≥1 (j + λ)nj as kP of finite degree. Thus we now write j≥1(j + λ)nj = 2 + λ − h, where the last term represents the contribution of the macrohub. Using the connection λ = 1r − 2 and (11) to rewrite 2+λ−h as r −2 −r −1 , the recurrence (2) simplifies to nk = −2(1 − r) d (knk ) − 2r 2(knk )2 . dk (12) The second term on the right-hand side is asymptotically negligible and the asymptotic solution is nk ∼ k −[1+1/(2−2r)] . 8 Choice-Driven Phase Transition in Complex Networks 10 10 0 nk r=1/3 −2 8 10 −4 6 10 ν3 ν2 4 r=2/3 −6 10 ν1 2 0 −8 10 −10 0 0.2 0.4 0.6 r 0.8 1 10 0 2 10 4 10 (a) 10 6 10 8 k 10 (b) Figure 4. (a) The exponents ν1 = 2 + r1 , ν2 from Eq. (14), and ν3 from Eq. (23). (b) Representative degree distributions for shifted linear preferential attachment with greedy choice for redirection probabilities r = 13 and r = 32 for 50 realizations of a network of 108 nodes. The dashed line corresponds to exponent ν2 = 2.5, as given by (14) and (23). For r = 31 , the isolated data point at k = 7.5 × 107 corresponds to macrohubs whose degree is given by Eq. (11). To summarize, the degree distribution for greedy choice has the algebraic tail nk ∼ k −ν2 , where the decay exponent is given by (Fig. 4(a)) ( 1 + 1/(2r) ν2 (r) = 1 + 1/(2 − 2r) (13) 0 < r < 12 , 1 2 < r < 1. (14) and the subscript refers to greedy choice from two alternatives. Unexpectedly, ν2 (r) satisfies mirror symmetry, ν2 (r) = ν2 (1 − r). Also notice that the two forms for ν2 (r) coincide when r = 21 . This feature, together with the emergence of a macrohub for r > 12 indicates that a structural transition occurs at r = 21 , and it is natural to anticipate the appearance of a logarithmic correction at this point, as we postulated to derive Eq. (6). For comparison, in the situation without choice, the decay exponent is ν1 = 1 + 1r . For the special case of strictly linear preferential attachment, λ = 0 or r = 12 , the degree distribution is ( k −3 no choice, nk ≃ 4 × (15) −2 (k ln k) binary choice. Using the above exponent ν2 in the extremal criterion (7), the maximal degree kmax 9 Choice-Driven Phase Transition in Complex Networks in a network of N nodes with greedy choice is given by:  2r  0 < r < 21 ,  N kmax ∼ N(ln N)−2 r = 21 ,   N 2−2r 1 < r < 1. 2 (16) The latter case actually gives the second-largest degree, as the macrohub has the maximal degree whose value is hN. To numerically implement greedy choice for shifted linear preferential attachment, we simply allow for choice in the redirection algorithm [21]. That is, we independently identify two target nodes by redirection and the new node attaches to the target with the higher degree. Figure 4(b) shows representative simulation results for the degree distribution with greedy choice when r = 31 and r = 32 . According to Eq. (14), the exponent of the two degree distributions should be the same, as seen in our data. For r = 23 , a unique macrohub also emerges whose average degree is predicted from Eq. (11) to be hN, with h = 34 . As an illustration, simulations of 50 realizations of networks of 108 nodes gives h = 0.7503 ± 0.0012, in excellent agreement with the theory. 2.2. More Than Two Alternatives We may readily generalize to greedy choice with p > 2 options where p target nodes are selected and attachment occurs to the target with the largest degree. The influence of the number of options p can be easily determined for the emergence of a macrohub. Now the analog of (10) is h = 1 − (1 − hr)p , (17) from which a macrohub emerges when the redirection probability exceeds rc = p1 . For p = 3, the explicit solution is √ 3r − 4r − 3r 2 h= (18) 2r 2 for r > 13 , while for arbitrary p h≃ 2(r − rc ) , rc (1 − rc ) rc = 1 . p (19) near the transition 0 < r − rc ≪ 1. For any p, the macrohub degree grows linearly in r − rc close to the transition. For p = 3 choices, the analog of (2) for the degree distribution is nk = 3 3 2 ψk−1 − ψk3 ψk−1 − ψk2 X ψk−1 − ψk  X 2 ψ + ψ + 3 + δk,1 , j j 3 3 (2+λ)3 (2+λ) (2+λ) j<k j<k (20) with again ψk = (k+λ)nk . The first term accounts for events where a unique maximaldegree node exists from among three choices, while the second and third terms account 10 Choice-Driven Phase Transition in Complex Networks for events with a two-fold and three-fold degeneracy in the maximal-degree node, respectively. When −1 < λ < 1, or equivalently 0 < r < 31 , the terms in the first line of (20) are dominant and the equation reduces to (knk )′ = − 31 (2 + λ)nk for k → ∞. We thereby obtain nk ∼ k −[1+1/(3r)] . In the marginal case of r = 13 , we again expect a logarithmic correction of the form given in (4). With this ansatz, the terms in the first and second lines of (20) are now of the same order, while the terms in the third line are negligible. The governing equation for u(v) is  du  2 9= 1− v − 2uv , (21) dv which gives u = (3 − v)2 (6 + v)/(3v 2 ). Combining this with u = the limit of large ℓ, we find 3 nk ≃ 2 . k (ln k)2 dv dℓ and specializing to (22) When λ > 1 (equivalently 31 < r < 1), the first term on the right-hand side of (20) is dominant. However, we should again exclude the macrohub from the sum P Σk = j<k (j + λ)nj . Hence Σk → 2 + λ − h and (20) reduces to nk = −3r[1 − hr]2 d (knk ) . dk Thus for the greedy three-choice model, the degree distribution scales as nk ∼ k −ν3 , with ( 1 + 1/(3r) 0 < r < 13 , ν3 (r) = (23) 1 < r < 1. 1 + 1/(3r[1 − hr]2 ) 3 For arbitrary p ≥ 2, the generalization of (23) is ( 1 + 1/(pr) νp (r) = 1 + 1/(pr[1 − hr]p−1 ) 0<r< 1 p 1 p , (24) < r < 1. with h = h(r) implicitly determined by (17). In the marginal case of r = generalization of (22) is p(2p − 2)! 1 nk ≃ , 2 (p − 2)! k (ln k)2 and the maximal degree kmax in a network of N nodes is  pr  0 < r < 1p ,  N kmax ∼ N(ln N)−2 r = p1 ,   N pr[1−hr]p−1 1 < r < 1. p 1 , p the (25) (26) As in optimization and queuing theory, the possibility of choosing between more than two options leads only to quantitative changes compared to the more fundamental case of two options. Choice-Driven Phase Transition in Complex Networks 11 2.3. Networks With Loops Thus far, we studied the situation where every new node attaches to one already existing node, leading to tree networks. However, we can also treat networks with loops. Here we outline how to deal with the situation where loops are created when each new node attaches to m already existing nodes, with each attachment event created by the same choice-driven algorithm as in the previous section. Limiting ourselves to shifted linear attachment and focusing on greedy choice from two alternatives, the recursion for nk is given by (compare with Eq. (2)) nk = m 2 ψk−1 + ψk2 ψk−1 − ψk X ψ − m + δk,m . j (2m + λ)2 /2 (2m + λ)2 (27) j<k This recurrence can be analyzed using the same methods as in the case of trees. P P For instance when λ > 0, we replace j<k ψj by j≥m ψj = 2m + λ when k ≫ 1, and then employ the continuum approximation to recast (27) into the differential equation  λ nk . This equation again has an algebraic solution of the form (13), (knk )′ = − 1 + 2m with decay exponent ν2 = 2 + λ/(2m). A macrohub of degree hN again emerges when λ < 0, with h determined by the relation " 2 #  h , (28) h=m 1− 1− 2m + λ which generalizes (10). Thus λ(2m + λ) . (29) m Note that the range of the shift parameter is now λ > −m, since the minimal degree is m and we must ensure that the attachment to nodes of degree m is non-negative. The degree distribution associated with the remaining nodes still has an algebraic tail. To summarize, the decay exponent is given by ( 2 + λ/(2m) λ > 0, (30) ν2 = (4m + 3λ)/(2m + 2λ) 0 > λ > −m. h=− For the special case of strictly linear preferential attachment λ = 0, the tail of the degree distribution is ( 2m(m + 1) × k −3 no choice, nk ≃ (31) 4m × (k ln k)−2 binary choice. 3. Meek Choice The complementary situation of meek choice, where a set of target nodes is first selected and a new node attaches to a target with less than the largest degree leads to very different phenomenology. The simplest case is that of first selecting two nodes according Choice-Driven Phase Transition in Complex Networks 12 to linear preferential attachment and the new nodes attaches to the smaller-degree target; this specific example was also recently investigated in [25]. We determine the degree distribution in this meek choice model by following the same approach as in greedy choice. The analog of (2) for the degree distribution is X   2  ψj + 41 ψk−1 + ψk2 + δk,1 . (32) nk = 12 ψk−1 − ψk j≥k P P Using identity j≥k jnj = 2 − j<k jnj recasts (32) as a recurrence. In the case of strictly linear preferential attachment, λ = 0, the solutions for small degrees are: √ n1 = 4 − 2 3 ≈ 0.53589 , q √ √ 1 1 (33) n2 = − 2 + 3 − 2 25 − 12 3 ≈ 0.20548 , r q q √ √ √ n3 = − 91 + 13 25 − 12 3 − 29 79 − 6 25 − 12 3 − 36 3 ≈ 0.11099 , etc. Notice that while the first few nk are larger than those for greedy choice in Eqs. (3), the asymptotic degree distribution decays precipitously with k (Fig. 3). For example, in simulations of 50 realizations of networks grown to 108 nodes, the largest observed degree is only 9! We now exploit this rapid decay to determine the asymptotic behavior of the degree distribution. For large k, an increase in nk can occur only if the two target nodes have degree k − 1. Thus we posit that the dominant term in (32) is 14 (k − 1)2 n2k−1 . Keeping only this term, the asymptotic behavior of the logarithm of the degree distribution is given by ln nk ∼ −C × 2k , (34) up to some amplitude C that cannot be determined within this simplified analysis. One can then verify that the remaining terms in (32) are subdominant. From this asymptotic degree distribution, we estimate the maximal degree in a network of N nodes to be kmax ≃ log2 log2 N, as recently proven in Ref. [25]. When p distinct initial target nodes are selected by preferential attachment, there are p possibilities for the attachment event: to the highest-degree node, to the secondhighest degree node, all the way to the lowest-degree node. While the combinatorics become unwieldy for the general case of identifying the target node with the mth -largest degree out of p choices, the dominant contribution to nk for large k arises when m targets have degree k − 1 and the remaining p − m targets have degrees less than k − 1. Following the same reasoning as in the case of attaching to the smallest-degree node out of two choices, the dominant term in the generalization of (32) is proportional to k (k − 1)m nm k−1 . This leads to nk ∼ exp(−const. × m ). Thus for all but greedy choice, the degree distribution decays precipitously with degree. Choice-Driven Phase Transition in Complex Networks 13 From this asymptotic degree distribution, the maximal degree grows with N as   greedy choice N ωp     nd   log2 log2 N 2 highest degree kmax ∼ log3 log3 N 3rd highest degree (35)     ···     logp logp N smallest degree for p ≥ 2. The exponent ωp that appears in (35) depends on the number of alternatives p and on details of the attachment rate. For strictly linear preferential attachment, ωp = p(1 − h)/(2 − h), where the degree h of the macrohub is the positive solution of the equation h = 1 − (1 − h/2)p . The other ultra-slow growth laws in (35) are robust with respect to the details of the attachment rule. These latter behaviors do not depend on the details of the selection rule as long as the choice is less than greedy. 4. Summary Incorporating choice in preferential attachment network growth leads to rich phenomenology in which the effect of preferential attachment can be strongly amplified or entirely eliminated. We have explored a general class of models in which a set of target nodes in the network are first selected according to preferential attachment and then a new node joins the network by attaching to one of these target nodes according to a specified criterion. In greedy choice, attachment is made to the target with the largest degree. We also investigated attaching to a node in the target set whose degree is not the largest. For a target set of p nodes, there are p − 1 possible such choices—to the 2nd -largest degree node, the 3rd-largest, . . . , to the smallest-degree node. We term this class of models as meek choice. Past work on the power of choice on the random recursive tree [6] found that greedy choice broadens the degree distribution, but only in a quantitative way. We have shown that greedy choice plays a much more significant role for networks that grow by preferential attachment. We focused on shifted linear preferential attachment, but our methods apply to other models with asymptotically linear preferential attachment. The details depend on the model, but the general outcome is robust. In the sub-critical phase, the degree distribution has a power law tail that is considerably broader than in the case of no choice. In the super-critical phase, a macrohub emerges, while the remainder of the degree distribution is still algebraic. At the boundary between these two phases, the degree distribution decays as (k ln k)−2 . This form for the degree distribution is consistent with a finite average degree in the network because of the presence of the logarithmic factor. The influence of meek choice is perhaps even more dramatic, as it effectively counteracts preferential attachment. When p target nodes are initially selected, meek choice means that the new node attaches to a target whose degree is less than the highest Choice-Driven Phase Transition in Complex Networks 14 in the target set. For the case where a new node attaches to the mth -largest degree out of a target set of p nodes that are each selected by linear preferential attachment, meek choice leads to a double-exponential degree distribution of the form exp(−const. × ek ), and a maximal degree that is of the order of logm logm N. It is surprising that this sharp decay should hold for attachment to the target with the 2nd -highest degree out of p ≫ 1 targets. In this case, the degree distribution will initially resemble that of greedy choice and the crossover to a precipitous decay will occur at an extremely large degree value. This research was partially supported by the AFOSR and DARPA under grant #FA9550-12-1-0391 and by NSF grant No. DMR-1205797. Choice-Driven Phase Transition in Complex Networks 15 [1] N. D. Vvedenskaya, R. L. Dobrushin, and F. I. Karpelevich, Problems Inform. Transmission 32, 15 (1996). [2] Y. Azar, A. Z. Broder, A. R. Karlin, and E. Upfal, SIAM J. Comp. 29, 180 (1999). [3] M. Adler, S. Chakarabarti, M. Mitzenmacher, and L. Rasmussen, Rand. Struct. Alg. 13, 159 (1998). [4] M. Mitzenmacher and E. Upfal, Probability and Computing : Randomized Algorithms and Probabilistic Analysis (Cambridge University Press, New York, 2005). [5] M. J. Luczak and C. McDiarmid, Ann. Appl. Probab. 15, 1733 (2005); Ann. Probab. 34, 493 (2006). [6] R. M. D’Souza, P. L. Krapivsky, and C. Moore, Eur. Phys. J. B 59, 535 (2007). [7] T. Bohman and A. Frieze, Rand. Struct. Alg. 19, 75 (2001). [8] T. Bohman and D. Kravitz, Combin. Probab. Comput. 15, 489 (2006). [9] J. Spencer and N. Wormald, Combinatorica 27, 587 (2007). [10] D. Achlioptas, R. M. D’Souza, and J. Spencer, Science 323, 1453 (2009). [11] R. M. Ziff, Phys. Rev. Lett. 103, 045701 (2009); Phys. Rev. E 82, 051105 (2010). [12] E. J. Friedman and A. S. Landsberg, Phys. Rev. Lett. 103, 255701 (2009). [13] Y. S. Cho, J. S. Kim, J. Park, B. Kahng, and D. Kim, Phys. Rev. Lett. 103, 135702 (2009); Y. S. Cho, S.-W. Kim, J. D. Noh, B. Kahng, and D. Kim, Phys. Rev. E 82, 042102 (2010). [14] F. Radicchi and S. Fortunato, Phys. Rev. Lett. 103, 168701 (2009); F. Radicchi and S. Fortunato, Phys. Rev. E 81, 036110 (2010). [15] R. M. D’Souza and M. Mitzenmacher, Phys. Rev. Lett. 104, 195702 (2010). [16] R. A. da Costa, S. N. Dorogovtsev, A. V. Goltsev, and J. F. F. Mendes, Phys. Rev. Lett. 105, 255701 (2010). [17] O. Riordan and L. Warnke, Science 333, 322 (2011); Ann. Appl. Probab. 22, 1450 (2012). [18] P. Grassberger, C. Christensen, G. Bizhani, S.-W. Son, and M. Paczuski, Phys. Rev. Lett. 106, 225701 (2011). [19] P.-A. Noël, C. D. Brummitt, and R. M. D’Souza, Phys. Rev. Lett. 111, 078701 (2013). [20] For reviews, see R. Albert and A.-L. Barabási Rev. Mod. Phys. 74, 47 (2002); S. N. Dorogovtsev and J. F. F. Mendes, Evolution of Networks: From Biological Nets to the Internet and WWW (Oxford University Press, Oxford, UK, 2003); M. E. J. Newman, Networks: An Introduction (Oxford University Press, Oxford, UK, 2010). [21] P. L. Krapivsky and S. Redner, Phys. Rev. E 63, 066123 (2001); J. Phys. A 35, 9517 (2002). [22] P. L. Krapivsky, S. Redner, and E. Ben-Naim, A Kinetic View of Statistical Physics (Cambridge University Press, Cambridge, UK, 2010). [23] E. J. Gumbel, Statistics of Extremes (Columbia University Press, New York, 1958). [24] J. Kleinberg, R. Kumar, P. Raghavan, S. Rajagopalan, and A. Tomkins, in: Proc. International Conference on Combinatorics and Computing, Lecture Notes in Computer Science, Vol. 1627, pp. 1–18 (Springer-Verlag, Berlin, 1999). [25] Yu. Malyshkin and E. Paquette, arXiv:1311.1091.