Skip to main content

Literacy: When Is a Network Model Explanatory?

  • Chapter
  • First Online:
Network Analysis Literacy

Part of the book series: Lecture Notes in Social Networks ((LNSN))

Abstract

Network analysis relies strongly on network models for several reasons: they show that a certain structure can be generated by a set of simple rules, they predict certain behaviors and functions, and they can be used as null-models. In this chapter, the question discussed is whether the classic network models are likely to be explanatory network models for complex systems like metabolic networks, the internet , or collaboration networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    To follow common usage of terms, the term ‘random graph model’ will be used for random graph families used as a null-model, i.e., where it is expected that a real-world network deviates from randomness. The term ‘network model’ will be used for random graph families used as a model for the generation of a complex network in a complex system.

  2. 2.

    Note that many papers citing Watts and Strogatz’ paper actually treated the small-world model as an explanatory one, but the authors do not seem to have had this in mind when they proposed it.

  3. 3.

    The original statement is often put in a more general setting by referring to “hypotheses” instead of “models”. The statement itself has been made by many authors in various different forms and may never have been stated in any of these forms by Ockham himself. As he applied it in his scientific research, it is today best known as “Ockham’s razor”.

  4. 4.

    See a short video interview with Dyson on this story here: http://www.webofstories.com/play/freeman.dyson/94.

  5. 5.

    While this statement by von Neumann was just a pun with some serious background, in 2010 Mayer et al. have indeed managed to draw an elephant-like shape with complex equations using four parameters and a different but still recognizable elephant-like model based on five parameters, who wiggles its trunk [33].

  6. 6.

    He also calls them network flows or network flow processes.

  7. 7.

    With respect to Weisberg’s classification, the equations of classical mechanics are still useful as a model of the real-world but with a smaller intended scope and new fidelity criteria, that guarantee their usage only in appropriate situations.

  8. 8.

    I think it is folklore that anyone ever really assumed that real-world networks are random, i.e., whether anyone used random graph models as an explanatory model for a real-world phenomenon. E. Fox Keller cites Barabási and Bonabeau with the sentence: “science treated all complex networks as being completely random” [20, as cited by]. This citation stems from an article in Scientific American and is clearly an exaggeration that emphasizes that nobody saw the need to create more elaborate graph models than the random graph model. However, I am not aware of any serious, scientific application of a random graph model as an explanatory model of a real-world complex network and a quote like “For decades, we tacitly assumed that the components of such complex systems as the cell, the society, or the Internet are randomly wired together.” [2, p. 412] has to be clearly rejected.

  9. 9.

    For the computer scientists among the readers: the question is to find the minimum edge cover in an online fashion.

  10. 10.

    It is clear that in essence, all pairs of proteins have to be tested to be sure that all edges have been explored. The question is thus how far one can get with as few baits as possible.

  11. 11.

    It is unclear how pairs of unconnected nodes were treated.

  12. 12.

    Note again that for networks with such small ranges of the degree such as this one, it is not really possible to analyze which of the many right-skewed distributions fits best.

  13. 13.

    The authors thus do not quantify the possibly increased number of hops necessary to transfer a message but only the question of whether the message can still be delivered.

  14. 14.

    Already in 2002, Barabási et al. showed on the example of a dynamic scientific collaboration data set that the average degree can increase over time [5].

  15. 15.

    While this model ‘heals’ the problem and produces more realistic network structures, it needs again to be checked whether this model is explanatory for any given system of interest.

  16. 16.

    See the discussion of whether this data set really captures the evolution of the Internet well in Sect. 10.6.1.

  17. 17.

    Note that statistical tests might not agree with this.

  18. 18.

    Krapivsky et al. state that it is actually difficult to tell the two distributions apart; for that case as for finite networks the difference is small. Still, a linear preferential attachment mechanism can, in general, be more easily explained and that is why any deviation from it raises curiosity and induces new hypotheses.

  19. 19.

    As explained in the paper by Chen et al., the data on which the analysis of both, Jeong et al. [19] and Chen et al. [8], is based, is incomplete. For more information on this, see Sects. 10.3. Another problem is that due to the noisy nature of the data, it needs some care to determine whether a new AS came into the network or whether this AS was just not contained in the last measurement due to outages or other problems. The authors thus defined an AS to be new if it was not contained in any of the preceding data sets.

  20. 20.

    The assumptions are explained by Simon on the example of the word frequency distribution. The first assumption is that a word is taken with a probability linear to the total occurrence of all words with the same frequency sofar (“linear preferential attachment”), the second assumption is the existence of a constant probability for taking a totally new word, and the third makes an assumption on the rate with which words are dropped.

  21. 21.

    Some also changed it to: “no one should be without a beer because they cannot afford one...”.

  22. 22.

    For hard problems like the graph coloring problem there is often a set of so-called benchmark problems on which new solving strategies can be tested. Mainly, these are especially difficult instances of the problem.

References

  1. Adamic LA, Lento TM, Adar E, Ng PC (2014) Information evolution in social networks. Technical report, Facebook, uploaded to arXiv as arXiv:1402.6792v1

  2. Barabási A-L (2009) Scale-free networks: a decade and beyond. Science 325:412–413

    Article  MathSciNet  MATH  Google Scholar 

  3. Barabási A-L (2012) Luck or reason. Nature 489:507–508

    Article  Google Scholar 

  4. Barabási A-L, Albert R (1999) Emergence of scaling in random networks. Science 286(5439):509–512

    Article  MathSciNet  MATH  Google Scholar 

  5. Barabási A-L, Jeong H, Ravasz E, Schubert A, Vicsek T (2002) Evolution of the social network of scientific collaborations. Phys A 311:590–614

    Google Scholar 

  6. Bianconi G, Barabási A-L (2001) Competition and multiscaling in evolving networks. Europhys Lett 54(4):436–442

    Article  Google Scholar 

  7. Borgatti SP (2005) Centrality and network flow. Soc Netw 27:55–71

    Article  Google Scholar 

  8. Chen Q, Chang H, Govindan R, Jamin S, Shenker SJ, Willinger W (2002) The origin of power laws in internet topologies revisited. In: Twenty-first annual joint conference of the IEEE computer and communications societies (INFOCOM 2002), vol 2, pp 608–617

    Google Scholar 

  9. Clauset A, Shalizi CR, Newman MEJ (2009) Power-law distributions in empirical data. SIAM Rev Mod Phys 51(4):661–703

    Google Scholar 

  10. de Silva E, Stumpf MPH (2005) Complex networks and simple models in biology. J R Soc Interface 2:419–430

    Google Scholar 

  11. Dodds PS, Watts DJ, Newman MEJ (2002) Identity and search in social networks. Science 296:1302–1305

    Google Scholar 

  12. Dorn I, Lindenblatt A, Zweig KA (2012) The trilemma of network analysis. In: Proceedings of the 2012 IEEE/ACM international conference on Advances in social network analysis and mining, Istanbul

    Google Scholar 

  13. Doyle JC, Alderson DL, Li L, Low S, Roughan M, Shalunov S, Tanaka R, Willinger W (2005) The “robust yet fragile” nature of the Internet. Proc Natl Acad Sci 102(41):14497–14502

    Article  Google Scholar 

  14. Dyson F (2004) Turning points A meeting with Enrico Fermi. Nature 427:297

    Article  Google Scholar 

  15. Ferrer i Cancho R, Solé RV (2001) The small world of human language. Proc R Soc Lond B 268:2261–2265

    Google Scholar 

  16. Friedkin NE (1983) Horizons of observability and limits of informal control in organizations. Soc Forces 62:54–77

    Article  Google Scholar 

  17. Hormozdiari F, Berenbrink P, Przulj N, Cenk Sahinalp S (2007) Not all scale-free networks are born equal: the role of the seed graph in PPI network evolution. Plos Comput Biol 3(7):e118

    Google Scholar 

  18. Jeong H, Mason SP, Barabási A-L, ZN Oltvai (2001) Lethality and centrality in protein networks. Nature 411:41–42

    Google Scholar 

  19. Jeong H, Neda Z, Barabási A-L (2003) Measuring preferential attachment for evolving networks. Europhys Lett 61(4):567–572

    Article  Google Scholar 

  20. Keller EF (2005) Revisiting “scale-free” networks. BioEssays 27:1060–1068

    Google Scholar 

  21. Khanin R, Wit E (2006) How scale-free are biological networks. J Comput Biol 13(3):810–818

    Article  MathSciNet  Google Scholar 

  22. Kleinberg J (2000) Navigation in a small world. Nature 406:845

    Article  Google Scholar 

  23. Kleinberg J (2000) The small-world phenomenon: an algorithmic perspective. In: Proceedings of the 32nd ACM symposium on theory of computing, pp 163–170

    Google Scholar 

  24. Kleinberg J (2001) Small–world phenomena and the dynamics of information. In: Proceedings of the 13th advances in neural information processing systems

    Google Scholar 

  25. Krapivsky PL, Redner S, Leyvraz F (2000) Connectivity of growing random networks. Phys Rev Lett 85:4629–4632

    Article  Google Scholar 

  26. Krishnamurty B, Willinger W, Gill P, Arlitt M (2011) A Socratic method for validation of measurement-based network research. Comput Commun 34(1):43–53

    Article  Google Scholar 

  27. Lappe M, Holm L (2004) Unravelling protein interaction networks with near-optimal efficiency. Nat Biotechnol 22:98–103

    Article  Google Scholar 

  28. Lehmann KA, Post HD, Kaufmann M (2006) Hybrid graphs as a framework for the small-world effect. Phys Rev E 73:056108

    Article  Google Scholar 

  29. Leskovec J, Kleinberg J, Faloutsos C (2005) Graphs over time: densification laws, shrinking diameters, and possible explanations. In: Proceedings of the 11th ACM SIGKDD

    Google Scholar 

  30. Leskovec J, Kleinberg J, Faloutsos C (2007) Graph evolution: densification and shrinking diameters. ACM Trans Knowl Discovery Data (TKDD) 1(1):No 2

    Google Scholar 

  31. Li L, Alderson D, Doyle JC, Willinger W (2006) Towards a theory of scale-free graphs: definition, properties, and implications. Internet Math 2(4):431–523

    Article  MathSciNet  MATH  Google Scholar 

  32. Lima-Mendez G, van Helden J (2009) The powerful law of the power law and other myths in network biology. Mol BioSyst 5:1482–1493

    Article  Google Scholar 

  33. Mayer J, Khairy K, Howard J (2010) Drawing an elephant with four complex parameters. Am J Phys 78(6):648–649

    Article  Google Scholar 

  34. Newman MEJ, Watts DJ (1999) Renormalization group analysis of the small-world network model. Phys Lett A 263:341–346

    Google Scholar 

  35. Simon HA (1955) On a class of skew distribution functions. Biometrika 42(3–4):425–440

    Article  MathSciNet  MATH  Google Scholar 

  36. Solé RV, Pastor-Satorras R, Smith E, Kepler TB (2002) A model of large-scale proteome evolution. Adv Complex Syst 5:43–54

    Article  MATH  Google Scholar 

  37. Stumpf MPH, Ingram PJ, Nouvel I, Wiuf C (2005) Transactions on computational system biology III. Statistical model selection methods applied to biological networks. LNBI, vol 3737. Springer, Berlin, pp 65–77

    Google Scholar 

  38. Sudarshan Iyengar SR, Veni Madhavan CE, Zweig KA, Natarajan A (2012) Understanding human navigation using network analysis. TopiCS—Topics Cogn Sci 4(1):121–134

    Google Scholar 

  39. Tanaka R (2005) Scale-rich metabolic networks. Phys Rev Lett 94:168101

    Article  Google Scholar 

  40. Vázquez A, Flammini A, Maritan A, Vespignani A (2002) Modeling of protein interaction networks. ComPlexUs 1:38–44

    Article  Google Scholar 

  41. Walsh T (1999) Search in a small world. In: Proceedings of the sixteenth international joint conference on artificial intelligence, IJCAI 99, pp 1172–1177

    Google Scholar 

  42. Watts DJ (2010) Everything is obvious—once you know the answer. Crown Publishing Group, New York

    Google Scholar 

  43. Watts DJ, Strogatz SH (1998) Collective dynamics of ‘small-world’ networks. Nature 393:440–442

    Article  Google Scholar 

  44. Weisberg M (2013) Simulation and similarity: using models to understand the world. Oxford University Press

    Google Scholar 

  45. Zweig KA (2015) Towards a theoretical framework for analyzing complex linguistic networks. Are word-adjacency networks networks? Springer, Heidelberg

    Google Scholar 

  46. Zweig KA, Zimmermann K (2008) Wanderer between the worlds—self-organized network stability in attack and random failure scenarios. In: Proceedings of the 2nd IEEE SASO

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Katharina A. Zweig .

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer-Verlag GmbH Austria

About this chapter

Cite this chapter

Zweig, K.A. (2016). Literacy: When Is a Network Model Explanatory?. In: Network Analysis Literacy. Lecture Notes in Social Networks. Springer, Vienna. https://doi.org/10.1007/978-3-7091-0741-6_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-7091-0741-6_12

  • Published:

  • Publisher Name: Springer, Vienna

  • Print ISBN: 978-3-7091-0740-9

  • Online ISBN: 978-3-7091-0741-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics