Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Bounded budget betweenness centrality game for strategic network formations

Published: 01 December 2011 Publication History

Abstract

In computer networks and social networks, the betweenness centrality of a node measures the amount of information passing through the node when all pairs are conducting shortest path exchanges. In this paper, we introduce a strategic network formation game in which nodes build connections subject to a budget constraint in order to maximize their betweenness in the network. To reflect real world scenarios where short paths are more important in information exchange in the network, we generalize the betweenness definition to only count shortest paths with a length limit @? in betweenness calculation. We refer to this game as the bounded budget betweenness centrality game and denote it as @?- B^3C game, where @? is the path length constraint parameter. We present both complexity and constructive existence results about Nash equilibria of the game. For the nonuniform version of the game where node budgets, link costs, and pairwise communication weights may vary, we show that Nash equilibria may not exist and it is NP-hard to decide whether Nash equilibria exist in a game instance. For the uniform version of the game where link costs and pairwise communication weights are one and each node can build k links, we construct two families of Nash equilibria based on shift graphs, and study the properties of Nash equilibria. Moreover, we study the complexity of computing best responses and show that the task is polynomial for uniform 2- B^3C games and NP-hard for other games (i.e. uniform @?- B^3C games with @?>=3 and nonuniform @?- B^3C games with @?>=2).

References

[1]
Susanne Albers, Stefan Eilts, Eyal Even-Dar, Yishay Mansour, Liam Roditty, On nash equilibria for a network creation game, in: Proceedings of the 17th ACM-SIAM Symposium on Discrete Algorithms, 2006, pp. 89-98.
[2]
Burt, Ronald S., Structural Holes: The Social Structure of Competition. 1992. Harvard University Press.
[3]
Burt, Ronald S., Secondhand brokerage: evidence on the importance of local structure for managers, bankers, and analysts. The Academy of Management Journal. v50. 119-148.
[4]
Buskens, Vincent and van de Rijt, Arnout, Dynamics of networks if everyone strives for structural holes. American Journal of Sociology. v114 i2. 371-407.
[5]
Bram Cohen, Incentives build robustness in BitTorrent, 1st Workshop on Economics of Peer-to-Peer Systems, 2003.
[6]
Jacomo Corbo, David C. Parkes, The price of selfish behavior in bilateral network formation, in: Proceedings of the 24th ACM Symposium on Principles of Distributed Computing, 2005, pp. 99-107.
[7]
DARPA, DARPA network challenge project report, Tech. Report, Defense Advanced Research Projects Agency, February 2010.
[8]
de Bruijn, N.G., A combinatorial problem. Koninklijke Nederlandse Akademie v. Wetenschappen. v49. 758-764.
[9]
Dunbar, Robin I.M., Neocortex size as a constraint on group size in primates. Journal of Human Evolution. v22 i6. 469-493.
[10]
Alex Fabrikant, Ankur Luthra, Elitza Maneva, Christos H. Papadimitriou, Scott Shenker, On a network creation game, in: Proceedings of the 22nd ACM Symposium on Principles of Distributed Computing, 2003, pp. 347-351.
[11]
Floyd, Robert W., Algorithm 97 (SHORTEST PATH). Communications of the ACM. v5 i6. 345
[12]
Freeman, L., Centrality in social networks: conceptual clarification. Social Networks. v1. 215-239.
[13]
Goyal, Sanjeev and Vega-Redondo, Fernando, Structural holes in social networks. Journal of Economic Theory. v137 i1. 460-492.
[14]
Jackson, Matthew and Wolinsky, Asher, A strategic model of social and economic networks. Journal of Economic Theory. v71 i1. 44-74.
[15]
Jon Kleinberg, Siddharth Suri, Éva Tardos, Tom Wexler, Strategic newtwork formation with structural holes, in: Proceedings of the 9th ACM Conference on Electronic Commerce, 2008.
[16]
Nikolaos Laoutaris, Laura Poplawski, Rajmohan Rajaraman, Ravi Sundaram, Shang-Hua Teng, Bounded budget connection (bbc) games or how to make friends and influence people, on a budget, in: Proceedings of the 27th ACM Symposium on Principles of Distributed Computing, 2008.
[17]
Thomas Moscibroda, Stefan Schmid, Roger Wattenhofer, On the topologies formed by selfish peers, in: Proceedings of the 25th ACM Symposium on Principles of Distributed Computing, 2006, pp. 133-142.
[18]
Newman, M.E.J. and Park, J., Why social networks are different from other types of networks. Physical Review E. v68. 036122
[19]
Christos H. Papadimitriou, Algorithms, games, and the internet, in: Proceedings of the 33rd ACM Symposium on Theory of Computing, 2001, Invited talk, pp. 749-753.
[20]
Galen Pickard, Iyad Rahwan, Wei Pan, Manuel Cebrién, Riley Crane, Anmol Madan, Alex Pentland, Time critical social mobilization: the DARPA network challenge winning strategy, Tech. Report arXiv:1008.3172, Computing Research Repository, August 2010.
[21]
Scott, John, Social Network Analysis. 1991. Sage.
[22]
Daniel Stutzbach, Subhabrata Sen, Characterizing unstructured overlay topologies in modern p2p file-sharing systems, ACM/USENIX Internet Measurement Conference, 2005.

Cited By

View all
  • (2021)Sink Group Betweenness CentralityProceedings of the 25th International Database Engineering & Applications Symposium10.1145/3472163.3472182(21-26)Online publication date: 14-Jul-2021
  • (2020)Route Hijacking and DoS in Off-Chain NetworksProceedings of the 2nd ACM Conference on Advances in Financial Technologies10.1145/3419614.3423253(228-240)Online publication date: 21-Oct-2020
  • (2020)Ride the Lightning: The Game Theory of Payment ChannelsFinancial Cryptography and Data Security10.1007/978-3-030-51280-4_15(264-283)Online publication date: 10-Feb-2020
  • Show More Cited By
  1. Bounded budget betweenness centrality game for strategic network formations

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Theoretical Computer Science
      Theoretical Computer Science  Volume 412, Issue 52
      December, 2011
      90 pages

      Publisher

      Elsevier Science Publishers Ltd.

      United Kingdom

      Publication History

      Published: 01 December 2011

      Author Tags

      1. Algorithmic game theory
      2. Nash equilibrium
      3. Network formation game

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 10 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2021)Sink Group Betweenness CentralityProceedings of the 25th International Database Engineering & Applications Symposium10.1145/3472163.3472182(21-26)Online publication date: 14-Jul-2021
      • (2020)Route Hijacking and DoS in Off-Chain NetworksProceedings of the 2nd ACM Conference on Advances in Financial Technologies10.1145/3419614.3423253(228-240)Online publication date: 21-Oct-2020
      • (2020)Ride the Lightning: The Game Theory of Payment ChannelsFinancial Cryptography and Data Security10.1007/978-3-030-51280-4_15(264-283)Online publication date: 10-Feb-2020
      • (2016)An Analysis of Centrality Measures for Complex and Social Networks2016 IEEE Global Communications Conference (GLOBECOM)10.1109/GLOCOM.2016.7841580(1-6)Online publication date: 4-Dec-2016
      • (2015)A Bounded Budget Network Creation GameACM Transactions on Algorithms10.1145/270161511:4(1-25)Online publication date: 13-Apr-2015
      • (2015)Self-organizing flows in social networksTheoretical Computer Science10.1016/j.tcs.2015.02.018584:C(3-18)Online publication date: 13-Jun-2015
      • (2015)Friend of My FriendTheory of Computing Systems10.1007/s00224-014-9582-457:3(711-752)Online publication date: 1-Oct-2015

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media