skip to main content
research-article

Generating constrained random graphs using multiple edge switches

Authors Info & Claims
Published:28 December 2011Publication History
Skip Abstract Section

Abstract

The generation of random graphs using edge swaps provides a reliable method to draw uniformly random samples of sets of graphs respecting some simple constraints (e.g., degree distributions). However, in general, it is not necessarily possible to access all graphs obeying some given constraints through a classical switching procedure calling on pairs of edges. Therefore, we propose to get around this issue by generalizing this classical approach through the use of higher-order edge switches. This method, which we denote by “k-edge switching,” makes it possible to progressively improve the covered portion of a set of constrained graphs, thereby providing an increasing, asymptotically certain confidence on the statistical representativeness of the obtained sample.

References

  1. Albert, R., Jeong, H., and Barabasi, A.-L. 1999. Diameter of the world wide web. Nature 401, 130--131.Google ScholarGoogle Scholar
  2. Artzy-Randrup, Y. and Stone, L. 2005. Generating uniformly distributed random networks. Phys. Rev. E 72, 5, 056708.Google ScholarGoogle ScholarCross RefCross Ref
  3. Bansal, S., Khandelwal, S., and Meyers, L. 2008. Evolving Clustered Random Networks. Arxiv preprint cs.DM/0808.0509.Google ScholarGoogle Scholar
  4. Bender, E. and Canfield, E. 1978. The asymptotic number of labeled graphs with given degree sequences. J. Combin. Theory Ser. A 24, 3, 296--307.Google ScholarGoogle ScholarCross RefCross Ref
  5. Colbourn, C. 1977. Graph Generation. University of Waterloo, Waterloo, Ontario.Google ScholarGoogle Scholar
  6. Coolen, A., De Martino, A., and Annibale, A. 2009. Constrained Markovian dynamics of random graphs. J. Stat. Phys. 136, 6, 1035--1067.Google ScholarGoogle ScholarCross RefCross Ref
  7. Cooper, C., Dyer, M., and Greenhill, C. 2006. Sampling regular graphs and a peer-to-peer network. Comb. Probab. Comput. 16, 04, 557--593. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Eggleton, R. 1973. Graphic sequences and graphic polynomials: A report. In Infinite and Finite Sets 1, 385--392.Google ScholarGoogle Scholar
  9. Feder, T., Guetz, A., Mihail, M., and Saberi, A. 2006. A local switch Markov chain on given degree graphs with application in connectivity of peer-to-peer networks. In Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06). IEEE, Los Alamitos, CA, 69--76. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Gkantsidis, C., Mihail, M., and Zegura, E. 2003. The markov chain simulation method for generating connected power law random graphs. In Proceedings of the 5th Workshop on Algorithm Engineering and Experiments (ALENEX). SIAM, Philadelphia.Google ScholarGoogle Scholar
  11. Guillaume, J., Latapy, M., and Le-Blond, S. 2005. Statistical analysis of a P2P query graph based on degrees and their time-evolution. In Proceedings of the 6th International Workshop on Distributed Computing (IWDC'04). Springer, Berlin, 439--465. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Guruswami, V. 2000. Rapidly mixing markov chains: A comparison of techniques. MIT Laboratory for Computer Science. cs.washington.edu/homes/venkat/pubs/papers.html.Google ScholarGoogle Scholar
  13. Kannan, R., Tetali, P., and Vempala, S. 1997. Simple Markov-chain algorithms for generating bipartite graphs and tournaments. In Proceedings of the 8th Annual ACM-SIAM Symposium on Discrete algorithms. SIAM, Philadelphia, 193--200. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Mahadevan, P., Krioukov, D., Fall, K., and Vahdat, A. 2006. Systematic topology analysis and generation using degree correlations. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM'06). ACM, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Miklós, I. and Podani, J. 2004. Randomization of presence-absence matrices: comments and new algorithms. Ecology Archives 85, 1, 86--92. Appendix A. http://esapubs.org/archive/ecol/E085/001/appendix-A.htm.Google ScholarGoogle ScholarCross RefCross Ref
  16. Milo, R., Kashtan, N., Itzkovitz, S., Newman, M., and Alon, U. 2003. On the uniform generation of random graphs with prescribed degree sequences. Arxiv preprint cond-mat/0312.028.Google ScholarGoogle Scholar
  17. Newman, M. 2004. Coauthorship networks and patterns of scientific collaboration. In Proc. Nat. Acad. Sciences 101, Suppl 1, 5200.Google ScholarGoogle Scholar
  18. Ralaivola, L., Swamidass, S., Saigo, H., and Baldi, P. 2005. Graph kernels for chemical informatics. Neural Netw. 18, 8, 1093--1110. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Rao, A., Jana, R., and Bandyopadhyay, S. 1996. A Markov chain Monte Carlo method for generating random (0, 1)-matrices with given marginals. Sankhy&abar; Indian J. Statistics, Series A, 225--242.Google ScholarGoogle Scholar
  20. Roberts, J. 2000. Simple methods for simulating sociomatrices with given marginal totals. Social Netw. 22, 3, 273--283.Google ScholarGoogle ScholarCross RefCross Ref
  21. Sinclair, A. 1993. Algorithms for Random Generation and Counting: A Markov Chain Approach. Springer, Berlin. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Stauffer, A. and Barbosa, V. 2005. A study of the edge-switching Markov-chain method for the generation of random graphs. Arxiv preprint cs.DM/0512.105.Google ScholarGoogle Scholar
  23. Taylor, R. 1980. Constrained switchings in graphs. Comb. Math. 8, 314--336.Google ScholarGoogle Scholar
  24. Taylor, R. 1982. Switchings constrained to 2-connectivity in simple graphs. SIAM J. Algebraic Discrete Meth. 3, 114.Google ScholarGoogle ScholarCross RefCross Ref
  25. Viger, F. and Latapy, M. 2005. Efficient and simple generation of random simple connected graphs with prescribed degree sequence. In Proceedings of the 11th International Computing and Combinatorics Conference. Springer-Verlag, Berlin, 440. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Generating constrained random graphs using multiple edge switches

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Journal of Experimental Algorithmics
          ACM Journal of Experimental Algorithmics  Volume 16, Issue
          2011
          411 pages
          ISSN:1084-6654
          EISSN:1084-6654
          DOI:10.1145/1963190
          Issue’s Table of Contents

          Copyright © 2011 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 28 December 2011
          • Accepted: 1 September 2011
          • Received: 1 May 2011
          Published in jea Volume 16, Issue

          Qualifiers

          • research-article
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader