-
Blockchain in a box: A portable blockchain network implementation on Raspberry Pi's
Authors:
Matija Piškorec,
Anton Ivaskevich,
Said Haji Abukar,
Lundrim Azemi,
Md Rezuanul Haque,
Mostafa Chegenizadeh,
Claudio J. Tessone
Abstract:
In this paper we describe a prototype of a blockchain-in-a-box system which allows users to easily bootstrap the whole Ethereum Proof-of-Work (PoW) network running on multiple Raspberry Pi nodes - an inexpensive modular computers. Users are able to orchestrate the whole blockchain network using a single web based interface, for example they are able to set the topology of the peer-to-peer (P2P) co…
▽ More
In this paper we describe a prototype of a blockchain-in-a-box system which allows users to easily bootstrap the whole Ethereum Proof-of-Work (PoW) network running on multiple Raspberry Pi nodes - an inexpensive modular computers. Users are able to orchestrate the whole blockchain network using a single web based interface, for example they are able to set the topology of the peer-to-peer (P2P) connections and control the initialization parameters. Each Raspberry Pi has a screen attached which visualizes current state of local blockchain, allowing users to easily visualize the consensus of the network in real time. We show how this platform can be used to perform experiments on consensus quality while using different P2P topologies. Similar experiments can be used for demonstration purposes in a workshop or other educational settings.
△ Less
Submitted 22 April, 2024;
originally announced April 2024.
-
ChainScience 2024, Conference Proceedings
Authors:
Nicolò Vallarano,
Claudio J. Tessone
Abstract:
ChainScience 2024, the second edition of the interdisciplinary conference, brought together academics, practitioners, and industry experts to explore novel developments in the realm of distributed ledger technologies. The conference aimed to bridge diverse fields such as informatics, business, economics, finance, regulation, law, mathematics, physics, and complexity science. The papers presented i…
▽ More
ChainScience 2024, the second edition of the interdisciplinary conference, brought together academics, practitioners, and industry experts to explore novel developments in the realm of distributed ledger technologies. The conference aimed to bridge diverse fields such as informatics, business, economics, finance, regulation, law, mathematics, physics, and complexity science. The papers presented in these conference proceedings address emerging topics such as AI/ML applications to blockchain, DLTs interoperability, decentralized financial services, and tokenomics, alongside ethical, societal, and governance aspects of blockchain and DLTs.
With a focus on promoting high-quality research and interdisciplinary collaboration, ChainScience24 aimed to unlock the collective potential of its diverse participants, embodying the ethos that the whole is greater than the sum of its parts.
△ Less
Submitted 16 April, 2024; v1 submitted 15 April, 2024;
originally announced April 2024.
-
Analyzing Reward Dynamics and Decentralization in Ethereum 2.0: An Advanced Data Engineering Workflow and Comprehensive Datasets for Proof-of-Stake Incentives
Authors:
Tao Yan,
Shengnan Li,
Benjamin Kraner,
Luyao Zhang,
Claudio J. Tessone
Abstract:
Ethereum 2.0, as the preeminent smart contract blockchain platform, guarantees the precise execution of applications without third-party intervention. At its core, this system leverages the Proof-of-Stake (PoS) consensus mechanism, which utilizes a stochastic process to select validators for block proposal and validation, consequently rewarding them for their contributions. However, the implementa…
▽ More
Ethereum 2.0, as the preeminent smart contract blockchain platform, guarantees the precise execution of applications without third-party intervention. At its core, this system leverages the Proof-of-Stake (PoS) consensus mechanism, which utilizes a stochastic process to select validators for block proposal and validation, consequently rewarding them for their contributions. However, the implementation of blockchain technology often diverges from its central tenet of decentralized consensus, presenting significant analytical challenges. Our study collects consensus reward data from the Ethereum Beacon chain and conducts a comprehensive analysis of reward distribution and evolution, categorizing them into attestation, proposer and sync committee rewards. To evaluate the degree of decentralization in PoS Ethereum, we apply several inequality indices, including the Shannon entropy, the Gini Index, the Nakamoto Coefficient, and the Herfindahl-Hirschman Index (HHI). Our comprehensive dataset is publicly available on Harvard Dataverse, and our analytical methodologies are accessible via GitHub, promoting open-access research. Additionally, we provide insights on utilizing our data for future investigations focused on assessing, augmenting, and refining the decentralization, security, and efficiency of blockchain systems.
△ Less
Submitted 16 February, 2024;
originally announced February 2024.
-
Heterogeneity- and homophily-induced vulnerability of a P2P network formation model: the IOTA auto-peering protocol
Authors:
Yu Gao,
Carlo Campajola,
Nicolo Vallarano,
Andreia Sofia Teixeira,
Claudio J. Tessone
Abstract:
IOTA is a distributed ledger technology that relies on a peer-to-peer (P2P) network for communications. Recently an auto-peering algorithm was proposed to build connections among IOTA peers according to their "Mana" endowment, which is an IOTA internal reputation system. This paper's goal is to detect potential vulnerabilities and evaluate the resilience of the P2P network generated using IOTA aut…
▽ More
IOTA is a distributed ledger technology that relies on a peer-to-peer (P2P) network for communications. Recently an auto-peering algorithm was proposed to build connections among IOTA peers according to their "Mana" endowment, which is an IOTA internal reputation system. This paper's goal is to detect potential vulnerabilities and evaluate the resilience of the P2P network generated using IOTA auto-peering algorithm against eclipse attacks. In order to do so, we interpret IOTA's auto-peering algorithm as a random network formation model and employ different network metrics to identify cost-efficient partitions of the network. As a result, we present a potential strategy that an attacker can use to eclipse a significant part of the network, providing estimates of costs and potential damage caused by the attack. On the side, we provide an analysis of the properties of IOTA auto-peering network ensemble, as an interesting class of homophile random networks in between 1D lattices and regular Poisson graphs.
△ Less
Submitted 23 January, 2024;
originally announced January 2024.
-
Centralised or Decentralised? Data Analysis of Transaction Network of Hedera Hashgraph
Authors:
Lucas Amherd,
Sheng-Nan Li,
Claudio J. Tessone
Abstract:
An important virtue of distributed ledger technologies is their acclaimed higher level of decentralisation compared to traditional financial systems. Empirical literature, however, suggests that many systems tend towards centralisation as well. This study expands the current literature by offering a first-time, data-driven analysis of the degree of decentralisation of the platform Hedera Hashgraph…
▽ More
An important virtue of distributed ledger technologies is their acclaimed higher level of decentralisation compared to traditional financial systems. Empirical literature, however, suggests that many systems tend towards centralisation as well. This study expands the current literature by offering a first-time, data-driven analysis of the degree of decentralisation of the platform Hedera Hashgraph, a public permissioned distributed ledger technology, employing data directly fetched from a network node. The results show a considerably higher amount of released supply compared to the release schedule and a growing number of daily active accounts. Also, Hedera Hashgraph exhibits a high centralisation of wealth and a shrinking core that acts as an intermediary in transactions for the rest of the network. However, the Nakamoto index and Theil index point to recent progress towards a more decentralised network.
△ Less
Submitted 12 November, 2023;
originally announced November 2023.
-
Exploring the Bitcoin Mesoscale
Authors:
Nicolò Vallarano,
Tiziano Squartini,
Claudio J. Tessone
Abstract:
The open availability of the entire history of the Bitcoin transactions opens up the possibility to study this system at an unprecedented level of detail. This contribution is devoted to the analysis of the mesoscale structural properties of the Bitcoin User Network (BUN), across its entire history (i.e. from 2009 to 2017). What emerges from our analysis is that the BUN is characterized by a core-…
▽ More
The open availability of the entire history of the Bitcoin transactions opens up the possibility to study this system at an unprecedented level of detail. This contribution is devoted to the analysis of the mesoscale structural properties of the Bitcoin User Network (BUN), across its entire history (i.e. from 2009 to 2017). What emerges from our analysis is that the BUN is characterized by a core-periphery structure a deeper analysis of which reveals a certain degree of bow-tieness (i.e. the presence of a Strongly-Connected Component, an IN- and an OUT-component together with some tendrils attached to the IN-component). Interestingly, the evolution of the BUN structural organization experiences fluctuations that seem to be correlated with the presence of bubbles, i.e. periods of price surge and decline observed throughout the entire Bitcoin history: our results, thus, further confirm the interplay between structural quantities and price movements observed in previous analyses.
△ Less
Submitted 13 July, 2023;
originally announced July 2023.
-
Time Moves Faster When There is Nothing You Anticipate: The Role of Time in MEV Rewards
Authors:
Burak Öz,
Benjamin Kraner,
Nicolò Vallarano,
Bingle Stegmann Kruger,
Florian Matthes,
Claudio Juan Tessone
Abstract:
This study explores the intricacies of waiting games, a novel dynamic that emerged with Ethereum's transition to a Proof-of-Stake (PoS)-based block proposer selection protocol. Within this PoS framework, validators acquire a distinct monopoly position during their assigned slots, given that block proposal rights are set deterministically, contrasting with Proof-of-Work (PoW) protocols. Consequentl…
▽ More
This study explores the intricacies of waiting games, a novel dynamic that emerged with Ethereum's transition to a Proof-of-Stake (PoS)-based block proposer selection protocol. Within this PoS framework, validators acquire a distinct monopoly position during their assigned slots, given that block proposal rights are set deterministically, contrasting with Proof-of-Work (PoW) protocols. Consequently, validators have the power to delay block proposals, stepping outside the honest validator specs, optimizing potential returns through MEV payments. Nonetheless, this strategic behaviour introduces the risk of orphaning if attestors fail to observe and vote on the block timely. Our quantitative analysis of this waiting phenomenon and its associated risks reveals an opportunity for enhanced MEV extraction, exceeding standard protocol rewards, and providing sufficient incentives for validators to play the game. Notably, our findings indicate that delayed proposals do not always result in orphaning and orphaned blocks are not consistently proposed later than non-orphaned ones. To further examine consensus stability under varying network conditions, we adopt an agent-based simulation model tailored for PoS-Ethereum, illustrating that consensus disruption will not be observed unless significant delay strategies are adopted. Ultimately, this research offers valuable insights into the advent of waiting games on Ethereum, providing a comprehensive understanding of trade-offs and potential profits for validators within the blockchain ecosystem.
△ Less
Submitted 11 July, 2023;
originally announced July 2023.
-
ChainScience 2023, Conference Proceedings
Authors:
Hans Walter Behrens,
Nicolò Vallarano,
Claudio J. Tessone
Abstract:
The proceedings of ChainScience 2023 epitomize the integration of various scientific disciplines with the dynamic world of blockchain and AI. This collection, encapsulating both full and short papers, as well as posters, delves into areas such as cryptoeconomics, machine learning, and analysis of blockchain networks, under the guiding principle of this year's conference: 'Applying insights and met…
▽ More
The proceedings of ChainScience 2023 epitomize the integration of various scientific disciplines with the dynamic world of blockchain and AI. This collection, encapsulating both full and short papers, as well as posters, delves into areas such as cryptoeconomics, machine learning, and analysis of blockchain networks, under the guiding principle of this year's conference: 'Applying insights and methods from the physical, mathematical, behavioral, and computational sciences to blockchain and the future of AI'. This diverse compilation offers a critical examination of theoretical constructs and innovative practical applications to empower the future of the blockchain industry.
△ Less
Submitted 11 July, 2023; v1 submitted 6 July, 2023;
originally announced July 2023.
-
Agent-Based Modelling of Ethereum Consensus
Authors:
Benjamin Kraner,
Nicolò Vallarano,
Claudio J. Tessone,
Caspar Schwarz-Schilling
Abstract:
This paper presents a study of the Poof-of-Stake (PoW) Ethereum consensus protocol, following the recent switch from Proof-of-Work (PoS) to Proof-of-Stake within Merge upgrade. The new protocol has resulted in reduced energy consumption and a shift in economic incentives, but it has also introduced new threat sources such as chain reorganizations and balancing attacks. Using a simple and flexible…
▽ More
This paper presents a study of the Poof-of-Stake (PoW) Ethereum consensus protocol, following the recent switch from Proof-of-Work (PoS) to Proof-of-Stake within Merge upgrade. The new protocol has resulted in reduced energy consumption and a shift in economic incentives, but it has also introduced new threat sources such as chain reorganizations and balancing attacks. Using a simple and flexible agent-based model, this study employs a time-continuous simulation algorithm to analyze the evolution of the blocktree and assess the impact of initial conditions on consensus quality. The model simulates validator node behavior and the information propagation throughout the peer-to-peer network of validators to analyze the resulting blockchain structure. Key variables in the model include the topology of the peer-to-peer network and average block and attestation latencies. Metrics to evaluate consensus quality are established, and means to observe the model's responsiveness to changes in parameters are provided. The simulations reveal a phase transition in which the system switches from a consensus state to a non-consensus state, with a theoretical justification presented for this observation.
△ Less
Submitted 23 May, 2023;
originally announced May 2023.
-
Twisted by the Pools: Detection of Selfish Anomalies in Proof-of-Work Mining
Authors:
Sheng-Nan Li,
Carlo Campajola,
Claudio J. Tessone
Abstract:
The core of many cryptocurrencies is the decentralised validation network operating on proof-of-work technology. In these systems, validation is done by so-called miners who can digitally sign blocks once they solve a computationally-hard problem. Conventional wisdom generally considers this protocol as secure and stable as miners are incentivised to follow the behaviour of the majority. However,…
▽ More
The core of many cryptocurrencies is the decentralised validation network operating on proof-of-work technology. In these systems, validation is done by so-called miners who can digitally sign blocks once they solve a computationally-hard problem. Conventional wisdom generally considers this protocol as secure and stable as miners are incentivised to follow the behaviour of the majority. However, whether some strategic mining behaviours occur in practice is still a major concern. In this paper we target this question by focusing on a security threat: a selfish mining attack in which malicious miners deviate from protocol by not immediately revealing their newly mined blocks. We propose a statistical test to analyse each miner's behaviour in five popular cryptocurrencies: Bitcoin, Litecoin, Monacoin, Ethereum and Bitcoin Cash. Our method is based on the realisation that selfish mining behaviour will cause identifiable anomalies in the statistics of miner's successive blocks discovery. Secondly, we apply heuristics-based address clustering to improve the detectability of this kind of behaviour. We find a marked presence of abnormal miners in Monacoin and Bitcoin Cash, and, to a lesser extent, in Ethereum. Finally, we extend our method to detect coordinated selfish mining attacks, finding mining cartels in Monacoin where miners might secretly share information about newly mined blocks in advance. Our analysis contributes to the research on security in cryptocurrency systems by providing the first empirical evidence that the aforementioned strategic mining behaviours do take place in practice.
△ Less
Submitted 3 May, 2023; v1 submitted 11 August, 2022;
originally announced August 2022.
-
The Evolution Of Centralisation on Cryptocurrency Platforms
Authors:
Carlo Campajola,
Raffaele Cristodaro,
Francesco Maria De Collibus,
Tao Yan,
Nicolo' Vallarano,
Claudio J. Tessone
Abstract:
More than ten years ago the blockchain was acclaimed as the solution to overcome centralised trusted third parties for online payments. Through the years the crypto-movement changed and evolved, although decentralisation remained the core ideology and the necessary feature every new crypto-project should provide. In this paper we study the concept of centralisation in cryptocurrencies using a wide…
▽ More
More than ten years ago the blockchain was acclaimed as the solution to overcome centralised trusted third parties for online payments. Through the years the crypto-movement changed and evolved, although decentralisation remained the core ideology and the necessary feature every new crypto-project should provide. In this paper we study the concept of centralisation in cryptocurrencies using a wide array of methodologies from the complex systems literature, on a comparative collection of blockchains, in order to define the many different levels a blockchain system may display (de-)centralisation and to question whether the present state of cryptocurrencies is, in a technological and economical sense, actually decentralised.
△ Less
Submitted 3 May, 2023; v1 submitted 10 June, 2022;
originally announced June 2022.
-
Stochastic modelling of blockchain consensus
Authors:
Claudio J. Tessone,
Paolo Tasca,
Flavio Iannelli
Abstract:
Blockchain and general purpose distributed ledgers are foundational technologies which bring significant innovation in the infrastructures and other underpinnings of our socio-economic systems. These P2P technologies are able to securely diffuse information within and across networks, without need for trustees or central authorities to enforce consensus. In this contribution, we propose a minimali…
▽ More
Blockchain and general purpose distributed ledgers are foundational technologies which bring significant innovation in the infrastructures and other underpinnings of our socio-economic systems. These P2P technologies are able to securely diffuse information within and across networks, without need for trustees or central authorities to enforce consensus. In this contribution, we propose a minimalistic stochastic model to understand the dynamics of blockchain-based consensus. By leveraging on random-walk theory, we model block propagation delay on different network topologies and provide a classification of blockchain systems in terms of two emergent properties. Firstly, we identify two performing regimes: a functional regime corresponding to an optimal system function; and a non-functional regime characterised by a congested or branched state of sub-optimal blockchains. Secondly, we discover a phase transition during the emergence of consensus and numerically investigate the corresponding critical point. Our results provide important insights into the consensus mechanism and sub-optimal states in decentralised systems.
△ Less
Submitted 11 June, 2021;
originally announced June 2021.
-
The Complex Community Structure of the Bitcoin Address Correspondence Network
Authors:
Jan Alexander Fischer,
Andres Palechor,
Daniele Dell'Aglio,
Abraham Bernstein,
Claudio J. Tessone
Abstract:
Bitcoin is built on a blockchain, an immutable decentralised ledger that allows entities (users) to exchange Bitcoins in a pseudonymous manner. Bitcoins are associated with alpha-numeric addresses and are transferred via transactions. Each transaction is composed of a set of input addresses (associated with unspent outputs received from previous transactions) and a set of output addresses (to whic…
▽ More
Bitcoin is built on a blockchain, an immutable decentralised ledger that allows entities (users) to exchange Bitcoins in a pseudonymous manner. Bitcoins are associated with alpha-numeric addresses and are transferred via transactions. Each transaction is composed of a set of input addresses (associated with unspent outputs received from previous transactions) and a set of output addresses (to which Bitcoins are transferred). Despite Bitcoin was designed with anonymity in mind, different heuristic approaches exist to detect which addresses in a specific transaction belong to the same entity. By applying these heuristics, we build an Address Correspondence Network: in this representation, addresses are nodes are connected with edges if at least one heuristic detects them as belonging to the same entity. %addresses are nodes and edges are drawn between addresses detected as belonging to the same entity by at least one heuristic. %nodes represent addresses and edges model the likelihood that two nodes belong to the same entity %In this network, connected components represent sets of addresses controlled by the same entity. In this paper, we analyse for the first time the Address Correspondence Network and show it is characterised by a complex topology, signalled by a broad, skewed degree distribution and a power-law component size distribution. Using a large-scale dataset of addresses for which the controlling entities are known, we show that a combination of external data coupled with standard community detection algorithms can reliably identify entities. The complex nature of the Address Correspondence Network reveals that usage patterns of individual entities create statistical regularities; and that these regularities can be leveraged to more accurately identify entities and gain a deeper understanding of the Bitcoin economy as a whole.
△ Less
Submitted 19 May, 2021;
originally announced May 2021.
-
Absence of a resolution limit in in-block nestedness
Authors:
Manuel S. Mariani,
María J. Palazzi,
Albert Solé-Ribalta,
Javier Borge-Holthoefer,
Claudio J. Tessone
Abstract:
Originally a speculative pattern in ecological networks, the hybrid or compound nested-modular pattern has been confirmed, during the last decade, as a relevant structural arrangement that emerges in a variety of contexts --in ecological mutualistic system and beyond. This implies shifting the focus from the measurement of nestedness as a global property (macro level), to the detection of blocks (…
▽ More
Originally a speculative pattern in ecological networks, the hybrid or compound nested-modular pattern has been confirmed, during the last decade, as a relevant structural arrangement that emerges in a variety of contexts --in ecological mutualistic system and beyond. This implies shifting the focus from the measurement of nestedness as a global property (macro level), to the detection of blocks (meso level) that internally exhibit a high degree of nestedness. Unfortunately, the availability and understanding of the methods to properly detect in-block nested partitions lie behind the empirical findings: while a precise quality function of in-block nestedness has been proposed, we lack an understanding of its possible inherent constraints. Specifically, while it is well known that Newman-Girvan's modularity, and related quality functions, notoriously suffer from a resolution limit that impairs their ability to detect small blocks, the potential existence of resolution limits for in-block nestedness is unexplored. Here, we provide empirical, numerical and analytical evidence that the in-block nestedness function lacks a resolution limit, and thus our capacity to detect correct partitions in networks via its maximization depends solely on the accuracy of the optimization algorithms.
△ Less
Submitted 19 February, 2020;
originally announced February 2020.
-
Lightning Network: a second path towards centralisation of the Bitcoin economy
Authors:
Jian-Hong Lin,
Kevin Primicerio,
Tiziano Squartini,
Christian Decker,
Claudio J. Tessone
Abstract:
The Bitcoin Lightning Network (BLN), a so-called "second layer" payment protocol, was launched in 2018 to scale up the number of transactions between Bitcoin owners. In this paper, we analyse the structure of the BLN over a period of 18 months, ranging from 12th January 2018 to 17th July 2019. Here, we consider three representations of the BLN: the daily snapshot one, the weekly snapshot one and t…
▽ More
The Bitcoin Lightning Network (BLN), a so-called "second layer" payment protocol, was launched in 2018 to scale up the number of transactions between Bitcoin owners. In this paper, we analyse the structure of the BLN over a period of 18 months, ranging from 12th January 2018 to 17th July 2019. Here, we consider three representations of the BLN: the daily snapshot one, the weekly snapshot one and the daily-block snapshot one. By studying the topological properties of the three representations above, we find that the total volume of transacted bitcoins approximately grows as the square of the network size; however, despite the huge activity characterising the BLN, the bitcoins distribution is very unequal: the average Gini coefficient of the node strengths (computed across the entire history of the Bitcoin Lightning Network) is, in fact, ~0.88 causing the 10% (50%) of the nodes to hold the 80% (99%) of the bitcoins at stake in the BLN (on average, across the entire period). This concentration brings up the question of which minimalist network model allows us to explain the network topological structure. Like for other economic systems, we hypothesise that local properties of nodes, like the degree, ultimately determine part of its characteristics. Therefore, we have tested the goodness of the Undirected Binary Configuration Model (UBCM) in reproducing the structural features of the BLN: the UBCM recovers the disassortative and the hierarchical character of the BLN but underestimates the centrality of nodes; this suggests that the BLN is becoming an increasingly centralised network, more and more compatible with a core-periphery structure. Further inspection of the resilience of the BLN shows that removing hubs leads to the collapse of the network into many components, an evidence suggesting that this network may be a target for the so-called split attacks.
△ Less
Submitted 30 June, 2020; v1 submitted 7 February, 2020;
originally announced February 2020.
-
The wisdom of the few: Predicting collective success from individual behavior
Authors:
Manuel S. Mariani,
Yanina Gimenez,
Jorge Brea,
Martin Minnoni,
René Algesheimer,
Claudio J. Tessone
Abstract:
Can we predict top-performing products, services, or businesses by only monitoring the behavior of a small set of individuals? Although most previous studies focused on the predictive power of "hub" individuals with many social contacts, which sources of customer behavioral data are needed to address this question remains unclear, mostly due to the scarcity of available datasets that simultaneousl…
▽ More
Can we predict top-performing products, services, or businesses by only monitoring the behavior of a small set of individuals? Although most previous studies focused on the predictive power of "hub" individuals with many social contacts, which sources of customer behavioral data are needed to address this question remains unclear, mostly due to the scarcity of available datasets that simultaneously capture individuals' purchasing patterns and social interactions. Here, we address this question in a unique, large-scale dataset that combines individuals' credit-card purchasing history with their social and mobility traits across an entire nation. Surprisingly, we find that the purchasing history alone enables the detection of small sets of ``discoverers" whose early purchases offer reliable success predictions for the brick-and-mortar stores they visit. In contrast with the assumptions by most existing studies on word-of-mouth processes, the hubs selected by social network centrality are not consistently predictive of success. Our findings show that companies and organizations with access to large-scale purchasing data can detect the discoverers and leverage their behavior to anticipate market trends, without the need for social network data.
△ Less
Submitted 9 June, 2020; v1 submitted 14 January, 2020;
originally announced January 2020.
-
A data-driven model for Mass Media influence in electoral context
Authors:
Federico Albanese,
Claudio J. Tessone,
Viktoriya Semeshenko,
Pablo Balenzuela
Abstract:
Mass Media outlets have occupied the central role of the political scenario, and are persuasive in the process of opinion formation of the citizens. In particular, the study of the relationship between Mass Media and behaviour of citizens can be monitored during election times, given the accessibility of news related to the candidates and polls that precede the election's day. In this paper we pre…
▽ More
Mass Media outlets have occupied the central role of the political scenario, and are persuasive in the process of opinion formation of the citizens. In particular, the study of the relationship between Mass Media and behaviour of citizens can be monitored during election times, given the accessibility of news related to the candidates and polls that precede the election's day. In this paper we present a novel two-dimensional data driven Mass Media model based on semantic analysis of newspapers and national election surveys, which we use to analyse how a single influence mechanism should behave in order to reproduce the behaviour of the voters. Using simple and feasible rules for dynamics, we were able to find a notable agreement between the model's predictions and the polls which help us to understand the underlying mechanisms of the interactions between reader and media.
△ Less
Submitted 1 October, 2019; v1 submitted 23 September, 2019;
originally announced September 2019.
-
Thermodynamics of the Minimum Description Length on Community Detection
Authors:
Juan Ignacio Perotti,
Claudio Juan Tessone,
Aaron Clauset,
Guido Caldarelli
Abstract:
Modern statistical modeling is an important complement to the more traditional approach of physics where Complex Systems are studied by means of extremely simple idealized models. The Minimum Description Length (MDL) is a principled approach to statistical modeling combining Occam's razor with Information Theory for the selection of models providing the most concise descriptions. In this work, we…
▽ More
Modern statistical modeling is an important complement to the more traditional approach of physics where Complex Systems are studied by means of extremely simple idealized models. The Minimum Description Length (MDL) is a principled approach to statistical modeling combining Occam's razor with Information Theory for the selection of models providing the most concise descriptions. In this work, we introduce the Boltzmannian MDL (BMDL), a formalization of the principle of MDL with a parametric complexity conveniently formulated as the free-energy of an artificial thermodynamic system. In this way, we leverage on the rich theoretical and technical background of statistical mechanics, to show the crucial importance that phase transitions and other thermodynamic concepts have on the problem of statistical modeling from an information theoretic point of view. For example, we provide information theoretic justifications of why a high-temperature series expansion can be used to compute systematic approximations of the BMDL when the formalism is used to model data, and why statistically significant model selections can be identified with ordered phases when the BMDL is used to model models. To test the introduced formalism, we compute approximations of BMDL for the problem of community detection in complex networks, where we obtain a principled MDL derivation of the Girvan-Newman (GN) modularity and the Zhang-Moore (ZM) community detection method. Here, by means of analytical estimations and numerical experiments on synthetic and empirical networks, we find that BMDL-based correction terms of the GN modularity improve the quality of the detected communities and we also find an information theoretic justification of why the ZM criterion for estimation of the number of network communities is better than alternative approaches such as the bare minimization of a free energy.
△ Less
Submitted 18 June, 2018;
originally announced June 2018.
-
Network-based indicators of Bitcoin bubbles
Authors:
Alexandre Bovet,
Carlo Campajola,
Jorge F. Lazo,
Francesco Mottes,
Iacopo Pozzana,
Valerio Restocchi,
Pietro Saggese,
Nicoló Vallarano,
Tiziano Squartini,
Claudio J. Tessone
Abstract:
The functioning of the cryptocurrency Bitcoin relies on the open availability of the entire history of its transactions. This makes it a particularly interesting socio-economic system to analyse from the point of view of network science. Here we analyse the evolution of the network of Bitcoin transactions between users. We achieve this by using the complete transaction history from December 5th 20…
▽ More
The functioning of the cryptocurrency Bitcoin relies on the open availability of the entire history of its transactions. This makes it a particularly interesting socio-economic system to analyse from the point of view of network science. Here we analyse the evolution of the network of Bitcoin transactions between users. We achieve this by using the complete transaction history from December 5th 2011 to December 23rd 2013. This period includes three bubbles experienced by the Bitcoin price. In particular, we focus on the global and local structural properties of the user network and their variation in relation to the different period of price surge and decline. By analysing the temporal variation of the heterogeneity of the connectivity patterns we gain insights on the different mechanisms that take place during bubbles, and find that hubs (i.e., the most connected nodes) had a fundamental role in triggering the burst of the second bubble. Finally, we examine the local topological structures of interactions between users, we discover that the relative frequency of triadic interactions experiences a strong change before, during and after a bubble, and suggest that the importance of the hubs grows during the bubble. These results provide further evidence that the behaviour of the hubs during bubbles significantly increases the systemic risk of the Bitcoin network, and discuss the implications on public policy interventions.
△ Less
Submitted 11 May, 2018;
originally announced May 2018.
-
Revealing In-Block Nestedness: detection and benchmarking
Authors:
Albert Solé-Ribalta,
Claudio J. Tessone,
Manuel S. Mariani,
Javier Borge-Holthoefer
Abstract:
As new instances of nested organization --beyond ecological networks-- are discovered, scholars are debating around the co-existence of two apparently incompatible macroscale architectures: nestedness and modularity. The discussion is far from being solved, mainly for two reasons. First, nestedness and modularity appear to emerge from two contradictory dynamics, cooperation and competition. Second…
▽ More
As new instances of nested organization --beyond ecological networks-- are discovered, scholars are debating around the co-existence of two apparently incompatible macroscale architectures: nestedness and modularity. The discussion is far from being solved, mainly for two reasons. First, nestedness and modularity appear to emerge from two contradictory dynamics, cooperation and competition. Second, existing methods to assess the presence of nestedness and modularity are flawed when it comes to the evaluation of concurrently nested and modular structures. In this work, we tackle the latter problem, presenting the concept of \textit{in-block nestedness}, a structural property determining to what extent a network is composed of blocks whose internal connectivity exhibits nestedness. We then put forward a set of optimization methods that allow us to identify such organization successfully, both in synthetic and in a large number of real networks. These findings challenge our understanding of the topology of ecological and social systems, calling for new models to explain how such patterns emerge.
△ Less
Submitted 17 January, 2018;
originally announced January 2018.
-
Hierarchical benchmark graphs for testing community detection algorithms
Authors:
Zhao Yang,
Juan I. Perotti,
Claudio J. Tessone
Abstract:
Hierarchical organization is an important, prevalent characteristic of complex systems; in order to understand their organization, the study of the underlying (generally complex) networks that describe the interactions between their constituents plays a central role. Numerous previous works have shown that many real-world networks in social, biologic and technical systems present hierarchical orga…
▽ More
Hierarchical organization is an important, prevalent characteristic of complex systems; in order to understand their organization, the study of the underlying (generally complex) networks that describe the interactions between their constituents plays a central role. Numerous previous works have shown that many real-world networks in social, biologic and technical systems present hierarchical organization, often in the form of a hierarchy of community structures. Many artificial benchmark graphs have been proposed in order to test different community detection methods, but no benchmark has been developed to throughly test the detection of hierarchical community structures. In this study, we fill this vacancy by extending the Lancichinetti-Fortunato-Radicchi (LFR) ensemble of benchmark graphs, adopting the rule of constructing hierarchical networks proposed by Ravasz and Barabási. We employ this benchmark to test three of the most popular community detection algorithms, and quantify their accuracy using the traditional Mutual Information and the recently introduced Hierarchical Mutual Information. The results indicate that the Ravasz-Barabási-Lancichinetti-Fortunato-Radicchi (RB-LFR) benchmark generates a complex hierarchical structure constituting a challenging benchmark for the considered community detection methods.
△ Less
Submitted 23 August, 2017;
originally announced August 2017.
-
Taxonomy of Blockchain Technologies. Principles of Identification and Classification
Authors:
Paolo Tasca,
Claudio J. Tessone
Abstract:
A comparative study across the most widely known blockchain technologies is conducted with a bottom-up approach. Blockchains are disentangled into building blocks. Each building block is then hierarchically classified in main and subcomponents. Then, alternative layouts for the subcomponents are identified and compared between them. Finally, a taxonomy tree summarises the study and provides a navi…
▽ More
A comparative study across the most widely known blockchain technologies is conducted with a bottom-up approach. Blockchains are disentangled into building blocks. Each building block is then hierarchically classified in main and subcomponents. Then, alternative layouts for the subcomponents are identified and compared between them. Finally, a taxonomy tree summarises the study and provides a navigation tool across different blockchain architectural configurations.
△ Less
Submitted 16 April, 2018; v1 submitted 31 May, 2017;
originally announced August 2017.
-
A Comparative Analysis of Community Detection Algorithms on Artificial Networks
Authors:
Zhao Yang,
René Algesheimer,
Claudio Juan Tessone
Abstract:
Many community detection algorithms have been developed to uncover the mesoscopic properties of complex networks. However how good an algorithm is, in terms of accuracy and computing time, remains still open. Testing algorithms on real-world network has certain restrictions which made their insights potentially biased: the networks are usually small, and the underlying communities are not defined…
▽ More
Many community detection algorithms have been developed to uncover the mesoscopic properties of complex networks. However how good an algorithm is, in terms of accuracy and computing time, remains still open. Testing algorithms on real-world network has certain restrictions which made their insights potentially biased: the networks are usually small, and the underlying communities are not defined objectively. In this study, we employ the Lancichinetti-Fortunato-Radicchi benchmark graph to test eight state-of-the-art algorithms. We quantify the accuracy using complementary measures and algorithms' computing time. Based on simple network properties and the aforementioned results, we provide guidelines that help to choose the most adequate community detection algorithm for a given network. Moreover, these rules allow uncovering limitations in the use of specific algorithms given macroscopic network properties. Our contribution is threefold: firstly, we provide actual techniques to determine which is the most suited algorithm in most circumstances based on observable properties of the network under consideration. Secondly, we use the mixing parameter as an easily measurable indicator of finding the ranges of reliability of the different algorithms. Finally, we study the dependency with network size focusing on both the algorithm's predicting power and the effective computing time.
△ Less
Submitted 26 August, 2017; v1 submitted 2 August, 2016;
originally announced August 2016.
-
Hierarchical mutual information for the comparison of hierarchical community structures in complex networks
Authors:
Juan Ignacio Perotti,
Claudio Juan Tessone,
Guido Caldarelli
Abstract:
The quest for a quantitative characterization of community and modular structure of complex networks produced a variety of methods and algorithms to classify different networks. However, it is not clear if such methods provide consistent, robust and meaningful results when considering hierarchies as a whole. Part of the problem is the lack of a similarity measure for the comparison of hierarchical…
▽ More
The quest for a quantitative characterization of community and modular structure of complex networks produced a variety of methods and algorithms to classify different networks. However, it is not clear if such methods provide consistent, robust and meaningful results when considering hierarchies as a whole. Part of the problem is the lack of a similarity measure for the comparison of hierarchical community structures. In this work we give a contribution by introducing the {\it hierarchical mutual information}, which is a generalization of the traditional mutual information, and allows to compare hierarchical partitions and hierarchical community structures. The {\it normalized} version of the hierarchical mutual information should behave analogously to the traditional normalized mutual information. Here, the correct behavior of the hierarchical mutual information is corroborated on an extensive battery of numerical experiments. The experiments are performed on artificial hierarchies, and on the hierarchical community structure of artificial and empirical networks. Furthermore, the experiments illustrate some of the practical applications of the hierarchical mutual information. Namely, the comparison of different community detection methods, and the study of the consistency, robustness and temporal evolution of the hierarchical modular structure of networks.
△ Less
Submitted 7 January, 2016; v1 submitted 18 August, 2015;
originally announced August 2015.
-
Quantifying knowledge exchange in R&D networks: A data-driven model
Authors:
Giacomo Vaccario,
Mario Vincenzo Tomasello,
Claudio Juan Tessone,
Frank Schweitzer
Abstract:
We propose a model that reflects two important processes in R&D activities of firms, the formation of R&D alliances and the exchange of knowledge as a result of these collaborations. In a data-driven approach, we analyze two large-scale data sets extracting unique information about 7500 R&D alliances and 5200 patent portfolios of firms. This data is used to calibrate the model parameters for netwo…
▽ More
We propose a model that reflects two important processes in R&D activities of firms, the formation of R&D alliances and the exchange of knowledge as a result of these collaborations. In a data-driven approach, we analyze two large-scale data sets extracting unique information about 7500 R&D alliances and 5200 patent portfolios of firms. This data is used to calibrate the model parameters for network formation and knowledge exchange. We obtain probabilities for incumbent and newcomer firms to link to other incumbents or newcomers which are able to reproduce the topology of the empirical R&D network. The position of firms in a knowledge space is obtained from their patents using two different classification schemes, IPC in 8 dimensions and ISI-OST-INPI in 35 dimensions. Our dynamics of knowledge exchange assumes that collaborating firms approach each other in knowledge space at a rate $μ$ for an alliance duration $τ$. Both parameters are obtained in two different ways, by comparing knowledge distances from simulations and empirics and by analyzing the collaboration efficiency $\mathcal{\hat{C}}_{n}$. This is a new measure, that takes also in account the effort of firms to maintain concurrent alliances, and is evaluated via extensive computer simulations. We find that R&D alliances have a duration of around two years and that the subsequent knowledge exchange occurs at a very low rate. Hence, a firm's position in the knowledge space is rather a determinant than a consequence of its R&D alliances. From our data-driven approach we also find model configurations that can be both realistic and optimized with respect to the collaboration efficiency $\mathcal{\hat{C}}_{n}$. Effective policies, as suggested by our model, would incentivize shorter R&D alliances and higher knowledge exchange rates.
△ Less
Submitted 5 May, 2017; v1 submitted 25 July, 2015;
originally announced July 2015.
-
How do OSS projects change in number and size? A large-scale analysis to test a model of project growth
Authors:
Frank Schweitzer,
Vahan Nanumyan,
Claudio J. Tessone,
Xi Xia
Abstract:
Established Open Source Software (OSS) projects can grow in size if new developers join, but also the number of OSS projects can grow if developers choose to found new projects. We discuss to what extent an established model for firm growth can be applied to the dynamics of OSS projects. Our analysis is based on a large-scale data set from SourceForge (SF) consisting of monthly data for 10 years,…
▽ More
Established Open Source Software (OSS) projects can grow in size if new developers join, but also the number of OSS projects can grow if developers choose to found new projects. We discuss to what extent an established model for firm growth can be applied to the dynamics of OSS projects. Our analysis is based on a large-scale data set from SourceForge (SF) consisting of monthly data for 10 years, for up to 360'000 OSS projects and up to 340'000 developers. Over this time period, we find an exponential growth both in the number of projects and developers, with a remarkable increase of single-developer projects after 2009. We analyze the monthly entry and exit rates for both projects and developers, the growth rate of established projects and the monthly project size distribution. To derive a prediction for the latter, we use modeling assumptions of how newly entering developers choose to either found a new project or to join existing ones. Our model applies only to collaborative projects that are deemed to grow in size by attracting new developers. We verify, by a thorough statistical analysis, that the Yule-Simon distribution is a valid candidate for the size distribution of collaborative projects except for certain time periods where the modeling assumptions no longer hold. We detect and empirically test the reason for this limitation, i.e., the fact that an increasing number of established developers found additional new projects after 2009.
△ Less
Submitted 23 June, 2015;
originally announced June 2015.
-
The digital traces of bubbles: feedback cycles between socio-economic signals in the Bitcoin economy
Authors:
David Garcia,
Claudio Juan Tessone,
Pavlin Mavrodiev,
Nicolas Perony
Abstract:
What is the role of social interactions in the creation of price bubbles? Answering this question requires obtaining collective behavioural traces generated by the activity of a large number of actors. Digital currencies offer a unique possibility to measure socio-economic signals from such digital traces. Here, we focus on Bitcoin, the most popular cryptocurrency. Bitcoin has experienced periods…
▽ More
What is the role of social interactions in the creation of price bubbles? Answering this question requires obtaining collective behavioural traces generated by the activity of a large number of actors. Digital currencies offer a unique possibility to measure socio-economic signals from such digital traces. Here, we focus on Bitcoin, the most popular cryptocurrency. Bitcoin has experienced periods of rapid increase in exchange rates (price) followed by sharp decline; we hypothesise that these fluctuations are largely driven by the interplay between different social phenomena. We thus quantify four socio-economic signals about Bitcoin from large data sets: price on on-line exchanges, volume of word-of-mouth communication in on-line social media, volume of information search, and user base growth. By using vector autoregression, we identify two positive feedback loops that lead to price bubbles in the absence of exogenous stimuli: one driven by word of mouth, and the other by new Bitcoin adopters. We also observe that spikes in information search, presumably linked to external events, precede drastic price declines. Understanding the interplay between the socio-economic signals we measured can lead to applications beyond cryptocurrencies to other phenomena which leave digital footprints, such as on-line social network usage.
△ Less
Submitted 7 August, 2014;
originally announced August 2014.
-
The role of endogenous and exogenous mechanisms in the formation of R&D networks
Authors:
Mario Vincenzo Tomasello,
Nicola Perra,
Claudio Juan Tessone,
Márton Karsai,
Frank Schweitzer
Abstract:
We develop an agent-based model of strategic link formation in Research and Development (R&D) networks. Empirical evidence has shown that the growth of these networks is driven by mechanisms which are both endogenous to the system (that is, depending on existing alliances patterns) and exogenous (that is, driven by an exploratory search for newcomer firms). Extant research to date has not investig…
▽ More
We develop an agent-based model of strategic link formation in Research and Development (R&D) networks. Empirical evidence has shown that the growth of these networks is driven by mechanisms which are both endogenous to the system (that is, depending on existing alliances patterns) and exogenous (that is, driven by an exploratory search for newcomer firms). Extant research to date has not investigated both mechanisms simultaneously in a comparative manner. To overcome this limitation, we develop a general modeling framework to shed light on the relative importance of these two mechanisms. We test our model against a comprehensive dataset, listing cross-country and cross-sectoral R&D alliances from 1984 to 2009. Our results show that by fitting only three macroscopic properties of the network topology, this framework is able to reproduce a number of micro-level measures, including the distributions of degree, local clustering, path length and component size, and the emergence of network clusters. Furthermore, by estimating the link probabilities towards newcomers and established firms from the data, we find that endogenous mechanisms are predominant over the exogenous ones in the network formation, thus quantifying the importance of existing structures in selecting partner firms.
△ Less
Submitted 15 July, 2014; v1 submitted 17 March, 2014;
originally announced March 2014.
-
Causality-Driven Slow-Down and Speed-Up of Diffusion in Non-Markovian Temporal Networks
Authors:
Ingo Scholtes,
Nicolas Wider,
Rene Pfitzner,
Antonios Garas,
Claudio Juan Tessone,
Frank Schweitzer
Abstract:
Recent research has highlighted limitations of studying complex systems with time-varying topologies from the perspective of static, time-aggregated networks. Non-Markovian characteristics resulting from the ordering of interactions in temporal networks were identified as one important mechanism that alters causality, and affects dynamical processes. So far, an analytical explanation for this phen…
▽ More
Recent research has highlighted limitations of studying complex systems with time-varying topologies from the perspective of static, time-aggregated networks. Non-Markovian characteristics resulting from the ordering of interactions in temporal networks were identified as one important mechanism that alters causality, and affects dynamical processes. So far, an analytical explanation for this phenomenon and for the significant variations observed across different systems is missing. Here we introduce a methodology that allows to analytically predict causality-driven changes of diffusion speed in non-Markovian temporal networks. Validating our predictions in six data sets, we show that - compared to the time-aggregated network - non-Markovian characteristics can lead to both a slow-down, or speed-up of diffusion which can even outweigh the decelerating effect of community structures in the static topology. Thus, non-Markovian properties of temporal networks constitute an important additional dimension of complexity in time-varying complex systems.
△ Less
Submitted 26 August, 2015; v1 submitted 15 July, 2013;
originally announced July 2013.
-
The Rise and Fall of a Central Contributor: Dynamics of Social Organization and Performance in the Gentoo Community
Authors:
Marcelo Serrano Zanetti,
Ingo Scholtes,
Claudio Juan Tessone,
Frank Schweitzer
Abstract:
Social organization and division of labor crucially influence the performance of collaborative software engineering efforts. In this paper, we provide a quantitative analysis of the relation between social organization and performance in Gentoo, an Open Source community developing a Linux distribution. We study the structure and dynamics of collaborations as recorded in the project's bug tracking…
▽ More
Social organization and division of labor crucially influence the performance of collaborative software engineering efforts. In this paper, we provide a quantitative analysis of the relation between social organization and performance in Gentoo, an Open Source community developing a Linux distribution. We study the structure and dynamics of collaborations as recorded in the project's bug tracking system over a period of ten years. We identify a period of increasing centralization after which most interactions in the community were mediated by a single central contributor. In this period of maximum centralization, the central contributor unexpectedly left the project, thus posing a significant challenge for the community. We quantify how the rise, the activity as well as the subsequent sudden dropout of this central contributor affected both the social organization and the bug handling performance of the Gentoo community. We analyze social organization from the perspective of network theory and augment our quantitative findings by interviews with prominent members of the Gentoo community which shared their personal insights.
△ Less
Submitted 28 February, 2013;
originally announced February 2013.
-
Categorizing Bugs with Social Networks: A Case Study on Four Open Source Software Communities
Authors:
Marcelo Serrano Zanetti,
Ingo Scholtes,
Claudio Juan Tessone,
Frank Schweitzer
Abstract:
Efficient bug triaging procedures are an important precondition for successful collaborative software engineering projects. Triaging bugs can become a laborious task particularly in open source software (OSS) projects with a large base of comparably inexperienced part-time contributors. In this paper, we propose an efficient and practical method to identify valid bug reports which a) refer to an a…
▽ More
Efficient bug triaging procedures are an important precondition for successful collaborative software engineering projects. Triaging bugs can become a laborious task particularly in open source software (OSS) projects with a large base of comparably inexperienced part-time contributors. In this paper, we propose an efficient and practical method to identify valid bug reports which a) refer to an actual software bug, b) are not duplicates and c) contain enough information to be processed right away. Our classification is based on nine measures to quantify the social embeddedness of bug reporters in the collaboration network. We demonstrate its applicability in a case study, using a comprehensive data set of more than 700,000 bug reports obtained from the Bugzilla installation of four major OSS communities, for a period of more than ten years. For those projects that exhibit the lowest fraction of valid bug reports, we find that the bug reporters' position in the collaboration network is a strong indicator for the quality of bug reports. Based on this finding, we develop an automated classification scheme that can easily be integrated into bug tracking platforms and analyze its performance in the considered OSS communities. A support vector machine (SVM) to identify valid bug reports based on the nine measures yields a precision of up to 90.3% with an associated recall of 38.9%. With this, we significantly improve the results obtained in previous case studies for an automated early identification of bugs that are eventually fixed. Furthermore, our study highlights the potential of using quantitative measures of social organization in collaborative software engineering. It also opens a broad perspective for the integration of social awareness in the design of support infrastructures.
△ Less
Submitted 28 February, 2013; v1 submitted 27 February, 2013;
originally announced February 2013.
-
Quantifying the effects of social influence
Authors:
Pavlin Mavrodiev,
Claudio J. Tessone,
Frank Schweitzer
Abstract:
How do humans respond to indirect social influence when making decisions? We analysed an experiment where subjects had to repeatedly guess the correct answer to factual questions, while having only aggregated information about the answers of others. While the response of humans to aggregated information is a widely observed phenomenon, it has not been investigated quantitatively, in a controlled s…
▽ More
How do humans respond to indirect social influence when making decisions? We analysed an experiment where subjects had to repeatedly guess the correct answer to factual questions, while having only aggregated information about the answers of others. While the response of humans to aggregated information is a widely observed phenomenon, it has not been investigated quantitatively, in a controlled setting. We found that the adjustment of individual guesses depends linearly on the distance to the mean of all guesses. This is a remarkable, and yet surprisingly simple, statistical regularity. It holds across all questions analysed, even though the correct answers differ in several orders of magnitude. Our finding supports the assumption that individual diversity does not affect the response to indirect social influence. It also complements previous results on the nonlinear response in information-rich scenarios. We argue that the nature of the response to social influence crucially changes with the level of information aggregation. This insight contributes to the empirical foundation of models for collective decisions under social influence.
△ Less
Submitted 11 February, 2013;
originally announced February 2013.
-
How can social herding enhance cooperation?
Authors:
Frank Schweitzer,
Pavlin Mavrodiev,
Claudio J. Tessone
Abstract:
We study a system in which N agents have to decide between two strategies θ_i (i \in 1... N), for defection or cooperation, when interacting with other n agents (either spatial neighbors or randomly chosen ones). After each round, they update their strategy responding nonlinearly to two different information sources: (i) the payoff a_i(θ_i, f_i) received from the strategic interaction with their n…
▽ More
We study a system in which N agents have to decide between two strategies θ_i (i \in 1... N), for defection or cooperation, when interacting with other n agents (either spatial neighbors or randomly chosen ones). After each round, they update their strategy responding nonlinearly to two different information sources: (i) the payoff a_i(θ_i, f_i) received from the strategic interaction with their n counterparts, (ii) the fraction f_i of cooperators in this interaction. For the latter response, we assume social herding, i.e. agents adopt their strategy based on the frequencies of the different strategies in their neighborhood, without taking into account the consequences of this decision. We note that f_i already determines the payoff, so there is no additional information assumed. A parameter ζdefines to what level agents take the two different information sources into account. For the strategic interaction, we assume a Prisoner's Dilemma game, i.e. one in which defection is the evolutionary stable strategy. However, if the additional dimension of social herding is taken into account, we find instead a stable outcome where cooperators are the majority. By means of agent-based computer simulations and analytical investigations, we evaluate the critical conditions for this transition towards cooperation. We find that, in addition to a high degree of social herding, there has to be a nonlinear response to the fraction of cooperators. We argue that the transition to cooperation in our model is based on less information, i.e. on agents which are not informed about the payoff matrix, and therefore rely on just observing the strategy of others, to adopt it. By designing the right mechanisms to respond to this information, the transition to cooperation can be remarkably enhanced.
△ Less
Submitted 6 November, 2012;
originally announced November 2012.
-
Diversity-induced resonance in the response to social norms
Authors:
Claudio J. Tessone,
Angel Sánchez,
Frank Schweitzer
Abstract:
In this paper we focus on diversity-induced resonance, which was recently found in bistable, excitable and other physical systems. We study the appearance of this phenomenon in a purely economic model of cooperating and defecting agents. Agent's contribution to a public good is seen as a social norm. So defecting agents face a social pressure, which decreases if free-riding becomes widespread. In…
▽ More
In this paper we focus on diversity-induced resonance, which was recently found in bistable, excitable and other physical systems. We study the appearance of this phenomenon in a purely economic model of cooperating and defecting agents. Agent's contribution to a public good is seen as a social norm. So defecting agents face a social pressure, which decreases if free-riding becomes widespread. In this model, diversity among agents naturally appears because of the different sensitivity towards the social norm. We study the evolution of cooperation as a response to the social norm (i) for the replicator dynamics, and (ii) for the logit dynamics by means of numerical simulations. Diversity-induced resonance is observed as a maximum in the response of agents to changes in the social norm as a function of the degree of heterogeneity in the population. We provide an analytical, mean-field approach for the logit dynamics and find very good agreement with the simulations. From a socio-economic perspective, our results show that, counter-intuitively, diversity in the individual sensitivity to social norms may result in a society that better follows such norms as a whole, even if part of the population is less prone to follow them.
△ Less
Submitted 25 September, 2012;
originally announced September 2012.
-
A Quantitative Study of Social Organisation in Open Source Software Communities
Authors:
Marcelo Serrano Zanetti,
Emre Sarigol,
Ingo Scholtes,
Claudio Juan Tessone,
Frank Schweitzer
Abstract:
The success of open source projects crucially depends on the voluntary contributions of a sufficiently large community of users. Apart from the mere size of the community, interesting questions arise when looking at the evolution of structural features of collaborations between community members. In this article, we discuss several network analytic proxies that can be used to quantify different as…
▽ More
The success of open source projects crucially depends on the voluntary contributions of a sufficiently large community of users. Apart from the mere size of the community, interesting questions arise when looking at the evolution of structural features of collaborations between community members. In this article, we discuss several network analytic proxies that can be used to quantify different aspects of the social organisation in social collaboration networks. We particularly focus on measures that can be related to the cohesiveness of the communities, the distribution of responsibilities and the resilience against turnover of community members. We present a comparative analysis on a large-scale dataset that covers the full history of collaborations between users of 14 major open source software communities. Our analysis covers both aggregate and time-evolving measures and highlights differences in the social organisation across communities. We argue that our results are a promising step towards the definition of suitable, potentially multi-dimensional, resilience and risk indicators for open source software communities.
△ Less
Submitted 4 March, 2013; v1 submitted 21 August, 2012;
originally announced August 2012.
-
Betweenness Preference: Quantifying Correlations in the Topological Dynamics of Temporal Networks
Authors:
René Pfitzner,
Ingo Scholtes,
Antonios Garas,
Claudio J. Tessone,
Frank Schweitzer
Abstract:
We study correlations in temporal networks and introduce the notion of betweenness preference. It allows to quantify to what extent paths, existing in time-aggregated representations of temporal networks, are actually realizable based on the sequence of interactions. We show that betweenness preference is present in empirical temporal network data and that it influences the length of shortest time…
▽ More
We study correlations in temporal networks and introduce the notion of betweenness preference. It allows to quantify to what extent paths, existing in time-aggregated representations of temporal networks, are actually realizable based on the sequence of interactions. We show that betweenness preference is present in empirical temporal network data and that it influences the length of shortest time-respecting paths. Using four different data sets, we further argue that neglecting betweenness preference leads to wrong conclusions about dynamical processes on temporal networks.
△ Less
Submitted 2 May, 2013; v1 submitted 2 August, 2012;
originally announced August 2012.
-
The Social Climbing Game
Authors:
Marco Bardoscia,
Giancarlo De Luca,
Giacomo Livan,
Matteo Marsili,
Claudio J. Tessone
Abstract:
The structure of a society depends, to some extent, on the incentives of the individuals they are composed of. We study a stylized model of this interplay, that suggests that the more individuals aim at climbing the social hierarchy, the more society's hierarchy gets strong. Such a dependence is sharp, in the sense that a persistent hierarchical order emerges abruptly when the preference for socia…
▽ More
The structure of a society depends, to some extent, on the incentives of the individuals they are composed of. We study a stylized model of this interplay, that suggests that the more individuals aim at climbing the social hierarchy, the more society's hierarchy gets strong. Such a dependence is sharp, in the sense that a persistent hierarchical order emerges abruptly when the preference for social status gets larger than a threshold. This phase transition has its origin in the fact that the presence of a well defined hierarchy allows agents to climb it, thus reinforcing it, whereas in a "disordered" society it is harder for agents to find out whom they should connect to in order to become more central. Interestingly, a social order emerges when agents strive harder to climb society and it results in a state of reduced social mobility, as a consequence of ergodicity breaking, where climbing is more difficult.
△ Less
Submitted 19 January, 2013; v1 submitted 26 July, 2012;
originally announced July 2012.
-
Effects of Social Influence on the Wisdom of Crowds
Authors:
Pavlin Mavrodiev,
Claudio J. Tessone,
Frank Schweitzer
Abstract:
Wisdom of crowds refers to the phenomenon that the aggregate prediction or forecast of a group of individuals can be surprisingly more accurate than most individuals in the group, and sometimes - than any of the individuals comprising it. This article models the impact of social influence on the wisdom of crowds. We build a minimalistic representation of individuals as Brownian particles coupled b…
▽ More
Wisdom of crowds refers to the phenomenon that the aggregate prediction or forecast of a group of individuals can be surprisingly more accurate than most individuals in the group, and sometimes - than any of the individuals comprising it. This article models the impact of social influence on the wisdom of crowds. We build a minimalistic representation of individuals as Brownian particles coupled by means of social influence. We demonstrate that the model can reproduce results of a previous empirical study. This allows us to draw more fundamental conclusions about the role of social influence: In particular, we show that the question of whether social influence has a positive or negative net effect on the wisdom of crowds is ill-defined. Instead, it is the starting configuration of the population, in terms of its diversity and accuracy, that directly determines how beneficial social influence actually is. The article further examines the scenarios under which social influence promotes or impairs the wisdom of crowds.
△ Less
Submitted 16 April, 2012;
originally announced April 2012.
-
Hierarchical Consensus Formation Reduces the Influence of Opinion Bias
Authors:
Nicolas Perony,
René Pfitzner,
Ingo Scholtes,
Claudio J. Tessone,
Frank Schweitzer
Abstract:
We study the role of hierarchical structures in a simple model of collective consensus formation based on the bounded confidence model with continuous individual opinions. For the particular variation of this model considered in this paper, we assume that a bias towards an extreme opinion is introduced whenever two individuals interact and form a common decision. As a simple proxy for hierarchical…
▽ More
We study the role of hierarchical structures in a simple model of collective consensus formation based on the bounded confidence model with continuous individual opinions. For the particular variation of this model considered in this paper, we assume that a bias towards an extreme opinion is introduced whenever two individuals interact and form a common decision. As a simple proxy for hierarchical social structures, we introduce a two-step decision making process in which in the second step groups of like-minded individuals are replaced by representatives once they have reached local consensus, and the representatives in turn form a collective decision in a downstream process. We find that the introduction of such a hierarchical decision making structure can improve consensus formation, in the sense that the eventual collective opinion is closer to the true average of individual opinions than without it. In particular, we numerically study how the size of groups of like-minded individuals being represented by delegate individuals affects the impact of the bias on the final population-wide consensus. These results are of interest for the design of organisational policies and the optimisation of hierarchical structures in the context of group decision making.
△ Less
Submitted 21 July, 2012; v1 submitted 30 March, 2012;
originally announced April 2012.
-
Organic Design of Massively Distributed Systems: A Complex Networks Perspective
Authors:
Ingo Scholtes,
Claudio Juan Tessone
Abstract:
The vision of Organic Computing addresses challenges that arise in the design of future information systems that are comprised of numerous, heterogeneous, resource-constrained and error-prone components or devices. Here, the notion organic particularly highlights the idea that, in order to be manageable, such systems should exhibit self-organization, self-adaptation and self-healing characteristic…
▽ More
The vision of Organic Computing addresses challenges that arise in the design of future information systems that are comprised of numerous, heterogeneous, resource-constrained and error-prone components or devices. Here, the notion organic particularly highlights the idea that, in order to be manageable, such systems should exhibit self-organization, self-adaptation and self-healing characteristics similar to those of biological systems. In recent years, the principles underlying many of the interesting characteristics of natural systems have been investigated from the perspective of complex systems science, particularly using the conceptual framework of statistical physics and statistical mechanics. In this article, we review some of the interesting relations between statistical physics and networked systems and discuss applications in the engineering of organic networked computing systems with predictable, quantifiable and controllable self-* properties.
△ Less
Submitted 17 January, 2012;
originally announced January 2012.