Abstract
Several growth models have been proposed in the literature for scalefree complex networks, with a range of fitnessbased attachment models gaining prominence recently. However, the processes by which such fitnessbased attachment behaviour can arise are less well understood, making it difficult to compare the relative merits of such models. This paper analyses an evolutionary mechanism that would give rise to a fitnessbased attachment process. In particular, it is proven by analytical and numerical methods that in homogeneous networks, the minimisation of maximum exposure to node unfitness leads to attachment probabilities that are proportional to node fitness. This result is then extended to heterogeneous networks, with supply chain networks being used as an example.
Introduction
Network analysis has emerged as an effective way of studying complex and distributed systems, because it often offers a fine balance between simplicity and realism in modelling such systems^{1}. Preferential attachment models, such as the BarabásiAlbert model where attachment probabilities are proportional to target node degree, have been the most prominent among them in the past decade^{2}. Recently, a number of node fitnessbased attachment models^{3,4,5,6,7,8,9,10,11,12} have been gaining prominence. It is noted that the concept of node fitness in this context is parallel to the concept of utility, as used in discrete choice models, where utility is a dimensionless measure of attraction which can be expressed as a function of attributes weighted by their relative importance (for further information regarding the role of utility, refer to ref. 13). Similarly, node fitness is a dimensionless measure of the inherent competitive ability (or the ‘attractiveness’) that a node has, which influences the rate at which it acquires links from other nodes as the network evolves over time. One such attribute could be node degree, which results in the BarabásiAlbert model, but other attributes of the node also could be considered individually or collectively.
An important feature of networks that evolve through node degree and node fitness based attachment growth models is that they can exhibit scale free topology, which is found in abundance among biological, technical and social networks^{6,14}. It has been widely accepted that the node fitness based attachment models (such as the BianconiBarabási model^{4} or the Ghadge model^{3}) are more realistic when compared to the classical BarabásiAlbert model in capturing the growth process of real world networks^{4,6}. Nevertheless, the behavioural bases from which such fitnessbased attachment behaviour would arise, and the evolutionary mechanisms which shape that behaviour, are less clearly understood. In particular, while many papers have offered intuitive and general explanations as to why increased fitness of a node would attract more links^{3,4,5,6}, the proportionality between fitness and attachment probabilities assumed in these models is yet to be explained by a rigorous evolutionary mechanism.
A chain is only as strong as its weakest link, goes an old adage. This paper proposes the minimisation of maximum exposure to least fit nodes (or the avoidance of the “weakest links”) as a behavioural basis for the fitnessbased proportional attachment rule. To prove this hypothesis, we analyse complex networks where each node is assigned a fitness value, and attachments between nodes are based on node probabilities that minimise the maximum exposure to node unfitness, where node unfitness is defined as the inverse of node fitness. Two cases are considered:
 1
Homogeneous networks, where all nodes are of the same type so attachment is possible between any pair of nodes. Note that we use the word ‘homogeneous’ in this sense and not in the sense that the topology is homogeneous (e.g. a lattice) as is sometimes the case in the literature^{15,16,17}. Some real world examples of such networks could be social networks, both online and offline^{16,17,18}, contact networks in epidemiological studies where any individual can come into contact with any other individual^{19,20,21,22}, or the World Wide Web (WWW) where any website could link to any other website^{6,16}, to name a few. In fact, most real world social, biological, and technical networks studied in the literature will fall into this category, where link formation is not constrained by node type^{6,16}. In our behavioural model for homogeneous networks, attachments are based on node selection probabilities that minimise maximum exposure to the least fit nodes.
 2
Heterogeneous networks, where nodes are distinguished by type, and only links between certain types are feasible. Networks characterised as bipartite or kpartite graphs in the literature^{16,23} are heterogeneous networks in this sense. Some real world examples of such heterogeneous networks include collaboration networks where the actors and collaborative activities are both represented as nodes^{24}, genes and conditions both represented as nodes in microarray data, customers and items both represented as nodes in collaborative filtering^{23}, pollination networks where pollinators feed only on a subset of available flowers^{25}, or contact networks in illnesses that spread not from person to person directly but through a vector, such as dengue or malaria^{26,27}.
The constraints on attachment in heterogeneous networks can take many forms, and these constraints are contextdependent. Some of these constraints are trivial. Therefore, rather than attempting to analyse all subtypes of heterogeneous networks that can possibly arise from such constraints, we choose here to focus on one interesting subtype: tiered networks, where each tier contains nodes of a certain type unique to that tier, and from any given tier, only connections to/from the tier ‘below’ or ‘above’ are feasible. Hierarchical and multilayer (tiered) networks have been much studied in recent years, both in terms of topology and in the context of networked games^{28,29,30,31,32,33}, and networks of this type are frequently used to represent supply chains, where four tiers are commonly modelled, namely suppliers, manufacturers, distributers and retailers^{34,35}. Other real world examples for such tiered networks may include tiered bipartite graphs used in gene regulatory network analysis, where for example, a top layer of unobserved regulators can connect with a bottom layer of observed mRNA expression values^{36}, or food webs where each trophic level (producer, primary consumers, secondary consumers, etc) serves as a tier and connections are only permitted between adjacent tiers^{37}. In tiered networks, feasible sets of nodes take the form of paths, so the problem is to find path selection probabilities that minimise maximum exposure to least fit nodes, and then base attachments on the path selection probabilities.
The two cases are distinguished by the node types available and the constraints on link formation, not by resultant topology. Indeed, fitnessbased proportional attachment models have been used to model each case, which is why we study them, and each case can result in scalefree topologies with power law degree distributions^{3,4,5,6,15,16,17,18,23,25,34,35}. In particular, tiered networks such as supply chain networks are often scalefree with power law degree distributions^{38,39}, even though the tiered visualisation often obscures this.
For each case (homogeneous networks and heterogeneous networks), we formulate a linear program, which minimises the maximum exposure to node unfitness. By solving the linear programs, we prove (analytically and numerically) that, when node unfitness is defined as the inverse of node fitness, minimising maximum expected network unfitness leads to a node attachment probability that is proportional to the node fitness. Rearrangement of the corresponding Lagrangian equation reveals an equivalent minmax problem^{40}, which has a useful game theoretic interpretation, as we will show^{41}. An iterative solution process, which mimics a mixedstrategy, noncooperative, twoplayer, zerosum game, is then presented for each case, with convergence to equilibrium shown by example. For the case of path selection, the inequality constraints in the linear program generate dual variables, which convert the minmax problem into a shortest path problem, thereby avoiding full set or path enumeration. We then implement this iterative solution process as a computer program and compute the attachment probabilities, which confirm our results obtained by direct solution of the linear program. We use networks of finite size in each numerical example.
The iterative solution process describes an evolutionary mechanism whereby weaker nodes are repeatedly avoided. Therefore, we demonstrate that such a mechanism could result in attachment probabilities that are proportional to node fitness.
Background
Scalefree networks are ubiquitous^{15,16,17,42,43,44,45,46}. They display powerlaw degree distributions^{2,17,42,47}, and are impressively robust to random node failure or damage^{48}. However, they are vulnerable to carefully designed targeted attacks^{17,48,49,50}. The growth mechanisms responsible for the prevalence of the scalefree networks has been an intensely researched area in the past decade, and the preferential attachment mechanism (the most important element in the BarabásiAlbert model) is the most wellknown explanation for the prevalence of scalefree networked structures^{2,15,42,43}. The preferential attachment mechanism stipulates that the probability of a new node making a link with an existing node is proportional to the number of links (degree) of the existing node. That is, the probability p_{i} that a new node makes a connection to an existing node i with degree k_{i} is given by:
where N is the set of nodes to which the new node could connect. Therefore, this simple degreebased attachment is a richgetricher mechanism, where nodes with already high degree are more likely to acquire more links. It is also a mechanism where the degree of a particular node is strongly correlated to its age^{2,15,42,47}.
In reality, there are factors other than the age and the number of existing connections, which influence the ability of a node to acquire further links. Web pages, companies, and actors all have intrinsic qualities that influence the rate at which they can acquire links^{6,47}. For example, in the World Wide Web, even though Google was a relative latecomer, it quickly overtook other search engines such as Alta Vista and Inktomi in both performance and the number of links, and very quickly became the biggest hub of the World Wide Web^{47}. Similarly, in other contexts (for example, the selection of sexual partners, the selection of a firm to acquire supplies from, or the process of deciding to send friend requests in Facebook) it can be seen that late comers can become relatively ‘famous’ in terms of their connectivity.
In order to explain latecomers acquiring links relatively quickly, a growth model has to take into account the intrinsic property of being desired as a connection by other nodes. In network science this property is called the ‘fitness’ of the node^{3,4,5,7,8,9,10,29,47,51,52}. The concept of node fitness can be thought of as the amalgamation of all the attributes of a given node that contribute to its propensity to attract links. Indeed, one of these attributes could be the node degree, which would be a dynamic attribute that changes value as the network grows, whereas many other attributes of fitness would be static.
Hence, a number of studies have proposed alternative growth mechanisms based on the notion of node fitness. In many of these studies, preferential attachment is not used at all, and it is argued that the underlying fitness distributions are directly responsible for the emergence of scalefree networks and other wellknown topologies in the corresponding systems^{7}. A good example of this approach is the study of Caldarelli et al.^{8} which proposed a goodgetricher mechanism that gives rise to power law degree distributions in networks. In this mechanism, links between two nodes are made with a probability, which is a symmetric function of the fitness of both nodes. Caldarelli et al.^{8,9} show that when the underlying node fitness distribution follows a power law, the resultant network will display a power law degree distribution. By invoking Zipf’s law^{53}, they argue that in many real world systems, power law fitness distributions emerge, leading to power law node degree distributions without a preferential attachment mechanism. This observation is presented as an alternative explanation for the prevalence and robustness of power law node degree distributions, implying that preferential attachment models are not the only explanation for power law node degree distributions^{7,10,12}.
Fitnessbased proportional attachment models (which use the intrinsic fitness of the nodes as the quantity to compute the preference with) can be thought of as hybrids of the two classes of growth models mentioned above. They are hybrids in the sense that they take ‘preferential attachment’ from models such as the BarabásiAlbert model, and ‘fitness’ from models such as the Caldarelli model. Although preferential attachment is not needed for the emergence of scalefree networks, these hybrids are attractive because they can be used to model the emergence of scalefree networks even when the underlying fitness distribution is not power law^{47}. A prominent example of such a hybrid model is the BianconiBarabási model^{4,54}, which represents the attachment probabilities as:
where k_{i} represents the degree of node i and ϕ_{i} represents its fitness. As can be seen from the above formulation, between two nodes i and j with the same fitness (ϕ_{i} = ϕ_{j}), the one with the higher node degree will have the higher probability of selection. Conversely, between two nodes i and j with the same degree (k_{i} = k_{j}) the node with the higher fitness will be selected with a higher probability. In contrast to the BarabásiAlbert model, it is possible in the BianconiBarabási model for a relative newcomer to overtake an older node in terms of number of links^{47}. Empirical studies, such as that by Kong et al.^{55} support the BianconiBarabási model.
Another model which uses both fitness distributions and proportional attachment is Lognormal Fitness Attachment (LNFA) presented by Ghadge et al.^{3,5}. In the LNFA model, the fitness ϕ_{i}, which represents the propensity of node i to attract links, is formed from the product of relevant attributes:
When the number of attributes are sufficiently large and statistically independent, it is shown that node fitness ϕ_{i} will be lognormally distributed, regardless of the type of distribution of the attributes^{3,5}. The probability of connecting a new node j to an existing node i is assumed to be proportional to its fitness as follows:
In contrast to the BianconiBarabási model, the LNFA model does not explicitly consider the node degree, and the propensity of a node to attract links is purely dependent on the node fitness. Therefore in LNFA, despite being in the network for a short period of time, a new node which has a large fitness can make itself a preferential choice for other new nodes entering the network. As explained above, this is a reasonable representation of certain real life network growth processes. The model includes a tunable parameter, the shape parameter of the lognormal distribution, which can be varied to generate a wide spectrum of networks corresponding to different real world contexts.
Fitnessbased proportional attachment models described above have relied on the intuition that the higher the fitness, the more likely a newcomer is to link to it. However, this intuition about a positive correlation does not necessarily imply the proportional attachment formula used in these models, which is only one of several ways in which relatively highfitness nodes can have high connection probabilities. As such, in this paper, we offer a plausible behavioural mechanism for fitnessbased proportional attachment, by proposing the minimisation of maximum exposure to node unfitness as the underlying process.
Results
Table 1 defines the variables and sets used in model derivation.
Case 1  Homogeneous networks: Previous work on fitnessbased attachment models has generally focused on homogeneous networks where any node can attach to any other node^{3,4}. Although many networks are not homogeneous in this sense, we deal with this case first. We show here that the principle of minimising maximum exposure to unfitness results in the fitnessbased proportional attachment model, offering a plausible behavioural basis for attachment proportional to fitness.
We formulate a linear program, which chooses attachment probabilities that minimise maximum exposure to node unfitness, in the following way:
The solution to this problem is:
where the asterisk denotes a solution value. This in turn implies attachment probabilities proportional to node fitness:
and minmax expected network unfitness:
See Methods for an analytical proof. To demonstrate the validity of the above solution numerically, we begin first with smaller systems that can be solved by the Excel Solver. Thus, we generated a set of nodes (with 12 nodes in the set) and fitness values sampled from a lognormal fitness distribution with scale parameter μ = 0 and shape parameter σ = 1.0, since it has been argued in the literature that fitness distributions are typically lognormal^{3} (Lognormal distributions are characterised by scale and shape parameters; see ref. 3 for a discussion on their relationship with the mean and standard deviation of the distribution). For this set of nodes, we solved the above linear program using the Excel Solver. The results are presented in Fig. 1a, which also shows attachment probabilities calculated as being proportional to fitness. The results match exactly. This result does not depend on the nature or standard deviation of the underlying fitness distribution, and in fact we have verified that any fitness distribution will yield the same exact match.
To explore the behavioural basis for attachment proportional to node fitness further (and to devise an algorithm which can easily handle larger systems), consider the following Lagrangian equation for P_{0}:
When this is minimised with respect to p_{j}, j ∈ N and maximised with respect to dual variables q_{j}, j ∈ N and λ the Lagrangian equation has the value of the objective function at the solution and the second and third terms are zero. Rearrangement of the Lagrangian equation gives:
Hence P_{0} is equivalent to:
As proven in Methods, the simple averaging algorithm A_{0}, presented in Table 2, solves P_{1} (and therefore P_{0}).
The demon mentioned in Table 2 represents a force or a threat compelling the system to decrease its exposure to less fit nodes. This force (demon) is measured by , the degree of node avoidance. Where , the demon is exerting no force (it is noted in Methods that by the properties of dual variables if then ).
Depending on the context, the demon could be malicious software or Trojans operating in the World Wide Web, diseases that change the topology of intracellular networks and metabolic maps^{56}, or the ‘family ties’ influence or the socalled Keiretsu^{57} in supply chains which results in less fit firms being chosen. The strategy of minimising maximum exposure to network unfitness therefore describes a wellknown risk averse strategy.
Algorithm A_{0} was implemented as a computer program, using a set of 100 homogenous nodes and a lognormal fitness distribution with σ = 1 (indeed, a technical advantage of such an iterative algorithm is that it could easily solve larger systems which simple linear program implementations such as the Excel Solver may struggle with). The results are shown in Fig. 2a. Again, it could be seen that the attachment probabilities generated by the algorithm match exactly with those generated by a proportional attachment model. Figure 2b shows the convergence of solution for two nodes (as examples), and it can be seen that the solutions converge to the values predicted by proportional attachment based on fitness.
We have conducted similar experiments with varying system sizes, and varying node fitness distributions. In all instances, we get attachment probabilities, which exactly match those calculated by fitnessbased proportional attachment, though the number of iterations for convergence depends on the size of the system.
Case 2  Heterogeneous networks: In some networks, nodes are not homogeneous, so connections can only be made between certain types of nodes. Link formation in heterogeneous networks can be subject to different constraints according to the context. Some of these are trivial. For example, in bipartite networks, links are usually made between nodes of the ‘opposing’ types^{58}. In some polypartite networks too, links can be made between any pair of nodes as long as they do not belong to the same type: for instance, in mentoring programs, people who have disparate levels of seniority and/or skill are usually matched. A first year undergraduate could be mentored by a second, third or fourth year student but not by another freshman. In other contexts, a feasible set must exist before links can be made within that set. For example, if a social network is constructed among individuals who play the game of cricket, each set must have exactly eleven players including batsmen, bowlers and wicket keepers before they can constitute a team, though once constituted, social links can be made between any two individuals of such a team. Therefore, attachment behaviours prevalent in such heterogeneous networks are also diverse and contextspecific.
Rather than making a general study, we here choose to focus on an interesting special case  the tiered network. In particular, we choose to study supply chain networks (SCNs), which are frequently described by such tiered networks, where there are several types of nodes, and only adjacent tiers can be linked. Supply chain networks provide one of the richest examples for a heterogeneous network, because they have nodes of several types, and they possess a hierarchical structure, where any firm (node) can only connect to firms in the tier above or below. Supply chain networks have been studied extensively, and preferential attachment mechanisms have been used to model their growth^{34,35,38,39,57}. Typically, SCNs have four tiers: suppliers, manufacturers, distributors and retailers^{34,35,38}. Figure 3 shows a network representing a tiered SCN.
Let us therefore consider the case where each firm minimises its maximum exposure to unfitness in the tier immediately above. This reflects reality in many supply chains, as firms in one tier often do not have visibility beyond the tier immediately upstream^{34,35}. This leads to the following linear program:
where the index k refers to a particular tier in the SCN. Since every feasible path (equivalent to feasible sets in a more general heterogeneous network scenario) must pass through each tier, the node selection probabilities must sum to one for each tier. The path (set) selection probabilities may thus be replaced by node selection probabilities so problem P_{2} reduces to K independent problems and can be solved as such:
with minmax expected tier unfitness for each tier k given by:
The linear program formulated above was solved using the Excel Solver, and as an example, we used a set of 12 nodes, which belonged to four types (tiers) in equal number. The fitness distributions were again lognormal, with zero scale parameter and shape parameters σ_{1} = 3, σ_{2} = 1, σ_{3} = 1, σ_{4} = 0.1 for suppliers, manufacturers, distributors and retailers respectively. The shape parameters used in each tier, as noted above, represent a SCN with diminishing oligopoly conditions from upstream (suppliers) to downstream (retailers). At the retailer level, the differences in node fitness across the tier are small, so the retailers of this product can be assumed to be in almost perfect competition. An example of such a SCN is for computer spare parts, where valuable minerals such as Coltan^{59} are sourced from suppliers who tend to be in an oligopoly market in unique geographical locations, such as the Democratic Republic of Congo. Subsequently, the manufacturers and distributors of these unique and specialised parts are also likely to be in oligopoly markets, although to a lesser extent when compared to the raw material suppliers. Finally, the retailers of these computer parts will be almost homogeneous with no significant differentiation in ‘fitness’.
The solution for this particular example is presented in Fig. 1b. It can be seen that the node selection probabilities computed by fitnessbased proportional attachment match exactly the solution of the linear program. Again, we have verified that this result does not depend on the fitness distributions of tiers, and any fitness distribution for each tier will yield the same result, though in the example presented we have used ‘realistic’ fitness distributions as described above.
Now, in order to arrive at an iterative algorithm which leads to the above solution (and is able to handle larger systems), let us note that P_{2} may be reexpressed as the following maxmin problem:
This leads to the following Lagrangian equation:
The structure of P_{3} reveals that the problem is equivalent to a twoplayer uncooperative mixed strategy game, where one player (call it a scheduler) seeks to minimise network unfitness by choosing a path while tierspecific ‘demons’ seek to maximise the same metric by imposing exposure to unfitness on one node per tier.
The evolutionary algorithm to find the solution requires modification from A_{0} so that maximum unfitness is minimised within each tier. We now undertake the process of finding the shortest or least unfit path (which is equivalent to finding the best set in the more general heterogeneous network case). The modified algorithm is given as Algorithm A_{1} in Table 3.
Again, to show that the iterative algorithm A_{1} converges to attachment probabilities which could be calculated by fitnessbased proportional attachment, we implemented A_{1} as a computer program. Here we show a sample solution by considering a set of 100 nodes, which belonged to four types (tiers) in equal number. The nodes had lognormal fitness distributions with zero scale parameter and shape parameters σ_{1} = 3, σ_{2} = 1, σ_{3} = 1, σ_{4} = 0.1 for suppliers, manufacturers, distributors and retailers respectively. Convergence was achieved, and the results are shown in Fig. 2c, where we may see that the solution matches exactly the attachment probabilities computed by fitnessbased proportional attachment. Figure 2d shows the convergence of the solution for two nodes (as examples), and it can be seen that the solutions converge to the exact values predicted by proportional attachment based on fitness. We repeated this experiment for different system sizes and found that while the number of iterations needed depended on the system size, the results were otherwise identical (converging always to values predicted by fitnessbased proportions).
Discussion
In summary, we have proposed the minimisation of maximum exposure to node unfitness as an evolutionary mechanism that results in the proportional fitnessbased attachment rule used in network growth models. We have studied homogeneous networks, and an especially interesting and illuminating subset of heterogeneous networks, namely tiered networks. We have proven, both analytically and numerically, that for both homogeneous and tiered heterogeneous networks, the abovementioned mechanism leads to attachment probabilities which are proportional to (node) fitness. For both categories of network, we have also developed iterative algorithms with proven convergence, which offer a behavioural template possibly mimicking the cognitive decision making process that results in fitnessbased attachment. Our results shed light on the validity and interpretation of a range of fitnessbased growth models which are used to study complex network evolution in various contexts.
It is worth pointing out here that our results justify both the BianconiBarabási and the Ghadge models of proportional attachment. The BianconiBarabási model^{4} calculates attachment probabilities as proportional to the product of node degree and fitness, whereas the Ghadge model^{3} computes them as proportional to just the fitness. The mechanism of minimising the exposure to maximum unfitness that we propose here, at first glance, seems to support the Ghadge model, since it returns attachment probabilities proportional to node fitness. However, in reality, players (nodes) may view other players (nodes) who have a high number of links as more desirable: that is, they could appear to have relatively higher ‘fitness’. Therefore, the Ghadge and BianconiBarabási models could be reconciled by making the fitness score endogenous to the model, and making node degree one factor in the fitness calculation. Once this is done, the mechanism we have proposed is equally relevant to explain both BianconiBarabási and Ghadge models.
We have further shown that for heterogeneous or tiered networks, an evolutionary mechanism, whereby least unfit sets or paths are iteratively generated, can lead to the minimization of maximum exposure to unfitness. We have noted that this mechanism has the added advantage that it avoids the full enumeration of sets or paths. In the case of tiered networks, such as supply chain networks, the mechanism explains how nodes (e.g., firms) can make informed choices (e.g., in terms of selecting suppliers) without fully analysing the entire set of feasible paths.
Methods
Complementary slackness conditions
Consider the Lagrangian equation for the minimum maximum exposure to unfitness problem P_{0} in the homogeneous network case:
As a result of the complementary slackness conditions, at the solution (denoted by*)
and
Nonnegativity of primal and dual variables in homogeneous networks
All primal variables are positive when all values of node fitness are positive.
Lemma 1: in the homogeneous case for
Proof 1:
Equivalence of primal and dual variables in homogeneous networks for positive fitness values
In the case of homogeneous networks, primal variables are equal to corresponding dual variables when fitness values are positive.
Lemma 2: and V^{*} = λ^{*} for homogeneous networks when node fitness values are positive.
Proof 2: Let us recall that the principle of choosing attachment probability to minimize maximum expected network unfitness gives rise to the following linear program:
Consider the following Lagrangian equation for P_{0} (note that in Lagrangian formulation, λ could be introduced with either a positive or negative sign):
Rearranging the above, we get;
Comparing the second Lagrangian equation (the Lagrangian for the dual problem) with the first (the Lagrangian for the primal problem) we note that at the solution V is equal to λ because the second and third terms are zero at the solution and furthermore q_{j} is equal to p_{j} by complementary slackness because p_{j} > O when all values of node fitness are positive (see Lemma 1). Hence at the solution,
Convergence of the Method of Successive Averages
Algorithm A_{0} is presented in Table 2.
Lemma 3: Algorithm A_{0} converges.
Proof 3: Step 1 finds a descent direction for V given with respect to and Step 2 moves the node probabilities in this direction. Step 3 finds an ascent direction for V given with respect to and Step 4 moves the node dual variables in this direction. While the step sizes get smaller as iterations progress, the sum of step sizes has no upper limit, so the solution can always be reached.
A similar proof of convergence can be constructed for algorithm A_{1}.
Additional Information
How to cite this article: Bell, M. et al. Network growth models: A behavioural basis for attachment proportional to fitness. Sci. Rep. 7, 42431; doi: 10.1038/srep42431 (2017).
Publisher's note: Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
References
Orsini, C. et al. Quantifying randomness in real networks. Nature communications 6 (2015).
Barabási, A. & Albert, R. Emergence of Scaling in Random Networks. Science 286, 509–512 (1999).
Ghadge, S., Killingback, T., Sundaram, B. & Tran, D. A statistical construction of powerlaw networks. International Journal of Parallel, Emergent and Distributed Systems 25, 223–235 (2010).
Bianconi, G. & Barabási, A. Competition and multiscaling in evolving networks. Europhysics Letters (EPL) 54, 436–442 (2001).
Nguyen, K. & Tran, D. A. FitnessBased Generative Models for PowerLaw Networks. In Handbook of Optimization in Complex Networks (pp. 39–53) (Springer: US, 2012).
Barabási, A. Linked: The New Science of Networks (Perseus Pub., 2002).
Garlaschelli, D. & Loffredo, M. FitnessDependent Topological Properties of the World Trade Web. Phys. Rev. Lett. 93 (2004).
Caldarelli, G., Capocci, A., De Los Rios, P. & Muñoz, M. ScaleFree Networks from Varying Vertex Intrinsic Fitness. Phys. Rev. Lett. 89 (2002).
Servedio, V., Caldarelli, G. & Buttà, P. Vertex intrinsic fitness: How to produce arbitrary scalefree networks. Physical Review E 70 (2004).
Mendes, G. & da Silva, L. Generating more realistic complex networks from powerlaw distribution of fitness. Brazilian Journal of Physics 39 (2009).
Bedogne’, C. & Rodgers, G. Complex growing networks with intrinsic vertex fitness. Physical Review E 74 (2006).
Fan, Z. A fitnessbased model for complex networks (2005).
BenAkiva, M. & Lerman, S. Discrete choice analysis. (MIT Press, 1985).
Amaral, L. A. & Ottino, J. M. Complex networks. The European Physical Journal BCondensed Matter and Complex Systems 38(2), 147–162 (2004).
Barabási, A. L. & Bonabeau, E. Scalefree networks. Scientific American 288(5), 50–59 (2003).
Dorogovtsev, S. N. & Mendes, J. F. Evolution of Networks: From Biological Nets to the Internet and WWW.. (Oxford University Press, 2013).
Park, J. & Newman, M. E. Statistical mechanics of networks. Physical Review E 70(6), 066117 (2004).
Chung, K. S. K., Piraveenan, M. & Hossain, L. Topology of online social networks. In Encyclopedia of Social Network Analysis and Mining (pp. 2191–2202) (Springer: New York, 2014).
Thedchanamoorthy, G., Piraveenan, M., Uddin, S. & Senanayake, U. Influence of vaccination strategies and topology on the herd immunity of complex networks. Soc. Netw. Anal. Min. 4 (2014).
Meyers, L., Newman, M. & Pourbohloul, B. Predicting epidemics on directed contact networks. Journal of Theoretical Biology 240, 400–418 (2006).
Piraveenan, M., Prokopenko, M. & Hossain, L. Percolation Centrality: Quantifying GraphTheoretic Impact of Nodes during Percolation in Networks. PLoS ONE 8, e53095 (2013).
Adamic, L. et al. PowerLaw Distribution of the World Wide Web. Science 287, 2115 (2000).
Long, B., Wu, X., Zhang, Z. M. & Yu, P. S. Unsupervised learning on kpartite graphs. In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge discovery and data mining (pp. 317–326) (ACM, 2006).
Ramasco, J. J., Dorogovtsev, S. N. & PastorSatorras, R. Selforganization of collaboration networks. Physical review E 70(3), 036106 (2004).
Dupont, Y., Padrón, B., Olesen, J. & Petanidou, T. Spatiotemporal variation in the structure of pollination networks. Oikos 118, 1261–1269 (2009).
Halstead, S. Dengue Virus–Mosquito Interactions. Annual Review of Entomology 53, 273–291 (2008).
Abeku, T. et al. Malaria epidemic early warning and detection in African highlands. Trends in Parasitology 20, 400–405 (2004).
Wang, Z., Wang, L., Szolnoki, A. & Perc, M. Evolutionary games on multilayer networks: a colloquium. The European Physical Journal B 88 (2015).
Perc, M., Szolnoki, A. & Szabó, G. Restricted connections among distinguished players support cooperation. Physical Review E 78 (2008).
Iqbal, A. & Toor, A. Quantum mechanics gives stability to a Nash equilibrium. Phys. Rev. A 65 (2002).
Li, Q., Chen, M., Perc, M., Iqbal, A. & Abbott, D. Effects of adaptive degrees of trust on coevolution of quantum strategies on scalefree networks. Sci. Rep. 3 (2013).
SalesPardo, M., Guimera, R., Moreira, A. & Amaral, L. Extracting the hierarchical organization of complex systems. Proceedings of the National Academy of Sciences 104, 15224–15229 (2007).
Arenas, A., DíazGuilera, A. & Guimerà, R. Communication in Networks with Hierarchical Branching. Phys. Rev. Lett. 86(14), 3196–3199 (2001).
Klibi, W., Martel, A. & Guitouni, A. The design of robust valuecreating supply chain networks: A critical review. European Journal of Operational Research 203, 283–293 (2010).
Tsiakis, P., Shah, N. & Pantelides, C. C. Design of multiechelon supply chain networks under demand uncertainty. Industrial & Engineering Chemistry Research 40(16), 3585–3604 (2001).
Alvarez, A. & Woolf, P. Partially observed bipartite network analysis to identify predictive connections in transcriptional regulatory networks. BMC Systems Biology 5, 86 (2011).
Nagurney, A. & Nagurney, L. Dynamics and equilibria of ecological predator–prey networks as nature’s supply chains. Transportation Research Part E: Logistics and Transportation Review 48, 89–99 (2012).
Hearnshaw, E. J. & Wilson, M. M. A complex network approach to supply chain network theory. International Journal of Operations & Production Management 33(4), 442–469 (2013).
Sun, H. & Wu, J. Scalefree characteristics of supply chain distribution networks. Modern Physics Letters B 19, 841–848 (2005).
Du, D. & Pardalos, P. Minimax and Applications. (Kluwer Academic Publishers, 1995).
Hauert, C. & Szabó, G. Game theory and physics. American Journal of Physics 73(5), 405–414 (2005).
Barabási, A. ScaleFree Networks: A Decade and Beyond. Science 325, 412–413 (2009).
Barabási, A., Albert, R. & Jeong, H. Scalefree characteristics of random networks: the topology of the worldwide web. Physica A: Statistical Mechanics and its Applications 281, 69–77 (2000).
Cavagna, A. et al. Scalefree correlations in starling flocks. Proceedings of the National Academy of Sciences 107, 11865–11870 (2010).
Mitchell, M. Complex systems: Network thinking. Artificial Intelligence 170, 1194–1212 (2006).
Nunes Amaral, L. & Guimera, R. Complex networks: Lies, damned lies and statistics. Nat Phys 2(2), 75–76 (2006).
Barabási, A. Network Science. (Cambridge University Press, 2016).
Albert, R., Jeong, H. & Barabási, A. Error and attack tolerance of complex networks. Nature 406, 378–382 (2000).
Perc, M. Evolution of cooperation on scalefree networks subject to error and attack. New Journal of Physics 11, 033027 (2009).
Iyer, S., Killingback, T., Sundaram, B. & Wang, Z. Attack Robustness and Centrality of Complex Networks. PLoS ONE 8(4), e59613 (2013).
Wang, Z., Murks, A., Du, W., Rong, Z. & Perc, M. Coveting thy neighbors fitness as a means to resolve social dilemmas. Journal of Theoretical Biology 277, 19–26 (2011).
Østman, B., Hintze, A. & Adami, C. Critical properties of complex fitness landscapes. In 12^{th}International Conference on the Synthesis and Simulation of Living Systems. arXiv preprint arXiv:1006.2908 (2010).
Marsili, M. & Zhang, Y. Interacting Individuals Leading to Zipf’s Law. Phys. Rev. Lett. 80, 2741–2744 (1998).
Adamic, L. et al. PowerLaw Distribution of the World Wide Web. Science 287, 2115 (2000).
Kong, J., Sarshar, N. & Roychowdhury, V. Experience versus talent shapes the structure of the Web. Proceedings of the National Academy of Sciences 105, 13724–13729 (2008).
Barabási, A.L., Gulbache, N. & Loscalzo, J. Network medicine: a networkbased approach to human disease. Nature Rev. Genet. 12, 56–68 (2011).
Matous, P. & Todo, Y. “Dissolve the Keiretsu, or Die”: A longitudinal study of disintermediation in the Japanese automobile manufacturing supply networks. RIETI Discussion Paper Series No. 15039 (2015).
Guimerà, R., SalesPardo, M. & Amaral, L. Module identification in bipartite and directed networks. Physical Review E 76(3) (2007).
Hayes, K. & Burge, R. Coltan Mining in the Democratic Republic of Congo. (Fauna & Flora International, 2003).
Acknowledgements
The research underpinning this paper has been funded by the Australian Research Council (ARC) under grant DP140103643.
Author information
Authors and Affiliations
Contributions
M. Bell and S.P. conceptualised the research. M. Bell made the initial findings, devised the evolutionary algorithms, and wrote the manuscript. S.P. wrote the software and provided the visualisations and numerical examples. M.P. reviewed the literature, designed the software, and wrote the manuscript. T.L., M. Bliemer and C.R. helped revise the manuscript. All authors contributed to research design, analysis of results, and finetuning of ideas.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing financial interests.
Supplementary information
Rights and permissions
This work is licensed under a Creative Commons Attribution 4.0 International License. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in the credit line; if the material is not included under the Creative Commons license, users will need to obtain permission from the license holder to reproduce the material. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/
About this article
Cite this article
Bell, M., Perera, S., Piraveenan, M. et al. Network growth models: A behavioural basis for attachment proportional to fitness. Sci Rep 7, 42431 (2017). https://doi.org/10.1038/srep42431
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/srep42431
This article is cited by

Timeactivity budget of urbanadapted freeranging dogs
acta ethologica (2022)

The aging effect in evolving scientific citation networks
Scientometrics (2021)

A generative network model of neurodevelopmental diversity in structural brain organization
Nature Communications (2021)

Detecting differences in the topology of scalefree networks grown under timedynamic topological fitness
Scientific Reports (2020)

Model and Control for a Class of Networked Evolutionary Games with Finite Memories and TimeVarying Networks
Circuits, Systems, and Signal Processing (2018)
Comments
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.