SlideShare a Scribd company logo
Small updates of matrix functions
used for network centrality
Francesco Tudisco
joint work with Stefano Pozza (Charles University in Prague)
Department of Mathematics and Statistics, University of Strathclyde, UK
IMA Conf. Numerical Linear Algebra and Optimization
Birmingham June 28, 2018
Introduction
Results
Examples
Notation: graphs and matrices
Motivations and goal
Adjacency matrix and its powers
(A)ij = 1 if i ⇝ j, otherwise Aij = 0.
(A2)ij = n
s=1 AisAsj = #{s : i ⇝ s and s ⇝ j}
= number of paths of length 2 from i to j
(A3)ij = n
s,t=1 AisAstAtj = #{s, t : i ⇝ s and s ⇝ t and t ⇝ j}
= number of paths of length 3 from i to j
· · ·
(Ak)ij = number of paths of length k from i to j
1 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
Introduction
Results
Examples
Notation: graphs and matrices
Motivations and goal
Network indices based on f(A)
f(A) = c0I + c1A + c2A2
+ c3A3
+ · · · with ck ≥ 0
f(A)ij = weighted sum of paths of any length from i to j
2 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
Introduction
Results
Examples
Notation: graphs and matrices
Motivations and goal
Network indices based on f(A)
f(A) = c0I + c1A + c2A2
+ c3A3
+ · · · with ck ≥ 0
f(A)ij = weighted sum of paths of any length from i to j
f-Centrality: f(A)ii = importance of node i
2 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
Introduction
Results
Examples
Notation: graphs and matrices
Motivations and goal
Exponential and resolvent
Typical choices are:
ck =
1
k!
exp(A) = I + A +
1
2
A2
+
1
3!
A3
+ · · ·
and
ck = αk
rα(A) = I + αA + α2
A2
+ α3
A3
+ · · ·
Note: the longer the path length the smaller the weighting coefficient
3 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
Introduction
Results
Examples
Notation: graphs and matrices
Motivations and goal
Problem setting
We are interested in how f(A) changes when the structure of G = (V, E)
undergoes a small perturbation
Setting:
• We add remove or modify the edges in a set δE ⊆ V × V
• We obtain a graph G = (V, E) with adj(G) = A = A + δA
• S ⊆ V = set of sources of edges in δE
• T ⊆ V = set of tips of edges in δE
4 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
Introduction
Results
Examples
Notation: graphs and matrices
Motivations and goal
Why?
• Computing f(A)ii is a costly operation
• Often we are interested in the first few most important nodes
• Changes or biases are more likely to occur on nodes that are “far”
from important ones
5 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
Introduction
Results
Examples
Notation: graphs and matrices
Motivations and goal
Related work: f(A + small rank)
Important issue: Computing f(A + δA) from f(A) when δA = small rank
6 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
Introduction
Results
Examples
Notation: graphs and matrices
Motivations and goal
Related work: f(A + small rank)
Important issue: Computing f(A + δA) from f(A) when δA = small rank
• f(x) = x−1 −→ Sherman–Morrison–Woodbury formula
6 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
Introduction
Results
Examples
Notation: graphs and matrices
Motivations and goal
Related work: f(A + small rank)
Important issue: Computing f(A + δA) from f(A) when δA = small rank
• f(x) = x−1 −→ Sherman–Morrison–Woodbury formula
• f(x) is rational
Bernstein, Van Loan, SIMAX, 2010
6 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
Introduction
Results
Examples
Notation: graphs and matrices
Motivations and goal
Related work: f(A + small rank)
Important issue: Computing f(A + δA) from f(A) when δA = small rank
• f(x) = x−1 −→ Sherman–Morrison–Woodbury formula
• f(x) is rational
Bernstein, Van Loan, SIMAX, 2010
• f(x) is analytic
Beckermann, Kressner, Schweitzer, SIMAX, 2018
6 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
Introduction
Results
Examples
Notation: graphs and matrices
Motivations and goal
Related work: f(A + small rank)
Important issue: Computing f(A + δA) from f(A) when δA = small rank
• f(x) = x−1 −→ Sherman–Morrison–Woodbury formula
• f(x) is rational
Bernstein, Van Loan, SIMAX, 2010
• f(x) is analytic
Beckermann, Kressner, Schweitzer, SIMAX, 2018
We derive a-priori bounds of the type
|f(A)ii − f(A)ii| = O
1
Mδ
with δ ≈ distance i ←→ δE
6 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
Introduction
Results
Examples
Notation: graphs and matrices
Motivations and goal
Two cycles example
A = adj(G)
G = 100
99
1
2
50 200
199
198
101
→
e
No closed walk passes trough
→
e =⇒ f(A)ii is constant for all i
7 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
Introduction
Results
Examples
Notation: graphs and matrices
Motivations and goal
Two cycles example
A = adj(G) −→ A = adj(G)
G = 100
99
1
2
50 200
199
198
101
→
e
←
e = δE
T S
No closed walk passes trough
→
e =⇒ f(A)ii is constant for all i
7 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
Introduction
Results
Examples
Notation: graphs and matrices
Motivations and goal
Two cycles example
A = adj(G) −→ A = adj(G)
G = 100
99
1
2
50 200
199
198
101
→
e
←
e = δE
T S
No closed walk passes trough
→
e =⇒ f(A)ii is constant for all i
• The number of paths of any length (100) → (100) increases
• Only the number of very long paths (50) → (50) increases
• We expect f(A)50,50 ≈ f(A)50,50 but f(A)100,100 ≫ f(A)100,100
7 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
Introduction
Results
Examples
Bounds
Algorithm
Two key observations
δ = distG(i, S) + distG(T, i)
8 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
Introduction
Results
Examples
Bounds
Algorithm
Two key observations
δ = distG(i, S) + distG(T, i)
If i /∈ S, T, then:
pk(A)ii = pk(A)ii
for every polynomial pk of degree k ≤ δ.
8 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
Introduction
Results
Examples
Bounds
Algorithm
Two key observations
δ = distG(i, S) + distG(T, i)
If i /∈ S, T, then:
pk(A)ii = pk(A)ii
for every polynomial pk of degree k ≤ δ.
If f is analytic on Ω = (convex continuum), then:
f(A) = γ0I + γ1Φ1(A) + γ2Φ2(A) + γ3Φ3(A) + · · ·
Φk = k-th Faber polynomial of Ω
8 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
Introduction
Results
Examples
Bounds
Algorithm
Main theorem
Theorem
Ω convex continuum containing W(A)∪W(A), ϕ : Ω → C conformal
map of Ω, f analytic on {x : |ϕ(x)| > τ} ⊇ Ω.
Then:
|f(A)ii − f(A)ii| ≤ c(τ)
1
τδ+2
where
c(τ) =
2
π
τ
τ − 1 |ϕ(x)|=τ
|f(x)| dϕ(x)
Particular choices of f and Ω lead to explicit bounds
9 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
Introduction
Results
Examples
Bounds
Algorithm
Ellipse shaped Ω
W(A)
W(A)
Ω
c a
b
Bounds for exp(A) and rα(A) in terms of a, b and c
10 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
Introduction
Results
Examples
Bounds
Algorithm
If δ > b − 1, then: Exponential
exp(A)ii − exp(A)ii ≤
4eℜ(c) p(δ + 1)
p(δ + 1) − a+b
δ+1
a + b
δ + 1
eq(δ+1)
p(δ + 1)
δ+1
with q(t) = 1 + a2−b2
t2+t
√
t2+a2−b2
and p(t) = 1 + 1 + (a2 − b2)/t2
11 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
Introduction
Results
Examples
Bounds
Algorithm
If δ > b − 1, then: Exponential
exp(A)ii − exp(A)ii ≤
4eℜ(c) p(δ + 1)
p(δ + 1) − a+b
δ+1
a + b
δ + 1
eq(δ+1)
p(δ + 1)
δ+1
with q(t) = 1 + a2−b2
t2+t
√
t2+a2−b2
and p(t) = 1 + 1 + (a2 − b2)/t2
If 1/α /∈ Ω, then: Resolvent
rα(A)ii − rα(A)ii ≤
4
1 − a+b
(|α−1−c|−ε)pε
1
ε
a + b
|α−1 − c| − ε
1
pε
δ+1
with pε = 1 + 1 − a2−b2
(|α−1−c|−ε)2 and 0 < ε < |α−1 − c| − a
11 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
Introduction
Results
Examples
Bounds
Algorithm
How to do in practice
Compute f(A)ii = eT
i Aei with non-Hermitian Lanczos method.
{v0, . . . , vt−1}, {w0, . . . , wt−1}= computed bases of Kt(A, ei), Kt(AT, ei)
Theorem
dG(m, i) = smallest k such that (vk)m ̸= 0
dG(i, m) = smallest k such that (wk)m ̸= 0
m = 1, . . . , n
12 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
Introduction
Results
Examples
Bounds
Algorithm
How to do in practice
Compute f(A)ii = eT
i Aei with non-Hermitian Lanczos method.
{v0, . . . , vt−1}, {w0, . . . , wt−1}= computed bases of Kt(A, ei), Kt(AT, ei)
Theorem
dG(m, i) = smallest k such that (vk)m ̸= 0
dG(i, m) = smallest k such that (wk)m ̸= 0
m = 1, . . . , n
Elementary modification of Lanczos algorithm allows to simultaneously
compute f(A)ii, i = 1, . . . , n and the all-pair shortest-path distances
12 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
Introduction
Results
Examples
Two cycles
London Transports Network
Small world networks
Two cycles
100
99
1
2
50 200
199
198
101
→
e
←
e
T S
exp(A) r1/3(A)
0 50 100 150 200
10 -20
10 -10
10 0
0 50 100 150 200
10 -20
10 -10
10 0
13 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
Introduction
Results
Examples
Two cycles
London Transports Network
Small world networks
London trains
14 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
Introduction
Results
Examples
Two cycles
London Transports Network
Small world networks
London trains
50 100 150 200 250 300
10-20
10-10
100
1010
50 100 150 200 250 300
10-20
10-10
100
1010
50 100 150 200 250 300
10-20
10-10
100
1010
5 nodes 15 nodes
30 nodes
14 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
Introduction
Results
Examples
Two cycles
London Transports Network
Small world networks
Normalized adjacency
100 200 300 400
10 -20
10 -10
10 0
Erdös
1000 2000 3000 4000
10-20
10-10
100
Facebook
1000 2000 3000 4000 5000
10 -20
10 -10
10 0
GRQC
1000 2000 3000 4000 5000 6000
10 -20
10 -10
10 0
Gnutella
15 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
Introduction
Results
Examples
Two cycles
London Transports Network
Small world networks
Reference
Details and “much more” in:
Stefano Pozza and Francesco Tudisco
Stability of network indices defined by means of matrix functions
SIAM J Matrix Anal Appl, 2018
For example: Bounds for f(A)ij, f(D−1A), f(D−1/2AD−1/2)
16 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
Introduction
Results
Examples
Two cycles
London Transports Network
Small world networks
Reference
Details and “much more” in:
Stefano Pozza and Francesco Tudisco
Stability of network indices defined by means of matrix functions
SIAM J Matrix Anal Appl, 2018
For example: Bounds for f(A)ij, f(D−1A), f(D−1/2AD−1/2)
Thank you for your attention!
16 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality

More Related Content

PDF
Nodal Domain Theorem for the p-Laplacian on Graphs and the Related Multiway C...
PDF
A new Perron-Frobenius theorem for nonnegative tensors
PDF
Optimal L-shaped matrix reordering, aka graph's core-periphery
PDF
Core–periphery detection in networks with nonlinear Perron eigenvectors
PDF
On the Jensen-Shannon symmetrization of distances relying on abstract means
PDF
A series of maximum entropy upper bounds of the differential entropy
PDF
The dual geometry of Shannon information
PDF
Bregman divergences from comparative convexity
Nodal Domain Theorem for the p-Laplacian on Graphs and the Related Multiway C...
A new Perron-Frobenius theorem for nonnegative tensors
Optimal L-shaped matrix reordering, aka graph's core-periphery
Core–periphery detection in networks with nonlinear Perron eigenvectors
On the Jensen-Shannon symmetrization of distances relying on abstract means
A series of maximum entropy upper bounds of the differential entropy
The dual geometry of Shannon information
Bregman divergences from comparative convexity

What's hot (20)

PDF
Patch Matching with Polynomial Exponential Families and Projective Divergences
PDF
Divergence clustering
PDF
On learning statistical mixtures maximizing the complete likelihood
PDF
Ecfft zk studyclub 9.9
PDF
k-MLE: A fast algorithm for learning statistical mixture models
PDF
Classification with mixtures of curved Mahalanobis metrics
PDF
Divergence center-based clustering and their applications
PDF
Tailored Bregman Ball Trees for Effective Nearest Neighbors
PDF
Computational Information Geometry: A quick review (ICMS)
PDF
Darmon Points: an Overview
PDF
Clustering in Hilbert simplex geometry
PDF
Nonconvex Compressed Sensing with the Sum-of-Squares Method
PDF
Tensor Completion for PDEs with uncertain coefficients and Bayesian Update te...
PDF
Murphy: Machine learning A probabilistic perspective: Ch.9
PDF
Proximal Splitting and Optimal Transport
PDF
Low-rank methods for analysis of high-dimensional data (SIAM CSE talk 2017)
PDF
Intro to ABC
PDF
Simplified Runtime Analysis of Estimation of Distribution Algorithms
PDF
sublabel accurate convex relaxation of vectorial multilabel energies
PDF
Levitan Centenary Conference Talk, June 27 2014
Patch Matching with Polynomial Exponential Families and Projective Divergences
Divergence clustering
On learning statistical mixtures maximizing the complete likelihood
Ecfft zk studyclub 9.9
k-MLE: A fast algorithm for learning statistical mixture models
Classification with mixtures of curved Mahalanobis metrics
Divergence center-based clustering and their applications
Tailored Bregman Ball Trees for Effective Nearest Neighbors
Computational Information Geometry: A quick review (ICMS)
Darmon Points: an Overview
Clustering in Hilbert simplex geometry
Nonconvex Compressed Sensing with the Sum-of-Squares Method
Tensor Completion for PDEs with uncertain coefficients and Bayesian Update te...
Murphy: Machine learning A probabilistic perspective: Ch.9
Proximal Splitting and Optimal Transport
Low-rank methods for analysis of high-dimensional data (SIAM CSE talk 2017)
Intro to ABC
Simplified Runtime Analysis of Estimation of Distribution Algorithms
sublabel accurate convex relaxation of vectorial multilabel energies
Levitan Centenary Conference Talk, June 27 2014
Ad

Similar to Small updates of matrix functions used for network centrality (20)

PDF
Relaxation methods for the matrix exponential on large networks
PDF
Fast relaxation methods for the matrix exponential
PPTX
social.pptx
PDF
Lausanne 2019 #4
PDF
GRAPH MATRIX APPLICATIONS.pdf
PDF
Graph Matrices and Application: Motivational overview, matrix of graph, relat...
PDF
Social Network Analysis BAsic Concepts, Methods and Theory
PPTX
Apache Spark GraphX highlights.
PPT
PPTX
Map history-networks-shorter
PDF
Lecture_1_matrix_operations.pdf
PPTX
Network analysis lecture
PDF
Graph Analysis Beyond Linear Algebra
PPT
3centrality-1235089982174yuuhhh803-1.ppt
PDF
Graph Analyses with Python and NetworkX
PPT
Social Network Based Information Systems (Tin180 Com)
PPTX
Networking Assignment Help
PPTX
Graph Theoretic Approach to Describing Regional Economic Structure
PDF
Introduction to Graph Theory
PPTX
Computer Network Homework Help
Relaxation methods for the matrix exponential on large networks
Fast relaxation methods for the matrix exponential
social.pptx
Lausanne 2019 #4
GRAPH MATRIX APPLICATIONS.pdf
Graph Matrices and Application: Motivational overview, matrix of graph, relat...
Social Network Analysis BAsic Concepts, Methods and Theory
Apache Spark GraphX highlights.
Map history-networks-shorter
Lecture_1_matrix_operations.pdf
Network analysis lecture
Graph Analysis Beyond Linear Algebra
3centrality-1235089982174yuuhhh803-1.ppt
Graph Analyses with Python and NetworkX
Social Network Based Information Systems (Tin180 Com)
Networking Assignment Help
Graph Theoretic Approach to Describing Regional Economic Structure
Introduction to Graph Theory
Computer Network Homework Help
Ad

Recently uploaded (20)

PPTX
2. Earth - The Living Planet earth and life
PDF
. Radiology Case Scenariosssssssssssssss
PPTX
DRUG THERAPY FOR SHOCK gjjjgfhhhhh.pptx.
PDF
Mastering Bioreactors and Media Sterilization: A Complete Guide to Sterile Fe...
PPTX
Microbiology with diagram medical studies .pptx
PPTX
The KM-GBF monitoring framework – status & key messages.pptx
PPTX
ANEMIA WITH LEUKOPENIA MDS 07_25.pptx htggtftgt fredrctvg
PDF
bbec55_b34400a7914c42429908233dbd381773.pdf
PDF
Placing the Near-Earth Object Impact Probability in Context
PPT
POSITIONING IN OPERATION THEATRE ROOM.ppt
PDF
AlphaEarth Foundations and the Satellite Embedding dataset
PPTX
2. Earth - The Living Planet Module 2ELS
PPTX
Taita Taveta Laboratory Technician Workshop Presentation.pptx
PPTX
G5Q1W8 PPT SCIENCE.pptx 2025-2026 GRADE 5
PPTX
TOTAL hIP ARTHROPLASTY Presentation.pptx
PPT
The World of Physical Science, • Labs: Safety Simulation, Measurement Practice
PPTX
ognitive-behavioral therapy, mindfulness-based approaches, coping skills trai...
DOCX
Viruses (History, structure and composition, classification, Bacteriophage Re...
PPTX
neck nodes and dissection types and lymph nodes levels
PPTX
Derivatives of integument scales, beaks, horns,.pptx
2. Earth - The Living Planet earth and life
. Radiology Case Scenariosssssssssssssss
DRUG THERAPY FOR SHOCK gjjjgfhhhhh.pptx.
Mastering Bioreactors and Media Sterilization: A Complete Guide to Sterile Fe...
Microbiology with diagram medical studies .pptx
The KM-GBF monitoring framework – status & key messages.pptx
ANEMIA WITH LEUKOPENIA MDS 07_25.pptx htggtftgt fredrctvg
bbec55_b34400a7914c42429908233dbd381773.pdf
Placing the Near-Earth Object Impact Probability in Context
POSITIONING IN OPERATION THEATRE ROOM.ppt
AlphaEarth Foundations and the Satellite Embedding dataset
2. Earth - The Living Planet Module 2ELS
Taita Taveta Laboratory Technician Workshop Presentation.pptx
G5Q1W8 PPT SCIENCE.pptx 2025-2026 GRADE 5
TOTAL hIP ARTHROPLASTY Presentation.pptx
The World of Physical Science, • Labs: Safety Simulation, Measurement Practice
ognitive-behavioral therapy, mindfulness-based approaches, coping skills trai...
Viruses (History, structure and composition, classification, Bacteriophage Re...
neck nodes and dissection types and lymph nodes levels
Derivatives of integument scales, beaks, horns,.pptx

Small updates of matrix functions used for network centrality

  • 1. Small updates of matrix functions used for network centrality Francesco Tudisco joint work with Stefano Pozza (Charles University in Prague) Department of Mathematics and Statistics, University of Strathclyde, UK IMA Conf. Numerical Linear Algebra and Optimization Birmingham June 28, 2018
  • 2. Introduction Results Examples Notation: graphs and matrices Motivations and goal Adjacency matrix and its powers (A)ij = 1 if i ⇝ j, otherwise Aij = 0. (A2)ij = n s=1 AisAsj = #{s : i ⇝ s and s ⇝ j} = number of paths of length 2 from i to j (A3)ij = n s,t=1 AisAstAtj = #{s, t : i ⇝ s and s ⇝ t and t ⇝ j} = number of paths of length 3 from i to j · · · (Ak)ij = number of paths of length k from i to j 1 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
  • 3. Introduction Results Examples Notation: graphs and matrices Motivations and goal Network indices based on f(A) f(A) = c0I + c1A + c2A2 + c3A3 + · · · with ck ≥ 0 f(A)ij = weighted sum of paths of any length from i to j 2 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
  • 4. Introduction Results Examples Notation: graphs and matrices Motivations and goal Network indices based on f(A) f(A) = c0I + c1A + c2A2 + c3A3 + · · · with ck ≥ 0 f(A)ij = weighted sum of paths of any length from i to j f-Centrality: f(A)ii = importance of node i 2 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
  • 5. Introduction Results Examples Notation: graphs and matrices Motivations and goal Exponential and resolvent Typical choices are: ck = 1 k! exp(A) = I + A + 1 2 A2 + 1 3! A3 + · · · and ck = αk rα(A) = I + αA + α2 A2 + α3 A3 + · · · Note: the longer the path length the smaller the weighting coefficient 3 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
  • 6. Introduction Results Examples Notation: graphs and matrices Motivations and goal Problem setting We are interested in how f(A) changes when the structure of G = (V, E) undergoes a small perturbation Setting: • We add remove or modify the edges in a set δE ⊆ V × V • We obtain a graph G = (V, E) with adj(G) = A = A + δA • S ⊆ V = set of sources of edges in δE • T ⊆ V = set of tips of edges in δE 4 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
  • 7. Introduction Results Examples Notation: graphs and matrices Motivations and goal Why? • Computing f(A)ii is a costly operation • Often we are interested in the first few most important nodes • Changes or biases are more likely to occur on nodes that are “far” from important ones 5 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
  • 8. Introduction Results Examples Notation: graphs and matrices Motivations and goal Related work: f(A + small rank) Important issue: Computing f(A + δA) from f(A) when δA = small rank 6 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
  • 9. Introduction Results Examples Notation: graphs and matrices Motivations and goal Related work: f(A + small rank) Important issue: Computing f(A + δA) from f(A) when δA = small rank • f(x) = x−1 −→ Sherman–Morrison–Woodbury formula 6 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
  • 10. Introduction Results Examples Notation: graphs and matrices Motivations and goal Related work: f(A + small rank) Important issue: Computing f(A + δA) from f(A) when δA = small rank • f(x) = x−1 −→ Sherman–Morrison–Woodbury formula • f(x) is rational Bernstein, Van Loan, SIMAX, 2010 6 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
  • 11. Introduction Results Examples Notation: graphs and matrices Motivations and goal Related work: f(A + small rank) Important issue: Computing f(A + δA) from f(A) when δA = small rank • f(x) = x−1 −→ Sherman–Morrison–Woodbury formula • f(x) is rational Bernstein, Van Loan, SIMAX, 2010 • f(x) is analytic Beckermann, Kressner, Schweitzer, SIMAX, 2018 6 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
  • 12. Introduction Results Examples Notation: graphs and matrices Motivations and goal Related work: f(A + small rank) Important issue: Computing f(A + δA) from f(A) when δA = small rank • f(x) = x−1 −→ Sherman–Morrison–Woodbury formula • f(x) is rational Bernstein, Van Loan, SIMAX, 2010 • f(x) is analytic Beckermann, Kressner, Schweitzer, SIMAX, 2018 We derive a-priori bounds of the type |f(A)ii − f(A)ii| = O 1 Mδ with δ ≈ distance i ←→ δE 6 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
  • 13. Introduction Results Examples Notation: graphs and matrices Motivations and goal Two cycles example A = adj(G) G = 100 99 1 2 50 200 199 198 101 → e No closed walk passes trough → e =⇒ f(A)ii is constant for all i 7 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
  • 14. Introduction Results Examples Notation: graphs and matrices Motivations and goal Two cycles example A = adj(G) −→ A = adj(G) G = 100 99 1 2 50 200 199 198 101 → e ← e = δE T S No closed walk passes trough → e =⇒ f(A)ii is constant for all i 7 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
  • 15. Introduction Results Examples Notation: graphs and matrices Motivations and goal Two cycles example A = adj(G) −→ A = adj(G) G = 100 99 1 2 50 200 199 198 101 → e ← e = δE T S No closed walk passes trough → e =⇒ f(A)ii is constant for all i • The number of paths of any length (100) → (100) increases • Only the number of very long paths (50) → (50) increases • We expect f(A)50,50 ≈ f(A)50,50 but f(A)100,100 ≫ f(A)100,100 7 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
  • 16. Introduction Results Examples Bounds Algorithm Two key observations δ = distG(i, S) + distG(T, i) 8 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
  • 17. Introduction Results Examples Bounds Algorithm Two key observations δ = distG(i, S) + distG(T, i) If i /∈ S, T, then: pk(A)ii = pk(A)ii for every polynomial pk of degree k ≤ δ. 8 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
  • 18. Introduction Results Examples Bounds Algorithm Two key observations δ = distG(i, S) + distG(T, i) If i /∈ S, T, then: pk(A)ii = pk(A)ii for every polynomial pk of degree k ≤ δ. If f is analytic on Ω = (convex continuum), then: f(A) = γ0I + γ1Φ1(A) + γ2Φ2(A) + γ3Φ3(A) + · · · Φk = k-th Faber polynomial of Ω 8 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
  • 19. Introduction Results Examples Bounds Algorithm Main theorem Theorem Ω convex continuum containing W(A)∪W(A), ϕ : Ω → C conformal map of Ω, f analytic on {x : |ϕ(x)| > τ} ⊇ Ω. Then: |f(A)ii − f(A)ii| ≤ c(τ) 1 τδ+2 where c(τ) = 2 π τ τ − 1 |ϕ(x)|=τ |f(x)| dϕ(x) Particular choices of f and Ω lead to explicit bounds 9 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
  • 20. Introduction Results Examples Bounds Algorithm Ellipse shaped Ω W(A) W(A) Ω c a b Bounds for exp(A) and rα(A) in terms of a, b and c 10 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
  • 21. Introduction Results Examples Bounds Algorithm If δ > b − 1, then: Exponential exp(A)ii − exp(A)ii ≤ 4eℜ(c) p(δ + 1) p(δ + 1) − a+b δ+1 a + b δ + 1 eq(δ+1) p(δ + 1) δ+1 with q(t) = 1 + a2−b2 t2+t √ t2+a2−b2 and p(t) = 1 + 1 + (a2 − b2)/t2 11 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
  • 22. Introduction Results Examples Bounds Algorithm If δ > b − 1, then: Exponential exp(A)ii − exp(A)ii ≤ 4eℜ(c) p(δ + 1) p(δ + 1) − a+b δ+1 a + b δ + 1 eq(δ+1) p(δ + 1) δ+1 with q(t) = 1 + a2−b2 t2+t √ t2+a2−b2 and p(t) = 1 + 1 + (a2 − b2)/t2 If 1/α /∈ Ω, then: Resolvent rα(A)ii − rα(A)ii ≤ 4 1 − a+b (|α−1−c|−ε)pε 1 ε a + b |α−1 − c| − ε 1 pε δ+1 with pε = 1 + 1 − a2−b2 (|α−1−c|−ε)2 and 0 < ε < |α−1 − c| − a 11 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
  • 23. Introduction Results Examples Bounds Algorithm How to do in practice Compute f(A)ii = eT i Aei with non-Hermitian Lanczos method. {v0, . . . , vt−1}, {w0, . . . , wt−1}= computed bases of Kt(A, ei), Kt(AT, ei) Theorem dG(m, i) = smallest k such that (vk)m ̸= 0 dG(i, m) = smallest k such that (wk)m ̸= 0 m = 1, . . . , n 12 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
  • 24. Introduction Results Examples Bounds Algorithm How to do in practice Compute f(A)ii = eT i Aei with non-Hermitian Lanczos method. {v0, . . . , vt−1}, {w0, . . . , wt−1}= computed bases of Kt(A, ei), Kt(AT, ei) Theorem dG(m, i) = smallest k such that (vk)m ̸= 0 dG(i, m) = smallest k such that (wk)m ̸= 0 m = 1, . . . , n Elementary modification of Lanczos algorithm allows to simultaneously compute f(A)ii, i = 1, . . . , n and the all-pair shortest-path distances 12 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
  • 25. Introduction Results Examples Two cycles London Transports Network Small world networks Two cycles 100 99 1 2 50 200 199 198 101 → e ← e T S exp(A) r1/3(A) 0 50 100 150 200 10 -20 10 -10 10 0 0 50 100 150 200 10 -20 10 -10 10 0 13 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
  • 26. Introduction Results Examples Two cycles London Transports Network Small world networks London trains 14 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
  • 27. Introduction Results Examples Two cycles London Transports Network Small world networks London trains 50 100 150 200 250 300 10-20 10-10 100 1010 50 100 150 200 250 300 10-20 10-10 100 1010 50 100 150 200 250 300 10-20 10-10 100 1010 5 nodes 15 nodes 30 nodes 14 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
  • 28. Introduction Results Examples Two cycles London Transports Network Small world networks Normalized adjacency 100 200 300 400 10 -20 10 -10 10 0 Erdös 1000 2000 3000 4000 10-20 10-10 100 Facebook 1000 2000 3000 4000 5000 10 -20 10 -10 10 0 GRQC 1000 2000 3000 4000 5000 6000 10 -20 10 -10 10 0 Gnutella 15 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
  • 29. Introduction Results Examples Two cycles London Transports Network Small world networks Reference Details and “much more” in: Stefano Pozza and Francesco Tudisco Stability of network indices defined by means of matrix functions SIAM J Matrix Anal Appl, 2018 For example: Bounds for f(A)ij, f(D−1A), f(D−1/2AD−1/2) 16 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality
  • 30. Introduction Results Examples Two cycles London Transports Network Small world networks Reference Details and “much more” in: Stefano Pozza and Francesco Tudisco Stability of network indices defined by means of matrix functions SIAM J Matrix Anal Appl, 2018 For example: Bounds for f(A)ij, f(D−1A), f(D−1/2AD−1/2) Thank you for your attention! 16 / 16 Francesco Tudisco Small updates of matrix functions used for network centrality