-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathcomputeEdge2EdgeMeasures.m
92 lines (69 loc) · 3.03 KB
/
computeEdge2EdgeMeasures.m
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
% LICENCSE (MIT)
% Permission is hereby granted, free of charge, to any person obtaining a copy
% of this software and associated documentation files (the "Software"), to deal
% in the Software without restriction, including without limitation the rights
% to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
% copies of the Software, and to permit persons to whom the Software is
% furnished to do so, subject to the following conditions:
%
% The above copyright notice and this permission notice shall be included in
% all copies or substantial portions of the Software.
%
% THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
% IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
% FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
% AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
% LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
% OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
% THE SOFTWARE.
function [K, M, epsilon, edgelist] = computeEdge2EdgeMeasures(A)
%COMPUTEEDGE2EDGEMEASURES Given a adjacency matrix (weighted
% adjacency matrix) A compute the flow-redistribution matrix, the
% edge-to-edge transfer function matrix and the embeddedness vector
% (c) M. Schaub, Imperial College London, [email protected]
%
% If you make use of this code please cite the associated article:
% "Structure of complex networks: Quantifying edge-to-edge relations by
% failure-induced flow redistribution", Michael T. Schaub, Jörg Lehmann,
% Sophia N. Yaliraki, Mauricio Barahona, Network Science 2(1), 2014,
% pp. 66--89; see also arXiv:0707.0609
%
% remove diagonal from matrix
A = A-diag(diag(A));
% compute number of links
links= nnz(A)/2;
% find all indices of nodes
[i,j,v] = find(triu(A));
edgelist =[(1:links)' i j v];
%combinatorial Laplacian
L = diag(sum(A,2))-A;
E = createIncidenceMatrix(A);
%M = diag(v)*E'*pinv(full(L))*E;
% faster than above: compute pseudoinverse directly
%Lp = (L- ones(size(L))/length(L))^-1 + ones(size(L))/length(L);
%M = diag(v)*E'*Lp*E;
% even faster: use Gaussian elimination, (note that constant matrix is in
% null space of incidence matrix, so can be neglected)
M = diag(v)*E'*( (L- ones(size(L))/length(L))\ E );
epsilon = 1-diag(M);
if any(epsilon < 1e-12)
warning('Some edges have an embeddedness essentially zero! Associated columns in K might be wrong.')
end
K = M/(diag( epsilon ) );
end
function [E, edgelist] = createIncidenceMatrix(A)
% For a given (undirected) graph with adj matrix A
% create node-edge incidence matrix E
% Note that self loops are not taken into account here
% compute number of links
links= nnz(A)/2;
nodes = length(A);
% find all indices of nodes
[i,j, v] = find(triu(A));
% allocate incidence matrix
% insert +1/-1 in both node rows and column given by edge id
E = sparse(i,1:links,-1,nodes,links);
E = E + sparse(j,1:links,1,nodes,links);
% edgelist in format edge_id, from, to, strength
edgelist =[(1:links)' i j v];
end