Skip to main content
Springer logoLink to Springer
. 2018 Jan 25;173(3):746–774. doi: 10.1007/s10955-018-1952-x

Triadic Closure in Configuration Models with Unbounded Degree Fluctuations

Remco van der Hofstad 1, Johan S H van Leeuwaarden 1, Clara Stegehuis 1,
PMCID: PMC6405038  PMID: 30930481

Abstract

The configuration model generates random graphs with any given degree distribution, and thus serves as a null model for scale-free networks with power-law degrees and unbounded degree fluctuations. For this setting, we study the local clustering c(k), i.e., the probability that two neighbors of a degree-k node are neighbors themselves. We show that c(k) progressively falls off with k and the graph size n and eventually for k=Ω(n) settles on a power law c(k)n5-2τk-2(3-τ) with τ(2,3) the power-law exponent of the degree distribution. This fall-off has been observed in the majority of real-world networks and signals the presence of modular or hierarchical structure. Our results agree with recent results for the hidden-variable model and also give the expected number of triangles in the configuration model when counting triangles only once despite the presence of multi-edges. We show that only triangles consisting of triplets with uniquely specified degrees contribute to the triangle counting.

Keywords: Random graphs, Clustering, Configuration model

Introduction

Random graphs can be used to model many different types of networked structures such as communication networks, social networks and biological networks. Many of these real-world networks display similar characteristics. A well-known characteristic of many real-world networks is that the degree distribution follows a power law. Another such property is that they are highly clustered. Several statistics to measure clustering exist. The global clustering coefficient measures the fraction of triangles in the network. A second measure of clustering is the local clustering coefficient, which measures the fraction of triangles that arise from one specific node.

The local clustering coefficient c(k) of vertices of degree k decays when k becomes large in many real-world networks. In particular, the decay was found to behave as an inverse power of k for k large enough, so that c(k)k-γ for some γ>0 [5, 15, 19, 20, 22], where most real-world networks were found to have γ close to one. Figure 1 shows the local clustering coefficient for a technological network (the Google web graph [16]), an information network (hyperlinks of the online encyclopedia Baidu [18]) and a social network (friends in the Gowalla social network [16]). We see that for small values of k, c(k) decays slowly. When k becomes larger, the local clustering coefficient indeed seems to decay as an inverse power of k. Similar behavior has been observed in more real-world networks [21]. The decay of the local clustering coefficient c(k) in k is considered an important empirical observation, because it may signal the presence of hierarchical network structures [19], where high-degree vertices barely participate in triangles, but connect communities consisting of small-degree vertices with high clustering coefficients.

Fig. 1.

Fig. 1

Local clustering coefficient c(k) for three real-world networks. a Google web graph [16]. b Baidu online encyclopedia [18]. c Gowalla social network [16]

In this paper we analyze c(k) for networks with a power-law degree distribution with degree exponent τ(2,3), the situation that describes the majority of real-world networks [1, 8, 13, 21]. To analyze c(k), we consider the configuration model in the large-network limit, and count the number of triangles where at least one of the vertices has degree k. When the degree exponent satisfies τ>3, the total number of triangles in the configuration model converges to a Poisson random variable [9, Chapter 7]. When τ(2,3), the configuration model consists of many self-loops and multiple edges [9]. This creates multiple ways of counting the number of triangles, as we will show below. In this paper, we count the number of triangles from a vertex perspective, which is the same as counting the number of triangles in the erased configuration model, where all self-loops have been removed and multiple edges have been merged.

We show that the local clustering coefficient remains a constant times n2-τlog(n) as long as k=o(n). After that, c(k) starts to decay as c(k)k-γn5-2τ. We show that this exponent γ depends on τ and can be larger than one. In particular, when the power-law degree exponent τ is close to two, the exponent γ approaches two, a considerable difference with the preferential attachment model with triangles or several fractal-like random graph models that predict c(k)k-1 [7, 14, 19]. Related to this result on the c(k) fall-off, we also show that for every node with fixed degree k only pairs of nodes with specific degrees contribute to the triangle count and hence local clustering.

The paper is structured as follows. Section 2 contains a detailed description of the configuration model and the triangle count. We present our main results in Sect. 3, including Theorem 1 that describes the three ranges of c(k). The remaining sections prove all the main results, and in particular focus on establishing Propositions 1 and 2 that are crucial for the proof of Theorem 1.

Basic Notions

Notation We use d for convergence in distribution, and P for convergence in probability. We say that a sequence of events (En)n1 happens with high probability (w.h.p.) if limnPEn=1. Furthermore, we write f(n)=o(g(n)) if limnf(n)/g(n)=0, and f(n)=O(g(n)) if |f(n)| / g(n) is uniformly bounded, where (g(n))n1 is nonnegative. Similarly, if lim supnf(n)/g(n)>0, we say that f(n)=Ω(g(n)) for nonnegative (g(n))n1. We write f(n)=Θ(g(n)) if f(n)=O(g(n)) as well as f(n)=Ω(g(n)). We say that Xn=OP(g(n)) for a sequence of random variables (Xn)n1 if |Xn|/g(n) is a tight sequence of random variables, and Xn=oP(g(n)) if Xn/g(n)P0.

The Configuration Model Given a positive integer n and a degree sequence, i.e., a sequence of n positive integers d=(d1,d2,,dn), the configuration model is a (multi)graph where vertex i has degree di. It is defined as follows, see e.g., [3] or [9, Chapter 7]: Given a degree sequence d with i[n]di even, we start with dj free half-edges adjacent to vertex j, for j=1,,n. The random multigraph CMn(d) is constructed by successively pairing, uniformly at random, free half-edges into edges, until no free half-edges remain. (In other words, we create a uniformly random matching of the half-edges.) The wonderful property of the configuration model is that, conditionally on obtaining a simple graph, the resulting graph is a uniform graph with the prescribed degrees. This is why CMn(d) is often used as a null model for real-world networks with given degrees.

In this paper, we study the setting where the degree distribution has infinite variance. Then the number of self-loops and multiple edges tends to infinity in probability (see e.g., [9, Chapter 7]), so that the configuration model results in a multigraph with high probability. In particular, we take the degrees d to be an i.i.d. sample of a random variable D such that

P(D=k)=Ck-τ(1+o(1)), 2.1

when k, where τ(2,3) so that E[D2]=. When this sample constructs a sequence such that the sum of the variables is odd, we add an extra half-edge to the last vertex to obtain the degree sequence. This does not affect our computations. In this setting, dmax=OPn1/(τ-1), where dmax=maxv[n]dv denotes the maximal degree of the degree sequence.

Counting triangles Let G=(V,E) denote a configuration model with vertex set V=[n]:={1,,n} and edge set E. We are interested in the number of triangles in G. There are two ways to count triangles in the configuration model. The first approach is from an edge perspective, as illustrated in Fig. 2. This approach counts the number of triples of edges that together create a triangle. This approach may count multiple triangles between one fixed triple of vertices. Let Xij denote the number of edges between vertex i and j. Then, from an edge perspective, the number of triangles in the configuration model is

1i<j<knXijXjkXik. 2.2

A different approach is to count the number of triangles from a vertex perspective. This approach counts the number of triples of vertices that are connected. Counting the number of triangles in this way results in

1i<j<kn1Xij11Xjk11Xik1. 2.3

When the configuration model results in a simple graph, these two approaches give the same result. When the configuration model results in a multigraph, these two approaches may give very different numbers of triangles. In particular, when the degree distribution follows a power-law with τ(2,3), the number of triangles is dominated by the number of triangles between the vertices of the highest degrees, even though only few such vertices are present in the graph [17]. When the exponent τ of the degree distribution approaches 2, then the number of triangles between the vertices of the highest degrees will approach Θ(n3), which is much higher than the number of triangles we would expect in any real-world network of that size. When we count triangles from a vertex perspective, we count only one triangle between these three vertices. Thus, the number of triangles from the vertex perspective will be significantly lower. In this paper, we focus on the vertex based approach for counting triangles. Note that this approach is the same as counting triangles in the erased configuration model, where all multiple edges have been merged, and the self-loops have been removed.

Fig. 2.

Fig. 2

From the edge perspective in the configuration model, these are two triangles. From the vertex perspective, there is only one triangle. a CM. b ECM

Let k denote the number of triangles attached to vertices of degree k in the erased configuration model. Note that when a triangle consists of two vertices of degree k, it is counted twice in k. Let Nk denote the number of vertices of degree k. Then, the clustering coefficient of vertices with degree k equals

c(k)=1Nk2kk(k-1). 2.4

When we count k from the vertex perspective, this clustering coefficient can be interpreted as the probability that two random connections of a vertex with degree k are connected. This version of c(k) is the local clustering coefficient of the erased configuration model.

Main Results

The next theorem presents our main result on the behavior of the local clustering coefficient in the erased configuration model.

Theorem 1

Let G be an erased configuration model, where the degrees are an i.i.d. sample from a power-law distribution with exponent τ(2,3) as in (2.1). Define A=-Γ(2-τ)>0 for τ(2,3), let μ=ED and C be the constant in (2.1). Then, as n,

(Range I)
for 1<k=o(n(τ-2)/(τ-1)),
c(k)n2-τlog(n)P3-ττ-1μ-τC2A, 3.1
(Range II)
for k=Ω(n(τ-2)/(τ-1)) and k=o(n),
c(k)n2-τlog(n/k2)Pμ-τC2A, 3.2
(Range III)
for k=Ω(n) and kdmax,
c(k)n5-2τk2τ-6Pμ3-2τC2A2, 3.3

Theorem 1 shows three different ranges for k where c(k) behaves differently, and is illustrated in Fig. 3. Let us explain why these three ranges occur. Range I contains small-degree vertices with k=o(n(τ-2)/(τ-1)). In Sect. 4.2 we show that these vertices are hardly involved in self-loops and multiple edges in the configuration model, and hence there is little difference between counting from an edge perspective or from a vertex perspective. It turns out that these vertices barely make triadic closures with hubs, which renders c(k) independent of k in Theorem 1. Range II contains degrees that are neither small nor large with degrees k=Ω(n(τ-2)/(τ-1)) and k=o(n). We can approximate the connection probability between vertices i and j with 1-e-DiDj/μn, where μ=E[D]. Therefore, a vertex of degree k connects to vertices of degree at least n / k with positive probability. The vertices in Range II quite likely have multiple connections with vertices of degrees at least n / k. Thus, in this degree range, the single-edge constraint of the erased configuration model starts to play a role and causes the slow logarithmic decay of c(k) in Theorem 1. Range III contains the large-degree vertices with k=Ω(n). Again we approximate the probability that vertices i and j are connected by 1-e-DiDj/μn. This shows that vertices in Range III are likely to be connected to one another, possibly through multiple edges. The single-edge constraint on all connections between these core vertices causes the power-law decay of c(k) in Theorem 1.

Fig. 3.

Fig. 3

The three ranges of c(k) defined in Theorem 1 on a log-log scale

Theorem 1 shows that the local clustering not only decays in k, it also decays in the graph size n for all values of k. This decay in n is caused by the locally tree-like nature of the configuration model. Figure 1 shows that in large real-world networks, c(k) is typically high for small values of k, which is unlike the behavior in the erased configuration model. The behavior of c(k) for more realistic network models is therefore an interesting question for further research. We believe that including small communities to the configuration model such as in [10] would only change the kc(k) curve for small values of k with respect to the erased configuration model. Low-degree vertices will then typically be in highly clustered communities and therefore have high local clustering coefficients. Most connections from high-degree vertices will be between different communities, which results in a similar kc(k) curve for large values of k as in the erased configuration model.

Observe that in Theorem 1 the behavior of c(k) on the boundary between two different ranges may be different than the behavior inside the ranges. Since kc(k) is a function on a discrete domain, it is always continuous. However, we can extend the scaling limit of kc(k) to a continuous domain. Theorem 1 then shows that the scaling limit of kc(k) is a smooth function inside the different ranges. Furthermore, filling in k=an(τ-1)/(τ-2) in Range II of Theorem 1 suggests that kc(k) is also a smooth function on the boundary between Ranges I and II. However, the behavior of kc(k) on the boundary between Ranges II and III is not clear from Theorem 1. We therefore prove the following result in Sect. 6.1:

Theorem 2

For k=Bn,

c(k)n2-τPC2μ2-2τB-200(t1t2)-τ(1-e-Bt1)(1-e-Bt2)(1-e-t1t2μ)dt1dt2. 3.4

Figure 4 compares c(k)/n2-τ for k=Bn using Theorems 1 and 2. The line associated with Theorem 1 uses the result for Range II when B<1, and the result for Range III when B>1. We see that there seems to be a discontinuity between these two ranges. Figure 4 suggests that the scaling limit of kc(k) is smooth around kn, because the lines are close for both small and large B-values. Theorem 3 shows that indeed the scaling limit of kc(k) is smooth for k of the order n:

Fig. 4.

Fig. 4

The normalized version of c(k) for k=Bn obtained from Theorems 1 and 2

Theorem 3

The scaling limit of kc(k) is a smooth function.

Most likely configurations The three different ranges in Theorem 1 result from a canonical trade-off caused by the power-law degree distribution. On the one hand, high-degree vertices participate in many triangles. In Sect. 5.1 we show that the probability that a triangle is present between vertices with degrees k,Du and Dv can be approximated by

1-e-kDu/μn1-e-kDv/μn1-e-DuDv/μn. 3.5

The probability of this triangle thus increases with Du and Dv. On the other hand, in power-law distribution high degrees are rare. This creates a trade-off between the occurrence of triangles between {k,Du,Dv}-triplets and the number of them. Surely, large degrees Du and Dv make a triangle more likely, but larger degrees are less likely to occur. Since (3.5) increases only slowly in Du and Dv as soon as Du,Dv=Ω(μn/k) or when DuDv=Ω(μn), intuitively, triangles with Du,Dv=Ω(μn/k) or with DuDv=Ω(μn) only marginally increase the number of triangles. In fact, we will show that most triangles with a vertex of degree k contain two other vertices of very specific degrees, those degrees that are aligned with the trade-off. The typical degrees of Du and Dv in a triangle with a vertex of degree k are given by Du,Dvμn/k or by DuDvμn.

Let us now formalize this reasoning. Introduce

Wnk(ε)=(u,v):DuDv[ε,1/ε]μnfork=o(n(τ-2)/(τ-1)),(u,v):DuDv[ε,1/ε]μn,Du,Dv<μn/(kε)fork=Ω(n(τ-2)/(τ-1)),k=o(n),(u,v):Du,Dv[ε,1/ε]μn/kfork=Ω(n). 3.6

Denote the number of triangles between one vertex of degree k and two other vertices ij with (i,j)Wnk(ε) by k(Wnk(ε)). The next theorem shows that these types of triangles dominate all other triangles where one vertex has degree k:

Theorem 4

Let G be an erased configuration model where the degrees are an i.i.d. sample from a power-law distribution with exponent τ(2,3). Then, for εn0 sufficiently slowly,

Δk(Wnk(εn))kP1. 3.7

For example, when k=Ω(n), k(Wnk(εn)) denotes all triangles between a vertex of degree k and two other vertices with degrees in [εn,1/εn]n/k. Theorem 4 then shows that the number of these triangles dominates the number of all other types of triangles where one vertex has degree k. This holds when εn0, so that the degrees of the other two vertices cover the entire Θ(n/k) range. The convergence of εn0 should be sufficiently slowly, e.g., εn=1/log(n), for several combined error terms of ε and n to go to zero.

Figure 5 illustrates the typical triangles containing a vertex of degree k as given by Theorem 4. When k is small (k in Range I or II), a typical triangle containing a vertex of degree k is a triangle with vertices u and v such that DuDv=Θ(n) as shown in in Fig. 5a. Then, the probability that an edge between u and v exists is asymptotically positive and non-trivial. Since k is small, the probability that an edge exists between a vertex of degree k and u or v is small. On the other hand, when k is larger (in Range III), a typical triangle containing a vertex of degree k is with vertices u and v such that Du=Θ(n/k) and Dv=Θ(n/k). Then, the probability that an edge exists between k and Du or k and Dv is asymptotically positive whereas the probability that an edge exists between vertices u and v vanishes. Figure 5b shows this typical triangle.

Fig. 5.

Fig. 5

The major contributions in the different ranges for k. The highlighted edges are present with asymptotically positive probability. a k<n. b k>n

Figure 6 shows the typical size of the degrees of other vertices in a triangle with a vertex of degree k=nβ. We see that when β<(τ-2)/(τ-1) (so that k is in Range I), the typical other degrees are independent of the exact value of k. This shows why c(k) is independent of k in Range I in Theorem 1. When (τ-2)/(τ-1)<β<12, we see that the range of possible degrees for vertices u and v decreases when k gets larger. Still, the range of possible degrees for Du and Dv is quite wide. This explains the mild dependence of c(k) on k in Theorem 1 in Range II. When β>12, k is in Range III. Then the typical values of Du and Dv are considerably different from those in the previous regime. The values that Du and Dv can take depend heavily on the value of k. This explains the dependence of c(k) on k in Range III.

Fig. 6.

Fig. 6

Visualization of the contributing degrees when k=nβ and Du=nα. The colored area shows the values of α that contribute to c(nβ) (Color figure online)

Global and local clustering The global clustering coefficient divides the total number of triangles by the total number of pairs of neighbors of all vertices. In [11], we have shown that the total number of triangles in the configuration model from a vertex perspective is determined by vertices of degree proportional to n. Thus, only triangles between vertices on the border between Ranges II and III contribute to the global clustering coefficient. The local clustering coefficient counts all triangles where one vertex has degree k and provides a more complete picture of clustering from a vertex perspective, since it covers more types of triangles.

Hidden-variable models Our results for clustering in the erased configuration model agree with recent results for the hidden-variable model [21]. In the hidden-variable model, every vertex is equipped with a hidden variable wi, where the hidden variables are sampled from a power-law distribution. Then, vertices i and j are connected with probability min(wiwj/n,1) [2, 6]. In the erased configuration model, we will use that the probability that a vertex with degree Di is connected to a vertex with degree Dj can be approximated by

1-e-DiDj/μn, 3.8

which behaves similarly as min(DiDj/n,1). Thus, the connection probabilities in the erased configuration model can be interpreted as the connection probabilities in the hidden-variable model, where the sampled degrees can be interpreted as the hidden variables. The major difference is that connections in the hidden-variable model are independent once the hidden variables are sampled, whereas connections in the erased configuration model are correlated once the degrees are sampled. Indeed, in the erased configuration model we know that a vertex with degree Di has at most Di other vertices as a neighbor, so that the connections from vertex i to other vertices are correlated. Still, our results show that these correlations are small enough for the results for c(k) to be similar to the results for c(k) in the hidden variable model.

Overview of the Proof

To prove Theorem 1, we show that there is a major contributing regime for c(k), which characterizes the degrees of the other two vertices in a typical triangle with a vertex of degree k. We write this major contributing regime as Wnk(ε) defined in (3.6). The number of triangles adjacent to a vertex of degree k is dominated by triangles between the vertex of degree k and other vertices with degrees in a specific regime, depending on k. All three ranges of k have a different spectrum of degrees that contribute to the number of triangles. We write

c(k)=c(k,Wnk(ε))+c(k,W¯nk(ε)), 3.9

where c(k,Wnk(ε)) denotes the contribution to c(k) from triangles where the other two vertices (u,v)Wnk(ε) and c(k,W¯nk(ε)) denotes the contribution to c(k) from triangles where the other two vertices (u,v)Wnk(ε). Furthermore, we write the order of magnitude of the value of c(k) as f(kn). Theorem 1 states that this order should be

f(k,n)=n2-τlog(n)fork=o(n(τ-2)/(τ-1)),n2-τlog(n/k2)fork=Ω(n(τ-2)/(τ-1)),k=o(n),n5-2τk2τ-6fork=Ω(n). 3.10

The proof of Theorem 1 is largely built on the following two propositions:

Proposition 1

(Main contribution)

c(k,Wnk(ε))f(n,k)PC2ε1/εt1-τ(1-e-t)dtfork=o(n),C2ε1/εt1-τ(1-e-t)dt2fork=Ω(n). 3.11

Proposition 2

(Minor contributions) There exists κ>0 such that for all ranges

Enc(k,W¯nk(ε))f(n,k)=OPεκ. 3.12

We now show how these propositions prove Theorem 1. Applying Proposition 2 together with the Markov inequality yields

Pc(k,W¯nk(ε))>Kf(k,n)εκ=OK-1. 3.13

Therefore,

c(k)=c(k,Wnk(ε))+OPf(k,n)εκ. 3.14

Replacing ε by εn, and letting εn0 slowly enough for all combined error terms of εn and o(f(nk)) in the expectation in (3.12) to converge to 0 then already proves Theorem 4. To prove Theorems 1 and 2 we use Proposition 1, which shows that

c(k)f(k,n)PC2ε1/εt1-τ(1-e-t)dt+O(εκ)fork=o(n),C2ε1/εt1-τ(1-e-t)dt2+O(εκ)fork=Ω(n). 3.15

We take the limit of ε0 and use that

0x1-τ(1-e-x)dx=00xx1-τe-ydydx=0yx1-τe-ydxdy=-12-τ0y2-τe-ydy=-Γ(3-τ)2-τ=-Γ(2-τ)=:A, 3.16

which proves Theorem 1.

The rest of the paper will be devoted to proving Propositions 1 and 2. We prove Proposition 1 using a second moment method. We can compute the expected value of c(k) conditioned on the degrees as

Enc(k)=2Enw:Dw(er)=k(w)Nkk(k-1), 3.17

where (w) denotes the number of triangles containing vertex w and En denotes the conditional expectation given the degrees. Let Xij denote the number of edges between vertex i and j in the configuration model, and X^ij the number of edges between i and j in the corresponding erased configuration model, so that X^ij{0,1}. Now,

En(w)Dw(er)=k=12u,vwPn(X^wu=X^wv=X^uv=1Dw(er)=k). 3.18

Thus, to find the expected number of triangles, we need to compute the probability that a triangle between vertices u, v and w exists, which we will do in Sect. 5.1. After that, we show that this expectation converges to a constant when taking the randomness of the degrees into account, and that the variance conditioned on the degrees is small in Sect. 5.3. Then, we prove Proposition 2 in Sect. 6 using a first moment method. We start in Sect. 4 to state some preliminaries.

Preliminaries

We now introduce some lemmas that we will use frequently while proving Propositions 1 and 2. We let Pn denote the conditional probability given d, and En the corresponding expectation. Furthermore, let Du denote a uniformly chosen vertex from the degree sequence d and let Ln=i[n]Di denote the sum of the degrees.

Conditioning on the Degrees

In the proof of Proposition 1 we first condition on the degree sequence. We compute the clustering coefficient conditional on the degree sequence, and after that we show that this converges to the correct value when taking the random degrees into account. We will use the following lemma several times:

Lemma 1

Let G be an erased configuration model where the degrees are an i.i.d. sample from a random variable D. Then,

PnDu[a,b]=OPPD[a,b], 4.1
Enf(Du)=OPEf(D). 4.2

Proof

By using the Markov inequality, we obtain for M>0

PPnDu[a,b]MPD[a,b]EPnDu[a,b]MPD[a,b]=1M, 4.3

and the second claim can be proven in a very similar way.

In the proof of Theorem 1 we often estimate moments of D, conditional on the degrees. The following lemma shows how to bound these moments, and is a direct consequence of the Stable Law Central Limit Theorem:

Lemma 2

Let Du be a uniformly chosen vertex from the degree sequence, where the degrees are an i.i.d. sample from a power-law distribution with exponent τ(2,3). Then, for α>τ-1,

EnDuα=OPnα/(τ-1)-1. 4.4

Proof

We have

EnDuα=1ni=1nDiα. 4.5

Since the Di are an i.i.d. sample from a power-law distribution with exponent τ,

PDiα>t=PDi>t1/α=Ct-τ-1α, 4.6

so that Diα are distributed as i.i.d. samples from a power-law with exponent (τ-1)/α+1<2. Then, by the Stable law Central Limit Theorem (see for example [23, Theorem 4.5.1]),

i=1nDiα=OPnατ-1, 4.7

which proves the lemma.

We also need to relate Ln and its expected value μn. Define the event

Jn=Ln-μnn1/(τ-1). 4.8

By [12], PJn=1-O(n-1/τ) as n. When we condition on the degree sequence, we will assume that the event Jn takes place.

Erased and Non-erased Degrees

The degree sequence of the erased configuration model may differ from the original degree sequence of the original configuration model. We now show that this difference is small with high probability. By [4, Eq A(9)], the probability that a half-edge incident to a vertex of degree o(n) is removed is o(1). The maximal degree in the configuration model with i.i.d. degrees is OP(n1/(τ-1)), so that for all i maxi[n]Di=oP(n). Therefore,

Di(1-oP(1))Di(er)Di. 4.9

Thus, in many proofs, we will exchange Di and Di(er) when needed.

Second Moment Method on Main Contribution Wnk(ε)

We now focus on the triangles that give the main contribution. First, we condition on the degree sequence and compute the expected number of triangles in the main contributing regime. Then, we show that this expectation converges to a constant when taking the i.i.d. degrees into account. After that, we show that the variance of the number of triangles in the main contributing regime is small, and we prove Proposition 1.

Conditional Expectation Inside Wnk(ε)

In this section, we compute the expectation of the number of triangles in the major contributing ranges of 3.6 when we condition on the degree sequence. We define

gn(Du,Dv,Dw):=(1-e-DuDv/Ln)(1-e-DuDw/Ln)(1-e-DvDw/Ln). 5.1

Then, the following lemma shows that the expectation of c(k) conditioned on the degrees is the sum of gn(Du,Dv,Dw) over all degrees in the major contributing regime:

Lemma 3

On the event Jn defined in (4.8),

Enc(k,Wnk(ε))=(u,v)Wnk(ε)gn(k,Du,Dv)k(k-1)(1+oP(1)). 5.2

Proof

By (3.17) and (3.18)

Enc(k,Wnk(ε))=12Nkw:Dw(er)=k(u,v)Wnk(ε)Pnu,v,w=1k(k-1)/2, 5.3

where u,v,w denotes the event that a triangle is present on vertices uv and w. We write the probability that a specific triangle on vertices uv and w exists as

Pnu,v,w=1=1-PnXuw=0-PnXvw=0-PnXuv=0+PnXuw=Xvw=0+PnXuv=Xvw=0+PnXuv=Xuw=0-PnXuv=Xuw=Xvw=0. 5.4

In the major contributing ranges, Du,Dv,Dw=OP(n1/(τ-1)), and the product of the degrees is O(n). By [11, Lemma 3.1]

PnXuv=Xvw=0=e-DuDv/Lne-DvDw/Ln(1+oP(n-(τ-2)/(τ-1))) 5.5

and

PnXuv=Xvw=Xuw=0=e-DuDv/Lne-DvDw/Lne-DuDw/Ln(1+oP(n-(τ-2)/(τ-1))). 5.6

Therefore,

Pnu,v,w=1=(1+oP(1))1-e-DuDv/Ln1-e-DuDw/Ln1-e-DvDw/Ln=(1+oP(1))gn(Du,Dv,Dw), 5.7

where we have used that for DuDv=O(n)

1-e-DuDv/Ln(1+oP(n-(τ-2)/(τ-1)))=(1-e-DuDv/Ln)(1+oP(1)). 5.8

Lemma 1 shows that, given Dw(er)=k,

gn(Dw,Du,Dv)=gn(k,Du,Dv)(1+oP(1)). 5.9

Thus, we obtain

Enc(k,Wnk(ε))=w:Dw(er)=k(u,v)Wnk(ε)gn(Dw,Du,Dv)Nkk(k-1)(1+oP(1))=(u,v)Wnk(ε)gn(k,Du,Dv)k(k-1)(1+oP(1)), 5.10

which proves the lemma.

Analysis of Asymptotic Formula

In the previous section, we have shown that the expected value of c(k) in the major contributing regime is the sum of a function gn(k,Du,Dv) over all vertices u and v with degrees in the major contributing regime if we condition on the degrees, that is

Enc(k,Wnk(ε))=1+oP(1)k(k-1)(u,v)Wnk(ε)(1-e-kDv/Ln)(1-e-kDu/Ln)(1-e-DuDv/Ln). 5.11

This expected value does not yet take into account that the degrees are sampled i.i.d. from a power-law distribution. In this section, we will prove that this expected value converges to a constant when we take the randomness of the degrees into account. We will make use of the following lemmas:

Lemma 4

Let AR2 be a bounded set and f(t1,t2) be a bounded, continuous function on A. Let M(n) be a random measure such that for all SA, M(n)(S)Pλ(S)=Sdλ(t1,t2) for some deterministic measure λ. Then,

Af(t1,t2)dM(n)(t1,t2)PAf(t1,t2)dλ(t1,t2). 5.12

Proof

Fix η>0. Since f is bounded and continuous on A, for any ε>0, we can find m<, disjoint sets (Bi)i[m] and constants (bi)i[m] such that Bi=A and

f(t1,t2)-i=1mbi1(t1,t2)Bi<ε, 5.13

for all (t1,t2)A. Because M(n)(Bi)Pλ(Bi) for all i,

limnPM(n)(Bi)-λ(Bi)>η/m=0. 5.14

Then,

Af(t1,t2)dM(n)(t1,t2)-Af(t1,t2)dλ(t1,t2)Af(t1,t2)-i=1mbi1(t1,t2)BidM(n)(t1,t2)+Af(t1,t2)-i=1mbi1(t1,t2)Bidλ(t1,t2)+i=1mbi(M(n)(Bi)-λ(Bi))εM(n)(A)+ελ(A)+oP(η). 5.15

Now choosing ε<η/λ(A) proves the lemma.

The following lemma is a straightforward one-dimensional version of Lemma 4:

Lemma 5

Let M(n)[a,b] be a random measure such that for all 0<a<b, M(n)[a,b]Pλ[a,b]=abdλ(t) for some deterministic measure λ. Let f(t) be a bounded, continuous function on [ε,1/ε]. Then,

ε1/εf(t)dM(n)(t)Pε1/εf(t)dλ(t). 5.16

Proof

This proof follows the same lines as the proof of Lemma 4.

Using these lemmas we investigate the convergence of the expectation of c(k) conditioned on the degrees. We treat the three ranges separately, but the proofs follow the same structure. First, we define a random measure M(n) that counts the normalized number of vertices with degrees in the major contributing regime. We then show that this measure converges to a deterministic measure λ, using that the degrees are i.i.d. samples of a power-law distribution. We then write the conditional expectation of the previous section as an integral over measure M(n). Then, we can use Lemmas 4 or 5 to show that this converges to a deterministic integral.

First, we consider the case where k is in Range I:

Lemma 6

(Range I) For 1<k=o(n(τ-2)/(τ-1)),

Enc(k,Wnk(ε))n2-τlog(n)Pμ-τC23-ττ-1ε1/εt1-τ(1-e-t)dt. 5.17

Proof

Since the degrees are i.i.d. samples from a power-law distribution, Du=OP(n1/(τ-1)) uniformly in u[n]. Thus, when k=o(n(τ-2)/(τ-1)), kDu=oP(n) uniformly in u[n]. Therefore, we can Taylor expand the first two exponentials in (5.11), using that 1-e-x=x+O(x2). By Lemma 3, this leads to

Enc(k,Wnk(ε))=(1+oP(1))k2k(k-1)(u,v)Wnk(ε)DuDv(1-e-DuDv/Ln)Ln2. 5.18

Furthermore, since Du=OP(n1/(τ-1)) while also DuDv=Θ(n) in the major contributing regime, we can add the indicator that K1n(τ-2)/(τ-1)<Du<K2n1/(τ-1) for 0<K1,K2<. We then define the random measure

M(n)[a,b]=(μn)τ-1log(n)n2uv[n]1DuDvnμ[a,b],K1n(τ-2)/(τ-1)<Du<K2n1/(τ-1). 5.19

We write the expected value of this measure as

EM(n)[a,b]=(μn)τ-1log(n)n2Euv:DuDv[a,b]μn,Du[K1n(τ-2)/(τ-1),K2n1τ-1]=(μn)τ-1(n-1)log(n)nPD1D2[a,b]μn,D1[K1n(τ-2)/(τ-1),K2n1τ-1]=(μn)τ-1log(n)K1n(τ-2)/(τ-1)K2n1τ-1aμn/xbμn/xC2(xy)-τdydx=C2(μn)τ-1(n-1)log(n)nK1n(τ-2)/(τ-1)K2n1τ-11xdxaμnbμnu-τdu=C2n-1nabt-τdt3-ττ-1+log(K2/K1)log(n), 5.20

where we have used the change of variables u=xy and t=u/(μn). Thus,

limnEM(n)[a,b]=C23-ττ-1abt-τdt=:λ[a,b]. 5.21

Furthermore, the variance of this measure can be written as

VarM(n)[a,b]=(μn)2τ-6μ2log2(n)u,v,w,z(P(DuDv,DwDzμn[a,b],Du,Dw[K1n(τ-2)/(τ-1),K2n1τ-1])-PDuDvμn[a,b],Du[K1n(τ-2)/(τ-1),K2n1τ-1]×PDwDzμn[a,b],Dw[K1n(τ-2)/(τ-1),K2n1τ-1]). 5.22

Since the degrees are sampled i.i.d. from a power-law distribution, the contribution to the variance for |{u,v,w,z}|=4 is zero. The contribution from |{u,v,w,z}|=3 can be bounded as

(μn)2τ-6μ2log2(n)u,v,wPDuDv,DuDwμn[a,b]=μ2τ-4n2τ-3log2(n)PD1D2,D1D3μn[a,b]=μ2τ-4n2τ-3log2(n)1Cx-τan/xbn/xCy-τdy2dxKn-1log2(n), 5.23

for some constant K. Similarly, the contribution for u=z, v=w can be bounded as

(μn)2τ-6μ2log2(n)u,vPDuDvμn[a,b]=μ2τ-6n2τ-4log2(n)PD1D2μn[a,b]Kn2τ-4log2(n)n1-τlog(n)=Knτ-3log(n), 5.24

for some constant K. Thus, VarM(n)[a,b]=oP(1). Therefore, a second moment method yields that for every a,b>0,

M(n)[a,b]Pλ[a,b]. 5.25

Using the definition of M(n) in (5.19) and that Ln-1=(μn)-1(1+oP(1)),

(u,v)Wnk(ε)DuDv(1-e-DuDv/Ln)Ln2=μ1-τn3-τlog(n)ε1/εtLn(1-e-t)dM(n)(t)=μ-τn2-τlog(n)ε1/εt(1-e-t)dM(n)(t)(1+oP(1)). 5.26

By Lemma 5 and (5.25),

ε1/εt(1-e-t)dM(n)(t)Pε1/εt(1-e-t)dλ(t)=C23-ττ-1ε1/εt1-τ(1-e-t)dt. 5.27

If we first let n, and then K10 and K2, then we obtain from (5.18), (5.26) and (5.27) that

Enc(k),Wnk(ε)n2-τlog(n)PC2μ-τ3-ττ-1ε1/εt1-τ(1-e-t)dt. 5.28

Lemma 7

(Range II) When k=Ω(n(τ-2)/(τ-1)) and k=o(n),

Enc(k,Wnk(ε))n2-τlog(n/k2)PC2μ-τε1/εt1-τ(1-e-t)dt. 5.29

Proof

We split the major contributing regime into three parts, depending on the values of Du and Dv, as visualized in Fig. 7. We denote the contribution to the clustering coefficient where Du[k/ε2,εn/k] (area A of Fig. 7) by c1(k,Wnk(ε)), the contribution from Du or Dv[εn/k,n/(εk)] (area B of Fig. 7) by c2(k,Wnk(ε)) and the contribution from Du[k,k/ε2] and Dv[ε3n/k,εn/k] (area C of Fig. 7) by c3(k,Wnk(ε)). We first study the contribution of area A. In this situation, Du,Dv<εn/k, so that we can Taylor expand the exponentials e-kDu/Ln and e-kDv/Ln in (5.11). This results in

Enc1(k,Wnk(ε))=1k2(u,v)Wnk(ε),Du[k/ε2,εn/k]1-e-kDu/Ln1-e-kDv/Ln1-e-DuDv/Ln=(1+oP(1))(u,v)Wnk(ε),Du[k/ε2,εn/k]DuDvLn2(1-e-DuDv/Ln). 5.30

Now we define the random measure

M1(n)[a,b]=(μn)τ-1log(ε3n/k2)n2u,v[n]1DuDvμn[a,b],Du[k/ε2,εn/k]. 5.31

A similar reasoning as in (5.25) shows that

M1(n)[a,b]PC2abt-τdt:=λ2[a,b]. 5.32

By (5.30), we can write the contribution to the expected value of c(k) in this regime as

Enc1(k,Wnk(ε))=(1+oP(1))(u,v)Wnk(ε),Du[k/ε3,εn/k]DuDvLn2(1-e-DuDv/Ln)=(1+oP(1))μ-τn2-τlog(ε3n/k2)ε1/εt(1-e-t)dM1(n)(t). 5.33

Thus, by Lemma 5,

Enc1(k,Wnk(ε))=(1+oP(1))2μ-τn2-τlog(ε3n/k2)ε1/εt(1-e-t)dλ2(t). 5.34

Then we study the contribution of area B in Fig. 7. This area consists of two parts, the part where Du[εn/k,n/(kε)], and the part where Dv[εn/k,n/(kε)]. By symmetry, these two contributions are the same and therefore we only consider the case where Du[εn/k,n/(kε)]. Then, we can Taylor expand e-Dvk/Ln in (5.11), which yields

Enc2(k,Wnk(ε))=2k2(u,v)Wnk(ε),Du>εn/k1-e-kDu/LnDvkLn1-e-DuDv/Ln. 5.35

Define the random measure

M2(n)([a,b],[c,d]):=(μn)τ-1n2u,v[n]1DuDvμn[a,b],Du(μn/k)[c,d]. 5.36

Then we obtain

Enc2(k,Wnk(ε))=2kLn(u,v)Wnk(ε),Du>εn/kLnDuk1-e-kDu/LnDuDvkLn1-e-DuDv/Ln=2μ-τn2-τε1/εε1/εt1t2(1-e-t1)(1-e-t2)dM2(n)(t1,t2)(1+oP(1)). 5.37

Again, using a first moment method and a second moment method, we can show that

M2(n)([a,b],[c,d])PC2abt-τdtcd1vdv=:λ[a,b]ν[c,d]. 5.38

Very similarly to the proof of Lemma 4 we can show that

ε1/εε1/εt1t2(1-e-t1)(1-e-t2)dM2(n)(t1,t2)Pε1/εε1/εt1t2(1-e-t1)(1-e-t2)dλ(t1)dν(t2). 5.39

The latter integral can be written as

ε1/εε1/εt1t2(1-e-t1)(1-e-t2)dλ(t1)dν(t2)=C2ε1/εε1/εt2-2t11-τ(1-e-t2)(1-e-t1)dt1dt2=C2ε1/ε1t22(1-e-t2)dt2ε1/εt11-τ(1-e-t1)dt1. 5.40

The left integral results in

ε1/ε1t22(1-e-t2)dt2=e-t2-1t2+Ei(t2)t2=εt2=1/ε=ε(e-1/ε-1)-e-ε-1ε+1/ε1ue-udu-log(ε)-j=1εkk!k=log1ε+1/ε1ue-udu+ε(e-1/ε-1)-e-ε-1ε-j=1εkk!k=log1ε+f(ε), 5.41

where Ei denotes the exponential integral and we have used the Taylor series for the exponential integral. We can show that f(ε)< for fixed ε(0,). In fact, f(ε)1 as ε0.

Fig. 7.

Fig. 7

Contributing regime for n(τ-2)/(τ-1)<k<n

Finally, we study the contribution of area C in Fig. 7, where Du[k,k/ε2] and Dv[n/kε3,n/kε]. In this regime, Duk=o(n) and Dvk=o(n) so that we can Taylor expand the first two exponentials in (5.11). This results in

Enc3(k,Wnk(ε))=(1+o(1))u,v:Dv[ε3n/k,εn/k],DuDv>εn,Du[k,k/ε2](1-e-DuDv/Ln)DuDvLn. 5.42

We define the random measure

M3(n)([a,b],[c,d]):=(μn)τ-1n2u,v1Duμk[a,b],Dv(μn/k)[c,d]. 5.43

Then,

Enc3(k,Wnk(ε))=(1+oP(1))n2-τμ-τ11/ε2ε/t1ε(t1t2)(1-e-t1t2)dM3(n)(t1,t2). 5.44

Again using a first moment method and a second moment method we can show that

M3(n)([a,b],[c,d])PC2abu-τducdv-τdv. 5.45

In a similar way, we can show that for B[1,1/ε2]×[ε3,ε], M3(n)(B)PC2B(uv)-τdudv. Thus, by Lemma 4,

11/ε2ε/t1ε(t1t2)(1-e-t1t2)dM3(n)(t1,t2)PC211/ε2ε/xε(xy)1-τ(1-e-xy)dydx. 5.46

We evaluate the latter integral as

11/ε2ε/xε(xy)1-τ(1-e-xy)dydx=11/ε2εεv1vu1-τ(1-e-u)dudv=ε1/εu/ε1/ε21vu1-τ(1-e-u)dvdu=log1εε1/εu1-τ(1-e-u)du+ε1/εlog1uu1-τ(1-e-u)du, 5.47

where we have used the change of variables u=xy and v=x. Summing all three contributions to the expectation under En of the clustering coefficient yields

Enc(k,Wnk(ε))=Enc1(k,Wnk(ε))+Enc2(k,Wnk(ε))+Enc3(k,Wnk(ε))=C2μ-τn2-τ(1+oP(1))[ε1/εt11-τ(1-e-t1)dt1×lognε2k2+3log1ε+2f(ε)+ε1/εlog1uu1-τ(1-e-u)du]=C2(1+oP(1))μ-τn2-τ[ε1/εt11-τ(1-e-t1)dt1lognk2+2f(ε)+ε1/εlog1uu1-τ(1-e-u)du]. 5.48

Dividing by n2-τlog(n/k2) and taking the limit of n then shows that

Enc(k,Wnk(ε))n2-τlog(n/k2)PC2μ-τε1/εx1-τ(1-e-x)dx. 5.49

Lemma 8

(Range III) For k=Ω(n),

Enc(k,Wnk(ε))n5-2τk2τ-6PC2μ3-2τε1/εt1-τ(1-e-t)dt2. 5.50

Proof

When k=Ω(n), the major contribution is from u, v with Du,Dv=Θ(n/k), so that DuDv=o(n). Therefore, we can Taylor expand the exponential e-DuDv/Ln in (5.11). Thus, we write the expected value of c(k) as

Enc(k,Wnk(ε))=1k2(u,v)Wnk(ε)1-e-kDu/Ln1-e-kDv/Ln1-e-DuDv/Ln(1+oP(1))=1k2(u,v)Wnk(ε)1-e-kDu/Ln1-e-kDv/LnDuDvLn(1+oP(1)). 5.51

Define the random measure

N1(n)[a,b]=(μn)τ-1nk1-τu[n]1{Du(μn/k)[a,b]}, 5.52

and let N(n) be the product measure N1(n)×N1(n). Since all degrees are i.i.d. samples from a power-law distribution, the number of vertices with degrees in interval [q1,q2] is distributed as a Bin(n,C(q11-τ-q21-τ)) random variable. Therefore,

N1(n)[a,b]=(μn)τ-1k1-τn{i:Di(μn/k)[a,b]}Plimn(μn)τ-1k1-τPDi(μn/k)[a,b]=(μn)τ-1k1-τaμn/kbμn/kCx-τdx=Cabt-τdt:=λ([a,b]), 5.53

where we have used the substitution t=xk/(μn). Then,

(u,v)Wnk(ε)1-e-kDu/Ln1-e-kDv/LnDuDvLn=Lnk2(u,v)Wnk(ε)1-e-kDu/Ln1-e-kDv/LnDukLnDvkLn=(1+oP(1))μ3-2τn5-2τk2τ-4ε1/εε1/εt1t2(1-e-t1)(1-e-t2)dN(n)(t1,t2). 5.54

Combining this with (5.51) yields

Enc(k,Wnk(ε))n5-2τk2τ-4=(1+oP(1))μ2τ-3ε1/εε1/εt1t2(1-e-t1)(1-e-t2)dN(n)(t1,t2)=(1+oP(1))μ2τ-3ε1/εt1(1-e-t1)dN1(n)(t1)2. 5.55

We then use Lemma 5, which shows that

ε1/εt11-τ(1-e-t1)dN1(n)(t1)PCε1/εt1(1-e-t1)dλ(t1)=Cε1/εt11-τ(1-e-t1)dt1. 5.56

Then, we can conclude from (5.55) and (5.56) that

Enc(k,Wnk(ε)n5-2τk2τ-6PC2μ3-2τε1/εt11-τ(1-e-t1)dt12. 5.57

Variance of the Local Clustering Coefficient

In the following lemma, we give a bound on the variance of c(k,Wnk(ε)):

Lemma 9

For all ranges, under Jn,

Varnc(k,Wkk(ε))Enc(k,Wnk(ε))2P0. 5.58

Proof

We will analyze the variance in a very similar way as we have analyzed the expected value of c(k) conditioned on the degrees in Sect. 5.1. We can write the variance of c(k,Wnk(ε)) as

Varnc(k,Wnk(ε))=1k2(k-1)2Nk2i,j:Di(er),Dj(er)=k(u,v),(w,z)Wnk(ε)Pni,u,vj,w,z-Pni,u,vPnj,w,z, 5.59

where i,u,v again denotes the event that vertices iu and v form a triangle. Equation (5.59) splits into various cases, depending on the size of {i,j,u,v,w,z}. We denote the contribution of {i,j,u,v,w,z}=r to the variance by V(r)(k). We first consider V(6)(k). By a similar reasoning as (5.7)

Varnc(k,Wnk(ε))=1Nk2k2(k-1)2i,j:Di(er),Dj(er)=k(u,v),(w,z)Wnk(ε)(gn(k,Du,Dv)×gn(k,Dw,Dz)(1+oP(1))-gn(k,Du,Dv)gn(k,Dw,Dz)(1+oP(1)))=(u,v),(w,z)Wnk(ε)oPgn(k,Du,Dv)gn(k,Dw,Dz)k2(k-1)2=oPEnc(k,Wnk(ε))2, 5.60

where we have again replaced gn(Di,Du,Dv) by gn(k,Du,Dv) because of (5.9). Since there are no overlapping edges when |{i,j,u,v,w,z}|=5, V(5)(k) can be bounded similarly. This already shows that the contribution to the variance from 5 or 6 different vertices involved is small in all three ranges of k.

We then consider the contribution from V(4), which is the contribution from two triangles where one edge overlaps. We show that these types of overlapping triangles are rare, so that their contribution to the variance is small. If for example i=j and u=z, then one edge from the vertex of degree k overlaps with another triangle. To bound this contribution, we use that PnX^ij=1min1,DiDjLn. Then we can bound the summand in (5.59) as

Pni,u,vi,w,u-Pni,u,vPni,w,uPni,u,vi,w,umin1,kDuLnmin1,kDvLn-2min1,DuDvLn-4×min1,kDwLn-6min1,DwDuLn-8=(1+On-1)min1,kDuLnmin1,kDvLnmin1,DuDvLn×min1,kDwLnmin1,DwDuLn. 5.61

We first consider k in Ranges I or II, where k=o(n). For the terms involving k we bound this by taking the second term of the minimum, while we bound min(DuDv/Ln,1)1. Combining this with (5.61) results in the bound

Pni,u,vi,w,u-Pni,u,vPni,w,u(1+On-1)k3DuDvDwLn3O(1)ε-1k3DwLn2, 5.62

where we have used that DuDv<n/ε when (u,v)Wnk(ε). Therefore, the contribution to the variance in this situation can be bounded by

k3k4Nk2i:Di(er)=k(u,v),(w,u)Wnk(ε)ε-1DwLn2=1kNk(u,v),(w,u)Wnk(ε)ε-1DwLn2ε-1kNkOn-1u[n]1εDuw[n]1Dw>εn/Du2, 5.63

where we have used that Dw=O(n/Du) in Wnk(ε). We then use Lemma 1 to further bound this as

k3k4Nk2i:Di(er)=k(u,v),(w,u)Wnk(ε)ε-1DwLn2K(ε)OP1nk1-τunDu3-2τK(ε)OPn3-2τkτ-1n(2-τ)/(τ-1). 5.64

Here K(ε) is a constant only depending on ε. Since n(2-τ)/(τ-1)kτ-1=o(n) when k=o(n) and τ(2,3), we have proven that this contribution is smaller than n4-2τlog2(n) and smaller than n4-2τlog2(n/k2), as required by Lemmas 6 and 7 respectively. Now we consider the contribution from triangles that share the edge between vertices u and v. Using a similar reasoning as in (5.61), the contribution from the case ij and u=z and v=w can be bounded as

1k4Nk2i,j:Di,Dj=k(u,v)Wnk(ε)Pni,u,vj,v,w-Pni,u,vPnj,v,w(u,v)Wnk(ε)k4Du2Dv2k4Ln4ε-2Pn(Du,Dv)Wnk(ε)=ε-2OPn1-τlog(n), 5.65

where we have used Lemma 1 and that DuDv=O(n) when (u,v)Wnk(ε). Since n1-τlog(n)=o(n4-2τlog2(n)) for τ(2,3), this shows that this contribution is small enough.

When k is in Range III, we use similar bounds for V(4), now using that Du,Dv,Dw<ε-1n/k. If Nk=0, then by definition Varnc(k)=0. Therefore, we only consider the case Nk1. Again, we start by considering the case i=j and u=z. We can use (5.61), where we use that DuDv<n2/(kε)2 and DuDw<n2/(kε)2, and we take 1 for the other minima. This yields

Pni,u,vi,w,u-Pni,u,vPni,w,uO(n2)k-4ε-4. 5.66

Thus, the contribution to the variance from this case can be bounded as

1k4Nk(u,v),(u,w)Wnk(ε)O(n2)k-4ε-41k4OPn5k-8ε-4PD>n/(εk)3OPn5k-8ε-4nkε3-3τ=OPk3τ-11n8-3τε3τ-7, 5.67

where we used Lemma 1. When k=Ω(n) and τ(2,3), this contribution is smaller that n10-4τk4τ-12, as required by Lemma 8. In the case where ij, u=z and v=w, we use a similar reasoning as the one in (5.61) to show that

Pni,u,vi,w,u-Pni,u,vPni,w,uO(n)k-2ε-2. 5.68

Then the contribution of this situation to the variance can be bounded as

1k4(u,v)Wnk(ε)O(n)k-2ε-2Oε-2n3k-6nεk2-2τ=On5-2τk2τ-8. 5.69

Again, this is smaller than n10-4τk4τ-12, as required. Thus, the contribution of V(4) is small enough in all three ranges.

Finally, V(3) can be bounded as

1k4Nk2i:Di=k(u,v)Wnk(ε)Pni,u,v=1k4NkEnc(k,Wnk(ε))=1k4NkOPf(k,n). 5.70

In Ranges I and II, we use that Nk=OPnk-τ. Thus, this gives a contribution of

V(3)(k)=OPn2-τlog(n)k4-τn=OPn1-τlog(n)kτ-4, 5.71

which is small enough since n1-τkτ-4<n4-2τ for τ(2,3) and k=o(n). In Range III, again we assume that Nk1, since otherwise the variance of c(k) would be zero, and therefore small enough. Then (5.70) gives the bound

V(3)(k)=OPn5-2τk2τ-10, 5.72

which is again smaller than n10-4τk4τ-12 for τ(2,3) and k=Ω(n). Thus, all contributions to the variance are small enough, which proves the claim.

Proof of Proposition 1 Combining Lemma 9 and the fact that PJn=1-O(n-1/τ) shows that

c(k,Wnk(ε))Enc(k,Wnk(ε))P1. 5.73

Then, Lemmas 7 and 8 show that

c(k,Wnk(ε))f(k,n)PC2ε1/εt1-τe-tdt+O(εκ)fork=o(n)C2ε1/εt1-τe-tdt2+O(εκ)fork=Ω(n). 5.74

which proves the proposition.

Contributions Outside Wnk(ε)

In this section, we show that the contribution of triangles with degrees outside of the major contributing ranges as described in (3.6) is negligible. The following lemma bounds the contribution from triangles with vertices with degrees outside of Wnk(ε):

Lemma 10

There exists κ>0 such that

Enc(k,W¯nk(ε))f(n,k)=OPεκ. 6.1

Proof

To compute the expected value of c(k), we use that PnX^ij=1min(1,DiDjLn). This yields

Enc(k)n2Enmin(1,kDuLn)min(1,kDvLn)min(1,DuDvLn)k(k-1). 6.2

Using Lemma 1, we obtain

Enc(k)=n2k-2OPEmin1,kDuμnmin1,kDvμnmin1,DuDvμn, 6.3

where Du and Dv are two independent copies of D. Similarly,

Enc(k,W¯nk(ε))=n2k-2OPEmin1,kDuμnmin1,kDvμnmin1,DuDvμn1(Du,Dv)W¯nk(ε), 6.4

where

Emin1,kDuμnmin1,kDvμnmin1,DuDvμn1(Du,Dv)W¯nk(ε)=(x,y)W¯nk(ε)(xy)-τmin1,kxμnmin1,kyμnmin1,xyμndydx. 6.5

We analyze this expression separately for all three ranges of k. For ease of notation, we assume that μ=1 in the rest of this section.

We first consider Range I, where k=o(n(τ-2)/(τ-1)). Then we have to show that the contribution from vertices u and v such that DuDv<εn or DuDv>n/ε is small. First, we study the contribution to (6.5) for DuDv<εn. We bound this contribution by taking the second term of the minimum in all three cases, which gives

k2n31n1εn/x(xy)2-τdydx=k2n31n1xxεnu2-τdudx=k2ε3-τ3-τOn-τlog(n). 6.6

Then, we study the contribution for DuDv>n/ε. This contribution can be bounded very similarly by taking kDuLn and kDuvLn and 1 for the minima in (6.5) as

nk2n21nn/(εx)n(xy)1-τdydx=k2n21n1xn/εnxu1-τdudx=k2ετ-2τ-2On-τlog(n). 6.7

Thus, by (6.4),

Enc(k,W¯nk(ε))=OPn2-τlog(n)εκ. 6.8

Multiplying by n2k-2 and dividing by n2-τlog(n) and taking the limit for n then proves the lemma in Range I by (6.4).

Now we consider Range II, where k=Ω(n(τ-2)/(τ-1)) and k=o(n). We show that the contribution from vertices u and v such that DuDv<εn or DuDv>n/ε or Du,Dv>n/(kε) is small. We first show that the contribution to (6.5) for Du>n/(kε) is small. In this setting, Duk>n, so that the first minimum in (6.5) is attained by 1. The contribution can be computed as

n/(kε)1(xy)-τmin1,kynmin1,xyndydx=kn2n/(εk)1n/xx1-τy2-τdydx+knn/(kε)n/xn/kx-τy1-τdydx+n/(kε)n/kx-τy-τdydx=k2On-τ+k2On-τ+ετ-1On2-2τk2τ-2. 6.9

By (6.4), multiplying by n2k-2 and then dividing by n2-τlog(n/k2) and letting n go to infinity shows that this contribution is small. Thus, we may assume that Du,Dv<n/(kε). Now we show that the contribution from DuDv<εn is negligible. Then, DuDv<n, so that the third minimum in (6.5) is attained for DuDv/n. The contribution then splits into various cases, depending on Du.

1nxy<εn(xy)1-τmin1,kxnmin1,kyndydx=1k1εn/x(xy)-τkx2yLn2dydx+kn/k1εn/x(xy)-τk2x2y2Ln3dydx+n/k1εn/x(xy)-τkxy2Ln3dydx=k2On-τε2-τ+k2εn-τOlog(n/k2)+k2On-τε3-τ. 6.10

The contribution of DuDv>n/ε can be bounded similarly as

xy>n/ε(xy)-τmin1,kxnmin1,kyndydx=1kn/(εx)(xy)-τkxLndydx+kn/kn/(εx)(xy)-τk2xyLn2dydx+n/kn/(εx)(xy)-τkyLndydx=k2ετ-1On-τ+k2ετ-2On-τlog(n/k2)+k2On-τετ-2. 6.11

By (6.4), multiplying by k-2n2 and then dividing by k(k-1)n2-τlog(n/k2) proves the lemma in Range II.

Finally, we prove the lemma in Range III, where k=Ω(n). Here we have to show that the contribution from Du,Dv<εn/k or Du,Dv>n/(εk) is small. We again bound this using (6.5). The contribution to (6.5) for Du>n/(kε) can be computed as

n/(kε)1(xy)-τmin1,kynmin1,xyndydx=nkεkn/xx-τy-τdydx+nkεkn/kn/x1nx-τ+1y-τ+1dydx+nkεk0n/kkn2x-τ+1y-τ+2dydx+kn/kx-τy-τdydx+kn/xn/kknx-τy-τ+1dydx+k0n/xkn2x-τ+1y-τ+2dydx=Ologk2εnn1-τ+Oετ-2k2τ-4n3-2τ+On1-τ+Oετ-2n3-2τk2τ-4+On1-τ+On1-τ+On1-τ=Oετ-2k2τ-4n3-2τ. 6.12

Multiplying this by n2k-2 and then dividing by n5-2τk2τ-6 shows that this contribution is small.

Then we study the contribution to (6.5) for Du<εn/k. This can be computed as

1n1εn/k1(xy)1-τmin1,kynmin1,xyndydx=0nεk0n/kk2n3x-τ+2y-τ+2dydx+0nεkn/kn/xkn2x-τ+2y-τ+1dydx+0nεkn/xknx-τ+1y-τdydx=Oε3-τk2τ-4n3-2τ+Oε3-τk2τ-4n3-2τ+Oεn1-τ=Oετ-2k2τ-4n3-2τ. 6.13

Thus, dividing these estimates by n3-2τk2τ-6 and noting that n1-τ<n3-2τk2τ-4 for k=Ω(n) and k=o(n) completes the proof in Range III.

Proof of Theorem 2

We now show how we adjust the proof of Theorem 1 to prove Theorem 2. We use the same major contributing triangles as the ones in Range III in (3.6). Then, in fact Lemmas 39 and Proposition 2 still hold. It is easy to derive a similar lemma as Lemma 8 for the situation k=Θ(n). The only difference with the proof of Lemma 8 is that we do not Taylor expand the exponentials in (5.51). This then proves Theorem 2.

Proof of Theorem 3

We now prove that the scaling limit of kc(k) is continuous around k=n. When B is large, we rewrite (3.4) as

c(k)n2-τPC2μ2-2τB2τ-400(xy)-τ(1-e-x)(1-e-y)(1-e-xyμ/B2)dxdy. 6.14

Taylor expanding the last exponential then yields

c(k)n2-τ=(1+oP(1))C2μ3-2τB2τ-600(xy)1-τ(1-e-x)(1-e-y)dxdy=(1+oP(1))C2μ3-2τB2τ-6A2. 6.15

Substituting k=Bn in Range III of Theorem 1 gives

c(k)n2-τ=(1+oP(1))C2μ3-2τB2τ-6A2, 6.16

which is the same as the result obtained from Theorem 2. Therefore, the scaling limit of kc(k) is smooth for k>n.

For B small, we can Taylor expand the first two exponentials in (3.4) as long as x and y are much smaller than 1 / B. The contribution where x,y<1/B and B<μxy<1/B can be written as

C2μ2-2τB21B/(μx)1/B(xy)1-τ(1-e-μxy)dydx+11/BB/(μx)1/(Bx)(xy)1-τ(1-e-μxy)dydx=C2μ-τB21Bv/B1vu1-τ(1-e-u)dudv+11/BB1/B1vu1-τ(1-e-u)dudv=C2μ-τlog(1/B2)B1/Bu1-τ(1-e-u)du+B1/Blog(1/u)u1-τ(1-e-u)du, 6.17

where we have used the change of variables u=μxy and v=x. The contribution of the second integral becomes small compared to the first part as B gets small, as the second integral is finite for B>0. We can show that the contributions from x,y>1/B, or from xy>1/B can also be neglected by using that 1-e-xmin(1,x). Thus, as B becomes small, Theorem 2 shows that c(k) for k=Bn can be approximated by

c(k)n2-τC2log(B-2)0u1-τ(1-e-u)du, 6.18

which agrees with the value for k=Bn in Range II of Theorem 1.

To prove the continuity around k=n(τ-2)/(τ-1), we note that the proofs of Lemmas 7,9 and 10 for Range II still hold if we assume that kan(τ-2)/(τ-1) for some a>0 instead of k=Ω(n(τ-2)/(τ-1)). Thus, we can also apply the result of Range II in Theorem 1 to k=an(τ-2)/(τ-1), which yields

c(k)=n2-τμ-τC2A3-ττ-1log(n)+log(a-2)(1+oP(1)). 6.19

This agrees with the kc(k) curve in Range I when n grows large.

Acknowledgements

This work was supported by NWO TOP Grant 613.001.451 and by the NWO Gravitation Networks Grant 024.002.003. The work of RvdH is further supported by the NWO VICI Grant 639.033.806. The work of JvL is further supported by an NWO TOP-GO Grant and by an ERC Starting Grant.

References

  • 1.Albert R, Jeong H, Barabási AL. Internet: diameter of the world-wide web. Nature. 1999;401(6749):130–131. doi: 10.1038/43601. [DOI] [Google Scholar]
  • 2.Boguñá, M., Pastor-Satorras, R.: Class of correlated random networks with hidden variables. Phys. Rev. E 68, 036112 (2003). 10.1103/PhysRevE.68.036112 [DOI] [PubMed]
  • 3.Bollobás B. Random Graphs, Cambridge Studies in Advanced Mathematics. 2 edn. Cambridge: Cambridge University Press; 2001. [Google Scholar]
  • 4.Britton T, Deijfen M, Martin-Löf A. Generating simple random graphs with prescribed degree distribution. J. Stat. Phys. 2006;124(6):1377–1397. doi: 10.1007/s10955-006-9168-x. [DOI] [Google Scholar]
  • 5.Catanzaro M, Caldarelli G, Pietronero L. Assortative model for social networks. Phys. Rev. E. 2004;70:037101. doi: 10.1103/PhysRevE.70.037101. [DOI] [PubMed] [Google Scholar]
  • 6.Chung F, Lu L. The average distances in random graphs with given expected degrees. Proc. Natl. Acad. Sci. USA. 2002;99(25):15879–15882. doi: 10.1073/pnas.252631999. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 7.Dorogovtsev SN, Goltsev AV, Mendes JFF. Pseudofractal scale-free web. Phys. Rev. E. 2002;65:066122. doi: 10.1103/PhysRevE.65.066122. [DOI] [PubMed] [Google Scholar]
  • 8.Faloutsos, M., Faloutsos, P., Faloutsos, C.: On power-law relationships of the internet topology. In: ACM SIGCOMM Computer Communication Review, vol. 29, pp. 251–262. ACM (1999)
  • 9.van der Hofstad R. Random Graphs and Complex Networks. Cambridge: Cambridge University Press; 2017. [Google Scholar]
  • 10.van der Hofstad, R., van Leeuwaarden, J.S.H., Stegehuis, C.: Hierarchical configuration model. Internet Mathematics (2015). 10.24166/im.01.2017
  • 11.van der Hofstad, R., van Leeuwaarden, J.S.H., Stegehuis, C.: Optimal subgraph structures in scale-free networks (2017). arXiv:1709.03466
  • 12.van der Hoorn Pim, Litvak Nelly. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2015. Upper Bounds for Number of Removed Edges in the Erased Configuration Model; pp. 54–65. [Google Scholar]
  • 13.Jeong H, Tombor B, Albert R, Oltvai ZN, Barabási AL. The large-scale organization of metabolic networks. Nature. 2000;407(6804):651–654. doi: 10.1038/35036627. [DOI] [PubMed] [Google Scholar]
  • 14.Krot Alexander, Ostroumova Prokhorenkova Liudmila. Lecture Notes in Computer Science. Cham: Springer International Publishing; 2015. Local Clustering Coefficient in Generalized Preferential Attachment Models; pp. 15–28. [Google Scholar]
  • 15.Leskovec J. Dynamics of Large Networks. Ann Arbor: ProQuest; 2008. [Google Scholar]
  • 16.Leskovec, J., Krevl, A.: SNAP datasets: Stanford large network dataset collection (2014). http://snap.stanford.edu/data. Accessed 14 Mar 2017
  • 17.Newman MEJ. Networks: An Introduction. Oxford: Oxford University Press; 2010. [Google Scholar]
  • 18.Niu Xing, Sun Xinruo, Wang Haofen, Rong Shu, Qi Guilin, Yu Yong. The Semantic Web – ISWC 2011. Berlin, Heidelberg: Springer Berlin Heidelberg; 2011. Zhishi.me - Weaving Chinese Linking Open Data; pp. 205–220. [Google Scholar]
  • 19.Ravasz E, Barabási AL. Hierarchical organization in complex networks. Phys. Rev. E. 2003;67:026112. doi: 10.1103/PhysRevE.67.026112. [DOI] [PubMed] [Google Scholar]
  • 20.Serrano MA, Boguñá M. Clustering in complex networks. I. General formalism. Phys. Rev. E. 2006;74:056114. doi: 10.1103/PhysRevE.74.056114. [DOI] [PubMed] [Google Scholar]
  • 21.Stegehuis, C., van der Hofstad, R., van Leeuwaarden, J.S.H., Janssen, A.J.E.M.: Clustering spectrum of scale-free networks. Phys. Rev. E 96(4) (2017). 10.1103/physreve.96.042309 [DOI] [PubMed]
  • 22.Vázquez A, Pastor-Satorras R, Vespignani A. Large-scale topological and dynamical properties of the internet. Phys. Rev. E. 2002;65:066130. doi: 10.1103/PhysRevE.65.066130. [DOI] [PubMed] [Google Scholar]
  • 23.Whitt, W.: Stochastic-Process Limits. Springer, New York (2006). http://www.ebook.de/de/product/25193775/ward_whitt_stochastic_process_limits.html

Articles from Journal of Statistical Physics are provided here courtesy of Springer

RESOURCES