Abstract
In recent years, many variants of percolation have been used to study network structure and the behavior of processes spreading on networks. These include bond percolation, site percolation, -core percolation, bootstrap percolation, the generalized epidemic process, and the Watts threshold model (WTM). We show that—except for bond percolation—each of these processes arises as a special case of the WTM, and bond percolation arises from a small modification. In fact “heterogeneous -core percolation,” a corresponding “heterogeneous bootstrap percolation” model, and the generalized epidemic process are completely equivalent to one another and the WTM. We further show that a natural generalization of the WTM in which individuals “transmit” or “send a message” to their neighbors with some probability less than 1 can be reformulated in terms of the WTM, and so this apparent generalization is in fact not more general. Finally, we show that in bond percolation, finding the set of nodes in the component containing a given node is equivalent to finding the set of nodes activated if that node is initially activated and the node thresholds are chosen from the appropriate distribution. A consequence of these results is that mathematical techniques developed for the WTM apply to these other models as well, and techniques that were developed for some particular case may in fact apply much more generally.
I. INTRODUCTION
To understand processes spreading on a static network , researchers frequently investigate how behaves under percolation. Percolation comes in many flavors, and the information we gain depends on which variety we choose. Most frequently, we study bond or site percolation, but researchers have also found that -core percolation, bootstrap percolation, the generalized epidemic process, and the Watts threshold model (WTM) provide valuable insights [1–6]. These processes are closely related, and indeed similar mathematical approaches have been used to study several of these processes [7,8]. Our main result is that all of these (and some related) processes can be derived as special cases of the WTM, and in fact several of these are completely equivalent to the WTM.
Much of the motivation for studying percolation processes comes from trying to understand spreading processes in networks. If we consider systems in which nodes change status in response to the status of their neighbors, and the potential path of statuses they can have is acyclic (that is, they can never return to a previous status), then many variants of percolation can be applied. This is commonly used for susceptible-infected-recovered (SIR) disease, in which an individual can be infected by an infected neighbor. However, much recent work has focused on the spread of “social contagion” or “complex contagions” [9,10] in which multiple transmissions may be required in order to cause “infection.” Sometimes this is presented as assigning each node a threshold such that becomes infected once neighbors are “infected.” Other times this is presented as a reduction (or increase) in the probability that a neighbor will transmit as an individual encounters more infected individuals. This models the idea that after hearing seemingly independent “confirmation” of a rumor, people may be more likely to believe and spread it, or after seeing multiple people engaging in buying a product, someone is more likely to perceive a consensus and buy the product as well. Some experimental evidence of this has been found [11,12].
We briefly review the processes we will study: In bond percolation, some edges are independently selected with uniform probability to be retained while the remaining edges are deleted (with probability ). Similarly in site percolation, some nodes are randomly selected with probability and the remaining nodes are deleted. Typically our interest is in identifying the nodes in the connected components of the residual network, and whether a “giant” component exists (that is, a component whose size is proportional to the network size in the infinite network limit).
Bond percolation and site percolation often show up in the study of SIR disease spread where a single transmission suffices to cause infection [13–24]. There is an exact equivalence between the spread of an SIR disease and bond percolation, and so much has been learned about the threshold, scaling properties, and dynamics of an SIR disease by studying the corresponding percolation model. This percolation equivalence is based on the fact that an edge either exists or does not in percolation, while in disease spread if the edge transmits, the receiving node becomes infected.
In -core percolation, all nodes with degree less than some specified are removed. This removal may reduce some nodes' degrees below . If so, these are removed. This “pruning” process repeats until a state is reached in which all nodes have degree at least . This remaining network is called the “-core” of the network. It is seen to have hybrid phase transitions, with a square-root-type scaling on one side of a transition followed by a discontinuous jump [4,25]. In a variant, “heterogeneous -core” percolation [26], each node is assigned its own threshold value and deleted if its degree goes below the threshold. We note that many authors have used the term “bootstrap percolation” to denote -core percolation, and indeed this appears to be the original term [1,3,4], but we reserve “bootstrap percolation” for a closely related dual process. The -core has been applied to many problems, including understanding the failure of a physical system under strain [27], network visualization [28], identification of the component of a network responsible for establishing a disease [29], and more generally for understanding the structure of a network [30].
In bootstrap percolation (introduced in [1], where it is called “diffusion percolation”), a collection of nodes is initially “activated.” Then any inactive node with at least active neighbors becomes active. The process repeats until all remaining inactive nodes have fewer than active neighbors. It was initially introduced to model the spread of a water-filled crack in a rock. It has received considerable study on lattices [31,32], and its behavior in large random networks has been the subject of some more recent analysis [33]. Like -core percolation, it is seen to have a hybrid phase transition. We introduce a natural generalization analogous to heterogeneous -core percolation in which each node is assigned its own threshold. This “heterogeneous bootstrap percolation” does not appear to have been studied previously.
In the generalized epidemic process (GEP) [2,5,34], we think of an infection spreading through the network. If a node has a single infected neighbor, its probability of becoming infected is . If it escapes infection but a second neighbor becomes infected, then its probability of becoming infected is . This repeats and the probability of successful transmission on the neighbor's infection is . If for all , then this is the network version of the classical Reed-Frost model [35] for a susceptible-infected-recovered disease [36]. If decreases as increases, this could model decreasing susceptibility due to an improved immune response as exposures accumulate, or it could simply represent preexisting heterogeneities in susceptibility that are revealed as the number of exposures increases. An increasing would model some synergistic or cumulative effect of exposures as seen in “complex contagions” [9]. For comparison with other models, we allow to depend on , the degree of node .
In the WTM [6,37], each node is assigned an individual threshold , which we assume is assigned to independently at random, with a probability that may depend on its degree . The probability that node has a given is given by . A node begins as either active or inactive. If an inactive node has at least active neighbors, then it becomes active. We assume that the initially active nodes may be chosen independently at random [which can be modeled by having for some ], or they may be chosen by some other rule, in which case we treat the set of initially active nodes as an input to the algorithm. Often a common threshold is chosen so or a common fraction is chosen so . As described above, this is frequently used to model social contagions. In [6] it was conjectured that for a global cascade to occur from an infinitesimally small initial proportion active, a giant component of nodes with would need to exist. This is true in random configuration model networks, but false in random clustered networks [8]. As with bootstrap and -core percolation, this is known to exhibit hybrid bifurcations [8].
In these generalized percolation processes, typically we are interested in the final set of active nodes, but sometimes we may be interested in the temporal dynamics as these nodes become active [8,25]. If we are interested in the temporal dynamics, then we must assign additional rules for how long it takes for a node to become active. Although the timing will depend on the details of the additional rules, the final set of active nodes is uniquely determined once the network, thresholds, and initially active nodes are chosen. For our purposes, we focus just on the final state.
We will show that by appropriately choosing the distribution of and the initial set of active nodes, we can recover other versions of percolation from the WTM, including site percolation, -core percolation, bootstrap percolation, and the GEP. Going a step further, we show that the heterogeneous -core of a network, the deleted nodes in heterogeneous bootstrap percolation, and the set of “infected nodes” in the GEP are in fact all equivalent to the set of active nodes emerging from the WTM. That is, given one model and the corresponding distribution of thresholds, we can define the distribution of thresholds of the other models to yield the same sets of nodes with the same probabilities. A natural generalization of the WTM has each node “transmitting” or “passing a message” with some fixed probability . We show that by modifying the threshold distribution, the original WTM (with ) can recover the same outcomes as for any other , and thus allowing for does not enlarge the set of possible outcomes.
Finally, we investigate the relation with bond percolation. If our interest in bond percolation is to identify the connected component containing a given node , then we can find this component using the WTM with as the initially active node and appropriate threshold distribution. To find all connected components, we can start the WTM with one initially active node, run it to completion, and then choose a remaining inactive node and rerun the WTM, iterating until no inactive nodes remain. The set of nodes that are activated in each pass correspond exactly to the components found in bond percolation.
II. ANALYSIS
We begin by explicitly describing an algorithm that implements the WTM. Each node is assigned a weight uniformly between 0 and 1 which will be used to sample from the appropriate distribution of thresholds through the model-dependent function . This function may depend on the degree of the node. Typically, we choose the function to return the largest value such that . If there are specified initially active nodes, they are given a threshold of zero. Alternately, we can allow the randomly assigned threshold to permit values , in which case these nodes are initially active, and the iterative process begins. For each active node, we reduce the threshold of any inactive neighbor by 1. If a node's threshold reaches 0, it activates. Pseudocode for the algorithm is given in the Appendix.
Once the random thresholds and index nodes are set, the final outcome of the WTM is deterministic. To show that the other percolation processes give the same behavior, we will show how to structure these processes to start from the same random weights and deterministically yield a final state that is identical to the state found by the WTM for some threshold distribution.
A. Site percolation
In site percolation, each node is retained with probability or deleted with probability . To simulate site percolation, we can generate a random number independently and uniformly at random for each node . If (which occurs with probability ) we keep , otherwise we delete it. It is straightforward to see that this is identical to the algorithm presented in the Appendix if the threshold is set to be whenever and otherwise. In this case, with probability the node has threshold 0, and so it is initially active, while with probability it has threshold , and so it can never become active as it will have at most active neighbors. Thus, nodes are retained in site percolation iff they are active in the WTM. This is demonstrated in Fig. 1.
B. -core percolation
We now consider -core and heterogeneous -core percolation. The classical -core percolation is deterministic: each node with fewer than neighbors is deleted. This iterates until all remaining nodes have at least neighbors among the remaining nodes. To reproduce this with the WTM, we set regardless of .
With this threshold, all nodes with activate immediately in the WTM. In -core percolation, these same nodes are immediately deleted. For a given node not in this set, let the number of neighbors activated/deleted be denoted . In the WTM, any remaining node with then activates. In -core percolation, any node with is deleted. Again, these nodes are the same. Iterating as shown in Fig. 2, the set of activated nodes in the WTM is the set of deleted nodes in -core percolation.
We can repeat this for heterogeneous -core percolation. We assign weights to each node and map that to a heterogeneous -core threshold . We can map this weight to a WTM threshold such that if the node is assigned a given , it is assigned for the WTM. Then the WTM and heterogeneous -core percolation are equivalent: a node is deleted in heterogeneous -core percolation iff it is activated in the WTM.
C. Bootstrap percolation
In bootstrap percolation, some initial nodes are activated, and nodes become active once they have at least active neighbors ( is the same for all nodes). This is similar to -core percolation, but -core percolation is subtractive while bootstrap percolation is additive [26,33].
We consider bootstrap percolation with a set of initially active nodes, and we compare it to the WTM with for all nodes except the nodes in , which are initially active. Following a similar argument to the WTM/-core percolation equivalence, we see that with this definition, the WTM adds nodes to the system exactly when bootstrap percolation does.
If we consider heterogeneous bootstrap percolation, then a similar argument also shows that it is equivalent to the WTM. Because of the correspondence between the WTM and heterogeneous -core percolation, this means that heterogeneous bootstrap percolation is equivalent to heterogeneous -core percolation, with the deleted nodes in heterogeneous -core percolation matching the activated nodes in bootstrap percolation.
At first glance, this contrasts with observations of [26]. They showed that the -core and the activated nodes in bootstrap percolation are not the same and can have different internal structure. In fact, the distinction between the two turns out to be that the nodes defined to be active for the bootstrap version are the nodes deleted in the -core version. They are complementary processes. Any behavior observed in heterogeneous -core percolation can be observed in the inactivated nodes of heterogeneous bootstrap percolation, while any behavior observed in the activated nodes of bootstrap percolation can be found in the deleted nodes of -core percolation. This equivalence is previously known [1]. Figure 3 demonstrates the equivalence between heterogeneous bootstrap and heterogeneous -core percolation.
D. Generalized epidemic process
We now consider the generalized epidemic process (GEP) [2,5] for which the “infected” neighbor infects node (given that the previous did not) with probability . Our approach resembles the “Sellke construction” [39] of a simple epidemic model in a fully mixed population. In a standard fully mixed epidemic simulation, an individual that is susceptible at the start of a short time interval becomes infected with a probability proportional to the number of infected individuals. In the Sellke construction formulation, however, we assume we know in advance for each individual the cumulative amount of exposure it will receive before becoming infected (this is a random number chosen from an exponential distribution). We then begin the spread with some initial infections, and when (or if) the exposure reaches that threshold the individual becomes infected.
We will now study the network-based GEP using a similar approach. The probability that the first infected neighbors do not infect but the does is . We simply assign a random number and map this to . Thus for any given node, it will become infected upon the infection of its neighbor with probability independently of other nodes and independently of whether we will calculate in advance or simply accept or reject infection with probability as it accumulates infected neighbors.
For the WTM we use the same mapping from to , so . The node activates exactly after the neighbor activates, while in the GEP is infected at exactly the same step. Thus any GEP can be expressed as a WTM. Showing the inverse is straightforward, and so the GEP and WTM are equivalent. If we do not allow to depend on (as in the original version), then this is a special case of the WTM.
E. Bond percolation
We finally consider bond percolation. Typically in bond percolation, we can consider the edges in any order, choosing to keep each edge with probability or delete it with probability independently of the others. We then identify the connected components of the network.
We will focus our attention just on identifying which nodes form connected components after bond percolation; we are not interested in which edges exist within the components. In Fig. 4 we compare a bond percolation approach to finding the component containing a particular node with a WTM approach to finding the same component. We first perform bond percolation. We then select an initial node (highlighted in the figure), and we follow edges out from that node in the percolated network to find its component. Nodes are labeled with , where is the number of edges of the original network that were encountered (but deleted) prior to an undeleted edge.
We can think of this as being indistinguishable from selecting an initial node, following edges out from that node in some order, where each time an edge is considered, it is deleted with probability or followed with probability . The probability that the first edges to a node are deleted but the next is not is .
We compare this with the WTM with a threshold of . The activated nodes are identical to the component found using bond percolation. In general, assigning nodes a threshold of , where is taken with probability , will yield a set of active nodes from an initially active node that come from the same distribution as the component of that node following bond percolation.
In fact, we can generalize this approach to find all the components. The steps in our process are to begin with a network and assign thresholds using a geometric distribution: for a threshold of , the probability of is . We then select a node and successively add nodes to its component once their threshold number of neighbors have been visited. This process is likely to terminate without exploring all nodes. If this happens, we iteratively select a new node and add nodes to its component whenever their threshold number nodes have been visited (either in this stage or while building a previous component). The resulting components match the components observed in bond percolation. Nodes are activated exactly when they are added to a component in the bond percolation, and identifying in which iteration they are activated tells us which component they are part of. We show two different implementations based on a depth-first and breadth-first search beginning with the same thresholds and initial node in Fig. 5. The component reached in the first pass is the same for both approaches as long as the initial nodes of the passes are chosen in the same order. The algorithm described in the Appendix is based on a breadth-first search, but this demonstrates that other search orders will give the same outcomes.
To arrive at bond percolation, the thresholds for the WTM process are assigned from a geometric distribution. It would be interesting to study whether a different distribution could be interpreted in the context of a generalized bond percolation.
III. DISCUSSION
Many percolation processes have been studied in networks. We have shown that site percolation, bootstrap percolation, -core percolation, and the GEP are all special cases of the WTM. In fact, the GEP we consider is equivalent to the WTM, and if we allow a node-specific threshold, then both bootstrap and -core percolation are also equivalent. Which one should be considered the “base” model is a matter of personal choice.
Bond percolation is closely related to the WTM, but to arrive at an equivalent model, the WTM assigns thresholds from a geometric distribution, activates a node, follows the WTM process to completion, and then activates another node. The successive sets of activated nodes occur with the same probability as would be found in bond percolation.
We have further shown that generalizing the WTM to allow for a homogeneous transmission probability from active nodes to neighboring inactive nodes results in a model that can be thought of as a special case of the WTM. Thus the potential space of models is not increased by this modification. This commonality helps to explain why similar behaviors are observed and similar mathematical methods apply to these different processes.
ACKNOWLEDGMENTS
I thank Davide Cellai and James Gleeson for very useful conversations. This work was funded by the Global Good Fund through the Institue for Disease Modeling and by a Larkins Fellowship from Monash University.
APPENDIX: ALGORITHM
In this appendix, we provide pseudocode for the WTM algorithm. Other implementations are possible (this one is based on a breadth-first search, but for example, a depth-first search could also be used). The choice of the function , which maps a randomly chosen weight from to a threshold, allows us to match other percolation models. The steps of the WTM algorithm are shown as follows. The main algorithm is the final function given. The other functions are called by the main algorithm. First the weights are assigned randomly, and then the weights are mapped (deterministically) to a threshold, and the algorithm proceeds iteratively (and deterministically). The appropriate choice of allows us to select between the different models.
REFERENCES
- [1].J. Adler and A. Aharony, Diffusion percolation. I. Infinite time limit and bootstrap percolation, J. Phys. A 21, 1387 (1988). 10.1088/0305-4470/21/6/015 [DOI] [Google Scholar]
- [2].G. Bizhani, M. Paczuski, and P. Grassberger, Discontinuous percolation transitions in epidemic processes, surface depinning in random media, and Hamiltonian random graphs, Phys. Rev. E 86, 011128 (2012). 10.1103/PhysRevE.86.011128 [DOI] [PubMed] [Google Scholar]
- [3].J. Chalupa, P. L. Leath, and G. R. Reich, Bootstrap percolation on a Bethe lattice, J. Phys. C 12, L31 (1979). 10.1088/0022-3719/12/1/008 [DOI] [Google Scholar]
- [4].A. V. Goltsev, S. N. Dorogovtsev, and J. F. F. Mendes, k-core (bootstrap) percolation on complex networks: Critical phenomena and nonlocal effects, Phys. Rev. E 73, 056101 (2006). 10.1103/PhysRevE.73.056101 [DOI] [PubMed] [Google Scholar]
- [5].H.-K. Janssen, M. Müller, and O. Stenull, Generalized epidemic process and tricritical dynamic percolation, Phys. Rev. E 70, 026114 (2004). 10.1103/PhysRevE.70.026114 [DOI] [PubMed] [Google Scholar]
- [6].D. J. Watts, A simple model of global cascades on random networks, Proc. Natl. Acad. Sci. USA 99, 5766 (2002). 10.1073/pnas.082090499 [DOI] [PMC free article] [PubMed] [Google Scholar]
- [7].J. P. Gleeson, Cascades on correlated and modular random networks, Phys. Rev. E 77, 046117 (2008). 10.1103/PhysRevE.77.046117 [DOI] [PubMed] [Google Scholar]
- [8].J. C. Miller, Complex contagions and hybrid phase transitions, J. Complex Netw. 4, 201 (2016). 10.1093/comnet/cnv021 [DOI] [Google Scholar]
- [9].D. Centola, V. M. Eguíluz, and M. W. Macy, Cascade dynamics of complex propagation, Physica A 374, 449 (2007). 10.1016/j.physa.2006.06.018 [DOI] [Google Scholar]
- [10].D. Centola and M. Macy, Complex contagions and the weakness of long ties, Am. J. Sociol. 113, 702 (2007). 10.1086/521848 [DOI] [Google Scholar]
- [11].D. Centola, The spread of behavior in an online social network experiment, Science 329, 1194 (2010). 10.1126/science.1185231 [DOI] [PubMed] [Google Scholar]
- [12].P. O'Sullivan, D. J. Gary, J. O'Keeffe, P. G. Fennell, and J. P. Gleeson, Mathematical modeling of complex contagion on clustered networks, Front. Phys. 3, 71 (2015). 10.3389/fphy.2015.00071 [DOI] [Google Scholar]
- [13].A. Allard, P.-A. Noël, L. J. Dubé, and B. Pourbohloul, Heterogeneous bond percolation on multitype networks with an application to epidemic dynamics, Phys. Rev. E 79, 036113 (2009). 10.1103/PhysRevE.79.036113 [DOI] [PubMed] [Google Scholar]
- [14].J. L. Cardy and P. Grassberger, Epidemic models and percolation, J. Phys. A 18, L267 (1985). 10.1088/0305-4470/18/6/001 [DOI] [Google Scholar]
- [15].P. Grassberger, On the critical behavior of the general epidemic process and dynamical percolation, Math. Biosci. 63, 157 (1983). 10.1016/0025-5564(82)90036-0 [DOI] [Google Scholar]
- [16].E. Kenah and J. C. Miller, Epidemic percolation networks, epidemic outcomes, and interventions, Interdisc. Perspect. Infectious Diseases 2011, 543520 (2011). 10.1155/2011/543520 [DOI] [PMC free article] [PubMed] [Google Scholar]
- [17].K. Kuulasmaa and S. Zachary, On spatial general epidemics and bond percolation processes, J. Appl. Probab. 21, 911 (1984). 10.2307/3213706 [DOI] [Google Scholar]
- [18].R. Meester and P. Trapman, Bounding basic characteristics of spatial epidemics with a new percolation model, Adv. Appl. Probab. 43, 335 (2011). 10.1017/S0001867800004882 [DOI] [Google Scholar]
- [19].L. A. Meyers, Contact network epidemiology: Bond percolation applied to infectious disease prediction and control, Bull. Am. Math. Soc. 44, 63 (2007). 10.1090/S0273-0979-06-01148-7 [DOI] [Google Scholar]
- [20].J. C. Miller, Percolation and epidemics in random clustered networks, Phys. Rev. E 80, 020901(R) (2009). 10.1103/PhysRevE.80.020901 [DOI] [PubMed] [Google Scholar]
- [21].J. C. Miller, A. C. Slim, and E. M. Volz, Edge-based compartmental modelling for infectious disease spread, J. R. Soc. Interface 9, 890 (2012). 10.1098/rsif.2011.0403 [DOI] [PMC free article] [PubMed] [Google Scholar]
- [22].C. Moore and M. E. J. Newman, Epidemics and percolation in small-world networks, Phys. Rev. E 61, 5678 (2000). 10.1103/PhysRevE.61.5678 [DOI] [PubMed] [Google Scholar]
- [23].L. M. Sander, C. P. Warren, I. M. Sokolov, C. Simon, and J. Koopman, Percolation on heterogeneous networks as a model for epidemics, Math. Biosci. 180, 293 (2002). 10.1016/S0025-5564(02)00117-7 [DOI] [PubMed] [Google Scholar]
- [24].M. Á. Serrano and M. Boguñá, Percolation and Epidemic Thresholds in Clustered Networks, Phys. Rev. Lett. 97, 088701 (2006). 10.1103/PhysRevLett.97.088701 [DOI] [PubMed] [Google Scholar]
- [25].G. J. Baxter, S. N. Dorogovtsev, K.-E. Lee, J. F. F. Mendes, and A. V. Goltsev, Critical Dynamics of the -Core Pruning Process, Phys. Rev. X 5, 031017 (2015). 10.1103/PhysRevX.5.031017 [DOI] [Google Scholar]
- [26].G. J. Baxter, S. N. Dorogovtsev, A. V. Goltsev, and J. F. F. Mendes, Heterogeneous -core versus bootstrap percolation on complex networks, Phys. Rev. E 83, 051134 (2011). 10.1103/PhysRevE.83.051134 [DOI] [PubMed] [Google Scholar]
- [27].Y. Shi and M. L. Falk, Strain Localization and Percolation of Stable Structure in Amorphous Solids, Phys. Rev. Lett. 95, 095502 (2005). 10.1103/PhysRevLett.95.095502 [DOI] [PubMed] [Google Scholar]
- [28].J. I. Alvarez-Hamelin, L. Dall'Asta, A. Barrat, and A. Vespignani, Large scale networks fingerprinting and visualization using the -core decomposition, in Advances in Neural Information Processing Systems (MIT Press, Cambridge, MA, 2005), pp. 41–50. [Google Scholar]
- [29].M. Kitsak, L. K. Gallos, S. Havlin, F. Liljeros, L. Muchnik, H. E. Stanley, and H. A. Makse, Identification of influential spreaders in complex networks, Nat. Phys. 6, 888 (2010). 10.1038/nphys1746 [DOI] [Google Scholar]
- [30].S. N. Dorogovtsev, A. V. Goltsev, and J. F. F. Mendes, -Core Organization of Complex Networks, Phys. Rev. Lett. 96, 040601 (2006). 10.1103/PhysRevLett.96.040601 [DOI] [PubMed] [Google Scholar]
- [31].R. Cerf and E. N. M. Cirillo, Finite size scaling in three-dimensional bootstrap percolation, Ann. Probab. 27, 1837 (1999). [Google Scholar]
- [32].R. H. Schonmann, On the behavior of some cellular automata related to bootstrap percolation, Ann. Probab. 20, 174 (1992). 10.1214/aop/1176989923 [DOI] [Google Scholar]
- [33].G. J. Baxter, S. N. Dorogovtsev, A. V. Goltsev, and J. F. F. Mendes, Bootstrap percolation on complex networks, Phys. Rev. E 82, 011103 (2010). 10.1103/PhysRevE.82.011103 [DOI] [PubMed] [Google Scholar]
- [34].K. Chung, Y. Baek, M. Ha, and H. Jeong, Universality classes of the generalized epidemic process on random networks, Phys. Rev. E 93, 052304 (2016). 10.1103/PhysRevE.93.052304 [DOI] [PubMed] [Google Scholar]
- [35].H. Abbey, An examination of the Reed-Frost theory of epidemics, Human Biol. 24, 201 (1952). [PubMed] [Google Scholar]
- [36].R. M. Anderson and R. M. May, Infectious Diseases of Humans (Oxford University Press, Oxford, 1991). [Google Scholar]
- [37].P. S. Dodds and D. J. Watts, Universal Behavior in a Generalized Model of Contagion, Phys. Rev. Lett. 92, 218701 (2004). 10.1103/PhysRevLett.92.218701 [DOI] [PubMed] [Google Scholar]
- [38].D. Lusseau, K. Schneider, O. J. Boisseau, P. Haase, E. Slooten, and S. M. Dawson, The bottlenose dolphin community of Doubtful Sound features a large proportion of long-lasting associations, Behav. Ecol. Sociobiol. 54, 396 (2003). 10.1007/s00265-003-0651-y [DOI] [Google Scholar]
- [39].T. Sellke, On the asymptotic distribution of the size of a stochastic epidemic, J. Appl. Probab. 20, 390 (1983). 10.2307/3213811 [DOI] [Google Scholar]
- [40].W. W. Zachary, An information flow model for conflict and fission in small groups, J. Anthropol. Res. 33, 452 (1977). 10.1086/jar.33.4.3629752 [DOI] [Google Scholar]