Skip to main content
Springer logoLink to Springer
. 2023 Jan 10;86(2):22. doi: 10.1007/s00285-022-01854-9

Exact solutions and bounds for network SIR and SEIR models using a rooted-tree approximation

Cameron Luke Hall 1,, Bram Alexander Siebert 2
PMCID: PMC9832100  PMID: 36625970

Abstract

In this paper, we develop a new node-based approximate model to describe contagion dynamics on networks. We prove that our approximate model is exact for Markovian SIR (susceptible-infectious-recovered) and SEIR (susceptible-exposed-infectious-recovered) dynamics on tree graphs with a single source of infection, and that the model otherwise gives upper bounds on the probabilities of each node being susceptible. Our analysis of SEIR contagion dynamics is general to SEIR models with arbitrarily many classes of exposed/latent state. In all cases of a tree graph with a single source of infection, our approach yields a system of linear differential equations that exactly describes the evolution of node-state probabilities; we use this to state explicit closed-form solutions for an SIR model on a tree. For more general networks, our approach yields a cooperative system of differential equations that can be used to bound the true solution.

Mathematics Subject Classification: Primary: 92D30, 60J28, Secondary: 05C05, 05C90, 34C12, 37N25

Introduction

Network-based models have been used extensively to describe the spread of a contagious state (such as an infectious disease) through a population via the connections between individuals (Danon et al. 2011; Kiss et al. 2017; Miller and Kiss 2014; Pastor-Satorras et al. 2015). In many contagion models on networks, each node represents an individual and each edge represents a contact or connection that facilitates the spread of contagion between nodes. At any given time, each node has a state—e.g., susceptible, infectious, or recovered in the classic SIR model (Newman 2018; Pastor-Satorras et al. 2015)—and the node states evolve over time according to the rules that constitute the contagion model. In many such models, node state evolution is probabilistic and occurs over continuous time; in these cases, the spread of contagion through the network is a continuous-time discrete-space stochastic process where the state space is the set of states for all nodes in the network.

One challenge with stochastic network contagion models is to determine the node state probabilities as functions of time. Even for very simple contagion models, this is difficult on large networks because the node states do not evolve independently. In the most general case, node state probabilities can only be determined exactly from network state probabilities, which in turn can only be determined exactly by solving the master equations for the stochastic process. Since the size of the state space increases geometrically with the number of nodes, this is not computationally feasible on any but the smallest networks.

Instead, various methods have been developed for estimating—and, in some cases, bounding—node state probabilities in network contagion models. The simplest of these is the node-based mean field approximation (Pastor-Satorras et al. 2015); this approximation is also called the first-order model (Newman 2018), the individual-based model (Kiss et al. 2017), or the N-intertwined mean field approximation (Simon and Kiss 2018; Van Mieghem et al. 2009). In this approach, node state probabilities are assumed to be independent of each other, so that joint probabilities can be expressed as the product of individual node state probabilities. While this is a useful assumption that closes the evolution equations for node state probabilities, it is not perfectly accurate. In reality, the states of neighbouring nodes are positively correlated: e.g., the neighbours of a susceptible node are more likely to be susceptible than would be expected from assuming independence (Donnelly 1993). As a result, the node-based mean field approximation applied to standard contagion models will typically overestimate rates of infection and hence underestimate the probability that a given node is susceptible.

Two other approaches used to estimate and bound node state probabilities are the pair-based approximation (Cator and Mieghem 2012; Pastor-Satorras et al. 2015) and the message-passing approximation (Karrer and Newman 2010). To develop the pair-based approximation, Cator and Mieghem (2012) introduced variables for the joint probabilities of the states of neighbouring nodes and they derived evolution equations for these probabilities using a closure approximation to exclude the dependence on higher-order moments. To develop the message-passing approximation, Karrer and Newman (2010) considered the directed edges of the network and developed expressions for the probabilities that infection has not yet been transmitted along each edge.

While these two approaches are conceptually very different, Wilkinson and Sharkey (2014) showed that they are equivalent for Markovian SIR dynamics. Pair-based and message-passing approximations are more computationally demanding than node-based approximations but are generally more accurate than the node-based mean field approximation. When the underlying network is a tree, both approaches yield exact results for the SIR model (Karrer and Newman 2010; Sharkey et al. 2015).

In this paper, we develop and analyse a new approximate model of network contagion that can be applied to Markovian SIR and SEIR (susceptible-exposed-infectious-recovered) contagion models, including SEIR models with multiple distinct exposed states. The approximation we derive is a ‘node-based’ approximation; it takes the form of a closed system of differential equations for node state probabilities. As such, our approximation has a similar level of computational complexity to the node-based mean field approximation and is considerably simpler than the pair-based or message-passing approximations.

We refer to our approximation as the ‘rooted-tree approximation’ because it yields exact results on trees with a single initially-infectious node. This contrasts with both the node-based mean field model, which can never give exact results, and the pair-based and message-passing approximations, which give exact results on any tree regardless of the number of initially-infectious nodes (Karrer and Newman 2010; Sharkey et al. 2015). The exact differential equations obtained using our approximation are very simple and lead to explicit closed-form solutions for node state probabilities on rooted trees. We believe that these explicit solutions have not previously been reported.

On other networks (non-trees or trees with multiple initially-infectious nodes), we prove that the rooted-tree approximation gives upper bounds on the probabilities that nodes are susceptible. This contrasts with the other approximations described above, which give lower bounds on the probabilities that nodes are susceptible; this lower bound result is generally understood to hold for node-based mean field approximation of SIR models (Cator et al. 2018; Cator and Mieghem 2014; Donnelly 1993) and has been proved for node-based mean field approximation of SIS models (Donnelly 1993; Simon and Kiss 2018) and for pair-based/message-passing approximation of SIR models (Karrer and Newman 2010; Wilkinson and Sharkey 2014)

The development of our approximation exploits the fact that neither the SIR nor SEIR models permit the possibility of reinfection. In the case of an SIR model on a tree with a single initially-infectious node, this enables us to formulate an exact expression for the rate of infection in terms of the probabilities that nodes are susceptible. For other networks and initial conditions, a similar approach enables us to formulate a cooperative system of differential equations where the approximate rate of infection is a lower bound on the true rate of infection. This enables us to use the methods developed by Simon and Kiss (2018) to prove that our approach yields upper bounds on the probablilities that nodes are susceptible.

Our main contribution in this paper can be summarised as the rooted-tree approximation systems given in (28) and (64) for SIR and SEIR models respectively. In Sect. 2, we develop (28) for SIR models and prove that it is exact on rooted trees and otherwise yields an upper bound on the probability of being susceptible. In Sect. 3, we repeat this analysis for SEIR models to develop (64). Finally, in Sect. 4, we discuss the merits and limitations of our approach and make comparisons with other theoretical approaches to network contagion. We conclude by offering avenues for further exploration and extension of the rooted-tree approximation.

Rooted-tree approximation for the SIR model

Preliminaries

Let {X(t)} represent the stochastic process for network contagion dynamics on a network of N nodes. Any realisation of this process can be represented as a time-dependent N-dimensional vector of node states, X(t), so that Xk(t) gives the state of the kth node at time t. Following various other authors (Sharkey et al. 2015; Sharkey and Wilkinson 2015; Simon and Kiss 2018; Wilkinson and Sharkey 2014), we use angle brackets to indicate probabilities. Specifically, we define Sk(t)=PXk(t)=S to be the probability that node k is susceptible at time t, we define IjSk(t)=PXj(t)=IXk(t)=S to be the probability that node j is infectious and node k is susceptible at time t, and we define other probabilities and joint probabilities similarly.

In this section, we focus on the standard network SIR model as described in Newman (2018) and elsewhere. At any time, each node can either be susceptible (S), infectious (I) or recovered (R) and node states change over time according to a Markovian process. Susceptible nodes in contact with infectious nodes become infected at rate λ; that is, the probability that a susceptible node in contact with an infectious node becomes infectious in the next Δt is given by λΔt+o(Δt). Infection rates are taken to be additive over neighbours, so that additional infectious neighbours will increase the probability that a susceptible node becomes infectious in a given Δt. Infectious nodes recover at rate γ regardless of the states of their neighbours.

As a further generalisation, we assume that λ can depend on the associated directed edge, and that γ can depend on the associated node. Thus, we assume that the rate of infection can depend on the nodes involved and that the rate of recovery from infection can vary from node to node. We represent this using subscripts, so that λkj is the rate at which node k becomes infected given that node k is susceptible and node j is infectious, and γk is the rate at which node k would recover given that it is currently infectious.

With this notation, the following is an exact description of node probability dynamics for an SIR model on a network:

dSkdt=-jN(k)λkjIjSk, 1a
dIkdt=jN(k)λkjIjSk-γkIk, 1b
dRkdt=γkIk, 1c

where N(k) represents the set of upstream neighbours of node k (i.e., the set of nodes j for which λkj is nonzero).

Exact SIR dynamics on a rooted tree

Consider the case where the underlying network is a tree and where a single node is infectious at t=0 and all other nodes are susceptible. We assign the the label k=0 to the initially-infectious node and identify it as the root of the tree. We will use the term ‘rooted tree’ throughout our analysis (including for SEIR models) to refer to a tree where there is a unique node that is not in a susceptible or recovered state at t=0. For any other node k0, it is possible to identify a unique parent node p(k) as the neighbour of k that lies between node k and the root. Since all infection spreads from the root node it follows that node k can only be infected by node p(k). This enables us to simplify our notation and analysis in this section: we define λk=λkp(k) as the rate at which node k is infected by its parent node, and we omit the sums in equations (1a) and (1b).

Thus, the evolution of node state probabilities on a rooted tree is given by

dSkdt=0,k=0,-λkIp(k)Sk,k0; 2a
dIkdt=-γkIk,k=0,λkIp(k)Sk-γkIk,k0; 2b
dRkdt=γkIk. 2c

These equations need to be solved subject to initial conditions

Sk(0)=0,k=0,1,k0;,Ik(0)=1,k=0,0,k0;,Rk(0)=0. 3

This system of equations is not closed; in order to construct a node-based model of contagion dynamics, we need expressions for the pair probabilities Ip(k)Sk in terms of the node state probabilities. The analysis below shows how this can be achieved exactly on a rooted tree.

Consider any node k0. The law of total probability gives

Sk=Sp(k)Sk+Ip(k)Sk+Rp(k)Sk 4

Since infection can only spread from node p(k) to node k and not vice versa, we find that Xp(k)=S implies Xk=S (i.e., if the parent of node k is susceptible then node k must also be susceptible). Hence, Sp(k)Sk=Sp(k) and (4) can be rearranged as

Ip(k)Sk=Sk-Sp(k)-Rp(k)Sk. 5

This indicates that an expression for Rp(k)Sk in terms of node state probabilities could be used to obtain an expression for Ip(k)Sk in terms of node state probabilities.

We note that the only way to achieve a state where Xp(k)=R and Xk=S is for node p(k) to recover while node k is susceptible. Once such a state is achieved, it will persist permanently since node p(k) will remain recovered and node k cannot become infected except via node p(k). Expressed mathematically, this means that

dRp(k)Skdt=γp(k)Ip(k)Sk,k0, 6

which can be rearranged using (2a) to yield

dRp(k)Skdt=-γp(k)λkdSkdt,k0. 7

Integrating (7) and applying the initial conditions Rp(k)Sk(0)=0 and Sk(0)=1 for k0, we find that Rp(k)Sk=γp(k)λk-γp(k)λkSk.

Substituting this into (5) then yields

Ip(k)Sk=λk+γp(k)λkSk-Sp(k)-γp(k)λk,k0. 8

Equation (8) gives an expression for Ip(k)Sk purely in terms of the node state probabilities Sk and Sp(k). Substituting into system (2), we obtain the following closed system for the node state probabilities:

dSkdt=0,k=0,-(λk+γp(k))Sk+λkSp(k)+γp(k),k0; 9a
dIkdt=-γkIk,k=0,(λk+γp(k))Sk-λkSp(k)-γp(k)-γkIk,k0; 9b
dRkdt=γkIk. 9c

This system can be solved subject to the initial conditions in (3) to yield an exact representation of node state probabilities on a rooted tree.

Closed form solutions

The system in (9) is amenable to further analysis leading to explicit closed form solutions. We observe that the differential equations in (9) are all linear and have constant coefficients. Moreover, the system is partially decoupled: the equations for dSkdt are independent of Ik and Rk, the equations for dIkdt are independent of Rk, and all equations for node state probabilities at a given node are independent of the states of the node’s children and siblings.

It follows that the differential Eq in (9) can be solved sequentially using standard methods. To achieve this, we first reassign the node labels so that p(k)<k for all k; this can be done by taking node 0 as the root and applying either a breadth-first search algorithm or a depth-first search algorithm (Biggs 2002). With this reordering, we first note that equation (9a) is trivial when k=0 and yields the solution S0(t)=0. Next, we find that if k>0 then Eq (9a) takes the form

dSkdt+(λk+γp(k))Sk=λkSp(k)+γp(k) 10

Since the reordered node labels satisfy p(k)<k, we observe that the right hand side of (10) involves a function Sj(t) where j<k. Hence, we can solve (10) for k=1 using the solution for S0(t), then solve (10) for k=2 using the solution for S0(t) or S1(t) (depending on which of these is the parent of node 2), and continue sequentially through all values of k.

At each step, we solve (10) using standard methods for first-order constant coefficients linear differential equations, noting that the right hand side will always consist of products and sums of exponential and polynomial functions. Once the functions Sk(t) are known, it is straightforward to solve (9b) and (9c) to obtain solutions for Ik(t) and Rk(t).

From these node state probabilities we can obtain the expected number of nodes in any state at any given time by exploiting the fact that the expected value of a sum is the sum of the expected values. Since Sk(t) can be thought of as the expected value of an indicator function that is 1 when Xk=S and 0 otherwise, it follows from the interchangeability of summation and expectation that the expected number of susceptible nodes is given by kSk(t). This result holds even though node states are not independent and the joint probabilities of node states can be difficult to determine from the node state probabilities.

As a simple example of obtaining closed form solutions for node state probabilities, consider the case where λ and γ are constant for all nodes. In this case, the symmetry of the system implies that node state probabilities will be identical for nodes of equal depth (i.e., equal distance from the root node). Thus, we can obtain all node state probabilities by considering a simplified problem based on node depths. For clarity of notation, let d(k) represent the depth of node k and let s¯j, ı¯j, and r¯j be defined so that Sk=s¯d(k) and similarly for ı¯j and r¯j. Note that d(p(k))=d(k)-1 and that the root node is the only node for which d(k)=0.

Introducing s¯j, ı¯j, and r¯j, we rearrange (9) and exploit the fact that s¯j+ı¯j+r¯j=1 to obtain

ds¯jdt+(λ+γ)s¯j=0,j=0,λs¯j-1+γ,j0; 11a
dı¯jdt+γı¯j=-ds¯jdt; 11b
r¯j=1-s¯j-ı¯j, 11c

which must be solved subject to the initial conditions

s¯j(0)=0,j=0,1,j0;,ı¯j(0)=1,j=0,0,j0. 12

This system can be solved explicitly using a range of different methods (e.g., operator D methods or Laplace transforms). Applying any of these solution methods, we find that

s¯j(t)=1-λj(λ+γ)j+λj(λ+γ)je-(λ+γ)tn=0j-1(λ+γ)ntnn!, 13a
ı¯j(t)=e-γt-e-(λ+γ)tn=0j-1λntnn!, 13b
r¯j(t)=λj(λ+γ)j-e-γt+e-(λ+γ)tn=0j-1λn-λj(λ+γ)j-ntnn!. 13c

To the best of our knowledge, this is the first time that this simple, closed-form solution has been reported in the literature on contagion on networks.

From this solution, it is straightforward to obtain the expected number of nodes in a rooted tree that are susceptible, infectious, or recovered. This can be achieved by counting the number of nodes at each level of the tree and using these counts as weights for a linear combination of the depth-based solutions from (13). For example, if Wj represents the number of nodes at depth j from the root, then the expected number of susceptible nodes will be given by jWjs¯j, where s¯j is taken from (13); equivalent results hold for the expected numbers of infectious and recovered nodes.

Figure 1 shows comparisons of s¯j and ı¯j from (13) with empirical node state probabilities based on averaging 105 Gillespie algorithm simulations of the underlying stochastic model. All calculations were performed in Matlab and code is provided at https://github.com/cameronlhall/rootedtreeapprox. These figures illustrate the fact that (13) are exact results; the theoretical results for s¯j and ı¯j are virtually indistinguishable from results obtained using Gillespie simulations.

Fig. 1.

Fig. 1

Comparision of the rooted-tree solutions for s¯j and ı¯j in (13) with simulation results from the average of 105 Gillespie algorithm simulations of the full stochastic SIR model. Subfigure (a) shows results for s¯j while subfigure (b) shows results for ı¯j . In both cases, the rooted tree solutions are shown as continuous lines and the numerical results are shown as points marked +. Results are shown for nodes where 1d(k)10; results from j=d(k)=1 are indicated with a thicker blue line and nodes of increasing depthproduce curves further to the right. Parameters used are λ=1 and γ=0.1

Figure 1 also illustrates some properties of SIR dynamics on a chain that can be derived from analysis of (13). For example, (13b) can be rearranged as

ı¯j(t)=e-γt1-e-λtn=0j-1λntnn!. 14

Since the sum in (14) is the first k terms in the Maclaurin series of eλt, we see that ı¯j will initially be close to zero and will remain close to zero for longer for larger values of k. Additionally, we observe that the term in brackets in (14) will asymptotically approach 1 as t, which implies that ı¯je-γt as t. Both the early time behaviour where ı¯j is close to zero and the late time behaviour where ı¯je-γt are visible in Figure 1b.

While (11) and (13) are simple and elegant results, they are of limited practical use because they are specific to rooted trees. Results that only hold on trees are not useful for describing contagion on contact networks or social networks because such networks tend to be highly clustered (Newman 2018) and the clustering coefficient of a tree is necessarily zero.

Bounds for SIR dynamics on a general network

Despite the limitations of the rooted-tree approximation, a major strength of (11) is that it can be adapted to obtain a node-based approximation of contagion dynamics that gives a bound on Sk for all networks. In Sect. 2.2, we showed that the closed system (9) is equivalent to the system (2), which describes the evolution of node state probabilities for SIR dynamics on a rooted tree. In this section, we develop an analogue of (9) that can be applied to a general network. We show that this new formulation yields upper bounds on the functions Sk(t).

The formulation developed in this section does not rely on prior knowledge of which neighbour (or neighbours) of a given node might pass the infection to it. Instead, this method constructs a lower bound on the rate that a particular node passes infection to one of its neighbours that is based only on those nodes’ probabilities of being susceptible.

We begin by assuming that no node is recovered at t=0, and so we can specify initial conditions where Sk(0) is given for each node and

Ik(0)=1-Sk(0),Rk(0)=0. 15

We make this assumption without loss of generality since the recovered state is permanent in the SIR model; SIR dynamics on a network with initially-recovered nodes will be equivalent to SIR dynamics on a network where those nodes and associated edges have been removed.

The analysis that follows is analogous to the derivation of the exact solution for rooted trees in Section 2.2, but we derive inequalities throughout. Let j and k be chosen so that jN(k); that is, the nodes are selected so that it is possible for node j to pass the contagion to node k. From the laws of probability, we note that SjSk+IjSk+RjSk=Sk, and that SjSkSj. Combining these gives

IjSkSk-Sj-RjSk. 16

Now consider the dynamics of RjSk. We note that a state where Xj=R and Xk=S can only arise from a state where node Xj=I and Xk=S. Additionally, a state where Xj=R and Xk=S can change to another state only if node k becomes infected from one of its neighbours. Thus,

dRjSkdt=γjIjSk-iN(k)λkiRjSkIi, 17

and, since all probabilities are nonnegative, it follows that

dRjSkdtγjIjSk. 18

Noting that the terms inside the summation in (1a) are all nonnegative, we observe that

-dSkdtλkjIjSk. 19

That is, the rate at which node k becomes infectious must be at least as large as the rate at which node k is infected by any particular one of its neighbours, j. Combining (18) and (19) then gives

dRjSkdt-γjλkjdSkdt. 20

Using the assumption that no nodes are recovered at t=0, we recall that RjSk(0)=0. This enables us to integrate (20) from t=0 to obtain RjSk(t)γjλkjSk(0)-Sk(t), and hence (16) becomes

IjSkSk-Sj-γjλkjSk(0)-Sk(t). 21

Thus, we have obtained a lower bound on IjSk for any pair of neighbouring nodes j and k based only on their probabilities of being susceptible.

In many cases, however, the expression given on the right hand side of (21) will be negative. Since IjSk must be nonnegative, it follows that

IjSk(t)Sk(t)-Sj(t)-γjλkjSk(0)-Sk(t)+, 22

where [x]+ is defined so that

[x]+=0,x0,x,x>0. 23

Substituting into (1a), we obtain

dSkdt-jN(k)[-γjSk(0)+(λkj+γj)Sk(t)-λkjSj(t)]+. 24

This inequality expresses a lower bound on the rate at which node k can become infected. We note that this lower bound is given as a sum over all neighbouring nodes j of an expression involving only Sk and Sj (22). For many pairs of neighbouring nodes, this expression will be zero; this does not imply that node j can never infect node k in this case, but instead implies that the method can give no information about the rate at which node j infects k.

The differential inequality (24) holds for the true node state probabilities Sk(t). Based on this inequality, we now consider the relationship between the true solutions Sk(t) and approximate solutions Sk(t) that satisfy the system

dSkdt=-jN(k)[-γjSk(0)+(λkj+γj)Sk(t)-λkjSj(t)]+, 25

subject to initial conditions

Sk(0)=Sk(0). 26

We will show that Sk(t)Sk(t) for all k and for all t. This follows from the application of Lemma 1 from Simon and Kiss (2018). In order to use this result, we need to show that (25) is a cooperative system of differential equations. This can be done using the Kamke–Müller sufficient conditions (Donnelly 1993; Simon and Kiss 2018), which state that an autonomous system dxdt=f(x), will be cooperative as long as fk is a nondecreasing function of xj for all jk. In our case, we define x so that xk=Sk, and we define f(x) so that

fk(x)=-jN(k)[-γjSk(0)+(λkj+γj)xk-λkjxj]+. 27

Since fk(x) is continuous and the constants λkj are nonnegative, it is clear that fk is a nondecreasing function of xj for all j. Hence, the Kamke–Müller conditions are satisfied and (25) is a cooperative system. Using this fact alongside the initial conditions in (26), we apply Lemma 1 from Simon and Kiss (2018) to conclude that Sk(t)Sk(t) for all k and for all t.

To summarise this result, we can combine (25) with an equation for Ik based on (1b) to obtain

dSkdt=-jN(k)[-γjSk(0)+(λkj+γj)Sk(t)-λkjSj(t)]+, 28a
dIkdt=jN(k)[-γjSk(0)+(λkj+γj)Sk(t)-λkjSj(t)]+-γkIk(t). 28b

If we also introduce Rk=1-Sk-Ik, this gives a closed system of equations for the approximate dynamics of all node state probabilities. We refer to system (28) as the rooted-tree approximation for SIR dynamics.

If the underlying network is a rooted tree, we can show that (28) is equivalent to (9). To see this, we note that Sk(t)Sk(0) for all time and that Sj(t)Sk(t) for any jN(k) other than j=p(k). Hence, the terms inside the square brackets in (28) will be nonpositive for any jp(k) and hence applying the positive part operator will yield zero. For a given node k in a rooted tree, the only node j term in (28) that would give a nonzero contribution to the sum will be where j is the parent of k.

As a result, the sums in (28) can be simplified in the case of a rooted tree to yield (9). If a network is known to be a rooted tree but the root is not identified, (28) will yield an exact solution without it being necessary to compute the parent of each node, since the parent of each node will be revealed by the only nonzero term in the sums in (28).

Figure 2 shows comparisons of the solution of (28) with results obtained from averaging 105 simulations using the Gillespie algorithm. As previously, Matlab code is available at https://github.com/cameronlhall/rootedtreeapprox. Two different networks are shown: an Erdős–Rényi (ER) random graph (Fig.  2a and b) and a network that is ‘almost’ a tree (Fig. 2c and d) in the sense that it was constructed from a random tree by adding some additional edges at random.

Fig. 2.

Fig. 2

Comparisions of the rooted-tree approximation in (28) with simulation results from the average of 105 Gillespie algorithm simulations of the full stochastic SIR model. Two different networks are illustrated: subfigures (a) and (b) show results from an Erdős–Rényi random graph of 100 nodes with probability of connection 0.05; subfigures (c) and (d) show results from a 30-node random tree (generated from a random Prüfer sequence) with 10 additional edges added at random. Subfigures (a) and (c) show Sk for four different nodes: results from the rooted-tree approximation are shown as continuous lines and results from Gillespie simulations are shown as dashed lines; different nodes are distinguished using different colours and marker styles. Subfigures (b) and (d) show Sk (thick black lines), Ik (medium thickness blue lines) and Rk (thin red lines) averaged over all nodes in the network: results from the rooted-tree approximation are shown as continuous lines and results from Gillespie simulations are shown as dashed lines. Parameters used are λ=1 and γ=0.1. There is a single node that is infectious at t=0 and all other nodes are susceptible

If we think of the Gillespie algorithm results as being the ‘true’ solution, we see from Fig. 2a and c that the rooted-tree approximation does indeed give an upper bound on Sk for each individual node k. Throughout Fig. 2a and c we see that the rooted-tree approximation deviates from the true solutions by different amounts at different times for different nodes, but the difference is typically substantial as time goes on. This deviation is observed for the ‘almost tree’ in Fig. 2c as well as for the ER graph in Fig. 2a, although we note that the difference between the approximation and the true solution grows faster and becomes larger in the case of the ER graph.

The overall differences between the rooted-tree approximation and the true solution are best seen in Fig. 2b and d. These show Sk(t), Ik(t) and Rk(t) averaged over all nodes in the network. As may be anticipated from Fig. 2a and c, the rooted-tree approximation gives a overestimate of Sk (including the equilibrium Sk as t) and underestimates the peak in Ik. Overall, we see that (28) does indeed give bounds on Sk but that these bounds are not generally very tight.

Rooted-tree approximation for a generalised SEIR model

Preliminaries

The Susceptible-Exposed-Infectious-Recovered (SEIR) model is a well-established compartment model in the epidemiological literature (Brauer et al. 2019). The SEIR model differs from the SIR model by the introduction of an ‘exposed’ or ‘latent’ state representing individuals that have encountered the disease but are not yet infectious. Some SEIR models involve multiple classes of exposed state; such models have been analysed mathematically (Bame et al. 2008; Diekmann et al. 2010; Guo et al. 2012) and applied to modelling certain diseases (Cunniffe et al. 2012).

As with the SIR model, the SEIR model has also been extended to networks (Kang et al. 2020; Liu et al. 2017; Newman 2018; Pastor-Satorras et al. 2015). For the most part, network SEIR models in the published literature involve a single exposed state; however, they can be extended to multiple classes of exposed state in an analogous way to compartment models. Our analysis of SIR models in Sect. 2 can be extended to SEIR models, including in a general setting with arbitrarily many distinct exposed states. In this section, we replicate our analysis from the previous section but for generalised SEIR models: we construct a node-based approximation of SEIR contagion dynamics that is exact on rooted trees and that yields an upper bound on Sk(t) on more general graphs.

In our generalised network SEIR model, each node represents an individual, so that at any time a node can either be susceptible (S), exposed of class u (E(u)), infectious (I), or recovered (R). We assume that there are finitely many (Nu) different classes of exposed nodes. Susceptible nodes in contact with infectious nodes may become exposed (in any class) or infectious; we refer to the process of a susceptible node changing its state as ‘infection’ regardless of whether the node becomes exposed or infectious. Exposed nodes may change to a different class of exposed, become infectious, or recover; we assume that exposed nodes cannot become susceptible. Infectious nodes may recover, but cannot become exposed or susceptible. Once a node has recovered, it remains recovered for all time.

Each of these transitions is governed by a different rate parameter. The rate of infection (i.e., the total rate at which a susceptible node in contact with an infectious node becomes exposed or infectious) is given by λ. The probability that a susceptible node becomes exposed of class u when infection occurs is given by φ(u); hence, the probability that a susceptible node becomes infectious when infection occurs is 1-uφ(u). The rate at which an exposed node of class u becomes an exposed node of class v is given by b(vu). The rate at which an exposed node of class u becomes infectious is given by μ(u). The rate at which an exposed node of class u recovers is given by ν(u). The rate at which an infectious node recovers is given by γ. These different transitions are summarised below:

S (with I)λφ(u)E(u)E(u)b(vu)E(v)E(u)ν(u)RS (with I)λ(1-φ(u))IE(u)μ(u)IIγR

As in Sect. 2.1, we assume that the model parameters can depend on the relevant edge or node, and we represent this using subscripts. The most general approach would be to permit both λ and φ(u) to be edge-dependent; however, this level of generality in φ(u) would lead to a problem with the bounding argument in Sect. 3.3. To circumvent this, we permit φ(u) to depend on the recipient node but not on the infecting node; that is, we assume φkj(u)=φk(u). Physically, this would correspond to a situation where individual responses to infection (e.g., whether an individual immediately becomes infectious or whether they first enter an exposed state) may vary between individuals but do not depend on the source of infection.

To assist with the analysis of the Nu different classes of exposed state, we introduce the Nu-dimensional vectors Ek(t), φk, νk, μk, e, and 0 so that

Ek(t)=Ek(1)(t)Ek(2)(t)Ek(Nu)(t),φk=φk(1)φk(2)φk(Nu),νk=νk(1)νk(2)νk(Nu), 29
μk=μk(1)μk(2)μk(Nu),e=111,0=000. 30

We note that 0e·φk1 for all k, and that the rate at which a susceptible node k in contact with an infectious node j becomes infectious is given by

λkj1-u=1Nuφk(u)=λkj1-e·φk. 31

Lastly, we define the Nu-by-Nu matrix Bk so that

Bkuv=μk(v)+νk(v)+w=1wvNubk(wv),u=v,-bk(uv);uv. 32

With this notation, the dynamics of contagion on any network can be described using the following equations:

dSkdt=-jN(k)λkjIjSk, 33a
dEkdt=φkjN(k)λkjIjSk-BkEk, 33b
dIkdt=(1-e·φk)jN(k)λkjIjSk+μk·Ek-γkIk, 33c
dRkdt=νk·Ek+γkIk, 33d

which must be solved subject to suitable initial conditions.

Note that if φ were permitted to depend on the source of infection as well as on the node that becomes infected then the corresponding φkj terms would need to be included inside the summations in equations (33b) and (33c).

Note also that (33a) can be used to express (33b) and (33c) in the equivalent forms

dEkdt=-φkdSkdt-BkEk, 34b
dIkdt=-(1-e·φk)dSkdt+μk·Ek-γkIk. 34c

Given the length of the expressions that we obtain for λkjIjSk in our analysis, we will sometimes prefer (34b) and (34c) over (33b) and (33c) for concision.

Exact SEIR dynamics on a rooted tree

As in Sect. 2.2, we begin by considering contagion dynamics on a rooted tree, where there is a single node, k=0, which is the source of infection. This node may either be exposed or infectious at t=0. Introducing equivalent notation and following the same logic as for the derivation of (2), we find that the evolution equations for node state probabilities on a rooted tree are

dSkdt=0,k=0,-λkIp(k)Sk,k0; 35a
dEkdt=-BkEk,k=0,λkφkIp(k)Sk-BkEk,k0; 35b
dIkdt=μk·Ek-γkIk,k=0,λk(1-e·φk)Ip(k)Sk+μk·Ek-γkIk,k0; 35c
dRkdt=νk·Ek+γkIk. 35d

These equations need to be solved subject to initial conditions where

Sk(0)=1,Ek(0)=0,Ik(0)=Rk(0)=0,k0, 36

and where E0(0)=E0init and I0(0)=I0init are specified, but S0(0)=R0(0)=0. We note that φ0 does not appear in system (35) or in the initial conditions. As we will see, it will be convenient to define φ0 so that φ0=E0init, and hence I0init=1-e·φ0.

System (35) is not closed because of the presence of Ip(k)Sk. As in Sect. 2.2, we exploit the properties of a rooted tree to find an expression for Ip(k)Sk in terms of the node state probabilities and hence obtain a closed system. Since the parent node of node 0 is not defined, we assume (unless otherwise specified) that k0 in all analysis below where p(k) is mentioned.

We begin by noting that the law of total probability gives

Sk=Sp(k)Sk+u=1NuEp(k)(u)Sk+Ip(k)Sk+Rp(k)Sk. 37

The fact that infection can only spread from node p(k) to node k and not vice versa means that if either Xp(k)=S or Xp(k)=E(j) then Xk=S. Hence, Sp(k)Sk=Sp(k) and Ep(k)(u)Sk=Ep(k)(u). Thus, (37) can be rearranged to give

Ip(k)Sk(t)=Sk-Sp(k)(t)-u=1NuEp(k)(u)-Rp(k)Sk=Sk-Sp(k)-e·Ep(k)-Rp(k)Sk. 38

As previously, we now seek a differential equation for Rp(k)Sk that can be directly integrated to obtain Rp(k)Sk in terms of node state probabilities. The only way to achieve a state where Xp(k)=R and Xk=S is for node p(k) to recover (either form an exposed state or an infectious state) while node k is susceptible. Once node p(k) has recovered, this state will then be permanent. Since Ep(k)(u)Sk=Ep(k)(u), it therefore follows that

dRp(k)Skdt=νp(k)·Ep(k)+γp(k)Ip(k)Sk. 39

Using (35a), this rearranges to give

dRp(k)Skdt=νp(k)·Ep(k)-γp(k)λkdSkdt, 40

The next step is to rewrite νp(k)·Ep(k)(t) in terms of the derivatives of node state probabilities. For any node k (including k=0), let Mk be the block matrix defined by

Mk=10T-φkBk, 41

so that the block matrix inversion formula (Petersen and Pedersen 2012) gives

Mk-1=10TBk-1φkBk-1. 42

Using Mk, we can rewrite equations (35a) and (35b) together as

dSkdtdEkdt=-MkλkIp(k)SkEk. 43

If we assert that Ip(0)S0(t)0, then (43) also applies when k=0.

We now use Mp(k) to express νp(k)·Ep(k) in terms of derivatives as follows:

νp(k)·Ep(k)=0νp(k)Tλp(k)Ip[p(k)]Sp(k)Ep(k) 44
=-0νp(k)TMp(k)-1dSp(k)dtdEp(k)dt=-νp(k)TBp(k)-1φp(k)dSp(k)dt-νp(k)TBp(k)-1dEp(k)dt. 45

Note that equation (45) applies even when p(k)=0; even though the value of Ip[p(k)]Sp(k) would be undefined in (44), it is multiplied by zero and does not affect the final result.

Substituting (45) into (40) yields

dRp(k)Skdt=-νp(k)TBp(k)-1φp(k)dSp(k)dt-νp(k)TBp(k)-1dEp(k)dt-γp(k)λkdSkdt, 46

and hence we find that

Rp(k)Sk=Ck-νp(k)TBp(k)-1φp(k)Sp(k)-νp(k)TBp(k)-1Ep(k)-γp(k)λkSk, 47

where Ck is a constant to be determined from the initial conditions.

In the case where p(k)0, the initial conditions in (36) yield

Ck=νp(k)TBp(k)-1φp(k)+γp(k)λk. 48

In the case where p(k)=0, the initial conditions yield

Ck=ν0TB0-1E0init+γ0λk. 49

As noted previously, this motivates us to define φ0=E0init so that (48) can be used to give the constant Ck for all nodes k0.

Combining (47) and (48), we obtain an expression for Rp(k)Sk that can be substituted into (38) to yield

Ip(k)Sk=-νp(k)TBp(k)-1φp(k)-γp(k)λk+λk+γp(k)λkSk-1-νp(k)TBp(k)-1φp(k)Sp(k)-e-Bp(k)-Tνp(k)·Ep(k). 50

We note that (32) implies that

u=1NuBkuv=μk(v)+νk(v), 51

and hence BkTe=μk+νk. This rearranges to yield Bk-Tμk=e-Bk-Tνk so that (50) becomes

Ip(k)Sk=-νp(k)TBp(k)-1φp(k)-γp(k)λk+λk+γp(k)λkSk-1-νp(k)TBp(k)-1φp(k)Sp(k)-μp(k)TBp(k)-1Ep(k). 52

As an aside, we note from (32) that BkT is a strictly diagonally dominant matrix with positive diagonal entries. From Berman and Plemmons (1994), it follows that BkT is inverse-positive. Hence, the elements of Bk-Tμk and Bk-Tνk are all between 0 and 1 (inclusive) and we note that the coefficients of Sp(k) and Ep(k)(u) in (52) are all nonpositive.

Using (52) and (34), system (35) can be rearranged to give

dSkdt=0,k=0, 53a
dSkdt=-λk+γp(k)Sk+λk1-νp(k)TBp(k)-1φp(k)Sp(k)+λkμp(k)TBp(k)-1Ep(k)+γp(k)-λkνp(k)TBp(k)-1φp(k),k0, 53b
dEkdt=-φkdSkdt-BkEk, 53c
dIkdt=-(1-e·φk)dSkdt-γkIk+μk·Ek, 53d
dRkdt=νk·Ek+γkIk. 53e

As for the SIR model in Sect. 2.2, this is a partially-decoupled system. To see this, we observe that the dynamics of Sk in (53b) are independent of Ek; instead, dSkdt depends only on Sk and the node state probabilities at the parent node. Since equations (53b) and (53c) are both independent of Ik(t) and Rk(t), this implies that (53) can be solved from the root outwards, with Sk solved before Ek at each subsequent node.

Moreover, consider the case where exposed states are traversed in order—that is, where bk(uv) is zero whenever u<v). This situation is physically plausible, since it corresponds to a case where a diseased individual can progress through different exposed “stages” before becoming infectious or recovering, but can never return to an earlier class of exposed state from a more advanced class. In this case, the matrix Bk will be lower triangular and hence the scalar equations that constitute (53c) will also be partially decoupled. Since system (53) is linear, this implies that the full solution can be obtained exactly by the sequential solving of linear scalar ordinary differential equations; it is not even necessary to solve an eigenvalue problem in order to obtain the exact solution to SEIR dynamics on a rooted tree. While we do not present closed-form solutions here, it is theoretically possible to obtain results analogous to (53) using standard methods for nonhomogeneous constant-coefficients differential equations.

As in Sect. 2.3, we test the rooted-tree formulation in system (53) by considering SEIR dynamicson a chain. For simplicity, we consider the case where there is a single class of exposed state and so the vectors and matrices in (53) can be replaced by scalars. Noting that the equivalent of Bk will be μk+νk, this leads to the system

dSkdt=0,k=0, 54a
dSkdt=λkμk-1μk-1+νk-1φk-1Sk-1+Ek-1-λk+γk-1Sk+γk-1-λkνk-1φk-1μk-1+νk-1,k0, 54b
dEkdt=-φkdSkdt-(μk+νk)Ek, 54c
dIkdt=-(1-φk)dSkdt-γkIk+μkEk, 54d

Figure 3 shows a comparison of Sk(t) and Ik(t) obtained from the numerical solution of (54) with the average of 105 Gillespie algorithm simulations of the underlying stochastic model (code again available at https://github.com/cameronlhall/rootedtreeapprox). As in Fig. 1, this exemplifies the fact that system (54) is exact; the two sets of results are virtually indistinguishable.

Fig. 3.

Fig. 3

Comparision of the rooted-tree solutions for Sk and Ik based on numerical solution of (54) with simulation results from the average of 105 Gillespie algorithm simulations of the full stochastic model. Subfigure (a) shows results for Sk while subfigure (b) shows results for Ik. In both cases, the rooted tree solutions are shown as continuous lines and the numerical results are shown as points marked +. Results are shown for the first eleven nodes (from k=0 to k=10); results from k=1 are indicated with a thicker blue line and subsequent nodes produce curves further to the right. Parameters used are λ=1, φ=0.8, μ=1.2, ν=0.05, and γ=0.1. For consistency with the value of φ, the initial conditions are I0init=0.2 and E0init=0.8

Bounds for SEIR dynamics on a general network

We now replicate the argument in Sect. 2.4 to obtain bounds on the solution of generalised SEIR dynamics on a general network. In this case our starting point is system (33) and we assume without loss of generality that Rk(0)=0 for all nodes.

By analogous arguments to Sect. 2.4, we observe that

IjSkSk-Sj-e·Ej-RjSk, 55

that

dRjSkdtνj·Ej+γjIjSk, 56

and that

-dSkdtλkjIjSk 57

for any jN(k).

We also replicate some of the analysis from Sect. 3.2. We define Mk as in (41) and we observe that equations (33a) and (33b) can be rearranged to give

dSkdtdEkdt=-MkjN(k)λkjIjSkEk. 58

Note that (58) is only valid because φk depends only on k not on the possible sources of infection. If this were not the case, then it would not be possible to collect the summation terms in the vector on the right hand side of (58).

Repeating the manipulations from Sect. 3.2, we find that

νj·Ej=-νjTBj-1φjdSjdt-νjTBj-1dEjdt. 59

Combining (56), (57), and (59), we find that

dRjSkdt-νjTBj-1φjdSjdt-νjTBj-1dEjdt-γjλkjdSkdt. 60

Integrating from t=0 and using the fact that RjSk(0)=0, we obtain an upper bound on RjSk that can be substituted into (55) and rearranged to obtain

IjSkλkj+γjλkjSk-(1-e·φj)Sj(t)-μjTBj-1φjSj+Ej-νjTBj-1φjSj(0)+Ej(0)-γjλkjSk(0). 61

Since it is also true that IjSk0, we can use [x]+ as defined in (23) to obtain a bound on IjSk analogous to (22). Substituting into (33a) then yields

dSkdt-jN(k)[(-λkjνjTBj-1φjSj(0)+Ej(0)-γjSk(0)+(λkj+γj)Sk-λkj(1-e·φj)Sj(t)-λkjμjTBj-1φjSj+Ej]+. 62

We note that (62) depends only on the probabilities of nodes being susceptible or exposed. Hence, (62) can be coupled with (34b) to obtain a closed system. As in Sect. 2.4, we will use this closed system to show that In this case, however, we need to rearrange the system before we can apply the Kamke–Müller conditions.

Based on the forms of (62) and (34b), we define Qk(t)=Bk-1[φkSk(t)+Ek(t)]. We note that all entries of Bk-1 are nonnegative and so Qk is nonnegative. Rearranging to obtain Ek=BkQk-φkSk and substituting into (62) and (34b) then yields

dSkdt-jN(k)[(-λkjνj·Qj(0)-γjSk(0)+(λkj+γj)Sk-λkj(1-e·φj)Sj(t)-λkjμj·Qj]+, 63a
dQkdt=-BkQk+φkSk. 63b

System (63) is a system of differential inequalities and equations; as in Sect. 2.4, we now consider the relationship between the true solutions Sk and Qk and the approximate solutions Sk and Qk that satisfy the equivalent of (63) where the inequality in (63a) is replaced with an equation. Since the off-diagonal elements of Bk are all nonpositive, since 1-e·φk0, and since the elements of φk and μk are all nonnegative, this system will satisfy the Kamke–Müller conditions and be cooperative. Hence, we can again apply Lemma 1 from Simon and Kiss (2018) to conclude that Sk(t)Sk(t) and that Qk(t)Qk(t) for all k and for all t.

While Qk is a useful theoretical construct, we will generally formulate and solve the SEIR rooted-tree approximation using Ek rather than Qk. Using stars to indicate approximate solutions as previously, we use (62) and (34) to obtain the following system as the SEIR rooted-tree approximation:

dSkdt=-jN(k)[(-λkjνjTBj-1φjSj(0)+Ej(0)-γjSk(0)+(λkj+γj)Sk-λkj(1-e·φj)Sj(t)-λkjμjTBj-1φjSj+Ej]+, 64a
dEkdt=-φkdSkdt-BkEk, 64b
dIkdt=-(1-e·φk)dSkdt-γkIk+μk·Ek. 64c

Just as (28) is equivalent to (9) for a rooted tree, we can show that (64) is equivalent to (53) for a rooted tree. To see this, we again use the fact that Sj(t)Sk(t) for any jN(k) other than j=p(k), and we also use the fact that Bk-Tμk+Bk-Tνk=e. Given that Sk(t) is a decreasing function of t, it follows from these observations that

νjTBj-1φjSj(0)+(1-e·φj)Sj(t)+μjTBj-1φjSj(t)Sj(t) 65

and hence the term inside the square brackets in (64a) will be nonpositive whenever jp(k). As a result, (64) will yield exact solutions for rooted trees without it being necessary to compute the parent of each node.

Figure 4 is analogous to Fig. 2 and it enables equivalent conclusions to be drawn. Figure 4 shows comparisons of the rooted-tree approximation (64) with estimates of the true solution obtained from averaging 105 simulations using the Gillespie algorithm for an ER random graph. Code is available at https://github.com/cameronlhall/rootedtreeapprox and the ER graph used to generate Fig. 4 is different from the ER graph used in Fig. 2.

Fig. 4.

Fig. 4

Comparisions of the rooted-tree approximation in (64) with simulation results from the average of 105 Gillespie algorithm simulations of the full stochastic SEIR model for an Erdős–Rényi random graph with 100 nodes and probability of connection 0.05. Subfigure (a) shows Sk for four different nodes: results from the rooted-tree approximation are shown as continuous lines and results from Gillespie simulations are shown as dashed lines; different nodes are distinguished using different colours and marker styles. Subfigure (b) show Sk (very thick black lines), Ek (thick olive lines), Ik (medium thickness blue lines) and Rk (thin red lines) averaged over all nodes in the network: results from the rooted-tree approximation are shown as continuous lines and results from Gillespie simulations are shown as dashed lines. Parameters used are λ=1, φ=0.8, μ=1.2, ν=0.05, and γ=0.1. There is a single node that is infectious at t=0 and all other nodes are susceptible

From Fig. 4a we verify that the rooted-tree approximation gives an upper bound on Sk for the nodes k illustrated. From Fig. 4b, we see that there is a reasonably large difference between the true solution (dashed lines) and the rooted-tree approximation (continuous lines) and so once again the bounds provided by (64) are not generally very tight.

Discussion and conclusions

In this paper, we have developed and analysed a new approximation method, the rooted-tree approximation, that can be applied to SIR and generalised SEIR models on networks. In the case of a tree with a unique initially-infected node, our approximation is exact and leads to a partially-decoupled system of linear differential equations for the node-state probabilities. As demonstrated in Sect. 2.3, we can obtain explicit closed-form solutions for the node state probabilities for SIR models and, in theory, equivalent results can also be obtained for SEIR models.

Since the pair-based and message-passing approximations are both exact on all trees (not just rooted trees) but closed-form solutions for these are not well known, it is instructive to compare our system (9) with equivalent rooted tree simplifications of the pair-based SIR approximation in Sharkey et al. (2015) and the message-passing SIR approximation in Karrer and Newman (2010). For the pair-based approximation (e.g., system (3) in Sharkey et al. (2015)), we find that we can use proof by induction from the leaves to the root to show that IkSp(k)=0 on a rooted tree. Subsequently, we can use the fact that Sp(k)Sk=Sk to convert the remaining equations of the pair-based approximation into a linear system equivalent to (9).

For the message-passing model in Karrer and Newman (2010) applied to a rooted tree, we can work from the leaves to the root to show that Hp(k)k=0 and then work back out from the root to the leaves to obtain expressions for Hkp(k) that are analogous to an integrated form of our system (9). As a result, we find that the explicit solutions in (13) could have been obtained from the pair-based or message-passing approximations; while we believe that this is the first time that these explicit solutions have been reported, they are consistent with—and theoretically obtainable from—established results in the existing literature.

One important feature of our rooted-tree approximation is that it provides upper bounds on Sk at every node. This is an important strength of our method since it provides a contrast from other methods that yield lower bounds on Sk. A promising avenue for further research would be to combine the rooted-tree approximation with other approximations in order to obtain better estimates of node-state probabilities. Such hybrid approximations are likely to be more practical than the rooted-tree approximation because the bounds on Sk are rarely very tight. As we see from Figs. 2 and 4, there are often large differences between the node-state probabilities obtained from the rooted-tree approximation and estimates of the true node-state probabilities based on Gillespie algorithm simulations.

A limitation of our rooted-tree methodology is that it relies on two key assumptions: firstly, that there can be no return to a susceptible state following infection, and secondly that there can only be one class of infectious state. Both of these assumptions are necessary in order to express Ip(k)Sk, and hence the rate of infection, in terms of a linear combination of the node-state probabilities and Rp(k)Sk for rooted trees. One direction for further research would be to explore whether the rooted-tree approximation can be extended to SIRS and SEIRS models or SIR models with multiple infectious states. Perhaps this would involve developing new approximations that are not exact on rooted trees but would still provide a consistent upper bound on Sk, analogous to the W(x,y)=min(x,y) approximation for SIS models introduced in Simon and Kiss (2018).

Overall, the rooted-tree approximation presented in this paper is a new way of analysing SIR and SEIR dynamics on networks that has advantages and disadvantages over existing methods. The principal strengths of the rooted-tree approximation are that it is simple (leading to a cooperative, piecewise-linear system of equations for node-state probabilities), that it yields exact closed-form solutions in certain situations, and that it yields upper bounds on Sk in contrast with the lower bounds provided by other approximations. The principal weakness of the rooted-tree approximation is that the bounds on Sk are not very tight unless the underlying network is very close to being a tree with a single initially-infected node. Despite this limitation, the simplicity of the rooted-tree approximation means that it has the potential to be a useful tool in developing new computational methods for analysing contagion dynamics on networks.

Footnotes

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  1. Bame N, Bowong S, Mbang J, Sallet G, Tewa J-J. Global stability analysis for SEIS models with n latent classes. Math Biosci Eng. 2008;5:20–33. doi: 10.3934/mbe.2008.5.20. [DOI] [PubMed] [Google Scholar]
  2. Berman A, Plemmons RJ (1994) Nonnegative Matrices in the Mathematical Sciences. Society for Industrial and Applied Mathematics. 10.1137/1.9781611971262
  3. Biggs NL. Discrete mathematics. 2. Oxford: Oxford University Press; 2002. [Google Scholar]
  4. Brauer F, Castillo-Chavez C, Feng Z. Mathematical models in epidemiology. New York: Springer; 2019. [Google Scholar]
  5. Cator E, Donnelly P, Mieghem PV (2018) Reply to ‘Comment on ‘Nodal infection in Markovian susceptible-infected-susceptible and susceptible-infected-removed epidemics on networks are non-negatively correlated”. Physical Review E 98. 10.1103/physreve.98.026302 [DOI] [PubMed]
  6. Cator E, Mieghem PV (2012) Second-order mean-field susceptible-infected-susceptible epidemic threshold. Physical Review E 85. 10.1103/physreve.85.056111 [DOI] [PubMed]
  7. Cator E, Mieghem PV. Nodal infection in Markovian susceptible-infected-susceptible and susceptible-infected-removed epidemics on networks are non-negatively correlated. Phys Rev E. 2014;89:052802. doi: 10.1103/physreve.89.052802. [DOI] [PubMed] [Google Scholar]
  8. Cunniffe NJ, Stutt ROJH, van den Bosch F, Gilligan CA. Time-dependent infectivity and flexible latent and infectious periods in compartmental models of plant disease. Phytopathology. 2012;102:365–380. doi: 10.1094/phyto-12-10-0338. [DOI] [PubMed] [Google Scholar]
  9. Danon L, Ford AP, House T, Jewell CP, Keeling MJ, Roberts GO, Ross JV, Vernon MC. Networks and the epidemiology of infectious disease. Interdiscip Perspect Infect Dis. 2011;2011:1–28. doi: 10.1155/2011/284909. [DOI] [PMC free article] [PubMed] [Google Scholar]
  10. Diekmann O, Heesterbeek JAP, Roberts MG. The construction of next-generation matrices for compartmental epidemic models. J R Soc Interface. 2010;7:873–885. doi: 10.1098/rsif.2009.0386. [DOI] [PMC free article] [PubMed] [Google Scholar]
  11. Donnelly P. The correlation structure of epidemic models. Math Biosci. 1993;117:49–75. doi: 10.1016/0025-5564(93)90017-5. [DOI] [PubMed] [Google Scholar]
  12. Guo H, Li MY, Shuai Z. Global dynamics of a general class of multistage models for infectious diseases. SIAM J Appl Math. 2012;72:261–279. doi: 10.1137/110827028. [DOI] [Google Scholar]
  13. Kang H, Sun M, Yu Y, Fu X, Bao B. Spreading dynamics of an SEIR model with delay on scale-free networks. IEEE Trans Netw Sci Eng. 2020;7:489–496. doi: 10.1109/tnse.2018.2860988. [DOI] [Google Scholar]
  14. Karrer B, Newman MEJ (2010) Message passing approach for general epidemic models. Physical Review E 82. 10.1103/physreve.82.016101 [DOI] [PubMed]
  15. Kiss IZ, Miller JC, Simon PL (2017) Mathematics of Epidemics on Networks, Springer-Verlag GmbH, https://www.ebook.de/de/product/33441347/istvan_z_kiss_joel_c_miller_peter_l_simon_mathematics_of_epidemics_on_networks.html
  16. Liu Q, Li T, Sun M. The analysis of an SEIR rumor propagation model on heterogeneous network. Phys A. 2017;469:372–380. doi: 10.1016/j.physa.2016.11.067. [DOI] [Google Scholar]
  17. Miller JC, Kiss IZ. Epidemic spread in networks: existing methods and current challenges. Math Model Natural Phenomena. 2014;9:4–42. doi: 10.1051/mmnp/20149202. [DOI] [PMC free article] [PubMed] [Google Scholar]
  18. Newman M (2018) Networks, Oxford University Press, 2nd ed., https://www.ebook.de/de/product/32966014/mark_newman_networks.html
  19. Pastor-Satorras R, Castellano C, Mieghem PV, Vespignani A. Epidemic processes in complex networks. Rev Mod Phys. 2015;87:925–979. doi: 10.1103/revmodphys.87.925. [DOI] [Google Scholar]
  20. Petersen KB, Pedersen MS (2012) The matrix cookbook, http://www2.compute.dtu.dk/pubdb/pubs/3274-full.html. Version 20121115
  21. Sharkey KJ, Kiss IZ, Wilkinson RR, Simon PL. Exact equations for SIR epidemics on tree graphs. Bull Math Biol. 2015;77:614–645. doi: 10.1007/s11538-013-9923-5. [DOI] [PMC free article] [PubMed] [Google Scholar]
  22. Sharkey KJ, Wilkinson RR. Complete hierarchies of SIR models on arbitrary networks with exact and approximate moment closure. Math Biosci. 2015;264:74–85. doi: 10.1016/j.mbs.2015.03.008. [DOI] [PubMed] [Google Scholar]
  23. Simon PL, Kiss IZ. On bounding exact models of epidemic spread on networks. Dis Continuous Dynam Syst- B. 2018;23:2005–2020. doi: 10.3934/dcdsb.2018192. [DOI] [Google Scholar]
  24. Van Mieghem P, Omic J, Kooij R. Virus spread in networks. IEEE/ACM Trans Netw. 2009;17:1–14. doi: 10.1109/tnet.2008.925623. [DOI] [Google Scholar]
  25. Wilkinson RR, Sharkey KJ (2014) Message passing and moment closure for susceptible-infected-recovered epidemics on finite networks. Physical Review E 89. 10.1103/physreve.89.022808 [DOI] [PubMed]

Articles from Journal of Mathematical Biology are provided here courtesy of Springer

RESOURCES