32
DIMACS Series in Discrete Mathematics and Theoretical Computer Science Structure of Social Contact Networks and Their Impact on Epidemics Stephen Eubank 1 , V.S. Anil Kumar 2 , Madhav V. Marathe 3 , Aravind Srinivasan 4 , and Nan Wang 5 1 Virginia Bio-Informatics Institute, Virginia Tech, Blacksburg, VA 24061. Much of the work was done while the author was in the Basic and Applied Simulation Science group at Los Alamos National Laboratory. Email: [email protected]. 2 Basic and Applied Simulation Science (CCS-5) and National Infrastructure Simula- tion and Analysis Center (NISAC), Los Alamos National Laboratory, MS M997, P.O. Box 1663, Los Alamos, NM 87545. The work is supported by the Department of Energy under Contract W-7405-ENG-36. Email: [email protected]. 3 Virginia Bio-Informatics Institute and Dept. of Computer Science, Virginia Tech, Blacksburg, VA 24061. Much of the work was done while the author was in the Ba- sic and Applied Simulation Science group at Los Alamos National Laboratory. Email: [email protected]. 4 Department of Computer Science and Institute for Advanced Computer Studies, University of Maryland, College Park, MD 20742. This material is based upon work supported in part by the National Science Foundation under Grant No. 0208005. Email: [email protected]. 5 Department of Computer Science, University of Maryland, College Park, MD 20742. Most of the work was done while the author was visiting Los Alamos National Laboratory. This material is based upon work supported in part by the National Science Foundation under Grant No. 0208005. Email: [email protected]. c 0000 (copyright holder) 1

Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

DIMACS Series in Discrete Mathematicsand Theoretical Computer Science

Structure of Social Contact Networks and Their

Impact on Epidemics

Stephen Eubank 1, V.S. Anil Kumar 2, Madhav V. Marathe 3,Aravind Srinivasan 4, and Nan Wang 5

1Virginia Bio-Informatics Institute, Virginia Tech, Blacksburg, VA 24061. Much ofthe work was done while the author was in the Basic and Applied Simulation Sciencegroup at Los Alamos National Laboratory. Email: [email protected].

2Basic and Applied Simulation Science (CCS-5) and National Infrastructure Simula-tion and Analysis Center (NISAC), Los Alamos National Laboratory, MS M997, P.O. Box1663, Los Alamos, NM 87545. The work is supported by the Department of Energy underContract W-7405-ENG-36. Email: [email protected].

3Virginia Bio-Informatics Institute and Dept. of Computer Science, Virginia Tech,Blacksburg, VA 24061. Much of the work was done while the author was in the Ba-sic and Applied Simulation Science group at Los Alamos National Laboratory. Email:[email protected].

4Department of Computer Science and Institute for Advanced Computer Studies,University of Maryland, College Park, MD 20742. This material is based upon worksupported in part by the National Science Foundation under Grant No. 0208005. Email:[email protected].

5Department of Computer Science, University of Maryland, College Park, MD 20742.Most of the work was done while the author was visiting Los Alamos National Laboratory.This material is based upon work supported in part by the National Science Foundationunder Grant No. 0208005. Email: [email protected].

c©0000 (copyright holder)

1

Page 2: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

2 S. EUBANK, V. KUMAR, M. MARATHE, A. SRINIVASAN, AND N. WANG

Abstract. Traditional epidemiological research has focused on rate-based differential-equation models on completely mixing populations.In this paper, we outline an approach based on a combination of net-work theory and discrete-event simulations to study epidemics in large

urban areas. We survey some of our results published in Nature (2004)and the Proc. ACM-SIAM Symposium on Discrete Algorithms (2004),and present some new results on: (i) mathematical properties of largesocial contact networks, as well as (ii) simulation-based dynamic anal-ysis of disease-spread in such networks. We identify a number of newmeasures that are significant for understanding epidemics and for devel-oping new strategies in policy planning. We also perform a very detailedstructural analysis of the social contact networks produced by TRAN-

SIMS, a simulator for detailed transportation/traffic studies, and studytwo random graph models to generate realistic social networks: Chung-Lu’s model and the configuration model. We also develop combinatorialformulations and approximation algorithms for quarantining, vaccina-tion and sensor placement, as aids to decision-making.

1. Introduction

The explosive growth of urban population in the past century has ledto a variety of new problems related to public health- the high density ofpeople and their interaction lead to a significant risk of epidemics [NG]. Thiswas evident in the recent SARS epidemic, and is a testimony to the “smallworld” nature of today’s society. Coupled with recent fears of bio-terrorattacks, there has been a spurt of research on understanding epidemics andtechniques to aid policy planning, e.g., for vaccination, quarantining anddisease-detection strategies.

Traditional epidemiological research has focused on rate based differen-tial equation models on completely mixing populations, i.e., all the peopleare allowed to interact with each other; see [Ba75, He00, KCW02] fora comprehensive discussion on this subject. An attractive feature of thismodeling approach is that it allows one to obtain analytical expressions fora number of interesting parameters such as the numbers of sick, infected andrecovered individuals in a population. But such a modeling approach doesnot capture the complexity of human interactions that serves as a mecha-nism for disease transmission. In addition, typically the number of differentsubpopulation types considered is small (for analytical tractability) and pa-rameters such as mixing rate and reproductive number are either unknownor hard to observe.

In this paper, we outline an approach based on a combination of net-work theory and discrete event simulations to study epidemics in large urbanareas - the main idea is that a better understanding of the characteristicsof the social contact network can give better insights into disease dynamicsand vaccination/quarantining strategies, which can be used in the epidemic

Page 3: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

STRUCT. OF SOCIAL CONTACT NETWORKS & THEIR IMPACT ON EPIDEMICS 3

simulation. For instance, our recent work in [EGK+04] shows that a bet-ter understanding of the underlying network structure leads to more refinedconclusions, e.g. in some cases mass vaccination might not be needed inthe presence of a better disease detection strategy. Similar work by Mey-ers et al. [MNMS03] has demonstrated that new insights on the diseasedynamics can be obtained by understanding the contact structure carefully.Interestingly, analysis of social networks in urban regions for effectively con-taining the spread of Cholera was done in the late 1800s in London [BSE]:in this outbreak, a map was used to chart the outbreak and relate it to acontaminated water pump; shutting down the pump immediately broughtthe outbreak to an end. The earliest formal work on use of network struc-ture for epidemiological studies appears to be that of Elveback, Fox andAckerman [EFA76]. Recently, a number of other authors have also un-dertaken a similar approach [LH+04, PLH4]. In contrast to the workof [MNMS03, LH+04], we study realistic and large urban social contactnetworks for an entire city consisting of well over a million nodes.

Recently there has been a resurgence of research in complex networks:the renewed interest is driven by a number of empirical and theoreticalstudies showing that network structure plays a crucial role in understandingthe overall behavior of complex systems. See [BKM+00, AB02, AJB00,BA99, MNMS03, Ne03a] and the references therein for recent resultsin this active area. However, properties of social contact networks thatare crucial for understanding epidemics have been explored only recently[NP03, Ne03a, New03, NFB02, MNMS03]. Another recent directionof research has been to determine random graph models that can gener-ate such networks: the traditional Erdos-Renyi-like model does not capturemany important features of real networks. Unfortunately, as we argue later,many of these random graph models, such as the preferential attachmentmodel, are not suited for social network analysis.

2. Our Contributions.

In this paper, we survey our recent results in [EGK+04, EKM+04]and present new results on (i) mathematical properties of large social con-tact networks and (ii) simulation based dynamic analysis of disease spreadon such networks. The social contact networks we study are obtained byusing TRANSIMS – a simulation based tool for urban transport plan-ning (see Section 3 for details). We identify a number of new measures thatare significant for understanding epidemics and developing new strategies forpolicy planning. Some of these measures, such as demographic mixing rates,can be determined only because of the very detailed and realistic nature ofthe networks we study. The resulting understanding of these networks isused in conjunction with a parallel discrete event simulation system called

Page 4: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

4 S. EUBANK, V. KUMAR, M. MARATHE, A. SRINIVASAN, AND N. WANG

EpiSims [BSE, ES02] - this is a tool to perform detailed simulations of dis-ease transmission on a synthetic urban population. Our main contributionsin this paper are threefold:

(1) Analysis and random generation models of large social net-works. We perform very detailed structural analysis of the so-cial contact networks produced by TRANSIMS and identify newmeasures that have relevance for modeling epidemics. The struc-tural measures we survey here were first reported in [EGK+04,EKM+04]. In addition, we perform the first analysis of some tem-poral and cultural aspects of such graphs. We also study two ran-dom graph models to generate realistic social networks: the first,based on the Chung-Lu model, was first discussed in [EKM+04];the second, the configuration model, is introduced in this paper.

(2) Combinatorial Models for Decision Making in Epidemi-ology. We develop combinatorial formulations and approxima-tion algorithms for quarantining, vaccination and sensor placement1

problems, as an aid in decision making. Our formulations and re-sults crucially use the underlying contact structure; they demon-strate the additional value of such models compared to traditionalcomplete mixing models.

(3) Simulation Based Empirical Evaluation. We consider sev-eral vaccination strategies motivated by the network structure, andstudy their efficacy using EpiSims. We use the new structuralmeasures we identify in developing the vaccination strategies.

EpiSims is then used to compute the efficacy of these vacci-nation strategies by taking into account the stochastic nature ofdisease transmission. The goal of this paper is not to develop theoptimal vaccination strategy, but, rather to come up with severalreasonable ones, and compare them by simulation; the rationale isthat large scale simulation such as EpiSims appears to be the onlyreasonable computational method for this purpose.

Organization. Section 3 describes TRANSIMS and EpiSims in somedetail. It also contains a description of how the social contact network is con-structed. Section 4 describes the structural analysis of the Portland socialcontact network, and touches upon random-graph models. In Section 5, weformulate combinatorial problems that model basic policy-planning prob-lems relevant to epidemiology and describe efficient approximation algo-rithms for solving these problems. Section 6 describes simulation results ondifferent vaccination schemes, motivated by the network structure. Section 7discusses random-graph models, and Section 8 contains concluding remarks.

1The sensor placement problem was first discussed in [EKM+04].

Page 5: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

STRUCT. OF SOCIAL CONTACT NETWORKS & THEIR IMPACT ON EPIDEMICS 5

As mentioned earlier, some of the results described in this paper appearedin [EGK+04] and [EKM+04].

3. Constructing Realistic Social Networks

In order to understand the spread of contagious diseases, we need a real-istic representation of a social contact network. The Transportation Analysisand Simulation System (TRANSIMS) developed at Los Alamos providesa way to generate synthetic realistic social contact networks in a large urbanregion. It is based on the assumption that the transportation infrastructureconstrains people’s choices about what activities to perform and where toperform them. TRANSIMS produces positions of all travelers on a second-by-second basis for a large metropolitan area and it has effectively been usedto construct detailed mobility patterns for the city of Portland. We refer thereader to [TRAN] and the web-site http://transims.tsasa.lanl.gov formore extensive descriptions of this tool. TRANSIMS conceptually decom-poses the transportation planning task using three different time scales, asfollows.

(1) Creating a population and activities Data about land use anddemographic information, combined with survey data from thousands ofhouseholds is employed to create a synthetic population, where each personhas a specific home address. A sequence of daily activities, and the locationswhere these activities are to be done, is determined for each person, basedon the activity surveys, travel time and land use data.

(2) Assigning Routes and trip-chains Second, an intermediate time-scale consists of assigning routes and trip-chains to satisfy the activity re-quests. To do this, the estimated locations are fed into a routing algorithmto find minimum cost paths through the transportation infrastructure con-sistent with constraints on mode choice [BJM01, BBJ+02]. An exampleconstraint might be: “walk to a transit stop, take transit to work using nomore than two transfers and no more than one bus”. This step is coupledwith the simulation of the actual movement of people on their chosen routes,and is repeated till some sort of near-equilibrium is attained.

(3) Detailed simulation Finally, the movement of people along their cho-sen routes is simulated. This simulation is extremely detailed: it resolvesdistances down to 7.5 meters and times down to one second. It providesan updated estimate of time-dependent travel times for each edge in thenetwork, including the effects of congestion. This estimate is fed back tothe Routing (step (2)) and location estimation (step (1)) algorithms, whichproduce new plans. This feedback process continues iteratively until it con-verges to a “quasi-steady state” in which no one can find a better path inthe context of everyone else’s decisions. The entire process estimates thedemand on a transportation network using census data, land usage data,and activity surveys.

Page 6: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

6 S. EUBANK, V. KUMAR, M. MARATHE, A. SRINIVASAN, AND N. WANG

A substantial effort has been spent on calibration and validation of theoutput produced by TRANSIMS, and it has been deployed in the city ofPortland (see [TRAN] for details). Various microscopic and macroscopicquantities produced by TRANSIMS have been verified in the city of Port-land; these include (i) traffic invariants such as flow density patterns, jamwave propagation, (ii) macroscopic quantities, such as activities and popula-tion densities in an entire city, number of people occupying various locationsin a time varying fashion, time varying traffic density split by trip purposeand various modal choices over highways and other major roads, turn counts,number of trips going between zones in a city, etc. TRANSIMS producesa comprehensive representation of people and their activities over the courseof a day. Figure 1 shows an example of this for a randomly chosen syntheticindividual. It is important to note that simulations such as TRANSIMSappears to be the only way to obtain information about some of the measuresdiscussed here.

0 5 10 15 20 25 30 35 400

20

40

60

80

100

120

140

160

180

Time

Nu

mb

er o

f p

eop

le

HOME Lid=109047

SERVE Lid=122902

SHOP Lid=129260

SERVE Lid=122902

SHOP Lid=113027 Lid=109047

VISIT

Lid=112236SOCIAL

Lid=113243SOCIAL

Lid=245592 SERVE

Pid = 838206

Figure 1. Figure showing, for a randomly chosen syntheticindividual (whose person-id is pid=838206 as shown in thefigure) in Portland, the activities, their locations (markedwith lid’s as their location-id’s) and their time durations (inhour) over the course of 1.5 days. The x-axis indicates thetime when an activity happens, the y-axis indicates the num-ber of people in the same location where the activity is takenby the chosen individual. In Portland data there are nine ac-tivity types, namely home, work, shop, visit, social,

other, serve, school, college. Each edge in the people-location bipartite graph is labeled by one of these activities.

Page 7: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

STRUCT. OF SOCIAL CONTACT NETWORKS & THEIR IMPACT ON EPIDEMICS 7

Figure 2. An illustration of various steps in TRAN-SIMS, and the networks that are constructed. The squaresdenote locations, with the letters specifying the type of loca-tions (H - home, W - work, C - carpool, L - place for lunch).The circles denote people, moving from one location to an-other. The thin solid lines between people and locations showthe edges between people and locations, i.e., the edges of thegraph GPL - these edges are labeled with the time durationwhen the person is present at the location. The thick solidlines (with the arrows) show the “trajectory” of a person (4persons in this figure), as they move from one location toanother; this also illustrates the temporal aspects of the net-work - for instance, person 1 moves from home to a carpool(viewed as a location), to a work location, and so on. At alocation, all people who are at that location at the same timeare connected by dashed edges - these are the edges of thegraph GP . The people also have labels - one such label (40year, male) is shown in the figure.

Page 8: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

8 S. EUBANK, V. KUMAR, M. MARATHE, A. SRINIVASAN, AND N. WANG

3.1. Network Representations. In summary, TRANSIMS gener-ates the following information for a city - demographic information for eachperson and location, and a minute-by-minute schedule of each person’s ac-tivities and the locations where these activities take place. This informationcan be abstractly represented by a (vertex and edge) labeled bipartite graphGPL, where P is the set of people and L is the set of locations. If a personp ∈ P visits a location ℓ ∈ L, there is an edge (p, ℓ, label) ∈ E(GPL) betweenthem, where label is a record of the type of activity of the visit and its startand end points. Each vertex (person and location) can also have labels. Theperson labels correspond to his/her demographic attributes such as age, in-come, etc. The labels attached to locations specify the location’s attributessuch as its x and y coordinates, the type of activity performed, maximumcapacity, etc. Note that, there can be multiple edges between a person and alocation recording different visits. When studying the topological structureof contact networks, we will sometimes consider and sometimes ignore thelabels and the multiplicity of the edges; see [EGK+04] for a discussion ofwhy the time-labels can be ignored for various diseases. We use the termpeople-location graph to refer to the above bipartite graph, wherein multipleedges are discarded and time labels are omitted.

We also consider another graph GP induced on the set of people: (p1, p2) ∈E(GP ) if there is a location ℓ ∈ L such that (p1, ℓ), (p2, ℓ) ∈ E(GPL), andthe time intervals during which p1 and p2 are present at ℓ overlap, i.e., thereis a common location at which the two people p1, p2 are present at the sametime. This graph will be referred to as the people-people graph.

In this paper, all the data is for the city of Portland, Oregon, USA; ourongoing research is studying the (broadly similar) structures of other urbanareas such as Chicago.

3.2. EpiSims: Simulating the Spread of Disease. EpiSims is atool for simulating the spread of disease on a social contact network. Wenow provide a brief overview of this tool; further details can be found in[ES02, Eu+02]. Using the information generated by TRANSIMS, thesimulation maintains a parameterized model for the state of the health ofeach person, and updates this continuously based on interaction with otherpeople, and transmission of the disease through these contacts. This enablesus to get estimates of both the geographic and demographic distribution ofdisease as a function of time; it also allows us to evaluate the impact ofdifferent vaccination/quarantining policies. Different aspects of this tool arediscussed below.Disease Model within each Host: EpiSims uses a single parameter,the disease load, to represent the effect of a disease upon a host. The load inEpiSims is intended to be analogous to viral titre in a throat swab, numberof spores or bacteria present, concentration of toxin, etc. However, it neednot reproduce such clinical aspects of these loads as distribution throughout

Page 9: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

STRUCT. OF SOCIAL CONTACT NETWORKS & THEIR IMPACT ON EPIDEMICS 9

the body. It is merely a parameter that is used to determine whether aperson is infected, symptomatic, too sick for normal activities, infectious, ordead - the higher the disease load, the sicker the person. Each individual inthe simulation who is exposed (either through exposure to an initial releaseor through contact with an infected and infectious person) will progressthrough a series of disease stages. An exposed individual will either becomeinfected or not with a probability based upon the disease model and theindividual’s demographics. Individuals who become infected either developa clinical case of the disease or not. For instance, some fraction of thoseinfected with smallpox never develop a fever or symptoms of the disease.As above, the probability of developing clinical symptoms depends uponvictim characteristics. An isolated contaminated person’s or location’s loadgrows or shrinks at predetermined rates, depending on the characteristics ofthe person and location. All locations share a single common exponentialgrowth or decay rate, depending on the disease. For example, the amount ofvirus present in the environment would decay exponentially if there were nosources (infected people); the amount of bacteria might grow exponentially;while the number of spores would remain fixed. The disease model alsospecifies a set of threshold values for determining the effect of the load onan individual; these thresholds determine whether an individual is infected,symptomatic, infectious, dead, etc.Disease transmission and progression: In EpiSims, an infectious per-son contaminates his or her environment, in a process analogous to sneezingor coughing. The contamination may be restricted to a small region nearthe infected person, and/or it may spread to an entire location, which isroughly the size of an apartment building, office building, or shopping mall.Transmission occurs as uninfected people absorb virus (or bacteria, spores,etc.) from a contaminated location.

Geographical locations, as well as people, have a disease load associatedwith them, representing the level of contamination of the location. Diseaseload in a location has an associated exponential growth rate, which maybe positive, negative, or zero. This allows EpiSims to model non-infectiousdiseases, transmission of disease between people who are never in direct con-tact, or diseases with non-human vectors. The simulation can be initializedby contaminating a specific location at a specific time and/or by assigninga non-zero load to one or more people.

There are two corresponding parameters controlling the interaction ofeach person with his or her local environment: the shedding rate, the fractionof the individual’s load that is shed to the environment per hour, and theabsorption rate, the fraction of the environment’s load that is absorbed byan individual per hour. These parameters are specific to the individual, andcan be set from an estimate of how long a person must be in close contactwith an infectious person before becoming infected.

Page 10: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

10 S. EUBANK, V. KUMAR, M. MARATHE, A. SRINIVASAN, AND N. WANG

4. Structural and Cultural Measures of the Social Network, andtheir Implications

In this section we study basic structural and cultural properties of thesocial contact network for Portland. By cultural properties, we primarilymean demographic analysis of locations and people, especially as it is con-strained by their interaction. To our knowledge an integrated structural andcultural analysis of large social contact networks has not been done before.

We begin with the structural analysis of the GPL and GP networks forPortland. In addition to standard measures, such as degree and clusteringcoefficient distributions, we identify new measures which are more relevantto disease dynamics: overlap ratios, expansion, shattering, temporal degreesand demographic mixing rates. As we argue later, the overlap ratio is a moreuseful measure than the clustering coefficient. We also explain the signifi-cance of expansion and shattering for network epidemiology. The temporaldegrees and demographic mixing rates have not been studied at this levelof detail (due to the lack of sufficient data), and can be used for developingnew vaccination policies.

Degree Distribution and Clustering Coefficient. In the bipartitegraph GPL for Portland, we have 1615860 (1.6 million) people, 181230(181K) locations, and 6060679 (6.1 million) edges. Figure 3 shows the de-gree distributions of the locations and people in the bipartite graph, GPL forthe Portland data. A large part of the degree sequence of locations followsa Power-law distribution, i.e., nk ∝ k−β, where nk denotes the number oflocations of degree k; for the Portland data, β ≈ 2.8. The degree sequenceof people is roughly Poissonian.

100

101

102

103

104

10−6

10−5

10−4

10−3

10−2

10−1

Location degrees

Fra

ctio

n o

f lo

catio

ns

Degree distributionof locations inPortland data

(log−log)

0 5 10 150

0.05

0.1

0.15

0.2

0.25

People degrees

Fra

ctio

n o

f p

eo

ple

Degree distributionof people in Portland data

Figure 3. Degree distributions of locations and people inthe bipartite graph GPL for Portland data. The locationdegrees range from 1 to 7091, people degrees range from 1 to15.

Page 11: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

STRUCT. OF SOCIAL CONTACT NETWORKS & THEIR IMPACT ON EPIDEMICS 11

The degree sequence of people in GP is shown in Figure 4, and looksquite different than the degree sequence of GPL. The graph GP for Portlandis not fully connected, but has a giant component with 1615813 people.We also determine the numbers of length-2 paths and triangles: a length-2 path is an unordered pair of edges ((a, b), (b, c)) that share one vertexand a triangle is an unordered triple of vertices (a, b, c) such that each ofthe three pairs is an edge. Let ∆ denote the number of triangles, L2 thenumber of length-2 paths, then the (overall) clustering coefficient is definedas 3∆/L2. As shown in Table 1 (in Section 7), for GP for Portland data,∆ ≃ 6.3117 × 1011 and L2 ≃ 3.349 × 1012; the clustering coefficient forthe Portland data is about 0.565268. Recent literature on social networks(see e.g. [BA99, New03]) has given a lot of importance to this measure,suggesting that a large clustering coefficient implies a more “tight-knit”interaction; however, we argue later that the overlap ratios and expansionare much better measures in this regard.

Expansion. We consider the two standard notions of expansion in thegraph GP . The edge expansion of a subset S ⊆ P is defined as the ratio

|{e = (u, v) : (u, v) is an edge and u ∈ S, v 6∈ S}|

|S|.

The vertex expansion of a subset S ⊆ P is defined as the ratio |{u /∈ S :(u, v) is an edge and v ∈ S}|/|S|. The edge (vertex, respectively) expansionof GP is the minimum, taken over all S ⊂ P, |S| ≤ |P |/2, of the edge (vertex,respectively) expansion of S. The vertex and edge expansions are impor-tant graph-theoretic properties that capture fault-tolerance, speed of datadissemination in the network, etc. Roughly, the higher the expansion, thequicker the spread of any phenomenon (disease, gossip, data etc.) along thelinks of the network. Computing the expansion exactly is computationallyintractable, but can be approximated within a polylogarithmic factor using

100

101

102

103

104

105

10−7

10−6

10−5

10−4

10−3

10−2

People−people degrees

Fra

ctio

ns

of

pe

op

le

Degree distributions ofpeople−people graphs

of Portland data

Figure 4. Degree distribution in the people-people graphfor the Portland data.

Page 12: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

12 S. EUBANK, V. KUMAR, M. MARATHE, A. SRINIVASAN, AND N. WANG

the results of Leighton and Rao [LR99]. However, the algorithm of [LR99]is currently unsuitable due to its high computational cost for analyzing largegraphs such as the ones studied here; hence we use random sampling to esti-mate the vertex and edge expansions.2 We collected approximately 500, 000random samples of different sizes and calculated the smallest vertex and edgeexpansion, among all samples. Figure 5 summarizes the results. The Y -axisplots the smallest expansion value found among the 500, 000 independentsamples; the X-axis plots the set size S as a percentage of the total numberof vertices in the graph (the sampling probability). The plots labeled “Ver-tex expansion-2” and “Edge expansion-2” in Figure 5 show the expansionin the graph GP , while the plots marked “Vertex expansion-1” and “Edgeexpansion-1” show the same quantity on a sparser people-people graph -the graph is made sparser by only retaining edges between individuals whocame in contact for at least one hour. It is evident that the expansion ratedoes go down in the sparser graph; nevertheless, both the plots show a veryhigh expansion rate.

0.05 0.1 0.15 0.2 0.250

5

10

15

20

25

30

Sampling Probability

Exp

ansi

on F

acto

r

Vertex expansion−1Edge expansion−1Vertex expansion−2Edge expansion−2

Figure 5. Expansion of the people-people graph: the plotsmarked “Vertex expansion-2” and “Edge expansion-2” showthe vertex and edge expansion for the graph GP , while “Ver-tex expansion-1” and “Edge expansion-1” show the corre-sponding quantities in the graph obtained by retaining onlythose edges that involve an interaction of at least 1 hour. Thisleads to a much sparser graph and correspondingly lower val-ues of vertex and edge expansions.

Significance of High Expansion. The high expansion implies that contagiousdiseases would spread very fast, and makes early detection imperative, in

2Random walk based methods have been used in property-testing type of algorithmsfor determining expansion (see e.g. [GR])

Page 13: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

STRUCT. OF SOCIAL CONTACT NETWORKS & THEIR IMPACT ON EPIDEMICS 13

order to control the disease. We discuss detection strategies later. Recentpapers, such as [BKM+00, AJB00, CNSW00, NFB02], have proposedstrategies such as vaccination of high-degree people. In the light of the highexpansion, such strategies are unlikely to be very effective. To quantify theeffectiveness of such a vaccination policy, we study a natural measure calledshattering - given a parameter α > 0, this corresponds to the minimumsize of the largest connected component, over all possible ways of remov-ing up to αn nodes. Vaccinating an individual can be viewed as removingall incident edges on this node (since the individual will no longer contractthe disease and further transmit it). A vaccination scheme (correspondingto node deletions) that leads to small connected components implies thatthe disease would not spread beyond any component. Therefore, the size ofthe largest connected component in the graph resulting from the deletion ofall “vaccinated” nodes is a measure of the effectiveness of the vaccinationscheme. In other words, vaccination should shatter the graph into small com-ponents. Figure 6 shows the largest component size after the “high degreenode” heuristic is implemented - the largest component remains very sta-ble, and continues to remain unique until all nodes of degree 11 are deleted,which requires deleting a large fraction (0.698) of the nodes. This suggeststhat for contagious diseases, the “high degree node” heuristic is in practiceno different than mass vaccination.

0501001502002500

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

People−people degrees (decreasing order)

Siz

e of

the

larg

est c

ompo

nent

Ratio of the size ofthe largest componentto the size of the wholegraph, after removingpeople of a given degree.

0 0.2 0.4 0.6 0.8 10

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Fraction of removed people

Siz

e o

f th

e la

rge

st c

om

po

ne

nt Ratio of the size of

the largest componentto the size of the wholegraph, after removinga fraction of people bydecreasing degrees.

Figure 6. Size of the giant connected component after each iteration.

Overlap Ratio. For a set L′ ⊆ L of locations, let N(L′) be the set ofindividuals visiting at least one of the locations in L′, i.e., N(L′) = {p ∈P : (p, l) ∈ E(GPL) and l ∈ L′}. Then the overlap ratio of L′ is defined by

|N(L′)|P

l∈L′ deg(l) . For a given integer d, the Point-Overlap-Ratio(d) is the overlap

ratio defined for the set of locations of degree d, and the Cumulative-Overlap-Ratio(d) is the overlap ratio of the set of all locations having degree at least d.The first two plots in Figure 7 show the overlap ratios (of Portland data and

Page 14: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

14 S. EUBANK, V. KUMAR, M. MARATHE, A. SRINIVASAN, AND N. WANG

data generated by random models (see Sections 7.2) and 7.3), for locationsconsidered in decreasing order of degree. The plots show that high-degreevertices are visited by almost-disjoint sets of individuals. In other words,most pairs of distinct high-degree locations are visited by (almost) disjointsets of individuals during a day. This is an important structural property ofthe social network under investigation and is likely to be true for many othersuch social networks. This has important implications from the standpointof designing effective strategies for monitoring the onset of an epidemic andis discussed further in Section 5.3.

100

101

102

103

104

0.97210.9743

0.9685

1

Location degrees

Ove

rla

p r

atio

s

PortlandChung−LuConfiguration

Point Overlapratios of locations

of degree k

100

101

102

103

104

0.24850.2666

1

Location degrees (decreasing order)

Ove

rla

p r

atio

s

PortlandChung−LuConfiguration

Cumulative Overlapratios of locations of

degree at least k

0 0.2 0.4 0.6 0.8 10

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Fraction of dominated people

Fra

ctio

n of

dom

inat

ing

loca

tions Portland

Chung−LuConfiguration

Performance of thefast greedy algorithm

Figure 7. Overlap ratios (Section 4) and performance ofthe fast greedy (Section 5.3) for the dominating set problem– comparison between Portland data and data generated byChung-Lu’s model (Section 7.3) and the configuration model(Section 7.2).

Significance of High Overlap ratio. As shown in [EKM+04], the high valueof overlap ratio implies that (approximate) dominating sets in the bipartitegraph GPL are small; we discuss in section 5.3 how a dominating set canbe used for disease monitoring. Also, the overlap ratio is a more refinedmeasure of the tight-knit nature of social interaction than the clustering

Page 15: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

STRUCT. OF SOCIAL CONTACT NETWORKS & THEIR IMPACT ON EPIDEMICS 15

coefficient - a graph could have a specific clustering coefficient even thoughdifferent subgraphs look very different.

Temporal degree distributions. Network analysis has typically onlydealt with static graphs, but real graphs are dynamic- even simple measuressuch as degree distributions are temporal functions. Figure 8 shows thetemporal variation in degrees for six different location types in Portland;for each location type, the distribution of four randomly chosen locationsis shown. The degree distributions reflect the basic trend that one expects;for example, the number of individuals at home is high in the early morninghours, decreases during the day and then shows an increase during eveninghours. Work locations, in contrast, show a complementary behavior. Insteadof “high degree” type of vaccination strategies, one can propose much morerefined schemes by using the temporal degrees.

Cultural Measures Next, we discuss cultural measures, which consist ofdemographic and temporal analysis. We study the following measures: (i)Temporal degree distributions, (ii) activity statistics, and (iii) demographicmixing. Such a study necessarily requires having a detailed representation,such as the one from TRANSIMS.

Activity Durations. As described earlier in Section 3, the data fromTRANSIMS also contain information related to the type of activity a per-son does at a location; the types of activities range from home and work toschool- this describes the kind of activity done at the location. Figure 9shows the distributions of lengths of some activities, obtained from the tem-poral GPL graph, and shows some interesting features. For instance, con-sider the leftmost panel in Figure 9, which corresponds to the activity typework. There are two peaks in the distribution: the first peak is around 4hours and the second is around 8 hours; these peaks correspond well withour intuition of half and full work days. Activity length information couldalso be useful for decision making: for instance, in contact tracing, it mightsuffice to ignore activities that had much smaller duration.

Demographic mixing. Unlike in uniform mixing models, contacts be-tween people are very non-uniform, and depend on a host of demographicfactors. For instance, teens have more contacts with other teens and withsome 30-40 year olds (probably parents, teachers) than with people of otherage groups, as Figure 10(a) shows. To capture this inhomogeneity in thecontacts, we consider people of different age-groups, and determine the av-erage number of contacts with people of other ages; Figure 10 shows thedistributions for three specific age-groups of 16, 30 and 60 (see [EGK+04]for more details). Such demographic mixing information can be used indetermining refined vaccination policies.

Page 16: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

16 S. EUBANK, V. KUMAR, M. MARATHE, A. SRINIVASAN, AND N. WANG

0 5 10 15 20 25 30 35 400

200

400

600

800

1000

1200

1400

1600

Time

Nu

mb

er

of

pe

op

le

4 randomly chosen"home" locations

0 5 10 15 20 25 30 35 400

500

1000

1500

2000

2500

3000

Time

Nu

mb

er

of

pe

op

le

4 randomly chosen"work" locations

0 5 10 15 20 25 30 35 400

500

1000

1500

Time

Nu

mb

er

of

pe

op

le

4 randomly chosen"school" locations

0 5 10 15 20 25 30 35 400

50

100

150

200

250

Time

Num

ber

of p

eopl

e

4 randomly chsoen"shop" locations

0 5 10 15 20 25 30 35 400

500

1000

1500

Time

Nu

mb

er

of

pe

op

le

4 randomly chosen"social" locations

0 5 10 15 20 25 30 35 400

100

200

300

400

500

600

700

Time

Num

ber

of p

eopl

e

4 randomly chosen"college" locations

Figure 8. Temporal degree distributions for different typesof activity locations. The types of activity locations are:home, work, school, shop, social and college. Eachplot contains the temporal degree of four randomly chosenactivity locations of a given type, where the x-axis shows thetime in hours, and the y-axis shows the number of people atthat time (x) and that location (doing the specific activity).For example, the top left plot shows the temporal degreedistribution for four randomly chosen home locations. Thehome location is really a block of homes, and that accountsfor the large sizes.

Page 17: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

STRUCT. OF SOCIAL CONTACT NETWORKS & THEIR IMPACT ON EPIDEMICS 17

5. Using Network Structure for Policy Planning

A significant part of epidemiology deals with understanding vaccinationand quarantining policies, and answering questions such as whom to vacci-nate. The potential for answering such questions is greatly reduced if westick to uniform mixing models. In this section we show how three policyplanning problems can be formulated in terms of the network structure, and,in some cases, can be solved efficiently.

5.1. Modeling the efficacy of Vaccination Policies. The problemis to formulate a simple model for determining the efficiency of a vaccinationscheme. Using the network structure, one way to model this problem isto consider the shattering problem defined in section 4 - the vaccination iseffective if the giant component size goes down. In this model, the discussionin Section 4 shows that the policy of vaccinating all people of degree largerthan some threshold is not very effective. Another model could be to look

0 5 10 15 20 25 300

0.01

0.02

0.03

0.04

0.05

0.06

Duration

Fra

ctio

n

WORK

Fractions of "work" activitiesv/s the their durations.

0 5 10 15 20 25 300

0.02

0.04

0.06

0.08

0.1

0.12

DurationF

ract

ion

SHOP

Fractions of "shop" activitiesv/s the their durations.

0 5 10 15 20 25 300

0.01

0.02

0.03

0.04

0.05

0.06

0.07

0.08

Duration

Fra

ctio

n

SOCIAL

Fractions of "social" activitiesv/s the their durations.

0 5 10 15 20 25 300

0.01

0.02

0.03

0.04

0.05

0.06

0.07

Duration

Fra

ctio

n

SCHOOL

Fractions of "school" activitiesv/s the their durations.

Figure 9. Distribution of activity lengths for work, shop,

social, school activities. For each activity type, and foreach possible duration of times d, the plot shows the fractionof this activity lasted for d time units.

Page 18: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

18 S. EUBANK, V. KUMAR, M. MARATHE, A. SRINIVASAN, AND N. WANG

0 20 40 60 80 1000

2

4

6

8

10

12

14

16

18

20

Age

Nu

mb

er

of

pe

op

leNumber of people

contacted by age−16(on average)

0 20 40 60 80 1000

2

4

6

8

10

12

14

16

18

Age

Num

ber

of p

eopl

e

Number of peoplecontacted by age−30

(on average)

0 20 40 60 80 1000

2

4

6

8

10

12

14

16

18

Age

Nu

mb

er

of

pe

op

le

Number of peoplecontacted by age−40

(on average)

0 20 40 60 80 1000

5

10

15

Age

Num

ber

of p

eopl

e

Number of peoplecontacted by age−60

(on average)

Figure 10. Contacts with each age-group, for people of ages16, 30, 40, and 60. For each of these age groups (say A), andfor each possible age-group (say B) on the X-axis, the plotshows the average number of contacts that group A makeswith group B in the Y -axis. The average for a given age iscomputed by computing a distribution for each person p ofthat age and then summing up these distributions and divid-ing the resulting values by the total number of individuals ofthat age.

at the diameter of the giant component, or the average distance between apair of nodes.

In the first model above, the best vaccination strategy would be to choosea set of nodes to vaccinate (and remove from the network), so that each com-ponent in the remaining graph becomes small. If we are given a parameterρ ∈ (0, 1), and require each component to have at most ρ fraction of thenodes, then this reduces to the ρ-separator problem [LR99]. This problemis NP-hard, and [LR99] gives a polylogarithmic approximation to the opti-mum. Unfortunately, this algorithm is unlikely to scale for such large graphs,and an interesting problem is to find a faster approximation algorithm.

Page 19: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

STRUCT. OF SOCIAL CONTACT NETWORKS & THEIR IMPACT ON EPIDEMICS 19

5.2. The Quarantining/Vaccination Problems. A basic problemfor public health workers that we consider next is: given a set I ⊂ P ofinfected nodes in the graph GP , what is the optimal set of nodes to vaccinateor quarantine? There are two aspects of cost here: one is the number (ortotal cost) of people to vaccinate or quarantine, and the other is the set ofpeople who are reachable from I after deleting the nodes that get vaccinated(this models a highly infectious disease). We describe two formulations ofthis problem here.(a) The Vaccination Problem (VP): given a graph G(V,E), an initialinfected set I, a parameter C, and cost c(v) for each node v, choose a set ofnodes S ⊆ V \ I having cost c(S) =

∑v∈S c(v) ≤ C, such that the size of

the set

AG(I, S) = {v| v has a path from some w ∈ I in G(V \ S)}

is minimized. The set S is the people who are vaccinated, and the setAG(I, S) models the set of people that could get infected by a highly infec-tious disease.(b) The Quarantining Problem (QP): given a graph G(V,E), an initialinfected set I, a parameter B, and cost c(e) for each edge e, choose a cut(S, S) such that I ⊆ S, |S| ≤ B, and the cost of the cut is minimized. Unlikevaccination, quarantining involves cutting down some of the contacts - thisis captured by the edge deletions in this model.

We show that the VP and QP problems are NP-complete and give abicriteria approximation for them, using network flows.

Lemma 1. The VP and QP problems are NP-hard.

Proof. We will show that the decision versions of these problems, witha bound C on the (edge/vertex) cut size and bound B on the number ofnodes that get infected, are NP-complete. These decision problems areclearly in NP. The hardness is by reduction from the NP-complete Bipar-tition problem [GJ79].

An instance of Bipartition involves a graph G(V,E), with cost c(e) oneach edge e, and bound C; the problem is to decide whether there is apartition (V1, V2) such that |V1| = ⌊n/2⌋, |V2| = ⌈n/2⌉ and c(V1, V2) ≤ C.We will always assume w.l.o.g. that C ≤

∑e∈E c(e). We first describe the

reduction from Bipartition to QP. Given an instance G(V,E) of Bipartition,we construct a new graph G′ in the following manner. Add a new vertexs to G, with an edge from s to each vertex in V . Each edge (s, v), v ∈ Vhas cost c(s, v) = α =

∑e∈E(G) c(e) + 1. Now we consider the QP problem

on graph G′ with I = {s} (the infected set), with bounds C ′ = C + ⌈n/2⌉αand B′ = ⌊n/2⌋+ 1. We show that this instance is feasible if and only if thegiven Bipartition instance is. Suppose there is a solution (S, S) to the QPproblem with bounds C ′ and B′ with s ∈ S. We first claim that |S| = B′.

Page 20: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

20 S. EUBANK, V. KUMAR, M. MARATHE, A. SRINIVASAN, AND N. WANG

For, if |S| < B′, the cost of the cut (S, S) would be at least

(n + 1 − |S|)α ≥ (n + 1 − ⌊n/2⌋)α = ⌈n/2⌉α + α > ⌈n/2⌉α + C = C ′.

On the other hand, given that |S| = B′ and the cost of the cut (S, S) isat most C ′, we claim that the bipartition (V1 = S \ {s}, V2 = V \ S) is asolution with cost at most C to the Bipartition problem on G(V,E). Thisis because in the QP problem, the cost of the cut (S, S) contributed by {s}is exactly ⌈n/2⌉α, thus the cost of the cut contributed by V1 = S \ {s} is atmost C ′−⌈n/2⌉α = C. Conversely, if (V1, V2) is a solution to the Bipartitionproblem such that |V1| = ⌊n/2⌋, it is easy to verify that (S = V1 ∪ {s}, V2)is a solution to the QP problem; thus QP is NP-complete.

ss

u

v

e1

e2

e3

f(e )

f(e )

1

f(e )2

3

g(v ) g(v )

g(v )

12

N

v

uG’

G’’

Figure 11. The transformations done in the reduction for VP.

For the VP problem, the reduction needs to be modified, since we aredealing with vertex cuts. From the graph G′ constructed above, we constructanother graph G′′ in the following manner. V (G′′) = VA ∪ VB ∪ VC , whereVA = V (G′), VB = {f(e) : e ∈ E(G′)}, and VC = {g(v, 1), . . . , g(v,N) : v ∈VA}, for N = n4 being a large number; Figure 11 illustrates the reduction ona small example. Here, f and g are just one-to-one indexing functions. VB ispartitioned into two sets VB = VB1 ∪ VB2, where VB1 = {f(e) : e = (s, v) ∈E(G′)} and VB2 = {f(e) : e = (v,w) ∈ E(G′), v, w 6= s}. The vertex costsare defined in the following manner: (i) for each v = f(e) ∈ VB1, c(v) = α =∑

e′∈E(G′) c(e′)+1; (ii) for each v = f(e) ∈ VB2, c(v) = c(e); and (iii) letting

M be the sum of the costs of all vertices in VB , we define, for each v ∈(VA∪VC), c(v) = M . The edges E(G′′) are defined in the following manner:(i) for each edge e = (s, v) ∈ E(G′), we have the edges (s, f(e)) and (f(e), v)that go between VA and VB; (ii) for each edge e = (v,w) ∈ E(G′), v, w 6= s,we have the edges (v, f(e)) and (f(e), w) that go between VA and VB ; and(iii) we have the edges (v, g(v, i)) for each v ∈ VA, i = 1, . . . ,N (these edgesgo between VA and VC). We now consider the VP problem on G′′ withI = {s} and bounds C ′ = C + ⌈n/2⌉α and B′ = (N + 2)⌊n/2⌋ + n2. Weargue below that the Bipartition instance has a solution if and only if theVP instance on G′′ has a solution with the given B′, C ′.

Suppose the above VP problem is feasible, and S ⊆ V (G′′) is a solu-tion, with c(S) ≤ C ′, |AG′′(I, S)| ≤ B′. Then, we argue now that (V1 =

Page 21: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

STRUCT. OF SOCIAL CONTACT NETWORKS & THEIR IMPACT ON EPIDEMICS 21

Input: Graph G, cost c(e) on each edge e, the infected set I and ǫ > 0.Repeat the following steps for β = (1 + ǫ2)i for i =− log(1+ǫ2) (n/(Cǫ)), . . . ,−1, 0, 1, . . . , log(1+ǫ2) (Cǫ) and choose the bestsolution:

(1) Construct a new graph G′: Add a source s and sink t to G. Addedges (s, v),∀v ∈ I with cost ∞ and edges (v, t),∀v 6∈ I with costβ. All edges of G retain their old costs.

(2) Compute the minimum s-t cut, (S, S) for the current value of β.The candidate solution is (S \ {s}, S \ {t}).

Figure 12. A Bicriteria Algorithm for QP

AG′′(I, S) ∩ VA, V2 = V \ V1) is a solution to the Bipartition problemwith cost C. Since each vertex w ∈ VA ∪ VC has cost c(w) = M > C ′,S ⊆ VB . Also, since for each vertex v ∈ VB1, c(v) = α >

∑v′∈VB2

c(v′),

it follows that |VB1 ∩ S| ≤ ⌈n/2⌉. Every vertex in VB1 must lie either inAG′′(I, S) or in S, and, therefore, |VB1 ∩ AG′′(I, S)| ≥ ⌊n/2⌋; this, in turn,implies that |VA ∩ AG′′(I, S)| ≥ ⌊n/2⌋. Also, for each v ∈ AG′′(I, S) ∩ VA,we have for all i that g(v, i) ∈ AG′′(I, S), because S ∩ VC = φ; there-fore, the bound |AG′′(I, S)| ≤ B′ shows that |VA ∩ AG′′(I, S)| ≤ ⌊n/2⌋,for that N = n4 ≫ n2. The above statements together imply |V1 =AG′′(I, S) ∩ VA| = ⌊n/2⌋, and this further implies VB1 ∩ S = ⌈n/2⌉. Sincec(S) =

∑v∈S∩VB1

c(v) +∑

v∈S∩VB2c(v), it follows that

∑v∈S∩VB2

c(v) ≤ C,

and, therefore, the cut (V1, V2) has cost at most C in G. Conversely, sup-pose (V1, V2) is a solution to the Bipartition problem of cost C. Then, itcan be verified easily that S = {f(e) : e ∈ cut(V1, V2)}∪{f(e) : e = (s, v) ∈E(G′), v ∈ V2} is a solution to the VP problem: c(S) = C + |V2|α = C ′, andAG′′(I, S) = (|V1 ∪ {s}|)(N + 2) + |{e ∈ VB2 : e ∈ V1 × V1}| ≤ B′. Together,these imply that the VP problem is also NP-complete. �

To simplify the discussion, we first describe an approximation for QP,and later describe how this can be modified to work for the VP problem.In our discussion, we will assume that the graph is directed - an undirectedgraph can be made directed by putting edges in both directions.

Bicriteria Results for QP. We describe a (1+2ǫ, 1+2/ǫ) approximationalgorithm for QP, for any given ǫ ∈ (0, 1). That is, if the least number ofnewly-infected people in an instance of QP with bound C is denoted byOPT , our approximation algorithm produces a solution with the cost of thecut at most (1 + 2ǫ)C and at most (1 + 2/ǫ)OPT newly-infected people.

Let G(V,E) be an instance of QP, with I ⊆ V being the infected set,and C being the bound on the cost of the cut. The algorithm is outlined inFigure 12.

Page 22: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

22 S. EUBANK, V. KUMAR, M. MARATHE, A. SRINIVASAN, AND N. WANG

Input: Graph G, cost c(v) on each vertex v, the infected set I and ǫ > 0.Repeat the following steps for β = (1 + ǫ2)i for i =− log(1+ǫ2) (n/(Cǫ)), . . . ,−1, 0, 1, . . . , log(1+ǫ2) (Cǫ) and choose the bestsolution:

(1) Construct a new edge weighted graph G′: For each vertex v, we splitit into two vertices vin and vout, and add the edge e = (vin, vout)having cost c(e) = c(v) for v ∈ V \ I, and c(e) = ∞ for v ∈ I.In addition, for each edge (v,w) in the original graph, we add theedges e = (vout, win) having cost c(e) = ∞.

(2) Add a source s and sink t to G′. For each vertex v ∈ I, add edgese = (s, vin) with c(e) = ∞. For each vertex v ∈ V \ I, add edgese = (vout, t) with c(e) = β.

(3) Compute the minimum s-t cut, (X, X), s ∈ X, for the current valueof β. The candidate solution is S = {v : (vin, vout) lies in the cut},and A(I, S) = {v : vout ∈ X}.

Figure 13. A Bicriteria Algorithm for VP

Lemma 2. For any given ǫ > 0, the Algorithm in Figure 12 produces asolution with cut cost at most (1 + 2ǫ)C and at most (1 + 2/ǫ)OPT infectednodes, where OPT is the number of infected people in the optimal solutionwith cut cost C.

Proof. We will first show that if β = ǫC/OPT , the solution obtainedby solving the minimum cut is an (1+ǫ, 1+1/ǫ) approximation. Let (X, X)be the optimal solution with c(X, X) ≤ C, I ⊆ X and |X \I| = OPT . Thenthe solution (X ∪ {s}, X ∪ {t}) has cut cost of C + β · OPT . Now supposethe minimum cut in G′ is (S ∪ {s}, S ∪ {t}), for S ⊆ V (G). Clearly, I ⊆ S(else the edges of cost ∞ have to cross the cut). Let C ′ be the cost of the cut(S, S) in G. Then, C ′ + (|S| − |I|)β ≤ C + β · OPT . Setting β = ǫC/OPT ,this inequality implies that C ′ ≤ (1 + ǫ)C and |S| − |I| ≤ (1 + 1/ǫ)OPT .

Since we do not know the value of OPT , we cannot try out this exactvalue of β. By trying out all the powers of ǫ, given that 1 ≤ OPT ≤ n, wecan approximate this ratio. Suppose, the best solution is obtained for β ∈[β0/(1+ δ), β0(1+ δ)], where β0 = ǫC/OPT and δ = ǫ2, and let this solutionbe the cut (S, S) in G. As above, we have c(S, S)+(|S|−|I|)β ≤ C+OPTβ.Since β ≤ β0(1 + δ), we have c(S, S) ≤ C(1 + ǫ(1 + δ)) ≤ C(1 + 2ǫ), sinceǫ < 1. Similarly, |S| − |I| ≤ OPT (1 + 2/ǫ). �

A Bicriteria approximation for VP. Figure 13 shows the bicriteria al-

gorithm for VP, and is a modification of the algorithm in Figure 12. Thisalgorithm assumes that the graph is directed; if G is undirected, we just putin edges directed both ways before calling the algorithm in Figure 13. Thefollowing lemma shows its correctness.

Page 23: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

STRUCT. OF SOCIAL CONTACT NETWORKS & THEIR IMPACT ON EPIDEMICS 23

Lemma 3. For any given ǫ > 0, the Algorithm in Figure 13 produces asolution with cut cost (i.e., the number of people vaccinated) at most (1 +2ǫ)C and at most (1 + 2/ǫ)OPT infected nodes, where OPT is the numberof infected people in the optimal solution with C vaccinations.

Proof. We firstly argue that the algorithm produces a feasible solutionto the VP problem. Note that there is a finite s − t cut - deleting all edgesof the form (vin, vout), where v ∈ V \ I, has cost c(S) =

∑v∈V \I c(v), and

|A(I, S)| = 0. This corresponds to the trivial solution of vaccinating allpeople in V \ I, and thus no one will be infected. Another trivial solutionof vaccinating no people and thus all will be infected corresponds to a finites − t cut of deleting all edges of the form (vout, t), where v ∈ V \ I. In thisfinite s − t cut solution, c(S) = β|V \ I| and S = ∅. The two trivial finitecuts are not necessary the minimum cuts, but their existence implies thatour argument will not be vacuous.

Next, note that any edge of the form e = (s, vin), or e = (vin, vout) forv ∈ I, or e = (vout, win) for some v,w has c(e) = ∞; therefore, no such edgecan be part of the minimum cut (X, X) - the only edges that can be in thecut are of the form (vin, vout), or (vout, t) for v ∈ V \I. Also, there can be novertex v such that vout ∈ X, vin ∈ X - this would require some edge of cost∞ to be in the cut. This implies that the set S separates the set A(I, S) fromV \ (S ∪A(I, S)) in the original graph G. Also, c(X, X) = c(S)+β|A(I, S)|,where c(S) =

∑v∈S c(v).

As in the proof of Lemma 2, we will first show that if β = ǫC/OPT , thesolution is an (1 + ǫ, 1 + 1/ǫ) approximation. Let S′ be the optimal solutionto V P , with c(S′) ≤ C, and |A(I, S′)| = OPT . Since (X, X) is the minimums−t cut, it must be the case that c(S)+β|A(I, S)| ≤ c(S′)+βOPT . Settingβ = ǫC/OPT , this inequality implies that C ′ ≤ (1 + ǫ)C and |A(I, S)| ≤(1 + 1/ǫ)OPT .

The rest of the argument, to take care of the fact that the “optimal”value of β is not known, is the same as in the proof of Lemma 2. �

5.3. Disease Detection: Sensor Placement. As discussed earlierin Section 4, the expansion of the social network is very high, leading tohigh rates of spread of diseases, and making simple targeted vaccinationschemes infeasible. This makes the problem of early detection even moreimportant. One way of detecting certain kinds of diseases (such as smallpox and anthrax) is to place sensors in some public places. This leads to thefollowing problem: choose a subset S ⊆ L of locations to place the sensors,so that all or most people visit at least one of these locations; the goal is tochoose set S of the smallest size.

We note that the sensor placement problem has been discussed else-where; for example, in studying municipal water networks [BFHP]. Inour situation, the sensor problem reduces to the classical dominating set

Page 24: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

24 S. EUBANK, V. KUMAR, M. MARATHE, A. SRINIVASAN, AND N. WANG

problem. It is NP-hard, and a greedy algorithm gives an O(log |L|) approx-imation. For the GPL graph, it turns out that a much simpler algorithm,called fastgreedy works fairly well- choose the highest degree locations sothat the required fraction of people are dominated (i.e., they visit one ofthe chosen locations); Figure 7 shows that the fastgreedy heuristic worksvery well in practice. The effectiveness of fastgreedy is, intuitively, due tothe high overlap ratios (as explained in Section 4). In [EKM+04], we showthat for the Chung-Lu model (discussed in Section 7), fastgreedy provablyworks very well.

6. EpiSims Based Dynamic Analysis

We now turn to simulation based analysis of the disease dynamics. Ourresults show that graph theoretic analysis can provide useful insights andguide the simulation based dynamic analysis. Much of the discussion in thissection is from our recent article [EGK+04], which focused on smallpox.As noted below, many quantitative results such as total number of casesdepend on details of the disease model. We are currently investigating howqualitative results can be generalized across diseases.

Our results on high expansion suggest that the disease is likely to spreadquickly if it is not controlled at an early stage. However, exactly how thenumber of casualties depends on response delay and what constitutes earlyenough depend on disease-specific factors such as incubation period andprobability of transmission, as well as scenario-specific factors such as themeans of introduction. Because these dependencies cannot be easily deter-mined from analysis of the static social network, we turn to simulation. See[website] for details about the particular disease model used in the simula-tion experiments. At present, there is no consensus on models of smallpox.The model used in our study captures many features on which there iswidespread agreement and allows us to vary poorly understood propertiesthrough reasonable ranges [EGK+04]. Our model includes the followingfeatures (see [EGK+04] for definitions of some of the terms below):

• the incubation period is a truncated Gaussian distribution,• the prodromal period is 3-5 days,• the infectious period is 4 days, during which infectivity decreases

exponentially,• death occurs 10-16 days after the rash develops in 30% of normal

cases. 95% of susceptibles exposed for three hours to a person atminimum infectivity for three hours will become infected. The (theremaining 5% have extremely high or low susceptibilities, mimick-ing some anecdotal transmission incidents),

• vaccination is assumed to be 100% effective pre-exposure, and itseffectiveness is less if it is administered some time after the expo-sure.

Page 25: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

STRUCT. OF SOCIAL CONTACT NETWORKS & THEIR IMPACT ON EPIDEMICS 25

The model also includes hemorrhagic variants with a shorter incubationperiod that are ten times as infectious and invariably fatal. Importantly,EpiSims does not specify a value for R0, the basic reproductive number.This parameter reflects how many people in a susceptible population aredirectly infected by the introduction of a single infective individual. R0

is a convolution of transmission rates and contact patterns, and EpiSimscarries out the convolution for us. The implied value of R0 is the ratio ofnumbers of people in the first and original cohorts; these estimates obvi-ously include the effects of the simulated response strategy. For the set ofexperiments reported below, R0 ranges from 0.4 to 3.4. In these scenarios,aerosolized smallpox was distributed indoors at busy locations over severalhours, infecting on the order of 1000 people. We assumed that the presenceof smallpox was detected on the tenth day after the attack. We studied thesensitivity of the number of casualties to three factors: mitigation efforts,delay in implementing mitigation efforts, and whether people move aboutwhile infectious. We simulated a passive (do nothing) baseline and threeactive responses:

• mass vaccination covering 100% of the population in four days(“mass”),

• targeted vaccination and quarantine with unlimited resources (“tar-geted”),

• the same targeted response, using only half as many contact tracersand vaccinators (“limited”).

The choice of individuals for targeted vaccination and quarantining isbased on our graph theoretic analysis and uses two heuristic methods: (i)individuals in the first neighborhood of the infected people are candidates forvaccination or quarantine based on high expansion of the network suggestingearly action, and (ii) individuals with higher degrees (contacts) are morelikely to be chosen from this subset. A more detailed experimental designthat uses cultural measures and sophisticated graph theoretic measures iscurrently being conducted.Results For a movie showing the spatial spread of disease under two dif-

ferent response strategies, see [website]. Figure 14 compares the efficacyof these strategies. For each strategy, we plot (on a logarithmic scale) theratio of the cumulative number of deaths by day 100 to the number initiallyinfected. The absolute numbers are less important than the rank and rel-ative sizes of gaps between the points. Also shown are the effects of 4, 7,or 10 day delays in implementing the response. For each of the responsesincluding the baseline, we allowed infected people to isolate themselves bywithdrawing to the home. This could be due to either the natural historyof the disease, which incapacitates its victims, or actions taken by publichealth officials encouraging people to stay home. The results are groupedaccording to time of withdrawal to the home:

Page 26: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

26 S. EUBANK, V. KUMAR, M. MARATHE, A. SRINIVASAN, AND N. WANG

(1) EARLY: people withdraw before they become infectious, producingthe lowest estimates for R0;

(2) LATE: people withdraw roughly 24 hours after they have becomeinfectious; and

(3) NEVER people carry on their daily activities unless they die. Theextreme cases are unrealistic, but are shown here because theydemonstrate the existence of a clear transition.

The study shows that time of withdrawal to the home is by far the mostimportant factor, followed by delay in response. This indicates that targetedvaccination is feasible when combined with fast detection. Ironically, theactual strategy used is much less important than either of these factors.Overall, these results suggest a much greater efficacy for targeted strategiesthan suggested by the results of Kaplan, Craft, and Wein [KCW02]. It isnot clear what accounts for the difference. Possibilities include: differencesin mixing rates, differences in the distribution of incubation periods, anddifferences in transmissivity.

10-1

100

101

102

103

base

targ

eted

limite

d

mas

s

base

targ

eted

limite

d

mas

s

base

targ

eted

limite

d

mas

s

deat

hs b

y da

y 10

0 pe

r in

itial

infe

cted

EARLY LATE NEVER

no vaccine10 day delay

7 day delay4 day delay

Figure 14. Cumulative number of deaths per number ofinitial infected, in case of a smallpox outbreak in downtownPortland, under a number of different response strategies.

7. Random Graph Models

Random graph models provide an analytic framework for calculating(asymptotically) structural properties of networks, such as typical pathlengths or distribution of sizes of connected components. Random graphsgenerated by these models also form a useful substrate for studying the

Page 27: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

STRUCT. OF SOCIAL CONTACT NETWORKS & THEIR IMPACT ON EPIDEMICS 27

behavior of phenomena that take place on networks [New03]. The clas-sical G(n, p) random graph model of Erdos and Renyi does not captureeven basic properties of real networks, such as degree distribution - thishas spurred research into new models for capturing different aspects of realnetworks. There are two lines of modeling the structures and behavior ofreal networks. One starts from observed structures of certain networks andconstructs a model that generates networks encapsulating these structures.Through a random graph model, one can examine these structures and pre-dict other structures over an ensemble of graphs. Instead of encapsulatinggiven structures, another line is to explain the formation of these structures.That is, starting from some assumptions and rules, build networks in whichcertain structures will appear asymptotically. Although important and in-teresting, explaining the formation of these structures is not our purpose inthis work, and we only briefly describe a representation of them, i.e., thepreferential attachment model in Section 7.1. Also, due to the abundanceof different models in encapsulating given structures, we only describe twoof them that are relevant to our interests in Section 7.2 and 7.3.

7.1. Preferential Attachment Models. The first model trying toexplain the formation of scale-free degree distribution is the preferential at-tachment model [BA99]. This is an evolutionary model, where nodes comein sequentially, and each node chooses some edges to nodes that are alreadypresent; the edges are not chosen uniformly, but with a higher preferencefor nodes that already have a higher degree. These models have been shownto be very useful for modeling the Internet web graph, but are not verypromising for social networks for the following two reasons. The first is thatsocial networks do not have very strict power laws- in the Portland data,only the location degree in GPL is a power law in some range, but the peopledegree sequence in GPL or in GP is not a power law. But the preferentialattachment models are only able to generate specific power law degree dis-tributions. The second reason is that preferential attachment models are notdefined for bipartite graphs, and it is not clear whether they can be modifiedfor GPL type of graphs. Generating instances of graphs is also fairly slow inthis model, and therefore, we do not consider it further.

7.2. Configuration Model. In the configuration model, initially makek copies for each vertex of degree k, then randomly pair two copies of thecollection of all copies into an edge, remove these two copies and repeat thepairing process until no copies are left. Since the sum of degrees must beeven, the above process is valid. At the end, if the resulting graph is a simplegraph then output it, otherwise repeat and generate another graph. Obvi-ously the configuration model uniformly generates a random graph exactlymatching the given degree sequence. The structural properties of graphsgenerated by the configuration model for a fixed given degree sequence werefirst studied in [MR98, MR95].

Page 28: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

28 S. EUBANK, V. KUMAR, M. MARATHE, A. SRINIVASAN, AND N. WANG

Although elegant and efficient, the probability of occurrence of multi-edges or self-loops is large when the degrees are large. For example, inPortland data GPL, the maximum location degree is 7091, the maximumpeople degree is 15, and the number of edges between people and locationsis 6060679. In our simulation all graphs among thousands generated by (thebipartite version of) the configuration model are non-simple, although multi-edges are few (between 500 and 700). To test the efficacy of the configurationmodel, we just discard those multi-edges and output the graph. Thus thedegree sequence is not a perfect match but close enough. As in Portlanddata, the generated graph has a giant connected component composed ofalmost all people. Other properties also match Portland data very well,i.e., degree distribution of the people-people graph GP (Figure 16); overlapratios and performance of the fast greedy (Figure 7) in GPL; numbers ofedges, triangles, and length-2 paths, and the clustering coefficient in GP .

7.3. Chung-Lu’s model. Despite the good simulation results from theconfiguration model, the combinatorics of this model are awkward [PN03]and rigorous analysis is hard on this model [CL02]. Chung and Lu haveproposed an alternative model [CL02] that is in many ways more convenient.In the model of Chung and Lu [CL02] one specifies the desired degree kv

of vertex v and then places edges between vertex pairs (v,w) independently

with probability Pvw = kvkw

σ, where σ =

∑v kv is twice the desired number

of edges in the graph. It is easy to verify that the expected degree of eachvertex is equal to its desired degree. Since each single edge has an explicitprobability of appearing, many rigorous analyses can be carried through onthe random graphs generated by this model. The result about dominatingset in [EKM+04] was proved in this model. However this approach is stillnot entirely satisfactory. For some degree distributions the probability Pvw

can exceed one, and hence the addition constraint on the desired degreedistribution is maxv{k

2v} ≤ σ. Translated in the GPL bipartite graphs, one

needs maxp∈P,ℓ∈L kpkℓ ≤ σ, where σ =∑

p∈P kp =∑

ℓ∈L kℓ. FortunatelyPortland data satisfies this requirement. Unlike the configuration model,the degree sequence in the generated graph may not match exactly thegiven degree sequence. We also compare the same properties for Chung-Lu’s model as we did for the configuration model (Section 7.2). The resultsare satisfactory, but not as good as in the configuration model.

Figures 15 and 16 show the comparison between the degree distributionsfor these models and the Portland data. Table 1 compares the number ofedges, triangles, length 2 paths and clustering coefficient for these modelsand the Portland data.

Page 29: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

STRUCT. OF SOCIAL CONTACT NETWORKS & THEIR IMPACT ON EPIDEMICS 29

100

101

102

103

104

10−6

10−5

10−4

10−3

10−2

10−1

Location degrees

Fra

ctio

n of

loca

tions

Degree distributionof locations (log−log)

Portland dataChung−Lu model

0 5 10 15 20 25 300

0.05

0.1

0.15

0.2

0.25

People degrees

Fra

ctio

n of

peo

ple

Portland dataChung−Lu model

Degree distributionof people

Figure 15. Degree distributions of locations and people inthe bipartite graph GPL for Portland data and the Chung-Lumodel (described in Section 7). The location degrees rangefrom 1 to 7091, people degrees range from 1 to 15.

100

101

102

103

104

105

10−7

10−6

10−5

10−4

10−3

10−2

People−people degrees

Fra

ctio

ns o

f peo

ple

Chung−Lu modelPortland dataConfiguraiton model

Degree distributions ofpeople−people graphs

Figure 16. Comparison of degree distributions of people-people graphs of Chung-Lu’s model, Portland data, and theconfiguration model.

Edges Triangles Len.-2 paths Clust. coef.

Portland 1077247259 631174770092 3349781340086 0.565268Configuration 1080704055 629038069416 3308711641941 0.570347

Chung-Lu 1087038876 636683653469 3731989178759 0.511805

Table 1. Numbers of edges, triangles, and length-2 paths,and clustering coefficients in the people-people graph(1615860 people) in the Portland data and the Chung-Lumodel.

Page 30: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

30 S. EUBANK, V. KUMAR, M. MARATHE, A. SRINIVASAN, AND N. WANG

8. Conclusions

In this paper, we studied epidemiology through a concrete, realistic, andfull-featured social network representing Portland data, from three perspec-tives: (1) structural (i.e., topological, demographical, and temporal) mea-sures of the contact networks, combinatorial formulations and approxima-tion algorithms for certain problems in epidemiology and empirically evalu-ating these algorithms and structures via different random graph models; (2)methodology for generating contact networks of large urban areas startingfrom survey/census/transportation data; (3) several vaccination strategiesmotivated by the network structure, and their efficacy as determined theEpiSims simulation tool.

Acknowledgments We are very grateful to the members of the TRAN-SIMS and EpiSims teams at the Los Alamos National Laboratory, and toSweta Bansal, Mac Hyman, Ira Longini, Cris Moore, Lauren Meyers, AzharNizam, and Zoltan Toroczkai for valuable discussions. Cris Moore suggestedthat we take another look at the configuration model for random graph gen-eration. Thanks also to Lauren Meyers for sharing the slides of her talk onNetwork Epidemiology. Finally, we thank the referees of this article for theirhelpful comments.

References

[NG] E. Zwingle. Cities. Natl. Geo. Mag. 202 70-99 (2002).[AJB00] R. Albert, A. Jeong, and A.L. Barabasi. Attack and error tolerance of

complex networks. Nature, 406:378–382, 2000.[AB02] R. Albert and A. Barabasi, Statistical Mechanics of Complex Networks,

Rev. Mod. Phys. 74, 47-97 (2002).[BA99] A.-L. Barabasi and R. Albert. Emergence of scaling in random networks.

Science, 286, 1999.[BBJ+02] C. Barrett, K. Bisset, R. Jacob, G. Konjevod, and M. Marathe. An

experimental analysis of a routing algorithm for realistic transportationnetworks. In Proc. European Symposium on Algorithms (ESA), 2002.

[TRAN] C. L. Barrett, R. J. Beckman, K. P. Berkbigler, K. R. Bisset, B. W.Bush, K. Campbell, S. Eubank, K. M. Henson, J. M. Hurford, D. A.Kubicek, M. V. Marathe, O. Ramos, Jr., S. Ree, P. R. Romero, J. P.Smith, L. L. Smith, P. L. Speckman, P. E. Stretz, G. L. Thayer, E.Van Eeckhout, and M. D. Williams TRANSIMS 2.0: TransportationAnalysis Simulation System: Volume 1 – Volume 6 Technical ReportLA-UR-00-1723 – LA-UR-00-1767 , Los Alamos National Laboratory,2000.

[BFHP] J. Berry and L. Fleischer and W. E. Hart and C. Phillips. Sensor Place-ment in Municipal Water Networks. Proc. World Water and Environ-mental Resources Conference, 2003.

[BJM01] C. Barrett, R. Jacob, and M. Marathe. Formal language constrainedpath problems. SIAM J. Computing, 30(3):809–837, 2001.

[BSE] C. Barrett, J.P. Smith and S. Eubank. Modern Epidemiology Modeling,LANL Technical Report LA-UR-04-4176.

Page 31: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

STRUCT. OF SOCIAL CONTACT NETWORKS & THEIR IMPACT ON EPIDEMICS 31

[Ba75] N. Bailey. The Mathematical Theory of Infectious Diseases and its Ap-plications. Hafner Press, (1975).

[BKM+00] A. Broder, R. Kumar, F. Maghoul, P. Raghavan, S. Rajagopalan,R. Stata, A. Tomkins, and J. Wiener. Graph structure in the web. Com-puter Networks, 33, 2000.

[CL02] F. Chung and L. Lu. Connected components in a random graph withgiven degree sequences. Annals of Combinatorics, 6:125–145, 2002.

[CNSW00] D.S. Callaway, M.E.J. Newman, S. Strogatz, and D.J. Watts. Networkrobustness and fragility: Percolation on random graphs. Phys. Rev. Lett.,85:5468–5471, 2000.

[EFA76] K. Elveback, J. Fox and E. Ackerman. An Influenza Simulation Modelfor Immunization Studies American J. Empidemiology, 103, pp. 152-165,1976.

[Eu+02] S. Eubank and et al. Episims assessment of responses to smallpox attack(report to the office of homeland security). Technical Report LA-CP-02-254, Los Alamos National Laboratory, 2002.

[EGK+04] S. Eubank, H. Guclu, V. S. Anil Kumar, M. Marathe, A. Srinivasan, Z.Toroczkai and N. Wang. Modeling disease outbreaks in realistic urbansocial networks. Nature, 429:180–184, 2004.

[EKM+04] S. Eubank, V. S. Anil Kumar, M. Marathe, A. Srinivasan, and N.Wang. Structural and algorithmic aspects of massive social networks. InProceedings of the 15th ACM-SIAM Symposium on Discrete Algorithms(SODA), pages 711–720, 2004.

[ES02] S. Eubank and J. Smith. Scalable, efficient epidemiological simulation.In Proceedings of Symposium on Applied Computing, 2002.

[FFF99] C. Faloutsos, P. Faloutsos, and M. Faloutsos. On Power-Law Relation-ships of the Internet Topology. Proceedings of the ACM SIGCOMM(1999).

[GJ79] M.R. Garey and D.S. Johnson. Computers and Intractability. A Guideto the Theory of NP-Completeness, Freeman, San Francisco CA, 1979.

[GR] O. Goldreich and D. Ron. On Testing Expansion inBounded Degree Graphs. Manuscript, 2000. Available fromhttp://www.wisdom.weizmann.ac.il/∼oded/papers.html.

[He00] H. Hethcote. The Mathematics of Infectious Diseases. SIAM Review,42(4), pp. 599-653, (2000).

[HL02] H. Halloran, I. Longini Jr, A. Nizam, & Y. Yang. Possible Containmentof Bio-terrorist Smallpox. Science, 298, pp. 1428-1432, (2002).

[HL+04] E. Halloran, I. Longini, D. Cowert, et.al. Community trials of Vaccina-tion and the Epidemic Prevention Potential, Vaccine, 20, pp. 3254-3262,2002.

[KCW02] E.H. Kaplan, D.L. Craft, and L.M. Wein. Emergency response to a small-pox attack: the case for mass vaccination. Proc. Natl. Acad. Sci. USA,99:10935–10940, 2002.

[LH+04] I. Longini, E. Halloran, A. Nizam and Y. Yang. Containing PandemicInfluenza with Antiviral Agents American J. Epidemiology, 159(1), pp.623-633, 2004.

[LR99] T. Leighton and S. Rao. An approximate max-flow min-cut theoremfor multicommodity flow problems with applications to approximationalgorithms. Journal of the ACM, 46(6):787–832, 1999.

Page 32: Structure of Social Contact Networks and Their …pdfs.semanticscholar.org/1d54/afcb8f4229825a43bc964b602...social contact networks, as well as (ii) simulation-based dynamic anal-ysis

32 S. EUBANK, V. KUMAR, M. MARATHE, A. SRINIVASAN, AND N. WANG

[MNMS03] L. Meyers, M. E. J. Newman, M. Martin, and S. Schrag. Apply-ing network theory to epidemics: Control measures for outbreaks ofmycoplasma pneumonia. Emerging Infectious Diseases, pages 204–210,2003.

[MR95] M. Molloy and B. Reed. A critical point for random graphs with a givendegree sequence. Random Structures and Algorithms, 6:161–180, 1995.

[MR98] M. Molloy and B. Reed. The size of the largest component of a ran-dom graph on a fixed degree sequence. Combinatorics, Probability andComputing, 7:295–306, 1998.

[NP03] M. E. J. Newman and J. Park. Why social networks are different fromother types of networks. Phys. Rev. E 68, 036122 (2003).

[New03] M. Newman. Random graphs as models of networks. In S. Bornholdt andH. G. Schuster, editors, Handbook of Graphs and Networks. Wiley-VCH,Berlin, 2003.

[Ne03a] M. E. J. Newman. The structure and function of complex networks.SIAM Review 45, 167–256 (2003).

[NFB02] M. Newman, S. Forrest, and J. Balthrop. Email networks and the spreadof computer viruses. Phys. Rev. E, 66(035101), 2002.

[NSW01] M. Newman, S. Strogatz, & D. Watts. Random graphs with arbitrary de-gree distributions and their applications. Phys.Rev.E 64 026118 (2001).

[PN03] J. Park and M. E. J. Newman. The origin of degree correlations in theInternet and other networks. Phys. Rev. E., 68(026112), 2003.

[PLH4] R. Patel, I. Longini and E. Halloran. Finding Optimal VaccinationStrategies for Pandemic Influenza Using Genetic Algorithms TechnicalReport,04-07, Dept. of Biostatistics, Rollins School of Public Health,Emory University, Atlanta, 2004.

[website] http://www.nature.com/nature/journal/v429/n6988/extref/nature02541-s1.htm