This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Recruitment dynamics in adaptive social networks

Maxim S. Shkarayev Applied Science Department, College of William & Mary, Williamsburg, VA 23187    Ira B. Schwartz Nonlinear Systems Dynamics Section, Plasma Physics Division, Code 6792, US Naval Research Laboratory, Washington, DC 20375    Leah B. Shaw Applied Science Department, College of William & Mary, Williamsburg, VA 23187
Abstract

We model recruitment in adaptive social networks in the presence of birth and death processes. Recruitment is characterized by nodes changing their status to that of the recruiting class as a result of contact with recruiting nodes. Only a susceptible subset of nodes can be recruited. The recruiting individuals may adapt their connections in order to improve recruitment capabilities, thus changing the network structure adaptively. We derive a mean field theory to predict the dependence of the growth threshold of the recruiting class on the adaptation parameter. Furthermore, we investigate the effect of adaptation on the recruitment level, as well as on network topology. The theoretical predictions are compared with direct simulations of the full system. We identify two parameter regimes with qualitatively different bifurcation diagrams depending on whether nodes become susceptible frequently (multiple times in their lifetime) or rarely (much less than once per lifetime).

adaptive networks, network dynamics, recruitment
pacs:
87.10.Mn, 05.10.Gg

I Introduction

Any society contains individuals who are carriers of an ideology or fad (e.g., a religious or political party affiliation) that they desire to spread to the rest of the society. Thus, for a given ideology, a society can be partitioned into a set of people that represent the ideology and want to spread it, and the complement of this set. For example, the ideology could correspond to the views of a particular political party, with the party members desiring to recruit new members to improve their positions in the government. Other areas of recruitment have been proposed as mechanisms for fads which appear as a rapid rise above some threshold, as in music Meyer and Ultsch (2010) ,management technologies Bendor et al. (2009), economics Janssen and Jager (2001), and even science Abrahamson (2009) . Slower recruitment based on social networks has been postulated in biology Grueter and Ratnieks (2011) and the spread of alcoholism Benedict (2007). Slowing the rise of a fad or eliminating the spread of an ideology has been also been proposed through the control of critical nodes in a social network Kuhlman et al. (2010).

In today’s world where collisions between ideologies can lead to radicalization of society, the problem of existence and formation of terrorist networks or insurgency movements becomes important. Recently, mathematical modeling of various radical groups, such as terrorist organizations, has been done to explore their structure and dynamics Gutfraind (2009a, b); Johnson et al. (2006); Cherif et al. (2009). In addition to dynamical approaches that measure rates of attacks of radical groups Johnson et al. (2011), operations research theories have also been applied to the formation of radical groups Caulkins et al. (2008). Another class of works Udwadia et al. (2006); Bentson (2006); Butler (2011) focuses on the recruitment dynamics of terrorists within a well-mixed population using compartmental models similar to those used for epidemic spread. In Butler (2011), a systematic analysis of recruitment to Hezbollah has been done. Data from a political science discipline is used to generate a compartmental model of recruitment. Although the modeling is deterministic, it considers the various parameters which explicitly affect the success of recruitment to the radical’s cause. Finally, a number of recent publications discuss terrorist networks as optimal structures that optimize communication efficiency while balancing the secrecy of the networks Lindelauf et al. (2009); Farley (2003); Bar-Isaac and Baccara (2006).

Not considered previously is the combination of the spread of radical ideas plus adaptive changes in social connections to improve recruitment success to the radical cause. Some work in this direction is presented in the papers studying voter models in which individuals make connections to influence others’ opinions Benczik et al. (2008, 2009); Schmittmann and Mukhopadhyay (2010), as well as opinion dynamics models in which individuals are influenced by neighbors’ opinions Holme and Newman (2006).

We develop a simple model of a society in which some of the members belong to a class that tries to spread an ideology. The ideology spreads as a result of contact of recruiting members with nonrecruiting members. The recruiting members may improve their chances to recruit via network adaptation. The purpose of the adaptation proposed here is to improve the spread of the ideology, which is in contrast to network adaptation in epidemiological models Gross et al. (2006); Shaw and Schwartz (2008) where the purpose is avoidance of contact with the spreading members. In addition to adaptation, the connectivity within the society changes due to birth of new members and death of existing members. Using this model, we explore how the existence of stable recruiting classes depends on the adaptation and other parameters. We also consider the network topology of the recruiting class, as it may be important in accessing the quality of the communication channels in the resulting structure. Section II presents the model and a system of mean field equations describing its dynamics. Section III presents mean field analysis of the threshold for successful recruiting and its dependence on the network adaptation. These results are compared with simulations of the full system, and the network geometry of the recruiting class is considered. Section IV concludes.

II Modeling the dynamics of recruitment

II.1 Model

We consider a social structure consisting of MM individuals represented by nodes in a network. An existing relation between any two individuals is represented by a link between the two nodes. New individuals join the society at a constant total rate μ\mu, and the individuals in the network can leave the network via death at rate δ\delta per individual. When new individuals join the system, they arrive with σ\sigma links, which are connected to σ\sigma randomly selected nodes in the population. When individuals die, their links are removed.

Refer to caption
Figure 1: Schematic representation of node fluxes in and out of the network due to birth and death, described by the rates μ\mu and δ\delta respectively. Fluxes between the three classes are described by the transition rates λ1\lambda_{1}, λ2\lambda_{2} and γ\gamma. Link rewiring (not shown here) takes place at rate ww.

Some members of the society, recruiters (also referred to as R-nodes), are carriers of an ideology that they try to spread to the individuals they come into contact with. The individuals that do not belong to the recruiting class are divided into two groups: those who are susceptible to the recruitment (S-nodes) and those who are non-susceptible (N-nodes). We assume that individuals can spontaneously change their state from non-susceptible to susceptible and vice versa (with rates λ1\lambda_{1} and λ2\lambda_{2} respectively). An individual in the recruiting class remains in that class until death Udwadia et al. (2006).

A susceptible individual joins the recruiting class at a rate that is proportional (with proportionality constant γ\gamma) to the number of contacts it has with the recruiting class. In order to improve their recruiting capabilities, the recruiting individuals can rewire their links with rate ww, abandoning a connection to a nonsusceptible individual in favor of a connection to a susceptible one. As the links are rewired, the network topology changes based on the current states of its nodes. A schematic representation of the node dynamics is shown on Fig. 1.

We perform Monte Carlo simulations of the above system following the continuous time algorithm described in Gillespie (1976). We start with an Erdos-Renyi random network, which then evolves according to the rules of birth, death, and rewiring. The results presented in the rest of the paper are for the systems that have reached a steady state.

II.2 Mean field

To describe the dynamics of this system, we construct a mean field model for nodes and links as in Gross et al. (2006). The time evolution of the nodes of each type is described by the following rate equations:

t𝒩N\displaystyle\partial_{t}\mathcal{N}_{\text{N}} =μλ1𝒩N+λ2𝒩Sδ𝒩N\displaystyle=\mu-\lambda_{1}\mathcal{N}_{\text{N}}+\lambda_{2}\mathcal{N}_{\text{S}}-\delta\mathcal{N}_{\text{N}} (1a)
t𝒩S\displaystyle\partial_{t}\mathcal{N}_{\text{S}} =λ1𝒩Nλ2𝒩Sγ𝒩RSδ𝒩S\displaystyle=\lambda_{1}\mathcal{N}_{\text{N}}-\lambda_{2}\mathcal{N}_{\text{S}}-\gamma\mathcal{N}_{\text{RS}}-\delta\mathcal{N}_{\text{S}} (1b)
t𝒩R\displaystyle\partial_{t}\mathcal{N}_{\text{R}} =γ𝒩RSδ𝒩R,\displaystyle=\gamma\mathcal{N}_{\text{RS}}-\delta\mathcal{N}_{\text{R}}, (1c)

Here the functions 𝒩N𝒩N(t)\mathcal{N}_{\text{N}}\equiv\mathcal{N}_{\text{N}}(t), 𝒩S𝒩S(t)\mathcal{N}_{\text{S}}\equiv\mathcal{N}_{\text{S}}(t), 𝒩R𝒩R(t)\mathcal{N}_{\text{R}}\equiv\mathcal{N}_{\text{R}}(t) represent the number of nodes of each type. The process of recruitment is captured by the γ𝒩RS\gamma\mathcal{N}_{\text{RS}} term, where the recruitment is shown to take place at a rate proportional to the number of links between the recruiting class and the susceptible class, 𝒩RS\mathcal{N}_{\text{RS}}.

In order to capture the rewiring process, we follow the evolution of the number of different types of links present in the network:

t𝒩NN=λ2𝒩SN+σμ𝒩N𝒩N+𝒩S+𝒩R2(λ1+δ)𝒩NN\displaystyle\begin{split}\partial_{t}\mathcal{N}_{\text{NN}}&=\lambda_{2}\mathcal{N}_{\text{SN}}+{\sigma\mu}\frac{\mathcal{N}_{\text{N}}}{\mathcal{N}_{\text{N}}+\mathcal{N}_{\text{S}}+\mathcal{N}_{\text{R}}}\\ &-2(\lambda_{1}+\delta)\mathcal{N}_{\text{NN}}\end{split} (2a)
t𝒩SN=σμ𝒩S𝒩N+𝒩S+𝒩Rγ𝒩NSR+2λ2𝒩SS(λ1+λ2+2δ)𝒩SN+2λ1𝒩NN\displaystyle\begin{split}\partial_{t}\mathcal{N}_{\text{SN}}&={\sigma\mu}\frac{\mathcal{N}_{\text{S}}}{\mathcal{N}_{\text{N}}+\mathcal{N}_{\text{S}}+\mathcal{N}_{\text{R}}}-\gamma\mathcal{N}_{\text{NSR}}+2\lambda_{2}\mathcal{N}_{\text{SS}}\\ &-(\lambda_{1}+\lambda_{2}+2\delta)\mathcal{N}_{\text{SN}}+2\lambda_{1}\mathcal{N}_{\text{NN}}\end{split} (2b)
t𝒩SS=γ𝒩SSR+λ1𝒩SN2(λ2+δ)𝒩SS\displaystyle\begin{split}\partial_{t}\mathcal{N}_{\text{SS}}&=-\gamma\mathcal{N}_{\text{SSR}}+\lambda_{1}\mathcal{N}_{\text{SN}}\\ &-2(\lambda_{2}+\delta)\mathcal{N}_{\text{SS}}\end{split} (2c)
t𝒩RN=γ𝒩NSR+σμ𝒩R𝒩N+𝒩S+𝒩R(λ1+2δ+w)𝒩RN+λ2𝒩RS\displaystyle\begin{split}\partial_{t}\mathcal{N}_{\text{RN}}&=\gamma\mathcal{N}_{\text{NSR}}+{\sigma\mu}\frac{\mathcal{N}_{\text{R}}}{\mathcal{N}_{\text{N}}+\mathcal{N}_{\text{S}}+\mathcal{N}_{\text{R}}}\\ &-(\lambda_{1}+2\delta+w)\mathcal{N}_{\text{RN}}+\lambda_{2}\mathcal{N}_{\text{RS}}\end{split} (2d)
t𝒩RS=γ𝒩RSR+γ𝒩SSR(λ2+2δ)𝒩RS+(λ1+w)𝒩RN\displaystyle\begin{split}\partial_{t}\mathcal{N}_{\text{RS}}&=-\gamma\mathcal{N}_{\text{RSR}}+\gamma\mathcal{N}_{\text{SSR}}\\ &-(\lambda_{2}+2\delta)\mathcal{N}_{\text{RS}}+(\lambda_{1}+w)\mathcal{N}_{\text{RN}}\end{split} (2e)
t𝒩RR=γ𝒩RSR2δ𝒩RR.\displaystyle\begin{split}\partial_{t}\mathcal{N}_{\text{RR}}&=\gamma\mathcal{N}_{\text{RSR}}-{2\delta\mathcal{N}_{\text{RR}}}.\end{split} (2f)

where the terms 𝒩xy\mathcal{N}_{\text{xy}} correspond to the number of links connecting nodes from classes x and y, e.g., 𝒩NN\mathcal{N}_{\text{\text{NN}}} corresponds to the number of NN links. The terms proportional to σμ\sigma\mu correspond to the influx of edges due to the birth of new nodes, where the probability for the new node to attach itself to a node from class X is proportional to the number of nodes in that class. The third order terms, 𝒩NSR\mathcal{N}_{\text{NSR}}, 𝒩SSR\mathcal{N}_{\text{SSR}} and 𝒩RSR\mathcal{N}_{\text{RSR}}, describe the formation of triples of nodes with an S-node at the center, and at least one of the edges terminating at an R-node. These terms describe the rate at which NS-, SS- and RS-links become NR-, SR- and RR- links respectively, due to the interaction of the central S-node with its neighboring R-node. Note that our definition of RSR triples includes degenerate triples, i.e., RSR triples where both of the R-nodes correspond to a single R-node, by analogy with degenerate triangles.

The resulting system of equations is not closed, as it contains higher order terms. Following earlier works in epidemiology Keeling et al. (1997), we introduce the closure based on the assumption of homogeneous distribution of RS-links:

𝒩NSR\displaystyle\mathcal{N}_{\text{NSR}} =𝒩RS𝒩S𝒩SN𝒩S𝒩S\displaystyle=\frac{\mathcal{N}_{\text{RS}}}{\mathcal{N}_{\text{S}}}\frac{\mathcal{N}_{\text{SN}}}{\mathcal{N}_{\text{S}}}\mathcal{N}_{\text{S}} (3a)
𝒩SSR\displaystyle\mathcal{N}_{\text{SSR}} =𝒩RS𝒩S2𝒩SS𝒩S𝒩S\displaystyle=\frac{\mathcal{N}_{\text{RS}}}{\mathcal{N}_{\text{S}}}\frac{2\mathcal{N}_{\text{SS}}}{\mathcal{N}_{\text{S}}}\mathcal{N}_{\text{S}} (3b)
𝒩RSR\displaystyle\mathcal{N}_{\text{RSR}} =((𝒩RS𝒩S)2+𝒩RS𝒩S)𝒩RS.\displaystyle=\left(\left(\frac{\mathcal{N}_{\text{RS}}}{\mathcal{N}_{\text{S}}}\right)^{2}+\frac{\mathcal{N}_{\text{RS}}}{\mathcal{N}_{\text{S}}}\right)\mathcal{N}_{\text{RS}}. (3c)

We thus obtain a system of nine mean field equations, which we analyze.

III Results

III.1 Mean field recruiting threshold

We first consider the bifurcation point of the recruitment model where the zero recruit (trivial) steady state becomes unstable, which we call the recruiting threshold. This is a transcritical bifurcation point, which is analogous to the epidemic onset in epidemic spreading models. It can be found analytically as a function of parameters for the mean field model, and certain asymptotic limits have a simple form.

We nondimensionalize Eqns. (1) and (2) to simplify the analysis. We introduce the dimensionless time variable t~δt\tilde{t}\equiv\delta t, where time is rescaled by the average node lifetime δ1\delta^{-1}. Further, the node variables are rescaled by the expected population size at steady state, μ/δ\mu/\delta, while the link variables are rescaled by the expected number of links at steady state, (μ/δ)(σ/2)(\mu/\delta)(\sigma/2). Let 𝐱[𝒩N,𝒩S,𝒩R,𝒩NN2σ1,𝒩SN2σ1,𝒩SS2σ1,𝒩RN2σ1,𝒩RS2σ1,𝒩RR2σ1]δμ1{\bf x}\equiv[\mathcal{N}_{\text{N}},\mathcal{N}_{\text{S}},\mathcal{N}_{\text{R}},\mathcal{N}_{\text{NN}}2\sigma^{-1},\mathcal{N}_{\text{SN}}2\sigma^{-1},\mathcal{N}_{\text{SS}}2\sigma^{-1},\\ \mathcal{N}_{\text{RN}}2\sigma^{-1},\mathcal{N}_{\text{RS}}2\sigma^{-1},\mathcal{N}_{\text{RR}}2\sigma^{-1}]\delta\mu^{-1} denote the 9-dimensional vector of rescaled node and link state variables. Note that in the steady state the rescaled node variables sum to 1, and, therefore, in steady state they correspond to the probability for a node of a given type to exist in the system. Similarly, the rescaled link variables sum to 1, and correspond to the probability for an edge chosen at random to be of a given type, e.g., at steady state x8x_{8} corresponds to the probability for a randomly chosen edge to be an RS link.

We introduce the following rescaled parameters:

Λ1\displaystyle\Lambda_{1} λ1δ1\displaystyle\equiv\lambda_{1}\delta^{-1} (4a)
Λ2\displaystyle\Lambda_{2} λ2δ1\displaystyle\equiv\lambda_{2}\delta^{-1} (4b)
Γ\displaystyle\Gamma (γσ/2)δ1\displaystyle\equiv(\gamma\sigma/2)\delta^{-1} (4c)
W\displaystyle W wδ1\displaystyle\equiv w\delta^{-1} (4d)

We can now write the dimensionless equations of motion as

𝐱˙=𝐅(𝐱;Λ¯).\displaystyle\dot{\bf x}={\bf F}({\bf x};\bar{\Lambda}). (5)

where Λ¯[Λ1,Λ2,W,Γ,σ]\bar{\Lambda}\equiv[\Lambda_{1},\Lambda_{2},W,\Gamma,\sigma] is a vector of all the system parameters. (Recall that σ\sigma is a dimensionless integer.) The full system of dimensionless equations is given in Eqs. (11).

We can now find the trivial steady state solution, where the number of R nodes is zero. This restricts the state to be of the form 𝐱0=[x0,1,x0,2,0,x0,4,x0,5,x0,6,0,0,0]{\bf x}_{0}=[x_{0,1},x_{0,2},0,x_{0,4},x_{0,5},x_{0,6},0,0,0], where the number of links involving R nodes is zero as well. This guarantees that Fi(𝐱0,Λ¯)=0F_{i}({\bf x}_{0},\bar{\Lambda})=0 for i=3,7,8,9i=3,7,8,9. Since this subset of equations represents an invariant manifold, we concentrate on solving the equations for the rest of the 5 components, x0,1x_{0,1}, x0,2x_{0,2}, x0,4x_{0,4}, x0,5x_{0,5} and x0,6x_{0,6}.

The first observation is that the x1x_{1} and x2x_{2} equations are solvable when the number of recruiting nodes is zero, and they yield steady state values of

x0,1\displaystyle x_{0,1} =(Λ2+1)D1,\displaystyle=(\Lambda_{2}+1)D^{-1}, (6a)
x0,2\displaystyle x_{0,2} =Λ1D1,\displaystyle=\Lambda_{1}D^{-1}, (6b)
where DΛ1+Λ2+1D\equiv\Lambda_{1}+\Lambda_{2}+1. The nonzero link variables may be expressed in terms of x0,1,x0,2x_{0,1},x_{0,2}, and they are given by the following:
x0,4\displaystyle x_{0,4} =(Λ2+1)2D2,\displaystyle=(\Lambda_{2}+1)^{2}D^{-2}, (6c)
x0,5\displaystyle x_{0,5} =2Λ1(Λ2+1)D2,\displaystyle=2\Lambda_{1}(\Lambda_{2}+1)D^{-2}, (6d)
x0,6\displaystyle x_{0,6} =Λ12D2.\displaystyle=\Lambda_{1}^{2}D^{-2}. (6e)

Now that we have the full trivial solution, we can examine its stability. In order to do this, we linearize the vector field about 𝐱𝟎{\bf x_{0}} and examine where it has a one dimensional null space. That is, at the bifurcation point, there is only one real eigenvalue passing through zero. This is equivalent to examining where the determinant of the Jacobian vanishes; i.e., we compute those parameters where

det(𝒟𝐱𝐅(𝐱0,Λ¯))=0.\det(\mathcal{D}_{{\bf x}}{\bf F}({\bf x}_{0},\bar{\Lambda}))=0. (7)

The following relation describes the location of the bifurcation:

W=Λ1[1+2Γ[Γ(2σ1)1](Λ1+Λ2+1)]\displaystyle W=-\Lambda_{1}\left[1+\frac{2\Gamma}{[\Gamma(2-\sigma^{-1})-1](\Lambda_{1}+\Lambda_{2}+1)}\right]
+Λ21Γ(2σ1)1+2(Γσ1+1)Γ(2σ1)1\displaystyle+\Lambda_{2}\frac{1}{\Gamma(2-\sigma^{-1})-1}+\frac{2(\Gamma\sigma^{-1}+1)}{\Gamma(2-\sigma^{-1})-1} (8)

We next examine the limits of Eq. (8) when either the recruitment rate Γ\Gamma or rewiring rate WW is large. The minimum amount of recruitment required to maintain nonzero values of recruited population, when WW approaches infinity, can be found by setting the least common denominator of Eq. (8) to zero, which yields a simple expression for Γ\Gamma:

Γ=12σ1\displaystyle\Gamma=\frac{1}{2-\sigma^{-1}} (9)

If the recruitment rate is below this value, additional rewiring is not sufficient to enable spreading of the recruiting class.

Similarly, we find the smallest amount of rewiring required for existence of a nontrivial steady state solution, conditioned on our ability to control Γ\Gamma, with all the other parameters fixed:

limΓW\displaystyle\lim_{\Gamma\to\infty}W =Λ1[1+2(2σ1)(Λ1+Λ2+1)]+\displaystyle=-\Lambda_{1}\left[1+\frac{2}{(2-\sigma^{-1})(\Lambda_{1}+\Lambda_{2}+1)}\right]+
+2σ12σ1\displaystyle+2\frac{\sigma^{-1}}{2-\sigma^{-1}}

For lower rewiring rates, the recruiting class cannot spread even if the recruiting rate is large. The value of this asymptote is greatest, meaning rewiring is most necessary, when Λ1\Lambda_{1} approaches zero. In this case few non-susceptible nodes become susceptible to recruiting, and the necessary rewiring value approaches

W=2σ12σ1\displaystyle W=\frac{2\sigma^{-1}}{2-\sigma^{-1}} (10)
Refer to caption
Refer to caption
Figure 2: Direct numerical simulation of a stochastic network system with Λ11\Lambda_{1}\gg 1. In Fig. 2 we compare the result of the simulation (symbols) to the mean field solution given by Eq. (28) (solid curves). Square (red online): strong rewiring, W40W\approx 40. Circle (green online): weak rewiring, W0.4W\approx 0.4. Fig. 2 shows the density plot representing the dependence of the fraction of recruited nodes in the population in statistical steady state on rescaled rates of rewiring, WW, and recruiting, Γ\Gamma. Vertical solid line (green online) corresponds to the minimum recruitment rate required to support a nontrivial solution, as given by Eq. (9). The solid curve (black online) corresponds to the recruiting threshold as predicted by mean field in Eq. (8). The simulations are performed on a system with μ=105\mu=10^{5}, δ=1\delta=1, σ=10\sigma=10, λ1=10\lambda_{1}=10, λ2=100\lambda_{2}=100. The time averaged values are computed once the system reaches steady state regimes. (In all of the figures in this paper this corresponded to at least 10δ110\delta^{-1} units of time, in other words about 10 generations of nodes have died before we assume the system to be at the steady state.)
Refer to caption
Refer to caption
Figure 3: Direct numerical simulation of a stochastic network system with Λ11\Lambda_{1}\ll 1. In Fig. 3 we compare the result of the simulation to the mean field solution given by Eq. (28). Square (red online): strong rewiring, W70W\approx 70. Circle (green online): weak rewiring, W0.2W\approx 0.2. Fig. 3 shows the density plot representing the dependence of the fraction of recruited nodes in the population in statistical steady state on rescaled rates of rewiring, WW, and recruiting, Γ\Gamma. Vertical solid line (green online) corresponds to the minimum recruitment rate required to support nontrivial solution, as given by Eq. (9). Horizontal dashed line (red online) corresponds to the rewiring rate that guarantees existence of a nontrivial solution in the limit of large recruitment rate (Eq. 10). The solid curve corresponds to the recruiting threshold as predicted by mean field in Eq. (8). The simulations are performed on a system with μ=105\mu=10^{5}, δ=1\delta=1, σ=10\sigma=10, λ1=0.01\lambda_{1}=0.01, λ2=10\lambda_{2}=10.

III.2 Comparison of mean field with simulations

We next compare the mean field predictions for the spread of recruiters with simulations of the full stochastic network system. Thus, we compare the average size of the recruited portion of the population in statistical steady state to the solution of the mean field equations at steady state, which we solve exactly in the Appendix A. We assume that the parameters Λ1\Lambda_{1} and Λ2\Lambda_{2} (rates for gaining and losing susceptibility) and σ\sigma (determines average degree) depend on details of the society. On the other hand, we assume that the parameters Γ\Gamma and WW can be controlled by the recruiters, i.e., the recruiters may choose to be more or less aggressive in their recruitment, as well as in how quickly they rewire their links to susceptible members of society. Therefore, we investigate the recruiting effectiveness for a given choice of Λ1\Lambda_{1}, Λ2\Lambda_{2} and σ\sigma, while varying Γ\Gamma and WW.

We distinguish two parameter regimes, corresponding to two qualitatively different behaviors of the system: small values of Λ1\Lambda_{1} (Λ11\Lambda_{1}\ll 1) and large values of Λ1\Lambda_{1} (Λ11\Lambda_{1}\gg 1). The small Λ1\Lambda_{1} regime corresponds to the case where nodes become susceptible to recruiting only rarely, on average much less than once in their lifetime (where the average lifetime of a node is δ1\delta^{-1} in the original time units and 11 in the dimensionless t~\tilde{t} units). The large Λ1\Lambda_{1} regime corresponds to the case where, on average, nodes become susceptible to recruitment at least once in their lifetime.

In Figs. 2 and 3 we show the results of simulating the system in these two regimes. The density plots in Figs. 2 and 3 show the fraction of recruited nodes as a function of recruiting rate Γ\Gamma and rewiring rate WW in networks with Λ11\Lambda_{1}\gg 1 and Λ11\Lambda_{1}\ll 1 respectively. The black curves in the two figures represent the location of the recruiting threshold as derived from the mean field equations and given by Eq. (8). Here mean field allows us to accurately predict the onset of the stable nontrivial solution. In Figs. 2 and 3 we compare the simulation results to the mean field predictions. Even though there is some discrepancy between the direct simulations and the mean field near the bifurcation, the recruiting threshold and the asymptotic behavior for large Γ\Gamma show excellent agreement with the simulations.

We observe in simulations that the steady state trivial solution undergoes a forward transcritical bifurcation in the recruiting rate Γ\Gamma for all values of WW for which a nontrivial solution exists. This is in contrast with epidemiological models where the purpose of the rewiring is avoidance of the nodes spreading infection Shaw and Schwartz (2008); Gross et al. (2006), which can undergo a backward transcritical bifurcation and exhibit bistability. Note that, unlike those models, the purpose of the rewiring in the recruitment model is attraction of the susceptible population by the recruiters.

We would like to draw the reader’s attention to an important difference in the system behavior in the two regimes. In the regime where Λ11\Lambda_{1}\gg 1, the nontrivial solution exists for all values of WW as long as Γ\Gamma is large enough. On the other hand, in the regime where Λ11\Lambda_{1}\ll 1, the nontrivial solution may fail to exist for any value of Γ\Gamma unless rewiring is aggressive enough. In Fig. 3 there is a range of rewiring rates WW for which only trivial solutions exist. The horizontal dashed line, given by Eq. (10), indicates the mean field level of rewiring that is sufficient for the nontrivial solution to exist for rapid recruiting (large Γ\Gamma). Also, we can see that the rewiring level that is necessary for the emergence of the nontrivial solution can be very close to the predicted sufficient level of Eq. (10), for small values of Λ1\Lambda_{1}.

Refer to caption
Figure 4: Comparing systems with different values of Λ1\Lambda_{1}, but same ratio of Λ1/(1+Λ2)\Lambda_{1}/(1+\Lambda_{2}). Squares (red online), right axis: Λ1=10\Lambda_{1}=10, Λ2=104\Lambda_{2}=10^{4}. Crosses (green online), left axis: Λ1=0.01\Lambda_{1}=0.01, Λ2=9.001\Lambda_{2}=9.001. Both of the simulations were performed with the following parameters: w=10w=10, μ=105\mu=10^{5}, δ=1\delta=1, σ=10\sigma=10.

Another important difference between the two regimes of Λ1\Lambda_{1} values is seen when we compare two systems with different values of Λ1\Lambda_{1} and Λ2\Lambda_{2} while the ratio Λ1/(1+Λ2)\Lambda_{1}/(1+\Lambda_{2}) is kept fixed. Note that in the absence of recruitment, such systems have identical fractions of susceptible nodes. In other words, in the presence of recruitment, the pool of individuals available for recruitment would appear to be the same. However, as we can see from Fig. 4, there is a significant difference in the size of the recruited population as well as the recruiting threshold. The difference appears to be caused by the difference in the dynamics in the two regimes. Thus, for the large values of Λ1\Lambda_{1} and Λ2\Lambda_{2} a node can become susceptible several times during its life, while as the value of Λ1\Lambda_{1} decreases, only some nodes will ever become susceptible, with low likelihood of doing so more than once.

Refer to caption
Figure 5: Direct numerical simulation. Density plot representing the dependence of the fraction of the mean node degree in the R-subnetwork in steady state, 2𝒩RR/𝒩R2\mathcal{N}_{\text{RR}}/\mathcal{N}_{\text{R}}, on rescaled rates of rewiring, WW, and recruiting, Γ\Gamma. Solid line (green online) indicates the value of Γ\Gamma where the degree is at a maximum for a given value of WW, found using analytic expression in Eq. (32). The white diamonds correspond to the location of the maximum in simulations for a given value of WW. The simulations are performed with the following parameters: μ=105\mu=10^{5}, δ=1\delta=1, σ=10\sigma=10, λ1=10\lambda_{1}=10, λ2=100\lambda_{2}=100.

III.3 Recruited subnetwork geometry

We now investigate the structure of the portion of the network (later referred to as the R-subnetwork) consisting only of R-nodes and links between them. In particular, we are interested in the mean degree of its nodes when the system reaches a steady state. The mean field approach, in addition to predicting the fraction of recruited nodes (which corresponds to the size of the R-subnetwork), also provides information about topology of the subnetwork in the form of mean degree of the nodes. The mean degree of a node in the subnetwork serves as a low order description of how well the nodes in the network are connected, which may be important for communication within the established subnetwork. The density plot in Fig. 5 shows the dependence of the mean degree on WW and Γ\Gamma. The nonmonotonic behavior as a function of Γ\Gamma for fixed WW is predicted by the mean field model. The solid line corresponds to the analytical prediction of the maximum’s location as given by Eq. (32) derived in Appendix B. Note that the analytic description of the maximum’s location would allow the recruiting class to optimize connectivity within the subnetwork, if that happens to be an important goal for that class. The mean field approximation fails to capture the nonmonotonic behavior of the mean degree in the limit where Λ11\Lambda_{1}\ll 1, and we leave this issue to a future study.

IV Conclusions and Discussion

We develop a toy model that describes recruitment of new members by an interested class within a society. The members of the recruiting class can improve their recruiting capabilities by via adaptation. Thus, they may choose to abandon their relations with those members of society that are not prone to recruitment. This model assumes that once a node joins the recruiting class, it itself becomes a recruiter and it remains a member of this class until death. In contrast to avoidance rewiring used to reduce infection spreading in epidemic models Gross et al. (2006); Shaw and Schwartz (2008), network adaptation in our model promotes spreading. Additionally, the population is open with birth and death modeled explicitly, while most previous adaptive network models have been of closed populations (e.g., Gross et al. (2006); Shaw and Schwartz (2008); Gross and Blasius (2008); Benczik et al. (2008, 2009); Schmittmann and Mukhopadhyay (2010); Holme and Newman (2006)).

In this paper, we develop and analyze a mean field description of our model. Thus, we are able to accurately predict the onset of the stable nontrivial solution of the system at steady state. Furthermore, we are able to accurately predict the size of the recruited class for a given set of system parameters, as well as the mean degree of the subnetwork formed by the recruited members. We compare the predictions made by the mean field description with the direct simulations of our model. We generally observe a good agreement between the model and its mean field approximation.

Analyzing the mean field model, we find two parameter regimes with very distinct qualitative behavior. Thus, we show that in the society where the particular ideology is unpopular (perhaps corresponding to radical ideology) and individuals rarely become susceptible to it, adaptation is necessary in order to observe stable nonzero levels of the recruiting class. On the other hand, if the idea is sufficiently popular (e.g., recruitment into a moderate political party), the adaptation improves the recruiting capabilities and may affect the ultimate topology of the recruited, but adaptation is not a necessary condition for the existence of a nonzero stable solution. Furthermore, we speculate that if the model were changed to describe a society with two competing recruiting classes (think two party system), the adaptation may be a mechanism by which one competing class gets an edge over the other class.

As evidenced by the results presented in Figs. 2 and 3, the mean field approximation has some inaccuracies in the parameter regime between the bifurcation point and the asymptotic saturation. We predict that this inaccuracy is due to errors in the homogeneous closure assumption (Eqs. 3). In a subsequent work, we develop and analyze a new closure of the mean field equations that more accurately describes the full system.

Acknowledgements.
MSS and LBS were supported by the Army Research Office, Air Force Office of Scientific Research, and by Award Number R01GM090204 from the National Institute Of General Medical Sciences. IBS was supported by the Office of Naval Research, the Air Force Office of Scientific Research, and the National Institutes of Health. The content is solely the responsibility of the authors and does not necessarily represent the official views of the National Institute Of General Medical Sciences or the National Institutes of Health.

Appendix A Exact solution

In this appendix, we derive the exact solution to the system of equations in Eqs. (1) and (2) when the system is at the nontrivial steady state, i.e., when the left hand side of the equations is zero and the size of recruiting class is nonzero. We begin by deriving the dimensionless equations, as defined in section III.1:

t~x1\displaystyle\partial_{\tilde{t}}x_{1} =1Λ1x1+Λ2x2x1\displaystyle=1-\Lambda_{1}x_{1}+\Lambda_{2}x_{2}-x_{1} (11a)
t~x2\displaystyle\partial_{\tilde{t}}x_{2} =Λ1x1Λ2x2Γx8x2\displaystyle=\Lambda_{1}x_{1}-\Lambda_{2}x_{2}-\Gamma x_{8}-x_{2} (11b)
t~x3\displaystyle\partial_{\tilde{t}}x_{3} =Γx8x3\displaystyle=\Gamma x_{8}-x_{3} (11c)
t~x4\displaystyle\partial_{\tilde{t}}x_{4} =Λ2x5+2x1x1+x2+x32(Λ1+1)x4\displaystyle=\Lambda_{2}x_{5}+2\frac{x_{1}}{x_{1}+x_{2}+x_{3}}-2(\Lambda_{1}+1)x_{4} (11d)
t~x5\displaystyle\partial_{\tilde{t}}x_{5} =2x2x1+x2+x3Γx5x8x2+2Λ2x6\displaystyle=2\frac{x_{2}}{x_{1}+x_{2}+x_{3}}-\Gamma\frac{x_{5}x_{8}}{x_{2}}+2\Lambda_{2}x_{6}
(Λ1+Λ2+2)x5+2Λ1x4\displaystyle-(\Lambda_{1}+\Lambda_{2}+2)x_{5}+2\Lambda_{1}x_{4} (11e)
t~x6\displaystyle\partial_{\tilde{t}}x_{6} =2Γx8x6x2+Λ1x52(Λ2+1)x6\displaystyle=-2\Gamma\frac{x_{8}x_{6}}{x_{2}}+\Lambda_{1}x_{5}-2(\Lambda_{2}+1)x_{6} (11f)
t~x7\displaystyle\partial_{\tilde{t}}x_{7} =Γx5x8x2+2x3x1+x2+x3\displaystyle=\Gamma\frac{x_{5}x_{8}}{x_{2}}+2\frac{x_{3}}{x_{1}+x_{2}+x_{3}}
(Λ1+2+W)x7+Λ2x8\displaystyle-(\Lambda_{1}+2+W)x_{7}+\Lambda_{2}x_{8} (11g)
t~x8\displaystyle\partial_{\tilde{t}}x_{8} =Γ(x82x2+2σ1x8)+2Γx6x8x2\displaystyle=-\Gamma\left(\frac{x_{8}^{2}}{x_{2}}+2\sigma^{-1}x_{8}\right)+2\Gamma\frac{x_{6}x_{8}}{x_{2}}
(Λ2+2)x8+(Λ1+W)x7\displaystyle-(\Lambda_{2}+2)x_{8}+(\Lambda_{1}+W)x_{7} (11h)
t~x9\displaystyle\partial_{\tilde{t}}x_{9} =Γ(x82x2+2σ1x8)2x9.\displaystyle=\Gamma\left(\frac{x_{8}^{2}}{x_{2}}+2\sigma^{-1}x_{8}\right)-{2x_{9}}. (11i)

At steady state, the left hand side of the above equations is zero. We proceed in our derivation by dividing all equations in the steady state by x2x_{2} and introducing a new variable zixi/x2z_{i}\equiv x_{i}/x_{2}, obtaining the following system of equations:

0\displaystyle 0 =1/x2Λ1z1+Λ2z1\displaystyle=1/x_{2}-\Lambda_{1}z_{1}+\Lambda_{2}-z_{1} (12a)
0\displaystyle 0 =Λ1z1Λ2Γz81\displaystyle=\Lambda_{1}z_{1}-\Lambda_{2}-\Gamma z_{8}-1 (12b)
0\displaystyle 0 =Γz8z3\displaystyle=\Gamma z_{8}-z_{3} (12c)
0\displaystyle 0 =Λ2z5+2z12(Λ1+1)z4\displaystyle=\Lambda_{2}z_{5}+2z_{1}-2(\Lambda_{1}+1)z_{4} (12d)
0\displaystyle 0 =2Γz5z8+2Λ2z6(Λ1+Λ2+2)z5\displaystyle=2-\Gamma z_{5}z_{8}+2\Lambda_{2}z_{6}-(\Lambda_{1}+\Lambda_{2}+2)z_{5}
+2Λ1z4\displaystyle+2\Lambda_{1}z_{4} (12e)
0\displaystyle 0 =2Γz8z6+Λ1z52(Λ2+1)z6\displaystyle=-2\Gamma z_{8}z_{6}+\Lambda_{1}z_{5}-2(\Lambda_{2}+1)z_{6} (12f)
0\displaystyle 0 =Γz5z8+2z3(Λ1+2+W)z7+Λ2z8\displaystyle=\Gamma z_{5}z_{8}+2z_{3}-(\Lambda_{1}+2+W)z_{7}+\Lambda_{2}z_{8} (12g)
0\displaystyle 0 =Γ(z82+2σ1z8)+2Γz6z8\displaystyle=-\Gamma\left(z_{8}^{2}+2\sigma^{-1}z_{8}\right)+2\Gamma z_{6}z_{8}
(Λ2+2)z8+(Λ1+W)z7\displaystyle-(\Lambda_{2}+2)z_{8}+(\Lambda_{1}+W)z_{7} (12h)
0\displaystyle 0 =Γ(z82+2σ1z8)2z9.\displaystyle=\Gamma\left(z_{8}^{2}+2\sigma^{-1}z_{8}\right)-{2z_{9}}. (12i)

We have used the fact that in the steady state x1+x2+x3=1x_{1}+x_{2}+x_{3}=1, as can be shown by adding together Eqs. (1a)-(1c). In the rest of the derivation we will find a closed equation for z8z_{8} and express the other ziz_{i}’s in terms of z8z_{8}.

We can immediately express z1z_{1}, z3z_{3}, and z9z_{9} in terms of z8z_{8} by solving Eqs. (12b), (12c) and (12i) respectively:

z1\displaystyle z_{1} =Λ11(1+Λ2+Γz8)\displaystyle=\Lambda_{1}^{-1}(1+\Lambda_{2}+\Gamma z_{8}) (13)
z3\displaystyle z_{3} =Γz8\displaystyle=\Gamma z_{8} (14)
z9\displaystyle z_{9} =(Γ/2)(z82+σ1z8).\displaystyle=(\Gamma/2)\left(z_{8}^{2}+\sigma^{-1}z_{8}\right). (15)

We substitute Eq. (13) into Eq. (12d), and Eq. (14) into Eq. (12g). The resulting two equations, together with Eqs. (12e), (12f) and (12h), form a closed system of five equations with five unknowns z4z_{4}-z8z_{8}.

We solve Eq. (12f) for z5z_{5} in terms of z6z_{6} and z8z_{8}:

z5=2Λ11(1+Λ2+Γz8)z6,\displaystyle z_{5}=2\Lambda_{1}^{-1}(1+\Lambda_{2}+\Gamma z_{8})z_{6}, (16)

and substitute the above result into Eq. (12d) and (12g), to solve for z4z_{4} and z7z_{7} in terms of z6z_{6} and z8z_{8} as follows:

z4\displaystyle z_{4} =[(Λ1+1)Λ1]1[1+Λ2+Γz8][1+Λ2z6]\displaystyle=[(\Lambda_{1}+1)\Lambda_{1}]^{-1}[1+\Lambda_{2}+\Gamma z_{8}][1+\Lambda_{2}z_{6}] (17)
z7\displaystyle z_{7} =[ΓΛ11(2Γz8+2(Λ2+1))z6+2Γ+Λ2]×\displaystyle=[\Gamma\Lambda_{1}^{-1}(2\Gamma z_{8}+2(\Lambda_{2}+1))z_{6}+2\Gamma+\Lambda_{2}]\times
×(Λ1+2+W)1z8.\displaystyle\times(\Lambda_{1}+2+W)^{-1}z_{8}. (18)

Substituting the expressions for z4z_{4} and z5z_{5} from Eq. (16) and (17) into Eq. (12e), and solving for z6z_{6} we obtain

z6=Λ1Γ(Λ1+1)z8+(Λ1+Λ2+1),\displaystyle z_{6}=\frac{\Lambda_{1}}{\Gamma(\Lambda_{1}+1)z_{8}+(\Lambda_{1}+\Lambda_{2}+1)}, (19)

Finally, substituting results of Eqs. (19) and (18) into Eq. (12h) we obtain an equation for z8z_{8} in a closed form:

[(a1Γ)z82+(a2Γ+a3)z8+(a4Γ1+a5)]z8[Γ(Λ1+1)z8+(Λ1+Λ2+1)]=0\displaystyle\frac{[(a_{1}\Gamma)z_{8}^{2}+(a_{2}\Gamma+a_{3})z_{8}+(a_{4}\Gamma^{-1}+a_{5})]z_{8}}{[\Gamma(\Lambda_{1}+1)z_{8}+(\Lambda_{1}+\Lambda_{2}+1)]}=0 (20)

where

a1\displaystyle a_{1} (Λ1+1)(Λ1+W+2)\displaystyle\equiv(\Lambda_{1}+1)(\Lambda_{1}+W+2) (21)
a2\displaystyle a_{2} 2σ1(Λ1+1)(Λ1+W+2)\displaystyle\equiv 2\sigma^{-1}(\Lambda_{1}+1)(\Lambda_{1}+W+2)
2(Λ1+2)(W+Λ1)\displaystyle-2(\Lambda_{1}+2)(W+\Lambda_{1}) (22)
a3\displaystyle a_{3} 3(Λ1+1)(Λ1+W+2+Λ2)+Λ2(W+1)\displaystyle\equiv 3(\Lambda_{1}+1)(\Lambda_{1}+W+2+\Lambda_{2})+\Lambda_{2}(W+1) (23)
a4\displaystyle a_{4} 2(Λ1+Λ2+1)(Λ1+W+2+Λ2)\displaystyle\equiv 2(\Lambda_{1}+\Lambda_{2}+1)(\Lambda_{1}+W+2+\Lambda_{2}) (24)
a5\displaystyle a_{5} (Λ1+Λ2+1)[2(σ12)(W+Λ1)\displaystyle\equiv(\Lambda_{1}+\Lambda_{2}+1)[2(\sigma^{-1}-2)(W+\Lambda_{1})
+4(σ1Λ1)].\displaystyle+4(\sigma^{-1}-\Lambda_{1})]. (25)

Note that the physically relevant solutions are positive, and therefore finding a nontrivial solution of z8z_{8} is a simple matter of solving a quadratic equation:

(a1Γ)z82+(a2Γ+a3)z8+(a4Γ1+a5)=0.\displaystyle(a_{1}\Gamma)z_{8}^{2}+(a_{2}\Gamma+a_{3})z_{8}+(a_{4}\Gamma^{-1}+a_{5})=0. (26)

Solving Eq. (12a) for x2x_{2}, we can now express x2x_{2} in terms of the newly found z8z_{8}:

x2=Λ1[(Λ1+1)Γz8+(Λ1+Λ2+1)]1.\displaystyle x_{2}=\Lambda_{1}[(\Lambda_{1}+1)\Gamma z_{8}+(\Lambda_{1}+\Lambda_{2}+1)]^{-1}. (27)

The rest of the original variables can be found using xi=x2zix_{i}=x_{2}z_{i}. Thus, for example, x3x_{3} is

x3=x2z3=ΓΛ1z8[(1+Λ1)Γz8+(Λ1+Λ2+1)]1.\displaystyle x_{3}=x_{2}z_{3}=\Gamma\Lambda_{1}z_{8}[(1+\Lambda_{1})\Gamma z_{8}+(\Lambda_{1}+\Lambda_{2}+1)]^{-1}. (28)

Appendix B Extremum of the mean degree in R-subnetwork

In steady state, the mean degree of the nodes within the R-subnetwork is found by taking a ratio of twice the number of RR-links to the number of R-nodes in the subnetwork:

k=2𝒩RR𝒩R=𝒩RS𝒩S+1=σ2z8+1.\displaystyle\langle k\rangle=\frac{2\mathcal{N}_{\text{RR}}}{\mathcal{N}_{\text{R}}}=\frac{\mathcal{N}_{\text{RS}}}{\mathcal{N}_{\text{S}}}+1=\frac{\sigma}{2}z_{8}+1. (29)

where the values of 𝒩RR\mathcal{N}_{\text{RR}} and 𝒩R\mathcal{N}_{\text{R}} are obtained by solving Eqs. (1c) and (2f) in steady state. In this appendix we determine the value of Γ\Gamma, Γm\Gamma_{m}, that for a given rewiring rate will maximize the degree in the resulting R-subnetwork. We do this by maximizing z8z_{8}.

Differentiating Eq. (26) with respect to Γ\Gamma and evaluating the resulting equation at Γm\Gamma_{m}, the value where extremum is attained, we obtain

a1(z8)m2+a2(z8)mΓm2a4=0.\displaystyle a_{1}(z_{8})_{m}^{2}+a_{2}(z_{8})_{m}-\Gamma_{m}^{-2}a_{4}=0. (30)

Note that the derivative of z8z_{8} with respect to Γ\Gamma evaluated at Γm\Gamma_{m} is equal to zero because z8z_{8} is an extremum there, and the aia_{i} are independent of Γ\Gamma. Multiplying the above equation by Γ\Gamma and subtracting it from Eq. (26) evaluated at Γm\Gamma_{m} allows us to solve for (z8)m(z_{8})_{m}:

(z8)m=2a4+Γa5Γa3,\displaystyle(z_{8})_{m}=-\frac{2a_{4}+\Gamma a_{5}}{\Gamma a_{3}}, (31)

Substituting the value of (z8)m(z_{8})_{m} into Eq. (30) and solving for Γm\Gamma_{m} we obtain

Γm=[a2a3a42a1a4a5\displaystyle\Gamma_{m}=[a_{2}a_{3}a_{4}-2a_{1}a_{4}a_{5}
+(a22a32a42+a1a52a4a32a2a33a5a4)1/2]\displaystyle+(a_{2}^{2}a_{3}^{2}a_{4}^{2}+a_{1}a_{5}^{2}a_{4}a_{3}^{2}-a_{2}a_{3}^{3}a_{5}a_{4})^{1/2}] (32)
/[a5(a1a5a3a2)],\displaystyle/[a_{5}(a_{1}a_{5}-a_{3}a_{2})],

the location of the maximum for the given rewiring rate.

References

  • Meyer and Ultsch (2010) F. Meyer and A. Ultsch, in Advances In Data Analysis, Data Handling
    And Business Intelligence
    , German-Classification-Society (German-Classification-Society, 2010), pp. 419–427.
  • Bendor et al. (2009) J. Bendor, B. A. Huberman, and F. Wu, Journal Of Economic Behavior & Organization 72, 290 (2009).
  • Janssen and Jager (2001) M. A. Janssen and W. Jager, Journal Of Economic Psychology 22, 745 (2001).
  • Abrahamson (2009) E. Abrahamson, Scandinavian Journal Of Management 25, 235 (2009).
  • Grueter and Ratnieks (2011) C. Grueter and F. Ratnieks, Animal Behaviour 81, 949 (2011).
  • Benedict (2007) B. Benedict, SIAM News 40 (2007).
  • Kuhlman et al. (2010) C. Kuhlman, V. Kumar, M. Marathe, S. Ravi, and D. Rosenkrantz, in Machine Learning and Knowledge Discovery
    in Databases. European Conference,
    ECML PKDD 2010. Proceedings
    (ECML, 2010).
  • Gutfraind (2009a) A. Gutfraind, Terrorism as a mathematical problem, SIAM News (2009a).
  • Gutfraind (2009b) A. Gutfraind, Studies in Conflict and Terrorism 32, 45 (2009b).
  • Johnson et al. (2006) N. F. Johnson, M. Spagat, J. A. Restrepo, O. Becerra, J. C. Bohórquez, N. Suárez, E. M. Restrepo, and R. Zarama (2006), http://arxiv.org/abs/physics/0605035.
  • Cherif et al. (2009) A. Cherif, H. Yoshioka, W. Ni, and P. Bose (2009), eprint arXiv/0910.5272.
  • Johnson et al. (2011) N. Johnson, S. Carran, J. Botner, K. Fontaine, N. Laxague, P. Nuetzel, J. Turnley, and B. Tivnan, SCIENCE 333, 81 (2011), ISSN 0036-8075.
  • Caulkins et al. (2008) J. P. Caulkins, D. Grass, D. Feichtinger, and . Tragler, Comp. Oper. Res. 36 (2008).
  • Udwadia et al. (2006) F. Udwadia, G. Leitmann, and L. Lambertini, Discrete Dynamics in Nature and Society 2006, 85653 (2006).
  • Bentson (2006) K. Bentson, Master’s thesis, Air Force Institute of Technology (2006).
  • Butler (2011) L. B. Butler, Tech. Rep. OMB No. 074-0188, SAMS Monograph, Fort Leavenworth, KS 66027-2134 (2011), contains many good references for recruitment, both stochastic and deterministic.
  • Lindelauf et al. (2009) R. Lindelauf, P. Borm, and H. Hamers, Social Networks 31, 126 (2009).
  • Farley (2003) J. D. Farley, Studies in Conflict and Terrorism 26, 399 (2003).
  • Bar-Isaac and Baccara (2006) H. Bar-Isaac and M. Baccara, Working Papers 06-07, New York University, Leonard N. Stern School of Business, Department of Economics (2006), URL http://ideas.repec.org/p/ste/nystbu/06-07.html.
  • Benczik et al. (2008) I. J. Benczik, S. Z. Benczik, B. Schmittmann, and R. K. P. Zia, EPL (Europhysics Letters) 82, 48006 (2008).
  • Benczik et al. (2009) I. Benczik, S. Benczik, B. Schmittmann, and R. Zia, Physical Review E 79, 046104 (2009).
  • Schmittmann and Mukhopadhyay (2010) B. Schmittmann and A. Mukhopadhyay, Phys Rev E Stat Nonlin Soft Matter Phys 82, 066104 (2010).
  • Holme and Newman (2006) P. Holme and M. E. J. Newman, Physical Review E 74, 056108 (2006).
  • Gross et al. (2006) T. Gross, C. J. D. D’Lima, and B. Blasius, Phys Rev Lett 96, 208701 (2006).
  • Shaw and Schwartz (2008) L. Shaw and I. Schwartz, Physical Review E 77, 066101 (2008).
  • Gillespie (1976) D. Gillespie, Journal of Computational Physics 22, 403 (1976).
  • Keeling et al. (1997) M. J. Keeling, D. A. Rand, and A. J. Morris, Proc Biol Sci 264, 1149 (1997), URL http://dx.doi.org/10.1098/rspb.1997.0159.
  • Gross and Blasius (2008) T. Gross and B. Blasius, J R Soc Interface 5, 259 (2008), URL http://dx.doi.org/10.1098/rsif.2007.1229.