<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Fast Dominating Set Algorithms for Social Networks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alina Campan</string-name>
          <email>campana1@nku.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Traian Marius Truta</string-name>
          <email>trutat1@nku.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Matthew Beckerich</string-name>
          <email>beckerichm1@mymail.nku.edu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Computer Science Department Northern Kentucky University Highland Heights</institution>
          ,
          <addr-line>KY 41099</addr-line>
          ,
          <country country="US">U.S.A</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>In this paper we introduce two novel algorithms that are able to efficiently determine an approximation to the minimum dominating set problem, and at the same time, they will preserve the quality of the solution to an acceptable level. We compare these two algorithms with three existing algorithms, for a large number of synthetic datasets, and for several real world social networks. For experiments, we use social network generators that create both power-law and random networks, and a few real network datasets made available by the Stanford Network Analysis Project. Our experiments show that the proposed algorithms are viable, and in many instances, preferable for determining the minimum dominating set of a social network.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        Today, online social networks are used by an ever
increasing number of people. For instance, Facebook has currently
more than 1.35 billion users, LinkedIn has over 332
million users, and 1 out of 4 people from the entire world is an
active user in at least one existing social network
        <xref ref-type="bibr" rid="ref20">(Statista
2014)</xref>
        . It is not a surprise that researchers from various
domains such as sociology, economics, physics,
mathematics, and computer science are analyzing different problems
and proposing various solutions related to social networks.
While a lot of research has been performed in the past on
networks/graphs, nowadays the main focus is moving
toward social issues (as the name implies, social networks
usually represent relationships between people) and toward
big social networks (as previously noted, these networks
tend to be very large).
      </p>
      <p>
        Social networks existed long before the Internet. As
early as around 1200-1450 such social networks existed in
pre-Hispanic Southwest in the current United States. The
growth, collapse, and change of such social networks are
reflected in thousands of ceramic and obsidian artifacts
(Mills et al. 2013). More recently, in the first half of the
20th century, the social network analysis discipline was
started by the sociology community
        <xref ref-type="bibr" rid="ref8">(Freeman 2011)</xref>
        .
Beginning from the 1990s, other fields, in particular computer
science and physics, brought a lot of new results to this
field
        <xref ref-type="bibr" rid="ref8">(Freeman 2011)</xref>
        . With the advent of Myspace,
Friendster, and more recently, Facebook and LinkedIn, social
networks have grown to a new dimension -- the online
social network -- which allows larger numbers of people to
participate. Many existing methods for social network
analysis did not envision such a data explosion. Thus,
developing fast and accurate solutions for large social
networks is becoming more essential in present days.
      </p>
      <p>An important feature in a social network is the ability to
communicate quickly within the network. For instance, in
an emergency situation, we may need to be able to reach to
all network participants, but only a small number of
individuals in the network can be contacted directly. However,
if all individuals from the network are connected to at least
one such individual who can be contacted directly (or is
one of those individuals) then the emergency message can
be quickly sent to all network participants. This scenario
can be modeled by what is known as the dominating set
problem. This is formally described below.</p>
      <p>
        A set DS  N of nodes in a network G = (N, E) is a
dominating set if every node x  N is either in DS or adjacent to
DS
        <xref ref-type="bibr" rid="ref1">(Berge 1962)</xref>
        . The dominating set with the smallest
numbers of elements is known as the minimum dominating
set (MDS). To find such a minimum dominating set is a
well-known NP-complete problem, thus an exact efficient
solution is unlikely to be found
        <xref ref-type="bibr" rid="ref9">(Garey and Johnson 1979)</xref>
        .
      </p>
      <p>
        Approximation algorithms for determining the minimum
dominating set exist in the literature, with the most
common one being an adaptation of the greedy algorithm for
determining a set cover
        <xref ref-type="bibr" rid="ref13">(Lovasz 1975)</xref>
        . However, as we
will show in the following sections, this greedy algorithm
is slow for large networks, and therefore more efficient
solutions are needed. A very efficient algorithm has also been
proposed
        <xref ref-type="bibr" rid="ref6">(Eubank et al. 2004)</xref>
        , but this algorithm has a low
result quality as we will show in the future sections.
      </p>
      <p>
        Extensive experimental results have been performed for
scale-free networks (that model social networks well)
using either the basic greedy algorithms for approximating
the minimum dominating set size
        <xref ref-type="bibr" rid="ref16">(Molnar et al. 2013)</xref>
        or a
different algorithm based on a binary integer
programming-based method
        <xref ref-type="bibr" rid="ref18">(Nacher et al. 2012)</xref>
        . These works do
not compare the results of these algorithms with any other
algorithms, and, in addition, they target social networks
with low cardinality (up to 10,000 nodes), and therefore
they do not discuss how the used algorithms will scale to
large social networks.
      </p>
      <p>
        In this paper we introduce two novel algorithms that are
able to determine efficiently an approximation to the
minimum dominating set problem and, simultaneously, they
will preserve the quality of the solution to an acceptable
level. Those two algorithms: one extends the greedy
algorithm mentioned earlier, and the other is an improvement
of an algorithm that is also introduced in
        <xref ref-type="bibr" rid="ref6">(Eubank et al.
2004)</xref>
        . We compare those two algorithms with three
existing algorithms for a large number of synthetic datasets,
and for several real world social networks. For the
experimental part, we use social network generators that create
both power-law and random networks, as well as real
network datasets made available by the Stanford Network
Analysis Project
        <xref ref-type="bibr" rid="ref11 ref12">(Leskovec and Krevl 2014)</xref>
        .
      </p>
      <p>The remaining of this paper is structured as follows.
Section “Dominating Set Algorithms” introduces the two
new algorithms that we use in this paper. In addition, in
this section we also present three existing algorithms that
we use for experimental evaluation. Section “Datasets”
describes how we generate the synthetic social networks, and
provides a description of the used real datasets. In section
“Experiments and Results” we perform a detailed
experimental evaluation of our algorithms using the datasets
presented in the previous section. Section “Discussion and
Future Extension” presents conclusions and a summary of
future extension for our work.</p>
    </sec>
    <sec id="sec-2">
      <title>Dominating Sets Algorithms</title>
      <p>In this section we describe the greedy algorithms we use to
approximate the minimum dominating set. Algorithms 3
and 4 are new, while the rest are existing algorithms
against which we compare ours.</p>
      <p>
        The first algorithm (Algorithm 1 or Alg. 1) is the
standard greedy algorithm that choses at each step, one node
that covers the maximum number of currently uncovered
nodes
        <xref ref-type="bibr" rid="ref16 ref6">(Eubank et al. 2004, Molnar et al. 2013)</xref>
        . In this
algorithm we start with an empty set, DS, which will at the
end store the nodes in the dominating set. Nodes from the
network are colored according to their state during the
execution of the algorithm. Nodes in DS are called black,
nodes which are covered (because they neighbor one or
more nodes in DS) are called gray, and all uncovered nodes
are white. W (v) denotes the set of white nodes among the
direct neighbors of v, including v itself. w (v) = | W (v) | is
called the span of v. Note that in the Alg. 1, we delete the
black nodes, and the next selected node is either gray or
white. This algorithm is named RegularGreedy in
        <xref ref-type="bibr" rid="ref6">(Eubank
et al. 2004)</xref>
        . Its pseudocode is presented next:
Algorithm 1 (G, DS) is
      </p>
      <p>Input: G = (N, E) – a social network;
Output : DS – a dominating set for G;
DS = ;
while ∃ white nodes do
choose v ∈ {x ∈ N | w(x) = max u ∈ N |W(u)|};
DS := DS ∪ { v };
// Delete the vertex v and
// its adjacent edges from G.</p>
      <p>G = (N \{v}, E \{(x, y) ∈ E| x = v or y = v)});
end while;
end Algorithm 1.</p>
      <p>
        The second algorithm (Algorithm 2 or Alg. 2) starts by
finding the set of all nodes of degree exactly one (D1).
Then finds the set of nodes adjacent to D1 (Neighbors(D1)).
Obviously, any dominating set must contain
Neighbors(D1). Next, we run the Alg. 1 on the subgraph induced
by N \ Neighbors(D1). This second algorithm is referred in
previous work as VRegularGreedy
        <xref ref-type="bibr" rid="ref6">(Eubank et al. 2004)</xref>
        .
Its pseudocode is presented next:
Algorithm 2 (G, DS) is
      </p>
      <p>Input: G = (N, E) – a social network;
Output : DS – a dominating set for G;
D1 = { x ∈ N | degree(x) = 1};
Neighbors(D1) = { x ∈ N |  y ∈ D1 and (x, y) ∈ E }
DS = Neighbors(D1);
// E’ – contains all edges from E that have
// both ends in N \ {Neighbors(D1)  D1}.</p>
      <p>G’ = (N \ {Neighbors(D1)  D1}, E’);
Algorithm 1 (G’, DS’);</p>
      <p>DS = Neighbors(D1)  DS’;
end Algorithm 2.</p>
      <p>The third algorithm (Algorithm 3 or Alg. 3) improves
the running time of Algorithm 1 by removing both the
black and gray nodes from the remaining network, thus
reducing significantly at each step the size of the network.
Since all the time the remaining nodes are white, the use of
node coloring is no longer useful. This algorithm is
described next:
Algorithm 3 (G, DS) is</p>
      <p>Input: G = (N, E) – a social network;
Output : DS – a dominating set for G;
DS = ;
while N   do
choose v ∈ {x ∈ N |</p>
      <p>degree(x) = max u ∈ N (degree(u))};
DS := DS ∪ { v };
// Delete the vertex v, Neighbors({v}), and
// their corresponding edges.
// The remaining edges are labeled E’</p>
      <p>G = (N \{v}\ Neighbors({v},E’ );
end while;
end Algorithm 3.</p>
      <p>The fourth algorithm (Algorithm 4 or Alg. 4) combines
the Algorithms 2 and 3, by including in the dominating set
all neighbors of nodes of degree 1, and then by applying
Algorithm 3 to the remaining graph. This algorithm is
described as:
Algorithm 4 (G, DS) is</p>
      <p>Input: G = (N, E) – a social network;
Output : DS – a dominating set for G;
while N   do</p>
      <p>D1 = { x ∈ N | degree(x) = 1};
Neighbors(D1) = { x ∈ N |  y ∈ D1 and (x, y) ∈ E }
DS = Neighbors(D1);
// E’ – contains all edges in E with both ends
// in N \ {Neighbors(D1)  Neighbors (Neighbors(D1) )}.
G’ = (N \ {Neighbors(D1)  Neighbors (Neighbors(D1) ), E’);
Main step in Algorithm 3 (G’, v);</p>
      <p>DS = Neighbors(D1) { v };
end while;
end Algorithm 4.</p>
      <p>Note that in the Alg. 4, we also delete all nodes
dominated by Neighbors(D1) prior to using Algorithm 3. This is
equivalent with deleting the gray nodes along with the
black node which is executed in Alg. 3 and it is not
performed in Alg. 1.</p>
      <p>
        The last algorithm known as FastGreedy in
        <xref ref-type="bibr" rid="ref6">(Eubank et
al. 2004)</xref>
        is a very simple and efficient algorithm for
computing a dominating set. Consider the nodes in N in
nonincreasing order of the degree v1, v 2, …, v |N |, with
degree(v 1) ≥ degree(v 2) ≥ … ≥ degree(v | N |), where degree()
is the given degree-sequence. Pick the smallest i such that
|ji Neighbors (vj)| = |N | and take the subset {v1, v 2, …,
vi} to be the dominating set of the graph. In this algorithm,
we do not take those vi nodes for which Neighbors (vi)  j
&lt; i Neighbors (vj). We refer to this algorithm as Algorithm
5 or Alg. 5. The pseudocode algorithm is presented next:
Algorithm 5 (G, DS) is
      </p>
      <p>Input: G = (N, E) – a social network;
Output : DS – a dominating set for G;
DS = ;
Order vertices in N = {v 1, v 2, … v|N|)}</p>
      <p>such that degree(v 1) ≥ degree(v 2) ≥ … ≥ degree(v | N |).
i = 1;
while (|ji Neighbors (vj)| &lt; |N |) do
if (not(Neighbors (vi)  j &lt; i Neighbors (vj)))</p>
      <p>DS = DS  { v i};
i++;
end Algorithm 5.</p>
    </sec>
    <sec id="sec-3">
      <title>Datasets</title>
      <p>
        In order to compare the size of dominating sets and
execution times for the above 5 algorithms, we use both
synthetic and real network datasets. All synthetic graphs were
generated using the SNAP library
        <xref ref-type="bibr" rid="ref11 ref12">(Leskovec and Sosic
2014)</xref>
        .
      </p>
      <p>
        We generate synthetic datasets using the well-known
Erdos-Renyi random graph model (
        <xref ref-type="bibr" rid="ref2">Bollobás 2001</xref>
        ) and the
configuration model
        <xref ref-type="bibr" rid="ref15 ref4">(Molloy and Reed 1995, Britton et al.
2005)</xref>
        that generates a scale free network
        <xref ref-type="bibr" rid="ref4">(Catanzaro et al.
2005)</xref>
        . Details about the generation algorithms as well as
the properties of the generated networks can be found in
        <xref ref-type="bibr" rid="ref11 ref12">(Leskovec and Sosic 2014)</xref>
        . We refer to those networks as
ERNetworks and ConfNetworks respectively.
      </p>
      <p>To generate ERNetworks we chose the following
parameters. First we fix the size of the network, |N |, to 50,000,
and we generate ERNetworks for 10 different average
degree values (AVG = 5, 10, 15, 20, .., 50). Second we chose
a fixed AVG value (AVG = 10) and we use 10 distinct
values for the size of N (|N | = 10K, 20K, …, 100K). For each
combination of |N | and AVG values we generate 5 distinct
networks. The total number of ERNetworks generated is 95
(19 combinations x 5 samples). Note that the size 50K and
AVG = 10 is common between the two generation
approaches, and therefore it is considered only once.</p>
      <p>We generate the same number of ConfNetworks but we
change the parameters as follows. For the size of the
networks we use exactly the same values, but as a second
parameter we use the power-law exponent γ from the
powerlaw distribution (P(k)  k-γ). For the fixed |N | value (50K)
we use the values for γ = 1.7, 1.8, …, 2.6. When we vary
the size of networks, we use γ = 2.0. As before, for each
combination of |N | and γ we generate 5 district networks
and the total number of generated ConfNetworks is 95.</p>
      <p>
        We also use 10 real networks in this work. These
networks are from the SNAP datasets website
        <xref ref-type="bibr" rid="ref11 ref12">(Leskovec and
Krevl 2014)</xref>
        . The number of nodes and edges of these
networks, as well as a short description, are shown in Table 1.
For a full description of the networks and additional
properties please consult
        <xref ref-type="bibr" rid="ref11 ref12">(Leskovec and Krevl 2014)</xref>
        .
      </p>
    </sec>
    <sec id="sec-4">
      <title>Experiments and Results</title>
      <p>
        To execute our experiments, we implemented the
Algorithms 1 – 5 described in Section “Dominating Set
Algorithms” and the graph random generators described Section
“Datasets” in C++ using the SNAP framework
        <xref ref-type="bibr" rid="ref11 ref12">(Leskovec
and Sosic 2014)</xref>
        . To allow a meaningful comparison
between running times, all the experiments were performed
on an Intel® Xeon® E5430@2.66 GHz dual CPU machine
with 4 GB memory running on 32 bit Windows Server
2007 operating system. In the experiments executed on the
synthetic networks (ERNetworks and ConfNetworks), the
reported results are the average between the 5 sample
datasets.
      </p>
      <p>Figures 1 – 14 show the results of all our experiments.
For figures that report the dominating set size, the y axis
shows the number of nodes from the graph in the
dominating set. For figures that report the running time, the y axis
shows the number of seconds needed by our algorithms to
compute the dominating sets.</p>
      <p>Figures 1 – 6 show the results for ERNetworks. These
networks gave predictable results in terms of both
minimum dominating set size and running time. For dominating
set sizes, we notice that the size of the network does not
influence which algorithm performs best. However, the
average degree is very important. When the average degree is
below 25, the best algorithm is Alg. 4, followed in order by
Alg. 3, Alg. 5, Alg. 2, and Alg. 1. When the average degree
is over 25, Alg. 1 and Alg. 2 outperform the other 3
algorithms. Also it is worth noting that even in this case, Alg. 3
and, in particular, Alg. 4 find dominating sets of very close
size with Alg. 1 and Alg. 2 (~15% more nodes in their
dominating sets). For running time, Alg. 1 and Alg. 2
perform very poorly, and they are not suitable for very large
networks. By comparing the other three algorithms
(Figures 3 and 6), we draw the following two conclusions:
First, Alg. 5 is always the fastest algorithm. Second, Alg.
4 is faster than Alg. 5 when the average degree is lower
than 20, and the order changes for higher average degrees.
It is worth noting that these three algorithms are suitable
for very large networks. Based on these experiments, we
conclude that for Erdos-Renyi random graphs the best
algorithm to use in most cases is Alg. 4.</p>
      <p>Figures 7 – 10 illustrate the results for ConfNetworks.
The results are quite different compared to the
ERNetworks. In terms of finding small dominating sets (Figures 7
and 9), Alg. 4 and 5 perform the best, with very similar
results. Alg. 2 was close behind. Alg. 1 and 3 perform the
worst. The reason for those results is that there are many
vertices with degree = 1 that are identified early by Alg. 2
and 4, and their only neighbors are added to the
dominating set in the beginning of these algorithm, thus reducing
the size of the graph. When power exponent values are
increased (Figure 9), the dominating set sizes are more
similar than for low values of γ. This is expected since there are
fewer nodes with low degree and the degree distribution
became more equal. In terms of running time (Figures 8
and 10), Alg. 1 performs the worst by far, and all the other
algorithms run in a relatively small amount of time.
Looking more carefully at the data, Alg. 2, 3 and 4 perform very
similarly. Alg. 3 is slightly better; Alg. 2 and 4 are very
close, while Alg. 5 outperforms them significantly. Alg. 5
is between 20 times and 80 times faster than Alg. 3 in all
our experiments.</p>
      <p>To summarize, for power-law networks, the best
algorithm is Alg. 5. While this algorithm is sometime worse
than Alg. 4 in terms of finding the minimum dominating
set size, it still performs best on average in this category. It
is by far the fastest algorithm to execute, thus being very
suitable for very large networks.</p>
      <p>Figures 11 – 14 illustrate the results for RealNetworks.
The smallest 7 datasets (shown in Figure 12) do not have
any nodes of degree 1, and the results for Alg. 1 and Alg. 2
are identical. This is also true of Alg. 3 and Alg. 4 results.
For those sets, Alg. 1 (and Alg. 2) outperform the other
algorithms and Alg. 5 is close behind. For the larger sets,
Alg. 4 and 5 perform the best, while Alg. 1 performs the
worst. The reason for this sudden change is the distribution
of nodes’ degree; the large datasets have more of a
powerlaw distribution, and the results are more similar to the
results obtained for ConfNetworks. In terms of running time,
Alg. 1 and 2 (and Alg. 3 and 4) are very similar for the
smallest 7 datasets for the same reason as above. For the
larger datasets, Alg. 1 performs the worst. As expected,
Alg. 5 is by far the fastest.</p>
      <p>To summarize, for real networks, determining the best
algorithm to use is not as straight-forward. If the running
time is an important factor in this decision, then Alg. 5 is
again the winner. If the time is not a factor, then Alg. 1 (or
Alg. 2) is the choice for datasets without high variance in
the average degree, and with no nodes of degree 1 (such as
the 7 smallest datasets); while Alg 4 or 5 is the choice for
the datasets that follow a power-law distribution
(comamazon, com-dblp, com-youtube).</p>
      <p>The experiments performed in this paper show that Alg.
4 is a viable algorithm to find a dominating set of a small
size in large networks of various types. Also, the
experiments show that Alg. 5 is surprisingly accurate, and it can
be used successfully, in particular when the running time is
a very important factor. To our surprise, Alg. 1 and Alg. 2
(which are frequently used in the literature) do not rise to
the expected level, being outperformed in terms of
dominating set size in most of the experiments by the other
algorithms.</p>
      <p>0
|N |=
350
300
250
200
150
100
50</p>
      <p>0
|N |=
7
6
5
4
3
2
1
0
|N |=
5
10
15
20
25
30
35
40
45
50</p>
      <p>0
|AVG |= 5
10
15
20
25
30
35
40
45
50
90
80
70
60
50
40
30
20
10</p>
      <p>0
2.5
1.5</p>
      <p>0
|N |=
450
400
350
300
250
200
150
100
50</p>
      <p>0
|N |=
50000
40000
30000
20000
10000
2
2.1 2.2 2.3 2.4 2.5 2.6</p>
      <p>Discussion and Future Extensions</p>
      <p>The experiments performed in this work show that the
two new algorithms (and in particular Alg. 4) are viable
options to determine a small dominating set for large
networks. In many experiments, Alg. 4 outperforms the
existing algorithms, while being very efficient in terms of
running time.</p>
      <p>
        This work is a preliminary work in the dominating sets
for social network area. As part of our future work, we
intend to investigate how the two new algorithms can be
used for more specific dominating set problems, such as
partial dominating sets (Formin et al. 2005), total
dominating set
        <xref ref-type="bibr" rid="ref5">(Cockayne at al. 1980)</xref>
        , independent dominating
sets
        <xref ref-type="bibr" rid="ref5">(Cockayne at al. 1980)</xref>
        , connected dominating sets
        <xref ref-type="bibr" rid="ref22">(Wu and Li 1999)</xref>
        , d-hop dominating set
        <xref ref-type="bibr" rid="ref19">(Rieck et al.
2002)</xref>
        , positive influence dominating set
        <xref ref-type="bibr" rid="ref21">(Wang et al.
2009)</xref>
        , and k-tuple dominating set
        <xref ref-type="bibr" rid="ref10">(Klasing and Laforest
2004)</xref>
        .
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>Berge C.</surname>
          </string-name>
          <year>1962</year>
          ,
          <article-title>Theory of Graphs and its Applications</article-title>
          . Methuen, London.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>Bollobás</surname>
            <given-names>B.</given-names>
          </string-name>
          ,
          <year>2001</year>
          ,
          <string-name>
            <given-names>Random</given-names>
            <surname>Graphs</surname>
          </string-name>
          (2nd ed.). Cambridge University Press. ISBN 0-521-79722-5.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>Britton</surname>
            <given-names>T</given-names>
          </string-name>
          ,;
          <article-title>Deijfen M; and</article-title>
          <string-name>
            <surname>Martin-Lof</surname>
            <given-names>A.</given-names>
          </string-name>
          <year>2006</year>
          .
          <article-title>Generating Simple Random Graphs with Prescribed Degree Distribution</article-title>
          .
          <source>Journal of Statistical Physics</source>
          , Vol.
          <volume>124</volume>
          ,
          <string-name>
            <surname>Issue</surname>
            <given-names>6</given-names>
          </string-name>
          ,
          <fpage>1377</fpage>
          -
          <lpage>1397</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>Catanzaro M.; Boguna</surname>
            <given-names>M.</given-names>
          </string-name>
          ; and
          <string-name>
            <surname>Pastor-Satorras</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <year>2005</year>
          ,
          <article-title>Generation of Uncorrelated Random Scale-Free Networks</article-title>
          . Physical
          <string-name>
            <surname>Review</surname>
          </string-name>
          , E
          <volume>71</volume>
          , 027103.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <surname>Cockayne E. J.; Dawes R. M.</surname>
          </string-name>
          <article-title>;</article-title>
          and
          <string-name>
            <surname>Hedetniemi S. T.</surname>
          </string-name>
          (
          <year>1980</year>
          ).
          <source>Total Domination in Graphs. Networks</source>
          , Vol.
          <volume>10</volume>
          , No 3, pp.
          <fpage>211</fpage>
          -
          <lpage>219</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <surname>Eubank S.; Anil Kumar V. S.; Marathe M.; Srinivasan</surname>
            <given-names>A.</given-names>
          </string-name>
          ; and
          <string-name>
            <surname>Wang</surname>
            <given-names>N.</given-names>
          </string-name>
          <year>2004</year>
          .
          <article-title>Structural and Algorithmic Aspects of Massive Social Networks</article-title>
          .
          <source>In Proceedings of the ACM-SIAM Symposium on Discrete Algorithms</source>
          ,
          <fpage>718</fpage>
          -
          <lpage>727</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <given-names>Fomin F. V.</given-names>
            ; Kratsch D.; and
            <surname>Woeginger G. J.</surname>
          </string-name>
          (
          <year>2005</year>
          ).
          <article-title>Exact (Exponential) Algorithms for the Dominating Set Problem</article-title>
          . In GraphTheoretic Concepts in
          <source>Computer Science</source>
          , pp.
          <fpage>245</fpage>
          -
          <lpage>256</lpage>
          Springer Berlin Heidelberg.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>Freeman L. C.</surname>
          </string-name>
          <year>2011</year>
          .
          <article-title>The Development of Social Network Analysis - with an Emphasis on Recent Events. In Sage Handbook of Social Network Analysis edited by J</article-title>
          . Scott and P. Carrington,
          <volume>26</volume>
          -
          <fpage>39</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <surname>Garey</surname>
            ,
            <given-names>M. R.</given-names>
          </string-name>
          and Johnson,
          <string-name>
            <surname>D. S.</surname>
          </string-name>
          <year>1979</year>
          .
          <article-title>Computers and Intractability: A Guide to the Theory of NP-Completeness</article-title>
          . W.H. Freeman, ISBN 0-7167-1045-5, page 190.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <given-names>Klasing R.</given-names>
            and
            <surname>Laforest</surname>
          </string-name>
          <string-name>
            <surname>C.</surname>
          </string-name>
          (
          <year>2004</year>
          ).
          <article-title>Hardness Results and Approximation Algorithms of k-Tuple Domination in Graphs</article-title>
          .
          <source>Information Processing Letters</source>
          , Vol.
          <volume>89</volume>
          , No.
          <issue>2</issue>
          , pp.
          <fpage>75</fpage>
          -
          <lpage>83</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <given-names>Leskovec J.</given-names>
            and
            <surname>Krevl</surname>
          </string-name>
          <string-name>
            <surname>A.</surname>
          </string-name>
          <year>2014a</year>
          . SNAP Datasets:
          <article-title>Stanford Large Network Dataset Collection</article-title>
          , Available at: http://snap.stanford.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <given-names>Leskovec J.</given-names>
            and
            <surname>Sosic</surname>
          </string-name>
          <string-name>
            <surname>R.</surname>
          </string-name>
          <year>2014b</year>
          .
          <article-title>SNAP: A general purpose network analysis and graph mining library in C++</article-title>
          , Available at: http://snap.stanford.edu/snap.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <surname>Lovasz L.</surname>
          </string-name>
          <year>1975</year>
          .
          <article-title>On the Ratio of Optimal Integral and Fractional Covers</article-title>
          .
          <source>Discrete Mathematics</source>
          , Vol.
          <volume>13</volume>
          ,
          <fpage>383</fpage>
          -
          <lpage>390</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          2013.
          <article-title>Transformation of Social Networks in the Late PreHispanic US Southwest</article-title>
          .
          <source>In Proceedings of the National Academy of Sciences of the United States of America</source>
          , Vol.
          <volume>110</volume>
          , No.
          <volume>15</volume>
          ,
          <string-name>
            <surname>April</surname>
            <given-names>9</given-names>
          </string-name>
          ,
          <year>2013</year>
          ,
          <fpage>5785</fpage>
          -
          <lpage>5790</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <surname>Molloy</surname>
            <given-names>M.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Reed</surname>
            <given-names>B.</given-names>
          </string-name>
          <year>1995</year>
          .
          <article-title>A Critical Point for Random Graphs with a Given Degree Sequence</article-title>
          .
          <source>Random Structures and Algorithms</source>
          , Vol.
          <volume>6</volume>
          ,
          <fpage>161</fpage>
          -
          <lpage>180</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <surname>Molnar</surname>
            <given-names>F</given-names>
          </string-name>
          ,;
          <string-name>
            <surname>Sreenivasan S.; Szymanski</surname>
            <given-names>K.</given-names>
          </string-name>
          ; and
          <string-name>
            <surname>Korniss</surname>
            <given-names>G.</given-names>
          </string-name>
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <article-title>Minimum Dominating Sets in Scale-Free Network Ensembles, Scientific Reports</article-title>
          ,
          <source>No. 3</source>
          , Nature Publishing Group.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <given-names>Nacher J. C.</given-names>
            and
            <surname>Akutsu</surname>
          </string-name>
          <string-name>
            <surname>T.</surname>
          </string-name>
          <year>2012</year>
          .
          <article-title>Dominating Scale-free Networks with Variable Scaling Exponent: Heterogeneous Networks are not Difficult to Control</article-title>
          .
          <source>New Journal of Physics</source>
          , Vol.
          <volume>14</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <surname>Rieck</surname>
            <given-names>M. Q.</given-names>
          </string-name>
          ; Pai S.; and
          <string-name>
            <surname>Dhar</surname>
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2002</year>
          ).
          <article-title>Distributed Routing Algorithms for Wireless Ad Hoc Networks using d-Hop Connected d-Hop Dominating Sets</article-title>
          .
          <source>In Proc. 6th Int. Conf. High Performance Computing Asia Pacific</source>
          , Vol.
          <volume>2</volume>
          , pp.
          <fpage>443</fpage>
          -
          <lpage>450</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <string-name>
            <surname>Statista</surname>
          </string-name>
          <year>2014</year>
          . Available online at http://www.statista.com/topics/ 1164/social-networks/.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <string-name>
            <surname>Wang F.; Camacho</surname>
            <given-names>E.</given-names>
          </string-name>
          ; and
          <string-name>
            <surname>Xu</surname>
            <given-names>K.</given-names>
          </string-name>
          (
          <year>2009</year>
          ).
          <article-title>Positive Influence Dominating Set in Online Social Networks</article-title>
          .
          <source>In Combinatorial Optimization and Applications</source>
          , pp.
          <fpage>313</fpage>
          -
          <lpage>321</lpage>
          , Springer Berlin Heidelberg.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <string-name>
            <given-names>Wu J.</given-names>
            and
            <surname>Li</surname>
          </string-name>
          <string-name>
            <surname>H.</surname>
          </string-name>
          (
          <year>1999</year>
          ).
          <article-title>On Calculating Connected Dominating Set for Efficient Routing in Ad Hoc Wireless Networks</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <source>In Proceedings of the ACM 3rd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications</source>
          , pp.
          <fpage>7</fpage>
          -
          <lpage>14</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>