=Paper=
{{Paper
|id=Vol-1353/paper_16
|storemode=property
|title=Fast Dominating Set Algorithms for Social Networks
|pdfUrl=https://ceur-ws.org/Vol-1353/paper_16.pdf
|volume=Vol-1353
|dblpUrl=https://dblp.org/rec/conf/maics/CampanTB15
}}
==Fast Dominating Set Algorithms for Social Networks==
Fast Dominating Set Algorithms for Social Networks Alina Campan, Traian Marius Truta, and Matthew Beckerich Computer Science Department Northern Kentucky University Highland Heights, KY 41099, U.S.A. campana1@nku.edu, trutat1@nku.edu, beckerichm1@mymail.nku.edu Abstract ginning from the 1990s, other fields, in particular computer In this paper we introduce two novel algorithms that are science and physics, brought a lot of new results to this able to efficiently determine an approximation to the mini- field (Freeman 2011). With the advent of Myspace, Friend- mum dominating set problem, and at the same time, they ster, and more recently, Facebook and LinkedIn, social will preserve the quality of the solution to an acceptable networks have grown to a new dimension -- the online so- level. We compare these two algorithms with three existing algorithms, for a large number of synthetic datasets, and for cial network -- which allows larger numbers of people to several real world social networks. For experiments, we use participate. Many existing methods for social network social network generators that create both power-law and analysis did not envision such a data explosion. Thus, de- random networks, and a few real network datasets made veloping fast and accurate solutions for large social net- available by the Stanford Network Analysis Project. Our works is becoming more essential in present days. experiments show that the proposed algorithms are viable, and in many instances, preferable for determining the mini- An important feature in a social network is the ability to mum dominating set of a social network. communicate quickly within the network. For instance, in an emergency situation, we may need to be able to reach to all network participants, but only a small number of indi- Introduction viduals in the network can be contacted directly. However, Today, online social networks are used by an ever increas- if all individuals from the network are connected to at least ing number of people. For instance, Facebook has currently one such individual who can be contacted directly (or is more than 1.35 billion users, LinkedIn has over 332 mil- one of those individuals) then the emergency message can lion users, and 1 out of 4 people from the entire world is an be quickly sent to all network participants. This scenario active user in at least one existing social network (Statista can be modeled by what is known as the dominating set 2014). It is not a surprise that researchers from various problem. This is formally described below. domains such as sociology, economics, physics, mathemat- A set DS N of nodes in a network G = (N, E) is a dom- ics, and computer science are analyzing different problems inating set if every node x N is either in DS or adjacent to and proposing various solutions related to social networks. DS (Berge 1962). The dominating set with the smallest While a lot of research has been performed in the past on numbers of elements is known as the minimum dominating networks/graphs, nowadays the main focus is moving to- set (MDS). To find such a minimum dominating set is a ward social issues (as the name implies, social networks well-known NP-complete problem, thus an exact efficient usually represent relationships between people) and toward solution is unlikely to be found (Garey and Johnson 1979). big social networks (as previously noted, these networks Approximation algorithms for determining the minimum tend to be very large). dominating set exist in the literature, with the most com- Social networks existed long before the Internet. As ear- mon one being an adaptation of the greedy algorithm for ly as around 1200-1450 such social networks existed in determining a set cover (Lovasz 1975). However, as we pre-Hispanic Southwest in the current United States. The will show in the following sections, this greedy algorithm growth, collapse, and change of such social networks are is slow for large networks, and therefore more efficient so- reflected in thousands of ceramic and obsidian artifacts lutions are needed. A very efficient algorithm has also been (Mills et al. 2013). More recently, in the first half of the proposed (Eubank et al. 2004), but this algorithm has a low 20th century, the social network analysis discipline was result quality as we will show in the future sections. started by the sociology community (Freeman 2011). Be- Extensive experimental results have been performed for scale-free networks (that model social networks well) us- are white. W (v) denotes the set of white nodes among the ing either the basic greedy algorithms for approximating direct neighbors of v, including v itself. w (v) = | W (v) | is the minimum dominating set size (Molnar et al. 2013) or a called the span of v. Note that in the Alg. 1, we delete the different algorithm based on a binary integer program- black nodes, and the next selected node is either gray or ming-based method (Nacher et al. 2012). These works do white. This algorithm is named RegularGreedy in (Eubank not compare the results of these algorithms with any other et al. 2004). Its pseudocode is presented next: algorithms, and, in addition, they target social networks Algorithm 1 (G, DS) is with low cardinality (up to 10,000 nodes), and therefore Input: G = (N, E) – a social network; Output : DS – a dominating set for G; they do not discuss how the used algorithms will scale to large social networks. DS = ; while ∃ white nodes do In this paper we introduce two novel algorithms that are choose v ∈ {x ∈ N | w(x) = max u ∈ N |W(u)|}; able to determine efficiently an approximation to the min- DS := DS ∪ { v }; imum dominating set problem and, simultaneously, they // Delete the vertex v and will preserve the quality of the solution to an acceptable // its adjacent edges from G. G = (N \{v}, E \{(x, y) ∈ E| x = v or y = v)}); level. Those two algorithms: one extends the greedy algo- end while; rithm mentioned earlier, and the other is an improvement end Algorithm 1. of an algorithm that is also introduced in (Eubank et al. The second algorithm (Algorithm 2 or Alg. 2) starts by 2004). We compare those two algorithms with three exist- finding the set of all nodes of degree exactly one (D1). ing algorithms for a large number of synthetic datasets, Then finds the set of nodes adjacent to D1 (Neighbors(D1)). and for several real world social networks. For the exper- Obviously, any dominating set must contain Neigh- imental part, we use social network generators that create bors(D1). Next, we run the Alg. 1 on the subgraph induced both power-law and random networks, as well as real net- by N \ Neighbors(D1). This second algorithm is referred in work datasets made available by the Stanford Network previous work as VRegularGreedy (Eubank et al. 2004). Analysis Project (Leskovec and Krevl 2014). Its pseudocode is presented next: The remaining of this paper is structured as follows. Algorithm 2 (G, DS) is Section “Dominating Set Algorithms” introduces the two Input: G = (N, E) – a social network; new algorithms that we use in this paper. In addition, in Output : DS – a dominating set for G; this section we also present three existing algorithms that D1 = { x ∈ N | degree(x) = 1}; we use for experimental evaluation. Section “Datasets” de- Neighbors(D1) = { x ∈ N | y ∈ D1 and (x, y) ∈ E } scribes how we generate the synthetic social networks, and DS = Neighbors(D1); // E’ – contains all edges from E that have provides a description of the used real datasets. In section // both ends in N \ {Neighbors(D1) D1}. “Experiments and Results” we perform a detailed experi- G’ = (N \ {Neighbors(D1) D1}, E’); mental evaluation of our algorithms using the datasets pre- Algorithm 1 (G’, DS’); sented in the previous section. Section “Discussion and Fu- DS = Neighbors(D1) DS’; end Algorithm 2. ture Extension” presents conclusions and a summary of fu- ture extension for our work. The third algorithm (Algorithm 3 or Alg. 3) improves the running time of Algorithm 1 by removing both the black and gray nodes from the remaining network, thus re- Dominating Sets Algorithms ducing significantly at each step the size of the network. In this section we describe the greedy algorithms we use to Since all the time the remaining nodes are white, the use of approximate the minimum dominating set. Algorithms 3 node coloring is no longer useful. This algorithm is de- and 4 are new, while the rest are existing algorithms scribed next: against which we compare ours. Algorithm 3 (G, DS) is The first algorithm (Algorithm 1 or Alg. 1) is the stand- Input: G = (N, E) – a social network; Output : DS – a dominating set for G; ard greedy algorithm that choses at each step, one node DS = ; that covers the maximum number of currently uncovered while N do nodes (Eubank et al. 2004, Molnar et al. 2013). In this al- choose v ∈ {x ∈ N | gorithm we start with an empty set, DS, which will at the degree(x) = max u ∈ N (degree(u))}; end store the nodes in the dominating set. Nodes from the DS := DS ∪ { v }; // Delete the vertex v, Neighbors({v}), and network are colored according to their state during the exe- // their corresponding edges. cution of the algorithm. Nodes in DS are called black, // The remaining edges are labeled E’ nodes which are covered (because they neighbor one or G = (N \{v}\ Neighbors({v},E’ ); more nodes in DS) are called gray, and all uncovered nodes end while; end Algorithm 3. The fourth algorithm (Algorithm 4 or Alg. 4) combines configuration model (Molloy and Reed 1995, Britton et al. the Algorithms 2 and 3, by including in the dominating set 2005) that generates a scale free network (Catanzaro et al. all neighbors of nodes of degree 1, and then by applying 2005). Details about the generation algorithms as well as Algorithm 3 to the remaining graph. This algorithm is de- the properties of the generated networks can be found in scribed as: (Leskovec and Sosic 2014). We refer to those networks as Algorithm 4 (G, DS) is ERNetworks and ConfNetworks respectively. Input: G = (N, E) – a social network; To generate ERNetworks we chose the following param- Output : DS – a dominating set for G; eters. First we fix the size of the network, |N |, to 50,000, while N do and we generate ERNetworks for 10 different average de- D1 = { x ∈ N | degree(x) = 1}; gree values (AVG = 5, 10, 15, 20, .., 50). Second we chose Neighbors(D1) = { x ∈ N | y ∈ D1 and (x, y) ∈ E } DS = Neighbors(D1); a fixed AVG value (AVG = 10) and we use 10 distinct val- // E’ – contains all edges in E with both ends ues for the size of N (|N | = 10K, 20K, …, 100K). For each // in N \ {Neighbors(D1) Neighbors (Neighbors(D1) )}. combination of |N | and AVG values we generate 5 distinct G’ = (N \ {Neighbors(D1) Neighbors (Neighbors(D1) ), E’); networks. The total number of ERNetworks generated is 95 Main step in Algorithm 3 (G’, v); (19 combinations x 5 samples). Note that the size 50K and DS = Neighbors(D1) { v }; end while; AVG = 10 is common between the two generation ap- end Algorithm 4. proaches, and therefore it is considered only once. Note that in the Alg. 4, we also delete all nodes domi- We generate the same number of ConfNetworks but we nated by Neighbors(D1) prior to using Algorithm 3. This is change the parameters as follows. For the size of the net- equivalent with deleting the gray nodes along with the works we use exactly the same values, but as a second pa- black node which is executed in Alg. 3 and it is not per- rameter we use the power-law exponent γ from the power- formed in Alg. 1. law distribution (P(k) k-γ). For the fixed |N | value (50K) The last algorithm known as FastGreedy in (Eubank et we use the values for γ = 1.7, 1.8, …, 2.6. When we vary al. 2004) is a very simple and efficient algorithm for com- the size of networks, we use γ = 2.0. As before, for each puting a dominating set. Consider the nodes in N in non- combination of |N | and γ we generate 5 district networks increasing order of the degree v1, v 2, …, v |N |, with de- and the total number of generated ConfNetworks is 95. gree(v 1) ≥ degree(v 2) ≥ … ≥ degree(v | N |), where degree() We also use 10 real networks in this work. These net- is the given degree-sequence. Pick the smallest i such that works are from the SNAP datasets website (Leskovec and |ji Neighbors (vj)| = |N | and take the subset {v1, v 2, …, Krevl 2014). The number of nodes and edges of these net- vi } to be the dominating set of the graph. In this algorithm, works, as well as a short description, are shown in Table 1. we do not take those vi nodes for which Neighbors (vi) j For a full description of the networks and additional prop- erties please consult (Leskovec and Krevl 2014). < i Neighbors (vj). We refer to this algorithm as Algorithm 5 or Alg. 5. The pseudocode algorithm is presented next: Table 1. Real Networks’ Characteristics. Algorithm 5 (G, DS) is Input: G = (N, E) – a social network; Output : DS – a dominating set for G; Name |N | |E | Description DS = ; ego- 4,039 88,234 Social circles from Facebook Order vertices in N = {v 1, v 2, … v|N|)} Facebook such that degree(v 1) ≥ degree(v 2) ≥ … ≥ degree(v | N |). Email communication net- email-Enron 36,692 183,831 i = 1; work from Enron while (|ji Neighbors (vj)| < |N |) do Collaboration network of ca-AstroPh 18,772 198,110 if (not(Neighbors (vi) j < i Neighbors (vj))) Arxiv Astro Physics DS = DS { v i}; Collaboration network of ca-CondMat 23,133 93,497 i++; Arxiv Condensed Matter end Algorithm 5. Collab.network of Arxiv ca-GrQc 5,242 14,496 General Relativity Collab. network of Arxiv High ca-HepPh 12,008 118,521 Datasets Energy Physics Collab. network of Arxiv High In order to compare the size of dominating sets and execu- ca-HepTh 9,877 25,998 Energy Physics Theory tion times for the above 5 algorithms, we use both synthet- com- 334,863 925,872 Amazon product network ic and real network datasets. All synthetic graphs were Amazon generated using the SNAP library (Leskovec and Sosic com-DBLP 317,080 1,049,866 DBLP collaboration network 2014). com- 1,134,890 2,987,624 Youtube online social net- Youtube work We generate synthetic datasets using the well-known Erdos-Renyi random graph model (Bollobás 2001) and the Experiments and Results lar than for low values of γ. This is expected since there are fewer nodes with low degree and the degree distribution To execute our experiments, we implemented the Algo- became more equal. In terms of running time (Figures 8 rithms 1 – 5 described in Section “Dominating Set Algo- and 10), Alg. 1 performs the worst by far, and all the other rithms” and the graph random generators described Section algorithms run in a relatively small amount of time. Look- “Datasets” in C++ using the SNAP framework (Leskovec ing more carefully at the data, Alg. 2, 3 and 4 perform very and Sosic 2014). To allow a meaningful comparison be- similarly. Alg. 3 is slightly better; Alg. 2 and 4 are very tween running times, all the experiments were performed close, while Alg. 5 outperforms them significantly. Alg. 5 on an Intel® Xeon® E5430@2.66 GHz dual CPU machine is between 20 times and 80 times faster than Alg. 3 in all with 4 GB memory running on 32 bit Windows Server our experiments. 2007 operating system. In the experiments executed on the To summarize, for power-law networks, the best algo- synthetic networks (ERNetworks and ConfNetworks), the rithm is Alg. 5. While this algorithm is sometime worse reported results are the average between the 5 sample da- than Alg. 4 in terms of finding the minimum dominating tasets. set size, it still performs best on average in this category. It Figures 1 – 14 show the results of all our experiments. is by far the fastest algorithm to execute, thus being very For figures that report the dominating set size, the y axis suitable for very large networks. shows the number of nodes from the graph in the dominat- Figures 11 – 14 illustrate the results for RealNetworks. ing set. For figures that report the running time, the y axis The smallest 7 datasets (shown in Figure 12) do not have shows the number of seconds needed by our algorithms to any nodes of degree 1, and the results for Alg. 1 and Alg. 2 compute the dominating sets. are identical. This is also true of Alg. 3 and Alg. 4 results. Figures 1 – 6 show the results for ERNetworks. These For those sets, Alg. 1 (and Alg. 2) outperform the other al- networks gave predictable results in terms of both mini- gorithms and Alg. 5 is close behind. For the larger sets, mum dominating set size and running time. For dominating Alg. 4 and 5 perform the best, while Alg. 1 performs the set sizes, we notice that the size of the network does not in- worst. The reason for this sudden change is the distribution fluence which algorithm performs best. However, the aver- of nodes’ degree; the large datasets have more of a power- age degree is very important. When the average degree is law distribution, and the results are more similar to the re- below 25, the best algorithm is Alg. 4, followed in order by sults obtained for ConfNetworks. In terms of running time, Alg. 3, Alg. 5, Alg. 2, and Alg. 1. When the average degree Alg. 1 and 2 (and Alg. 3 and 4) are very similar for the is over 25, Alg. 1 and Alg. 2 outperform the other 3 algo- smallest 7 datasets for the same reason as above. For the rithms. Also it is worth noting that even in this case, Alg. 3 larger datasets, Alg. 1 performs the worst. As expected, and, in particular, Alg. 4 find dominating sets of very close Alg. 5 is by far the fastest. size with Alg. 1 and Alg. 2 (~15% more nodes in their To summarize, for real networks, determining the best dominating sets). For running time, Alg. 1 and Alg. 2 per- algorithm to use is not as straight-forward. If the running form very poorly, and they are not suitable for very large time is an important factor in this decision, then Alg. 5 is networks. By comparing the other three algorithms (Fig- again the winner. If the time is not a factor, then Alg. 1 (or ures 3 and 6), we draw the following two conclusions: Alg. 2) is the choice for datasets without high variance in First, Alg. 5 is always the fastest algorithm. Second, Alg. the average degree, and with no nodes of degree 1 (such as 4 is faster than Alg. 5 when the average degree is lower the 7 smallest datasets); while Alg 4 or 5 is the choice for than 20, and the order changes for higher average degrees. the datasets that follow a power-law distribution (com- It is worth noting that these three algorithms are suitable amazon, com-dblp, com-youtube). for very large networks. Based on these experiments, we The experiments performed in this paper show that Alg. conclude that for Erdos-Renyi random graphs the best al- 4 is a viable algorithm to find a dominating set of a small gorithm to use in most cases is Alg. 4. size in large networks of various types. Also, the experi- Figures 7 – 10 illustrate the results for ConfNetworks. ments show that Alg. 5 is surprisingly accurate, and it can The results are quite different compared to the ERNet- be used successfully, in particular when the running time is works. In terms of finding small dominating sets (Figures 7 a very important factor. To our surprise, Alg. 1 and Alg. 2 and 9), Alg. 4 and 5 perform the best, with very similar re- (which are frequently used in the literature) do not rise to sults. Alg. 2 was close behind. Alg. 1 and 3 perform the the expected level, being outperformed in terms of domi- worst. The reason for those results is that there are many nating set size in most of the experiments by the other al- vertices with degree = 1 that are identified early by Alg. 2 gorithms. and 4, and their only neighbors are added to the dominat- ing set in the beginning of these algorithm, thus reducing the size of the graph. When power exponent values are in- creased (Figure 9), the dominating set sizes are more simi- 50000 25000 40000 20000 30000 15000 20000 10000 10000 5000 0 0 |N |= |AVG |= 5 10 15 20 25 30 35 40 45 50 Alg. 1 Alg. 2 Alg. 3 Alg. 4 Alg. 5 Alg. 1 Alg. 2 Alg. 3 Alg. 4 Alg. 5 Figure 1. Dominating Set Size for ERNetworks when AVG = 10. Figure 4. Dominating Set Size for ERNetworks when |N | = 50K. 350 90 80 300 70 250 60 200 50 150 40 30 100 20 50 10 0 0 |N |= 5 10 15 20 25 30 35 40 45 50 Alg. 1 Alg. 2 Alg. 3 Alg. 4 Alg. 5 Alg. 1 Alg. 2 Alg. 3 Alg. 4 Alg. 5 Figure 2. Running Time for ERNetworks when AVG = 10. Figure 5. Running Time for ERNetworks when |N | = 50K. 7 2.5 6 2 5 1.5 4 3 1 2 0.5 1 0 0 |N |= 5 10 15 20 25 30 35 40 45 50 Alg. 3 Alg. 4 Alg. 5 Alg. 3 Alg. 4 Alg. 5 Figure 3. Running Time for ERNetworks when AVG = 10 (fastest Figure 6. Running Time for ERNetworks when |N | = 50K (fastest algorithms only). algorithms only). 140 100000 120 80000 100 60000 80 60 40000 40 20000 20 0 0 |N |= |N |= 1.7 1.8 1.9 2 2.1 2.2 2.3 2.4 2.5 2.6 Alg. 1 Alg. 2 Alg. 3 Alg. 4 Alg. 5 Alg. 1 Alg. 2 Alg. 3 Alg. 4 Alg. 5 Figure 7. Dominating Set Size for ConfNetworks when γ = 2.0. Figure 10. Running Time for ConfNetworks when |N | = 50K. 450 1200000 400 1000000 350 800000 300 600000 250 400000 200 200000 150 0 100 50 0 |N |= Alg. 1 Alg. 2 Alg.3 Alg. 4 Alg. 5 Alg. 1 Alg. 2 Alg. 3 Alg. 4 Alg. 5 Figure 8. Running Time for ConfNetworks when γ = 2.0. Figure 11. Dominating Set Size for RealData 50000 15000 40000 12000 9000 30000 6000 20000 3000 0 10000 0 |PE |= 1.7 1.8 1.9 2 2.1 2.2 2.3 2.4 2.5 2.6 Alg. 1 Alg. 2 Alg. 3 Alg. 4 Alg. 5 Alg. 1 Alg. 2 Alg. 3 Alg. 4 Alg. 5 Figure 9. Dominating Set Size for ConfNetworks when |N | = 50K. Figure 12. Dominating Set Size for RealData (smaller sets) 2009), and k-tuple dominating set (Klasing and Laforest 80000 2004). 60000 References 40000 Berge C. 1962, Theory of Graphs and its Applications. Methuen, 20000 London. Bollobás B., 2001, Random Graphs (2nd ed.). Cambridge Univer- 0 sity Press. ISBN 0-521-79722-5. Britton T,; Deijfen M; and Martin-Lof A. 2006. Generating Sim- ple Random Graphs with Prescribed Degree Distribution. Journal of Statistical Physics, Vol. 124, Issue 6, 1377-1397. Catanzaro M.; Boguna M.; and Pastor-Satorras R., 2005, Genera- Alg. 1 Alg. 2 Alg. 3 Alg. 4 Alg. 5 tion of Uncorrelated Random Scale-Free Networks. Physical Re- Figure 13. Running Time for RealData view, E 71, 027103. Cockayne E. J.; Dawes R. M.; and Hedetniemi S. T. (1980). Total 10 Domination in Graphs. Networks, Vol. 10, No 3, pp. 211-219. 8 Eubank S.; Anil Kumar V. S.; Marathe M.; Srinivasan A.; and 6 Wang N. 2004. Structural and Algorithmic Aspects of Massive Social Networks. In Proceedings of the ACM-SIAM Symposium 4 on Discrete Algorithms, 718–727. 2 Fomin F. V.; Kratsch D.; and Woeginger G. J. (2005). Exact (Ex- 0 ponential) Algorithms for the Dominating Set Problem. In Graph- Theoretic Concepts in Computer Science, pp. 245-256 Springer Berlin Heidelberg. Freeman L. C. 2011. The Development of Social Network Analy- sis — with an Emphasis on Recent Events. In Sage Handbook of Social Network Analysis edited by J. Scott and P. Carrington, 26– Alg. 1 Alg. 2 Alg. 3 Alg. 4 Alg. 5 39. Figure 14. Running Time for RealData (smaller sets) Garey, M. R. and Johnson, D. S. 1979. Computers and Intracta- bility: A Guide to the Theory of NP-Completeness. W.H. Free- man, ISBN 0-7167-1045-5, page 190. Discussion and Future Extensions Klasing R. and Laforest C. (2004). Hardness Results and Approx- The experiments performed in this work show that the imation Algorithms of k-Tuple Domination in two new algorithms (and in particular Alg. 4) are viable Graphs. Information Processing Letters, Vol. 89, No. 2, pp. 75- options to determine a small dominating set for large net- 83. works. In many experiments, Alg. 4 outperforms the exist- ing algorithms, while being very efficient in terms of run- Leskovec J. and Krevl A. 2014a. SNAP Datasets: Stanford Large ning time. Network Dataset Collection, Available at: http://snap.stanford. This work is a preliminary work in the dominating sets edu/data. for social network area. As part of our future work, we in- Leskovec J. and Sosic R. 2014b. SNAP: A general purpose net- tend to investigate how the two new algorithms can be work analysis and graph mining library in C++, Available at: used for more specific dominating set problems, such as http://snap.stanford.edu/snap. partial dominating sets (Formin et al. 2005), total dominat- ing set (Cockayne at al. 1980), independent dominating Lovasz L. 1975. On the Ratio of Optimal Integral and Fractional sets (Cockayne at al. 1980), connected dominating sets Covers. Discrete Mathematics, Vol. 13, 383–390. (Wu and Li 1999), d-hop dominating set (Rieck et al. Mills B.; Clark J.; Peeples M.; Haas W. R.; Roberts J.; Hill J. B.; 2002), positive influence dominating set (Wang et al. Huntley D.; Borok L.; Breiger R.; Clauset A.; and Shackley M. S. 2013. Transformation of Social Networks in the Late Pre- Hispanic US Southwest. In Proceedings of the National Academy of Sciences of the United States of America, Vol. 110, No. 15, April 9, 2013, 5785–5790. Molloy M. and Reed B. 1995. A Critical Point for Random Graphs with a Given Degree Sequence. Random Structures and Algorithms, Vol. 6, 161-180. Molnar F,; Sreenivasan S.; Szymanski K.; and Korniss G. 2013. Minimum Dominating Sets in Scale-Free Network Ensembles, Scientific Reports, No. 3, Nature Publishing Group. Nacher J. C. and Akutsu T. 2012. Dominating Scale-free Net- works with Variable Scaling Exponent: Heterogeneous Networks are not Difficult to Control. New Journal of Physics, Vol. 14. Rieck M. Q.; Pai S.; and Dhar S. (2002). Distributed Routing Al- gorithms for Wireless Ad Hoc Networks using d-Hop Connected d-Hop Dominating Sets. In Proc. 6th Int. Conf. High Perfor- mance Computing Asia Pacific, Vol. 2, pp. 443-450. Statista 2014. Available online at http://www.statista.com/topics/ 1164/social-networks/. Wang F.; Camacho E.; and Xu K. (2009). Positive Influence Dominating Set in Online Social Networks. In Combinatorial Op- timization and Applications, pp. 313-321, Springer Berlin Heidel- berg. Wu J. and Li H. (1999). On Calculating Connected Dominating Set for Efficient Routing in Ad Hoc Wireless Networks. In Proceedings of the ACM 3rd International Workshop on Dis- crete Algorithms and Methods for Mobile Computing and Com- munications, pp. 7-14.