Professional Documents
Culture Documents
test its statistical plausibility, and compare it via a likelihood ratio test to alternative, non-scale-
free models, e.g., the log-normal. Across domains, we find that scale-free networks are rare, with
only 4% exhibiting the strongest-possible evidence of scale-free structure and 52% exhibiting the
weakest-possible evidence. Furthermore, evidence of scale-free structure is not uniformly distributed
across sources: social networks are at best weakly scale free, while a handful of technological and
biological networks can be called strongly scale free. These results undermine the universality of
scale-free networks and reveal that real-world networks exhibit a rich structural diversity that will
likely require new ideas and mechanisms to explain.
Networks are a powerful way to both represent and ning over the network. For example, scale-free random
study the structure of complex systems of all kinds. Ex- graphs are almost always susceptible to epidemics [17], a
amples today are plentiful and include social interactions result with profound implications for social influence and
among individuals, both offline and online, protein or public health applications. The universality of scale-free
gene interactions in biological organisms, communication networks is thus a critically important question, and re-
between digital computers, and various kinds of trans- solving its empirical status would inform efforts to apply
portation networks. Across scientific domains and dif- results from network theory to many scientific questions.
ferent types of networks, it is common to encounter the If real-world networks are not universally or even typi-
claim that most or all real-world networks are scale free. cally scale-free, the status of a unifying theme in network
The precise details of this claim vary across the liter- science over nearly 20 years [1, 9, 18–20] would be sig-
ature [1–7], but generally agree that a network is scale nificantly diminished. Such an outcome would require
free if the fraction of nodes with degree k follows a power- a careful reassessment of the large literature that has
law distribution k −α , where α > 1. Some versions of this grown up around the idea. Even if scale-free networks
“scale-free hypothesis” make the requirements stronger, are not universal, their prevalence may be non-uniform
e.g., requiring that α ∈ [2, 3] or that node degrees evolve across different domains of networks, e.g., it may be com-
by the preferential attachment mechanism [8, 9]. Other mon for social networks but rare for biological networks
versions make them weaker, e.g., requiring that the power to be scale free. Thus, a crucial followup question would
law holds only in the upper tail [10] or is merely more be to assess this differential evidence by domain, and to
plausible than a thin-tailed distribution like an exponen- characterize how real-world structures deviate from the
tial or normal [11]. scale-free pattern. For domains where there is little em-
Despite the frequency of these claims, there has been pirical support or where scale-free networks are relatively
no broad evaluation of the empirical prevalence of scale- unusual, new models of structure and new mechanisms
free patterns in real-world networks. If networks are of assembly may be needed.
in fact universally scale free, then many theoretical re-
sults about scale-free networks have broad scientific rel- The validity and scope of the scale-free hypothe-
evance. For instance, the several mechanisms known to sis is not uncontroversial. Some research has argued
build scale-free networks [3, 8, 9, 12–16] would provide against its universality, on either statistical or theoretical
a common basis for understanding network assembly. grounds [2, 3, 10, 21–24]. There have also been passionate
And, such mechanisms could be used to create realistic and personal defenses of its status [25], along with many
synthetic networks for numerical simulations and exper- findings claiming to validate or support its universal-
iments. Moreover, many studies have investigated how ity [4, 5, 26–28]. This controversy has persisted because
scale-free structure shapes the dynamics of processes run- studies have typically relied upon small, often domain-
specific data sets, less rigorous statistical methods, and
differing definitions “scale free” [4–7, 26, 27, 29, 30]. Ad-
ditionally, relatively few studies have performed statisti-
∗ anna.broido@colorado.edu cally rigorous comparisons of a fitted power-law distri-
† aaron.clauset@colorado.edu bution to alternative, non-scale-free distributions, e.g.,
2
Test Outcome
Alternative p(x) ∝ f (x) MPL Inconclusive MAlt
−λx
Exponential e 37% 27% 36%
2
1 − (log x−µ)
Log-normal e 2σ 2 12% 43% 45%
x a
−( x )
Weibull e b 33% 25% 42%
Power law — 49% 51%
x−α e−λx
with cutoff
Super-Weak 484 (0.52) hibit the weakest form of direct evidence (22% Weakest).
This latter group includes cat and rat brain connectomes.
Weakest 309 (0.33) Compared to the corpus as a whole, biological networks
are slightly more likely to exhibit the strongest level of di-
Weak 224 (0.24)
rect evidence of scale-free structure (6% Strongest), and
Strong 98 (0.11) these are primarily metabolic networks.
Strongest 35 (0.04) In contrast, social networks present a different picture,
0.0 0.2 0.4 0.6 0.8 1.0 in two specific ways. First, a minority of social networks
lack any direct or indirect evidence of scale-free struc-
ture (19% Not Scale Free; Fig. 7b), and a large majority
FIG. 6. Proportions of networks in each scale-free evidence exhibit indirect evidence (71% Super-Weak). The for-
category. The four nested definitions are at the bottom, with
mer group includes the 2006 snapshot of collaborations in
super-weak separated by bars. Networks that are neither
weakest or super-weak are considered not scale-free.
network science, and a number of both Facebook online
social networks, and board of directors networks. The
Super-Weak group includes a large number of both Face-
hibits for scale-free structure. Accordingly, each network book friendship networks and board of director networks.
data set is assigned to one of the five categories described And second, among the categories representing direct
in Section II B, or classified as Not Scale Free. evidence of scale-free structure, not a single network data
Across our corpus, fully 43% of network data sets fall set falls into the Strong or Strongest categories. Hence
into this latter category, admitting no evidence at all social networks are at best only weakly scale free, with
for scale-free structure (Fig. 6). Slightly more than half 70% and 55% exhibiting the weakest or weak direct ev-
(52%) fall into the Super-Weak category, in which a scale- idence of scale-free structure, respectively. The social
free pattern among the degrees is not itself statistically networks exhibiting weak evidence include about a third
plausible, but remains marginally more plausible than of the Facebook online social networks and half of the
alternative distributions. The Weakest and Weak cate- board of director networks.
gories represent network data sets in which the power-law Technological networks exhibit the smallest share of
distribution itself is a statistically plausible model of the network data sets for which there is no evidence, direct
networks’ degree distributions. In the Weak case, this or indirect, of scale-free structure (7% Not Scale Free;
power-law scaling covers at least 50 nodes, a relatively Fig. 7c), and the largest share exhibiting indirect evi-
modest requirement. These two categories account for dence (92% Super-Weak). The former group includes
33% and 24% of data sets, respectively, indicating that some digital circuit networks and water distribution net-
direct statistical evidence of a plausibly scale-free degree works. Among the categories representing direct evi-
distribution is, in fact, relatively uncommon. dence, less than half exhibit the weakest form of direct ev-
Finally, only 11% and 4% of network data sets can be idence (43% Weakest). This group includes about half of
classified into the Strong or Strongest categories, respec- the CAIDA autonomous systems networks, several peer-
tively, in which the power-law distribution is not only a to-peer networks, and a few digital circuit networks. In
statistically plausible model of the degree structure, but contrast to biological or social networks, however, tech-
the exponent falls within the special α ∈ [2, 3] range and nological networks exhibit a modest fraction of networks
the power law is a better model of the degrees than al- with strong direct evidence of scale-free structure (28%
ternatives. Taken together, these results indicate that Strong). Networks in this category include the other half
genuinely scale-free networks are remarkably rare, and of the CAIDA graphs. But, hardly any of the technologi-
scale-free structure is not a universal pattern. cal networks exhibit the strongest level of direct evidence
The balance of evidence for or against scale-free struc- (1% Strongest).
ture in our corpus also varies by network domain (Fig. 7). Extending the scale-free network hypothesis to cover
The degree to which different domains exhibit evidence of networks that were not simple allowed us to draw on a
scale-free structure should clarify the past and shape fu- much larger range of empirical network data sets. It is
ture efforts to develop new structural mechanisms. Here, therefore possible that the numerous non-simple network
we focus our analysis on network data sets from three data sets we analyzed have distinct structural patterns
domains: biological, social, and technological, which rep- from simple networks, and hence are less likely to ex-
resent 91% of our corpus. hibit a scale-free pattern. We test for this possibility by
Among biological networks, a large majority lack any examining the classifications of the 187 simple networks
direct or indirect evidence of scale-free structure (61% within the corpus. Among these networks, a minority
Not Scale Free; Fig. 7a). The aforementioned fungal net- exhibit neither direct nor indirect evidence of scale-free
works represent a large share of these Not Scale Free structure (24% Not Scale Free), and a modest major-
networks, but this group also includes some protein in- ity exhibit at least indirect evidence (66% Super-Weak;
8
(A) power law is a special case of the power law with cutoff,
Not 304 (0.61) our likelihood-ratio test can only be inconclusive or result
Scale-Free in favor of the power law with cutoff. In the case where
the power law with cutoff is the best model, this case
Super-Weak 173 (0.35) cannot be placed in the Strongest or Strong scale-free
categories by definition. We found initially that 10.6% of
Biological
Weakest 109 (0.22) data sets fall into the Strong category. When we include
data sets for which the power law with exponential cutoff
Weak 60 (0.12) was favored over the power law, this increases negligibly
Strong 40 (0.08) to 11.4% of data sets. Additionally, if we also remove
the restriction on the range of α, the percentage of data
Strongest 29 (0.06) sets in this Strong category increases to 23%. This is
very close to the results for the Weak category (24%),
(B)
Not 27 (0.19)
which indicates that the majority of the decrease from
Scale-Free the Weak to the Strong is due to the imposition of the
bounds on α rather than the requirement against favoring
Super-Weak 103 (0.71) alternative distributions. There is a similarly negligible
increase in the number of datasets in the Strongest cat-
Weakest 101 (0.70) egory, from 3.8% to 4.4% when we allow data sets for
Social
Fig. 8). Compared to the overall corpus, about twice as IV. CONCLUSIONS
many simple networks exhibit weak direct evidence, and
about the same proportion exhibit strong direct evidence. By evaluating nearly 1000 distinct real-world network
These differences can be partly explained by the distri- data sets drawn from a wide range of scientific domains,
bution of simple graphs by domain, as 73% of simple we find that genuine scale-free networks are rare. In
graphs in the corpus are social, which exhibits similar fact, less than 45 network data sets (4%) exhibited the
proportions across the evidence categories. Hence, the strongest level of direct evidence for scale-free structure,
general rarity of scale-free networks holds even when we and only 33% of network data sets exhibited the weakest
restrict our analysis to simple graphs, and our inclusion form of direct evidence, in which a power law is at least a
of non-simple graphs has not skewed our results. statistically plausible model of some portion of the upper
To rule out potential bias of our stronger scale-free tail of the degree distribution. Relaxing the criteria even
definitions against the hypothesis, we also examine the further, to allow merely indirect evidence of scale-free
results when we remove the power law with exponential structure in the degree distribution, admits only 52% of
cutoff from our list of alternative distributions. As the networks data sets, and nearly half (43%) of the data sets
9
Weakest 125 (0.67) atively less is known about alternative mechanisms that
Weak 106 (0.57)
produce non-scale-free structural patterns. Hence, an im-
portant direction of future work in network theory will
Strong 12 (0.06) be development and validation of novel mechanisms for
Strongest 8 (0.04) generating more realistic degree structure in networks.
0.0 0.2 0.4 0.6 0.8 1.0 Similarly, theoretical results concerning the behavior of
dynamical processes running on top of networks, includ-
ing spreading processes like epidemiological models or in-
FIG. 8. Proportions of networks in each scale-free evidence fluence models, may need to be reassessed in light of the
category for simple networks. genuine structural diversity of real-world networks.
The statistical methods and evidential categories de-
could be deemed Not Scale Free, meaning they showed no veloped and used in our investigation provide a quantita-
direct or indirect evidence of scale-free structure. These tively rigorous manner by which to assess whether some
results clarify the empirical status of the common claim network exhibits scale-free structure or not. Their appli-
that scale-free networks are universal, and indicate that cation to a novel network data set should enable future
such claims are generally not empirically grounded. researchers to determine whether scale-free modeling as-
Across different scientific domains, the evidence for sumptions are empirically justified.
scale-free structure is generally weak, but varies slightly Furthermore, large corpora of real-world networks, like
in interesting ways. These differences provide some hints the one used here, represent a powerful, data-driven re-
as to where genuine scale-free structure may exist. For source by which to investigate the structural variability of
instance, we find somewhat stronger evidence that scale- real-world networks. Such corpora could be used to eval-
free structure occurs in some biological and technologi- uate the empirical status of many other broad claims in
cal networks. This pattern of evidence agrees with some the networks literature, including the tendency of social
theoretical work on domain-specific mechanisms for gen- networks to exhibit high clustering coefficients and posi-
erating scale-free structure, e.g., in biological networks tive degree assortativity [47], the prevalence of the small-
via the well-established duplication-mutation model for world phenomena [48], the prevalence of “rich clubs” in
molecular networks [3, 14, 45] or in certain kinds of tech- networks [49], the ubiquity of community [50] or hierar-
nological networks via highly optimized tolerance [18, 46]. chical structure [51], and the existence of “super-families”
In contrast, we find that social networks are at best of networks [52]. We look forward to those investigations
weakly scale free, indicating that if mechanisms like and the new insights they are sure to bring to our under-
preferential attachment [1, 12, 13] or its many vari- standing of the structure and function of networks.
ants [15, 16] do operate in these contexts, they are
strongly confounded by other mechanisms that cause sta-
tistically significant deviations from the expected power- ACKNOWLEDGMENTS
law form. Class imbalance in the corpus prevents us from
making broad conclusions about the prevalence of scale- The authors thank Eric Kightley and Johan Ugander
free structure in informational networks or the theoretical for helpful conversations, and acknowledge the BioFron-
relevance of scale-free mechanisms in that domain. How- tiers Computing Core at the University of Colorado
ever, the few informational networks we analyzed pro- Boulder for providing High Performance Computing re-
vided little indication that they would exhibit strongly sources (NIH 1S10OD012300) supported by BioFrontiers
different structural patterns that the domains with bet- IT. This work was supported in part by Grant No. IIS-
ter representation in our corpus. 1452718 (A.C.) from the National Science Foundation.
In general, the modest differences in the balance of ev- Code for graph simplification functions and power-law
idence across the three domains for which we obtained evaluations, as well as replication data, are available at
sufficiently large samples—social, biological, and techno- https://github.com/adbroido/SFAnalysis.
logical networks—seem to support a general conclusion
that there is likely no single universal mechanism, or even
a handful of mechanisms, that can explain the wide di-
versity of degree structures found in real-world networks. AUTHOR CONTRIBUTIONS
The failure to find universal patterns in the degree struc-
ture of networks indicates that a great deal remains un- A.D.B. and A.C. conceived the research, designed the
known about how networks from different domains differ analyses, and wrote the manuscript. A.D.B. conducted
and what kind of structural patterns are common within the analyses.
10
[1] R. Albert, H. Jeong, and A. L. Barabási, Nature 401, and Data Mining (KDD) (2017) pp. 817–826.
130 (1999). [33] D. L. Alderson and L. Li, Phys. Rev. E 75, 046102 (2007).
[2] N. Pržulj, Bioinformatics 23, 177 (2007). [34] M. Mitzenmacher, Internet Mathematics 2, 525 (2004).
[3] G. Lima-Mendez and J. van Helden, Molecular BioSys- [35] A. Clauset, E. Tucker, and M. Sainz, (2016), The Col-
tems 5, 1482 (2009). orado Index of Complex Networks, icon.colorado.edu.
[4] A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, [36] L. A. N. Amaral, A. Scala, M. Barthelemy, and H. E.
and B. Bhattacharjee, in Proc. 7th ACM SIGCOMM Stanley, Proc. Natl. Acad. Sci. USA 97, 11149 (2000).
Conference on Internet Measurement (IMC) (2007) pp. [37] G. Buzsáki and K. Mizuseki, Nature Reviews Neuro-
29–42. science 15, 264 (2014).
[5] M. T. Agler, J. Ruhe, S. Kroll, C. Morhenn, S. T. Kim, [38] H. Jeong, S. P. Mason, A. L. Barabási, and Z. N. Oltvai,
D. Weigel, and E. M. Kemen, PLoS Biology 14, 1 (2016). Nature 411, 41 (2001).
[6] G. Ichinose and H. Sayama, Artificial Life 23, 25 (2017). [39] Y. Malevergne, V. F. Pisarenko, and D. Sornette, Quan-
[7] L. Zhang, M. Small, and K. Judd, Physica A 433, 182 titative Finance 5, 379 (2005).
(2015). [40] T. DuBois, S. Eubank, and A. Srinivasans, Electronic
[8] S. N. Dorogovtsev and J. F. F. Mendes, Advances in Journal of Combinatorics 19, 1 (2012).
Physics 51, 1079 (2002). [41] Q. H. Vuong, Econometrica 57, 307 (1989).
[9] A. L. Barabási and R. Albert, Science 286, 509 (1999). [42] D. Easley and J. Kleinberg, Networks, Crowds, and Mar-
[10] W. Willinger, D. Alderson, and J. C. Doyle, Notices of kets: Reasoning about a Highly Connected World (Cam-
the AMS 56, 586 (2009). bridge University Press, 2010).
[11] R. Albert, H. Jeong, and A.-L. Barabási, Nature 406, [43] M. Newman, Networks: An Introduction (Oxford Uni-
378 (2000). verity Press, 2010).
[12] D. J. d. S. Price, Science 149, 510 (1965). [44] S. H. Lee, M. D. Fricker, and M. A. Porter, Journal of
[13] H. A. Simon, Biometrika 42, 425 (1955). Complex Networks 5, 145 (2017).
[14] R. Pastor-Satorras, E. Smith, and R. V. Solé, Journal of [45] M. Middendorf, E. Ziv, and C. H. Wiggins, Proc. Natl.
Theor. Biol. 222, 199 (2003). Acad. Sci. USA 102, 3192 (2005).
[15] N. Berger, C. Borgs, J. T. Chayes, R. M. D’Souza, and [46] M. E. J. Newman, M. Girvan, and J. D. Farmer, Phys.
R. D. Kleinberg, in Proc. 31st International Colloquium Rev. Lett. 89, 028301 (2002).
on Automata, Languages and Programming (ICALP) [47] M. E. J. Newman and J. Park, Phys. Rev. E 68, 036122
(2004) pp. 208–221. (2003).
[16] J. Leskovec, J. Kleinberg, and C. Faloutsos, ACM Trans. [48] D. J. Watts and S. H. Strogatz, Nature 393, 440 (1998).
Knowledge Discovery from Data 1, 2 (2007). [49] V. Colizza, A. Flammini, M. A. Serrano, and A. Vespig-
[17] M. E. J. Newman, Phys. Rev. E 66 (2002), 0205009. nani, Nature Physics 2, 110 (2006).
[18] J. M. Carlson and J. Doyle, Phys. Rev. E 60, 1412 (1999). [50] M. Girvan and M. E. J. Newman, Proc. Natl. Acad. Sci.
[19] M. E. J. Newman, Contemporary Physics 46, 323 (2005), USA 99, 7821 (2002).
0412004. [51] A. Clauset, C. Moore, and M. E. J. Newman, Nature
[20] M. Mitzenmacher, Internet Mathematics 1, 226 (2003). 453, 98 (2008).
[21] R. Tanaka, Phys. Rev. Lett. 94, 1 (2005). [52] R. Milo, S. Itzkovitz, N. Kashtan, R. Levitt, S. Shen-
[22] L. Li, D. Alderson, R. Tanaka, J. C. Doyle, and W. Will- Orr, I. Ayzenshtat, M. Sheffer, and U. Alon, Science
inger, Internet Math. 2, 431 (2005). 303, 1538 (2004).
[23] M. P. H. Stumpf and M. A. Porter, Science 335, 665 [53] T. Nakagawa and S. Osaki, IEEE Trans. Reliability 24,
(2012). 300 (1975).
[24] M. Golosovsky, Phys. Rev. E 032306, 1 (2017).
[25] A. Barabasi, Network Science, Chapter 0 (Cambridge
University Press, 2016).
Appendix A: Simplifying Network Data Sets
[26] K.-I. Goh, E. Oh, H. Jeong, B. Kahng, and D. Kim,
Proc. Natl. Acad. Sci. USA 99, 12583 (2002).
[27] R. Pastor-Satorras, C. Castellano, P. Van Mieghem, Our corpus of real-world networks includes both sim-
and A. Vespignani, Reviews of Modern Physics 87, 925 ple graphs and networks with various combinations of
(2015). directed, weighted, bipartite, multigraph, temporal, and
[28] D. Gamermann, J. Triana, and R. Jaime, “A comprehen- multiplex properties. For each property, there can be
sive statistical study of metabolic and protein-protein in- multiple ways to extract a degree sequence, and in some
teraction network properties,” (2017), arXiv:1712.07683.
cases, extracting a degree sequences requires making a
[29] S. Redner, The European Physical Journal B 134, 131
(1998).
choice. To resolve these ambiguities, and to provide a
[30] A. Pachon, L. Sacerdote, and S. Yang, “Scale-free be- consistent set of rules by which to extract a set of degree
havior of networks with the copresence of preferential and sequences from a given network data set, we developed
uniform attachment rules,” (2017), arXiv:1704.08597. a set of graph simplification functions, which are applied
[31] A. Clauset, C. R. Shalizi, and M. E. J. Newman, SIAM in a sequence that depends on the graph properties of
Review 51, 661 (2009). the input (Fig. 9). For completeness, we describe these
[32] N. Eikmeier and D. F. Gleich, in Proc. 23rd ACM specific pathways, and give counts of how many network
SIGKDD Internat. Conference on Knowledge Discovery data sets in our corpus followed each pathway.
11
Appendix B: Power-law analysis fail to reject the model [31]. We note: failing to reject
does not imply that the model is correct, only that it is
1. Fitting the model a plausible data generating process.
Applying the previously defined fitting procedure to a We then generalize the distribution to start at some
large number of these synthetic data sets yields the null minimum value, i.e., rather than starting at 0, the dis-
distribution of KS-statistics Pr(D). Let D∗ denote the tribution starts at k = kmin , where kmin is a positive
value of the KS-statistic for the best fitting power-law integer. This pmf is obtained by re-normalizing the tail
model for the empirical degree sequence. The p-value of g(k) so that it sums to 1 on the interval kmin to ∞,
for this model is defined as the probability of observing, yielding
under the null distribution, a KS-statistic at least as ex-
treme as D∗ . Hence, p = Pr(D ≥ D∗ ) is the fraction g(k) g(k)
of synthetic datasets with KS statistic larger than that h(k) = P∞ = Pkmin −1
k=kmin g(k) 1− k=0 g(k)
of the empirical data set. Following standard practice,
if p < 0.1, then we reject the power law as a plausible g(k) g(k)
= = .
model of the degree sequence, and if p ≥ 0.1, then we 1 − G(kmin − 1) 1 − F (kmin )
13
Maximum likelihood estimation was carried out using Appendix D: Likelihood-ratio tests
standard numerical optimization routines. Additionally,
we constrained the optimization in order to prevent nu- The power-law models were compared with the alter-
merical instabilities. Specifically, we required σ ≥ 1 and natives using a set of likelihood-ratio tests. For each
µ ≥ −bn/5c. As a check on these constraints, we verified alternative distribution, we obtained the log-likelihood
that in no cases did the likelihood improve significantly LAlt of the best fit. The difference between this value
by allowing σ < 1, and the constraint on µ prevents and the log-likelihood of the power-law fit to the same
it from decreasing without bound (a behavior that can observations yields the likelihood ratio test (LRT) statis-
produce arbitrarily heavy-tailed distributions over a fi- tic R = LPL − LAlt .
nite range in the upper tail). To initialize the numerical
search, we set (µ0 , σ0 ) = (0, 1). When R > 0, the power law is a better fit to the data.
Similarly, when R < 0, the alternative distribution is
the better fitting model. Crucially, when R = 0, the
3. Power-law with exponential cutoff test is inconclusive, meaning that the data cannot dis-
tinguish between the two models. The test statistic R,
however, is itself a random variable, and hence is subject
If k follows a discrete power-law distribution starting
to statistical fluctuations. Accounting for these fluctua-
at kmin , and with an exponential cutoff in the upper tail,
tions dramatically improves the accuracy of the test by
then its pdf has the form
reducing both types of incorrect decision rates [31]. As
p(k) = e−kmin λ Φ(e−λ , α, kmin ) k −α e−λk a result, the sign of R alone is not a reliable indicator
of which model is a better fit. The now standard ap-
∞
X zi proach for controlling for this uncertainty is to calculate
where Φ(z, s, a) = is the Lerch Phi func- a p-value against the null model of R = 0. Only if that
i=0
(a + i)s
model can be rejected, is the sign of R meaningful [41].
tion.
In this setting, if p < 0.1, then the absolute value of R is
We again estimate this distribution’s parameters λ and
sufficiently far from 0 that its sign is interpretable.
α using standard numerical maximization routines.
We obtain this p-value with the same method used in
Ref. [31], originally proved valid in Ref. [41]. Note that
4. Weibull (Stretched exponential)
R = LPL − LAlt
A common approach to obtain a discrete version of Xn
the stretched exponential or Weibull distribution is to = [ln pPL (ki ) − ln pAlt (ki )]
bin the continuous distribution [53]. Let f (k) and F (k) i=1
be the density and distribution functions of a continuous n h i
(PL) (Alt)
X
Weibull variable, where = `i − `i
a
i=1
F (k) = 1 − e−(k/b) , x≥0 .
(PL)
Define g(k) and G(k) to be the density and distribution where `i is the log-likelihood of a single observed de-
functions of a discrete Weibull variable, given by: gree value ki under the power-law model, and n is the
number of empirical observations being used by a model
g(k) = F (k + 1) − F (k), x≥0 (in our setting, this number is ntail , but we omit that
annotation to keep the mathematics more compact).
and
We have assumed that the degree values ki are inde-
k
X pendent, which means the point-wise log-likelihood ra-
G(k) = g(y) = F (k + 1) − F (0) = F (k + 1) . (PL)
tios `i
(Alt)
− `i are independent as well. The central
y=0
limit theorem states that the sum of independent random
As with the log-normal, we generalize the distribution variables becomes approximately normally distributed as
to start at some minimum value, i.e., rather than starting their number grows large, and that this normal distribu-
at 0, the distribution starts at k = kmin , where kmin is a tion has mean µ and variance nσ 2 , where σ 2 is the vari-
positive integer. This pmf is obtained by re-normalizing ance of a single term. This distribution can be used to
the tail of g(k) so that it sums to 1 on the interval kmin obtain the p-value, but requires that we first estimate µ
to ∞, yielding and σ 2 . Note that we assume µ = 0 because the null
h i hypothesis is R = 0. We then approximate σ 2 as the
a a a
h(k) = e(kmin /b) e−(k/b) − e−((k+1)/b) . sample variance in the observed R
where into three degree sequences: one each for in-degree, out-
n n
degree, and total degree. As predicted by the literature,
(PL) 1 X (PL) (Alt) 1 X (Alt) the in-degree sequences are usually plausibly power-law
`¯i = l and `¯i = `
n i=1 i n i=1 i (80%), while the out-degree sequences never are, and the
total degree sequences are again usually but not always
are sample means. power-law (74%). This accounts for the variance and
Under this null distribution, the probability of observ- lower-percentage of networks showing direct power-law
ing an absolute value of R at least as large as the actual evidence. This also implies that the preferential attach-
test statistic is given by the two-tail probability ment mechanism does better at generating networks for
"Z # which a power law is a better fit than alternatives, than at
−|R| Z ∞
generating genuinely power-law networks. The absence
1 t2 t2
p= √ e− 2nσ2 dt + e− 2nσ2 dt . (D1) of graphs in the Strongest category is due to the fact
2πnσ 2 −∞ |R|
that this category requires that 90% of associated sim-
Hence, following standard practice [31], if p ≤ 0.1, then ple graphs be plausibly power-law, and this generating
we reject the null hypothesis that R = 0, and proceed by mechanism gives at best 67%.
interpreting the sign of R as evidence in favor of one or The vertex-copying method [43] is also expected to
the other model. generate scale free structure. We again start with a 4-
node directed network, each node connected to the other
3. We add nodes one at a time until we reach 5000 total
Appendix E: Evaluating the method on synthetic and for each follow the same procedure. Pick an existing
data with ground truth node u at random. For each out-edge that u has, copy it
to the new node v with probability q = 0.6. With prob-
We tested the method on synthetic data sets to see ability 1 − q = 0.4, attach uniformly to one of the other
if we recover ground truth structure. We generated 100 nodes. Each node has out-degree 3. When we process
random 5000-node networks by each of three methods. this graph we expect again a power-law in-degree distri-
We expect two of the methods, preferential attachment bution and usually a power-law total-degree distribution.
[42] and vertex copying [43], to generate scale-free net- The results are consistent with what we expect. 88%
works, and Erdős-Rényi random graphs not to. of the vertex-copying graphs are Super-Weakly scale-free,
The first method, preferential attachment [42], is one which jumps to 99% if we ignore power-law with cutoff.
of the most commonly referenced scale-free generating 74% fall into the Weakest and Weak categories, meaning
mechanisms. The process is as follows. We begin with a the power law is plausible with at least 50 points in the
4-node directed network, in which each node has 3 out tail of the degree sequence. 70% fall into the Strong
edges, one to each of the other nodes. We then add one category. Since out-degree sequences are never plausibly
node at a time until we reach a total of 5000 nodes in power-law we have none in the Strongest category.
the network. Each added node forms 3 out edges. For Erdős-Rényi random graphs are simple and are gener-
each edge, with probability p = 2/3 the connection is ally known to have thinner-tailed degree distributions.
formed preferentially. That is, the new node connects to To generate these graphs, we add n = 5000 nodes
an existing node with probability proportional to the in- and then for every possible edge, there is a probability
degree of that node. With probability 1 − p = 1/3, the p = c/(n − 1) of connection, where c is the desired mean
connection is uniform, where each existing node has equal degree. We chose c = 6, so p = 6/4999 ≈ 0.0012. We
probability of receiving the new edge. We expect the in- expect the majority of these to follow thinner-tailed dis-
degree sequence of the final graph to follow a power-law tributions than the power law.
distribution, while the out degree of every node is 3. In The Erdős-Rényi random networks indeed have very
our processing, we extract the in-, out-, and total-degree different results. Only 16% are Super-Weak, though
sequences. We’d expect that most of the time the total- this increases to 31% without the power law with cut-
degree sequence will also look power-law, since it is the off as an alternative. This indicates that these networks
sum of a power law and a constant distribution. have thinner-tailed degree distributions. 51% and 50%
We find 87% of the preferential attachment graphs of these networks fall into the Weakest and Weak cate-
fall into the Super-Weak category. Further, if we do gories, respectively, but because the best-fit α-values are
not consider the power law with cutoff as an alterna- all large (the smallest is 7.55), none fall into the Strong
tive model, this increases to 98%. This means 98% of or Strongest categories. This is again consistent with the
the time, a power-law model is favored over alternatives thin-tailed nature of these networks. We may have ex-
for these graphs. When we consider the plausibility of pected to see a smaller fraction of these networks falling
the power-law fit, we see fewer networks. 62% of the into the Weak categories, but this result indicates how
preferential attachment graphs fall into the Weakest and inclusive these two categories are.
Weak categories, 60% in the Strong category, and 0 in As our methods were able to fairly well recover the
the Strongest category. This is not entirely unexpected, ground truth when tested on these synthetic networks, we
however. Each of these graphs is directed and splits feel confident in our results for the real-world networks.