 Research
 Open access
 Published:
Comparative analysis of boxcovering algorithms for fractal networks
Applied Network Science volume 6, Article number: 73 (2021)
Abstract
Research on fractal networks is a dynamically growing field of network science. A central issue is to analyze the fractality with the socalled boxcovering method. As this problem is known to be NPhard, a plethora of approximating algorithms have been proposed throughout the years. This study aims to establish a unified framework for comparing approximating boxcovering algorithms by collecting, implementing, and evaluating these methods in various aspects including running time and approximation ability. This work might also serve as a reference for both researchers and practitioners, allowing fast selection from a rich collection of boxcovering algorithms with a publicly available codebase.
Introduction
It is a challenging task to develop notions that can capture important features of a realworld network. Popular approaches often focus on the degree distribution of the nodes of a given network, on degreedegree correlations, on shortest path related measures, on the clustering of the network, and on other structural measures (Newman et al. 2011). Various classes of networks, such as smallworld networks, scalefree networks, and networks with a strong community structure have attracted a lot of research attention in the past two decades (Molontay and Nagy 2021).
In recent years, there has been an increasing interest in the class of fractal networks, since fractality has been verified in several realworld networks (WWW, actor collaboration networks, protein interaction networks) (Song et al. 2005; Wen and Cheong 2021). Moreover, fractality has been associated with many important properties of networks such as robustness, modularity, and information contagion (Rozenfeld et al. 2007). For example, fractal networks are found to be relatively robust against targeted attacks, which may provide an explanation why numerous biological networks evolve towards fractal behavior (Gallos et al. 2007). For a wide range of applications of fractal property in networks, see the work of Wen and Cheong (2021).
Since the notion of fractal networks is motivated by the notion of fractal geometry, the method to identify fractal behavior of networks is similar to that of regular fractal objects: using the boxcovering method, also called boxcounting method. The method aims to determine the minimum number of boxes needed to cover the entire network. Although this problem belongs to the family of NPhard problems (Song et al. 2007), numerous algorithms have been proposed to obtain an approximate solution.
In this contribution, we provide a systematic review and comparative analysis on a large collection of algorithms that have been proposed throughout the years to perform the boxcovering of the network. The high number of approximating algorithms introduced recently calls for an impartial, systematic comparison of the algorithms. There are a few recent works that describe the most important boxcovering algorithms (Wen and Cheong 2021; Rosenberg 2020; Huang et al. 2019; Deng et al. 2016), however, to the best of our knowledge, this is the first comprehensive comparative study in this field. After collecting and implementing various methods, we compared their performance in terms of approximation ability and running time on a number of realworld networks. In addition, we made all our codes publicly available on GitHub (https://github.com/PeterTKovacs/boxes) together with detailed documentation and a tutorial Python notebook. It makes our results reproducible and allows for future contributions from interested community members.
Fractality in geometry
The term fractal was coined by Benoit B. Mandelbrot and the concept was originally developed for sets in a Euclidean space (Mandelbrot 1982; Falconer 2004). In fractal geometry, the boxcovering algorithm is one possible way to estimate the fractal dimension of a set S in a ddimensional space (\({\mathbb {R}}^d\)). The set is lying on an evenly spaced ddimensional grid and the hypercubes of this grid are boxes of size l. We consider the N(l) minimal number of boxes of size l that are needed to cover the set and see how it scales with the box size. The boxcounting or Minkowski dimension is defined as
The exact mathematical definition of fractals goes beyond the scope of this paper. Roughly speaking, a set with a noninteger boxcounting dimension is considered to have fractal geometry, since it suggests that the fractal scales differently from the space it resides in.
Fractality of networks
The notion of fractal networks is motivated by the concepts from fractal geometry and measuring the fractal dimension of a network is analogous to the geometric case (Song et al. 2005). The boxcounting method can be easily generalized to networks since the vertex set of an undirected graph together with the graph distance function (geodesic distance) form a metric space, and the boxcounting algorithm generalizes to any metric space. For networks, the boxcovering also called boxcounting method works as follows:

We say that a group of nodes fit into a box of size \(l_B\) if, for any pair of these nodes, their shortest distance is less than \(l_B\).

A network is covered by boxes of size \(l_B\) if its nodes are partitioned such that every group fits into one box of size \(l_B\).

As the number of possible coverings is finite, there is a minimal number of boxes to cover the network with \(l_B\) sized boxes. This is what we denote by \(N_B(l_B)\).

If the minimal number of boxes scales as a power of the box size, i.e., \(N_B (l_B) \propto l_B^{d_B}\), the network is informally defined to be fractal with a finite fractal dimension or box dimension \(d_B\).
Although the “\(\propto\)” scaling relation is not welldefined and cannot strictly hold for finite networks, the boxcoveringbased fractal dimension can be defined mathematically rigorously for infinite networks and graph sequences (Komjáthy et al. 2019). However, in practice, one usually verifies the fractality of realworld networks by approximating the \(N_B(l_B)\) values on a feasible range of \(l_B\) box size values and then inspects them on a loglog plot to see if the relationship follows a powerlaw to a good approximation (see Fig. 1). The left side of Fig. 1 shows an optimal boxcovering of a small graph with three different box sizes. The right side of the figure illustrates the scaling of the number of boxes \(N_B\) and the box size \(l_B\) for a fractal and a nonfractal network.
Although fractality is also defined for weighted networks (Wei et al. 2013), in this work we only focus on unweighted and undirected graphs. We also note that besides the boxcoveringbased fractal dimension, several other network dimension concepts have been proposed throughout the years, some of them are equivalent under some regularity conditions on the network (Wang et al. 2017). For a survey on fractal dimensions of networks, we refer to Rosenberg (2018, 2020).
Algorithms
The optimal boxcovering of some mathematically tractable network models (e.g. (u, v)flower, hierarchical scalefree graph, Song–Havlin–Makse model, Sierpinski network) can be determined rigorously (Rozenfeld et al. 2007; Komjáthy et al. 2019; Niu and Li 2020), however, the boxcovering of real networks cannot be studied analytically hence it must be calculated algorithmically. The boxcovering of a network is known to be NPhard (Song et al. 2007). Hence to have an algorithm of practically acceptable time complexity, one must use approximating methods. As it is usual for semiempirical methods, there are a good number of different proposals for the task, see Table 1. To give some intuitive summary, we can say that most algorithms follow a greedy strategy where the distinction between algorithms is drawn by the actual greedy decision method. However, we present a number of approaches beyond the greedy paradigm.
It is also important to mention that there are algorithms that use diameterbased boxes, while other methods use radiusbased boxes, also called balls of radius \(r_B\) around a center node c. The two approaches sometimes cause some ambiguity in the terminology.
Using radiusbased boxes require the notion of “centers” or “seeds”, which means that each box is assigned to a special, central node. While this idea is natural in \({\mathbb {R}}^n\), it may be misleading for a graph since the edges between vertices generally cannot be embedded into a Euclidean space. For example, in a box that contains a cyclic subgraph, there is no vertex that would be special by any means. The reason, however, why these nodes are called seeds or center nodes is that these nodes are the first elements of the boxes and the boxes are built around them.
General remarks
In the following part, we describe and evaluate the implemented algorithms in detail. Throughout this paper, we denote the box size by \(l_B\), the box radius (if applies) by \(r_B\), where \(l_B=2r_B+1\). However, let us note that in the literature the definition of an \(l_B\)sized box can be inconsistent. In the implementation, we define boxes such that for boxsize \({\tilde{l}}_B\) the distance between two nodes of the same box can be less than or equal to \({\tilde{l}}_B\).
In the evaluation part, we followed the widely used convention, which means that in an \(l_b\)box the distance between any two nodes is strictly less than \(l_B\). This means that the “equivalent boxsize” is \(l_B={\tilde{l}}_B+1=2 r_B +1\).
In this section, we use the less than or equal (“implementation”) convention for the algorithms. We will also provide a sketch of the pseudocode for the discussed algorithms. The aim is to foster understanding, there may be minor differences compared to the actual Python code.
As it is apparent from the definition, the boxcovering process of a network requires the ability to determine the shortest path between two nodes to be able to decide if they can be in the same box. This could be done in multiple ways, for example, by performing a breadthfirst search on the fly. However, for convenience and to avoid calculating the pairwise distances multiple times, we implemented the following approach: in the beginning, we calculate and store the pairwise shortest distances \(d(v_i,v_j)\) for all \(v_i, v_j \in V\), where V is the vertex set of the graph. This data is then used in the subsequent calculations. With this notion, we define the ball of radius \({\varvec{r_B}}\) around center \({\varvec{c}}\), which is \(B(c,r_B)=\{d(v_i,c) \le r_B ~~ v_i \in V\}\). This term will be used extensively throughout this paper since many algorithms operate on these balls. Note that in this work, the terms graph and network are used interchangeably.
Greedy coloring (GC)
The problem of boxcovering can be mapped to the famous problem of graph coloring (Song et al. 2007). Therefore, a graph coloring algorithm can be utilized to solve the boxcovering problem. The idea is the following: let us consider the auxiliary graph of our original network, which consists of the same vertices and “auxiliary edges”. This means that two vertices are connected by an edge in the auxiliary graph if and only if their distance in the original network is greater than \(l_B\), which means that they cannot be in the same box. The idea is illustrated in Fig. 2, moreover, the pseudocode is detailed in Algorithm 1.
Once we construct the auxiliary graph for a given \(l_B\), we perform a graph (vertex) coloring on the auxiliary graph, i.e., we assign colors to the vertices of the auxiliary graph such that (1) adjacent vertices cannot have the same color, (2) and we seek to use the least number of colors. This problem is equivalent to the boxcovering of the original network since the assigned colors in the auxiliary graph correspond to the assigned boxes in the original network. The vertices of the same color in the auxiliary graph are at most \(l_B\) far away from each other, hence they form a box in the original network. Moreover, the minimum number of colors required to color the vertices (the chromatic number) of the auxiliary graph equals the minimum number of boxes needed to cover the original graph.
Unfortunately, the complexity of the graph coloring problem is NPhard. A wellknown approximating algorithm is greedy coloring. This algorithm consists of two main steps (Kosowski and Manuszewski 2004):

1.
Order the nodes by some method

2.
Iterate over the above sequence: assign the smallest possible color ID to every node
The schematic way the greedy coloring boxcovering algorithm works is presented in Algorithm 2.
The algorithm is completely welldefined if the strategy, i.e., the ordering method is specified. In this work, we used a random sequence. Even though more advanced methods exist, we think that this naive approach serves as a great baseline for the other algorithms.
Our implementation relies on the greedy coloring implementation of the networkx package (Hagberg et al. 2008) and in our Python package, we made it possible to select any other builtin strategy.
Li et al. (2017) introduced a related boxcovering algorithm, which uses a socalled maxmin ant colony heuristic optimization method to color the vertices of the auxiliary graph.
While in this work we focus on unweighted networks, to be comprehensive, let us note that there are a few boxcovering methods, that aim to solve the boxcovering problem by assigning weights to the edges of an originally unweighted network. For example, Zhang et al. (2016) proposed a greedy coloring method where the construction of the auxiliary graph is different. They adopted Coulomb’s Law to assign repulsive force, i.e., weights to the edges, which was motivated by the observation that in real fractal networks hubs are less likely to be connected (Song et al. 2006), however, there are some counterexamples as well (Kuang et al. 2015; Nagy 2018). The construction of the auxiliary graph hence is based on the weighted shortest paths, called smallest repulsive force paths, and not on the original shortest paths. Recently, Gong et al. (2020) introduced a deterministic boxcovering algorithm, which is a modification of the algorithm of Zhang et al., namely it starts the coloring with the highdegree nodes.
Random sequential
The random sequential algorithm was introduced by Kim et al. (2007) as one of the first approximating boxcovering algorithms and similarly to the algorithms that were proposed algorithms that were proposed by Song el al. (2007), it also uses the idea of burning (breadthfirst search). Burning means that the boxes are generated by growing them from one randomly selected center (or seed) vertex towards its neighborhood, see Fig. 3. Moreover, once some nodes have been assigned to a box, they are “burned out”.
In every step, an unburned center node c is randomly chosen, and then the ball of radius \(r_B\) is formed around c, more precisely, the algorithm selects those unburned nodes that are at most \(r_B\) far from the center node c. These newly burned nodes together form a new box. Note that in the original paper, the center node is selected from the whole set of nodes V, yet we modified it to select it from the uncovered set of nodes. The authors argue that in some cases, that was necessary to obtain the desired behavior, namely, they stated that if they disallow disconnected boxes, they get different results for the scaling of \(N_B\) on the graph of WWW. In a disconnected box, the vertices are not connected, but there is a path between them and the center node, which is however not a member of the box because it has been burned already.
One year later, Gao et al. (2008) proposed a socalled rankdriven boxcovering algorithm, which is a computationally more efficient version of the random sequential algorithm. Zhang et al. (2017) proposed a modified version of the random sequential algorithm, where the seeds of the firstly selected boxes are the nodes with the highest degrees, and it forces that the largest hubs are in different boxes. The authors also compare their algorithm to the original random sequential method, and a socalled PBC variant of the RS, which selects always the highest degree nodes as seeds.
Compact box burning (CBB)
As the name suggests, similarly to the random sequential algorithm the compact box burning algorithm also uses the concept of burning. The algorithm was introduced by Song et al. (2007) together with the greedy and the MEMB algorithms. The main point is to grow boxes by picking new nodes randomly from a candidate set C that contains all nodes that are not farther away than \(l_B\) from any node that is already in the candidate set. In the end, this set C is going to form a box, and the process guarantees that the box is compact.^{Footnote 1}
Kitsak et al. (2007) introduced a simplified version of the CBB algorithm which estimates the number of boxes rather fast and it has been also used and detailed in a more recent work (Yuan et al. 2017). The modified algorithm does not construct the actual boxes, it only approximates \(N_B\) for a given \(l_B\) as follows: first initializes \(N_B\) and sets its value to zero. Then it selects a random center node c, marks the nodes of the ball of radius \(l_B\) centered on c, and finally increases the value of \(N_B\) by one. Then randomly selects another unmarked center node and repeats this process until the whole network is covered. The authors stress that this estimation of \(N_B\) is always less than the actual minimum number of boxes needed to cover the network, hence to improve the estimation they suggest performing the computation many times and then taking the maximum of the estimations which is claimed to be a better approximation of \(N_B\) and that still has a small time complexity.
Note that this algorithm could be also considered as a simplified samplingbased boxcovering method (see “Samplingbased method” section), which is a more general framework that selects the “best” boxcovering from many independent box covers generated by a simple covering algorithm.
Maximal excluded mass burning (MEMB)
The Maximal Excluded Mass Burning algorithm is the third boxcovering algorithm that was presented in the influential paper of Song et al. (2007). Instead of using \(l_B\), this method also uses the notion of radius \(r_B\) and centered boxes: every box has a special node, a center. Boxes are constructed such that every member node of the box is not farther away than \(r_B\) from the center node. The algorithm guarantees that all the boxes are connected, i.e., two nodes of the same box can always be reached with a path that is inside of the box.
The algorithm could be interpreted as an improvement of the random sequential method in some aspects but the analogy fails because the way burning is implemented is different from random sequential. It works as follows:

First, the next center is chosen on the basis of maximal excluded mass, that is the number of uncovered nodes not farther away than \(r_B\) from the center node.^{Footnote 2}

Once the next center is chosen, all uncovered nodes within \(r_B\) are covered, but not yet assigned to boxes.

Finally, after every node is covered, noncenter nodes are assigned to centers in a way that the resulting boxes are connected.
The pseudocode of the MEMB algorithm is presented in Algorithm 4.
Figure 4 helps to understand the reason why boxes are only formed in the end and not burned on the fly. The authors’ motivation was that in scalefree networks, where there are a few hubs, the hubs should be selected as the center of the boxes, otherwise the tiling of the network is going to be far from the optimal case. That is why the algorithm first selects centers and then assigns the remaining nodes to them.
Ratio of excluded mass to closeness centrality (REMCC)
The REMCC boxcovering algorithm has been introduced by Zheng et al. (2016), and it can be regarded as a modification of the MEMB algorithm. Both algorithms rely on excluded mass, but it also considers the ratio of excluded mass to closeness centrality (REMCC) to select the center nodes.
In every step, a new center is chosen from the uncovered set of nodes such that the chosen node has the maximal f score, which is a novel metric in the paper. The f score is defined as the ratio of the excluded mass and closeness centrality or in other words, it is the product of the excluded mass and the average length of the shortest paths to all other nodes. The authors argue that the reason why they consider the closeness centrality in the selection of the center nodes is that if we choose a central (important) node of the network as a center (seed) of a box, then eventually more boxes will be needed to cover the network. After the center node is selected, all nodes in the \(r_B\) ball of the center are covered. In this procedure—in contrast to the MEMB algorithm—centers are selected from the uncovered set of nodes.
The steps of the REMCC boxcovering algorithm are detailed in Algorithm 6. Note that in the current implementation, the algorithm does not return the formed boxes, only the centers are determined, however, after the center nodes are given, the boxbuilding method of the MEMB algorithm can be applied.
MCWR
Recently, Liao et al. (2019) proposed an algorithm, called MCWR, which is a combination of the MEMB and the random sequential (RS) algorithms. Their goal was to create an algorithm that has the accuracy of the MEMB and the fast speed of the random sequential algorithm. In addition, to reduce the time complexity of the MEMB algorithm, a new way of keeping track of the excluded mass is proposed.
The authors argue that due to the excludedmassbased selection of the central nodes, the MEMB algorithm has high accuracy but also high time complexity. Since the random sequential algorithm selects the center nodes randomly, it is one of the fastest algorithms but it gives a very rough approximation of the optimal number of boxes.
The main idea of the MCWR algorithm is that it mixes the two ways of center node selection. More specifically, the authors introduced a parameter \(p \in [0, 1]\), which represents the mixing portion of the MEMB method in the approach of choosing a center node. Hence, before choosing a new center, a biased coin is tossed and with probability p the algorithm performs the usual MEMB steps and with probability \(1p\) it chooses a center uniformly at random.^{Footnote 3} After finding a new center, the excluded mass of the vertices is updated, but in contrast to the original MEMB algorithm, to reduce the time complexity, it only updates the mass for the nodes that are inside of the newly covered ball of radius \(r_B\). The assignment of the center nodes to the noncenter nodes, i.e., the construction of the actual boxes, is the same as in the MEMB algorithm.
Note that the setting of the mixing parameter p is indeterminate. The authors apply the algorithm with different p settings to real networks without a suggested default setting. However, it is clear that if \(p=0\), the MCWR is the same as the RS, and similarly if \(p=1\), it works like the MEMB algorithm. Therefore, the smaller the p value is, the “closer” the algorithm is to the random sequential, hence the faster and less accurate the MCWR is.
Merge algorithm (MA)
The merge algorithm (MA) has been introduced by Locci et al. (2010), who investigated the fractal dimension of a software network using the merge algorithm, the simulated annealing, and the greedy coloring box covering algorithms.
The merge algorithm is based on the following simple idea: first, every node itself is a box (the authors refer to the boxes as clusters), and then for \(l_B>0\) the boxes are formed using a successive aggregation approach, i.e., two boxes are merged if their distance is at most \(l_B\), more precisely, if the size of the union of the boxes is still at most \(l_B\). Thus, to perform the boxcovering of a network with box size \(l_B = k+1\), the Merge algorithm uses the previous results, i.e., the cover of the network with \(l_B = k\) sized boxes. The pseudocode of the merge algorithm is detailed in Algorithm 8. Note that Locci et al. refers to the boxes as clusters, that is why in the code they are denoted by c.
Simulated annealing (SA)
The Simulated Annealing (SA) boxcovering algorithm has also been introduced by Locci et al. (2010). Generally, simulated annealing is a metaheuristic technique that was inspired by the annealing in metallurgy and it is used in optimization problems for approximating the global optimum in a large (typically discrete) search space, hence it can also be applied to approximate the minimum number of boxes needed to cover a network. In the simulated annealing context, the state of the physical system is the box covering of the network and the “internal energy” of the state is the number of boxes \(N_B\).
In the simulated annealing process, several states, i.e., coverings are checked, and a new neighbor state \(S'\) of the current state S is created using the following three operations: (1) moving a single node from one box (with at least two nodes) to another if the size of the extended box is still less than \(l_B\), (2) creating new box by excluding a node from a box, and (3) merging boxes using the merge algorithm (see Algorithm 8).
After performing these steps in the above sequence, the internal energy \(E(S')\) of the new state \(S'\), i.e., the new approximation of the number of boxes is checked, and if \(E(S') \le E(S)\) then the algorithm continues with the new configuration. However, if the new boxing is worse than the previous one, i.e., \(E(S')>E(S)\) then with probability \(p= \exp \left( \frac{\Delta N_B}{T}\right) = \exp \left( \frac{E(S')E(S)}{T}\right)\) it is still accepted. Note that at each iteration, the system is cooled down, which means that the probability p of accepting a worse covering is reduced: \(T'=T\cdot c\), where \(c<1\) is the cooling constant parameter.
We introduced several modifications in the implementation compared to the original paper. First, the operations (1) and (2) are rather vaguely defined in the paper. To be able to perform these operations, it must be ensured, for example that after the removal of a given node, the original box would remain nonempty. Thus, the changes compared to the paper of Locci et al. (2010) are as follows:

Moving nodes we only try to move nodes into neighboring boxes to spare iterating over all nodes when checking the distance (\(l_B\)) condition. Moreover, instead of ensuring that \(k_1\) movements are performed, we perform \(2 \cdot k_1\) trials, which may fail if for a randomly chosen box we cannot move any additional node from the neighbor boxes. If \(k_1\) movements are successfully performed, the process is terminated.

Creating new boxes we proceed in an analogous manner, we perform at most \(k_2\) trials on creating new boxes: a random box is chosen and if it has at least two nodes then a random node of this box is removed and that node forms a new box on its own. If \(k_2\) creations are successfully performed, the process is terminated.

Merging boxes as opposed to the original paper (Locci et al. 2010), in our implementation this step is performed before evaluating the energy of the new state, i.e., the number of boxes are counted after the merge procedure is also done.
Our implementation of the simulated annealing boxcovering algorithm is detailed in Algorithm 9.
Zhou et al. (2007) proposed an edgecovering method, where the covering is performed with the simulated annealing optimization. Clearly, an edgecovering approach automatically covers the nodes as well, but the estimated number of boxes is greater than or equal to the number of boxes returned by a nodecovering method since in the edgecovering method some nodes may be covered multiple times. Thus, the edgecover method also estimates a different boxdimension of the network.
Overlappingboxcovering algorithm (OBCA)
The overlappingboxcovering algorithm was introduced by Sun and Zhao (2014). As the name of the algorithm suggests, the novelty of this method is that instead of partitioning the nodes, it uses overlapping boxes. The authors claim that this technique yields a more robust estimation of the number of boxes required to cover the network because separated boxes are prone to randomness. The authors suggest that instead of burning boxes on the fly, one should only mark possible boxes while processing the data and then choose the final boxing in the end.
The algorithm proceeds by first only creating box proposals, during which possible center nodes are iterated in ascending order with respect to the degree.

A node is a possible center if it is uncovered yet. The algorithm starts with the smalldegree nodes and largedegree nodes are checked at last.

In a “proposed box”, those nodes are included whose distance from each other is at most \(l_B\). They are chosen from nodes whose distance from the center is at most \(l_B\).

Once a proposed box is formed, the “covered frequency” of all nodes belonging to the newly proposed box is increased by one. The covered frequency of a node denotes how many overlapping proposed boxes contain it.
The final step of the algorithm is the revision of the proposed boxes. A box is called “redundant” if it only contains nodes that are also contained by other boxes, i.e., the covered frequency of all the nodes in a redundant box is larger than 1. In the last step, the redundant boxes are deleted and the covered frequency of the nodes of the recently removed box is decreased by 1. After the iteration is over, only nonredundant boxes remain. The detailed pseudocode of the overlappingboxcovering method is described in Algorithm 10.
In a recent work, Zheng et al. (2020) proposed a modification of this algorithm, which they refer to as the improved overlapping box covering algorithm (IOB). The authors argue that the algorithm could achieve better results if it would rank and sort the nodes according to the excluded mass of closeness centrality instead of the degree.
Differential evolution (DE)
The differential evolution (DE) boxcovering algorithm has been introduced by Kuang et al. (2014). In general, differential evolution is also a metaheuristic optimization method that belongs to the class of evolutionary algorithms, and it does not require the optimization problem to be differentiable since it optimizes a problem by iteratively trying to improve a candidate solution.
The proposed differential evolution boxcovering algorithm uses the deterministic sequential greedy coloring algorithm such that the coloring sequence of nodes is represented by an Ndimensional vector, where N is the size of the network. The vector encoding of the different sequential greedy coloring procedures transforms the optimization problem into an Ndimensional space, which makes it possible to use the differential evolution paradigm.
Similarly to the simulated annealing, the DE algorithm also performs some operations on the population of these vectors to generate new possible solutions. Namely, there are two operations: mutation and crossover. In the mutation process, new vectors are created using randomly chosen three existing vectors. Moreover, to further increase the diversity of the set of examined solutions, the crossover operation generates new random vectors by randomly mixing the coordinates of the existing vectors and the newcomer vectors that were created in the mutation process. At the end of each iteration, the best solution is saved. The algorithm is detailed in Algorithm 11.
Particle swarm optimization (PSO)
A boxcovering method using a heuristic optimization method called discrete Particle Swarm Optimization was presented by Kuang et al. (2015). The authors argue that the differential evolution algorithm (DE), introduced in their previous work (Kuang et al. 2014), has two main drawbacks that can be improved by the PSO algorithm. First, the DE algorithm has a continuous search space which increases the computational complexity. Moreover, it extensively uses the greedy algorithm which increases the time complexity.
To be able to use the PSO optimization method, the boxcovering problem has to be encoded in a discrete form using the position and velocity of socalled “particles”. A particle represents a valid boxing of the network, more precisely, if the size of the network is N, then the position of the particle is an Ndimensional vector \(X = (x_1, \ldots , x_N)\) where the ith coordinate \(x_i\) denotes the ID of the box where the ith node belongs to, moreover \(x_i \in {1, 2, \ldots , N}\). The velocity of a particle is an Ndimensional binary vector \(V = (v_1, \ldots , v_N)\) where \(v_i\) indicates whether the ith node is ready to change its box, i.e., the value of \(x_i\) can be changed.
The algorithm operates with a set (swarm) of particles and in every step, each vector (particle) may be updated depending on its velocity, its most optimal boxing, the whole swarm’s best boxing, and on random variables as well. In the end, the best overall boxing is returned. The PSO algorithm is detailed in Algorithm 12. Note that we defined some auxiliary functions and operators before the actual algorithm. Unfortunately, the \(\oplus\) operator is vaguely defined in the original paper, but we believe that the one below is the most meaningful interpretation of it.
In a followup paper, the authors propose a modification of the PSO algorithm (Wu et al. 2017), called multiobjective discrete particle swarm optimization (MOPSO) boxcovering algorithm, which aims to solve two optimization problems simultaneously. Besides minimizing the number of boxes required to cover the network, the algorithm maximizes the fractal modularity (Gallos et al. 2007) defined by the boxing, which was motivated by the observation that fractal networks have a highly modular structure (Song et al. 2006). The pseudocode of the MOPSO boxcovering algorithm is almost the same as the PSO. The only difference is that in the last part of the code, where it checks whether the current solution is better than the population and global best, it is not enough to check the number of used boxes but a better solution is also required to have a higher modularity (Wu et al. 2017).
Fuzzy algorithm
The fuzzy boxcovering algorithm and the corresponding concept of fuzzy fractal dimension were introduced by Zhang et al. (2014). The authors propose a novel scheme for estimating the fractal dimension of a network. Instead of assigning boxes, they introduce a measure to estimate the fraction of the network one box covers on average. For each node, a box of radius \(r_B\) around a central node is constructed and the contributions of the nodes of the box are summed. This contribution is a socalled “membership function” that exponentially decays with the distance from the central node. After aggregating and normalizing these contributions, we get an estimation of the proportion of the network that a box covers on average. Taking its inverse gives the approximating box number.
It must be noted, however, that in our experience this approximating number of boxes is not meaningful, only the regressed \(d_B\) fractal dimension may be of practical interest. Pseudocode of the fuzzy boxcovering method is presented in Algorithm 13. Note that our pseudocode is slightly different from the code presented in Zhang et al. (2014) because we assumed that the networks are undirected, hence it is enough to calculate the distance between \(v_j\) and \(v_k\) only once.
Samplingbased method
Recently, Wei et al. (2019) proposed a novel way to tile a network, that could be considered as an “advanced version” and extension of the overlappingboxcovering algorithm, however, the authors did not compare it to the OBCA algorithm. Note that this proposal of Wei et al. is rather a framework than a particular algorithm.
There are two main stages in the covering process: the first step is the generation of many box proposals, for example by running the random sequential or CBB algorithms—n times. In the second phase, the authors suggest picking some of the proposed boxes in a greedy manner to tile the network. Obviously, a particular realization of the covering is defined by the employed algorithm, since the final cover consists of the boxes that the greedy strategy selected from the box proposals.
Besides CBB and random sequential, the authors proposed a socalled maximal box sampling strategy for sampling box proposals which is described in Algorithm 14. Wei et al. also proposed two greedy strategies: bigbox first and smallbox removal. These procedures are detailed in Algorithm 15. The authors show that the smallboxremoval sampling considerably outperforms the bigboxfirst strategy and classical algorithms such as MEMB and CBB.
Further methods
Note that there are a few algorithms that are not implemented in our Python package yet, but for the sake of completeness, we briefly introduce these methods in this section.
Schneider et al. (2012) introduced a boxcovering algorithm that is usually referred to as minimalvalue burning (MVB) algorithm in the related works. Their algorithm first creates a box around every node, and then it removes the unnecessary boxes. Although their algorithm is said to be nearly optimal, it comes at a price: its computational complexity is high, i.e., for regular networks it scales exponentially with the number of nodes.
Akiba et al. (2016) introduced a sketchbased boxcovering algorithm, which uses bottomk minhash sketch representation of the boxes and it is based on the reduction of the boxcovering problem to a setcovering problem. The authors compare their algorithm to the GC (Song et al. 2007), CBB (Song et al. 2007), MEMB (Song et al. 2007), and the MVB algorithm (Schneider et al. 2012). Akiba et al. also made their implementations of these algorithms publicly available, which can be found at http://git.io/fractality.
Recently, Giudicianni et al. (2021) proposed a communitystructurebased algorithm that can be used for networks with uniform degree distribution, i.e., where the nodes have roughly the same amount of connections such as in infrastructure networks (e.g., road, electrical grid, and water distribution networks).
Note that in this work we do not touch upon the concept of multifractality, but for the sake of completeness we mention that the sandbox algorithm, introduced by Tél et al. (1989), can be used to estimate the multifractal dimension of networks (Liu et al. 2015).
Network data
We have tested the implemented algorithms on numerous realworld networks, many of which are already known from the related literature (see e.g., Song et al. 2005, Wu et al. 2017, Deng et al. 2016). The analyzed networks are listed in Table 2.
Some of the considered networks are directed or contain more than one connected component. Since boxcovering algorithms are developed for undirected and connected graphs, our policy was to connect nodes with an undirected edge if there was a link between them in any direction, moreover, we worked with the largest connected component of unconnected networks. We also remark that there were networks containing loops but we believe that they do not have any effect since any node has 0 distance from itself.
We summarize some simple structural features of these networks in Table 3. Besides the usual basic metrics, the value calling for more explanation is the GINIscore. It was introduced by the Italian statistician and sociologist Corrado Gini to quantify wealth inequality in society. This motivated the use of the metric since we wanted to account for the ’inequality of degree distribution’ among the vertices of the network. In our work, the GINIscore is defined as follows:
where \(k_i\) stands for the degree of the ith node, N is the number of nodes and the sum in the numerator runs over the nodes sorted by their degree in ascending order.
Note that formula (1) gives 0 for “total equality” (all vertices have the same degree) and bounded by \(1+1/N\), that is practically 1 for large networks.
We note here that the clustering coefficient was calculated with the builtin networkx.average_clustering method with default arguments. The modularity was calculated from a partition with the GirvanNewman method (see girvan_newman in networkx with default arguments). To calculate the modularity, we used quality.modularity from networkx with weight=None.
Evaluation
In this section, we turn to the evaluation and comparison of the implemented algorithms on the networks. Before starting the investigations, the reader is reminded that this is the point where we return to the evaluation convention for box sizes, see the introduction of “Algorithms” section. The difference between the two conventions might seem very minor and some authors argue that the particular definition has no effect on the fractal scaling, however, Rosenberg (2020) emphasizes that it can indeed make a large difference. Thus, it makes it essential for the evaluation part—especially for the box dimension approximation—to return to the more frequently used convention on the box size.
Preliminaries
Here we describe the boxing process we applied in our experiments. It is presented in a pseudocode format (see Algorithm 16), however, this pseudocode does not necessarily follow the Python code strictly in all cases.
We note that for the merge algorithm, the actual process of measuring the running time is a bit more complicated since it computes \(N_B\) values for all box sizes up to a maximal value (see Algorithm 8). We recorded the execution time plus the preprocessing time for all box sizes, including \(l_B=1\). Furthermore, to avoid counting the preprocessing time multiple times, we retained the total execution time by subtracting the preprocessing time (that is the running time of the algorithm with \(l_B=1\)) from the execution time of the \(l_B\ge 2\) coverings, and finally, we summed up these “corrected” runtimes.
In the current analysis, we performed the box covering \(n=15\) times for each box size, for each network, for each algorithm. The algorithms and their parameter settings—along with their respective abbreviations—are listed in Table 4. We intended to choose the shorthand notations to be as intuitive as possible.
Comparison of the number of boxes
The most obvious way to analyze our results is to prepare \(N_B (l_B)\) plots and inspect them. In these plots, we show the mean \(N_B\) value (denoted by \({\overline{N}}_B\)) against the box size \(l_B\) for each network. We remind the reader that here, box sizes are to be understood in the evaluation convention, as detailed previously, i.e., it doesn’t matter if the algorithm is radiusbased or diameterbased, the compared boxes have the same equivalent size. To retain comprehensibility, we only plot around 5 algorithms in the same figure, where the algorithms are denoted with different colors and markers. For comparison, we included the greedy algorithm in each plot. Moreover, note that we only plotted for box sizes appearing in the greedy algorithm’s output. Figure 5 illustrates the \(N_B (l_B)\) plot for the Tokyo metro network with five algorithms, similar plots for all the other networks and algorithms are available in the supplementary material.^{Footnote 4}
Similarly to the related works (Wu et al. 2017; Schneider et al. 2012), we also plot the difference of the \(N_B\) values and the number of boxes returned by a baseline algorithm, which is denoted by \(N_{B}^{\text {base}}\). In our work, the baseline \(N_{B}^{\text {base}}\) was chosen to be the minimal (best) value returned by the greedy algorithm (remember that we ran it 15 times for each box size). With this, we plot the difference of the mean \(N_B\) and the baseline \(N_{B}^{\text {base}}\), which is denoted by \(\Delta {\overline{N}}_B\). Figure 5 shows the \(\Delta {\overline{N}}_B(l_B)\) plot for the Tokyo metro network with five different algorithms, similar plots for all the other networks and algorithms are available in the supplementary material.
Comparison with performance scores
In the following step, we assess the performance of the algorithms with a performance score, defined as the normalized deviation from the baseline—that is the best output by the greedy algorithm—formally:
Behold that the lower this score is, the better the coverage of the algorithm is. Also note that the score is defined for every boxing output, meaning that we have \(n=15\) scores for each algorithm, box size, and network. The reason behind the definition of this P performance score is that these values—expressing relative performance—can be aggregated over box sizes since they are “dimensionless”. This is a very desirable property since we want to draw some conclusions from an intimidating amount of data. There is an additional caveat though, we shall define an appropriate interval of box sizes on which we investigate performance scores. The motivation behind limiting the analysis on certain box sizes is that the performance score is not so informative in those cases when the whole network is covered with very few boxes. In practice, the tail distribution of the \(N_B\) is usually noisy, thus it is pruned from the fitting when the fractal dimension is estimated. Our criterion to consider a box size was that the baseline shall have at least ten boxes. Otherwise even if the difference between \(N_B\) and \(N_B^{\text {base}}\) is only one, the relative change compared to the value of \(N_B^{\text {base}}\) would be misleadingly large.
Following this line of thought, we also normalized the runtimes to assess the average speed of our algorithms. This is done by dividing the runtime of an algorithm by the time that was needed to calculate the \(N_B^{\text {base}}\) baseline number of boxes (coming from the output of the best greedy run). By doing this, we can get an overall speed measure for the algorithms.
At last, we are in the position to concisely define the way we compare the algorithms: we plot the mean performance scores versus the mean normalized runtimes with averaging over the accepted \(l_B\) values (defined earlier). With this, we get one plot per network where the algorithms are represented by one marker as Fig. 6 shows. To increase information content, the area of the markers is proportional to the empirical variance of the performance score (so the radius of the dots is proportional to the standard deviation). Note that the sizes of markers on the plots for different networks are not to be compared due to varying scaling. Due to the great differences in runtimes, we divided the plots into two sections, with the left having linear and the right having logarithmic horizontal axis (the plots join at 1.1)—see Fig. 6.
The abbreviated name of the algorithms is written next to their corresponding marker. As a general rule, if the marker is barely visible due to the small standard deviation, the labels give guidance about the markers’ location. There are some cases, where this would lead to ambiguity, which is avoided by arrows pointing to the position of the marker. Due to the extremely long running time, we had to terminate the simulated annealing and PSO algorithms on the E. coli network. Hence, these data points are missing from the set but we can confidently say that their absence does not alter our conclusions. The results on the Minnesota road network and dolphin social network are depicted in Fig. 6, similar figures for all the remaining networks are available in the supplementary material.^{Footnote 5}
Finally, we conclude this section by comparing performance on multiple networks on the same plot. We chose the following real networks: Minnesota road network (min), Tokyo metro (tok), computer science Ph.D.’s collaboration network (phd), A. fulgidus network (ful), and E. coli cellular network (eco). The reason why we chose these networks is that the number of accepted box sizes was more than one. To make the figures clean, we formed three groups of the algorithms and plotted these groups in separate graphs, the results are shown in Fig. 7. For comparison, the results of the greedy algorithm are always shown. Although we stress that this investigation is insufficient for deciding which algorithms are “the best”, we can observe some patterns that will allow us to propose general conclusions in “Discussion and conclusion” section.
Remark about variances
In the analysis so far, we used the variance of the P performance score on the acceptance region, which is determined by the number of boxes in the corresponding baseline value. One shall notice that in general, this deviation can come from two sources. First, the intrinsic variance of the algorithm, which is the uncertainty of the outcome for a fixed box size (on a given network). The second possible source is that in the acceptance range the average performance of the algorithm varies with respect to the baseline value.
In the plots so far, we accounted for both types of variances, since we considered the variance of all the P scores in the acceptance region. However, it would be also informative to assess the intrinsic variance too, since our baseline is just another approximating algorithm, even if it is an established one. This comparison is done in Table 5 where the mean intrinsic standard deviations and the total standard deviation of the P performance scores are reported (considering scores only for the accepted box sizes). It is interesting to see that the “volatile” algorithms depicted in the third subplot of Fig. 7 behave differently through this lens: for example, the intrinsic deviation is often much smaller than the total deviation for the merge algorithm and especially for the REMCC, however, in the case of the random sequential, they are much closer to each another. Hence the readers should behold the difference between the notions of intrinsic and total deviations and use the appropriate one for their purpose.
Approximating the box dimension
As a final step in the evaluation, we aim to estimate the fractal dimension of the investigated networks. Here we returned to the mean \(N_B\) values for each algorithm, and we did not impose the acceptance criterion for the \(l_B\) box sizes for this analysis.
We plotted the logarithm of the average \(N_B\) versus the logarithm for \(l_B\) and tried to fit a linear function to it. This seemingly easy task involved a lot of subjective judgments on whether the relationship could be called linear and on what range of box sizes shall we perform the regression and if there are enough points on the plot to be able to make a confident statement. Behold that fitting linear functions by consulting the plot and adjusting the setup if necessary is a prerequisite for having meaningful results. In practice, the \(\log (N_B)\log (l_B)\) plot is mostly not linear on the whole range. Generally speaking, the characterization of power laws in empirical data is cumbersome, since the tail of the distribution is usually unreliable due to large fluctuations, furthermore, the identification of the range, where the powerlaw relation holds is difficult (Clauset et al. 2009).
In this experiment, there may be three outcomes: 1) the fit is performed and the relationship is found to be linear, 2) it is realized that the plot is not “linear enough”, or 3) the fit was not possible to carry out (missing or too few points: mouse brain (mou), and E. coli (eco) networks). In addition to the estimated fractal dimension, we also accounted for the error of the fit (sum of squared errors) with the following expression:
where x and y stand for the \(\log (l_B)\) and \(\log (N_B)\) values, respectively. The numerator is the sum of squared residuals of the fit in the denominator, \(\bar{x}\) is the mean of x values, n is the number of data points in the fit. Due to the subjective nature of the experiment, the first two authors have performed this fitting procedure independently and then compared the results. Numerical values are reported in Tables 6 and 7.
Discussion and conclusion
In this final section, we summarize our observations and point out some directions our analysis could be extended.
Comparison of algorithms
We compared the algorithms primarily based on their P performance scores that measure relative performance to the baseline values (the best result of the greedy coloring algorithm). The main tool of comparison is to plot the mean P scores against the average relative runtime with respect to the baseline for networks with sufficiently large diameters. The radius of the markers is proportional to the standard deviations of the P performance score. Firstly, the P scores and runtimes shall be considered and the standard deviations should be considered only as a secondary feature due to the multiple sources of variance.
The results shown in Figs. 6 and 7 might allow us drawing the following conclusions. First, it should be noted that there are many algorithms that turned out to be way too slow on the analyzed networks: differential evolution (DE), particle swarm optimization (PSO), sampling with maximal box sampling, and simulated annealing (SA). We must also note that these methods yield relatively low box numbers (which is favorable) but the price for this seems to be too heavy. It is also interesting to note that three of these methods (DE, PSO, SA) are metaheuristic algorithms with several hyperparameters. We followed the instructions of the original papers to set the parameters but it seems that tuning the hyperparameters has a high effect on the results and it might be troublesome.
Our results are congruent with that of the related works, for example, Locci et al. (2010) reported the running time of the greedy coloring, merge, and simulated annealing algorithms, and their results also show that the order of magnitude of the runtime of the SA algorithm (1177 s) is twice as much as that of the GC (13 s) and the merge algorithm (21 s) on the E. coli network. Furthermore, Akiba et al. (2016) reported that the MEMB algorithm is faster than the greedy coloring and the CBB algorithms, however, in our experiments the difference between the time complexity of the CBB and MEMB algorithm was smaller.
Secondly, there is a group of relatively inaccurate methods as random sequential, REMCC, merge, and sampling with random sequential. Although these algorithms have acceptable runtimes, they fail to have good performance consistently.
The third group is which may be called “the most desirable” according to our criteria, that consists of the MCWR, OBCA, MEMB, and CBB algorithms. These algorithms are quite decent both in terms of speed and accuracy. Note that OBCA is the most accurate in this group but it has sometimes a relatively long running time, and in its current implementation it is not applicable if one is also interested in the created boxes, however, a valid nodebox assignment could be done easily. In some sense, the greedy coloring algorithm also belongs to this third group but it is usually slightly slower than the other members of this group. From Figs. 6 and 7 we can observe that the performance of the MEMB and the greedy algorithms are very similar, which has been also shown by Wu et al. (2017).
From Fig. 7 and Table 5, it is apparent that the random sequential and the REMCC algorithms have the highest variance in the performance scores, Moreover, the RS algorithm has also high intrinsic variance that has been also pointed out by Song et al. (2007).
One may be tempted to draw some general conclusions about the relation between the structure of the network and the performance of the algorithms, but it is a very challenging task considering the limited number of analyzed networks. However, without going into details about the qualitative behavior of the algorithms, we can notice that the “fast but inaccurate” random sequential and merge algorithms achieve one magnitude lower performance scores on the Minnesota road network than on the C. elegans network. We speculate that this may occur because the road network has concentrated degree distribution (most of the nodes have 2–4 neighbors), which is also shown by the low GINI score (see Table 3), whereas in the C. elegans network, the degree distribution is much more uneven (higher GINI score).
Comparing the estimated fractal dimensions
As estimating the fractal dimension is one of the main points of boxcovering algorithms, we also investigated what fractal dimensions the various algorithms yield on the investigated networks. Tables 6 and 8 suggest, that the dimension of the fractal networks is typically between 1.5 and 3.5. For example, the dimension of the Tokyo metro network is around 1.5, which makes sense, since the metro network is a composition of path graphs, however, at the transfer stations, these onedimensional graphs are joined, which increases the fractal dimension of the network. On the other hand, clearly, a metro network does not contain as many junctions as the Minnesota road network, whose fractal dimension is around 2.0, as one would expect from a gridlike network.
We can observe that the estimated fractal dimension varies with the applied boxcounting algorithm significantly. For example, on the phd network it ranges from 1.8 (REMCC) to 2.5 (merge) at the first experimenter and from 2.0 (REMCC) to 2.4 (merge) at the second experimenter. Similarly, the estimated fractal dimension of the Minnesota road network ranges from 1.6 (REMCC and SM) to 2.1 (merge) at the first experimenter and from 1.6 (SM) to 2.2 (DE and OBCA) at the second experimenter. Interestingly, the dimension estimated using the merge algorithm is generally much higher than the dimension resulted from the other algorithms. It is due to the fact that for small \(l_B\) values the merge algorithm performs quite poorly but for larger \(l_b\) values its performance increases, see Fig. 8.
In related works, the reported dimensions are close to our approximations. However, we found that the estimated fractal dimension not only depends on the applied algorithm but also on the way the regression is carried out, especially when the diameter of the network is small. For example, our first experimenter found that the \(d_B\) dimension of the dolphin network is around 1.8, which is in alignment with the findings of Zheng et al. (2016) who found that the dimension is 1.86 using the MEMB algorithm. Deng et al. (2016) also reported similar values for dolphin network estimated by the MEMB, CBB, and greedy coloring algorithms: \(d_B=1.59\), \(d_B=1.90\), and \(d_B=1.83\), respectively. On the other hand, the estimated \(d_B\) of the dolphin network according to our second experimenter is between 2.3 and 2.4, which is congruent with the result of Rosenberg (2020), who reported a dimension of 2.38. Hence, we can conclude that in the literature the reported fractal dimensions of the networks, especially of the small ones, are subject to the experimenters’ subjective views, more specifically, what range of \(l_b\) values is used for fitting.
In the case of the other networks, the difference between the two experimenters is not so significant, however, the first experimenter’s estimated values are usually below that of the second experimenter, which is probably due to the fact that the second experimenter fitted the line on a smaller range of \(l_B\) values. This is also the reason why there are many missing data in the first experimenter’s estimations.
According to our experimenters, most of the boxcovering algorithms’ results suggested that the fractal dimension of the E. coli network is around 3.5, which is close to the estimation of the related works: Zhang et al. (2014) used the greedy and the fuzzy algorithms and the estimated dimensions are \(d_B =3.54\) and \(d_B=3.54\) respectively. Similarly, Sun and Zhao (2014) reported \(d_B=3.47\) and \(d_B=3.35\) for the E. coli network based on the CBB and OBCA algorithms. Likewise, Locci et al. (2010) used the merge, the simulated annealing based, and the greedy coloring algorithms, and their estimations for the E. coli network are \(d_B=3.57\), \(d_B=3.47\), and \(d_B=3.44\) respectively. Finally, Deng et al. (2016) used the MEMB, CBB, and the greedy coloring algorithms and the corresponding estimated fractal dimensions for the E. coli network are \(d_B=2.95\), \(d_B=3.44\), and \(d_B=3.01\).
Sun and Zhao (2014) also estimated the fractal dimension of the C. elegans network with the OBCA and the CBB algorithms: \(d_B=2.99\) and \(d_B=2.95\), which are also close to the estimations of our experimenters, which is around 3.0.
While the first experimenter did not find the estimation eligible for the Polbooks network, according to our second experimenter, its box dimension is around 2.4, which is also in alignment with the findings of Deng et al. (2016), who reported the following fractal dimension values for the Polbooks network approximated by MEMB, CBB, and the greedy coloring algorithm: \(d_B=1.85\), \(d_B=2.29\), and \(d_B=2.27\), respectively.
Note that the Facebook social network and the brain network could not be considered fractal networks, since the \(N_B\) decays rather exponentially with the size of the boxes, and the estimated dimension would be above 5 in these networks.
The related works do not report the error of the regression analysis, however, we believe that to gain a better understanding of the goodnessoffit of the line, it is also important to measure the SSE values, which are shown in Tables 7 and 9. We can observe that these SSE values are relatively large that is due to the small number of observations, especially in the case of the second experimenter (Table 9). These results also support the fact that the exact choice of the range of the \(l_B\) values where the linear regression is carried out, significantly influences both the value and the error of the estimated fractal dimension. We argue that the impact of the range on estimating the dimension might be greater than the impact of the applied boxcovering algorithm itself, especially in the case of small networks. Unfortunately, there is no canonical method for determining the appropriate range where the fractal scaling holds, which calls for further research.
Limitations and future work
In this review, we attempted to be as comprehensive as possible, but the dynamic improvements in the field of fractal networks and boxcovering algorithms make it hardly possible to be fully comprehensive. However, since our implementation is open source, one can easily integrate novel algorithms into our package.
It is also fair to acknowledge that our analysis contains some arbitrary decisions. For example, the number of repetitions at each \(l_B\) or the way we defined the acceptance region for box sizes might seem arbitrary. We believe, however, that for a meaningful comparison with a comprehensible performance measure, the aggregation of the results based on some arbitrary decisions is inevitable.
We only reported on the total variance of the G performance scores of the algorithm, but one can argue that in some situations the intrinsic variation is more informative to use. Furthermore, we assessed the runtime of the algorithms by averaging the normalized runtimes. In this setting, the relative runtimes have the same ’weight’ for each box size what we believe is desirable but one could be more interested in the cases where the running time is quite long and not so much in the “easy and fast” cases.
Due to the shortcomings of the evaluation framework, this study alone is by no means authorized to give a final verdict on the algorithms. We believe that the proposed framework together with the opensource code base is an important contribution to the community and it can serve as a starting point for future investigations. To gain a better understanding and make a more confident judgment on the performance of the algorithms, a higher number of networks from various domains could be used, perhaps together with more illuminating performance measures.
Moreover, another interesting further direction of research is to study boxcovering algorithms on mathematical network models.
Availability of data and materials
The datasets analyzed in this study and the algorithms implemented in Python are publicly available at the following GitHub repository: https://github.com/PeterTKovacs/boxes.
Notes
Roughly speaking, we cannot add any more nodes.
Including the center node as well, if it is uncovered yet. It is also possible to have a covered node as the next center.
Here, the choice is made such that covered nodes except the ones with \(m_{ex}=0\) are allowed.
Abbreviations
 RS:

Random sequential
 GC:

Greedy coloring
 MA:

Merge algorithm
 CBB:

Compactbox burning
 MBC:

Modified box counting
 MEMB:

Maxexcluded mass burning
 REMCC:

Ratio of excluded mass to closeness centrality
 ECSA:

Edgecovering with simulated annealing
 SA:

Simulated annealing
 DE:

Differential evolution
 PSO:

Particle swarm optimization
 MOPSO:

Multipleobjective particle swarm optimization
 ACO:

Ant colony optimization
 OBCA:

Overlapping boxcovering algorithm
 IOB:

Improved overlapping boxcovering
 MVB:

Minimalvalue burning
 SM:

Samplingbased method
 CL:

Coulomb’s Law
 DBCA:

Deterministic boxcovering algorithm
 COM:

Communitystructurebased
 Abbr:

Abbreviation
 Ref:

Reference
 phd:

CSPhd network
 cel:

C. elegans metabolic network
 soc:

Caltech36 social network from Facebook
 ful:

A. Fulgidus cellular network
 pol:

Polbooks network
 dol:

Dolphins social network
 mou:

Mouse brain network
 min:

Minnesota road network
 eco:

E. coli cellular network
 tok:

Tokyo metro network
 SSE:

Sum of squared errors
References
Akiba T, Nakamura K, Takaguchi T (2016) Fractality of massive graphs: scalable analysis with sketchbased boxcovering algorithm. arXiv:1609.07994
Chen J (2017) Tokyo metro. https://github.com/onlyuser/tokyometro
Clauset A, Shalizi CR, Newman ME (2009) Powerlaw distributions in empirical data. SIAM Rev 51(4):661–703. https://doi.org/10.1137/070710111
Deng Y, Zheng W, Pan Q (2016) Performance evaluation of fractal dimension method based on boxcovering algorithm in complex network. In: 2016 IEEE 20th international conference on computer supported cooperative work in design (CSCWD), pp 682–686. https://doi.org/10.1109/CSCWD.2016.7566071
Falconer K (2004) Fractal geometry: mathematical foundations and applications. Wiley, Hoboken
Gallos LK, Song C, Havlin S, Makse HA (2007) Scaling theory of transport in complex biological networks. Proc Natl Acad Sci 104(19):7746–7751. https://doi.org/10.1073/pnas.0700250104
Gallos L, Song C, Makse H (2007) A review of fractality and selfsimilarity in complex networks. Physica A 386:686–691. https://doi.org/10.1016/j.physa.2007.07.069
Gao L, Hu Y, Di Z (2008) Accuracy of the ballcovering approach for fractal dimensions of complex networks and a rankdriven algorithm. Phys Rev E 78(4):046109. https://doi.org/10.1103/PhysRevE.78.046109
Giudicianni C, Di Nardo A, Greco R, Scala A (2021) A communitystructurebased method for estimating the fractal dimension, and its application to water networks for the assessment of vulnerability to disasters. Water Resour Manag 35(4):1197–1210. https://doi.org/10.1007/s1126902102773y
Gong F, Li Y, Zhao D, Zhang L (2020) A deterministic boxcovering algorithm for fractal dimension calculation of complex networks. In: 2020 IEEE 9th data driven control and learning systems conference (DDCLS), pp 409–414. https://doi.org/10.1109/DDCLS49620.2020.9275236
Hagberg A, Swart P, Chult SD (2008) Exploring network structure, dynamics, and function using NetworkX. Technical report, Los Alamos National Lab.(LANL), Los Alamos, NM (United States). https://networkx.org/
Huang Y, Zhang S, Bao Xl, Yao Mh, Wang Y (2019) Survey on fractality in complex networks. Recent Dev Intell Comput Commun Dev. https://doi.org/10.1007/9789811089442_78
Kim J, Goh KI, Kahng B, Kim D (2007) A boxcovering algorithm for fractal scaling in scalefree networks. Chaos (Woodbury N.Y.) 17:026116. https://doi.org/10.1063/1.2737827
Kitsak M, Havlin S, Paul G, Riccaboni M, Pammolli F, Stanley HE (2007) Betweenness centrality of fractal and nonfractal scalefree model networks and tests on real networks. Phys Rev E 75(5):056115. https://doi.org/10.1103/PhysRevE.75.056115
Komjáthy J, Molontay R, Simon K (2019) Transfinite fractal dimension of trees and hierarchical scalefree graphs. J Complex Netw 7(5):764–791. https://doi.org/10.1093/comnet/cnz005
Kosowski A, Manuszewski K (2004) Classical coloring of graphs. Contemp Math 352:1–20
Kuang L, Zheng B, Li D, Li Y, Sun Y (2015) A fractal and scalefree model of complex networks with hub attraction behaviors. Sci China Inf Sci 58(1):1–10. https://doi.org/10.1007/s1143201451157
Kuang L, Wang F, Li Y, Mao H, Lin M, Yu F (2015) A discrete particle swarm optimization boxcovering algorithm for fractal dimension on complex networks. In: 2015 IEEE congress on evolutionary computation (CEC), pp 1396–1403. https://doi.org/10.1109/CEC.2015.7257051
Kuang L, Zhao Z, Wang F, Li Y, Yu F, Li Z (2014) A differential evolution boxcovering algorithm for fractal dimension on complex networks. In: 2014 IEEE congress on evolutionary computation (CEC), pp 693–699. https://doi.org/10.1109/CEC.2014.6900383
Li D, Wang X, Huang P (2017) A max–min ant colony algorithm for fractal dimension of complex networks. Int J Comput Math 95:1–12. https://doi.org/10.1080/00207160.2017.1364370
Liao H, Wu X, Wang BH, Wu X, Zhou M (2019) Solving the speed and accuracy of boxcovering problem in complex networks. Physica A 523:954–963. https://doi.org/10.1016/j.physa.2019.04.242
Liu JL, Yu ZG, Anh V (2015) Determination of multifractal dimensions of complex networks by means of the sandbox algorithm. Chaos: An Interdiscip J Nonlinear Sci 25(2):023103. https://doi.org/10.1063/1.4907557
Locci M, Concas G, Tonelli R, Turnu I (2010) Three algorithms for analyzing fractal software networks. WSEAS Trans Inform Sci Appl 7:371–380
Mandelbrot BB (1982) The fractal geometry of nature, vol 1. WH Freeman, New York
Molontay R, Nagy M (2021) Twenty years of network science: a bibliographic and coauthorship network analysis. In: Gandomi A, Haider M (eds) Big data and social media analytics. Springer, Wiesbaden, pp 1–24. https://doi.org/10.1007/9783030670443_1
Nagy M (2018) Datadriven analysis of fractality and other characteristics of complex networks. Budapest University of Technology and Economics, Department of Stochastics
Newman M, Barabási AL, Watts DJ (2011) The structure and dynamics of networks. Princeton University Press, Princeton
Niu M, Li R (2020) Outsidein box covering method and information dimension of Sierpinski networks. Mod Phys Lett B 34(17):2050189. https://doi.org/10.1142/S0217984920501894
Rosenberg E (2018) A survey of fractal dimensions of networks. Springer, Cham
Rosenberg E (2020) Fractal dimensions of networks. Springer, Cham
Rossi RA, Ahmed NK (2015) The network data repository with interactive graph analytics and visualization. In: Twentyninth AAAI conference on artificial intelligence. http://networkrepository.com
Rozenfeld HD, Havlin S, BenAvraham D (2007) Fractal and transfractal recursive scalefree nets. New J Phys 9(6):175. https://doi.org/10.1088/13672630/9/6/175
Schneider C, Kesselring T Jr, Herrmann HJ (2012) Boxcovering algorithm for fractal dimension of complex networks. Phys Rev. https://doi.org/10.1103/PhysRevE.86.016707
Song C, Havlin S, Makse HA (2005) Selfsimilarity of complex networks. Nature 433(7024):392–395. https://doi.org/10.1038/nature03248
Song C, Havlin S, Makse HA (2006) Origins of fractality in the growth of complex networks. Nat Phys 2(4):275–281. https://doi.org/10.1038/nphys266
Song C, Gallos LK, Havlin S, Makse HA (2007) How to calculate the fractal dimension of a complex network: the box covering algorithm. J Stat Mech: Theory Exp 2007(03):03006. https://doi.org/10.1088/17425468/2007/03/p03006
Sun Y, Zhao Y (2014) Overlappingboxcovering method for the fractal dimension of complex networks. Phys Rev. https://doi.org/10.1103/PhysRevE.89.042809
Tél T, Fülöp Á, Vicsek T (1989) Determination of fractal dimensions for geometrical multifractals. Physica A 159(2):155–166. https://doi.org/10.1016/03784371(89)905633
Wang L, Wang Q, Xi L, Chen J, Wang S, Bao L, Yu Z, Zhao L (2017) On the fractality of complex networks: covering problem. Algorithms and Ahlfors regularity. Sci Rep 7(1):1–15. https://doi.org/10.1038/srep41385
Wei DJ, Liu Q, Zhang HX, Hu Y, Deng Y, Mahadevan S (2013) Boxcovering algorithm for fractal dimension of weighted networks. Sci Rep 3(1):1–8. https://doi.org/10.1038/srep03049
Wei ZW, Wang BH, Wu XT, He Y, Liao H, Zhou MY (2019) Samplingbased boxcovering algorithm for renormalization of networks. Chaos: An Interdiscip J Nonlinear Sci 29(6):063122. https://doi.org/10.1063/1.5093174
Wen T, Cheong KH (2021) Invited review: the fractal dimension of complex networks: a review. Inform Fusion. https://doi.org/10.1016/j.inffus.2021.02.001
Wolfram Data Repository WR (2019a) Archaeoglobus fulgidus whole network. https://datarepository.wolframcloud.com/resources/ArchaeoglobusFulgidusWholeNetwork/
Wolfram Data Repository WR (2019b) Escherichia Coli whole network. https://datarepository.wolframcloud.com/resources/EscherichiaColiWholeNetwork
Wu H, Kuang L, Wang F, Rao Q, Gong M, Li Y (2017) A multiobjective boxcovering algorithm for fractal modularity on complex networks. Appl Soft Comput 61:294–313. https://doi.org/10.1016/j.asoc.2017.07.034
Yuan C, Zhao Z, Li R, Li M, Zhang H (2017) The emergence of scaling law, fractal patterns and smallworld in wireless networks. IEEE Access 5:3121–3130. https://doi.org/10.1109/ACCESS.2017.2674021
Zhang H, Hu Y, Lan X, Mahadevan S, Deng Y (2014) Fuzzy fractal dimension of complex networks. Appl Soft Comput 25:514–518. https://doi.org/10.1016/j.asoc.2014.08.019
Zhang H, Wei D, Hu Y, Lan X, Deng Y (2016) Modeling the selfsimilarity in complex networks based on Coulomb’s law. Commun Nonlinear Sci Numer Simul 35:97–104. https://doi.org/10.1016/j.cnsns.2015.10.017
Zhang J, Zhao H, Qi W (2017) Algorithm for calculating the fractal dimension of internet ASlevel topology. In: International conference on geospatial knowledge and intelligence, pp 334–342 . https://doi.org/10.1007/9789811308963_33
Zheng W, Pan Q, Sun C, Deng YF, Zhao XK, Kang Z (2016) Fractal analysis of mobile social networks. Chin Phys Lett 33(3):038901. https://doi.org/10.1088/0256307x/33/3/038901
Zheng W, You Q, Liu F, Yang F, Fan X (2020) Fractal analysis of overlapping box covering algorithm for complex networks. IEEE Access 8:53274–53280. https://doi.org/10.1109/ACCESS.2020.2981044
Zhou WX, Jiang ZQ, Sornette D (2007) Exploring selfsimilarity of complex cellular networks: the edgecovering method with simulated annealing and logperiodic sampling. Physica A 375(2):741–752. https://doi.org/10.1016/j.physa.2006.10.025
Acknowledgements
We are grateful to Botond DivikiNagy for taking part in the implementation of the algorithms.
Funding
The research presented in this paper was supported by the Ministry of Innovation and the National Research, Development and Innovation Office within the framework of the Artificial Intelligence National Laboratory Programme. The work of M. Nagy is funded by the ÚNKP203I New National Excellence Program of the Ministry for Innovation and Technology, Hungary. The work of R. Molontay is supported by the NKFIH K123782 research grant and by the ÚNKP214II New National Excellence Program of the Ministry for Innovation and Technology, Hungary.
Author information
Authors and Affiliations
Contributions
RM has conceived the study. RM and MN reviewed the literature and collected the algorithms. PTK and MN implemented the algorithms, PTK developed the framework of the algorithms, and PTK performed the analysis. PTK prepared the original draft. MN and RM reviewed and edited the manuscript. All authors have read and agreed to the published version of the manuscript.
Authors' Information
Péter Tamás Kovács, is a Master student in mathematics at the Budapest University of Technology and Economics. He earned his B.Sc. degree in physics with highest honors.
Marcell Nagy, is Ph.D. student in applied mathematics at the Department of Stochastics, Budapest University of Technology and Economics. His research focuses on datadriven network analysis and educational data science. He is the deputy team leader of the Human and Social Data Science Lab.
Roland Molontay, is a research fellow at the MTABME Stochastics Research Group and an assistant professor of applied mathematics and data science at the Budapest University of Technology and Economics (BME). His research focuses on network theory and on datadriven educational research. He is the founder and leader of the Human and Social Data Science Lab at BME.
Corresponding author
Ethics declarations
Competing interests
The authors declare that they have no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Kovács, P.T., Nagy, M. & Molontay, R. Comparative analysis of boxcovering algorithms for fractal networks. Appl Netw Sci 6, 73 (2021). https://doi.org/10.1007/s41109021004106
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s41109021004106