Delay and Accessibility in Random Temporal Networks

Size: px
Start display at page:

Download "Delay and Accessibility in Random Temporal Networks"

Transcription

1 Delay and Accessibility in Random Temporal Networks 2nd Symposium on Spatial Networks Shahriar Etemadi Tajbakhsh September 13, 2017

2 Outline Z Accessibility in Deterministic Static and Temporal Networks Z Accessibility in Random Temporal Networks: Problem Definition Z Exact Method: Erdös-Rényi Random Temporal Networks Z Upper Bound for General Random Temporal Networks Z Lower Bound I: Clique Search Z Lower Bound II: Edge-Disjoint Path Selection Z Discretization of Continuous ON-OFF Distributions Z Numerical Experiments on Synthetic Networks Z Numerical Experiments on Real World Data Z Current Research : Accessibility in Spatio-Temporal Networks

3 Accessibility in Deterministic Static and Temporal Networks Static Networks Defined be adjacency matrix A. A n ij gives the number of paths of length n or less between vertices i and j. Accessibility matrix P n in n steps is defined as follows. 1 if A n ij % 0 P ij n v 0 if A n ij 0. Temporal Networks Defined by a sequence of adjacency matrices A 1,..., A T over T time slots. Matrix C T 4 T i 1 1 A i gives the total number of temporal paths between any two vertices. Accessibility matrix P n in n steps is defined as follows. 1 if C P T ij % 0 ij n v 0 if C T ij 0.

4 Accessibility in Deterministic Static and Temporal Networks (Cont d) Temporal Adjacency Graph t = 1 t = 2 t = Accessibility Graph Figure: Temporal Networks

5 Accessibility in Random Temporal Networks: Problem Definition Z The set vertices V r1,..., N x. Z Discrete time slots T 1, 2,... Z Probability of an edge between i and j at time t: p ij T. Z If an edge exists between i and j, e T i, j 1, otherwise e ij T 0. Z A temporal path between i and j by time T : A ij m T v m ij 0... v m ij T (where v m ij 0 i, v mij T j and vm ij t " r1,..., N x, ¾t " r1,..., T 1x). Z All paths from i to j: A ij T ra ij 1 T,..., Aij M T T x. Z Temporal path from i to j with vm ij Z B ilj T rb ilj 1,..., Bilj M T x. Z Enumerator of paths 1 ( m ( M T N T 1 T 1 l: Bilj m T.

6 Accessibility in Random Temporal Networks: Problem Definition (Cont d) Open Path A temporal path between i and j by time T denoted by A ij m T v m ij 0... v m ij T (where v m ij 0 i, v mij T j and vm ij t " r1,..., N x), is defined to be open if for any two successive pair of distinct vertices e T vm ij t v m ij t 1 1. Objective T j (or a bound for it), where P i Our goal is to find P i is the probability of at least one open temporal path between vertices i and j. T j

7 Exact Method : Erdös-Rényi Random Temporal Networks Z We assume p ij T p T, ¾i, j " V Z We start from vertex i to visit other vertices. Any vertex u at time t 1 is labeled as visited if e 1 i, u 1. Z The set of visited vertices at time T : ω T. Z The set of all vertices visited from t 1 to t T : W T. Z A vertex is labeled as visited in time T if there exist an edge between any the vertices in W T 1. Z W T 1 W T < ω T.

8 Exact Method (Cont d) T Calculation of P i j We have ω 1 B N, p 1 and ω T B N, 1 1 p T W T 1. Thefore we can conclude that: k = l 0 P W T k N l P W T 1 l k l 1 1 p T l kl 1 p T Nk N = l 1 P i» T j P j " W T P j " W T» W T l P W T l» l P W T l N 1

9 Exact Method (Cont d) V i W(t) ω(t + 1) j Figure: Node j has not been visited by time t. In time slot t 1 node j falls into the set of nodes labeled as visited.

10 Upper Bound for General Random Temporal Networks Definition A family A of subsets of K r1,..., k x is monotone decreasing if A " A and A N A A " A. Similarly, it is monotone increasing if A " A and A N A A " A. FKG-Harris Inequality Let A and B be two monotone increasing families of subsets of K and let C and D be two monotone decreasing families of subsets of K. Then for any real vector p p 1,..., p k, 0 ( p i ( p k P rp A = B ) P rp A.P rp B P rp C = D ) P rp C.P rp D P rp A = C ( P rp A.P rp C

11 Upper Bound (Cont d): Definition Theorem P i T ) 1. α ij T 1 N 5 l 1 1 α il T p lj T 1, α ij 1 p ij 1 T j ( α ij T, for all i, j " V V and any positive integer Proof Induction: T 1 α ij 1 p ij 1 ³ T 1 P i T j & α ij T P i j & α ij T 1. P i T j P M T A il m T ( α ij T m 1

12 Upper Bound (Cont d) Proof (Cont d) P M T m 1 M T P m 1 P FKG P N 1 5 P l 1 M T A il m T p lj T 1 P A il m m 1 T = rlj x A il m T = lj M T P B ilj m T 1 ( α il T p lj T 1 m 1 M T B ilj m T 1 ) 1 α ilp lj T 1 m 1 M T 1 A ij N m T 1 P m 1 l 1 M T 1 B ilj m T 1 ( m 1 M T m 1 B ilj m T 1 ( 1 N 5 l 1 1 α il T p lj T 1 α ij T 1

13 Lower Bound I Algorithm Z We form the the probability matrix M where M ij min t rp ij t x, ¾t 1,..., T. Z Define a set of thresholds S rp 1,..., p S x. Z For l 1 N N 1 Form G l as follows. G l ij v 1 if M ij % p l 0 if M ij $ p l. Find the maximum clique in G l. Denote the size of clique by N l. Apply Exact Method for a network with fixed probability p l and size N l. Denote the probability with P l. End Z P L max l rp l x

14 Lower Bound I (Cont d) I (0.5, 0.7, 0.5) J I 0.5 J I 0.5 J Figure: Lower Bound I: Searching for a clique based on a given threshold p min 0.5. The triplet on each edge represents the probabilities of links be open in time slots t 1, t 2 and t 3.

15 Lower Bound II Edge Disjoint Paths Fact: Any two edge disjoint paths are independent of each other. Any set of disjoint paths gives a lower bound on the P i T j. If denote the set of edge disjoint paths by R 1,..., R d, then we have P i T j ' 1 4 d k 1 P R k. Probability of a Path Suppose R k e k r 1..., e i r Lk. p k min min l"r1,...,l k x rm e rl e rl1 x. quality of a path: P R k ) 1 < L k1 m 1 T j 1 p min T m p m min f R k The objective would be to find a set of high quality paths between an origin I and a destination J.

16 Lower Bound II (Cont d) K 0.6 L K 0.6 L I 0.8 J I 0.8 J Figure: Comparing two paths R a I, K, J and R b I, K, L, J based on their quality, f R a (on the left) and f R b (on the right).

17 Quantization of Continuous Probability Distributions of ON-OFF Periods t = 0 ON t = T OFF Starting from ON position ON OFF ON ON OFF ON OFF ON OFF OFF t = 0 OFF t = T ON OFF Starting from OFF position OFF ON OFF ON OFF OFF ON OFF ON OFF ON OFF Figure: Different possibilities (events) based on starting from ON or OFF position for a given edge.

18 Quantization of Continuous Probability Distributions of ON-OFF Periods Problem Formulation If we are given the probability distributions of the ON and OFF periods (for a specific link) denoted by f ON τ and f OFF τ and also the probability of starting from ON position, we can obtain the probability of being in ON position (denoted by SW 1, and SW 0 for OFF) at time t 0 which is obtained as follows. P SW 1 p0< i 0 D t 0 0 f S ON i 1 p 0 < i 0 D t 0 0 f S OFF f S ON i f S OFF i s s f ON s 1 F ON t0 s ds s 1 F i ON t0 s ds 1 if i 0 f ON f ON f OFF f OFF if i % 0. ~ ÍÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÑÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÏ ÍÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÑÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÏ i i f ON f OFF f OFF ÍÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÑÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÏ ÍÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÑÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÏ i i1

19 probability of accessibility Numerical Experiments: Synthetic Networks Simulations Upper Bound Lower Bound I Lower Bound II t Figure: Probability of accessibility between two (randomly selected) nodes in a network with N 20 nodes. The probability of each edge is uniformly selected from the range [0.05, 1] and remains constant during the observation window of 16 time slots.

20 probability of accessibility Numerical Experiments: Synthetic Networks (Cont d) Simulations Upper Bound Lower Bound I Lower Bound II t Figure: Probability of accessibility between two randomly selected nodes for the partially connected network. In this network of N 20 nodes a fraction α 0.5 of the edges are assumed to be open with a fixed probability p 0.1 and the rest of edges will not be open at any time.

21 Figure: Comparison between the upper bound and Monte-Carlo simulations of the probability of accessibility for 40 randomly selected pairs in four time slots, t 2, t 4, t 6 and t 8 Numerical Experiments: Synthetic Networks (Cont d) 0.3 t = t = t = Simulation Upper Bound t =

22 probability density function Numerical Experiments: Synthetic Networks (Cont d π D i j dp i t j dt Simulations Upper Bound Lower Bound I Lower Bound II delay Figure: Accessibility delay distribution (for the experiment setting of Fig. 6). Such delay is defined as the elapsed time for a node j to become accessible from i for the first time (for uniform probabilities of edges).

23 probability density function Numerical Experiments: Synthetic Networks(Cont d) π D i j dp i t j dt Simulations Upper Bound Lower Bound I Lower Bound II delay Figure: Accessibility delay distribution (for the partially connected network setting experiment in Fig. 7.)

24 probability of being ON Numerical Experiments: Synthetic Networks(Cont d) analytical simulations t Figure: Comparing probability of an edge existing between two specific nodes (randomly selected) obtained from simulations and ON-OFF analytical model for exponentially distributed ON-OFF periods

25 Delay (minutes) Numerical Experiments: Real World Data Observed delay Expected delay from the upper bound Edges Figure: Comparing the expected delay derived from the upper-bound and estimated edge probabilities over the training phase, and the average delay from the 10 experiments. Due to the relatively small size of the dataset and possibility of unexpected events (e.g absence of a vehicle from the network) a few points of discrepancy are not surprising.

26 Correlation Coefficient Numerical Experiments: Real World Data (Cont d) t Figure: Pearson s correlation coefficient between the predicted probabilities of accessibility and the empirically estimated values.

27 Current Research : Accessibility in Spatio-Temporal Networks 1 2 (0,0) (0,d) Figure: Two-hop connectivity in a random spatio-temporal network PPP with parameter λ. We assume p ij t e r 2 ij Z T 1: P p 12 1 e d2 Z T 2: P p 2 12 Z T 3: 1 exp πλ 2 e 1 2 d2 (D. Hedges, et al., 2017) P P E4 l"φ 1 α il 2 p lj 3 where α il 2 P i 2 l.

A = A U. U [n] P(A U ). n 1. 2 k(n k). k. k=1

A = A U. U [n] P(A U ). n 1. 2 k(n k). k. k=1 Lecture I jacques@ucsd.edu Notation: Throughout, P denotes probability and E denotes expectation. Denote (X) (r) = X(X 1)... (X r + 1) and let G n,p denote the Erdős-Rényi model of random graphs. 10 Random

More information

3.2 Configuration model

3.2 Configuration model 3.2 Configuration model 3.2.1 Definition. Basic properties Assume that the vector d = (d 1,..., d n ) is graphical, i.e., there exits a graph on n vertices such that vertex 1 has degree d 1, vertex 2 has

More information

Travelling Salesman Problem

Travelling Salesman Problem Travelling Salesman Problem Fabio Furini November 10th, 2014 Travelling Salesman Problem 1 Outline 1 Traveling Salesman Problem Separation Travelling Salesman Problem 2 (Asymmetric) Traveling Salesman

More information

Probabilistic Method. Benny Sudakov. Princeton University

Probabilistic Method. Benny Sudakov. Princeton University Probabilistic Method Benny Sudakov Princeton University Rough outline The basic Probabilistic method can be described as follows: In order to prove the existence of a combinatorial structure with certain

More information

Notes 6 : First and second moment methods

Notes 6 : First and second moment methods Notes 6 : First and second moment methods Math 733-734: Theory of Probability Lecturer: Sebastien Roch References: [Roc, Sections 2.1-2.3]. Recall: THM 6.1 (Markov s inequality) Let X be a non-negative

More information

Lecture 5: January 30

Lecture 5: January 30 CS71 Randomness & Computation Spring 018 Instructor: Alistair Sinclair Lecture 5: January 30 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They

More information

Quick Tour of Linear Algebra and Graph Theory

Quick Tour of Linear Algebra and Graph Theory Quick Tour of Linear Algebra and Graph Theory CS224w: Social and Information Network Analysis Fall 2012 Yu Wayne Wu Based on Borja Pelato s version in Fall 2011 Matrices and Vectors Matrix: A rectangular

More information

The Probabilistic Method

The Probabilistic Method The Probabilistic Method In Graph Theory Ehssan Khanmohammadi Department of Mathematics The Pennsylvania State University February 25, 2010 What do we mean by the probabilistic method? Why use this method?

More information

Course Notes. Part IV. Probabilistic Combinatorics. Algorithms

Course Notes. Part IV. Probabilistic Combinatorics. Algorithms Course Notes Part IV Probabilistic Combinatorics and Algorithms J. A. Verstraete Department of Mathematics University of California San Diego 9500 Gilman Drive La Jolla California 92037-0112 jacques@ucsd.edu

More information

GraphRNN: A Deep Generative Model for Graphs (24 Feb 2018)

GraphRNN: A Deep Generative Model for Graphs (24 Feb 2018) GraphRNN: A Deep Generative Model for Graphs (24 Feb 2018) Jiaxuan You, Rex Ying, Xiang Ren, William L. Hamilton, Jure Leskovec Presented by: Jesse Bettencourt and Harris Chan March 9, 2018 University

More information

Markov Chains CK eqns Classes Hitting times Rec./trans. Strong Markov Stat. distr. Reversibility * Markov Chains

Markov Chains CK eqns Classes Hitting times Rec./trans. Strong Markov Stat. distr. Reversibility * Markov Chains Markov Chains A random process X is a family {X t : t T } of random variables indexed by some set T. When T = {0, 1, 2,... } one speaks about a discrete-time process, for T = R or T = [0, ) one has a continuous-time

More information

Optimization Exercise Set n.5 :

Optimization Exercise Set n.5 : Optimization Exercise Set n.5 : Prepared by S. Coniglio translated by O. Jabali 2016/2017 1 5.1 Airport location In air transportation, usually there is not a direct connection between every pair of airports.

More information

Finding a Heaviest Triangle is not Harder than Matrix Multiplication

Finding a Heaviest Triangle is not Harder than Matrix Multiplication Finding a Heaviest Triangle is not Harder than Matrix Multiplication Artur Czumaj Department of Computer Science New Jersey Institute of Technology aczumaj@acm.org Andrzej Lingas Department of Computer

More information

Outline. Computer Science 331. Cost of Binary Search Tree Operations. Bounds on Height: Worst- and Average-Case

Outline. Computer Science 331. Cost of Binary Search Tree Operations. Bounds on Height: Worst- and Average-Case Outline Computer Science Average Case Analysis: Binary Search Trees Mike Jacobson Department of Computer Science University of Calgary Lecture #7 Motivation and Objective Definition 4 Mike Jacobson (University

More information

Random Geometric Graphs

Random Geometric Graphs Random Geometric Graphs Mathew D. Penrose University of Bath, UK SAMBa Symposium (Talk 2) University of Bath November 2014 1 MODELS of RANDOM GRAPHS Erdos-Renyi G(n, p): start with the complete n-graph,

More information

Applications of the Lopsided Lovász Local Lemma Regarding Hypergraphs

Applications of the Lopsided Lovász Local Lemma Regarding Hypergraphs Regarding Hypergraphs Ph.D. Dissertation Defense April 15, 2013 Overview The Local Lemmata 2-Coloring Hypergraphs with the Original Local Lemma Counting Derangements with the Lopsided Local Lemma Lopsided

More information

Probabilistic Proofs of Existence of Rare Events. Noga Alon

Probabilistic Proofs of Existence of Rare Events. Noga Alon Probabilistic Proofs of Existence of Rare Events Noga Alon Department of Mathematics Sackler Faculty of Exact Sciences Tel Aviv University Ramat-Aviv, Tel Aviv 69978 ISRAEL 1. The Local Lemma In a typical

More information

Adaptive Crowdsourcing via EM with Prior

Adaptive Crowdsourcing via EM with Prior Adaptive Crowdsourcing via EM with Prior Peter Maginnis and Tanmay Gupta May, 205 In this work, we make two primary contributions: derivation of the EM update for the shifted and rescaled beta prior and

More information

Modeling of Growing Networks with Directional Attachment and Communities

Modeling of Growing Networks with Directional Attachment and Communities Modeling of Growing Networks with Directional Attachment and Communities Masahiro KIMURA, Kazumi SAITO, Naonori UEDA NTT Communication Science Laboratories 2-4 Hikaridai, Seika-cho, Kyoto 619-0237, Japan

More information

An Introduction to Exponential-Family Random Graph Models

An Introduction to Exponential-Family Random Graph Models An Introduction to Exponential-Family Random Graph Models Luo Lu Feb.8, 2011 1 / 11 Types of complications in social network Single relationship data A single relationship observed on a set of nodes at

More information

Networks: Lectures 9 & 10 Random graphs

Networks: Lectures 9 & 10 Random graphs Networks: Lectures 9 & 10 Random graphs Heather A Harrington Mathematical Institute University of Oxford HT 2017 What you re in for Week 1: Introduction and basic concepts Week 2: Small worlds Week 3:

More information

Nonnegative Matrices I

Nonnegative Matrices I Nonnegative Matrices I Daisuke Oyama Topics in Economic Theory September 26, 2017 References J. L. Stuart, Digraphs and Matrices, in Handbook of Linear Algebra, Chapter 29, 2006. R. A. Brualdi and H. J.

More information

Integer programming: an introduction. Alessandro Astolfi

Integer programming: an introduction. Alessandro Astolfi Integer programming: an introduction Alessandro Astolfi Outline Introduction Examples Methods for solving ILP Optimization on graphs LP problems with integer solutions Summary Introduction Integer programming

More information

Sequential Change-Point Approach for Online Community Detection

Sequential Change-Point Approach for Online Community Detection Sequential Change-Point Approach for Online Community Detection Yao Xie Joint work with David Marangoni-Simonsen H. Milton Stewart School of Industrial and Systems Engineering Georgia Institute of Technology

More information

A Bayesian methodology for systemic risk assessment in financial networks

A Bayesian methodology for systemic risk assessment in financial networks A Bayesian methodology for systemic risk assessment in financial networks Luitgard A. M. Veraart London School of Economics and Political Science March 2015 Joint work with Axel Gandy (Imperial College

More information

Bounded Arithmetic, Expanders, and Monotone Propositional Proofs

Bounded Arithmetic, Expanders, and Monotone Propositional Proofs Bounded Arithmetic, Expanders, and Monotone Propositional Proofs joint work with Valentine Kabanets, Antonina Kolokolova & Michal Koucký Takeuti Symposium on Advances in Logic Kobe, Japan September 20,

More information

Shortest paths with negative lengths

Shortest paths with negative lengths Chapter 8 Shortest paths with negative lengths In this chapter we give a linear-space, nearly linear-time algorithm that, given a directed planar graph G with real positive and negative lengths, but no

More information

Computing and Communicating Functions over Sensor Networks

Computing and Communicating Functions over Sensor Networks Computing and Communicating Functions over Sensor Networks Solmaz Torabi Dept. of Electrical and Computer Engineering Drexel University solmaz.t@drexel.edu Advisor: Dr. John M. Walsh 1/35 1 Refrences [1]

More information

6.207/14.15: Networks Lecture 12: Generalized Random Graphs

6.207/14.15: Networks Lecture 12: Generalized Random Graphs 6.207/14.15: Networks Lecture 12: Generalized Random Graphs 1 Outline Small-world model Growing random networks Power-law degree distributions: Rich-Get-Richer effects Models: Uniform attachment model

More information

Undirected Graphical Models

Undirected Graphical Models Outline Hong Chang Institute of Computing Technology, Chinese Academy of Sciences Machine Learning Methods (Fall 2012) Outline Outline I 1 Introduction 2 Properties Properties 3 Generative vs. Conditional

More information

Show that the following problems are NP-complete

Show that the following problems are NP-complete Show that the following problems are NP-complete April 7, 2018 Below is a list of 30 exercises in which you are asked to prove that some problem is NP-complete. The goal is to better understand the theory

More information

8.5 Sequencing Problems

8.5 Sequencing Problems 8.5 Sequencing Problems Basic genres. Packing problems: SET-PACKING, INDEPENDENT SET. Covering problems: SET-COVER, VERTEX-COVER. Constraint satisfaction problems: SAT, 3-SAT. Sequencing problems: HAMILTONIAN-CYCLE,

More information

Chapter 9: Relations Relations

Chapter 9: Relations Relations Chapter 9: Relations 9.1 - Relations Definition 1 (Relation). Let A and B be sets. A binary relation from A to B is a subset R A B, i.e., R is a set of ordered pairs where the first element from each pair

More information

NP-Complete Problems. More reductions

NP-Complete Problems. More reductions NP-Complete Problems More reductions Definitions P: problems that can be solved in polynomial time (typically in n, size of input) on a deterministic Turing machine Any normal computer simulates a DTM

More information

Markov and Gibbs Random Fields

Markov and Gibbs Random Fields Markov and Gibbs Random Fields Bruno Galerne bruno.galerne@parisdescartes.fr MAP5, Université Paris Descartes Master MVA Cours Méthodes stochastiques pour l analyse d images Lundi 6 mars 2017 Outline The

More information

Deterministic Decentralized Search in Random Graphs

Deterministic Decentralized Search in Random Graphs Deterministic Decentralized Search in Random Graphs Esteban Arcaute 1,, Ning Chen 2,, Ravi Kumar 3, David Liben-Nowell 4,, Mohammad Mahdian 3, Hamid Nazerzadeh 1,, and Ying Xu 1, 1 Stanford University.

More information

Decision Diagrams for Discrete Optimization

Decision Diagrams for Discrete Optimization Decision Diagrams for Discrete Optimization Willem Jan van Hoeve Tepper School of Business Carnegie Mellon University www.andrew.cmu.edu/user/vanhoeve/mdd/ Acknowledgments: David Bergman, Andre Cire, Samid

More information

P(X 0 = j 0,... X nk = j k )

P(X 0 = j 0,... X nk = j k ) Introduction to Probability Example Sheet 3 - Michaelmas 2006 Michael Tehranchi Problem. Let (X n ) n 0 be a homogeneous Markov chain on S with transition matrix P. Given a k N, let Z n = X kn. Prove that

More information

Ma/CS 6b Class 12: Graphs and Matrices

Ma/CS 6b Class 12: Graphs and Matrices Ma/CS 6b Class 2: Graphs and Matrices 3 3 v 5 v 4 v By Adam Sheffer Non-simple Graphs In this class we allow graphs to be nonsimple. We allow parallel edges, but not loops. Incidence Matrix Consider a

More information

6.207/14.15: Networks Lecture 7: Search on Networks: Navigation and Web Search

6.207/14.15: Networks Lecture 7: Search on Networks: Navigation and Web Search 6.207/14.15: Networks Lecture 7: Search on Networks: Navigation and Web Search Daron Acemoglu and Asu Ozdaglar MIT September 30, 2009 1 Networks: Lecture 7 Outline Navigation (or decentralized search)

More information

Random Graphs. 7.1 Introduction

Random Graphs. 7.1 Introduction 7 Random Graphs 7.1 Introduction The theory of random graphs began in the late 1950s with the seminal paper by Erdös and Rényi [?]. In contrast to percolation theory, which emerged from efforts to model

More information

Randomized Algorithms. Zhou Jun

Randomized Algorithms. Zhou Jun Randomized Algorithms Zhou Jun 1 Content 13.1 Contention Resolution 13.2 Global Minimum Cut 13.3 *Random Variables and Expectation 13.4 Randomized Approximation Algorithm for MAX 3- SAT 13.6 Hashing 13.7

More information

A Lower Bound for the Size of Syntactically Multilinear Arithmetic Circuits

A Lower Bound for the Size of Syntactically Multilinear Arithmetic Circuits A Lower Bound for the Size of Syntactically Multilinear Arithmetic Circuits Ran Raz Amir Shpilka Amir Yehudayoff Abstract We construct an explicit polynomial f(x 1,..., x n ), with coefficients in {0,

More information

Approximate Sunflowers

Approximate Sunflowers Approximate Sunflowers Benamin Rossman January 26, 2019 Abstract A (p, ε-approximate sunflower is a family of sets S with the property that a p-random subset of the universe is 1 ε likely to contain a

More information

Orbitopes. Marc Pfetsch. joint work with Volker Kaibel. Zuse Institute Berlin

Orbitopes. Marc Pfetsch. joint work with Volker Kaibel. Zuse Institute Berlin Orbitopes Marc Pfetsch joint work with Volker Kaibel Zuse Institute Berlin What this talk is about We introduce orbitopes. A polyhedral way to break symmetries in integer programs. Introduction 2 Orbitopes

More information

Optimization Exercise Set n. 4 :

Optimization Exercise Set n. 4 : Optimization Exercise Set n. 4 : Prepared by S. Coniglio and E. Amaldi translated by O. Jabali 2018/2019 1 4.1 Airport location In air transportation, usually there is not a direct connection between every

More information

Chapter 7: Time Complexity

Chapter 7: Time Complexity Chapter 7: Time Complexity 1 Time complexity Let M be a deterministic Turing machine that halts on all inputs. The running time or time complexity of M is the function f: N N, where f(n) is the maximum

More information

EE 381V: Large Scale Learning Spring Lecture 16 March 7

EE 381V: Large Scale Learning Spring Lecture 16 March 7 EE 381V: Large Scale Learning Spring 2013 Lecture 16 March 7 Lecturer: Caramanis & Sanghavi Scribe: Tianyang Bai 16.1 Topics Covered In this lecture, we introduced one method of matrix completion via SVD-based

More information

University of Chicago Autumn 2003 CS Markov Chain Monte Carlo Methods

University of Chicago Autumn 2003 CS Markov Chain Monte Carlo Methods University of Chicago Autumn 2003 CS37101-1 Markov Chain Monte Carlo Methods Lecture 4: October 21, 2003 Bounding the mixing time via coupling Eric Vigoda 4.1 Introduction In this lecture we ll use the

More information

Adventures in random graphs: Models, structures and algorithms

Adventures in random graphs: Models, structures and algorithms BCAM January 2011 1 Adventures in random graphs: Models, structures and algorithms Armand M. Makowski ECE & ISR/HyNet University of Maryland at College Park armand@isr.umd.edu BCAM January 2011 2 Complex

More information

. p.1. Mathematical Models of the WWW and related networks. Alan Frieze

. p.1. Mathematical Models of the WWW and related networks. Alan Frieze . p.1 Mathematical Models of the WWW and related networks Alan Frieze The WWW is an example of a large real-world network.. p.2 The WWW is an example of a large real-world network. It grows unpredictably

More information

Near-domination in graphs

Near-domination in graphs Near-domination in graphs Bruce Reed Researcher, Projet COATI, INRIA and Laboratoire I3S, CNRS France, and Visiting Researcher, IMPA, Brazil Alex Scott Mathematical Institute, University of Oxford, Oxford

More information

The Probabilistic Method

The Probabilistic Method The Probabilistic Method Janabel Xia and Tejas Gopalakrishna MIT PRIMES Reading Group, mentors Gwen McKinley and Jake Wellens December 7th, 2018 Janabel Xia and Tejas Gopalakrishna Probabilistic Method

More information

Lecture 5: Probabilistic tools and Applications II

Lecture 5: Probabilistic tools and Applications II T-79.7003: Graphs and Networks Fall 2013 Lecture 5: Probabilistic tools and Applications II Lecturer: Charalampos E. Tsourakakis Oct. 11, 2013 5.1 Overview In the first part of today s lecture we will

More information

Theory of Computation Time Complexity

Theory of Computation Time Complexity Theory of Computation Time Complexity Bow-Yaw Wang Academia Sinica Spring 2012 Bow-Yaw Wang (Academia Sinica) Time Complexity Spring 2012 1 / 59 Time for Deciding a Language Let us consider A = {0 n 1

More information

The Lovász Local Lemma : A constructive proof

The Lovász Local Lemma : A constructive proof The Lovász Local Lemma : A constructive proof Andrew Li 19 May 2016 Abstract The Lovász Local Lemma is a tool used to non-constructively prove existence of combinatorial objects meeting a certain conditions.

More information

) ) = γ. and P ( X. B(a, b) = Γ(a)Γ(b) Γ(a + b) ; (x + y, ) I J}. Then, (rx) a 1 (ry) b 1 e (x+y)r r 2 dxdy Γ(a)Γ(b) D

) ) = γ. and P ( X. B(a, b) = Γ(a)Γ(b) Γ(a + b) ; (x + y, ) I J}. Then, (rx) a 1 (ry) b 1 e (x+y)r r 2 dxdy Γ(a)Γ(b) D 3 Independent Random Variables II: Examples 3.1 Some functions of independent r.v. s. Let X 1, X 2,... be independent r.v. s with the known distributions. Then, one can compute the distribution of a r.v.

More information

Lecture 4: NP and computational intractability

Lecture 4: NP and computational intractability Chapter 4 Lecture 4: NP and computational intractability Listen to: Find the longest path, Daniel Barret What do we do today: polynomial time reduction NP, co-np and NP complete problems some examples

More information

Graph Detection and Estimation Theory

Graph Detection and Estimation Theory Introduction Detection Estimation Graph Detection and Estimation Theory (and algorithms, and applications) Patrick J. Wolfe Statistics and Information Sciences Laboratory (SISL) School of Engineering and

More information

Maximum Flow Problem (Ford and Fulkerson, 1956)

Maximum Flow Problem (Ford and Fulkerson, 1956) Maximum Flow Problem (Ford and Fulkerson, 196) In this problem we find the maximum flow possible in a directed connected network with arc capacities. There is unlimited quantity available in the given

More information

All Ramsey numbers for brooms in graphs

All Ramsey numbers for brooms in graphs All Ramsey numbers for brooms in graphs Pei Yu Department of Mathematics Tongji University Shanghai, China yupeizjy@16.com Yusheng Li Department of Mathematics Tongji University Shanghai, China li yusheng@tongji.edu.cn

More information

A Lower Bound Technique for Restricted Branching Programs and Applications

A Lower Bound Technique for Restricted Branching Programs and Applications A Lower Bound Technique for Restricted Branching Programs and Applications (Extended Abstract) Philipp Woelfel FB Informatik, LS2, Univ. Dortmund, 44221 Dortmund, Germany woelfel@ls2.cs.uni-dortmund.de

More information

Adventures in random graphs: Models, structures and algorithms

Adventures in random graphs: Models, structures and algorithms BCAM January 2011 1 Adventures in random graphs: Models, structures and algorithms Armand M. Makowski ECE & ISR/HyNet University of Maryland at College Park armand@isr.umd.edu BCAM January 2011 2 LECTURE

More information

Bounds for pairs in partitions of graphs

Bounds for pairs in partitions of graphs Bounds for pairs in partitions of graphs Jie Ma Xingxing Yu School of Mathematics Georgia Institute of Technology Atlanta, GA 30332-0160, USA Abstract In this paper we study the following problem of Bollobás

More information

Network models: dynamical growth and small world

Network models: dynamical growth and small world Network models: dynamical growth and small world Leonid E. Zhukov School of Data Analysis and Artificial Intelligence Department of Computer Science National Research University Higher School of Economics

More information

Independent Transversals in r-partite Graphs

Independent Transversals in r-partite Graphs Independent Transversals in r-partite Graphs Raphael Yuster Department of Mathematics Raymond and Beverly Sackler Faculty of Exact Sciences Tel Aviv University, Tel Aviv, Israel Abstract Let G(r, n) denote

More information

NATIONAL BOARD FOR HIGHER MATHEMATICS. M. A. and M.Sc. Scholarship Test. September 19, Time Allowed: 150 Minutes Maximum Marks: 30

NATIONAL BOARD FOR HIGHER MATHEMATICS. M. A. and M.Sc. Scholarship Test. September 19, Time Allowed: 150 Minutes Maximum Marks: 30 NATIONAL BOARD FOR HIGHER MATHEMATICS M. A. and M.Sc. Scholarship Test September 19, 2015 Time Allowed: 150 Minutes Maximum Marks: 30 Please read, carefully, the instructions on the following page 1 INSTRUCTIONS

More information

Branching Process Approach to Avalanche Dynamics on Complex Networks

Branching Process Approach to Avalanche Dynamics on Complex Networks Journal of the Korean Physical Society, Vol. 44, No. 3, March 2004, pp. 633 637 Branching Process Approach to Avalanche Dynamics on Complex Networks D.-S. Lee, K.-I. Goh, B. Kahng and D. Kim School of

More information

Jeong-Hyun Kang Department of Mathematics, University of West Georgia, Carrollton, GA

Jeong-Hyun Kang Department of Mathematics, University of West Georgia, Carrollton, GA #A33 INTEGERS 10 (2010), 379-392 DISTANCE GRAPHS FROM P -ADIC NORMS Jeong-Hyun Kang Department of Mathematics, University of West Georgia, Carrollton, GA 30118 jkang@westga.edu Hiren Maharaj Department

More information

Algebra II CP Final Exam Review Packet. Calculator Questions

Algebra II CP Final Exam Review Packet. Calculator Questions Name: Algebra II CP Final Exam Review Packet Calculator Questions 1. Solve the equation. Check for extraneous solutions. (Sec. 1.6) 2 8 37 2. Graph the inequality 31. (Sec. 2.8) 3. If y varies directly

More information

Graph homomorphism into an odd cycle

Graph homomorphism into an odd cycle Graph homomorphism into an odd cycle Hong-Jian Lai West Virginia University, Morgantown, WV 26506 EMAIL: hjlai@math.wvu.edu Bolian Liu South China Normal University, Guangzhou, P. R. China EMAIL: liubl@hsut.scun.edu.cn

More information

Discrete Mathematics. Benny George K. September 22, 2011

Discrete Mathematics. Benny George K. September 22, 2011 Discrete Mathematics Benny George K Department of Computer Science and Engineering Indian Institute of Technology Guwahati ben@iitg.ernet.in September 22, 2011 Set Theory Elementary Concepts Let A and

More information

Model Counting for Logical Theories

Model Counting for Logical Theories Model Counting for Logical Theories Wednesday Dmitry Chistikov Rayna Dimitrova Department of Computer Science University of Oxford, UK Max Planck Institute for Software Systems (MPI-SWS) Kaiserslautern

More information

On a correlation inequality of Farr

On a correlation inequality of Farr On a correlation inequality of Farr Colin McDiarmid, Department of Statistics Oxford University Abstract Suppose that each vertex of a graph independently chooses a colour uniformly from the set {1,...,

More information

Approximate Counting

Approximate Counting Approximate Counting Andreas-Nikolas Göbel National Technical University of Athens, Greece Advanced Algorithms, May 2010 Outline 1 The Monte Carlo Method Introduction DNFSAT Counting 2 The Markov Chain

More information

Closest String and Closest Substring Problems

Closest String and Closest Substring Problems January 8, 2010 Problem Formulation Problem Statement I Closest String Given a set S = {s 1, s 2,, s n } of strings each length m, find a center string s of length m minimizing d such that for every string

More information

Nordhaus-Gaddum Theorems for k-decompositions

Nordhaus-Gaddum Theorems for k-decompositions Nordhaus-Gaddum Theorems for k-decompositions Western Michigan University October 12, 2011 A Motivating Problem Consider the following problem. An international round-robin sports tournament is held between

More information

Hypergraph Ramsey numbers

Hypergraph Ramsey numbers Hypergraph Ramsey numbers David Conlon Jacob Fox Benny Sudakov Abstract The Ramsey number r k (s, n is the minimum N such that every red-blue coloring of the k-tuples of an N-element set contains a red

More information

Feasibility of Periodic Scan Schedules

Feasibility of Periodic Scan Schedules Feasibility of Periodic Scan Schedules Ants PI Meeting, Seattle, May 2000 Bruno Dutertre System Design Laboratory SRI International e-mail: bruno@sdl.sri.com 1 Scan Scheduling Scan scheduling: Given n

More information

GRAPH ALGORITHMS Week 7 (13 Nov - 18 Nov 2017)

GRAPH ALGORITHMS Week 7 (13 Nov - 18 Nov 2017) GRAPH ALGORITHMS Week 7 (13 Nov - 18 Nov 2017) C. Croitoru croitoru@info.uaic.ro FII November 12, 2017 1 / 33 OUTLINE Matchings Analytical Formulation of the Maximum Matching Problem Perfect Matchings

More information

Why Should Mathematical Modeling In Biology Be Even Possible?

Why Should Mathematical Modeling In Biology Be Even Possible? Why Should Mathematical Modeling In Biology Be Even Possible? Winfried Just Department of Mathematics, Ohio University March 27, 2018 An example of mathematical modeling in biology. Based on Oduro, Grijalva,

More information

Random Geometric Graphs

Random Geometric Graphs Random Geometric Graphs Mathew D. Penrose University of Bath, UK Networks: stochastic models for populations and epidemics ICMS, Edinburgh September 2011 1 MODELS of RANDOM GRAPHS Erdos-Renyi G(n, p):

More information

Models of Computation. by Costas Busch, LSU

Models of Computation. by Costas Busch, LSU Models of Computation by Costas Busch, LSU 1 Computation CPU memory 2 temporary memory input memory CPU output memory Program memory 3 Example: f ( x) x 3 temporary memory input memory Program memory compute

More information

Topics in Theoretical Computer Science April 08, Lecture 8

Topics in Theoretical Computer Science April 08, Lecture 8 Topics in Theoretical Computer Science April 08, 204 Lecture 8 Lecturer: Ola Svensson Scribes: David Leydier and Samuel Grütter Introduction In this lecture we will introduce Linear Programming. It was

More information

Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling

Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling 1 Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling Saswati Sarkar and Koushik Kar Abstract In this paper, we consider queue-length stability in wireless

More information

Lecture: Workload Models (Advanced Topic)

Lecture: Workload Models (Advanced Topic) Lecture: Workload Models (Advanced Topic) Real-Time Systems, HT11 Martin Stigge 28. September 2011 Martin Stigge Workload Models 28. September 2011 1 System

More information

Lower Bounds for Cutting Planes Proofs. with Small Coecients. Abstract. We consider small-weight Cutting Planes (CP ) proofs; that is,

Lower Bounds for Cutting Planes Proofs. with Small Coecients. Abstract. We consider small-weight Cutting Planes (CP ) proofs; that is, Lower Bounds for Cutting Planes Proofs with Small Coecients Maria Bonet y Toniann Pitassi z Ran Raz x Abstract We consider small-weight Cutting Planes (CP ) proofs; that is, Cutting Planes (CP ) proofs

More information

5 Flows and cuts in digraphs

5 Flows and cuts in digraphs 5 Flows and cuts in digraphs Recall that a digraph or network is a pair G = (V, E) where V is a set and E is a multiset of ordered pairs of elements of V, which we refer to as arcs. Note that two vertices

More information

Fall 2017 Qualifier Exam: OPTIMIZATION. September 18, 2017

Fall 2017 Qualifier Exam: OPTIMIZATION. September 18, 2017 Fall 2017 Qualifier Exam: OPTIMIZATION September 18, 2017 GENERAL INSTRUCTIONS: 1 Answer each question in a separate book 2 Indicate on the cover of each book the area of the exam, your code number, and

More information

Applications of Convex Optimization on the Graph Isomorphism problem

Applications of Convex Optimization on the Graph Isomorphism problem Applications of Convex Optimization on the Graph Isomorphism problem 1 1 Department of Information and Computer Sciences UC Irvine March 8, 2011 Outline Motivation 1 Motivation The Graph Isomorphism problem

More information

Assignment 2 : Probabilistic Methods

Assignment 2 : Probabilistic Methods Assignment 2 : Probabilistic Methods jverstra@math Question 1. Let d N, c R +, and let G n be an n-vertex d-regular graph. Suppose that vertices of G n are selected independently with probability p, where

More information

Combinatorial optimization problems

Combinatorial optimization problems Combinatorial optimization problems Heuristic Algorithms Giovanni Righini University of Milan Department of Computer Science (Crema) Optimization In general an optimization problem can be formulated as:

More information

Solving Zero-Sum Security Games in Discretized Spatio-Temporal Domains

Solving Zero-Sum Security Games in Discretized Spatio-Temporal Domains Solving Zero-Sum Security Games in Discretized Spatio-Temporal Domains APPENDIX LP Formulation for Constant Number of Resources (Fang et al. 3) For the sae of completeness, we describe the LP formulation

More information

Applications of the Sparse Regularity Lemma

Applications of the Sparse Regularity Lemma Applications of the Sparse Regularity Lemma Y. Kohayakawa (Emory and São Paulo) Extremal Combinatorics II DIMACS 2004 1 Szemerédi s regularity lemma 1. Works very well for large, dense graphs: n-vertex

More information

Chapter 3: Discrete Optimization Integer Programming

Chapter 3: Discrete Optimization Integer Programming Chapter 3: Discrete Optimization Integer Programming Edoardo Amaldi DEIB Politecnico di Milano edoardo.amaldi@polimi.it Sito web: http://home.deib.polimi.it/amaldi/ott-13-14.shtml A.A. 2013-14 Edoardo

More information

Paul Erdős and Graph Ramsey Theory

Paul Erdős and Graph Ramsey Theory Paul Erdős and Graph Ramsey Theory Benny Sudakov ETH and UCLA Ramsey theorem Ramsey theorem Definition: The Ramsey number r(s, n) is the minimum N such that every red-blue coloring of the edges of a complete

More information

Complexity (Pre Lecture)

Complexity (Pre Lecture) Complexity (Pre Lecture) Dr. Neil T. Dantam CSCI-561, Colorado School of Mines Fall 2018 Dantam (Mines CSCI-561) Complexity (Pre Lecture) Fall 2018 1 / 70 Why? What can we always compute efficiently? What

More information

Introduction to Reinforcement Learning. CMPT 882 Mar. 18

Introduction to Reinforcement Learning. CMPT 882 Mar. 18 Introduction to Reinforcement Learning CMPT 882 Mar. 18 Outline for the week Basic ideas in RL Value functions and value iteration Policy evaluation and policy improvement Model-free RL Monte-Carlo and

More information

An Algorithm to Determine the Clique Number of a Split Graph. In this paper, we propose an algorithm to determine the clique number of a split graph.

An Algorithm to Determine the Clique Number of a Split Graph. In this paper, we propose an algorithm to determine the clique number of a split graph. An Algorithm to Determine the Clique Number of a Split Graph O.Kettani email :o_ket1@yahoo.fr Abstract In this paper, we propose an algorithm to determine the clique number of a split graph. Introduction

More information