Delay and Accessibility in Random Temporal Networks
|
|
- Willa Bertina Newman
- 6 years ago
- Views:
Transcription
1 Delay and Accessibility in Random Temporal Networks 2nd Symposium on Spatial Networks Shahriar Etemadi Tajbakhsh September 13, 2017
2 Outline Z Accessibility in Deterministic Static and Temporal Networks Z Accessibility in Random Temporal Networks: Problem Definition Z Exact Method: Erdös-Rényi Random Temporal Networks Z Upper Bound for General Random Temporal Networks Z Lower Bound I: Clique Search Z Lower Bound II: Edge-Disjoint Path Selection Z Discretization of Continuous ON-OFF Distributions Z Numerical Experiments on Synthetic Networks Z Numerical Experiments on Real World Data Z Current Research : Accessibility in Spatio-Temporal Networks
3 Accessibility in Deterministic Static and Temporal Networks Static Networks Defined be adjacency matrix A. A n ij gives the number of paths of length n or less between vertices i and j. Accessibility matrix P n in n steps is defined as follows. 1 if A n ij % 0 P ij n v 0 if A n ij 0. Temporal Networks Defined by a sequence of adjacency matrices A 1,..., A T over T time slots. Matrix C T 4 T i 1 1 A i gives the total number of temporal paths between any two vertices. Accessibility matrix P n in n steps is defined as follows. 1 if C P T ij % 0 ij n v 0 if C T ij 0.
4 Accessibility in Deterministic Static and Temporal Networks (Cont d) Temporal Adjacency Graph t = 1 t = 2 t = Accessibility Graph Figure: Temporal Networks
5 Accessibility in Random Temporal Networks: Problem Definition Z The set vertices V r1,..., N x. Z Discrete time slots T 1, 2,... Z Probability of an edge between i and j at time t: p ij T. Z If an edge exists between i and j, e T i, j 1, otherwise e ij T 0. Z A temporal path between i and j by time T : A ij m T v m ij 0... v m ij T (where v m ij 0 i, v mij T j and vm ij t " r1,..., N x, ¾t " r1,..., T 1x). Z All paths from i to j: A ij T ra ij 1 T,..., Aij M T T x. Z Temporal path from i to j with vm ij Z B ilj T rb ilj 1,..., Bilj M T x. Z Enumerator of paths 1 ( m ( M T N T 1 T 1 l: Bilj m T.
6 Accessibility in Random Temporal Networks: Problem Definition (Cont d) Open Path A temporal path between i and j by time T denoted by A ij m T v m ij 0... v m ij T (where v m ij 0 i, v mij T j and vm ij t " r1,..., N x), is defined to be open if for any two successive pair of distinct vertices e T vm ij t v m ij t 1 1. Objective T j (or a bound for it), where P i Our goal is to find P i is the probability of at least one open temporal path between vertices i and j. T j
7 Exact Method : Erdös-Rényi Random Temporal Networks Z We assume p ij T p T, ¾i, j " V Z We start from vertex i to visit other vertices. Any vertex u at time t 1 is labeled as visited if e 1 i, u 1. Z The set of visited vertices at time T : ω T. Z The set of all vertices visited from t 1 to t T : W T. Z A vertex is labeled as visited in time T if there exist an edge between any the vertices in W T 1. Z W T 1 W T < ω T.
8 Exact Method (Cont d) T Calculation of P i j We have ω 1 B N, p 1 and ω T B N, 1 1 p T W T 1. Thefore we can conclude that: k = l 0 P W T k N l P W T 1 l k l 1 1 p T l kl 1 p T Nk N = l 1 P i» T j P j " W T P j " W T» W T l P W T l» l P W T l N 1
9 Exact Method (Cont d) V i W(t) ω(t + 1) j Figure: Node j has not been visited by time t. In time slot t 1 node j falls into the set of nodes labeled as visited.
10 Upper Bound for General Random Temporal Networks Definition A family A of subsets of K r1,..., k x is monotone decreasing if A " A and A N A A " A. Similarly, it is monotone increasing if A " A and A N A A " A. FKG-Harris Inequality Let A and B be two monotone increasing families of subsets of K and let C and D be two monotone decreasing families of subsets of K. Then for any real vector p p 1,..., p k, 0 ( p i ( p k P rp A = B ) P rp A.P rp B P rp C = D ) P rp C.P rp D P rp A = C ( P rp A.P rp C
11 Upper Bound (Cont d): Definition Theorem P i T ) 1. α ij T 1 N 5 l 1 1 α il T p lj T 1, α ij 1 p ij 1 T j ( α ij T, for all i, j " V V and any positive integer Proof Induction: T 1 α ij 1 p ij 1 ³ T 1 P i T j & α ij T P i j & α ij T 1. P i T j P M T A il m T ( α ij T m 1
12 Upper Bound (Cont d) Proof (Cont d) P M T m 1 M T P m 1 P FKG P N 1 5 P l 1 M T A il m T p lj T 1 P A il m m 1 T = rlj x A il m T = lj M T P B ilj m T 1 ( α il T p lj T 1 m 1 M T B ilj m T 1 ) 1 α ilp lj T 1 m 1 M T 1 A ij N m T 1 P m 1 l 1 M T 1 B ilj m T 1 ( m 1 M T m 1 B ilj m T 1 ( 1 N 5 l 1 1 α il T p lj T 1 α ij T 1
13 Lower Bound I Algorithm Z We form the the probability matrix M where M ij min t rp ij t x, ¾t 1,..., T. Z Define a set of thresholds S rp 1,..., p S x. Z For l 1 N N 1 Form G l as follows. G l ij v 1 if M ij % p l 0 if M ij $ p l. Find the maximum clique in G l. Denote the size of clique by N l. Apply Exact Method for a network with fixed probability p l and size N l. Denote the probability with P l. End Z P L max l rp l x
14 Lower Bound I (Cont d) I (0.5, 0.7, 0.5) J I 0.5 J I 0.5 J Figure: Lower Bound I: Searching for a clique based on a given threshold p min 0.5. The triplet on each edge represents the probabilities of links be open in time slots t 1, t 2 and t 3.
15 Lower Bound II Edge Disjoint Paths Fact: Any two edge disjoint paths are independent of each other. Any set of disjoint paths gives a lower bound on the P i T j. If denote the set of edge disjoint paths by R 1,..., R d, then we have P i T j ' 1 4 d k 1 P R k. Probability of a Path Suppose R k e k r 1..., e i r Lk. p k min min l"r1,...,l k x rm e rl e rl1 x. quality of a path: P R k ) 1 < L k1 m 1 T j 1 p min T m p m min f R k The objective would be to find a set of high quality paths between an origin I and a destination J.
16 Lower Bound II (Cont d) K 0.6 L K 0.6 L I 0.8 J I 0.8 J Figure: Comparing two paths R a I, K, J and R b I, K, L, J based on their quality, f R a (on the left) and f R b (on the right).
17 Quantization of Continuous Probability Distributions of ON-OFF Periods t = 0 ON t = T OFF Starting from ON position ON OFF ON ON OFF ON OFF ON OFF OFF t = 0 OFF t = T ON OFF Starting from OFF position OFF ON OFF ON OFF OFF ON OFF ON OFF ON OFF Figure: Different possibilities (events) based on starting from ON or OFF position for a given edge.
18 Quantization of Continuous Probability Distributions of ON-OFF Periods Problem Formulation If we are given the probability distributions of the ON and OFF periods (for a specific link) denoted by f ON τ and f OFF τ and also the probability of starting from ON position, we can obtain the probability of being in ON position (denoted by SW 1, and SW 0 for OFF) at time t 0 which is obtained as follows. P SW 1 p0< i 0 D t 0 0 f S ON i 1 p 0 < i 0 D t 0 0 f S OFF f S ON i f S OFF i s s f ON s 1 F ON t0 s ds s 1 F i ON t0 s ds 1 if i 0 f ON f ON f OFF f OFF if i % 0. ~ ÍÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÑÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÏ ÍÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÑÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÏ i i f ON f OFF f OFF ÍÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÑÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÏ ÍÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÑÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÒÏ i i1
19 probability of accessibility Numerical Experiments: Synthetic Networks Simulations Upper Bound Lower Bound I Lower Bound II t Figure: Probability of accessibility between two (randomly selected) nodes in a network with N 20 nodes. The probability of each edge is uniformly selected from the range [0.05, 1] and remains constant during the observation window of 16 time slots.
20 probability of accessibility Numerical Experiments: Synthetic Networks (Cont d) Simulations Upper Bound Lower Bound I Lower Bound II t Figure: Probability of accessibility between two randomly selected nodes for the partially connected network. In this network of N 20 nodes a fraction α 0.5 of the edges are assumed to be open with a fixed probability p 0.1 and the rest of edges will not be open at any time.
21 Figure: Comparison between the upper bound and Monte-Carlo simulations of the probability of accessibility for 40 randomly selected pairs in four time slots, t 2, t 4, t 6 and t 8 Numerical Experiments: Synthetic Networks (Cont d) 0.3 t = t = t = Simulation Upper Bound t =
22 probability density function Numerical Experiments: Synthetic Networks (Cont d π D i j dp i t j dt Simulations Upper Bound Lower Bound I Lower Bound II delay Figure: Accessibility delay distribution (for the experiment setting of Fig. 6). Such delay is defined as the elapsed time for a node j to become accessible from i for the first time (for uniform probabilities of edges).
23 probability density function Numerical Experiments: Synthetic Networks(Cont d) π D i j dp i t j dt Simulations Upper Bound Lower Bound I Lower Bound II delay Figure: Accessibility delay distribution (for the partially connected network setting experiment in Fig. 7.)
24 probability of being ON Numerical Experiments: Synthetic Networks(Cont d) analytical simulations t Figure: Comparing probability of an edge existing between two specific nodes (randomly selected) obtained from simulations and ON-OFF analytical model for exponentially distributed ON-OFF periods
25 Delay (minutes) Numerical Experiments: Real World Data Observed delay Expected delay from the upper bound Edges Figure: Comparing the expected delay derived from the upper-bound and estimated edge probabilities over the training phase, and the average delay from the 10 experiments. Due to the relatively small size of the dataset and possibility of unexpected events (e.g absence of a vehicle from the network) a few points of discrepancy are not surprising.
26 Correlation Coefficient Numerical Experiments: Real World Data (Cont d) t Figure: Pearson s correlation coefficient between the predicted probabilities of accessibility and the empirically estimated values.
27 Current Research : Accessibility in Spatio-Temporal Networks 1 2 (0,0) (0,d) Figure: Two-hop connectivity in a random spatio-temporal network PPP with parameter λ. We assume p ij t e r 2 ij Z T 1: P p 12 1 e d2 Z T 2: P p 2 12 Z T 3: 1 exp πλ 2 e 1 2 d2 (D. Hedges, et al., 2017) P P E4 l"φ 1 α il 2 p lj 3 where α il 2 P i 2 l.
A = A U. U [n] P(A U ). n 1. 2 k(n k). k. k=1
Lecture I jacques@ucsd.edu Notation: Throughout, P denotes probability and E denotes expectation. Denote (X) (r) = X(X 1)... (X r + 1) and let G n,p denote the Erdős-Rényi model of random graphs. 10 Random
More information3.2 Configuration model
3.2 Configuration model 3.2.1 Definition. Basic properties Assume that the vector d = (d 1,..., d n ) is graphical, i.e., there exits a graph on n vertices such that vertex 1 has degree d 1, vertex 2 has
More informationTravelling Salesman Problem
Travelling Salesman Problem Fabio Furini November 10th, 2014 Travelling Salesman Problem 1 Outline 1 Traveling Salesman Problem Separation Travelling Salesman Problem 2 (Asymmetric) Traveling Salesman
More informationProbabilistic Method. Benny Sudakov. Princeton University
Probabilistic Method Benny Sudakov Princeton University Rough outline The basic Probabilistic method can be described as follows: In order to prove the existence of a combinatorial structure with certain
More informationNotes 6 : First and second moment methods
Notes 6 : First and second moment methods Math 733-734: Theory of Probability Lecturer: Sebastien Roch References: [Roc, Sections 2.1-2.3]. Recall: THM 6.1 (Markov s inequality) Let X be a non-negative
More informationLecture 5: January 30
CS71 Randomness & Computation Spring 018 Instructor: Alistair Sinclair Lecture 5: January 30 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They
More informationQuick Tour of Linear Algebra and Graph Theory
Quick Tour of Linear Algebra and Graph Theory CS224w: Social and Information Network Analysis Fall 2012 Yu Wayne Wu Based on Borja Pelato s version in Fall 2011 Matrices and Vectors Matrix: A rectangular
More informationThe Probabilistic Method
The Probabilistic Method In Graph Theory Ehssan Khanmohammadi Department of Mathematics The Pennsylvania State University February 25, 2010 What do we mean by the probabilistic method? Why use this method?
More informationCourse Notes. Part IV. Probabilistic Combinatorics. Algorithms
Course Notes Part IV Probabilistic Combinatorics and Algorithms J. A. Verstraete Department of Mathematics University of California San Diego 9500 Gilman Drive La Jolla California 92037-0112 jacques@ucsd.edu
More informationGraphRNN: A Deep Generative Model for Graphs (24 Feb 2018)
GraphRNN: A Deep Generative Model for Graphs (24 Feb 2018) Jiaxuan You, Rex Ying, Xiang Ren, William L. Hamilton, Jure Leskovec Presented by: Jesse Bettencourt and Harris Chan March 9, 2018 University
More informationMarkov Chains CK eqns Classes Hitting times Rec./trans. Strong Markov Stat. distr. Reversibility * Markov Chains
Markov Chains A random process X is a family {X t : t T } of random variables indexed by some set T. When T = {0, 1, 2,... } one speaks about a discrete-time process, for T = R or T = [0, ) one has a continuous-time
More informationOptimization Exercise Set n.5 :
Optimization Exercise Set n.5 : Prepared by S. Coniglio translated by O. Jabali 2016/2017 1 5.1 Airport location In air transportation, usually there is not a direct connection between every pair of airports.
More informationFinding a Heaviest Triangle is not Harder than Matrix Multiplication
Finding a Heaviest Triangle is not Harder than Matrix Multiplication Artur Czumaj Department of Computer Science New Jersey Institute of Technology aczumaj@acm.org Andrzej Lingas Department of Computer
More informationOutline. Computer Science 331. Cost of Binary Search Tree Operations. Bounds on Height: Worst- and Average-Case
Outline Computer Science Average Case Analysis: Binary Search Trees Mike Jacobson Department of Computer Science University of Calgary Lecture #7 Motivation and Objective Definition 4 Mike Jacobson (University
More informationRandom Geometric Graphs
Random Geometric Graphs Mathew D. Penrose University of Bath, UK SAMBa Symposium (Talk 2) University of Bath November 2014 1 MODELS of RANDOM GRAPHS Erdos-Renyi G(n, p): start with the complete n-graph,
More informationApplications of the Lopsided Lovász Local Lemma Regarding Hypergraphs
Regarding Hypergraphs Ph.D. Dissertation Defense April 15, 2013 Overview The Local Lemmata 2-Coloring Hypergraphs with the Original Local Lemma Counting Derangements with the Lopsided Local Lemma Lopsided
More informationProbabilistic Proofs of Existence of Rare Events. Noga Alon
Probabilistic Proofs of Existence of Rare Events Noga Alon Department of Mathematics Sackler Faculty of Exact Sciences Tel Aviv University Ramat-Aviv, Tel Aviv 69978 ISRAEL 1. The Local Lemma In a typical
More informationAdaptive Crowdsourcing via EM with Prior
Adaptive Crowdsourcing via EM with Prior Peter Maginnis and Tanmay Gupta May, 205 In this work, we make two primary contributions: derivation of the EM update for the shifted and rescaled beta prior and
More informationModeling of Growing Networks with Directional Attachment and Communities
Modeling of Growing Networks with Directional Attachment and Communities Masahiro KIMURA, Kazumi SAITO, Naonori UEDA NTT Communication Science Laboratories 2-4 Hikaridai, Seika-cho, Kyoto 619-0237, Japan
More informationAn Introduction to Exponential-Family Random Graph Models
An Introduction to Exponential-Family Random Graph Models Luo Lu Feb.8, 2011 1 / 11 Types of complications in social network Single relationship data A single relationship observed on a set of nodes at
More informationNetworks: Lectures 9 & 10 Random graphs
Networks: Lectures 9 & 10 Random graphs Heather A Harrington Mathematical Institute University of Oxford HT 2017 What you re in for Week 1: Introduction and basic concepts Week 2: Small worlds Week 3:
More informationNonnegative Matrices I
Nonnegative Matrices I Daisuke Oyama Topics in Economic Theory September 26, 2017 References J. L. Stuart, Digraphs and Matrices, in Handbook of Linear Algebra, Chapter 29, 2006. R. A. Brualdi and H. J.
More informationInteger programming: an introduction. Alessandro Astolfi
Integer programming: an introduction Alessandro Astolfi Outline Introduction Examples Methods for solving ILP Optimization on graphs LP problems with integer solutions Summary Introduction Integer programming
More informationSequential Change-Point Approach for Online Community Detection
Sequential Change-Point Approach for Online Community Detection Yao Xie Joint work with David Marangoni-Simonsen H. Milton Stewart School of Industrial and Systems Engineering Georgia Institute of Technology
More informationA Bayesian methodology for systemic risk assessment in financial networks
A Bayesian methodology for systemic risk assessment in financial networks Luitgard A. M. Veraart London School of Economics and Political Science March 2015 Joint work with Axel Gandy (Imperial College
More informationBounded Arithmetic, Expanders, and Monotone Propositional Proofs
Bounded Arithmetic, Expanders, and Monotone Propositional Proofs joint work with Valentine Kabanets, Antonina Kolokolova & Michal Koucký Takeuti Symposium on Advances in Logic Kobe, Japan September 20,
More informationShortest paths with negative lengths
Chapter 8 Shortest paths with negative lengths In this chapter we give a linear-space, nearly linear-time algorithm that, given a directed planar graph G with real positive and negative lengths, but no
More informationComputing and Communicating Functions over Sensor Networks
Computing and Communicating Functions over Sensor Networks Solmaz Torabi Dept. of Electrical and Computer Engineering Drexel University solmaz.t@drexel.edu Advisor: Dr. John M. Walsh 1/35 1 Refrences [1]
More information6.207/14.15: Networks Lecture 12: Generalized Random Graphs
6.207/14.15: Networks Lecture 12: Generalized Random Graphs 1 Outline Small-world model Growing random networks Power-law degree distributions: Rich-Get-Richer effects Models: Uniform attachment model
More informationUndirected Graphical Models
Outline Hong Chang Institute of Computing Technology, Chinese Academy of Sciences Machine Learning Methods (Fall 2012) Outline Outline I 1 Introduction 2 Properties Properties 3 Generative vs. Conditional
More informationShow that the following problems are NP-complete
Show that the following problems are NP-complete April 7, 2018 Below is a list of 30 exercises in which you are asked to prove that some problem is NP-complete. The goal is to better understand the theory
More information8.5 Sequencing Problems
8.5 Sequencing Problems Basic genres. Packing problems: SET-PACKING, INDEPENDENT SET. Covering problems: SET-COVER, VERTEX-COVER. Constraint satisfaction problems: SAT, 3-SAT. Sequencing problems: HAMILTONIAN-CYCLE,
More informationChapter 9: Relations Relations
Chapter 9: Relations 9.1 - Relations Definition 1 (Relation). Let A and B be sets. A binary relation from A to B is a subset R A B, i.e., R is a set of ordered pairs where the first element from each pair
More informationNP-Complete Problems. More reductions
NP-Complete Problems More reductions Definitions P: problems that can be solved in polynomial time (typically in n, size of input) on a deterministic Turing machine Any normal computer simulates a DTM
More informationMarkov and Gibbs Random Fields
Markov and Gibbs Random Fields Bruno Galerne bruno.galerne@parisdescartes.fr MAP5, Université Paris Descartes Master MVA Cours Méthodes stochastiques pour l analyse d images Lundi 6 mars 2017 Outline The
More informationDeterministic Decentralized Search in Random Graphs
Deterministic Decentralized Search in Random Graphs Esteban Arcaute 1,, Ning Chen 2,, Ravi Kumar 3, David Liben-Nowell 4,, Mohammad Mahdian 3, Hamid Nazerzadeh 1,, and Ying Xu 1, 1 Stanford University.
More informationDecision Diagrams for Discrete Optimization
Decision Diagrams for Discrete Optimization Willem Jan van Hoeve Tepper School of Business Carnegie Mellon University www.andrew.cmu.edu/user/vanhoeve/mdd/ Acknowledgments: David Bergman, Andre Cire, Samid
More informationP(X 0 = j 0,... X nk = j k )
Introduction to Probability Example Sheet 3 - Michaelmas 2006 Michael Tehranchi Problem. Let (X n ) n 0 be a homogeneous Markov chain on S with transition matrix P. Given a k N, let Z n = X kn. Prove that
More informationMa/CS 6b Class 12: Graphs and Matrices
Ma/CS 6b Class 2: Graphs and Matrices 3 3 v 5 v 4 v By Adam Sheffer Non-simple Graphs In this class we allow graphs to be nonsimple. We allow parallel edges, but not loops. Incidence Matrix Consider a
More information6.207/14.15: Networks Lecture 7: Search on Networks: Navigation and Web Search
6.207/14.15: Networks Lecture 7: Search on Networks: Navigation and Web Search Daron Acemoglu and Asu Ozdaglar MIT September 30, 2009 1 Networks: Lecture 7 Outline Navigation (or decentralized search)
More informationRandom Graphs. 7.1 Introduction
7 Random Graphs 7.1 Introduction The theory of random graphs began in the late 1950s with the seminal paper by Erdös and Rényi [?]. In contrast to percolation theory, which emerged from efforts to model
More informationRandomized Algorithms. Zhou Jun
Randomized Algorithms Zhou Jun 1 Content 13.1 Contention Resolution 13.2 Global Minimum Cut 13.3 *Random Variables and Expectation 13.4 Randomized Approximation Algorithm for MAX 3- SAT 13.6 Hashing 13.7
More informationA Lower Bound for the Size of Syntactically Multilinear Arithmetic Circuits
A Lower Bound for the Size of Syntactically Multilinear Arithmetic Circuits Ran Raz Amir Shpilka Amir Yehudayoff Abstract We construct an explicit polynomial f(x 1,..., x n ), with coefficients in {0,
More informationApproximate Sunflowers
Approximate Sunflowers Benamin Rossman January 26, 2019 Abstract A (p, ε-approximate sunflower is a family of sets S with the property that a p-random subset of the universe is 1 ε likely to contain a
More informationOrbitopes. Marc Pfetsch. joint work with Volker Kaibel. Zuse Institute Berlin
Orbitopes Marc Pfetsch joint work with Volker Kaibel Zuse Institute Berlin What this talk is about We introduce orbitopes. A polyhedral way to break symmetries in integer programs. Introduction 2 Orbitopes
More informationOptimization Exercise Set n. 4 :
Optimization Exercise Set n. 4 : Prepared by S. Coniglio and E. Amaldi translated by O. Jabali 2018/2019 1 4.1 Airport location In air transportation, usually there is not a direct connection between every
More informationChapter 7: Time Complexity
Chapter 7: Time Complexity 1 Time complexity Let M be a deterministic Turing machine that halts on all inputs. The running time or time complexity of M is the function f: N N, where f(n) is the maximum
More informationEE 381V: Large Scale Learning Spring Lecture 16 March 7
EE 381V: Large Scale Learning Spring 2013 Lecture 16 March 7 Lecturer: Caramanis & Sanghavi Scribe: Tianyang Bai 16.1 Topics Covered In this lecture, we introduced one method of matrix completion via SVD-based
More informationUniversity of Chicago Autumn 2003 CS Markov Chain Monte Carlo Methods
University of Chicago Autumn 2003 CS37101-1 Markov Chain Monte Carlo Methods Lecture 4: October 21, 2003 Bounding the mixing time via coupling Eric Vigoda 4.1 Introduction In this lecture we ll use the
More informationAdventures in random graphs: Models, structures and algorithms
BCAM January 2011 1 Adventures in random graphs: Models, structures and algorithms Armand M. Makowski ECE & ISR/HyNet University of Maryland at College Park armand@isr.umd.edu BCAM January 2011 2 Complex
More information. p.1. Mathematical Models of the WWW and related networks. Alan Frieze
. p.1 Mathematical Models of the WWW and related networks Alan Frieze The WWW is an example of a large real-world network.. p.2 The WWW is an example of a large real-world network. It grows unpredictably
More informationNear-domination in graphs
Near-domination in graphs Bruce Reed Researcher, Projet COATI, INRIA and Laboratoire I3S, CNRS France, and Visiting Researcher, IMPA, Brazil Alex Scott Mathematical Institute, University of Oxford, Oxford
More informationThe Probabilistic Method
The Probabilistic Method Janabel Xia and Tejas Gopalakrishna MIT PRIMES Reading Group, mentors Gwen McKinley and Jake Wellens December 7th, 2018 Janabel Xia and Tejas Gopalakrishna Probabilistic Method
More informationLecture 5: Probabilistic tools and Applications II
T-79.7003: Graphs and Networks Fall 2013 Lecture 5: Probabilistic tools and Applications II Lecturer: Charalampos E. Tsourakakis Oct. 11, 2013 5.1 Overview In the first part of today s lecture we will
More informationTheory of Computation Time Complexity
Theory of Computation Time Complexity Bow-Yaw Wang Academia Sinica Spring 2012 Bow-Yaw Wang (Academia Sinica) Time Complexity Spring 2012 1 / 59 Time for Deciding a Language Let us consider A = {0 n 1
More informationThe Lovász Local Lemma : A constructive proof
The Lovász Local Lemma : A constructive proof Andrew Li 19 May 2016 Abstract The Lovász Local Lemma is a tool used to non-constructively prove existence of combinatorial objects meeting a certain conditions.
More information) ) = γ. and P ( X. B(a, b) = Γ(a)Γ(b) Γ(a + b) ; (x + y, ) I J}. Then, (rx) a 1 (ry) b 1 e (x+y)r r 2 dxdy Γ(a)Γ(b) D
3 Independent Random Variables II: Examples 3.1 Some functions of independent r.v. s. Let X 1, X 2,... be independent r.v. s with the known distributions. Then, one can compute the distribution of a r.v.
More informationLecture 4: NP and computational intractability
Chapter 4 Lecture 4: NP and computational intractability Listen to: Find the longest path, Daniel Barret What do we do today: polynomial time reduction NP, co-np and NP complete problems some examples
More informationGraph Detection and Estimation Theory
Introduction Detection Estimation Graph Detection and Estimation Theory (and algorithms, and applications) Patrick J. Wolfe Statistics and Information Sciences Laboratory (SISL) School of Engineering and
More informationMaximum Flow Problem (Ford and Fulkerson, 1956)
Maximum Flow Problem (Ford and Fulkerson, 196) In this problem we find the maximum flow possible in a directed connected network with arc capacities. There is unlimited quantity available in the given
More informationAll Ramsey numbers for brooms in graphs
All Ramsey numbers for brooms in graphs Pei Yu Department of Mathematics Tongji University Shanghai, China yupeizjy@16.com Yusheng Li Department of Mathematics Tongji University Shanghai, China li yusheng@tongji.edu.cn
More informationA Lower Bound Technique for Restricted Branching Programs and Applications
A Lower Bound Technique for Restricted Branching Programs and Applications (Extended Abstract) Philipp Woelfel FB Informatik, LS2, Univ. Dortmund, 44221 Dortmund, Germany woelfel@ls2.cs.uni-dortmund.de
More informationAdventures in random graphs: Models, structures and algorithms
BCAM January 2011 1 Adventures in random graphs: Models, structures and algorithms Armand M. Makowski ECE & ISR/HyNet University of Maryland at College Park armand@isr.umd.edu BCAM January 2011 2 LECTURE
More informationBounds for pairs in partitions of graphs
Bounds for pairs in partitions of graphs Jie Ma Xingxing Yu School of Mathematics Georgia Institute of Technology Atlanta, GA 30332-0160, USA Abstract In this paper we study the following problem of Bollobás
More informationNetwork models: dynamical growth and small world
Network models: dynamical growth and small world Leonid E. Zhukov School of Data Analysis and Artificial Intelligence Department of Computer Science National Research University Higher School of Economics
More informationIndependent Transversals in r-partite Graphs
Independent Transversals in r-partite Graphs Raphael Yuster Department of Mathematics Raymond and Beverly Sackler Faculty of Exact Sciences Tel Aviv University, Tel Aviv, Israel Abstract Let G(r, n) denote
More informationNATIONAL BOARD FOR HIGHER MATHEMATICS. M. A. and M.Sc. Scholarship Test. September 19, Time Allowed: 150 Minutes Maximum Marks: 30
NATIONAL BOARD FOR HIGHER MATHEMATICS M. A. and M.Sc. Scholarship Test September 19, 2015 Time Allowed: 150 Minutes Maximum Marks: 30 Please read, carefully, the instructions on the following page 1 INSTRUCTIONS
More informationBranching Process Approach to Avalanche Dynamics on Complex Networks
Journal of the Korean Physical Society, Vol. 44, No. 3, March 2004, pp. 633 637 Branching Process Approach to Avalanche Dynamics on Complex Networks D.-S. Lee, K.-I. Goh, B. Kahng and D. Kim School of
More informationJeong-Hyun Kang Department of Mathematics, University of West Georgia, Carrollton, GA
#A33 INTEGERS 10 (2010), 379-392 DISTANCE GRAPHS FROM P -ADIC NORMS Jeong-Hyun Kang Department of Mathematics, University of West Georgia, Carrollton, GA 30118 jkang@westga.edu Hiren Maharaj Department
More informationAlgebra II CP Final Exam Review Packet. Calculator Questions
Name: Algebra II CP Final Exam Review Packet Calculator Questions 1. Solve the equation. Check for extraneous solutions. (Sec. 1.6) 2 8 37 2. Graph the inequality 31. (Sec. 2.8) 3. If y varies directly
More informationGraph homomorphism into an odd cycle
Graph homomorphism into an odd cycle Hong-Jian Lai West Virginia University, Morgantown, WV 26506 EMAIL: hjlai@math.wvu.edu Bolian Liu South China Normal University, Guangzhou, P. R. China EMAIL: liubl@hsut.scun.edu.cn
More informationDiscrete Mathematics. Benny George K. September 22, 2011
Discrete Mathematics Benny George K Department of Computer Science and Engineering Indian Institute of Technology Guwahati ben@iitg.ernet.in September 22, 2011 Set Theory Elementary Concepts Let A and
More informationModel Counting for Logical Theories
Model Counting for Logical Theories Wednesday Dmitry Chistikov Rayna Dimitrova Department of Computer Science University of Oxford, UK Max Planck Institute for Software Systems (MPI-SWS) Kaiserslautern
More informationOn a correlation inequality of Farr
On a correlation inequality of Farr Colin McDiarmid, Department of Statistics Oxford University Abstract Suppose that each vertex of a graph independently chooses a colour uniformly from the set {1,...,
More informationApproximate Counting
Approximate Counting Andreas-Nikolas Göbel National Technical University of Athens, Greece Advanced Algorithms, May 2010 Outline 1 The Monte Carlo Method Introduction DNFSAT Counting 2 The Markov Chain
More informationClosest String and Closest Substring Problems
January 8, 2010 Problem Formulation Problem Statement I Closest String Given a set S = {s 1, s 2,, s n } of strings each length m, find a center string s of length m minimizing d such that for every string
More informationNordhaus-Gaddum Theorems for k-decompositions
Nordhaus-Gaddum Theorems for k-decompositions Western Michigan University October 12, 2011 A Motivating Problem Consider the following problem. An international round-robin sports tournament is held between
More informationHypergraph Ramsey numbers
Hypergraph Ramsey numbers David Conlon Jacob Fox Benny Sudakov Abstract The Ramsey number r k (s, n is the minimum N such that every red-blue coloring of the k-tuples of an N-element set contains a red
More informationFeasibility of Periodic Scan Schedules
Feasibility of Periodic Scan Schedules Ants PI Meeting, Seattle, May 2000 Bruno Dutertre System Design Laboratory SRI International e-mail: bruno@sdl.sri.com 1 Scan Scheduling Scan scheduling: Given n
More informationGRAPH ALGORITHMS Week 7 (13 Nov - 18 Nov 2017)
GRAPH ALGORITHMS Week 7 (13 Nov - 18 Nov 2017) C. Croitoru croitoru@info.uaic.ro FII November 12, 2017 1 / 33 OUTLINE Matchings Analytical Formulation of the Maximum Matching Problem Perfect Matchings
More informationWhy Should Mathematical Modeling In Biology Be Even Possible?
Why Should Mathematical Modeling In Biology Be Even Possible? Winfried Just Department of Mathematics, Ohio University March 27, 2018 An example of mathematical modeling in biology. Based on Oduro, Grijalva,
More informationRandom Geometric Graphs
Random Geometric Graphs Mathew D. Penrose University of Bath, UK Networks: stochastic models for populations and epidemics ICMS, Edinburgh September 2011 1 MODELS of RANDOM GRAPHS Erdos-Renyi G(n, p):
More informationModels of Computation. by Costas Busch, LSU
Models of Computation by Costas Busch, LSU 1 Computation CPU memory 2 temporary memory input memory CPU output memory Program memory 3 Example: f ( x) x 3 temporary memory input memory Program memory compute
More informationTopics in Theoretical Computer Science April 08, Lecture 8
Topics in Theoretical Computer Science April 08, 204 Lecture 8 Lecturer: Ola Svensson Scribes: David Leydier and Samuel Grütter Introduction In this lecture we will introduce Linear Programming. It was
More informationQueue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling
1 Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling Saswati Sarkar and Koushik Kar Abstract In this paper, we consider queue-length stability in wireless
More informationLecture: Workload Models (Advanced Topic)
Lecture: Workload Models (Advanced Topic) Real-Time Systems, HT11 Martin Stigge 28. September 2011 Martin Stigge Workload Models 28. September 2011 1 System
More informationLower Bounds for Cutting Planes Proofs. with Small Coecients. Abstract. We consider small-weight Cutting Planes (CP ) proofs; that is,
Lower Bounds for Cutting Planes Proofs with Small Coecients Maria Bonet y Toniann Pitassi z Ran Raz x Abstract We consider small-weight Cutting Planes (CP ) proofs; that is, Cutting Planes (CP ) proofs
More information5 Flows and cuts in digraphs
5 Flows and cuts in digraphs Recall that a digraph or network is a pair G = (V, E) where V is a set and E is a multiset of ordered pairs of elements of V, which we refer to as arcs. Note that two vertices
More informationFall 2017 Qualifier Exam: OPTIMIZATION. September 18, 2017
Fall 2017 Qualifier Exam: OPTIMIZATION September 18, 2017 GENERAL INSTRUCTIONS: 1 Answer each question in a separate book 2 Indicate on the cover of each book the area of the exam, your code number, and
More informationApplications of Convex Optimization on the Graph Isomorphism problem
Applications of Convex Optimization on the Graph Isomorphism problem 1 1 Department of Information and Computer Sciences UC Irvine March 8, 2011 Outline Motivation 1 Motivation The Graph Isomorphism problem
More informationAssignment 2 : Probabilistic Methods
Assignment 2 : Probabilistic Methods jverstra@math Question 1. Let d N, c R +, and let G n be an n-vertex d-regular graph. Suppose that vertices of G n are selected independently with probability p, where
More informationCombinatorial optimization problems
Combinatorial optimization problems Heuristic Algorithms Giovanni Righini University of Milan Department of Computer Science (Crema) Optimization In general an optimization problem can be formulated as:
More informationSolving Zero-Sum Security Games in Discretized Spatio-Temporal Domains
Solving Zero-Sum Security Games in Discretized Spatio-Temporal Domains APPENDIX LP Formulation for Constant Number of Resources (Fang et al. 3) For the sae of completeness, we describe the LP formulation
More informationApplications of the Sparse Regularity Lemma
Applications of the Sparse Regularity Lemma Y. Kohayakawa (Emory and São Paulo) Extremal Combinatorics II DIMACS 2004 1 Szemerédi s regularity lemma 1. Works very well for large, dense graphs: n-vertex
More informationChapter 3: Discrete Optimization Integer Programming
Chapter 3: Discrete Optimization Integer Programming Edoardo Amaldi DEIB Politecnico di Milano edoardo.amaldi@polimi.it Sito web: http://home.deib.polimi.it/amaldi/ott-13-14.shtml A.A. 2013-14 Edoardo
More informationPaul Erdős and Graph Ramsey Theory
Paul Erdős and Graph Ramsey Theory Benny Sudakov ETH and UCLA Ramsey theorem Ramsey theorem Definition: The Ramsey number r(s, n) is the minimum N such that every red-blue coloring of the edges of a complete
More informationComplexity (Pre Lecture)
Complexity (Pre Lecture) Dr. Neil T. Dantam CSCI-561, Colorado School of Mines Fall 2018 Dantam (Mines CSCI-561) Complexity (Pre Lecture) Fall 2018 1 / 70 Why? What can we always compute efficiently? What
More informationIntroduction to Reinforcement Learning. CMPT 882 Mar. 18
Introduction to Reinforcement Learning CMPT 882 Mar. 18 Outline for the week Basic ideas in RL Value functions and value iteration Policy evaluation and policy improvement Model-free RL Monte-Carlo and
More informationAn Algorithm to Determine the Clique Number of a Split Graph. In this paper, we propose an algorithm to determine the clique number of a split graph.
An Algorithm to Determine the Clique Number of a Split Graph O.Kettani email :o_ket1@yahoo.fr Abstract In this paper, we propose an algorithm to determine the clique number of a split graph. Introduction
More information