Adaptive Rumor Spreading
|
|
- Peter Bishop
- 6 years ago
- Views:
Transcription
1 José Correa 1 Marcos Kiwi 1 Neil Olver 2 Alberto Vera VU Amsterdam and CWI July 27, /21
2 The situation 2/21
3 The situation 2/21
4 The situation 2/21
5 The situation 2/21
6 Introduction Rumors in social networks: contents, updates, new technology, etc. 3/21
7 Introduction Rumors in social networks: contents, updates, new technology, etc. In viral marketing campaigns, the selection of vertices is crucial. Domingos and Richardson (2001) 3/21
8 Introduction Rumors in social networks: contents, updates, new technology, etc. In viral marketing campaigns, the selection of vertices is crucial. Domingos and Richardson (2001) An agent (service provider) wants to efficiently speed up the communication process. 3/21
9 Rumor spreading Models differ in time and communication protocol. Demers et al. (1987) and Boyd et al. (2006) 4/21
10 Rumor spreading Models differ in time and communication protocol. Demers et al. (1987) and Boyd et al. (2006) In simple cases, the time to activate all the network is mostly understood. 4/21
11 Rumor spreading Models differ in time and communication protocol. Demers et al. (1987) and Boyd et al. (2006) In simple cases, the time to activate all the network is mostly understood. Even in random networks the estimates are logarithmic in the number of nodes. Doerr et al. (2012) and Chierichetti et al. (2011) 4/21
12 Opportunistic networks We have an overload problem, an option is to exploit opportunistic communications. 5/21
13 Opportunistic networks We have an overload problem, an option is to exploit opportunistic communications. A fixed deadline scenario has been studied heuristically along with real large-scale data. Whitbeck et al. (2011) 5/21
14 Opportunistic networks We have an overload problem, an option is to exploit opportunistic communications. A fixed deadline scenario has been studied heuristically along with real large-scale data. Whitbeck et al. (2011) Control theory based algorithms greatly outperform static ones. Sciancalepore et al. (2014) 5/21
15 The model Bob communicates and shares information. 6/21
16 The model Bob communicates and shares information. Bob meets Alice according to a Poisson process of rate λ/n. λ/n 6/21
17 The model Bob communicates and shares information. Bob meets Alice according to a Poisson process of rate λ/n. Every pair of nodes can meet and gossip. λ/n 6/21
18 The problem There is a unit cost for pushing the rumor. Opportunistic communications have no cost. At time τ all of the graph must be active. 7/21
19 The problem There is a unit cost for pushing the rumor. Opportunistic communications have no cost. At time τ all of the graph must be active. We want a strategy that minimizes the overall number of pushes. 7/21
20 Adaptive and non-adaptive A non-adaptive strategy pushes only at times t = 0 and t = τ. 8/21
21 Adaptive and non-adaptive A non-adaptive strategy pushes only at times t = 0 and t = τ. An adaptive strategy may push at any time, with the full knowledge of the process evolution. 8/21
22 Introduction Model Proofs Other results and open questions Adaptive and non-adaptive A non-adaptive strategy pushes only at times t = 0 and t = τ. An adaptive strategy may push at any time, with the full knowledge of the process evolution. Number of active nodes Number of active nodes Push τ t 0 t3 τ t 8/21
23 Main result Define the adaptivity gap as the ratio between the expected costs of non-adaptive and adaptive. Theorem In the complete graph the adaptivity gap is constant. 9/21
24 Adaptive can be arbitrarily better r v1 v2 v3 vk 10/21
25 Adaptive can be arbitrarily better With a small deadline, non-adaptive activates all of the v i s. Adaptive activates only the root, then at some time t pushes to the inactive v i s. r v1 v2 v3 vk 10/21
26 Adaptive can be arbitrarily better With a small deadline, non-adaptive activates all of the v i s. Adaptive activates only the root, then at some time t pushes to the inactive v i s. An adaptivity gap of log k log log k is easy to prove. r v1 v2 v3 vk 10/21
27 Non-adaptive λ k k N n k N λ = 1. λ k := k(n k) n. 1 n/2 n k 11/21
28 Non-adaptive Optimal non-adaptive pays almost the same at t = 0 and at t = τ. λ k k N n k N λ = 1. λ k := k(n k) n. 1 n/2 n k 11/21
29 Non-adaptive Optimal non-adaptive pays almost the same at t = 0 and at t = τ. - A 2-approximation is easy to see. λ k k N n k N λ = 1. λ k := k(n k) n. 1 n/2 n k 11/21
30 Non-adaptive Optimal non-adaptive pays almost the same at t = 0 and at t = τ. - A 2-approximation is easy to see. Non-adaptive does not push more than n/2 rumors. Therefore, neither adaptive. λ k k N n k N λ = 1. λ k := k(n k) n. 1 n/2 n k 11/21
31 Big deadline: τ (2 + δ) log n Starting from a single active node, the time until everyone is active is 2 log n + O(1). The time is exponentially concentrated. Jason (1999) Just starting with one node has cost 1 + ε, therefore adaptivity does not help. 12/21
32 Small deadline: τ 2 log log n A Poisson process of unit rate gives the randomness. t 13/21
33 Small deadline: τ 2 log log n A Poisson process of unit rate gives the randomness. Given the points S i and S i+1, the rescaling S i+1 S i λ i inter-arrival time. is the k λ k λ k+1 λ i t 13/21
34 Small deadline: τ 2 log log n A Poisson process of unit rate gives the randomness. Given the points S i and S i+1, the rescaling S i+1 S i λ i inter-arrival time. A push can be seen as adding a point. is the k λ k λ k+1 λ i λ i+1 t 13/21
35 Small deadline (cont.): τ 2 log log n A clairvoyant strategy knows the realization, therefore outperforms adaptive. k λ k λ k+1 λ i λ i+1 t 14/21
36 Small deadline (cont.): τ 2 log log n A clairvoyant strategy knows the realization, therefore outperforms adaptive. We show that clairvoyant adds points only at the beginning. k λ k λ k+1 λ i λ i+1 t 14/21
37 Small deadline (cont.): τ 2 log log n A clairvoyant strategy knows the realization, therefore outperforms adaptive. We show that clairvoyant adds points only at the beginning. Clairvoyant chooses the best number of initial pushes, given the realization. k λ k λ k+1 λ i λ i+1 t 14/21
38 Small deadline (cont.): τ 2 log log n Say we start with k initial pushes. 15/21
39 Small deadline (cont.): τ 2 log log n Say we start with k initial pushes. We know the inter-arrival distributions. We know the non-adaptive cost; it pays Ω( n log n ). 15/21
40 Small deadline (cont.): τ 2 log log n Say we start with k initial pushes. We know the inter-arrival distributions. We know the non-adaptive cost; it pays Ω( n log n ). Lemma Clairvoyant is considerably better than non-adaptive with probability at most 1 n 2. 15/21
41 Small deadline (cont.): τ 2 log log n Say we start with k initial pushes. We know the inter-arrival distributions. We know the non-adaptive cost; it pays Ω( n log n ). Lemma Clairvoyant is considerably better than non-adaptive with probability at most 1 n 2. In this case we can prove the gap to be 1 + o(1). 15/21
42 Other deadlines Insight: adaptive interferes when the cost of pushing is less than or equal to that of not pushing, i.e., 1 + cost(k + 1 active nodes) cost(k active nodes). ( ) 16/21
43 Other deadlines Insight: adaptive interferes when the cost of pushing is less than or equal to that of not pushing, i.e., 1 + cost(k + 1 active nodes) cost(k active nodes). ( ) The expected cost remains the same, it is a martingale, thus the condition should be met only a few times. 16/21
44 Other deadlines Insight: adaptive interferes when the cost of pushing is less than or equal to that of not pushing, i.e., 1 + cost(k + 1 active nodes) cost(k active nodes). ( ) The expected cost remains the same, it is a martingale, thus the condition should be met only a few times. A relaxed strategy pushes for free, but with certain conditions. 16/21
45 Other deadlines Insight: adaptive interferes when the cost of pushing is less than or equal to that of not pushing, i.e., 1 + cost(k + 1 active nodes) cost(k active nodes). ( ) The expected cost remains the same, it is a martingale, thus the condition should be met only a few times. A relaxed strategy pushes for free, but with certain conditions. - Pushes only when ( ) holds. - Does not push after n/2. 16/21
46 Other deadlines Insight: adaptive interferes when the cost of pushing is less than or equal to that of not pushing, i.e., 1 + cost(k + 1 active nodes) cost(k active nodes). ( ) The expected cost remains the same, it is a martingale, thus the condition should be met only a few times. A relaxed strategy pushes for free, but with certain conditions. - Pushes only when ( ) holds. - Does not push after n/2. Relaxed outperforms adaptive. 16/21
47 Other deadlines (cont.) Relaxed adaptive can be described by thresholds φ k. 17/21
48 Introduction Model Proofs Other results and open questions Other deadlines (cont.) Relaxed adaptive can be described by thresholds φ k. Let K(t) be the number of active nodes at time t. cost( K(t)) L(t ) L( tk+1) φk+2 φk+1 φk cost( K(0)) t tk+1 t H(0) H(L(t)) 17/21
49 Introduction Model Proofs Other results and open questions Other deadlines (cont.) Relaxed adaptive can be described by thresholds φ k. Let K(t) be the number of active nodes at time t. We transform the process: H (L(t)) := λ K(t) log cost( K(t)) φ K(t). cost( K(t)) L(t ) L( tk+1) φk+2 φk+1 φk cost( K(0)) t tk+1 t H(0) H(L(t)) 17/21
50 Introduction Model Proofs Other results and open questions Other deadlines (cont.) Relaxed adaptive can be described by thresholds φ k. Let K(t) be the number of active nodes at time t. We transform the process: H (L(t)) := λ K(t) log cost( K(t)) φ K(t). cost( K(t)) L(t ) ) L( tk+1) L(t) φk+2 φk+1 φk cost( K(0)) t t tk+1 H(0) tt H(L(t)) 17/21
51 Introduction Model Proofs Other results and open questions Other deadlines (cont.) We show that each time H touches zero, relaxed wins exactly 1 compared to non-adaptive. L(t ) L( t k+1) L(t) H(0) t k+1 t H(L(t)) 18/21
52 Introduction Model Proofs Other results and open questions Other deadlines (cont.) We show that each time H touches zero, relaxed wins exactly 1 compared to non-adaptive. Essentially H (s) is dominated by s 2 Poiss(s). L(t ) L( t k+1) L(t) H(0) t k+1 t H(L(t)) 18/21
53 Introduction Model Proofs Other results and open questions Other deadlines (cont.) We show that each time H touches zero, relaxed wins exactly 1 compared to non-adaptive. Essentially H (s) is dominated by s 2 Poiss(s). The number of times H (s) touches zero is constant. L(t ) L( t k+1) L(t) H(0) t k+1 t H(L(t)) 18/21
54 Additional results The target set version has a constant adaptivity gap. 19/21
55 Additional results The target set version has a constant adaptivity gap. The maximization problem has a 1 + o(1) adaptivity gap. 19/21
56 General model /21
57 General model 2 1 λ 1, /21
58 General model λ 1,2 = 1 2 λ 1,3 3 λ 4,5 = /21
59 General model We need to keep track of the set of active nodes. λ 1,2 = 1 2 λ 1,3 3 λ 4,5 = /21
60 General model We need to keep track of the set of active nodes. Even the non-adaptive problem is difficult in this setting! λ 1,2 = 1 2 λ 1,3 3 λ 4,5 = /21
61 Conjectures and open problems Is there a broader class of graphs maintaining the constant gap result? - High conductance/connectivity. - Metric induced rates. 21/21
62 Conjectures and open problems Is there a broader class of graphs maintaining the constant gap result? - High conductance/connectivity. - Metric induced rates. Additive gap for the complete graph is constant, i.e., cost NA cost A = O(1). 21/21
Social Influence in Online Social Networks. Epidemiological Models. Epidemic Process
Social Influence in Online Social Networks Toward Understanding Spatial Dependence on Epidemic Thresholds in Networks Dr. Zesheng Chen Viral marketing ( word-of-mouth ) Blog information cascading Rumor
More informationDistributed Systems Gossip Algorithms
Distributed Systems Gossip Algorithms He Sun School of Informatics University of Edinburgh What is Gossip? Gossip algorithms In a gossip algorithm, each node in the network periodically exchanges information
More informationMobiHoc 2014 MINIMUM-SIZED INFLUENTIAL NODE SET SELECTION FOR SOCIAL NETWORKS UNDER THE INDEPENDENT CASCADE MODEL
MobiHoc 2014 MINIMUM-SIZED INFLUENTIAL NODE SET SELECTION FOR SOCIAL NETWORKS UNDER THE INDEPENDENT CASCADE MODEL Jing (Selena) He Department of Computer Science, Kennesaw State University Shouling Ji,
More informationSurge Pricing and Labor Supply in the Ride- Sourcing Market
Surge Pricing and Labor Supply in the Ride- Sourcing Market Yafeng Yin Professor Department of Civil and Environmental Engineering University of Michigan, Ann Arbor *Joint work with Liteng Zha (@Amazon)
More informationPerformance Evaluation. Analyzing competitive influence maximization problems with partial information: An approximation algorithmic framework
Performance Evaluation ( ) Contents lists available at ScienceDirect Performance Evaluation journal homepage: www.elsevier.com/locate/peva Analyzing competitive influence maximization problems with partial
More informationInformation Dissemination in Social Networks under the Linear Threshold Model
Information Dissemination in Social Networks under the Linear Threshold Model Srinivasan Venkatramanan and Anurag Kumar Department of Electrical Communication Engineering, Indian Institute of Science,
More informationVoting and Mechanism Design
José M Vidal Department of Computer Science and Engineering, University of South Carolina March 26, 2010 Abstract Voting, Mechanism design, and distributed algorithmics mechanism design. Chapter 8. Voting
More informationLearning to Predict Opinion Share in Social Networks
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence AAAI-10 Learning to Predict Opinion Share in Social Networks Masahiro Kimura Department of Electronics and Informatics Ryukoku
More informationCSCI 3210: Computational Game Theory. Cascading Behavior in Networks Ref: [AGT] Ch 24
CSCI 3210: Computational Game Theory Cascading Behavior in Networks Ref: [AGT] Ch 24 Mohammad T. Irfan Email: mirfan@bowdoin.edu Web: www.bowdoin.edu/~mirfan Course Website: www.bowdoin.edu/~mirfan/csci-3210.html
More informationLow-Regret for Online Decision-Making
Siddhartha Banerjee and Alberto Vera November 6, 2018 1/17 Introduction Compensated Coupling Bayes Selector Conclusion Motivation 2/17 Introduction Compensated Coupling Bayes Selector Conclusion Motivation
More informationLocal Interactions in a Market with Heterogeneous Expectations
1 / 17 Local Interactions in a Market with Heterogeneous Expectations Mikhail Anufriev 1 Andrea Giovannetti 2 Valentyn Panchenko 3 1,2 University of Technology Sydney 3 UNSW Sydney, Australia Computing
More informationWorst case analysis for a general class of on-line lot-sizing heuristics
Worst case analysis for a general class of on-line lot-sizing heuristics Wilco van den Heuvel a, Albert P.M. Wagelmans a a Econometric Institute and Erasmus Research Institute of Management, Erasmus University
More informationInfluence Maximization in Dynamic Social Networks
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang and Xiaoming Sun Department of Computer Science and Technology, Tsinghua University Department of Computer
More informationThe greedy independent set in a random graph with given degr
The greedy independent set in a random graph with given degrees 1 2 School of Mathematical Sciences Queen Mary University of London e-mail: m.luczak@qmul.ac.uk January 2016 Monash University 1 Joint work
More informationWITH the recent advancements of information technologies,
i Distributed Rumor Blocking with Multiple Positive Cascades Guangmo (Amo) Tong, Student Member, IEEE, Weili Wu, Member, IEEE, and Ding-Zhu Du, arxiv:1711.07412 [cs.si] 1 Dec 2017 Abstract Misinformation
More informationDetecting Anti-majority Opinionists Using Value-weighted Mixture Voter Model
Detecting Anti-majority Opinionists Using Value-weighted Mixture Voter Model Masahiro Kimura, Kazumi Saito 2, Kouzou Ohara 3, and Hiroshi Motoda 4 Department of Electronics and Informatics, Ryukoku University
More informationTime-Critical Influence Maximization in Social Networks with Time-Delayed Diffusion Process
Time-Critical Influence Maximization in Social Networks with Time-Delayed Diffusion Process Wei Chen Microsoft Research Asia Beijing, China weic@microsoft.com Wei Lu University of British Columbia Vancouver,
More informationA Framework for Automated Competitive Analysis of On-line Scheduling of Firm-Deadline Tasks
A Framework for Automated Competitive Analysis of On-line Scheduling of Firm-Deadline Tasks Krishnendu Chatterjee 1, Andreas Pavlogiannis 1, Alexander Kößler 2, Ulrich Schmid 2 1 IST Austria, 2 TU Wien
More informationProbability Models of Information Exchange on Networks Lecture 6
Probability Models of Information Exchange on Networks Lecture 6 UC Berkeley Many Other Models There are many models of information exchange on networks. Q: Which model to chose? My answer good features
More informationCS599: Algorithm Design in Strategic Settings Fall 2012 Lecture 7: Prior-Free Multi-Parameter Mechanism Design. Instructor: Shaddin Dughmi
CS599: Algorithm Design in Strategic Settings Fall 2012 Lecture 7: Prior-Free Multi-Parameter Mechanism Design Instructor: Shaddin Dughmi Outline 1 Multi-Parameter Problems and Examples 2 The VCG Mechanism
More informationCORRECTNESS OF A GOSSIP BASED MEMBERSHIP PROTOCOL BY (ANDRÉ ALLAVENA, ALAN DEMERS, JOHN E. HOPCROFT ) PRATIK TIMALSENA UNIVERSITY OF OSLO
CORRECTNESS OF A GOSSIP BASED MEMBERSHIP PROTOCOL BY (ANDRÉ ALLAVENA, ALAN DEMERS, JOHN E. HOPCROFT ) PRATIK TIMALSENA UNIVERSITY OF OSLO OUTLINE q Contribution of the paper q Gossip algorithm q The corrected
More informationOn service level measures in stochastic inventory control
On service level measures in stochastic inventory control Dr. Roberto Rossi The University of Edinburgh Business School, The University of Edinburgh, UK roberto.rossi@ed.ac.uk Friday, June the 21th, 2013
More informationCrowd-Learning: Improving the Quality of Crowdsourcing Using Sequential Learning
Crowd-Learning: Improving the Quality of Crowdsourcing Using Sequential Learning Mingyan Liu (Joint work with Yang Liu) Department of Electrical Engineering and Computer Science University of Michigan,
More informationMulti-Round Influence Maximization
Multi-Round Influence Maximization Lichao Sun 1, Weiran Huang 2, Philip S. Yu 1,2, Wei Chen 3, 1 University of Illinois at Chicago, 2 Tsinghua University, 3 Microsoft Research lsun29@uic.edu, huang.inbox@outlook.com,
More informationMaximizing the Spread of Influence through a Social Network. David Kempe, Jon Kleinberg, Éva Tardos SIGKDD 03
Maximizing the Spread of Influence through a Social Network David Kempe, Jon Kleinberg, Éva Tardos SIGKDD 03 Influence and Social Networks Economics, sociology, political science, etc. all have studied
More informationHow to deal with uncertainties and dynamicity?
How to deal with uncertainties and dynamicity? http://graal.ens-lyon.fr/ lmarchal/scheduling/ 19 novembre 2012 1/ 37 Outline 1 Sensitivity and Robustness 2 Analyzing the sensitivity : the case of Backfilling
More informationAn Ins t Ins an t t an Primer
An Instant Primer Links from Course Web Page Network Coding: An Instant Primer Fragouli, Boudec, and Widmer. Network Coding an Introduction Koetter and Medard On Randomized Network Coding Ho, Medard, Shi,
More informationCS 322: (Social and Information) Network Analysis Jure Leskovec Stanford University
CS 322: (Social and Inormation) Network Analysis Jure Leskovec Stanord University Initially some nodes S are active Each edge (a,b) has probability (weight) p ab b 0.4 0.4 0.2 a 0.4 0.2 0.4 g 0.2 Node
More informationTwo hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE. Date: Thursday 17th May 2018 Time: 09:45-11:45. Please answer all Questions.
COMP 34120 Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE AI and Games Date: Thursday 17th May 2018 Time: 09:45-11:45 Please answer all Questions. Use a SEPARATE answerbook for each SECTION
More informationModelling self-organizing networks
Paweł Department of Mathematics, Ryerson University, Toronto, ON Cargese Fall School on Random Graphs (September 2015) Outline 1 Introduction 2 Spatial Preferred Attachment (SPA) Model 3 Future work Multidisciplinary
More informationOn the Submodularity of Influence in Social Networks
On the Submodularity of Influence in Social Networks Elchanan Mossel Dept. of Statistics U.C. Berkeley mossel@stat.berkeley.edu Sebastien Roch Dept. of Statistics U.C. Berkeley sroch@stat.berkeley.edu
More informationAverage-Consensus of Multi-Agent Systems with Direct Topology Based on Event-Triggered Control
Outline Background Preliminaries Consensus Numerical simulations Conclusions Average-Consensus of Multi-Agent Systems with Direct Topology Based on Event-Triggered Control Email: lzhx@nankai.edu.cn, chenzq@nankai.edu.cn
More informationDistributed Optimization over Networks Gossip-Based Algorithms
Distributed Optimization over Networks Gossip-Based Algorithms Angelia Nedić angelia@illinois.edu ISE Department and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Outline Random
More informationViral Marketing and the Diffusion of Trends on Social Networks
University of Pennsylvania ScholarlyCommons Technical Reports (CIS) Department of Computer & Information Science May 2008 Viral Marketing and the Diffusion of Trends on Social Networks Jennifer Wortman
More informationLoad Balancing in Distributed Service System: A Survey
Load Balancing in Distributed Service System: A Survey Xingyu Zhou The Ohio State University zhou.2055@osu.edu November 21, 2016 Xingyu Zhou (OSU) Load Balancing November 21, 2016 1 / 29 Introduction and
More informationModeling face-to-face social interaction networks
Modeling face-to-face social interaction networks Romualdo Pastor-Satorras Dept. Fisica i Enginyería Nuclear Universitat Politècnica de Catalunya Spain http://www.fen.upc.edu/~romu Work done in collaboration
More information8. Cake cutting. proportionality and envy-freeness. price of fairness. approximate envy-freeness. Cake cutting 8-1
Cake cutting 8-1 8. Cake cutting proportionality and envy-freeness price of fairness approximate envy-freeness Cake cutting model a cake is the interval [0; 1] a peice of cake is X [0; 1] each of n agents
More informationTyler Hofmeister. University of Calgary Mathematical and Computational Finance Laboratory
JUMP PROCESSES GENERALIZING STOCHASTIC INTEGRALS WITH JUMPS Tyler Hofmeister University of Calgary Mathematical and Computational Finance Laboratory Overview 1. General Method 2. Poisson Processes 3. Diffusion
More informationHeuristic Search Algorithms
CHAPTER 4 Heuristic Search Algorithms 59 4.1 HEURISTIC SEARCH AND SSP MDPS The methods we explored in the previous chapter have a serious practical drawback the amount of memory they require is proportional
More informationDistributed Optimization. Song Chong EE, KAIST
Distributed Optimization Song Chong EE, KAIST songchong@kaist.edu Dynamic Programming for Path Planning A path-planning problem consists of a weighted directed graph with a set of n nodes N, directed links
More informationMaximizing throughput in zero-buffer tandem lines with dedicated and flexible servers
Maximizing throughput in zero-buffer tandem lines with dedicated and flexible servers Mohammad H. Yarmand and Douglas G. Down Department of Computing and Software, McMaster University, Hamilton, ON, L8S
More informationQuantized Average Consensus on Gossip Digraphs
Quantized Average Consensus on Gossip Digraphs Hideaki Ishii Tokyo Institute of Technology Joint work with Kai Cai Workshop on Uncertain Dynamical Systems Udine, Italy August 25th, 2011 Multi-Agent Consensus
More informationMaximizing the Spread of Influence through a Social Network
Maximizing the Spread of Influence through a Social Network David Kempe Dept. of Computer Science Cornell University, Ithaca NY kempe@cs.cornell.edu Jon Kleinberg Dept. of Computer Science Cornell University,
More informationRecoverabilty Conditions for Rankings Under Partial Information
Recoverabilty Conditions for Rankings Under Partial Information Srikanth Jagabathula Devavrat Shah Abstract We consider the problem of exact recovery of a function, defined on the space of permutations
More informationResilient and energy-aware algorithms
Resilient and energy-aware algorithms Anne Benoit ENS Lyon Anne.Benoit@ens-lyon.fr http://graal.ens-lyon.fr/~abenoit CR02-2016/2017 Anne.Benoit@ens-lyon.fr CR02 Resilient and energy-aware algorithms 1/
More informationA Note on Maximizing the Spread of Influence in Social Networks
A Note on Maximizing the Spread of Influence in Social Networks Eyal Even-Dar 1 and Asaf Shapira 2 1 Google Research, Email: evendar@google.com 2 Microsoft Research, Email: asafico@microsoft.com Abstract.
More informationDynamic Call Center Routing Policies Using Call Waiting and Agent Idle Times Online Supplement
Dynamic Call Center Routing Policies Using Call Waiting and Agent Idle Times Online Supplement Wyean Chan DIRO, Université de Montréal, C.P. 6128, Succ. Centre-Ville, Montréal (Québec), H3C 3J7, CANADA,
More informationMulti-Dimensional Online Tracking
Multi-Dimensional Online Tracking Ke Yi and Qin Zhang Hong Kong University of Science & Technology SODA 2009 January 4-6, 2009 1-1 A natural problem Bob: tracker f(t) g(t) Alice: observer (t, g(t)) t 2-1
More informationControlling conventional generation to minimize forecast error cost
Controlling conventional generation to minimize forecast error cost Ksenia Chernysh Heriot-Watt University xeniachernysh@gmailcom 25 April 2013 Ksenia Chernysh (Heriot-Watt University) Controlling conventional
More informationIntroduction to Modern Cryptography. Benny Chor
Introduction to Modern Cryptography Benny Chor Hard Core Bits Coin Flipping Over the Phone Zero Knowledge Lecture 10 (version 1.1) Tel-Aviv University 18 March 2008. Slightly revised March 19. Hard Core
More informationPolitical Cycles and Stock Returns. Pietro Veronesi
Political Cycles and Stock Returns Ľuboš Pástor and Pietro Veronesi University of Chicago, National Bank of Slovakia, NBER, CEPR University of Chicago, NBER, CEPR Average Excess Stock Market Returns 30
More informationWhen to Ask for an Update: Timing in Strategic Communication
When to Ask for an Update: Timing in Strategic Communication Work in Progress Ying Chen Johns Hopkins University Atara Oliver Rice University March 19, 2018 Main idea In many communication situations,
More informationUpper Bounds on Expected Hitting Times in Mostly-Covered Delay-Tolerant Networks
Upper Bounds on Expected Hitting Times in Mostly-Covered Delay-Tolerant Networks Max F. Brugger, Kyle Bradford, Samina Ehsan, Bechir Hamdaoui, Yevgeniy Kovchegov Oregon State University, Corvallis, OR
More informationTemporal Reachability Graphs
Temporal Reachability Graphs John Whitbeck, Marcelo Dias de Amorim, Vania Conan and Jean-Loup Guillaume August 25th, 212 Intro : Contact Traces 2/16 Intro : Contact Traces 2/16 Intro : Contact Traces Time
More informationSIMPLE RANDOM WALKS: IMPROBABILITY OF PROFITABLE STOPPING
SIMPLE RANDOM WALKS: IMPROBABILITY OF PROFITABLE STOPPING EMILY GENTLES Abstract. This paper introduces the basics of the simple random walk with a flair for the statistical approach. Applications in biology
More informationDS504/CS586: Big Data Analytics Graph Mining II
Welcome to DS504/CS586: Big Data Analytics Graph Mining II Prof. Yanhua Li Time: 6-8:50PM Thursday Location: AK233 Spring 2018 v Course Project I has been graded. Grading was based on v 1. Project report
More informationWelfare Maximization with Friends-of-Friends Network Externalities
Welfare Maximization with Friends-of-Friends Network Externalities Extended version of a talk at STACS 2015, Munich Wolfgang Dvořák 1 joint work with: Sayan Bhattacharya 2, Monika Henzinger 1, Martin Starnberger
More informationDiscrete random structures whose limits are described by a PDE: 3 open problems
Discrete random structures whose limits are described by a PDE: 3 open problems David Aldous April 3, 2014 Much of my research has involved study of n limits of size n random structures. There are many
More informationT. Liggett Mathematics 171 Final Exam June 8, 2011
T. Liggett Mathematics 171 Final Exam June 8, 2011 1. The continuous time renewal chain X t has state space S = {0, 1, 2,...} and transition rates (i.e., Q matrix) given by q(n, n 1) = δ n and q(0, n)
More informationcommunication complexity lower bounds yield data structure lower bounds
communication complexity lower bounds yield data structure lower bounds Implementation of a database - D: D represents a subset S of {...N} 2 3 4 Access to D via "membership queries" - Q for each i, can
More informationSequential Change-Point Approach for Online Community Detection
Sequential Change-Point Approach for Online Community Detection Yao Xie Joint work with David Marangoni-Simonsen H. Milton Stewart School of Industrial and Systems Engineering Georgia Institute of Technology
More informationRENEWAL PROCESSES AND POISSON PROCESSES
1 RENEWAL PROCESSES AND POISSON PROCESSES Andrea Bobbio Anno Accademico 1997-1998 Renewal and Poisson Processes 2 Renewal Processes A renewal process is a point process characterized by the fact that the
More informationOptimal Power Allocation for Cognitive Radio under Primary User s Outage Loss Constraint
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 29 proceedings Optimal Power Allocation for Cognitive Radio
More informationRouting. Topics: 6.976/ESD.937 1
Routing Topics: Definition Architecture for routing data plane algorithm Current routing algorithm control plane algorithm Optimal routing algorithm known algorithms and implementation issues new solution
More informationCompetitive Equilibrium and the Welfare Theorems
Competitive Equilibrium and the Welfare Theorems Craig Burnside Duke University September 2010 Craig Burnside (Duke University) Competitive Equilibrium September 2010 1 / 32 Competitive Equilibrium and
More informationEmbedded Systems 15. REVIEW: Aperiodic scheduling. C i J i 0 a i s i f i d i
Embedded Systems 15-1 - REVIEW: Aperiodic scheduling C i J i 0 a i s i f i d i Given: A set of non-periodic tasks {J 1,, J n } with arrival times a i, deadlines d i, computation times C i precedence constraints
More informationA Merchant Mechanism for Electricity Transmission Expansion
A Merchant Mechanism for Electricity Transmission Expansion Tarjei Kristiansen, Norwegian University of Science and Technology. Tarjei.Kristiansen@elkraft.ntnu.no Juan Rosellon, Harvard University/CIDE.
More informationModeling, Analysis, and Control of Information Propagation in Multi-layer and Multiplex Networks. Osman Yağan
Modeling, Analysis, and Control of Information Propagation in Multi-layer and Multiplex Networks Osman Yağan Department of ECE Carnegie Mellon University Joint work with Y. Zhuang and V. Gligor (CMU) Alex
More information14. Direct Sum (Part 1) - Introduction
Communication Complexity 14 Oct, 2011 (@ IMSc) 14. Direct Sum (Part 1) - Introduction Lecturer: Prahladh Harsha Scribe: Abhishek Dang 14.1 Introduction The Direct Sum problem asks how the difficulty in
More informationRate of Convergence of Learning in Social Networks
Rate of Convergence of Learning in Social Networks Ilan Lobel, Daron Acemoglu, Munther Dahleh and Asuman Ozdaglar Massachusetts Institute of Technology Cambridge, MA Abstract We study the rate of convergence
More informationLecture 21 Representations of Martingales
Lecture 21: Representations of Martingales 1 of 11 Course: Theory of Probability II Term: Spring 215 Instructor: Gordan Zitkovic Lecture 21 Representations of Martingales Right-continuous inverses Let
More informationCS 781 Lecture 9 March 10, 2011 Topics: Local Search and Optimization Metropolis Algorithm Greedy Optimization Hopfield Networks Max Cut Problem Nash
CS 781 Lecture 9 March 10, 2011 Topics: Local Search and Optimization Metropolis Algorithm Greedy Optimization Hopfield Networks Max Cut Problem Nash Equilibrium Price of Stability Coping With NP-Hardness
More informationNetworks: space-time stochastic models for networks
Mobile and Delay Tolerant Networks: space-time stochastic models for networks Philippe Jacquet Alcatel-Lucent Bell Labs France Plan of the talk Short history of wireless networking Information in space-time
More informationNETWORKS, in all forms and sizes, are at heart of almost
EDIC RESEARCH PROPOSAL 1 Aggregating and Influencing in Networks Giel J. Op t Veld LINX, I&C, EPFL Abstract Discussed are three different problem statements in a network setting that involve either the
More informationOnline Contextual Influence Maximization with Costly Observations
his article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 1.119/SIPN.18.866334,
More informationPower Controlled FCFS Splitting Algorithm for Wireless Networks
Power Controlled FCFS Splitting Algorithm for Wireless Networks Ashutosh Deepak Gore Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology - Bombay COMNET Workshop, July
More informationDS504/CS586: Big Data Analytics Graph Mining II
Welcome to DS504/CS586: Big Data Analytics Graph Mining II Prof. Yanhua Li Time: 6:00pm 8:50pm Mon. and Wed. Location: SL105 Spring 2016 Reading assignments We will increase the bar a little bit Please
More informationThe Beginning of Graph Theory. Theory and Applications of Complex Networks. Eulerian paths. Graph Theory. Class Three. College of the Atlantic
Theory and Applications of Complex Networs 1 Theory and Applications of Complex Networs 2 Theory and Applications of Complex Networs Class Three The Beginning of Graph Theory Leonhard Euler wonders, can
More informationLogFeller et Ray Knight
LogFeller et Ray Knight Etienne Pardoux joint work with V. Le and A. Wakolbinger Etienne Pardoux (Marseille) MANEGE, 18/1/1 1 / 16 Feller s branching diffusion with logistic growth We consider the diffusion
More informationDynamic Power Allocation and Routing for Time Varying Wireless Networks
Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,
More informationIntroduction to Bandit Algorithms. Introduction to Bandit Algorithms
Stochastic K-Arm Bandit Problem Formulation Consider K arms (actions) each correspond to an unknown distribution {ν k } K k=1 with values bounded in [0, 1]. At each time t, the agent pulls an arm I t {1,...,
More informationAn Adaptive Algorithm for Selecting Profitable Keywords for Search-Based Advertising Services
An Adaptive Algorithm for Selecting Profitable Keywords for Search-Based Advertising Services Paat Rusmevichientong David P. Williamson July 6, 2007 Abstract Increases in online searches have spurred the
More information12. LOCAL SEARCH. gradient descent Metropolis algorithm Hopfield neural networks maximum cut Nash equilibria
12. LOCAL SEARCH gradient descent Metropolis algorithm Hopfield neural networks maximum cut Nash equilibria Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison Wesley h ttp://www.cs.princeton.edu/~wayne/kleinberg-tardos
More informationA Reservoir Sampling Algorithm with Adaptive Estimation of Conditional Expectation
A Reservoir Sampling Algorithm with Adaptive Estimation of Conditional Expectation Vu Malbasa and Slobodan Vucetic Abstract Resource-constrained data mining introduces many constraints when learning from
More informationGenerating p-extremal graphs
Generating p-extremal graphs Derrick Stolee Department of Mathematics Department of Computer Science University of Nebraska Lincoln s-dstolee1@math.unl.edu August 2, 2011 Abstract Let f(n, p be the maximum
More informationAnalysis of random-access MAC schemes
Analysis of random-access MA schemes M. Veeraraghavan and Tao i ast updated: Sept. 203. Slotted Aloha [4] First-order analysis: if we assume there are infinite number of nodes, the number of new arrivals
More informationA STAFFING ALGORITHM FOR CALL CENTERS WITH SKILL-BASED ROUTING: SUPPLEMENTARY MATERIAL
A STAFFING ALGORITHM FOR CALL CENTERS WITH SKILL-BASED ROUTING: SUPPLEMENTARY MATERIAL by Rodney B. Wallace IBM and The George Washington University rodney.wallace@us.ibm.com Ward Whitt Columbia University
More informationFast Convergence in Evolutionary Equilibrium Selection
Fast Convergence in Evolutionary Equilibrium Selection Gabriel E Kreindler H Peyton Young September 26, 2011 Abstract Stochastic learning models provide sharp predictions about equilibrium selection when
More informationTime and Schedulability Analysis of Stateflow Models
Time and Schedulability Analysis of Stateflow Models Marco Di Natale Scuola Superiore S. Anna Haibo Zeng Mc Gill University Outline Context: MBD of Embedded Systems Relationship with PBD An Introduction
More informationSIS epidemics on Networks
SIS epidemics on etworks Piet Van Mieghem in collaboration with Eric Cator, Ruud van de Bovenkamp, Cong Li, Stojan Trajanovski, Dongchao Guo, Annalisa Socievole and Huijuan Wang 1 EURADOM 30 June-2 July,
More informationRandom Processes. DS GA 1002 Probability and Statistics for Data Science.
Random Processes DS GA 1002 Probability and Statistics for Data Science http://www.cims.nyu.edu/~cfgranda/pages/dsga1002_fall17 Carlos Fernandez-Granda Aim Modeling quantities that evolve in time (or space)
More informationRumour spreading and graph conductance
Rumour spreading and graph conductance Flavio Chierichetti, Silvio Lattanzi, Alessandro Panconesi {chierichetti,lattanzi,ale}@di.uniroma1.it Dipartimento di Informatica Sapienza Università di Roma October
More informationTODAY, a considerable fraction of data requirements in
Simplifying Wireless Social Caching Mohammed Karmoose, Martina Cardone, and Christina Fragouli Abstract Social groups give the opportunity for a new form of caching. In this paper, we investigate how a
More informationarxiv: v3 [math.oc] 11 Dec 2018
A Re-solving Heuristic with Uniformly Bounded Loss for Network Revenue Management Pornpawee Bumpensanti, He Wang School of Industrial and Systems Engineering, Georgia Institute of echnology, Atlanta, GA
More informationPERCOLATION IN SELFISH SOCIAL NETWORKS
PERCOLATION IN SELFISH SOCIAL NETWORKS Charles Bordenave UC Berkeley joint work with David Aldous (UC Berkeley) PARADIGM OF SOCIAL NETWORKS OBJECTIVE - Understand better the dynamics of social behaviors
More informationSocial Welfare Functions for Sustainable Development
Social Welfare Functions for Sustainable Development Thai Ha-Huy, Cuong Le Van September 9, 2015 Abstract Keywords: criterion. anonymity; sustainable development, welfare function, Rawls JEL Classification:
More informationCS224W: Social and Information Network Analysis Jure Leskovec, Stanford University
CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University http://cs224w.stanford.edu 10/24/2012 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, http://cs224w.stanford.edu
More informationAn Approximation Algorithm for Approximation Rank
An Approximation Algorithm for Approximation Rank Troy Lee Columbia University Adi Shraibman Weizmann Institute Conventions Identify a communication function f : X Y { 1, +1} with the associated X-by-Y
More informationWhom to Ask? Jury Selection for Decision Making Tasks on Micro-blog Services
Whom to Ask? Jury Selection for Decision Making Tasks on Micro-blog Services Caleb Chen CAO, Jieying SHE, Yongxin TONG, Lei CHEN The Hong Kong University of Science and Technology Is Istanbul the capital
More informationImproved Direct Product Theorems for Randomized Query Complexity
Improved Direct Product Theorems for Randomized Query Complexity Andrew Drucker Nov. 16, 2010 Andrew Drucker, Improved Direct Product Theorems for Randomized Query Complexity 1/28 Big picture Usually,
More information