Adaptive Rumor Spreading

Size: px
Start display at page:

Download "Adaptive Rumor Spreading"

Transcription

1 José Correa 1 Marcos Kiwi 1 Neil Olver 2 Alberto Vera VU Amsterdam and CWI July 27, /21

2 The situation 2/21

3 The situation 2/21

4 The situation 2/21

5 The situation 2/21

6 Introduction Rumors in social networks: contents, updates, new technology, etc. 3/21

7 Introduction Rumors in social networks: contents, updates, new technology, etc. In viral marketing campaigns, the selection of vertices is crucial. Domingos and Richardson (2001) 3/21

8 Introduction Rumors in social networks: contents, updates, new technology, etc. In viral marketing campaigns, the selection of vertices is crucial. Domingos and Richardson (2001) An agent (service provider) wants to efficiently speed up the communication process. 3/21

9 Rumor spreading Models differ in time and communication protocol. Demers et al. (1987) and Boyd et al. (2006) 4/21

10 Rumor spreading Models differ in time and communication protocol. Demers et al. (1987) and Boyd et al. (2006) In simple cases, the time to activate all the network is mostly understood. 4/21

11 Rumor spreading Models differ in time and communication protocol. Demers et al. (1987) and Boyd et al. (2006) In simple cases, the time to activate all the network is mostly understood. Even in random networks the estimates are logarithmic in the number of nodes. Doerr et al. (2012) and Chierichetti et al. (2011) 4/21

12 Opportunistic networks We have an overload problem, an option is to exploit opportunistic communications. 5/21

13 Opportunistic networks We have an overload problem, an option is to exploit opportunistic communications. A fixed deadline scenario has been studied heuristically along with real large-scale data. Whitbeck et al. (2011) 5/21

14 Opportunistic networks We have an overload problem, an option is to exploit opportunistic communications. A fixed deadline scenario has been studied heuristically along with real large-scale data. Whitbeck et al. (2011) Control theory based algorithms greatly outperform static ones. Sciancalepore et al. (2014) 5/21

15 The model Bob communicates and shares information. 6/21

16 The model Bob communicates and shares information. Bob meets Alice according to a Poisson process of rate λ/n. λ/n 6/21

17 The model Bob communicates and shares information. Bob meets Alice according to a Poisson process of rate λ/n. Every pair of nodes can meet and gossip. λ/n 6/21

18 The problem There is a unit cost for pushing the rumor. Opportunistic communications have no cost. At time τ all of the graph must be active. 7/21

19 The problem There is a unit cost for pushing the rumor. Opportunistic communications have no cost. At time τ all of the graph must be active. We want a strategy that minimizes the overall number of pushes. 7/21

20 Adaptive and non-adaptive A non-adaptive strategy pushes only at times t = 0 and t = τ. 8/21

21 Adaptive and non-adaptive A non-adaptive strategy pushes only at times t = 0 and t = τ. An adaptive strategy may push at any time, with the full knowledge of the process evolution. 8/21

22 Introduction Model Proofs Other results and open questions Adaptive and non-adaptive A non-adaptive strategy pushes only at times t = 0 and t = τ. An adaptive strategy may push at any time, with the full knowledge of the process evolution. Number of active nodes Number of active nodes Push τ t 0 t3 τ t 8/21

23 Main result Define the adaptivity gap as the ratio between the expected costs of non-adaptive and adaptive. Theorem In the complete graph the adaptivity gap is constant. 9/21

24 Adaptive can be arbitrarily better r v1 v2 v3 vk 10/21

25 Adaptive can be arbitrarily better With a small deadline, non-adaptive activates all of the v i s. Adaptive activates only the root, then at some time t pushes to the inactive v i s. r v1 v2 v3 vk 10/21

26 Adaptive can be arbitrarily better With a small deadline, non-adaptive activates all of the v i s. Adaptive activates only the root, then at some time t pushes to the inactive v i s. An adaptivity gap of log k log log k is easy to prove. r v1 v2 v3 vk 10/21

27 Non-adaptive λ k k N n k N λ = 1. λ k := k(n k) n. 1 n/2 n k 11/21

28 Non-adaptive Optimal non-adaptive pays almost the same at t = 0 and at t = τ. λ k k N n k N λ = 1. λ k := k(n k) n. 1 n/2 n k 11/21

29 Non-adaptive Optimal non-adaptive pays almost the same at t = 0 and at t = τ. - A 2-approximation is easy to see. λ k k N n k N λ = 1. λ k := k(n k) n. 1 n/2 n k 11/21

30 Non-adaptive Optimal non-adaptive pays almost the same at t = 0 and at t = τ. - A 2-approximation is easy to see. Non-adaptive does not push more than n/2 rumors. Therefore, neither adaptive. λ k k N n k N λ = 1. λ k := k(n k) n. 1 n/2 n k 11/21

31 Big deadline: τ (2 + δ) log n Starting from a single active node, the time until everyone is active is 2 log n + O(1). The time is exponentially concentrated. Jason (1999) Just starting with one node has cost 1 + ε, therefore adaptivity does not help. 12/21

32 Small deadline: τ 2 log log n A Poisson process of unit rate gives the randomness. t 13/21

33 Small deadline: τ 2 log log n A Poisson process of unit rate gives the randomness. Given the points S i and S i+1, the rescaling S i+1 S i λ i inter-arrival time. is the k λ k λ k+1 λ i t 13/21

34 Small deadline: τ 2 log log n A Poisson process of unit rate gives the randomness. Given the points S i and S i+1, the rescaling S i+1 S i λ i inter-arrival time. A push can be seen as adding a point. is the k λ k λ k+1 λ i λ i+1 t 13/21

35 Small deadline (cont.): τ 2 log log n A clairvoyant strategy knows the realization, therefore outperforms adaptive. k λ k λ k+1 λ i λ i+1 t 14/21

36 Small deadline (cont.): τ 2 log log n A clairvoyant strategy knows the realization, therefore outperforms adaptive. We show that clairvoyant adds points only at the beginning. k λ k λ k+1 λ i λ i+1 t 14/21

37 Small deadline (cont.): τ 2 log log n A clairvoyant strategy knows the realization, therefore outperforms adaptive. We show that clairvoyant adds points only at the beginning. Clairvoyant chooses the best number of initial pushes, given the realization. k λ k λ k+1 λ i λ i+1 t 14/21

38 Small deadline (cont.): τ 2 log log n Say we start with k initial pushes. 15/21

39 Small deadline (cont.): τ 2 log log n Say we start with k initial pushes. We know the inter-arrival distributions. We know the non-adaptive cost; it pays Ω( n log n ). 15/21

40 Small deadline (cont.): τ 2 log log n Say we start with k initial pushes. We know the inter-arrival distributions. We know the non-adaptive cost; it pays Ω( n log n ). Lemma Clairvoyant is considerably better than non-adaptive with probability at most 1 n 2. 15/21

41 Small deadline (cont.): τ 2 log log n Say we start with k initial pushes. We know the inter-arrival distributions. We know the non-adaptive cost; it pays Ω( n log n ). Lemma Clairvoyant is considerably better than non-adaptive with probability at most 1 n 2. In this case we can prove the gap to be 1 + o(1). 15/21

42 Other deadlines Insight: adaptive interferes when the cost of pushing is less than or equal to that of not pushing, i.e., 1 + cost(k + 1 active nodes) cost(k active nodes). ( ) 16/21

43 Other deadlines Insight: adaptive interferes when the cost of pushing is less than or equal to that of not pushing, i.e., 1 + cost(k + 1 active nodes) cost(k active nodes). ( ) The expected cost remains the same, it is a martingale, thus the condition should be met only a few times. 16/21

44 Other deadlines Insight: adaptive interferes when the cost of pushing is less than or equal to that of not pushing, i.e., 1 + cost(k + 1 active nodes) cost(k active nodes). ( ) The expected cost remains the same, it is a martingale, thus the condition should be met only a few times. A relaxed strategy pushes for free, but with certain conditions. 16/21

45 Other deadlines Insight: adaptive interferes when the cost of pushing is less than or equal to that of not pushing, i.e., 1 + cost(k + 1 active nodes) cost(k active nodes). ( ) The expected cost remains the same, it is a martingale, thus the condition should be met only a few times. A relaxed strategy pushes for free, but with certain conditions. - Pushes only when ( ) holds. - Does not push after n/2. 16/21

46 Other deadlines Insight: adaptive interferes when the cost of pushing is less than or equal to that of not pushing, i.e., 1 + cost(k + 1 active nodes) cost(k active nodes). ( ) The expected cost remains the same, it is a martingale, thus the condition should be met only a few times. A relaxed strategy pushes for free, but with certain conditions. - Pushes only when ( ) holds. - Does not push after n/2. Relaxed outperforms adaptive. 16/21

47 Other deadlines (cont.) Relaxed adaptive can be described by thresholds φ k. 17/21

48 Introduction Model Proofs Other results and open questions Other deadlines (cont.) Relaxed adaptive can be described by thresholds φ k. Let K(t) be the number of active nodes at time t. cost( K(t)) L(t ) L( tk+1) φk+2 φk+1 φk cost( K(0)) t tk+1 t H(0) H(L(t)) 17/21

49 Introduction Model Proofs Other results and open questions Other deadlines (cont.) Relaxed adaptive can be described by thresholds φ k. Let K(t) be the number of active nodes at time t. We transform the process: H (L(t)) := λ K(t) log cost( K(t)) φ K(t). cost( K(t)) L(t ) L( tk+1) φk+2 φk+1 φk cost( K(0)) t tk+1 t H(0) H(L(t)) 17/21

50 Introduction Model Proofs Other results and open questions Other deadlines (cont.) Relaxed adaptive can be described by thresholds φ k. Let K(t) be the number of active nodes at time t. We transform the process: H (L(t)) := λ K(t) log cost( K(t)) φ K(t). cost( K(t)) L(t ) ) L( tk+1) L(t) φk+2 φk+1 φk cost( K(0)) t t tk+1 H(0) tt H(L(t)) 17/21

51 Introduction Model Proofs Other results and open questions Other deadlines (cont.) We show that each time H touches zero, relaxed wins exactly 1 compared to non-adaptive. L(t ) L( t k+1) L(t) H(0) t k+1 t H(L(t)) 18/21

52 Introduction Model Proofs Other results and open questions Other deadlines (cont.) We show that each time H touches zero, relaxed wins exactly 1 compared to non-adaptive. Essentially H (s) is dominated by s 2 Poiss(s). L(t ) L( t k+1) L(t) H(0) t k+1 t H(L(t)) 18/21

53 Introduction Model Proofs Other results and open questions Other deadlines (cont.) We show that each time H touches zero, relaxed wins exactly 1 compared to non-adaptive. Essentially H (s) is dominated by s 2 Poiss(s). The number of times H (s) touches zero is constant. L(t ) L( t k+1) L(t) H(0) t k+1 t H(L(t)) 18/21

54 Additional results The target set version has a constant adaptivity gap. 19/21

55 Additional results The target set version has a constant adaptivity gap. The maximization problem has a 1 + o(1) adaptivity gap. 19/21

56 General model /21

57 General model 2 1 λ 1, /21

58 General model λ 1,2 = 1 2 λ 1,3 3 λ 4,5 = /21

59 General model We need to keep track of the set of active nodes. λ 1,2 = 1 2 λ 1,3 3 λ 4,5 = /21

60 General model We need to keep track of the set of active nodes. Even the non-adaptive problem is difficult in this setting! λ 1,2 = 1 2 λ 1,3 3 λ 4,5 = /21

61 Conjectures and open problems Is there a broader class of graphs maintaining the constant gap result? - High conductance/connectivity. - Metric induced rates. 21/21

62 Conjectures and open problems Is there a broader class of graphs maintaining the constant gap result? - High conductance/connectivity. - Metric induced rates. Additive gap for the complete graph is constant, i.e., cost NA cost A = O(1). 21/21

Social Influence in Online Social Networks. Epidemiological Models. Epidemic Process

Social Influence in Online Social Networks. Epidemiological Models. Epidemic Process Social Influence in Online Social Networks Toward Understanding Spatial Dependence on Epidemic Thresholds in Networks Dr. Zesheng Chen Viral marketing ( word-of-mouth ) Blog information cascading Rumor

More information

Distributed Systems Gossip Algorithms

Distributed Systems Gossip Algorithms Distributed Systems Gossip Algorithms He Sun School of Informatics University of Edinburgh What is Gossip? Gossip algorithms In a gossip algorithm, each node in the network periodically exchanges information

More information

MobiHoc 2014 MINIMUM-SIZED INFLUENTIAL NODE SET SELECTION FOR SOCIAL NETWORKS UNDER THE INDEPENDENT CASCADE MODEL

MobiHoc 2014 MINIMUM-SIZED INFLUENTIAL NODE SET SELECTION FOR SOCIAL NETWORKS UNDER THE INDEPENDENT CASCADE MODEL MobiHoc 2014 MINIMUM-SIZED INFLUENTIAL NODE SET SELECTION FOR SOCIAL NETWORKS UNDER THE INDEPENDENT CASCADE MODEL Jing (Selena) He Department of Computer Science, Kennesaw State University Shouling Ji,

More information

Surge Pricing and Labor Supply in the Ride- Sourcing Market

Surge Pricing and Labor Supply in the Ride- Sourcing Market Surge Pricing and Labor Supply in the Ride- Sourcing Market Yafeng Yin Professor Department of Civil and Environmental Engineering University of Michigan, Ann Arbor *Joint work with Liteng Zha (@Amazon)

More information

Performance Evaluation. Analyzing competitive influence maximization problems with partial information: An approximation algorithmic framework

Performance Evaluation. Analyzing competitive influence maximization problems with partial information: An approximation algorithmic framework Performance Evaluation ( ) Contents lists available at ScienceDirect Performance Evaluation journal homepage: www.elsevier.com/locate/peva Analyzing competitive influence maximization problems with partial

More information

Information Dissemination in Social Networks under the Linear Threshold Model

Information Dissemination in Social Networks under the Linear Threshold Model Information Dissemination in Social Networks under the Linear Threshold Model Srinivasan Venkatramanan and Anurag Kumar Department of Electrical Communication Engineering, Indian Institute of Science,

More information

Voting and Mechanism Design

Voting and Mechanism Design José M Vidal Department of Computer Science and Engineering, University of South Carolina March 26, 2010 Abstract Voting, Mechanism design, and distributed algorithmics mechanism design. Chapter 8. Voting

More information

Learning to Predict Opinion Share in Social Networks

Learning to Predict Opinion Share in Social Networks Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence AAAI-10 Learning to Predict Opinion Share in Social Networks Masahiro Kimura Department of Electronics and Informatics Ryukoku

More information

CSCI 3210: Computational Game Theory. Cascading Behavior in Networks Ref: [AGT] Ch 24

CSCI 3210: Computational Game Theory. Cascading Behavior in Networks Ref: [AGT] Ch 24 CSCI 3210: Computational Game Theory Cascading Behavior in Networks Ref: [AGT] Ch 24 Mohammad T. Irfan Email: mirfan@bowdoin.edu Web: www.bowdoin.edu/~mirfan Course Website: www.bowdoin.edu/~mirfan/csci-3210.html

More information

Low-Regret for Online Decision-Making

Low-Regret for Online Decision-Making Siddhartha Banerjee and Alberto Vera November 6, 2018 1/17 Introduction Compensated Coupling Bayes Selector Conclusion Motivation 2/17 Introduction Compensated Coupling Bayes Selector Conclusion Motivation

More information

Local Interactions in a Market with Heterogeneous Expectations

Local Interactions in a Market with Heterogeneous Expectations 1 / 17 Local Interactions in a Market with Heterogeneous Expectations Mikhail Anufriev 1 Andrea Giovannetti 2 Valentyn Panchenko 3 1,2 University of Technology Sydney 3 UNSW Sydney, Australia Computing

More information

Worst case analysis for a general class of on-line lot-sizing heuristics

Worst case analysis for a general class of on-line lot-sizing heuristics Worst case analysis for a general class of on-line lot-sizing heuristics Wilco van den Heuvel a, Albert P.M. Wagelmans a a Econometric Institute and Erasmus Research Institute of Management, Erasmus University

More information

Influence Maximization in Dynamic Social Networks

Influence Maximization in Dynamic Social Networks Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang and Xiaoming Sun Department of Computer Science and Technology, Tsinghua University Department of Computer

More information

The greedy independent set in a random graph with given degr

The greedy independent set in a random graph with given degr The greedy independent set in a random graph with given degrees 1 2 School of Mathematical Sciences Queen Mary University of London e-mail: m.luczak@qmul.ac.uk January 2016 Monash University 1 Joint work

More information

WITH the recent advancements of information technologies,

WITH the recent advancements of information technologies, i Distributed Rumor Blocking with Multiple Positive Cascades Guangmo (Amo) Tong, Student Member, IEEE, Weili Wu, Member, IEEE, and Ding-Zhu Du, arxiv:1711.07412 [cs.si] 1 Dec 2017 Abstract Misinformation

More information

Detecting Anti-majority Opinionists Using Value-weighted Mixture Voter Model

Detecting Anti-majority Opinionists Using Value-weighted Mixture Voter Model Detecting Anti-majority Opinionists Using Value-weighted Mixture Voter Model Masahiro Kimura, Kazumi Saito 2, Kouzou Ohara 3, and Hiroshi Motoda 4 Department of Electronics and Informatics, Ryukoku University

More information

Time-Critical Influence Maximization in Social Networks with Time-Delayed Diffusion Process

Time-Critical Influence Maximization in Social Networks with Time-Delayed Diffusion Process Time-Critical Influence Maximization in Social Networks with Time-Delayed Diffusion Process Wei Chen Microsoft Research Asia Beijing, China weic@microsoft.com Wei Lu University of British Columbia Vancouver,

More information

A Framework for Automated Competitive Analysis of On-line Scheduling of Firm-Deadline Tasks

A Framework for Automated Competitive Analysis of On-line Scheduling of Firm-Deadline Tasks A Framework for Automated Competitive Analysis of On-line Scheduling of Firm-Deadline Tasks Krishnendu Chatterjee 1, Andreas Pavlogiannis 1, Alexander Kößler 2, Ulrich Schmid 2 1 IST Austria, 2 TU Wien

More information

Probability Models of Information Exchange on Networks Lecture 6

Probability Models of Information Exchange on Networks Lecture 6 Probability Models of Information Exchange on Networks Lecture 6 UC Berkeley Many Other Models There are many models of information exchange on networks. Q: Which model to chose? My answer good features

More information

CS599: Algorithm Design in Strategic Settings Fall 2012 Lecture 7: Prior-Free Multi-Parameter Mechanism Design. Instructor: Shaddin Dughmi

CS599: Algorithm Design in Strategic Settings Fall 2012 Lecture 7: Prior-Free Multi-Parameter Mechanism Design. Instructor: Shaddin Dughmi CS599: Algorithm Design in Strategic Settings Fall 2012 Lecture 7: Prior-Free Multi-Parameter Mechanism Design Instructor: Shaddin Dughmi Outline 1 Multi-Parameter Problems and Examples 2 The VCG Mechanism

More information

CORRECTNESS OF A GOSSIP BASED MEMBERSHIP PROTOCOL BY (ANDRÉ ALLAVENA, ALAN DEMERS, JOHN E. HOPCROFT ) PRATIK TIMALSENA UNIVERSITY OF OSLO

CORRECTNESS OF A GOSSIP BASED MEMBERSHIP PROTOCOL BY (ANDRÉ ALLAVENA, ALAN DEMERS, JOHN E. HOPCROFT ) PRATIK TIMALSENA UNIVERSITY OF OSLO CORRECTNESS OF A GOSSIP BASED MEMBERSHIP PROTOCOL BY (ANDRÉ ALLAVENA, ALAN DEMERS, JOHN E. HOPCROFT ) PRATIK TIMALSENA UNIVERSITY OF OSLO OUTLINE q Contribution of the paper q Gossip algorithm q The corrected

More information

On service level measures in stochastic inventory control

On service level measures in stochastic inventory control On service level measures in stochastic inventory control Dr. Roberto Rossi The University of Edinburgh Business School, The University of Edinburgh, UK roberto.rossi@ed.ac.uk Friday, June the 21th, 2013

More information

Crowd-Learning: Improving the Quality of Crowdsourcing Using Sequential Learning

Crowd-Learning: Improving the Quality of Crowdsourcing Using Sequential Learning Crowd-Learning: Improving the Quality of Crowdsourcing Using Sequential Learning Mingyan Liu (Joint work with Yang Liu) Department of Electrical Engineering and Computer Science University of Michigan,

More information

Multi-Round Influence Maximization

Multi-Round Influence Maximization Multi-Round Influence Maximization Lichao Sun 1, Weiran Huang 2, Philip S. Yu 1,2, Wei Chen 3, 1 University of Illinois at Chicago, 2 Tsinghua University, 3 Microsoft Research lsun29@uic.edu, huang.inbox@outlook.com,

More information

Maximizing the Spread of Influence through a Social Network. David Kempe, Jon Kleinberg, Éva Tardos SIGKDD 03

Maximizing the Spread of Influence through a Social Network. David Kempe, Jon Kleinberg, Éva Tardos SIGKDD 03 Maximizing the Spread of Influence through a Social Network David Kempe, Jon Kleinberg, Éva Tardos SIGKDD 03 Influence and Social Networks Economics, sociology, political science, etc. all have studied

More information

How to deal with uncertainties and dynamicity?

How to deal with uncertainties and dynamicity? How to deal with uncertainties and dynamicity? http://graal.ens-lyon.fr/ lmarchal/scheduling/ 19 novembre 2012 1/ 37 Outline 1 Sensitivity and Robustness 2 Analyzing the sensitivity : the case of Backfilling

More information

An Ins t Ins an t t an Primer

An Ins t Ins an t t an Primer An Instant Primer Links from Course Web Page Network Coding: An Instant Primer Fragouli, Boudec, and Widmer. Network Coding an Introduction Koetter and Medard On Randomized Network Coding Ho, Medard, Shi,

More information

CS 322: (Social and Information) Network Analysis Jure Leskovec Stanford University

CS 322: (Social and Information) Network Analysis Jure Leskovec Stanford University CS 322: (Social and Inormation) Network Analysis Jure Leskovec Stanord University Initially some nodes S are active Each edge (a,b) has probability (weight) p ab b 0.4 0.4 0.2 a 0.4 0.2 0.4 g 0.2 Node

More information

Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE. Date: Thursday 17th May 2018 Time: 09:45-11:45. Please answer all Questions.

Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE. Date: Thursday 17th May 2018 Time: 09:45-11:45. Please answer all Questions. COMP 34120 Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE AI and Games Date: Thursday 17th May 2018 Time: 09:45-11:45 Please answer all Questions. Use a SEPARATE answerbook for each SECTION

More information

Modelling self-organizing networks

Modelling self-organizing networks Paweł Department of Mathematics, Ryerson University, Toronto, ON Cargese Fall School on Random Graphs (September 2015) Outline 1 Introduction 2 Spatial Preferred Attachment (SPA) Model 3 Future work Multidisciplinary

More information

On the Submodularity of Influence in Social Networks

On the Submodularity of Influence in Social Networks On the Submodularity of Influence in Social Networks Elchanan Mossel Dept. of Statistics U.C. Berkeley mossel@stat.berkeley.edu Sebastien Roch Dept. of Statistics U.C. Berkeley sroch@stat.berkeley.edu

More information

Average-Consensus of Multi-Agent Systems with Direct Topology Based on Event-Triggered Control

Average-Consensus of Multi-Agent Systems with Direct Topology Based on Event-Triggered Control Outline Background Preliminaries Consensus Numerical simulations Conclusions Average-Consensus of Multi-Agent Systems with Direct Topology Based on Event-Triggered Control Email: lzhx@nankai.edu.cn, chenzq@nankai.edu.cn

More information

Distributed Optimization over Networks Gossip-Based Algorithms

Distributed Optimization over Networks Gossip-Based Algorithms Distributed Optimization over Networks Gossip-Based Algorithms Angelia Nedić angelia@illinois.edu ISE Department and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Outline Random

More information

Viral Marketing and the Diffusion of Trends on Social Networks

Viral Marketing and the Diffusion of Trends on Social Networks University of Pennsylvania ScholarlyCommons Technical Reports (CIS) Department of Computer & Information Science May 2008 Viral Marketing and the Diffusion of Trends on Social Networks Jennifer Wortman

More information

Load Balancing in Distributed Service System: A Survey

Load Balancing in Distributed Service System: A Survey Load Balancing in Distributed Service System: A Survey Xingyu Zhou The Ohio State University zhou.2055@osu.edu November 21, 2016 Xingyu Zhou (OSU) Load Balancing November 21, 2016 1 / 29 Introduction and

More information

Modeling face-to-face social interaction networks

Modeling face-to-face social interaction networks Modeling face-to-face social interaction networks Romualdo Pastor-Satorras Dept. Fisica i Enginyería Nuclear Universitat Politècnica de Catalunya Spain http://www.fen.upc.edu/~romu Work done in collaboration

More information

8. Cake cutting. proportionality and envy-freeness. price of fairness. approximate envy-freeness. Cake cutting 8-1

8. Cake cutting. proportionality and envy-freeness. price of fairness. approximate envy-freeness. Cake cutting 8-1 Cake cutting 8-1 8. Cake cutting proportionality and envy-freeness price of fairness approximate envy-freeness Cake cutting model a cake is the interval [0; 1] a peice of cake is X [0; 1] each of n agents

More information

Tyler Hofmeister. University of Calgary Mathematical and Computational Finance Laboratory

Tyler Hofmeister. University of Calgary Mathematical and Computational Finance Laboratory JUMP PROCESSES GENERALIZING STOCHASTIC INTEGRALS WITH JUMPS Tyler Hofmeister University of Calgary Mathematical and Computational Finance Laboratory Overview 1. General Method 2. Poisson Processes 3. Diffusion

More information

Heuristic Search Algorithms

Heuristic Search Algorithms CHAPTER 4 Heuristic Search Algorithms 59 4.1 HEURISTIC SEARCH AND SSP MDPS The methods we explored in the previous chapter have a serious practical drawback the amount of memory they require is proportional

More information

Distributed Optimization. Song Chong EE, KAIST

Distributed Optimization. Song Chong EE, KAIST Distributed Optimization Song Chong EE, KAIST songchong@kaist.edu Dynamic Programming for Path Planning A path-planning problem consists of a weighted directed graph with a set of n nodes N, directed links

More information

Maximizing throughput in zero-buffer tandem lines with dedicated and flexible servers

Maximizing throughput in zero-buffer tandem lines with dedicated and flexible servers Maximizing throughput in zero-buffer tandem lines with dedicated and flexible servers Mohammad H. Yarmand and Douglas G. Down Department of Computing and Software, McMaster University, Hamilton, ON, L8S

More information

Quantized Average Consensus on Gossip Digraphs

Quantized Average Consensus on Gossip Digraphs Quantized Average Consensus on Gossip Digraphs Hideaki Ishii Tokyo Institute of Technology Joint work with Kai Cai Workshop on Uncertain Dynamical Systems Udine, Italy August 25th, 2011 Multi-Agent Consensus

More information

Maximizing the Spread of Influence through a Social Network

Maximizing the Spread of Influence through a Social Network Maximizing the Spread of Influence through a Social Network David Kempe Dept. of Computer Science Cornell University, Ithaca NY kempe@cs.cornell.edu Jon Kleinberg Dept. of Computer Science Cornell University,

More information

Recoverabilty Conditions for Rankings Under Partial Information

Recoverabilty Conditions for Rankings Under Partial Information Recoverabilty Conditions for Rankings Under Partial Information Srikanth Jagabathula Devavrat Shah Abstract We consider the problem of exact recovery of a function, defined on the space of permutations

More information

Resilient and energy-aware algorithms

Resilient and energy-aware algorithms Resilient and energy-aware algorithms Anne Benoit ENS Lyon Anne.Benoit@ens-lyon.fr http://graal.ens-lyon.fr/~abenoit CR02-2016/2017 Anne.Benoit@ens-lyon.fr CR02 Resilient and energy-aware algorithms 1/

More information

A Note on Maximizing the Spread of Influence in Social Networks

A Note on Maximizing the Spread of Influence in Social Networks A Note on Maximizing the Spread of Influence in Social Networks Eyal Even-Dar 1 and Asaf Shapira 2 1 Google Research, Email: evendar@google.com 2 Microsoft Research, Email: asafico@microsoft.com Abstract.

More information

Dynamic Call Center Routing Policies Using Call Waiting and Agent Idle Times Online Supplement

Dynamic Call Center Routing Policies Using Call Waiting and Agent Idle Times Online Supplement Dynamic Call Center Routing Policies Using Call Waiting and Agent Idle Times Online Supplement Wyean Chan DIRO, Université de Montréal, C.P. 6128, Succ. Centre-Ville, Montréal (Québec), H3C 3J7, CANADA,

More information

Multi-Dimensional Online Tracking

Multi-Dimensional Online Tracking Multi-Dimensional Online Tracking Ke Yi and Qin Zhang Hong Kong University of Science & Technology SODA 2009 January 4-6, 2009 1-1 A natural problem Bob: tracker f(t) g(t) Alice: observer (t, g(t)) t 2-1

More information

Controlling conventional generation to minimize forecast error cost

Controlling conventional generation to minimize forecast error cost Controlling conventional generation to minimize forecast error cost Ksenia Chernysh Heriot-Watt University xeniachernysh@gmailcom 25 April 2013 Ksenia Chernysh (Heriot-Watt University) Controlling conventional

More information

Introduction to Modern Cryptography. Benny Chor

Introduction to Modern Cryptography. Benny Chor Introduction to Modern Cryptography Benny Chor Hard Core Bits Coin Flipping Over the Phone Zero Knowledge Lecture 10 (version 1.1) Tel-Aviv University 18 March 2008. Slightly revised March 19. Hard Core

More information

Political Cycles and Stock Returns. Pietro Veronesi

Political Cycles and Stock Returns. Pietro Veronesi Political Cycles and Stock Returns Ľuboš Pástor and Pietro Veronesi University of Chicago, National Bank of Slovakia, NBER, CEPR University of Chicago, NBER, CEPR Average Excess Stock Market Returns 30

More information

When to Ask for an Update: Timing in Strategic Communication

When to Ask for an Update: Timing in Strategic Communication When to Ask for an Update: Timing in Strategic Communication Work in Progress Ying Chen Johns Hopkins University Atara Oliver Rice University March 19, 2018 Main idea In many communication situations,

More information

Upper Bounds on Expected Hitting Times in Mostly-Covered Delay-Tolerant Networks

Upper Bounds on Expected Hitting Times in Mostly-Covered Delay-Tolerant Networks Upper Bounds on Expected Hitting Times in Mostly-Covered Delay-Tolerant Networks Max F. Brugger, Kyle Bradford, Samina Ehsan, Bechir Hamdaoui, Yevgeniy Kovchegov Oregon State University, Corvallis, OR

More information

Temporal Reachability Graphs

Temporal Reachability Graphs Temporal Reachability Graphs John Whitbeck, Marcelo Dias de Amorim, Vania Conan and Jean-Loup Guillaume August 25th, 212 Intro : Contact Traces 2/16 Intro : Contact Traces 2/16 Intro : Contact Traces Time

More information

SIMPLE RANDOM WALKS: IMPROBABILITY OF PROFITABLE STOPPING

SIMPLE RANDOM WALKS: IMPROBABILITY OF PROFITABLE STOPPING SIMPLE RANDOM WALKS: IMPROBABILITY OF PROFITABLE STOPPING EMILY GENTLES Abstract. This paper introduces the basics of the simple random walk with a flair for the statistical approach. Applications in biology

More information

DS504/CS586: Big Data Analytics Graph Mining II

DS504/CS586: Big Data Analytics Graph Mining II Welcome to DS504/CS586: Big Data Analytics Graph Mining II Prof. Yanhua Li Time: 6-8:50PM Thursday Location: AK233 Spring 2018 v Course Project I has been graded. Grading was based on v 1. Project report

More information

Welfare Maximization with Friends-of-Friends Network Externalities

Welfare Maximization with Friends-of-Friends Network Externalities Welfare Maximization with Friends-of-Friends Network Externalities Extended version of a talk at STACS 2015, Munich Wolfgang Dvořák 1 joint work with: Sayan Bhattacharya 2, Monika Henzinger 1, Martin Starnberger

More information

Discrete random structures whose limits are described by a PDE: 3 open problems

Discrete random structures whose limits are described by a PDE: 3 open problems Discrete random structures whose limits are described by a PDE: 3 open problems David Aldous April 3, 2014 Much of my research has involved study of n limits of size n random structures. There are many

More information

T. Liggett Mathematics 171 Final Exam June 8, 2011

T. Liggett Mathematics 171 Final Exam June 8, 2011 T. Liggett Mathematics 171 Final Exam June 8, 2011 1. The continuous time renewal chain X t has state space S = {0, 1, 2,...} and transition rates (i.e., Q matrix) given by q(n, n 1) = δ n and q(0, n)

More information

communication complexity lower bounds yield data structure lower bounds

communication complexity lower bounds yield data structure lower bounds communication complexity lower bounds yield data structure lower bounds Implementation of a database - D: D represents a subset S of {...N} 2 3 4 Access to D via "membership queries" - Q for each i, can

More information

Sequential Change-Point Approach for Online Community Detection

Sequential Change-Point Approach for Online Community Detection Sequential Change-Point Approach for Online Community Detection Yao Xie Joint work with David Marangoni-Simonsen H. Milton Stewart School of Industrial and Systems Engineering Georgia Institute of Technology

More information

RENEWAL PROCESSES AND POISSON PROCESSES

RENEWAL PROCESSES AND POISSON PROCESSES 1 RENEWAL PROCESSES AND POISSON PROCESSES Andrea Bobbio Anno Accademico 1997-1998 Renewal and Poisson Processes 2 Renewal Processes A renewal process is a point process characterized by the fact that the

More information

Optimal Power Allocation for Cognitive Radio under Primary User s Outage Loss Constraint

Optimal Power Allocation for Cognitive Radio under Primary User s Outage Loss Constraint This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 29 proceedings Optimal Power Allocation for Cognitive Radio

More information

Routing. Topics: 6.976/ESD.937 1

Routing. Topics: 6.976/ESD.937 1 Routing Topics: Definition Architecture for routing data plane algorithm Current routing algorithm control plane algorithm Optimal routing algorithm known algorithms and implementation issues new solution

More information

Competitive Equilibrium and the Welfare Theorems

Competitive Equilibrium and the Welfare Theorems Competitive Equilibrium and the Welfare Theorems Craig Burnside Duke University September 2010 Craig Burnside (Duke University) Competitive Equilibrium September 2010 1 / 32 Competitive Equilibrium and

More information

Embedded Systems 15. REVIEW: Aperiodic scheduling. C i J i 0 a i s i f i d i

Embedded Systems 15. REVIEW: Aperiodic scheduling. C i J i 0 a i s i f i d i Embedded Systems 15-1 - REVIEW: Aperiodic scheduling C i J i 0 a i s i f i d i Given: A set of non-periodic tasks {J 1,, J n } with arrival times a i, deadlines d i, computation times C i precedence constraints

More information

A Merchant Mechanism for Electricity Transmission Expansion

A Merchant Mechanism for Electricity Transmission Expansion A Merchant Mechanism for Electricity Transmission Expansion Tarjei Kristiansen, Norwegian University of Science and Technology. Tarjei.Kristiansen@elkraft.ntnu.no Juan Rosellon, Harvard University/CIDE.

More information

Modeling, Analysis, and Control of Information Propagation in Multi-layer and Multiplex Networks. Osman Yağan

Modeling, Analysis, and Control of Information Propagation in Multi-layer and Multiplex Networks. Osman Yağan Modeling, Analysis, and Control of Information Propagation in Multi-layer and Multiplex Networks Osman Yağan Department of ECE Carnegie Mellon University Joint work with Y. Zhuang and V. Gligor (CMU) Alex

More information

14. Direct Sum (Part 1) - Introduction

14. Direct Sum (Part 1) - Introduction Communication Complexity 14 Oct, 2011 (@ IMSc) 14. Direct Sum (Part 1) - Introduction Lecturer: Prahladh Harsha Scribe: Abhishek Dang 14.1 Introduction The Direct Sum problem asks how the difficulty in

More information

Rate of Convergence of Learning in Social Networks

Rate of Convergence of Learning in Social Networks Rate of Convergence of Learning in Social Networks Ilan Lobel, Daron Acemoglu, Munther Dahleh and Asuman Ozdaglar Massachusetts Institute of Technology Cambridge, MA Abstract We study the rate of convergence

More information

Lecture 21 Representations of Martingales

Lecture 21 Representations of Martingales Lecture 21: Representations of Martingales 1 of 11 Course: Theory of Probability II Term: Spring 215 Instructor: Gordan Zitkovic Lecture 21 Representations of Martingales Right-continuous inverses Let

More information

CS 781 Lecture 9 March 10, 2011 Topics: Local Search and Optimization Metropolis Algorithm Greedy Optimization Hopfield Networks Max Cut Problem Nash

CS 781 Lecture 9 March 10, 2011 Topics: Local Search and Optimization Metropolis Algorithm Greedy Optimization Hopfield Networks Max Cut Problem Nash CS 781 Lecture 9 March 10, 2011 Topics: Local Search and Optimization Metropolis Algorithm Greedy Optimization Hopfield Networks Max Cut Problem Nash Equilibrium Price of Stability Coping With NP-Hardness

More information

Networks: space-time stochastic models for networks

Networks: space-time stochastic models for networks Mobile and Delay Tolerant Networks: space-time stochastic models for networks Philippe Jacquet Alcatel-Lucent Bell Labs France Plan of the talk Short history of wireless networking Information in space-time

More information

NETWORKS, in all forms and sizes, are at heart of almost

NETWORKS, in all forms and sizes, are at heart of almost EDIC RESEARCH PROPOSAL 1 Aggregating and Influencing in Networks Giel J. Op t Veld LINX, I&C, EPFL Abstract Discussed are three different problem statements in a network setting that involve either the

More information

Online Contextual Influence Maximization with Costly Observations

Online Contextual Influence Maximization with Costly Observations his article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 1.119/SIPN.18.866334,

More information

Power Controlled FCFS Splitting Algorithm for Wireless Networks

Power Controlled FCFS Splitting Algorithm for Wireless Networks Power Controlled FCFS Splitting Algorithm for Wireless Networks Ashutosh Deepak Gore Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology - Bombay COMNET Workshop, July

More information

DS504/CS586: Big Data Analytics Graph Mining II

DS504/CS586: Big Data Analytics Graph Mining II Welcome to DS504/CS586: Big Data Analytics Graph Mining II Prof. Yanhua Li Time: 6:00pm 8:50pm Mon. and Wed. Location: SL105 Spring 2016 Reading assignments We will increase the bar a little bit Please

More information

The Beginning of Graph Theory. Theory and Applications of Complex Networks. Eulerian paths. Graph Theory. Class Three. College of the Atlantic

The Beginning of Graph Theory. Theory and Applications of Complex Networks. Eulerian paths. Graph Theory. Class Three. College of the Atlantic Theory and Applications of Complex Networs 1 Theory and Applications of Complex Networs 2 Theory and Applications of Complex Networs Class Three The Beginning of Graph Theory Leonhard Euler wonders, can

More information

LogFeller et Ray Knight

LogFeller et Ray Knight LogFeller et Ray Knight Etienne Pardoux joint work with V. Le and A. Wakolbinger Etienne Pardoux (Marseille) MANEGE, 18/1/1 1 / 16 Feller s branching diffusion with logistic growth We consider the diffusion

More information

Dynamic Power Allocation and Routing for Time Varying Wireless Networks

Dynamic Power Allocation and Routing for Time Varying Wireless Networks Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,

More information

Introduction to Bandit Algorithms. Introduction to Bandit Algorithms

Introduction to Bandit Algorithms. Introduction to Bandit Algorithms Stochastic K-Arm Bandit Problem Formulation Consider K arms (actions) each correspond to an unknown distribution {ν k } K k=1 with values bounded in [0, 1]. At each time t, the agent pulls an arm I t {1,...,

More information

An Adaptive Algorithm for Selecting Profitable Keywords for Search-Based Advertising Services

An Adaptive Algorithm for Selecting Profitable Keywords for Search-Based Advertising Services An Adaptive Algorithm for Selecting Profitable Keywords for Search-Based Advertising Services Paat Rusmevichientong David P. Williamson July 6, 2007 Abstract Increases in online searches have spurred the

More information

12. LOCAL SEARCH. gradient descent Metropolis algorithm Hopfield neural networks maximum cut Nash equilibria

12. LOCAL SEARCH. gradient descent Metropolis algorithm Hopfield neural networks maximum cut Nash equilibria 12. LOCAL SEARCH gradient descent Metropolis algorithm Hopfield neural networks maximum cut Nash equilibria Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison Wesley h ttp://www.cs.princeton.edu/~wayne/kleinberg-tardos

More information

A Reservoir Sampling Algorithm with Adaptive Estimation of Conditional Expectation

A Reservoir Sampling Algorithm with Adaptive Estimation of Conditional Expectation A Reservoir Sampling Algorithm with Adaptive Estimation of Conditional Expectation Vu Malbasa and Slobodan Vucetic Abstract Resource-constrained data mining introduces many constraints when learning from

More information

Generating p-extremal graphs

Generating p-extremal graphs Generating p-extremal graphs Derrick Stolee Department of Mathematics Department of Computer Science University of Nebraska Lincoln s-dstolee1@math.unl.edu August 2, 2011 Abstract Let f(n, p be the maximum

More information

Analysis of random-access MAC schemes

Analysis of random-access MAC schemes Analysis of random-access MA schemes M. Veeraraghavan and Tao i ast updated: Sept. 203. Slotted Aloha [4] First-order analysis: if we assume there are infinite number of nodes, the number of new arrivals

More information

A STAFFING ALGORITHM FOR CALL CENTERS WITH SKILL-BASED ROUTING: SUPPLEMENTARY MATERIAL

A STAFFING ALGORITHM FOR CALL CENTERS WITH SKILL-BASED ROUTING: SUPPLEMENTARY MATERIAL A STAFFING ALGORITHM FOR CALL CENTERS WITH SKILL-BASED ROUTING: SUPPLEMENTARY MATERIAL by Rodney B. Wallace IBM and The George Washington University rodney.wallace@us.ibm.com Ward Whitt Columbia University

More information

Fast Convergence in Evolutionary Equilibrium Selection

Fast Convergence in Evolutionary Equilibrium Selection Fast Convergence in Evolutionary Equilibrium Selection Gabriel E Kreindler H Peyton Young September 26, 2011 Abstract Stochastic learning models provide sharp predictions about equilibrium selection when

More information

Time and Schedulability Analysis of Stateflow Models

Time and Schedulability Analysis of Stateflow Models Time and Schedulability Analysis of Stateflow Models Marco Di Natale Scuola Superiore S. Anna Haibo Zeng Mc Gill University Outline Context: MBD of Embedded Systems Relationship with PBD An Introduction

More information

SIS epidemics on Networks

SIS epidemics on Networks SIS epidemics on etworks Piet Van Mieghem in collaboration with Eric Cator, Ruud van de Bovenkamp, Cong Li, Stojan Trajanovski, Dongchao Guo, Annalisa Socievole and Huijuan Wang 1 EURADOM 30 June-2 July,

More information

Random Processes. DS GA 1002 Probability and Statistics for Data Science.

Random Processes. DS GA 1002 Probability and Statistics for Data Science. Random Processes DS GA 1002 Probability and Statistics for Data Science http://www.cims.nyu.edu/~cfgranda/pages/dsga1002_fall17 Carlos Fernandez-Granda Aim Modeling quantities that evolve in time (or space)

More information

Rumour spreading and graph conductance

Rumour spreading and graph conductance Rumour spreading and graph conductance Flavio Chierichetti, Silvio Lattanzi, Alessandro Panconesi {chierichetti,lattanzi,ale}@di.uniroma1.it Dipartimento di Informatica Sapienza Università di Roma October

More information

TODAY, a considerable fraction of data requirements in

TODAY, a considerable fraction of data requirements in Simplifying Wireless Social Caching Mohammed Karmoose, Martina Cardone, and Christina Fragouli Abstract Social groups give the opportunity for a new form of caching. In this paper, we investigate how a

More information

arxiv: v3 [math.oc] 11 Dec 2018

arxiv: v3 [math.oc] 11 Dec 2018 A Re-solving Heuristic with Uniformly Bounded Loss for Network Revenue Management Pornpawee Bumpensanti, He Wang School of Industrial and Systems Engineering, Georgia Institute of echnology, Atlanta, GA

More information

PERCOLATION IN SELFISH SOCIAL NETWORKS

PERCOLATION IN SELFISH SOCIAL NETWORKS PERCOLATION IN SELFISH SOCIAL NETWORKS Charles Bordenave UC Berkeley joint work with David Aldous (UC Berkeley) PARADIGM OF SOCIAL NETWORKS OBJECTIVE - Understand better the dynamics of social behaviors

More information

Social Welfare Functions for Sustainable Development

Social Welfare Functions for Sustainable Development Social Welfare Functions for Sustainable Development Thai Ha-Huy, Cuong Le Van September 9, 2015 Abstract Keywords: criterion. anonymity; sustainable development, welfare function, Rawls JEL Classification:

More information

CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University

CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University http://cs224w.stanford.edu 10/24/2012 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, http://cs224w.stanford.edu

More information

An Approximation Algorithm for Approximation Rank

An Approximation Algorithm for Approximation Rank An Approximation Algorithm for Approximation Rank Troy Lee Columbia University Adi Shraibman Weizmann Institute Conventions Identify a communication function f : X Y { 1, +1} with the associated X-by-Y

More information

Whom to Ask? Jury Selection for Decision Making Tasks on Micro-blog Services

Whom to Ask? Jury Selection for Decision Making Tasks on Micro-blog Services Whom to Ask? Jury Selection for Decision Making Tasks on Micro-blog Services Caleb Chen CAO, Jieying SHE, Yongxin TONG, Lei CHEN The Hong Kong University of Science and Technology Is Istanbul the capital

More information

Improved Direct Product Theorems for Randomized Query Complexity

Improved Direct Product Theorems for Randomized Query Complexity Improved Direct Product Theorems for Randomized Query Complexity Andrew Drucker Nov. 16, 2010 Andrew Drucker, Improved Direct Product Theorems for Randomized Query Complexity 1/28 Big picture Usually,

More information