Probability Models of Information Exchange on Networks Lecture 6
|
|
- Hugo Fields
- 5 years ago
- Views:
Transcription
1 Probability Models of Information Exchange on Networks Lecture 6 UC Berkeley
2 Many Other Models There are many models of information exchange on networks. Q: Which model to chose? My answer good features of models include: Canonical models. Amenable to analysis. Studied intensively before. Ok to invent your own models. Models are always just models
3 Ariel Rubinstein on theoretical economics When talking about economics: Everything I say is personal, based upon the entire range of my life experience which also includes the fact that professionally I engage in economics theory. However, to the best of my understanding, economic theory has nothing to do say about the heart of the issue under discussion here. I am not sure I know what an opinion is. I am not attempting to predict the rate of inflation tomorrow
4 Some other natural models Growth models: percolation models, DLA etc. Competition models: Competing growth. Infection models: Contact process, SIR, SIS Aspects of modeling: Dynamic networks Random networks Today: two examples of percolation based processes.
5 Example1: models of collective behavior examples: joining a riot adopting a product going to a movie model features: binary decision cascade effect network structure
6 viral marketing referrals, word-of-mouth can be very effective ex.: google+ viral marketing goal: mining the network value of potential customers how: target a small set of trendsetters, seeds example [Domingos-Richardson 02] collaborative filtering system use MRF to compute influence of each customer
7 independent cascade model when a node is activated it gets one chance to activate each neighbour probability of success from u to v is p u,v
8 generalized models graph G=(V,E); initial activated set S 0 generalized threshold model [Kempe-Kleinberg-Tardos 03, 05] activation functions: f u (S) where S is set of activated nodes threshold value: θ u uniform in [0,1] dynamics: at time t,set S t to S t-1 and add all nodes with f u (S t-1 ) θ u (note the process stops after (at most) n-1 steps) generalized cascade model [KKT 03, 05] when node u is activated: gets one chance to activate each neighbours probability of success from u to v: p u (v,s) where S is set of nodes who have already tried (and failed) to activate u assumption: the p u (v,.) s are order-independent theorem [KKT 03] - the two models are equivalent
9 influence maximization definition - the influence σ(s) given the initial seed S is the expected size of the infected set at termination σ(s) = E S [ S n 1 ] definition - in the influence maximization problem (IMP), we want to find the seed S of fixed size k that maximizes the influence theorem [KKT 03] - the IMP is NP-hard { } S* = argmax σ(s) : S V, S = k reduction from Set Cover: ground set U = {u 1,,u n } and collection of cover subsets S 1,,S m independent cascade model u 1 u 2 u 3 (u i,s j ) E S 1 S 2 S 3 S, S = k, σ(s) n + k? u n u i S j S m
10 submodularity definition - a set function f : V -> R is submodular if for all A, B in V f (A) + f (B) f (A B) + f (A B) example: f(s) = g( S ) where g is concave interpretation: discrete concavity or diminishing returns, indeed submodularity equivalent to S T, v V, f (T {v}) f (T) f (S {v}) f (S) threshold models: it is natural to assume that the activation functions have diminishing returns supported by observations of [Leskovec-Adamic-Huberman 06] in the context of viral marketing
11 main result theorem [M-Roch 06; first conjectured in KKT 03] - in the generalized threshold model, if all activation functions are monotone and submodular, then the influence is also submodular corollary [M-Roch 06] - IMP admits a (1 - e -1 - ε)-approximation algorithm (for all ε > 0) this follows from a general result on the approximation of submodular functions [Nemhauser-Wolsey-Fisher 78] known special cases [KKT 03, 05]: linear threshold model, independent cascade model decreasing cascade model, normalized submodular threshold model S T, p u (v,s) p u (v,t) or equiv. f u (S {v}) f u (S) 1 f u (S) f u (T {v}) f u (T) 1 f u (T)
12 related work sociology threshold models: [Granovetter 78], [Morris 00] cascades: [Watts 02] data mining viral marketing: [KKT 03, 05], [Domingos-Richardson 02] recommendation networks: [Leskovec-Singh-Kleinberg 05], [Leskovec- Adamic-Huberman 06] economics game-theoretic point of view: [Ellison 93], [Young 02] probability theory Markov random fields, Glauber dynamics percolation interacting particle systems: voter model, contact process
13 proof sketch
14 coupling we use the generalized threshold model arbitrary sets A, B; consider 4 processes: (A t ) started at A (B t ) started at B (C t ) started at A B (D t ) started at A B it suffices to couple the 4 processes in such a way that for all t indeed, at termination C t A t B t D t A t B t A n 1 + B n 1 A n 1 B n 1 + A n 1 B n 1 C n 1 + D n 1 (note this works with. replaced with any w monotone, submodular)
15 proof ideas our goal: C t A t B t (1) D t A t B t (2) antisense coupling obvious way to couple: use same θ u s for all 4 processes satisfies (1) but not (2) antisense : using θ u for (A t ) and (1-θ u ) for (B t ) maximizes union we combine both couplings piecemeal growth seed sets can be introduced in stages we add A B then A\B and finally B\A need-to-know not necessary to pick all θ u s at beginning can unveil only what we need to know: θ v [ f v ( S t 2 ), f v ( S t 1 )]?
16 piecemeal growth process started at S: (S t ) partition of S: S (1),,S (K) consider the process (T t ): pick θ u s run the process with seed S (1) until termination add S (2) and continue until termination add S (3) and so on lemma - the sets S n-1 and T Kn-1 have the same distribution
17 antisense coupling disjoint sets: S, T partition of S: S (1),,S (K) piecemeal process with seeds S (1),,S (K),T: (S t ) consider the process (T t ): pick θ u s run piecemeal process with seeds S (1),,S (K) until termination add T and continue with threshold values θ v '=1 θ v + f v ( ) T Kn 1 lemma - the sets S (K+1)n-1 and T (K+1)n-1 have the same distribution
18 need-to-know proof of lemma run the first K stages identically in both processes note that for all v not in S Kn-1 = T Kn-1, θ v is uniformly distributed in [f v (T Kn-1 ),1] but θ v = 1 - θ v + f v (T Kn-1 ) has the same distribution θ v [ f v ( S t 2 ), f v ( S t 1 )]? simulation 1 simulation 2
19 proof I ANTI 19/31
20 proof II ANTI 20/31
21 proof III new processes have correct final distribution up to time 2n-1, B t = C t and A t = D t so that C t A B t t D t A t B t for time 2n, note that so by monotonicity and submodularity then proceed by induction B 2n 1 D 2n 1 B 2n = B 2n 1 (T \ S) D 2n = D 2n 1 (T \ S) f v (B 2n ) f v (B 2n 1 ) f v (D 2n ) f v (D 2n 1 ) 21/31
22 general result we have proved: theorem [Mossel-R 06] - in the generalized threshold model, if all activation functions are submodular, then for any monotone, submodular function w, the generalized influence is submodular σ w (S) = E S [w(s n 1 )] Note: A closure property for sub-modular functions! 22/31
23 Competing first passage percolation on random regular graphs University of California, Berkeley July 24, 2013 Based on a joint work with Tonći Antunović Yael Dekel, and Yuval Peres
24 First passage percolation First passage percolation: Fix a graph G = (V, E), consider iid edge lengths (l e ) e E. Define the random metric on V d(x, y) = inf Γ l(γ), where the infimum is taken over all paths Γ connecting x and y and l(γ) is the sum of lengths of the edges on Γ. An important case: l e exp(λ). Process r B(0, r) evolves as a Markov process, new vertices are added at the rate λ the number of neighbors in B(0, r).
25 First passage percolation
26 First passage percolation
27 First passage percolation
28 First passage percolation
29 First passage percolation
30 First passage percolation
31 First passage percolation
32 First passage percolation
33 First passage percolation
34 First passage percolation
35 First passage percolation
36 First passage percolation
37 First passage percolation
38 First passage percolation
39 First passage percolation
40 First passage percolation
41 First passage percolation
42 First passage percolation
43 First passage percolation
44 First passage percolation
45 First passage percolation
46 First passage percolation
47 First passage percolation
48 First passage percolation
49 First passage percolation
50 First passage percolation
51 First passage percolation
52 First passage percolation
53 First passage percolation Theorem (Cox-Durrett shape theorem) There exists a compact convex set A such that for any δ > 0 lim P( (1 δ)ra B(0, r) (1 + δ)ra ) = 1. r
54 Competing first passage percolation Competing first passage percolation (also called Two-type Richardson Model by Häggström, Pemantle): Start with one red vertex and one blue vertex, other uncolored. Uncolored vertices become red at the rate (λ R the number of red neighbors) and blue at the rate (λ B the number of blue neighbors). Once colored, vertices never change the color.
55 Competing first passage percolation
56 Competing first passage percolation
57 Competing first passage percolation
58 Competing first passage percolation
59 Competing first passage percolation
60 Competing first passage percolation
61 Competing first passage percolation
62 Competing first passage percolation
63 Competing first passage percolation
64 Competing first passage percolation
65 Competing first passage percolation
66 Competing first passage percolation
67 Competing first passage percolation
68 Competing first passage percolation
69 Competing first passage percolation
70 Competing first passage percolation
71 Competing first passage percolation
72 Competing first passage percolation
73 Competing first passage percolation
74 Competing first passage percolation
75 Competing first passage percolation
76 Competing first passage percolation
77 Competing first passage percolation
78 Competing first passage percolation
79 Competing first passage percolation
80 Competing first passage percolation
81 Competing first passage percolation Theorem (Häggström, Pemantle) On 2D lattice, for λ R = λ B for at most countable set S P(both red and blue ) > 0; λ R λ B / S P(both red and blue ) = 0.
82 Random regular graphs Random regular graphs Have only bounded number of short cycles. Neighborhoods or typical vertices are trees. Expander properties. Configuration model
83 Competing process on random graphs Let G n be random d-regular graph on n vertices. Uniformly choose r(n) vertices of G n and color it red and b(n) vertices and color it blue (r(n) and b(n) are given functions). Run the same dynamics as in the competing first passage percolation model with rates λ R and λ B. Consider the number of red and blue vertices Rn final when the graphs is exhausted. Question: Can we estimate R final n and B final n? and B final n
84 Compare with the Torus
85 Compare with the Torus
86 Compare with the Torus
87 Compare with the Torus
88 Compare with the Torus
89 Compare with the Torus Both processes occupy Θ(n) = Θ(k 2 ) vertices.
90 Results - asymptotics Theorem (Antunović, Dekel, M, Peres) Up to a constant factor with high probability R total n ( n ) λr /λ B r(n) n. b(n) In particular if r(n) = n ρ and b(n) = n β then R total n { n ρ+(1 β)λ R /λ B, for ρ < 1 (1 β)λ R /λ B, n, for ρ 1 (1 β)λ R /λ B. Balance occurs at (1 ρ)λ B = (1 β)λ R.
91 Configuration model
92 Configuration model
93 Configuration model
94 Configuration model
95 Configuration model
96 Configuration model
97 Configuration model
98 Configuration model
99 Configuration model
100 Configuration model
101 Configuration model
102 Configuration model
103 Configuration model
104 Configuration model
105 Configuration model P(Bad configuration) is bounded away from 1.
106 Configuration model P(Bad configuration) is bounded away from 1. Conditioned that there are no Bad configuration the algorithm generates a random regular graph.
107 Couple CFPP and the configuration model
108 Couple CFPP and the configuration model
109 Couple CFPP and the configuration model
110 Couple CFPP and the configuration model
111 Couple CFPP and the configuration model
112 Couple CFPP and the configuration model
113 Couple CFPP and the configuration model
114 Couple CFPP and the configuration model
115 Couple CFPP and the configuration model
116 Couple CFPP and the configuration model
117 Couple CFPP and the configuration model
118 Couple CFPP and the configuration model
119 Couple CFPP and the configuration model
120 Couple CFPP and the configuration model
121 Couple CFPP and the configuration model We will keep track of: R t and B t... number of red and blue half-edges at step t.
122 Couple CFPP and the configuration model We will keep track of: R t and B t... number of red and blue half-edges at step t. Transition probabilities: (R t + d 2, B t ), w.p. λ R R t dn 2t R t B t λ R R t+λ B B t dn 2t 1 (R t+1, B t+1 ) = (R t, B t + d 2), w.p. (R t 2, B t ), w.p. λ B B t dn 2t R t B t λ R R t+λ B B t dn 2t 1 λ R R t R t 1 λ R R t+λ B B t dn 2t 1 (R t, B t 2), w.p. λ B B t B t 1 λ R R t+λ B B t dn 2t 1 (R t 1, B t 1), w.p. (λ R +λ B )B tr t (λ R R t+λ B B t)(dn 2t 1)
123 Couple CFPP and the configuration model To control R t and B t we use martingale techniques to control X t = R t + B t and Y t = R t B λ R/λ B t
124 Couple CFPP and the configuration model To control R t and B t we use martingale techniques to control X t = R t + B t and Y t = R t B λ R/λ B t X t... number of active half-edges in the configuration model
125 Couple CFPP and the configuration model To control R t and B t we use martingale techniques to control X t = R t + B t and Y t = R t B λ R/λ B t X t... number of active half-edges in the configuration model Y t... is the continuous time martingale when both processes evolve without any interactions (and self-interactions)
126 Couple CFPP and the configuration model X t = R t + B t Process (X t, dn 2t X t ) evolves as an urn model ( 2 0 ) d 2 d
127 Couple CFPP and the configuration model X t = R t + B t Process (X t, dn 2t X t ) evolves as an urn model ( 2 0 ) d 2 d As n X t = (1 ± o(1)) for all 0 t < dn/2. ( ( dn 2t (dn X 0 ) 1 2t ) ) d/2, dn
128 Couple CFPP and the configuration model X t = R t + B t Process (X t, dn 2t X t ) evolves as an urn model ( 2 0 ) d 2 d As n X t = (1 ± o(1)) for all 0 t < dn/2. ( ( dn 2t (dn X 0 ) 1 2t ) ) d/2, dn
129 Couple CFPP and the configuration model As long as X t is large Y t = R t B λ R/λ B t ( Y t = (1 ± o(1))y 0 1 2t ) λ B λ R 2λ B. dn
130 Couple CFPP and the configuration model As long as X t is large Y t = R t B λ R/λ B t ( Y t = (1 ± o(1))y 0 1 2t ) λ B λ R 2λ B. dn Observe the extra advantage of the faster process.
131 THANKS!!!
132 Speakers: Organizers: Laurent, Lionel, Tasia Heather Peterson You! Thank you!
On the Submodularity of Influence in Social Networks
On the Submodularity of Influence in Social Networks Elchanan Mossel Dept. of Statistics U.C. Berkeley mossel@stat.berkeley.edu Sebastien Roch Dept. of Statistics U.C. Berkeley sroch@stat.berkeley.edu
More informationDiffusion of Innovation and Influence Maximization
Diffusion of Innovation and Influence Maximization Leonid E. Zhukov School of Data Analysis and Artificial Intelligence Department of Computer Science National Research University Higher School of Economics
More informationA Note on Maximizing the Spread of Influence in Social Networks
A Note on Maximizing the Spread of Influence in Social Networks Eyal Even-Dar 1 and Asaf Shapira 2 1 Google Research, Email: evendar@google.com 2 Microsoft Research, Email: asafico@microsoft.com Abstract.
More informationMaximizing the Spread of Influence through a Social Network. David Kempe, Jon Kleinberg, Éva Tardos SIGKDD 03
Maximizing the Spread of Influence through a Social Network David Kempe, Jon Kleinberg, Éva Tardos SIGKDD 03 Influence and Social Networks Economics, sociology, political science, etc. all have studied
More informationSubmodularity of Infuence in Social. Networks: From Local to Global
Submodularity of Infuence in Social Networks: From Local to Global arxiv:math/0612046v2 [math.pr] 28 Jul 2009 Elchanan Mossel and Sebastien Roch July 28, 2009 Abstract Social networks are often represented
More information9. Submodular function optimization
Submodular function maximization 9-9. Submodular function optimization Submodular function maximization Greedy algorithm for monotone case Influence maximization Greedy algorithm for non-monotone case
More informationCS 322: (Social and Information) Network Analysis Jure Leskovec Stanford University
CS 322: (Social and Inormation) Network Analysis Jure Leskovec Stanord University Initially some nodes S are active Each edge (a,b) has probability (weight) p ab b 0.4 0.4 0.2 a 0.4 0.2 0.4 g 0.2 Node
More informationCSCI 3210: Computational Game Theory. Cascading Behavior in Networks Ref: [AGT] Ch 24
CSCI 3210: Computational Game Theory Cascading Behavior in Networks Ref: [AGT] Ch 24 Mohammad T. Irfan Email: mirfan@bowdoin.edu Web: www.bowdoin.edu/~mirfan Course Website: www.bowdoin.edu/~mirfan/csci-3210.html
More informationECS 289 F / MAE 298, Lecture 15 May 20, Diffusion, Cascades and Influence
ECS 289 F / MAE 298, Lecture 15 May 20, 2014 Diffusion, Cascades and Influence Diffusion and cascades in networks (Nodes in one of two states) Viruses (human and computer) contact processes epidemic thresholds
More informationViral Marketing and the Diffusion of Trends on Social Networks
University of Pennsylvania ScholarlyCommons Technical Reports (CIS) Department of Computer & Information Science May 2008 Viral Marketing and the Diffusion of Trends on Social Networks Jennifer Wortman
More informationDiffusion of Innovation
Diffusion of Innovation Leonid E. Zhukov School of Data Analysis and Artificial Intelligence Department of Computer Science National Research University Higher School of Economics Social Network Analysis
More informationOptimization of Submodular Functions Tutorial - lecture I
Optimization of Submodular Functions Tutorial - lecture I Jan Vondrák 1 1 IBM Almaden Research Center San Jose, CA Jan Vondrák (IBM Almaden) Submodular Optimization Tutorial 1 / 1 Lecture I: outline 1
More informationCascading Behavior in Networks: Algorithmic and Economic Issues
CHAPTER 24 Cascading Behavior in Networks: Algorithmic and Economic Issues Jon Kleinberg Abstract The flow of information or influence through a large social network can be thought of as unfolding with
More informationECS 253 / MAE 253, Lecture 13 May 15, Diffusion, Cascades and Influence Mathematical models & generating functions
ECS 253 / MAE 253, Lecture 13 May 15, 2018 Diffusion, Cascades and Influence Mathematical models & generating functions Last week: spatial flows and game theory on networks Optimal location of facilities
More informationThe Minesweeper game: Percolation and Complexity
The Minesweeper game: Percolation and Complexity Elchanan Mossel Hebrew University of Jerusalem and Microsoft Research March 15, 2002 Abstract We study a model motivated by the minesweeper game In this
More informationTopological properties
CHAPTER 4 Topological properties 1. Connectedness Definitions and examples Basic properties Connected components Connected versus path connected, again 2. Compactness Definition and first examples Topological
More informationMaximizing the Spread of Influence through a Social Network
Maximizing the Spread of Influence through a Social Network David Kempe Dept. of Computer Science Cornell University, Ithaca NY kempe@cs.cornell.edu Jon Kleinberg Dept. of Computer Science Cornell University,
More informationLecture 5. If we interpret the index n 0 as time, then a Markov chain simply requires that the future depends only on the present and not on the past.
1 Markov chain: definition Lecture 5 Definition 1.1 Markov chain] A sequence of random variables (X n ) n 0 taking values in a measurable state space (S, S) is called a (discrete time) Markov chain, if
More informationBayesian Learning in Social Networks
Bayesian Learning in Social Networks Asu Ozdaglar Joint work with Daron Acemoglu, Munther Dahleh, Ilan Lobel Department of Electrical Engineering and Computer Science, Department of Economics, Operations
More informationLecture 2. We now introduce some fundamental tools in martingale theory, which are useful in controlling the fluctuation of martingales.
Lecture 2 1 Martingales We now introduce some fundamental tools in martingale theory, which are useful in controlling the fluctuation of martingales. 1.1 Doob s inequality We have the following maximal
More informationLecture 11: Generalized Lovász Local Lemma. Lovász Local Lemma
Lecture 11: Generalized Recall We design an experiment with independent random variables X 1,..., X m We define bad events A 1,..., A n where) the bad event A i depends on the variables (X k1,..., X kni
More informationA Game-theoretic Analysis of a Competitive Diffusion Process over Social Networks
A Game-theoretic Analysis of a Competitive Diffusion Process over Social Networks Vasileios Tzoumas Christos Amanatidis Evangelos Markakis Abstract We study a game-theoretic model for the diffusion of
More informationNonamenable Products are not Treeable
Version of 30 July 1999 Nonamenable Products are not Treeable by Robin Pemantle and Yuval Peres Abstract. Let X and Y be infinite graphs, such that the automorphism group of X is nonamenable, and the automorphism
More informationLecture 11 October 11, Information Dissemination through Social Networks
CS 284r: Incentives and Information in Networks Fall 2013 Prof. Yaron Singer Lecture 11 October 11, 2013 Scribe: Michael Tingley, K. Nathaniel Tucker 1 Overview In today s lecture we will start the second
More informationCSE541 Class 22. Jeremy Buhler. November 22, Today: how to generalize some well-known approximation results
CSE541 Class 22 Jeremy Buhler November 22, 2016 Today: how to generalize some well-known approximation results 1 Intuition: Behavior of Functions Consider a real-valued function gz) on integers or reals).
More informationModeling, Analysis, and Control of Information Propagation in Multi-layer and Multiplex Networks. Osman Yağan
Modeling, Analysis, and Control of Information Propagation in Multi-layer and Multiplex Networks Osman Yağan Department of ECE Carnegie Mellon University Joint work with Y. Zhuang and V. Gligor (CMU) Alex
More informationProbability Models of Information Exchange on Networks Lecture 1
Probability Models of Information Exchange on Networks Lecture 1 Elchanan Mossel UC Berkeley All Rights Reserved Motivating Questions How are collective decisions made by: people / computational agents
More informationCS 781 Lecture 9 March 10, 2011 Topics: Local Search and Optimization Metropolis Algorithm Greedy Optimization Hopfield Networks Max Cut Problem Nash
CS 781 Lecture 9 March 10, 2011 Topics: Local Search and Optimization Metropolis Algorithm Greedy Optimization Hopfield Networks Max Cut Problem Nash Equilibrium Price of Stability Coping With NP-Hardness
More informationHard-Core Model on Random Graphs
Hard-Core Model on Random Graphs Antar Bandyopadhyay Theoretical Statistics and Mathematics Unit Seminar Theoretical Statistics and Mathematics Unit Indian Statistical Institute, New Delhi Centre New Delhi,
More informationSocial Influence in Online Social Networks. Epidemiological Models. Epidemic Process
Social Influence in Online Social Networks Toward Understanding Spatial Dependence on Epidemic Thresholds in Networks Dr. Zesheng Chen Viral marketing ( word-of-mouth ) Blog information cascading Rumor
More informationGreedy Maximization Framework for Graph-based Influence Functions
Greedy Maximization Framework for Graph-based Influence Functions Edith Cohen Google Research Tel Aviv University HotWeb '16 1 Large Graphs Model relations/interactions (edges) between entities (nodes)
More informationGame Theory and its Applications to Networks - Part I: Strict Competition
Game Theory and its Applications to Networks - Part I: Strict Competition Corinne Touati Master ENS Lyon, Fall 200 What is Game Theory and what is it for? Definition (Roger Myerson, Game Theory, Analysis
More informationA TWO-SPECIES COMPETITION MODEL ON Z D
A TWO-SPECIES COMPETITION MODEL ON Z D GEORGE KORDZAKHIA AND STEVEN P. LALLEY Abstract. We consider a two-type stochastic competition model on the integer lattice Z d. The model describes the space evolution
More informationPacking nearly optimal Ramsey R(3, t) graphs
Packing nearly optimal Ramsey R(3, t) graphs He Guo Joint work with Lutz Warnke Context of this talk Ramsey number R(s, t) R(s, t) := minimum n N such that every red/blue edge-coloring of complete n-vertex
More informationLimit shapes outside the percolation cone
jointly with Tuca Auffinger and Mike Hochman Princeton University July 14, 2011 Definitions We consider first-passage percolation on the square lattice Z 2. x γ - We place i.i.d. non-negative passage times
More informationMonotone Submodular Maximization over a Matroid
Monotone Submodular Maximization over a Matroid Yuval Filmus January 31, 2013 Abstract In this talk, we survey some recent results on monotone submodular maximization over a matroid. The survey does not
More informationNotes 6 : First and second moment methods
Notes 6 : First and second moment methods Math 733-734: Theory of Probability Lecturer: Sebastien Roch References: [Roc, Sections 2.1-2.3]. Recall: THM 6.1 (Markov s inequality) Let X be a non-negative
More informationSubmodular Functions Properties Algorithms Machine Learning
Submodular Functions Properties Algorithms Machine Learning Rémi Gilleron Inria Lille - Nord Europe & LIFL & Univ Lille Jan. 12 revised Aug. 14 Rémi Gilleron (Mostrare) Submodular Functions Jan. 12 revised
More informationTree-width and algorithms
Tree-width and algorithms Zdeněk Dvořák September 14, 2015 1 Algorithmic applications of tree-width Many problems that are hard in general become easy on trees. For example, consider the problem of finding
More informationRate of Convergence of Learning in Social Networks
Rate of Convergence of Learning in Social Networks Ilan Lobel, Daron Acemoglu, Munther Dahleh and Asuman Ozdaglar Massachusetts Institute of Technology Cambridge, MA Abstract We study the rate of convergence
More informationSocial Choice and Networks
Social Choice and Networks Elchanan Mossel UC Berkeley All rights reserved Logistics 1 Different numbers for the course: Compsci 294 Section 063 Econ 207A Math C223A Stat 206A Room: Cory 241 Time TuTh
More informationProbability Models of Information Exchange on Networks Lecture 5
Probability Models of Information Exchange on Networks Lecture 5 Elchanan Mossel (UC Berkeley) July 25, 2013 1 / 22 Informational Framework Each agent receives a private signal X i which depends on S.
More informationTime-Critical Influence Maximization in Social Networks with Time-Delayed Diffusion Process
Time-Critical Influence Maximization in Social Networks with Time-Delayed Diffusion Process Wei Chen Microsoft Research Asia Beijing, China weic@microsoft.com Wei Lu University of British Columbia Vancouver,
More information4: The Pandemic process
4: The Pandemic process David Aldous July 12, 2012 (repeat of previous slide) Background meeting model with rates ν. Model: Pandemic Initially one agent is infected. Whenever an infected agent meets another
More informationFirst Passage Percolation
First Passage Percolation (and other local modifications of the metric) on Random Planar Maps (well... actually on triangulations only!) N. Curien and J.F. Le Gall (Université Paris-Sud Orsay, IUF) Journées
More informationLECTURE 15: COMPLETENESS AND CONVEXITY
LECTURE 15: COMPLETENESS AND CONVEXITY 1. The Hopf-Rinow Theorem Recall that a Riemannian manifold (M, g) is called geodesically complete if the maximal defining interval of any geodesic is R. On the other
More information< k 2n. 2 1 (n 2). + (1 p) s) N (n < 1
List of Problems jacques@ucsd.edu Those question with a star next to them are considered slightly more challenging. Problems 9, 11, and 19 from the book The probabilistic method, by Alon and Spencer. Question
More informationLearning to Predict Opinion Share in Social Networks
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence AAAI-10 Learning to Predict Opinion Share in Social Networks Masahiro Kimura Department of Electronics and Informatics Ryukoku
More informationPropp-Wilson Algorithm (and sampling the Ising model)
Propp-Wilson Algorithm (and sampling the Ising model) Danny Leshem, Nov 2009 References: Haggstrom, O. (2002) Finite Markov Chains and Algorithmic Applications, ch. 10-11 Propp, J. & Wilson, D. (1996)
More informationECS 253 / MAE 253, Lecture 15 May 17, I. Probability generating function recap
ECS 253 / MAE 253, Lecture 15 May 17, 2016 I. Probability generating function recap Part I. Ensemble approaches A. Master equations (Random graph evolution, cluster aggregation) B. Network configuration
More informationNash-solvable bidirected cyclic two-person game forms
DIMACS Technical Report 2008-13 November 2008 Nash-solvable bidirected cyclic two-person game forms by Endre Boros 1 RUTCOR, Rutgers University 640 Bartholomew Road, Piscataway NJ 08854-8003 boros@rutcor.rutgers.edu
More informationFIRST ORDER SENTENCES ON G(n, p), ZERO-ONE LAWS, ALMOST SURE AND COMPLETE THEORIES ON SPARSE RANDOM GRAPHS
FIRST ORDER SENTENCES ON G(n, p), ZERO-ONE LAWS, ALMOST SURE AND COMPLETE THEORIES ON SPARSE RANDOM GRAPHS MOUMANTI PODDER 1. First order theory on G(n, p) We start with a very simple property of G(n,
More informationAsymptotic Learning on Bayesian Social Networks
Asymptotic Learning on Bayesian Social Networks Elchanan Mossel Allan Sly Omer Tamuz January 29, 2014 Abstract Understanding information exchange and aggregation on networks is a central problem in theoretical
More informationCSC 373: Algorithm Design and Analysis Lecture 12
CSC 373: Algorithm Design and Analysis Lecture 12 Allan Borodin February 4, 2013 1 / 16 Lecture 12: Announcements and Outline Announcements Term test 1 in tutorials. Need to use only two rooms due to sickness
More informationGeneral Power Series
General Power Series James K. Peterson Department of Biological Sciences and Department of Mathematical Sciences Clemson University March 29, 2018 Outline Power Series Consequences With all these preliminaries
More informationAn introduction to Mathematical Theory of Control
An introduction to Mathematical Theory of Control Vasile Staicu University of Aveiro UNICA, May 2018 Vasile Staicu (University of Aveiro) An introduction to Mathematical Theory of Control UNICA, May 2018
More informationLecture 3: Probability Measures - 2
Lecture 3: Probability Measures - 2 1. Continuation of measures 1.1 Problem of continuation of a probability measure 1.2 Outer measure 1.3 Lebesgue outer measure 1.4 Lebesgue continuation of an elementary
More informationModern Discrete Probability Branching processes
Modern Discrete Probability IV - Branching processes Review Sébastien Roch UW Madison Mathematics November 15, 2014 1 Basic definitions 2 3 4 Galton-Watson branching processes I Definition A Galton-Watson
More informationLecture 5: Counting independent sets up to the tree threshold
CS 7535: Markov Chain Monte Carlo Algorithms Fall 2014 Lecture 5: Counting independent sets up to the tree threshold Lecturer: Richard Brooks and Rakshit Trivedi Date: December 02 In this lecture, we will
More informationEC 521 MATHEMATICAL METHODS FOR ECONOMICS. Lecture 1: Preliminaries
EC 521 MATHEMATICAL METHODS FOR ECONOMICS Lecture 1: Preliminaries Murat YILMAZ Boğaziçi University In this lecture we provide some basic facts from both Linear Algebra and Real Analysis, which are going
More informationarxiv: v1 [math.co] 13 Dec 2014
SEARCHING FOR KNIGHTS AND SPIES: A MAJORITY/MINORITY GAME MARK WILDON arxiv:1412.4247v1 [math.co] 13 Dec 2014 Abstract. There are n people, each of whom is either a knight or a spy. It is known that at
More informationDynamic Programming on Trees. Example: Independent Set on T = (V, E) rooted at r V.
Dynamic Programming on Trees Example: Independent Set on T = (V, E) rooted at r V. For v V let T v denote the subtree rooted at v. Let f + (v) be the size of a maximum independent set for T v that contains
More informationInformation Dissemination in Social Networks under the Linear Threshold Model
Information Dissemination in Social Networks under the Linear Threshold Model Srinivasan Venkatramanan and Anurag Kumar Department of Electrical Communication Engineering, Indian Institute of Science,
More informationInfo-Cluster Based Regional Influence Analysis in Social Networks
Info-Cluster Based Regional Influence Analysis in Social Networks Chao Li,2,3, Zhongying Zhao,2,3,JunLuo, and Jianping Fan Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, Shenzhen
More informationHigh dimensional ising model selection using l 1 -regularized logistic regression
High dimensional ising model selection using l 1 -regularized logistic regression 1 Department of Statistics Pennsylvania State University 597 Presentation 2016 1/29 Outline Introduction 1 Introduction
More informationEfficiency, Fairness and Competitiveness in Nash Bargaining Games
Efficiency, Fairness and Competitiveness in Nash Bargaining Games Deeparnab Chakrabarty, Gagan Goel 2, Vijay V. Vazirani 2, Lei Wang 2 and Changyuan Yu 3 Department of Combinatorics and Optimization, University
More information7.1 Coupling from the Past
Georgia Tech Fall 2006 Markov Chain Monte Carlo Methods Lecture 7: September 12, 2006 Coupling from the Past Eric Vigoda 7.1 Coupling from the Past 7.1.1 Introduction We saw in the last lecture how Markov
More informationUniversity of Chicago Autumn 2003 CS Markov Chain Monte Carlo Methods
University of Chicago Autumn 2003 CS37101-1 Markov Chain Monte Carlo Methods Lecture 4: October 21, 2003 Bounding the mixing time via coupling Eric Vigoda 4.1 Introduction In this lecture we ll use the
More informationBiased random walk on percolation clusters. Noam Berger, Nina Gantert and Yuval Peres
Biased random walk on percolation clusters Noam Berger, Nina Gantert and Yuval Peres Related paper: [Berger, Gantert & Peres] (Prob. Theory related fields, Vol 126,2, 221 242) 1 The Model Percolation on
More informationCS155: Probability and Computing: Randomized Algorithms and Probabilistic Analysis
CS155: Probability and Computing: Randomized Algorithms and Probabilistic Analysis Eli Upfal Eli Upfal@brown.edu Office: 319 TA s: Lorenzo De Stefani and Sorin Vatasoiu cs155tas@cs.brown.edu It is remarkable
More informationLecture 5: Probabilistic tools and Applications II
T-79.7003: Graphs and Networks Fall 2013 Lecture 5: Probabilistic tools and Applications II Lecturer: Charalampos E. Tsourakakis Oct. 11, 2013 5.1 Overview In the first part of today s lecture we will
More informationProbability Models of Information Exchange on Networks Lecture 2. Elchanan Mossel UC Berkeley All rights reserved
Probability Models of Information Exchange on Networks Lecture 2 Elchanan Mossel UC Berkeley All rights reserved Lecture Plan We will see the first simple models of information exchange on networks. Assumptions:
More informationWeb Structure Mining Nodes, Links and Influence
Web Structure Mining Nodes, Links and Influence 1 Outline 1. Importance of nodes 1. Centrality 2. Prestige 3. Page Rank 4. Hubs and Authority 5. Metrics comparison 2. Link analysis 3. Influence model 1.
More informationXVI International Congress on Mathematical Physics
Aug 2009 XVI International Congress on Mathematical Physics Underlying geometry: finite graph G=(V,E ). Set of possible configurations: V (assignments of +/- spins to the vertices). Probability of a configuration
More information1 Overview. 2 Multilinear Extension. AM 221: Advanced Optimization Spring 2016
AM 22: Advanced Optimization Spring 26 Prof. Yaron Singer Lecture 24 April 25th Overview The goal of today s lecture is to see how the multilinear extension of a submodular function that we introduced
More informationPERCOLATION IN SELFISH SOCIAL NETWORKS
PERCOLATION IN SELFISH SOCIAL NETWORKS Charles Bordenave UC Berkeley joint work with David Aldous (UC Berkeley) PARADIGM OF SOCIAL NETWORKS OBJECTIVE - Understand better the dynamics of social behaviors
More informationErdős-Renyi random graphs basics
Erdős-Renyi random graphs basics Nathanaël Berestycki U.B.C. - class on percolation We take n vertices and a number p = p(n) with < p < 1. Let G(n, p(n)) be the graph such that there is an edge between
More informationNotes 1 : Measure-theoretic foundations I
Notes 1 : Measure-theoretic foundations I Math 733-734: Theory of Probability Lecturer: Sebastien Roch References: [Wil91, Section 1.0-1.8, 2.1-2.3, 3.1-3.11], [Fel68, Sections 7.2, 8.1, 9.6], [Dur10,
More informationDynamics in network games with local coordination and global congestion effects
Dynamics in network games with local coordination and global congestion effects Gianluca Brero, Giacomo Como, and Fabio Fagnani Abstract Several strategic interactions over social networks display both
More informationCS224W: Social and Information Network Analysis Jure Leskovec, Stanford University
CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University http://cs224w.stanford.edu Find most influential set S of size k: largest expected cascade size f(s) if set S is activated
More informationSensitivity, Block Sensitivity and Certificate Complexity of Boolean Functions (Master s Thesis)
Sensitivity, Block Sensitivity and Certificate Complexity of Boolean Functions (Master s Thesis) Sourav Chakraborty Thesis Advisor: László Babai February, 2005 Abstract We discuss several complexity measures
More informationCographs; chordal graphs and tree decompositions
Cographs; chordal graphs and tree decompositions Zdeněk Dvořák September 14, 2015 Let us now proceed with some more interesting graph classes closed on induced subgraphs. 1 Cographs The class of cographs
More informationLecture 20: LP Relaxation and Approximation Algorithms. 1 Introduction. 2 Vertex Cover problem. CSCI-B609: A Theorist s Toolkit, Fall 2016 Nov 8
CSCI-B609: A Theorist s Toolkit, Fall 2016 Nov 8 Lecture 20: LP Relaxation and Approximation Algorithms Lecturer: Yuan Zhou Scribe: Syed Mahbub Hafiz 1 Introduction When variables of constraints of an
More informationFrom trees to seeds:
From trees to seeds: on the inference of the seed from large random trees Joint work with Sébastien Bubeck, Ronen Eldan, and Elchanan Mossel Miklós Z. Rácz Microsoft Research Banff Retreat September 25,
More informationApplications of the Lopsided Lovász Local Lemma Regarding Hypergraphs
Regarding Hypergraphs Ph.D. Dissertation Defense April 15, 2013 Overview The Local Lemmata 2-Coloring Hypergraphs with the Original Local Lemma Counting Derangements with the Lopsided Local Lemma Lopsided
More informationTopics in Theoretical Computer Science April 08, Lecture 8
Topics in Theoretical Computer Science April 08, 204 Lecture 8 Lecturer: Ola Svensson Scribes: David Leydier and Samuel Grütter Introduction In this lecture we will introduce Linear Programming. It was
More information1 Continuous extensions of submodular functions
CS 369P: Polyhedral techniques in combinatorial optimization Instructor: Jan Vondrák Lecture date: November 18, 010 1 Continuous extensions of submodular functions Submodular functions are functions assigning
More informationCS224W: Social and Information Network Analysis Jure Leskovec, Stanford University
CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University http://cs224w.stanford.edu 10/24/2012 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, http://cs224w.stanford.edu
More informationSet, functions and Euclidean space. Seungjin Han
Set, functions and Euclidean space Seungjin Han September, 2018 1 Some Basics LOGIC A is necessary for B : If B holds, then A holds. B A A B is the contraposition of B A. A is sufficient for B: If A holds,
More information4 Countability axioms
4 COUNTABILITY AXIOMS 4 Countability axioms Definition 4.1. Let X be a topological space X is said to be first countable if for any x X, there is a countable basis for the neighborhoods of x. X is said
More informationComputing Competing Cascades on Signed Networks
Noname manuscript No. (will be inserted by the editor Computing Competing Cascades on Signed Networks Ajitesh Srivastava Charalampos Chelmis Viktor K. Prasanna Received: date / Accepted: date Abstract
More informationAdmin and Lecture 1: Recap of Measure Theory
Admin and Lecture 1: Recap of Measure Theory David Aldous January 16, 2018 I don t use bcourses: Read web page (search Aldous 205B) Web page rather unorganized some topics done by Nike in 205A will post
More informationTUG OF WAR INFINITY LAPLACIAN
TUG OF WAR and the INFINITY LAPLACIAN How to solve degenerate elliptic PDEs and the optimal Lipschitz extension problem by playing games. Yuval Peres, Oded Schramm, Scott Sheffield, and David Wilson Infinity
More informationContinuity. Matt Rosenzweig
Continuity Matt Rosenzweig Contents 1 Continuity 1 1.1 Rudin Chapter 4 Exercises........................................ 1 1.1.1 Exercise 1............................................. 1 1.1.2 Exercise
More informationHigh-dimensional graphical model selection: Practical and information-theoretic limits
1 High-dimensional graphical model selection: Practical and information-theoretic limits Martin Wainwright Departments of Statistics, and EECS UC Berkeley, California, USA Based on joint work with: John
More informationAssignment 2 : Probabilistic Methods
Assignment 2 : Probabilistic Methods jverstra@math Question 1. Let d N, c R +, and let G n be an n-vertex d-regular graph. Suppose that vertices of G n are selected independently with probability p, where
More informationLecture 18: March 15
CS71 Randomness & Computation Spring 018 Instructor: Alistair Sinclair Lecture 18: March 15 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They may
More informationTractable Models for Information Diffusion in Social Networks
Tractable Models for Information Diffusion in Social Networks Masahiro Kimura 1 and Kazumi Saito 2 1 Department of Electronics and Informatics, Ryukoku University Otsu, Shiga 520-2194, Japan 2 NTT Communication
More informationStochastic Dynamic Programming: The One Sector Growth Model
Stochastic Dynamic Programming: The One Sector Growth Model Esteban Rossi-Hansberg Princeton University March 26, 2012 Esteban Rossi-Hansberg () Stochastic Dynamic Programming March 26, 2012 1 / 31 References
More informationProject in Computational Game Theory: Communities in Social Networks
Project in Computational Game Theory: Communities in Social Networks Eldad Rubinstein November 11, 2012 1 Presentation of the Original Paper 1.1 Introduction In this section I present the article [1].
More information