1,652 research outputs found
Partitioned Sampling of Public Opinions Based on Their Social Dynamics
Public opinion polling is usually done by random sampling from the entire
population, treating individual opinions as independent. In the real world,
individuals' opinions are often correlated, e.g., among friends in a social
network. In this paper, we explore the idea of partitioned sampling, which
partitions individuals with high opinion similarities into groups and then
samples every group separately to obtain an accurate estimate of the population
opinion. We rigorously formulate the above idea as an optimization problem. We
then show that the simple partitions which contain only one sample in each
group are always better, and reduce finding the optimal simple partition to a
well-studied Min-r-Partition problem. We adapt an approximation algorithm and a
heuristic algorithm to solve the optimization problem. Moreover, to obtain
opinion similarity efficiently, we adapt a well-known opinion evolution model
to characterize social interactions, and provide an exact computation of
opinion similarities based on the model. We use both synthetic and real-world
datasets to demonstrate that the partitioned sampling method results in
significant improvement in sampling quality and it is robust when some opinion
similarities are inaccurate or even missing
Neighbor selection and hitting probability in small-world graphs
Small-world graphs, which combine randomized and structured elements, are
seen as prevalent in nature. Jon Kleinberg showed that in some graphs of this
type it is possible to route, or navigate, between vertices in few steps even
with very little knowledge of the graph itself. In an attempt to understand how
such graphs arise we introduce a different criterion for graphs to be navigable
in this sense, relating the neighbor selection of a vertex to the hitting
probability of routed walks. In several models starting from both discrete and
continuous settings, this can be shown to lead to graphs with the desired
properties. It also leads directly to an evolutionary model for the creation of
similar graphs by the stepwise rewiring of the edges, and we conjecture,
supported by simulations, that these too are navigable.Comment: Published in at http://dx.doi.org/10.1214/07-AAP499 the Annals of
Applied Probability (http://www.imstat.org/aap/) by the Institute of
Mathematical Statistics (http://www.imstat.org
A simple Havel-Hakimi type algorithm to realize graphical degree sequences of directed graphs
One of the simplest ways to decide whether a given finite sequence of
positive integers can arise as the degree sequence of a simple graph is the
greedy algorithm of Havel and Hakimi. This note extends their approach to
directed graphs. It also studies cases of some simple forbidden edge-sets.
Finally, it proves a result which is useful to design an MCMC algorithm to find
random realizations of prescribed directed degree sequences.Comment: 11 pages, 1 figure submitted to "The Electronic Journal of
Combinatorics
Network Interdiction Using Adversarial Traffic Flows
Traditional network interdiction refers to the problem of an interdictor
trying to reduce the throughput of network users by removing network edges. In
this paper, we propose a new paradigm for network interdiction that models
scenarios, such as stealth DoS attack, where the interdiction is performed
through injecting adversarial traffic flows. Under this paradigm, we first
study the deterministic flow interdiction problem, where the interdictor has
perfect knowledge of the operation of network users. We show that the problem
is highly inapproximable on general networks and is NP-hard even when the
network is acyclic. We then propose an algorithm that achieves a logarithmic
approximation ratio and quasi-polynomial time complexity for acyclic networks
through harnessing the submodularity of the problem. Next, we investigate the
robust flow interdiction problem, which adopts the robust optimization
framework to capture the case where definitive knowledge of the operation of
network users is not available. We design an approximation framework that
integrates the aforementioned algorithm, yielding a quasi-polynomial time
procedure with poly-logarithmic approximation ratio for the more challenging
robust flow interdiction. Finally, we evaluate the performance of the proposed
algorithms through simulations, showing that they can be efficiently
implemented and yield near-optimal solutions
- …