18,533 research outputs found
The Greedy Independent Set in a Random Graph with Given Degrees
The research of Malwina Luczak is supported by an EPSRC Leadership Fellowship grant reference EP/J004022/2
On Conceptually Simple Algorithms for Variants of Online Bipartite Matching
We present a series of results regarding conceptually simple algorithms for
bipartite matching in various online and related models. We first consider a
deterministic adversarial model. The best approximation ratio possible for a
one-pass deterministic online algorithm is , which is achieved by any
greedy algorithm. D\"urr et al. recently presented a -pass algorithm called
Category-Advice that achieves approximation ratio . We extend their
algorithm to multiple passes. We prove the exact approximation ratio for the
-pass Category-Advice algorithm for all , and show that the
approximation ratio converges to the inverse of the golden ratio
as goes to infinity. The convergence is
extremely fast --- the -pass Category-Advice algorithm is already within
of the inverse of the golden ratio.
We then consider a natural greedy algorithm in the online stochastic IID
model---MinDegree. This algorithm is an online version of a well-known and
extensively studied offline algorithm MinGreedy. We show that MinDegree cannot
achieve an approximation ratio better than , which is guaranteed by any
consistent greedy algorithm in the known IID model.
Finally, following the work in Besser and Poloczek, we depart from an
adversarial or stochastic ordering and investigate a natural randomized
algorithm (MinRanking) in the priority model. Although the priority model
allows the algorithm to choose the input ordering in a general but well defined
way, this natural algorithm cannot obtain the approximation of the Ranking
algorithm in the ROM model
Stability of Influence Maximization
The present article serves as an erratum to our paper of the same title,
which was presented and published in the KDD 2014 conference. In that article,
we claimed falsely that the objective function defined in Section 1.4 is
non-monotone submodular. We are deeply indebted to Debmalya Mandal, Jean
Pouget-Abadie and Yaron Singer for bringing to our attention a counter-example
to that claim.
Subsequent to becoming aware of the counter-example, we have shown that the
objective function is in fact NP-hard to approximate to within a factor of
for any .
In an attempt to fix the record, the present article combines the problem
motivation, models, and experimental results sections from the original
incorrect article with the new hardness result. We would like readers to only
cite and use this version (which will remain an unpublished note) instead of
the incorrect conference version.Comment: Erratum of Paper "Stability of Influence Maximization" which was
presented and published in the KDD1
Analysis of Crowdsourced Sampling Strategies for HodgeRank with Sparse Random Graphs
Crowdsourcing platforms are now extensively used for conducting subjective
pairwise comparison studies. In this setting, a pairwise comparison dataset is
typically gathered via random sampling, either \emph{with} or \emph{without}
replacement. In this paper, we use tools from random graph theory to analyze
these two random sampling methods for the HodgeRank estimator. Using the
Fiedler value of the graph as a measurement for estimator stability
(informativeness), we provide a new estimate of the Fiedler value for these two
random graph models. In the asymptotic limit as the number of vertices tends to
infinity, we prove the validity of the estimate. Based on our findings, for a
small number of items to be compared, we recommend a two-stage sampling
strategy where a greedy sampling method is used initially and random sampling
\emph{without} replacement is used in the second stage. When a large number of
items is to be compared, we recommend random sampling with replacement as this
is computationally inexpensive and trivially parallelizable. Experiments on
synthetic and real-world datasets support our analysis
Building Damage-Resilient Dominating Sets in Complex Networks against Random and Targeted Attacks
We study the vulnerability of dominating sets against random and targeted
node removals in complex networks. While small, cost-efficient dominating sets
play a significant role in controllability and observability of these networks,
a fixed and intact network structure is always implicitly assumed. We find that
cost-efficiency of dominating sets optimized for small size alone comes at a
price of being vulnerable to damage; domination in the remaining network can be
severely disrupted, even if a small fraction of dominator nodes are lost. We
develop two new methods for finding flexible dominating sets, allowing either
adjustable overall resilience, or dominating set size, while maximizing the
dominated fraction of the remaining network after the attack. We analyze the
efficiency of each method on synthetic scale-free networks, as well as real
complex networks
- …