-
Refined bounds for randomized experimental design
Authors:
Geovani Rizk,
Igor Colin,
Albert Thomas,
Moez Draief
Abstract:
Experimental design is an approach for selecting samples among a given set so as to obtain the best estimator for a given criterion. In the context of linear regression, several optimal designs have been derived, each associated with a different criterion: mean square error, robustness, \emph{etc}. Computing such designs is generally an NP-hard problem and one can instead rely on a convex relaxati…
▽ More
Experimental design is an approach for selecting samples among a given set so as to obtain the best estimator for a given criterion. In the context of linear regression, several optimal designs have been derived, each associated with a different criterion: mean square error, robustness, \emph{etc}. Computing such designs is generally an NP-hard problem and one can instead rely on a convex relaxation that considers probability distributions over the samples. Although greedy strategies and rounding procedures have received a lot of attention, straightforward sampling from the optimal distribution has hardly been investigated. In this paper, we propose theoretical guarantees for randomized strategies on E and G-optimal design. To this end, we develop a new concentration inequality for the eigenvalues of random matrices using a refined version of the intrinsic dimension that enables us to quantify the performance of such randomized strategies. Finally, we evidence the validity of our analysis through experiments, with particular attention on the G-optimal design applied to the best arm identification problem for linear bandits.
△ Less
Submitted 22 December, 2020;
originally announced December 2020.
-
Parallel Contextual Bandits in Wireless Handover Optimization
Authors:
Igor Colin,
Albert Thomas,
Moez Draief
Abstract:
As cellular networks become denser, a scalable and dynamic tuning of wireless base station parameters can only be achieved through automated optimization. Although the contextual bandit framework arises as a natural candidate for such a task, its extension to a parallel setting is not straightforward: one needs to carefully adapt existing methods to fully leverage the multi-agent structure of this…
▽ More
As cellular networks become denser, a scalable and dynamic tuning of wireless base station parameters can only be achieved through automated optimization. Although the contextual bandit framework arises as a natural candidate for such a task, its extension to a parallel setting is not straightforward: one needs to carefully adapt existing methods to fully leverage the multi-agent structure of this problem. We propose two approaches: one derived from a deterministic UCB-like method and the other relying on Thompson sampling. Thanks to its bayesian nature, the latter is intuited to better preserve the exploration-exploitation balance in the bandit batch. This is verified on toy experiments, where Thompson sampling shows robustness to the variability of the contexts. Finally, we apply both methods on a real base station network dataset and evidence that Thompson sampling outperforms both manual tuning and contextual UCB.
△ Less
Submitted 21 January, 2019;
originally announced February 2019.
-
KONG: Kernels for ordered-neighborhood graphs
Authors:
Moez Draief,
Konstantin Kutzkov,
Kevin Scaman,
Milan Vojnovic
Abstract:
We present novel graph kernels for graphs with node and edge labels that have ordered neighborhoods, i.e. when neighbor nodes follow an order. Graphs with ordered neighborhoods are a natural data representation for evolving graphs where edges are created over time, which induces an order. Combining convolutional subgraph kernels and string kernels, we design new scalable algorithms for generation…
▽ More
We present novel graph kernels for graphs with node and edge labels that have ordered neighborhoods, i.e. when neighbor nodes follow an order. Graphs with ordered neighborhoods are a natural data representation for evolving graphs where edges are created over time, which induces an order. Combining convolutional subgraph kernels and string kernels, we design new scalable algorithms for generation of explicit graph feature maps using sketching techniques. We obtain precise bounds for the approximation accuracy and computational complexity of the proposed approaches and demonstrate their applicability on real datasets. In particular, our experiments demonstrate that neighborhood ordering results in more informative features. For the special case of general graphs, i.e. graphs without ordered neighborhoods, the new graph kernels yield efficient and simple algorithms for the comparison of label distributions between graphs.
△ Less
Submitted 29 May, 2018; v1 submitted 25 May, 2018;
originally announced May 2018.
-
Reinforcement Learning with Wasserstein Distance Regularisation, with Applications to Multipolicy Learning
Authors:
Mohammed Amin Abdullah,
Aldo Pacchiano,
Moez Draief
Abstract:
We describe an application of Wasserstein distance to Reinforcement Learning. The Wasserstein distance in question is between the distribution of mappings of trajectories of a policy into some metric space, and some other fixed distribution (which may, for example, come from another policy). Different policies induce different distributions, so given an underlying metric, the Wasserstein distance…
▽ More
We describe an application of Wasserstein distance to Reinforcement Learning. The Wasserstein distance in question is between the distribution of mappings of trajectories of a policy into some metric space, and some other fixed distribution (which may, for example, come from another policy). Different policies induce different distributions, so given an underlying metric, the Wasserstein distance quantifies how different policies are. This can be used to learn multiple polices which are different in terms of such Wasserstein distances by using a Wasserstein regulariser. Changing the sign of the regularisation parameter, one can learn a policy for which its trajectory mapping distribution is attracted to a given fixed distribution.
△ Less
Submitted 30 July, 2019; v1 submitted 12 February, 2018;
originally announced February 2018.
-
Robust On-line Matrix Completion on Graphs
Authors:
Symeon Chouvardas,
Mohammed Amin Abdullah,
Lucas Claude,
Moez Draief
Abstract:
We study online robust matrix completion on graphs. At each iteration a vector with some entries missing is revealed and our goal is to reconstruct it by identifying the underlying low-dimensional subspace from which the vectors are drawn. We assume there is an underlying graph structure to the data, that is, the components of each vector correspond to nodes of a certain (known) graph, and their v…
▽ More
We study online robust matrix completion on graphs. At each iteration a vector with some entries missing is revealed and our goal is to reconstruct it by identifying the underlying low-dimensional subspace from which the vectors are drawn. We assume there is an underlying graph structure to the data, that is, the components of each vector correspond to nodes of a certain (known) graph, and their values are related accordingly. We give algorithms that exploit the graph to reconstruct the incomplete data, even in the presence of outlier noise. The theoretical properties of the algorithms are studied and numerical experiments using both synthetic and real world datasets verify the improved performance of the proposed technique compared to other state of the art algorithms.
△ Less
Submitted 13 May, 2016;
originally announced May 2016.
-
A Diffusion Kernel LMS algorithm for nonlinear adaptive networks
Authors:
Symeon Chouvardas,
Moez Draief
Abstract:
This work presents a distributed algorithm for nonlinear adaptive learning. In particular, a set of nodes obtain measurements, sequentially one per time step, which are related via a nonlinear function; their goal is to collectively minimize a cost function by employing a diffusion based Kernel Least Mean Squares (KLMS). The algorithm follows the Adapt Then Combine mode of cooperation. Moreover, t…
▽ More
This work presents a distributed algorithm for nonlinear adaptive learning. In particular, a set of nodes obtain measurements, sequentially one per time step, which are related via a nonlinear function; their goal is to collectively minimize a cost function by employing a diffusion based Kernel Least Mean Squares (KLMS). The algorithm follows the Adapt Then Combine mode of cooperation. Moreover, the theoretical properties of the algorithm are studied and it is proved that under certain assumptions the algorithm suffers a no regret bound. Finally, comparative experiments verify that the proposed scheme outperforms other variants of the LMS.
△ Less
Submitted 7 February, 2016;
originally announced February 2016.
-
Online and Global Network Optimization: Towards the Next-Generation of Routing Platforms
Authors:
Jérémie Leguay,
Moez Draief,
Symeon Chouvardas,
Stefano Paris,
Georgios S. Paschos,
Lorenzo Maggi,
Meiyu Qi
Abstract:
The computation power of SDN controllers fosters the development of a new generation of control plane that uses compute-intensive operations to automate and optimize the network configuration across layers. From now on, cutting-edge optimization and machine learning algorithms can be used to control networks in real-time. This formidable opportunity transforms the way routing systems should be con…
▽ More
The computation power of SDN controllers fosters the development of a new generation of control plane that uses compute-intensive operations to automate and optimize the network configuration across layers. From now on, cutting-edge optimization and machine learning algorithms can be used to control networks in real-time. This formidable opportunity transforms the way routing systems should be conceived and designed. This paper presents a candidate architecture for the next generation of routing platforms built on three main pillars for admission control, re-routing and monitoring that would have not been possible in legacy control planes.
△ Less
Submitted 4 February, 2016;
originally announced February 2016.
-
Placing Dynamic Content in Caches with Small Population
Authors:
Mathieu Leconte,
Georgios Paschos,
Lazaros Gkatzikis,
Moez Draief,
Spyridon Vassilaras,
Symeon Chouvardas
Abstract:
This paper addresses a fundamental limitation for the adoption of caching for wireless access networks due to small population sizes. This shortcoming is due to two main challenges: (i) making timely estimates of varying content popularity and (ii) inferring popular content from small samples. We propose a framework which alleviates such limitations.
To timely estimate varying popularity in a co…
▽ More
This paper addresses a fundamental limitation for the adoption of caching for wireless access networks due to small population sizes. This shortcoming is due to two main challenges: (i) making timely estimates of varying content popularity and (ii) inferring popular content from small samples. We propose a framework which alleviates such limitations.
To timely estimate varying popularity in a context of a single cache we propose an Age-Based Threshold (ABT) policy which caches all contents requested more times than a threshold $\widetilde N(τ)$, where $τ$ is the content age. We show that ABT is asymptotically hit rate optimal in the many contents regime, which allows us to obtain the first characterization of the optimal performance of a caching system in a dynamic context. We then address small sample sizes focusing on $L$ local caches and one global cache. On the one hand we show that the global cache learns L times faster by aggregating all requests from local caches, which improves hit rates. On the other hand, aggregation washes out local characteristics of correlated traffic which penalizes hit rate. This motivates coordination mechanisms which combine global learning of popularity scores in clusters and LRU with prefetching.
△ Less
Submitted 15 January, 2016;
originally announced January 2016.
-
Opinion formation models on a gradient
Authors:
Michael T. Gastner,
Nikolitsa Markou,
Gunnar Pruessner,
Moez Draief
Abstract:
Statistical physicists have become interested in models of collective social behavior such as opinion formation, where individuals change their inherently preferred opinion if their friends disagree. Real preferences often depend on regional cultural differences, which we model here as a spatial gradient $g$ in the initial opinion. The gradient does not only add reality to the model. It can also r…
▽ More
Statistical physicists have become interested in models of collective social behavior such as opinion formation, where individuals change their inherently preferred opinion if their friends disagree. Real preferences often depend on regional cultural differences, which we model here as a spatial gradient $g$ in the initial opinion. The gradient does not only add reality to the model. It can also reveal that opinion clusters in two dimensions are typically in the standard (i.e.\ independent) percolation universality class, thus settling a recent controversy about a non-consensus model. However, using analytical and numerical tools, we also present a model where the width of the transition between opinions scales $\propto g^{-1/4}$, not $\propto g^{-4/7}$ as in independent percolation, and the cluster size distribution is consistent with first-order percolation.
△ Less
Submitted 26 January, 2015; v1 submitted 6 June, 2014;
originally announced June 2014.
-
Global Majority Consensus by Local Majority Polling on Graphs of a Given Degree Sequence
Authors:
Mohammed Amin Abdullah,
Moez Draief
Abstract:
Suppose in a graph $G$ vertices can be either red or blue. Let $k$ be odd. At each time step, each vertex $v$ in $G$ polls $k$ random neighbours and takes the majority colour. If it doesn't have $k$ neighbours, it simply polls all of them, or all less one if the degree of $v$ is even. We study this protocol on graphs of a given degree sequence, in the following setting: initially each vertex of…
▽ More
Suppose in a graph $G$ vertices can be either red or blue. Let $k$ be odd. At each time step, each vertex $v$ in $G$ polls $k$ random neighbours and takes the majority colour. If it doesn't have $k$ neighbours, it simply polls all of them, or all less one if the degree of $v$ is even. We study this protocol on graphs of a given degree sequence, in the following setting: initially each vertex of $G$ is red independently with probability $α< \frac{1}{2}$, and is otherwise blue. We show that if $α$ is sufficiently biased, then with high probability consensus is reached on the initial global majority within $O(\log_k \log_k n)$ steps if $5 \leq k \leq d$, and $O(\log_d \log_d n)$ steps if $k > d$. Here, $d\geq 5$ is the effective minimum degree, the smallest integer which occurs $Θ(n)$ times in the degree sequence. We further show that on such graphs, any local protocol in which a vertex does not change colour if all its neighbours have that same colour, takes time at least $Ω(\log_d \log_d n)$, with high probability. Additionally, we demonstrate how the technique for the above sparse graphs can be applied in a straightforward manner to get bounds for the Erdős-Rényi random graphs in the connected regime.
△ Less
Submitted 30 July, 2019; v1 submitted 22 September, 2012;
originally announced September 2012.
-
Structural Analysis of Viral Spreading Processes in Social and Communication Networks Using Egonets
Authors:
Victor M. Preciado,
Moez Draief,
Ali Jadbabaie
Abstract:
We study how the behavior of viral spreading processes is influenced by local structural properties of the network over which they propagate. For a wide variety of spreading processes, the largest eigenvalue of the adjacency matrix of the network plays a key role on their global dynamical behavior. For many real-world large-scale networks, it is unfeasible to exactly retrieve the complete network…
▽ More
We study how the behavior of viral spreading processes is influenced by local structural properties of the network over which they propagate. For a wide variety of spreading processes, the largest eigenvalue of the adjacency matrix of the network plays a key role on their global dynamical behavior. For many real-world large-scale networks, it is unfeasible to exactly retrieve the complete network structure to compute its largest eigenvalue. Instead, one usually have access to myopic, egocentric views of the network structure, also called egonets. In this paper, we propose a mathematical framework, based on algebraic graph theory and convex optimization, to study how local structural properties of the network constrain the interval of possible values in which the largest eigenvalue must lie. Based on this framework, we present a computationally efficient approach to find this interval from a collection of egonets. Our numerical simulations show that, for several social and communication networks, local structural properties of the network strongly constrain the location of the largest eigenvalue and the resulting spreading dynamics. From a practical point of view, our results can be used to dictate immunization strategies to tame the spreading of a virus, or to design network topologies that facilitate the spreading of information virally.
△ Less
Submitted 3 September, 2012;
originally announced September 2012.
-
Bargaining Dynamics in Exchange Networks
Authors:
Moez Draief,
Milan Vojnovic
Abstract:
We consider a dynamical system for computing Nash bargaining solutions on graphs and focus on its rate of convergence. More precisely, we analyze the edge-balanced dynamical system by Azar et al and fully specify its convergence for an important class of elementary graph structures that arise in Kleinberg and Tardos' procedure for computing a Nash bargaining solution on general graphs. We show tha…
▽ More
We consider a dynamical system for computing Nash bargaining solutions on graphs and focus on its rate of convergence. More precisely, we analyze the edge-balanced dynamical system by Azar et al and fully specify its convergence for an important class of elementary graph structures that arise in Kleinberg and Tardos' procedure for computing a Nash bargaining solution on general graphs. We show that all these dynamical systems are either linear or eventually become linear and that their convergence times are quadratic in the number of matched edges.
△ Less
Submitted 6 February, 2012;
originally announced February 2012.
-
Convergence Speed of Binary Interval Consensus
Authors:
Moez Draief,
Milan Vojnovic
Abstract:
We consider the convergence time for solving the binary consensus problem using the interval consensus algorithm proposed by B\' en\' ezit, Thiran and Vetterli (2009). In the binary consensus problem, each node initially holds one of two states and the goal for each node is to correctly decide which one of these two states was initially held by a majority of nodes.
We derive an upper bound on th…
▽ More
We consider the convergence time for solving the binary consensus problem using the interval consensus algorithm proposed by B\' en\' ezit, Thiran and Vetterli (2009). In the binary consensus problem, each node initially holds one of two states and the goal for each node is to correctly decide which one of these two states was initially held by a majority of nodes.
We derive an upper bound on the expected convergence time that holds for arbitrary connected graphs, which is based on the location of eigenvalues of some contact rate matrices. We instantiate our bound for particular networks of interest, including complete graphs, paths, cycles, star-shaped networks, and Erd\" os-R\' enyi random graphs; for these graphs, we compare our bound with alternative computations. We find that for all these examples our bound is tight, yielding the exact order with respect to the number of nodes.
We pinpoint the fact that the expected convergence time critically depends on the voting margin defined as the difference between the fraction of nodes that initially held the majority and the minority states, respectively. The characterization of the expected convergence time yields exact relation between the expected convergence time and the voting margin, for some of these graphs, which reveals how the expected convergence time goes to infinity as the voting margin approaches zero.
Our results provide insights into how the expected convergence time depends on the network topology which can be used for performance evaluation and network design. The results are of interest in the context of networked systems, in particular, peer-to-peer networks, sensor networks and distributed databases.
△ Less
Submitted 6 February, 2012;
originally announced February 2012.
-
Viral processes by random walks on random regular graphs
Authors:
Mohammed Abdullah,
Colin Cooper,
Moez Draief
Abstract:
We study the SIR epidemic model with infections carried by $k$ particles making independent random walks on a random regular graph. Here we assume $k\leq n^ε$, where $n$ is the number of vertices in the random graph, and $ε$ is some sufficiently small constant. We give an edge-weighted graph reduction of the dynamics of the process that allows us to apply standard results of Erdős-Rényi random gra…
▽ More
We study the SIR epidemic model with infections carried by $k$ particles making independent random walks on a random regular graph. Here we assume $k\leq n^ε$, where $n$ is the number of vertices in the random graph, and $ε$ is some sufficiently small constant. We give an edge-weighted graph reduction of the dynamics of the process that allows us to apply standard results of Erdős-Rényi random graphs on the particle set. In particular, we show how the parameters of the model give two thresholds: In the subcritical regime, $O(\ln k)$ particles are infected. In the supercritical regime, for a constant $β\in(0,1)$ determined by the parameters of the model, $βk$ get infected with probability $β$, and $O(\ln k)$ get infected with probability $(1-β)$. Finally, there is a regime in which all $k$ particles are infected. Furthermore, the edge weights give information about when a particle becomes infected. We exploit this to give a completion time of the process for the SI case.
△ Less
Submitted 17 March, 2015; v1 submitted 19 April, 2011;
originally announced April 2011.
-
Percolate or die: Multi-percolation decides the struggle between competing innovations
Authors:
Carlos P. Roca,
Moez Draief,
Dirk Helbing
Abstract:
Competition is one of the most fundamental phenomena in physics, biology and economics. Recent studies of the competition between innovations have highlighted the influence of switching costs and interaction networks, but the problem is still puzzling. We introduce a model that reveals a novel multi-percolation process, which governs the struggle of innovations trying to penetrate a market. We fin…
▽ More
Competition is one of the most fundamental phenomena in physics, biology and economics. Recent studies of the competition between innovations have highlighted the influence of switching costs and interaction networks, but the problem is still puzzling. We introduce a model that reveals a novel multi-percolation process, which governs the struggle of innovations trying to penetrate a market. We find that innovations thrive as long as they percolate in a population, and one becomes dominant when it is the only one that percolates. Besides offering a theoretical framework to understand the diffusion of competing innovations in social networks, our results are also relevant to model other problems such as opinion formation, political polarization, survival of languages and the spread of health behavior.
△ Less
Submitted 4 January, 2011;
originally announced January 2011.
-
Flooding in Weighted Random Graphs
Authors:
Hamed Amini,
Moez Draief,
Marc Lelarge
Abstract:
In this paper, we study the impact of edge weights on distances in diluted random graphs. We interpret these weights as delays, and take them as i.i.d exponential random variables. We analyze the weighted flooding time defined as the minimum time needed to reach all nodes from one uniformly chosen node, and the weighted diameter corresponding to the largest distance between any pair of vertices. U…
▽ More
In this paper, we study the impact of edge weights on distances in diluted random graphs. We interpret these weights as delays, and take them as i.i.d exponential random variables. We analyze the weighted flooding time defined as the minimum time needed to reach all nodes from one uniformly chosen node, and the weighted diameter corresponding to the largest distance between any pair of vertices. Under some regularity conditions on the degree sequence of the random graph, we show that these quantities grow as the logarithm of $n$, when the size of the graph $n$ tends to infinity. We also derive the exact value for the prefactors. These allow us to analyze an asynchronous randomized broadcast algorithm for random regular graphs. Our results show that the asynchronous version of the algorithm performs better than its synchronized version: in the large size limit of the graph, it will reach the whole network faster even if the local dynamics are similar on average.
△ Less
Submitted 27 November, 2010;
originally announced November 2010.
-
Exponential random graphs as models of overlay networks
Authors:
M. Draief,
A. Ganesh,
L. Massoulie
Abstract:
In this paper, we give an analytic solution for graphs with n nodes and E edges for which the probability of obtaining a given graph G is specified in terms of the degree sequence of G. We describe how this model naturally appears in the context of load balancing in communication networks, namely Peer-to-Peer overlays. We then analyse the degree distribution of such graphs and show that the degr…
▽ More
In this paper, we give an analytic solution for graphs with n nodes and E edges for which the probability of obtaining a given graph G is specified in terms of the degree sequence of G. We describe how this model naturally appears in the context of load balancing in communication networks, namely Peer-to-Peer overlays. We then analyse the degree distribution of such graphs and show that the degrees are concentrated around their mean value. Finally, we derive asymptotic results on the number of edges crossing a graph cut and use these results $(i)$ to compute the graph expansion and conductance, and $(ii)$ to analyse the graph resilience to random failures.
△ Less
Submitted 17 October, 2008;
originally announced October 2008.
-
A model for infection on graphs
Authors:
M. Draief,
A. Ganesh
Abstract:
We address the question of understanding the effect of the underlying network topology on the spread of a virus and the dissemination of information when users are mobile performing independent random walks on a graph. To this end we propose a simple model of infection that enables to study the coincidence time of two random walkers on an arbitrary graph. By studying the coincidence time of a su…
▽ More
We address the question of understanding the effect of the underlying network topology on the spread of a virus and the dissemination of information when users are mobile performing independent random walks on a graph. To this end we propose a simple model of infection that enables to study the coincidence time of two random walkers on an arbitrary graph. By studying the coincidence time of a susceptible and an infected individual both moving in the graph we obtain estimates of the infection probability. The main result of this paper is to pinpoint the impact of the network topology on the infection probability. More precisely, we prove that for homogeneous graph including regular graphs and the classical Erdos-Renyi model, the coincidence time is inversely proportional to the number of nodes in the graph. We then study the model on power-law graphs, that exhibit heterogeneous connectivity patterns, and show the existence of a phase transition for the coincidence time depending on the parameter of the power-law of the degree distribution.
△ Less
Submitted 17 October, 2008;
originally announced October 2008.
-
Marketing in Random Networks
Authors:
Hamed Amini,
Moez Draief,
Marc Lelarge
Abstract:
Viral marketing takes advantage of preexisting social networks among customers to achieve large changes in behaviour. Models of influence spread have been studied in a number of domains, including the effect of "word of mouth" in the promotion of new products or the diffusion of technologies. A social network can be represented by a graph where the nodes are individuals and the edges indicate a…
▽ More
Viral marketing takes advantage of preexisting social networks among customers to achieve large changes in behaviour. Models of influence spread have been studied in a number of domains, including the effect of "word of mouth" in the promotion of new products or the diffusion of technologies. A social network can be represented by a graph where the nodes are individuals and the edges indicate a form of social relationship. The flow of influence through this network can be thought of as an increasing process of active nodes: as individuals become aware of new technologies, they have the potential to pass them on to their neighbours. The goal of marketing is to trigger a large cascade of adoptions. In this paper, we develop a mathematical model that allows to analyze the dynamics of the cascading sequence of nodes switching to the new technology. To this end we describe a continuous-time and a discrete-time models and analyse the proportion of nodes that adopt the new technology over time.
△ Less
Submitted 7 September, 2008; v1 submitted 21 May, 2008;
originally announced May 2008.
-
Services within a busy period of an M/M/1 queue and Dyck paths
Authors:
Moez Draief,
Jean Mairesse
Abstract:
We analyze the service times of customers in a stable M/M/1 queue in equilibrium depending on their position in a busy period. We give the law of the service of a customer at the beginning, at the end, or in the middle of the busy period. It enables as a by-product to prove that the process of instants of beginning of services is not Poisson. We then proceed to a more precise analysis. We consid…
▽ More
We analyze the service times of customers in a stable M/M/1 queue in equilibrium depending on their position in a busy period. We give the law of the service of a customer at the beginning, at the end, or in the middle of the busy period. It enables as a by-product to prove that the process of instants of beginning of services is not Poisson. We then proceed to a more precise analysis. We consider a family of polynomial generating series associated with Dyck paths of length 2n and we show that they provide the correlation function of the successive services in a busy period with (n+1) customers.
△ Less
Submitted 27 July, 2007;
originally announced July 2007.
-
Queues, stores, and tableaux
Authors:
Moez Draief,
Jean Mairesse,
Neil O'Connell
Abstract:
Consider the single server queue with an infinite buffer and a FIFO discipline, either of type M/M/1 or Geom/Geom/1. Denote by A the arrival process and by s the services. Assume the stability condition to be satisfied. Denote by D the departure process in equilibrium and by r the time spent by the customers at the very back of the queue. We prove that (D,r) has the same law as (A,s) which is an…
▽ More
Consider the single server queue with an infinite buffer and a FIFO discipline, either of type M/M/1 or Geom/Geom/1. Denote by A the arrival process and by s the services. Assume the stability condition to be satisfied. Denote by D the departure process in equilibrium and by r the time spent by the customers at the very back of the queue. We prove that (D,r) has the same law as (A,s) which is an extension of the classical Burke Theorem. In fact, r can be viewed as the departures from a dual storage model. This duality between the two models also appears when studying the transient behavior of a tandem by means of the RSK algorithm: the first and last row of the resulting semi-standard Young tableau are respectively the last instant of departure in the queue and the total number of departures in the store.
△ Less
Submitted 27 July, 2007;
originally announced July 2007.
-
Thresholds for virus spread on networks
Authors:
M. Draief,
A. Ganesh,
L. Massoulie
Abstract:
We study how the spread of computer viruses, worms, and other self-replicating malware is affected by the logical topology of the network over which they propagate. We consider a model in which each host can be in one of 3 possible states - susceptible, infected or removed (cured, and no longer susceptible to infection). We characterise how the size of the population that eventually becomes infe…
▽ More
We study how the spread of computer viruses, worms, and other self-replicating malware is affected by the logical topology of the network over which they propagate. We consider a model in which each host can be in one of 3 possible states - susceptible, infected or removed (cured, and no longer susceptible to infection). We characterise how the size of the population that eventually becomes infected depends on the network topology. Specifically, we show that if the ratio of cure to infection rates is larger than the spectral radius of the graph, and the initial infected population is small, then the final infected population is also small in a sense that can be made precise. Conversely, if this ratio is smaller than the spectral radius, then we show in some graph models of practical interest (including power law random graphs) that the final infected population is large. These results yield insights into what the critical parameters are in determining virus spread in networks.
△ Less
Submitted 21 June, 2006;
originally announced June 2006.
-
Routing in Poisson small-world networks
Authors:
M. Draief,
A. Ganesh
Abstract:
In recent work, Jon Kleinberg considered a small-world network model consisting of a d-dimensional lattice augmented with shortcuts. The probability of a shortcut being present between two points decays as a power of the distance between them. Kleinberg studied the efficiency of greedy routing depending on the value of the power. The results were extended to a continuum model by Franceschetti an…
▽ More
In recent work, Jon Kleinberg considered a small-world network model consisting of a d-dimensional lattice augmented with shortcuts. The probability of a shortcut being present between two points decays as a power of the distance between them. Kleinberg studied the efficiency of greedy routing depending on the value of the power. The results were extended to a continuum model by Franceschetti and Meester. In our work, we extend the result to more realistic models constructed from a Poisson point process, wherein each point is connected to all its neighbours within some fixed radius, as well as possessing random shortcuts to more distant nodes as described above.
△ Less
Submitted 22 August, 2005;
originally announced August 2005.
-
The Single Server Queue and the Storage Model: Large Deviations and Fixed Points
Authors:
Moez Draief
Abstract:
We consider the coupling of a single server queue and a storage model defined as a Queue/Store model in Draief et al. 2004. We establish that if the input variables, arrivals at the queue and store, satisfy large deviations principles and are linked through an {\em exponential tilting} then the output variables (departures from each system) satisfy large deviations principles with the same rate…
▽ More
We consider the coupling of a single server queue and a storage model defined as a Queue/Store model in Draief et al. 2004. We establish that if the input variables, arrivals at the queue and store, satisfy large deviations principles and are linked through an {\em exponential tilting} then the output variables (departures from each system) satisfy large deviations principles with the same rate function. This generalizes to the context of large deviations the extension of Burke's Theorem derived in Draief et al. 2004.
△ Less
Submitted 22 August, 2005; v1 submitted 1 March, 2005;
originally announced March 2005.