Skip to main content

Showing 1–35 of 35 results for author: Adam, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.19622  [pdf, ps, other

    cs.RO cs.FL cs.SE eess.SY

    A Verification Methodology for Safety Assurance of Robotic Autonomous Systems

    Authors: Mustafa Adam, David A. Anisi, Pedro Ribeiro

    Abstract: Autonomous robots deployed in shared human environments, such as agricultural settings, require rigorous safety assurance to meet both functional reliability and regulatory compliance. These systems must operate in dynamic, unstructured environments, interact safely with humans, and respond effectively to a wide range of potential hazards. This paper presents a verification workflow for the safety… ▽ More

    Submitted 24 June, 2025; originally announced June 2025.

    Comments: In Proc. of the 26th TAROS (Towards Autonomous Robotic Systems) Conference, York, UK, August, 2025

  2. arXiv:2506.19620  [pdf, ps, other

    cs.RO cs.FL cs.SE eess.SY

    Probabilistic modelling and safety assurance of an agriculture robot providing light-treatment

    Authors: Mustafa Adam, Kangfeng Ye, David A. Anisi, Ana Cavalcanti, Jim Woodcock, Robert Morris

    Abstract: Continued adoption of agricultural robots postulates the farmer's trust in the reliability, robustness and safety of the new technology. This motivates our work on safety assurance of agricultural robots, particularly their ability to detect, track and avoid obstacles and humans. This paper considers a probabilistic modelling and risk analysis framework for use in the early development phases. Sta… ▽ More

    Submitted 24 June, 2025; originally announced June 2025.

  3. arXiv:2506.03720  [pdf, other

    cs.HC

    Design of a visual environment for programming by direct data manipulation

    Authors: Michel Adam, Patrice Frison, Moncef Daoud, Sabine Letellier Zarshenas

    Abstract: The use of applications on computers, smartphones, and tablets has been considerably simplified thanks to interactive and dynamic graphical interfaces coupled with the mouse and touch screens. It is no longer necessary to be a computer specialist to use them. Paradoxically, the development of computer programs generally requires writing lines of code in a programming language whose syntax is parti… ▽ More

    Submitted 6 June, 2025; v1 submitted 4 June, 2025; originally announced June 2025.

    Comments: in French language

  4. arXiv:2506.01609  [pdf, ps, other

    cs.NI eess.SP

    Network Digital Twin for 6G and Beyond: An End-to-End View Across Multi-Domain Network Ecosystems

    Authors: Dinh-Hieu Tran, Nazar Waheed, Yuris Mulya Saputra, Xingqin Lin, Cong T. Nguyen, Tedros Salih Abdu, Van Nhan Vo, Van-Quan Pham, Madyan Alsenwi, Abuzar Babikir Mohammad Adam, Symeon Chatzinotas, Eva Lagaunas, Hung Tran, Tu Ho Dac, Nguyen Van Huynh

    Abstract: With the rapid development of technology, the number of smart mobile users is increasing, accompanied by growing demands from applications such as virtual/augmented reality (VR/XR), remote surgery, autonomous vehicles, and real-time holographic communications, all of which require high transmission rates and ultra-low latency in 6G and beyond networks (6G+). This poses enormous challenges in effic… ▽ More

    Submitted 2 June, 2025; originally announced June 2025.

    Comments: 40 pages, 15 figures

  5. arXiv:2505.14263  [pdf, ps, other

    cs.IT eess.SP

    Swarm Intelligence Optimization of Multi-RIS Aided MmWave Beamspace MIMO

    Authors: Zaid Abdullah, Mario R. Camana, Abuzar B. M. Adam, Chandan K. Sheemar, Eva Lagunas, Symeon Chatzinotas

    Abstract: We investigate the performance of a multiple reconfigurable intelligence surface (RIS)-aided millimeter wave (mmWave) beamspace multiple-input multiple-output (MIMO) system with multiple users (UEs). We focus on a challenging scenario in which the direct links between the base station (BS) and all UEs are blocked, and communication is facilitated only via RISs. The maximum ratio transmission (MRT)… ▽ More

    Submitted 20 May, 2025; originally announced May 2025.

    Comments: This manuscript is accepted for publication at the 2025 IEEE VTC spring workshops, Oslo, Norway

  6. arXiv:2505.07714  [pdf, other

    eess.SP cs.ET cs.LG

    SmartUT: Receive Beamforming for Spectral Coexistence of NGSO Satellite Systems

    Authors: Almoatssimbillah Saifaldawla, Eva Lagunas, Flor Ortiz, Abuzar B. M. Adam, Symeon Chatzinotas

    Abstract: In this paper, we investigate downlink co-frequency interference (CFI) mitigation in non-geostationary satellites orbits (NGSOs) co-existing systems. Traditional mitigation techniques, such as Zero-forcing (ZF), produce a null towards the direction of arrivals (DOAs) of the interfering signals, but they suffer from high computational complexity due to matrix inversions and required knowledge of th… ▽ More

    Submitted 12 May, 2025; originally announced May 2025.

  7. arXiv:2503.11349  [pdf, other

    cs.LG cs.AI

    An experimental approach on Few Shot Class Incremental Learning

    Authors: Marinela Adam

    Abstract: Few-Shot Class-Incremental Learning (FSCIL) represents a cutting-edge paradigm within the broader scope of machine learning, designed to empower models with the ability to assimilate new classes of data with limited examples while safeguarding existing knowledge. The paper will present different solutions which contain extensive experiments across large-scale datasets, domain shifts, and network a… ▽ More

    Submitted 14 March, 2025; originally announced March 2025.

  8. arXiv:2410.17421  [pdf

    cs.CY

    From an attention economy to an ecology of attending. A manifesto

    Authors: Gunter Bombaerts, Tom Hannes, Martin Adam, Alessandra Aloisi, Joel Anderson, Lawrence Berger, Stefano Davide Bettera, Enrico Campo, Laura Candiotto, Silvia Caprioglio Panizza, Yves Citton, Diego D’Angelo, Matthew Dennis, Nathalie Depraz, Peter Doran, Wolfgang Drechsler, Bill Duane, William Edelglass, Iris Eisenberger, Beverley Foulks McGuire, Antony Fredriksson, Karamjit S. Gill, Peter D. Hershock, Soraj Hongladarom, Beth Jacobs , et al. (30 additional authors not shown)

    Abstract: As the signatories of this manifesto, we denounce the attention economy as inhumane and a threat to our sociopolitical and ecological well-being. We endorse policymakers' efforts to address the negative consequences of the attention economy's technology, but add that these approaches are often limited in their criticism of the systemic context of human attention. Starting from Buddhist philosophy,… ▽ More

    Submitted 22 October, 2024; originally announced October 2024.

    Comments: 21 pages, 1 figure

  9. arXiv:2405.19575  [pdf, other

    cs.CL cs.AI

    A Deep Convolutional Neural Network-based Model for Aspect and Polarity Classification in Hausa Movie Reviews

    Authors: Umar Ibrahim, Abubakar Yakubu Zandam, Fatima Muhammad Adam, Aminu Musa

    Abstract: Aspect-based Sentiment Analysis (ABSA) is crucial for understanding sentiment nuances in text, especially across diverse languages and cultures. This paper introduces a novel Deep Convolutional Neural Network (CNN)-based model tailored for aspect and polarity classification in Hausa movie reviews, an underrepresented language in sentiment analysis research. A comprehensive Hausa ABSA dataset is cr… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

    Comments: To be published in the proceedings of ICCAIT 2023

  10. arXiv:2405.14524  [pdf, other

    cs.NI

    QoE-Aware and Secure UAV-Aided Rate-Splitting Multiple Access Based Communications

    Authors: Abuzar B. M. Adam, Xiaoyu Wan, Mohammed Saleh Ali Muthanna

    Abstract: In this work, we address the issue of quality of experience (QoE) in unmanned aerial vehicle (UAV) aided multiuser rate-splitting multiple access (RSMA) networks under secrecy constraints. The problem is formulated as maximization of sum mean opinion scores (MOSs) of the users. The problem is decomposed into two subproblems, beamforming and rate allocation and UAV trajectory subproblem. For, beamf… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

    Comments: 6 pages, 4 figures

  11. arXiv:2403.18930  [pdf, other

    cs.NI cs.LG

    Optimizing Wireless Networks with Deep Unfolding: Comparative Study on Two Deep Unfolding Mechanisms

    Authors: Abuzar B. M. Adam, Mohammed A. M. Elhassan, Elhadj Moustapha Diallo

    Abstract: In this work, we conduct a comparative study on two deep unfolding mechanisms to efficiently perform power control in the next generation wireless networks. The power control problem is formulated as energy efficiency over multiple interference links. The problem is nonconvex. We employ fractional programming transformation to design two solutions for the problem. The first solution is a numerical… ▽ More

    Submitted 17 February, 2024; originally announced March 2024.

    Comments: 11 pages, 13 figures

  12. arXiv:2401.00192  [pdf, other

    cs.IT eess.SP

    Real-Time and Security-Aware Precoding in RIS-Empowered Multi-User Wireless Networks

    Authors: Abuzar B. M. Adam, Mohamed Amine Ouamri, Mohammed Saleh Ali Muthanna, Xingwang Li, Mohammed A. M. Elhassan, Ammar Muthanna

    Abstract: In this letter, we propose a deep-unfolding-based framework (DUNet) to maximize the secrecy rate in reconfigurable intelligent surface (RIS) empowered multi-user wireless networks. To tailor DUNet, first we relax the problem, decouple it into beamforming and phase shift subproblems, and propose an alternative optimization (AO) based solution for the relaxed problem. Second, we apply Karush-Kuhn-Tu… ▽ More

    Submitted 30 December, 2023; originally announced January 2024.

  13. arXiv:2312.03751  [pdf, other

    cs.CL cs.SI

    Which linguistic cues make people fall for fake news? A comparison of cognitive and affective processing

    Authors: Bernhard Lutz, Marc Adam, Stefan Feuerriegel, Nicolas Pröllochs, Dirk Neumann

    Abstract: Fake news on social media has large, negative implications for society. However, little is known about what linguistic cues make people fall for fake news and, hence, how to design effective countermeasures for social media. In this study, we seek to understand which linguistic cues make people fall for fake news. Linguistic cues (e.g., adverbs, personal pronouns, positive emotion words, negative… ▽ More

    Submitted 2 December, 2023; originally announced December 2023.

  14. arXiv:2311.10541  [pdf, other

    cs.CL

    Detection and Analysis of Offensive Online Content in Hausa Language

    Authors: Fatima Muhammad Adam, Abubakar Yakubu Zandam, Isa Inuwa-Dutse

    Abstract: Hausa, a major Chadic language spoken by over 100 million people mostly in West Africa is considered a low-resource language from a computational linguistic perspective. This classification indicates a scarcity of linguistic resources and tools necessary for handling various natural language processing (NLP) tasks, including the detection of offensive content. To address this gap, we conducted two… ▽ More

    Submitted 6 March, 2025; v1 submitted 17 November, 2023; originally announced November 2023.

    Comments: 21 pages, 4 figures, 7 tables

  15. P2AT: Pyramid Pooling Axial Transformer for Real-time Semantic Segmentation

    Authors: Mohammed A. M. Elhassan, Changjun Zhou, Amina Benabid, Abuzar B. M. Adam

    Abstract: Recently, Transformer-based models have achieved promising results in various vision tasks, due to their ability to model long-range dependencies. However, transformers are computationally expensive, which limits their applications in real-time tasks such as autonomous driving. In addition, an efficient local and global feature selection and fusion are vital for accurate dense prediction, especial… ▽ More

    Submitted 23 October, 2023; originally announced October 2023.

    Journal ref: Expert Systems with Applications, Volume 255, Part B , 1 December 2024, 124610

  16. arXiv:2310.05600  [pdf, other

    cs.RO cs.CV

    Care3D: An Active 3D Object Detection Dataset of Real Robotic-Care Environments

    Authors: Michael G. Adam, Sebastian Eger, Martin Piccolrovazzi, Maged Iskandar, Joern Vogel, Alexander Dietrich, Seongjien Bien, Jon Skerlj, Abdeldjallil Naceri, Eckehard Steinbach, Alin Albu-Schaeffer, Sami Haddadin, Wolfram Burgard

    Abstract: As labor shortage increases in the health sector, the demand for assistive robotics grows. However, the needed test data to develop those robots is scarce, especially for the application of active 3D object detection, where no real data exists at all. This short paper counters this by introducing such an annotated dataset of real environments. The captured environments represent areas which are al… ▽ More

    Submitted 9 October, 2023; originally announced October 2023.

  17. arXiv:2310.01437  [pdf, other

    cs.CR cs.ET cs.NI eess.SP

    Enhancing Secrecy in UAV RSMA Networks: Deep Unfolding Meets Deep Reinforcement Learning

    Authors: Abuzar B. M. Adam, Mohammed A. M. Elhassan

    Abstract: In this paper, we consider the maximization of the secrecy rate in multiple unmanned aerial vehicles (UAV) rate-splitting multiple access (RSMA) network. A joint beamforming, rate allocation, and UAV trajectory optimization problem is formulated which is nonconvex. Hence, the problem is transformed into a Markov decision problem and a novel multiagent deep reinforcement learning (DRL) framework is… ▽ More

    Submitted 30 September, 2023; originally announced October 2023.

    Comments: 5 pages, 5 figures, conference

  18. arXiv:2212.13141  [pdf, other

    cs.NI cs.DC cs.LG eess.SP eess.SY

    Beyond 5G Networks: Integration of Communication, Computing, Caching, and Control

    Authors: Musbahu Mohammed Adam, Liqiang Zhao, Kezhi Wang, Zhu Han

    Abstract: In recent years, the exponential proliferation of smart devices with their intelligent applications poses severe challenges on conventional cellular networks. Such challenges can be potentially overcome by integrating communication, computing, caching, and control (i4C) technologies. In this survey, we first give a snapshot of different aspects of the i4C, comprising background, motivation, leadin… ▽ More

    Submitted 26 December, 2022; originally announced December 2022.

    Comments: This article has been accepted for inclusion in a future issue of China Communications Journal in IEEE Xplore

  19. arXiv:2212.06540  [pdf, other

    cs.IR

    Automatic ESG Assessment of Companies by Mining and Evaluating Media Coverage Data: NLP Approach and Tool

    Authors: Jannik Fischbach, Max Adam, Victor Dzhagatspanyan, Daniel Mendez, Julian Frattini, Oleksandr Kosenkov, Parisa Elahidoost

    Abstract: Context: Sustainable corporate behavior is increasingly valued by society and impacts corporate reputation and customer trust. Hence, companies regularly publish sustainability reports to shed light on their impact on environmental, social, and governance (ESG) factors. Problem: Sustainability reports are written by companies themselves and are therefore considered a company-controlled source. Con… ▽ More

    Submitted 28 February, 2024; v1 submitted 13 December, 2022; originally announced December 2022.

  20. arXiv:2210.04537  [pdf, other

    cs.AI

    Towards an efficient and risk aware strategy for guiding farmers in identifying best crop management

    Authors: Romain Gautron, Dorian Baudry, Myriam Adam, Gatien N Falconnier, Marc Corbeels

    Abstract: Identification of best performing fertilizer practices among a set of contrasting practices with field trials is challenging as crop losses are costly for farmers. To identify best management practices, an ''intuitive strategy'' would be to set multi-year field trials with equal proportion of each practice to test. Our objective was to provide an identification strategy using a bandit algorithm th… ▽ More

    Submitted 10 October, 2022; originally announced October 2022.

  21. Bounding Box Disparity: 3D Metrics for Object Detection With Full Degree of Freedom

    Authors: Michael G. Adam, Martin Piccolrovazzi, Sebastian Eger, Eckehard Steinbach

    Abstract: The most popular evaluation metric for object detection in 2D images is Intersection over Union (IoU). Existing implementations of the IoU metric for 3D object detection usually neglect one or more degrees of freedom. In this paper, we first derive the analytic solution for three dimensional bounding boxes. As a second contribution, a closed-form solution of the volume-to-volume distance is derive… ▽ More

    Submitted 11 November, 2022; v1 submitted 8 July, 2022; originally announced July 2022.

    Comments: 4 pages+1 Page references, 4 Figures, Best Paper Award First Runner-Up @ ICIP2022

  22. arXiv:2206.07298  [pdf, other

    cs.CV cs.AI

    S$^2$-FPN: Scale-ware Strip Attention Guided Feature Pyramid Network for Real-time Semantic Segmentation

    Authors: Mohammed A. M. Elhassan, Chenhui Yang, Chenxi Huang, Tewodros Legesse Munea, Xin Hong, Abuzar B. M. Adam, Amina Benabid

    Abstract: Modern high-performance semantic segmentation methods employ a heavy backbone and dilated convolution to extract the relevant feature. Although extracting features with both contextual and semantic information is critical for the segmentation tasks, it brings a memory footprint and high computation cost for real-time applications. This paper presents a new model to achieve a trade-off between accu… ▽ More

    Submitted 18 May, 2024; v1 submitted 15 June, 2022; originally announced June 2022.

  23. arXiv:2206.02042  [pdf, other

    cs.LG cs.AI

    Developing hierarchical anticipations via neural network-based event segmentation

    Authors: Christian Gumbsch, Maurits Adam, Birgit Elsner, Georg Martius, Martin V. Butz

    Abstract: Humans can make predictions on various time scales and hierarchical levels. Thereby, the learning of event encodings seems to play a crucial role. In this work we model the development of hierarchical predictions via autonomously learned latent event codes. We present a hierarchical recurrent neural network architecture, whose inductive learning biases foster the development of sparsely changing l… ▽ More

    Submitted 28 August, 2022; v1 submitted 4 June, 2022; originally announced June 2022.

    Comments: accepted at ICDL 2022

  24. arXiv:2112.04889  [pdf

    cs.AI eess.SY

    Artificial Intelligence and Design of Experiments for Assessing Security of Electricity Supply: A Review and Strategic Outlook

    Authors: Jan Priesmann, Justin Münch, Elias Ridha, Thomas Spiegel, Marius Reich, Mario Adam, Lars Nolting, Aaron Praktiknjo

    Abstract: Assessing the effects of the energy transition and liberalization of energy markets on resource adequacy is an increasingly important and demanding task. The rising complexity in energy systems requires adequate methods for energy system modeling leading to increased computational requirements. Furthermore, with complexity, uncertainty increases likewise calling for probabilistic assessments and s… ▽ More

    Submitted 13 December, 2021; v1 submitted 7 December, 2021; originally announced December 2021.

  25. arXiv:2012.12578  [pdf

    cs.DC

    Soap serialization effect on communication nodes and protocols

    Authors: Ali Baba Dauda, Mohammed Sani Adam, Muhammad Ahmad Mustapha, Audu Musa Mabu, Suleiman Mustafa

    Abstract: Although serialization improves the transmission of data through utilization of bandwidth, but its impact at the communication systems is not fully accounted. This research used Simple Object Access Protocol (SOAP) Web services to exchange serialized and normal messages via Hypertext Transfer Protocol (HTTP) and Java Messaging System (JMS). We implemented two web services as server and client endp… ▽ More

    Submitted 23 December, 2020; originally announced December 2020.

    Comments: 13 pages

  26. arXiv:2008.02999  [pdf, other

    cs.CV cs.HC cs.LG

    Single-stage intake gesture detection using CTC loss and extended prefix beam search

    Authors: Philipp V. Rouast, Marc T. P. Adam

    Abstract: Accurate detection of individual intake gestures is a key step towards automatic dietary monitoring. Both inertial sensor data of wrist movements and video data depicting the upper body have been used for this purpose. The most advanced approaches to date use a two-stage approach, in which (i) frame-level intake probabilities are learned from the sensor data using a deep neural network, and then (… ▽ More

    Submitted 20 November, 2020; v1 submitted 7 August, 2020; originally announced August 2020.

  27. OREBA: A Dataset for Objectively Recognizing Eating Behaviour and Associated Intake

    Authors: Philipp V. Rouast, Hamid Heydarian, Marc T. P. Adam, Megan E. Rollo

    Abstract: Automatic detection of intake gestures is a key element of automatic dietary monitoring. Several types of sensors, including inertial measurement units (IMU) and video cameras, have been used for this purpose. The common machine learning approaches make use of the labeled sensor data to automatically learn how to make detections. One characteristic, especially for deep learning models, is the need… ▽ More

    Submitted 29 September, 2020; v1 submitted 30 July, 2020; originally announced July 2020.

    Comments: To be published in IEEE Access

  28. arXiv:1911.10406  [pdf, ps, other

    eess.SY cs.MA cs.SI

    Generativity and Interactional Effects: an Overview

    Authors: Elie M. Adam, Munther A. Dahleh

    Abstract: We propose a means to relate properties of an interconnected system to its separate component systems in the presence of cascade-like phenomena. Building on a theory of interconnection reminiscent of the behavioral approach to systems theory, we introduce the notion of generativity, and its byproduct, generative effects. Cascade effects, enclosing contagion phenomena and cascading failures, are se… ▽ More

    Submitted 23 November, 2019; originally announced November 2019.

    Comments: 31 pages

  29. arXiv:1911.10376  [pdf, ps, other

    cs.LO cs.GT cs.SI

    On the Mathematical Structure of Cascade Effects and Emergent Phenomena

    Authors: Elie M. Adam, Munther A. Dahleh

    Abstract: We argue that the mathematical structure, enabling certain cascading and emergent phenomena to intuitively emerge, coincides with Galois connections. We introduce the notion of generative effects to formally capture such phenomena. We establish that these effects arise, via a notion of a veil, from either concealing mechanisms in a system or forgetting characteristics from it. The goal of the work… ▽ More

    Submitted 23 November, 2019; originally announced November 2019.

    Comments: 37 pages

  30. arXiv:1909.10695  [pdf, other

    cs.CV cs.LG eess.IV

    Learning deep representations for video-based intake gesture detection

    Authors: Philipp V. Rouast, Marc T. P. Adam

    Abstract: Automatic detection of individual intake gestures during eating occasions has the potential to improve dietary monitoring and support dietary recommendations. Existing studies typically make use of on-body solutions such as inertial and audio sensors, while video is used as ground truth. Intake gesture detection directly based on video has rarely been attempted. In this study, we address this gap… ▽ More

    Submitted 23 September, 2019; originally announced September 2019.

    Comments: To be published in IEEE Journal of Biomedical and Health Informatics

  31. arXiv:1901.02884  [pdf, other

    cs.LG cs.AI cs.CV cs.HC stat.ML

    Deep Learning for Human Affect Recognition: Insights and New Developments

    Authors: Philipp V. Rouast, Marc T. P. Adam, Raymond Chiong

    Abstract: Automatic human affect recognition is a key step towards more natural human-computer interaction. Recent trends include recognition in the wild using a fusion of audiovisual and physiological sensors, a challenging setting for conventional machine learning algorithms. Since 2010, novel deep learning algorithms have been applied increasingly in this field. In this paper, we review the literature on… ▽ More

    Submitted 9 January, 2019; originally announced January 2019.

    Comments: To be published in IEEE Transactions on Affective Computing. 20 pages, 7 figures, 6 tables

  32. arXiv:1807.03694  [pdf

    cs.CV

    Sparse Representation and Non-Negative Matrix Factorization for image denoise

    Authors: R. M. Farouk, M. E. Abd El-aziz, A. M. Adam

    Abstract: Recently, the problem of blind image separation has been widely investigated, especially the medical image denoise which is the main step in medical diag-nosis. Removing the noise without affecting relevant features of the image is the main goal. Sparse decomposition over redundant dictionaries become of the most used approaches to solve this problem. NMF codes naturally favor sparse, parts-based… ▽ More

    Submitted 5 July, 2018; originally announced July 2018.

    Journal ref: Journal of computer science approaches; Vol.4, Issue 2 Pages 20-27;2017

  33. arXiv:1605.03624  [pdf

    cs.CV

    Modified Weibull distribution for Biomedical signals denoising

    Authors: A. M. Adam, R. M. Farouk, B. S . El-Desouky

    Abstract: A wide range of signs are acquired from the human body called Biomedical signs or biosignals, they can be at the cell level, organ level, or sub-atomic level. Electroencephalogramis the electrical activity from the cerebrum, the electrocardiogram is the electrical activity from the heart, electrical action from the muscle sound signals referred to as electromyogram, the electroretinogram from the… ▽ More

    Submitted 31 August, 2022; v1 submitted 11 May, 2016; originally announced May 2016.

    Comments: 7 pages, 7 figures, 4 tables. Neuroscience Informatics, Vol. 2, No. 1, December 2021

  34. arXiv:1506.06394  [pdf, ps, other

    cs.DM cs.LO cs.SI math.CO

    Towards an Algebra for Cascade Effects

    Authors: Elie M. Adam, Munther A. Dahleh, Asuman Ozdaglar

    Abstract: We introduce a new class of (dynamical) systems that inherently capture cascading effects (viewed as consequential effects) and are naturally amenable to combinations. We develop an axiomatic general theory around those systems, and guide the endeavor towards an understanding of cascading failure. The theory evolves as an interplay of lattices and fixed points, and its results may be instantiated… ▽ More

    Submitted 5 July, 2017; v1 submitted 21 June, 2015; originally announced June 2015.

    Comments: 31 pages

    Journal ref: Logical Methods in Computer Science, Volume 13, Issue 3 (July 6, 2017) lmcs:3770

  35. arXiv:1211.0654  [pdf, ps, other

    cs.DM cs.GT cs.SI

    On Threshold Models over Finite Networks

    Authors: Elie M. Adam, Munther A. Dahleh, Asuman Ozdaglar

    Abstract: We study a model for cascade effects over finite networks based on a deterministic binary linear threshold model. Our starting point is a networked coordination game where each agent's payoff is the sum of the payoffs coming from pairwise interactions with each of the neighbors. We first establish that the best response dynamics in this networked game is equivalent to the linear threshold dynamics… ▽ More

    Submitted 2 January, 2013; v1 submitted 3 November, 2012; originally announced November 2012.

    Comments: 49 pages, 2 figures