Skip to main content

Showing 1–27 of 27 results for author: Levi, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.17939  [pdf, ps, other

    cs.LG

    Directed Semi-Simplicial Learning with Applications to Brain Activity Decoding

    Authors: Manuel Lecha, Andrea Cavallo, Francesca Dominici, Ran Levi, Alessio Del Bue, Elvin Isufi, Pietro Morerio, Claudio Battiloro

    Abstract: Graph Neural Networks (GNNs) excel at learning from pairwise interactions but often overlook multi-way and hierarchical relationships. Topological Deep Learning (TDL) addresses this limitation by leveraging combinatorial topological spaces. However, existing TDL models are restricted to undirected settings and fail to capture the higher-order directed patterns prevalent in many complex systems, e.… ▽ More

    Submitted 27 May, 2025; v1 submitted 23 May, 2025; originally announced May 2025.

  2. arXiv:2503.09810  [pdf, other

    cs.DS

    Approximately Counting and Sampling Hamiltonian Motifs in Sublinear Time

    Authors: Talya Eden, Reut Levi, Dana Ron, Ronitt Rubinfeld

    Abstract: Counting small subgraphs, referred to as motifs, in large graphs is a fundamental task in graph analysis, extensively studied across various contexts and computational models. In the sublinear-time regime, the relaxed problem of approximate counting has been explored within two prominent query frameworks: the standard model, which permits degree, neighbor, and pair queries, and the strictly more p… ▽ More

    Submitted 12 March, 2025; originally announced March 2025.

  3. arXiv:2406.05633  [pdf, other

    stat.ML cs.LG econ.EM

    Heterogeneous Treatment Effects in Panel Data

    Authors: Retsef Levi, Elisabeth Paulson, Georgia Perakis, Emily Zhang

    Abstract: We address a core problem in causal inference: estimating heterogeneous treatment effects using panel data with general treatment patterns. Many existing methods either do not utilize the potential underlying structure in panel data or have limitations in the allowable treatment patterns. In this work, we propose and evaluate a new method that first partitions observations into disjoint clusters w… ▽ More

    Submitted 9 June, 2024; originally announced June 2024.

  4. arXiv:2404.18126  [pdf, other

    cs.DS

    Testing $C_k$-freeness in bounded-arboricity graphs

    Authors: Talya Eden, Reut Levi, Dana Ron

    Abstract: We study the problem of testing $C_k$-freeness ($k$-cycle-freeness) for fixed constant $k > 3$ in graphs with bounded arboricity (but unbounded degrees). In particular, we are interested in one-sided error algorithms, so that they must detect a copy of $C_k$ with high constant probability when the graph is $ε$-far from $C_k$-free. We next state our results for constant arboricity and constant $ε$… ▽ More

    Submitted 28 April, 2024; originally announced April 2024.

  5. arXiv:2302.00742  [pdf, other

    cs.DC

    Distributed CONGEST Algorithm for Finding Hamiltonian Paths in Dirac Graphs and Generalizations

    Authors: Noy Biton, Reut Levi, Moti Medina

    Abstract: We study the problem of finding a Hamiltonian cycle under the promise that the input graph has a minimum degree of at least $n/2$, where $n$ denotes the number of vertices in the graph. The classical theorem of Dirac states that such graphs (a.k.a. Dirac graphs) are Hamiltonian, i.e., contain a Hamiltonian cycle. Moreover, finding a Hamiltonian cycle in Dirac graphs can be done in polynomial time… ▽ More

    Submitted 20 July, 2023; v1 submitted 1 February, 2023; originally announced February 2023.

  6. arXiv:2210.15785  [pdf, other

    q-fin.RM cs.CR

    Supply Chain Characteristics as Predictors of Cyber Risk: A Machine-Learning Assessment

    Authors: Kevin Hu, Retsef Levi, Raphael Yahalom, El Ghali Zerhouni

    Abstract: This paper provides the first large-scale data-driven analysis to evaluate the predictive power of different attributes for assessing risk of cyberattack data breaches. Furthermore, motivated by rapid increase in third party enabled cyberattacks, the paper provides the first quantitative empirical evidence that digital supply-chain attributes are significant predictors of enterprise cyber risk. Th… ▽ More

    Submitted 13 November, 2023; v1 submitted 27 October, 2022; originally announced October 2022.

  7. arXiv:2105.04847  [pdf, ps, other

    cs.DS

    Improved Local Computation Algorithms for Constructing Spanners

    Authors: Rubi Arviv, Lily Chung, Reut Levi, Edward Pyne

    Abstract: A spanner of a graph is a subgraph that preserves lengths of shortest paths up to a multiplicative distortion. For every $k$, a spanner with size $O(n^{1+1/k})$ and stretch $(2k+1)$ can be constructed by a simple centralized greedy algorithm, and this is tight assuming Erdős girth conjecture. In this paper we study the problem of constructing spanners in a local manner, specifically in the Local… ▽ More

    Submitted 6 July, 2023; v1 submitted 11 May, 2021; originally announced May 2021.

    Comments: RANDOM 2023

  8. arXiv:2105.04809  [pdf, ps, other

    cs.DS

    Testing Triangle Freeness in the General Model in Graphs with Arboricity $O(\sqrt{n})$

    Authors: Reut Levi

    Abstract: We study the problem of testing triangle freeness in the general graph model. This problem was first studied in the general graph model by Alon et al. (SIAM J. Discret. Math. 2008) who provided both lower bounds and upper bounds that depend on the number of vertices and the average degree of the graph. Their bounds are tight only when $d_{\rm max} = O(d)$ and $\bar{d} \leq \sqrt{n}$ or when… ▽ More

    Submitted 11 May, 2021; originally announced May 2021.

  9. arXiv:2102.11728  [pdf, ps, other

    cs.DS

    Testing Hamiltonicity (and other problems) in Minor-Free Graphs

    Authors: Reut Levi, Nadav Shoshan

    Abstract: In this paper we provide sub-linear algorithms for several fundamental problems in the setting in which the input graph excludes a fixed minor, i.e., is a minor-free graph. In particular, we provide the following algorithms for minor-free unbounded degree graphs. (1) A tester for Hamiltonicity with two-sided error with $poly(1/ε)$-query complexity, where $ε$ is the proximity parameter. (2) A local… ▽ More

    Submitted 11 May, 2021; v1 submitted 23 February, 2021; originally announced February 2021.

  10. arXiv:2006.06373  [pdf, other

    stat.ME cs.LG

    The Limits to Learning a Diffusion Model

    Authors: Jackie Baek, Vivek F. Farias, Andreea Georgescu, Retsef Levi, Tianyi Peng, Deeksha Sinha, Joshua Wilde, Andrew Zheng

    Abstract: This paper provides the first sample complexity lower bounds for the estimation of simple diffusion models, including the Bass model (used in modeling consumer adoption) and the SIR model (used in modeling epidemics). We show that one cannot hope to learn such models until quite late in the diffusion. Specifically, we show that the time required to collect a number of observations that exceeds our… ▽ More

    Submitted 23 May, 2023; v1 submitted 11 June, 2020; originally announced June 2020.

  11. arXiv:2003.00468  [pdf, ps, other

    cs.DS cs.DC

    Distributed Testing of Graph Isomorphism in the CONGEST model

    Authors: Reut Levi, Moti Medina

    Abstract: In this paper we study the problem of testing graph isomorphism (GI) in the CONGEST distributed model. In this setting we test whether the distributive network, $G_U$, is isomorphic to $G_K$ which is given as an input to all the nodes in the network, or alternatively, only to a single node. We first consider the decision variant of the problem in which the algorithm distinguishes $G_U$ and… ▽ More

    Submitted 1 March, 2020; originally announced March 2020.

  12. arXiv:1805.10657  [pdf, ps, other

    cs.DC

    Property Testing of Planarity in the CONGEST model

    Authors: Reut Levi, Moti Medina, Dana Ron

    Abstract: We give a distributed algorithm in the {\sf CONGEST} model for property testing of planarity with one-sided error in general (unbounded-degree) graphs. Following Censor-Hillel et al. (DISC 2016), who recently initiated the study of property testing in the distributed setting, our algorithm gives the following guarantee: For a graph $G = (V,E)$ and a distance parameter $ε$, if $G$ is planar, then e… ▽ More

    Submitted 14 August, 2019; v1 submitted 27 May, 2018; originally announced May 2018.

  13. arXiv:1803.05001  [pdf, other

    cs.DS cs.SI

    Graph Ranking and the Cost of Sybil Defense

    Authors: Gwendolyn Farach-Colton, Martin Farach-Colton, Leslie Ann Goldberg, Hanna Komlos, John Lapinskas, Reut Levi, Moti Medina, Miguel A. Mosteiro

    Abstract: Ranking functions such as PageRank assign numeric values (ranks) to nodes of graphs, most notably the web graph. Node rankings are an integral part of Internet search algorithms, since they can be used to order the results of queries. However, these ranking functions are famously subject to attacks by spammers, who modify the web graph in order to give their own pages more rank. We characterize th… ▽ More

    Submitted 1 June, 2023; v1 submitted 13 March, 2018; originally announced March 2018.

    Comments: 39 pages

  14. A Sublinear Tester for Outerplanarity (and Other Forbidden Minors) With One-Sided Error

    Authors: Hendrik Fichtenberger, Reut Levi, Yadu Vasudev, Maximilian Wötzel

    Abstract: We consider one-sided error property testing of $\mathcal{F}$-minor freeness in bounded-degree graphs for any finite family of graphs $\mathcal{F}$ that contains a minor of $K_{2,k}$, the $k$-circus graph, or the $(k\times 2)$-grid for any $k\in\mathbb{N}$. This includes, for instance, testing whether a graph is outerplanar or a cactus graph. The query complexity of our algorithm in terms of the n… ▽ More

    Submitted 8 August, 2018; v1 submitted 19 July, 2017; originally announced July 2017.

    Comments: extended to testing outerplanarity, full version of ICALP paper

    Journal ref: 45th International Colloquium on Automata, Languages, and Programming (ICALP), pages 52:1-52:14, 2018

  15. arXiv:1707.04864  [pdf, ps, other

    cs.DS

    Testing bounded arboricity

    Authors: Talya Eden, Reut Levi, Dana Ron

    Abstract: In this paper we consider the problem of testing whether a graph has bounded arboricity. The family of graphs with bounded arboricity includes, among others, bounded-degree graphs, all minor-closed graph classes (e.g. planar graphs, graphs with bounded treewidth) and randomly generated preferential attachment graphs. Graphs with bounded arboricity have been studied extensively in the past, in part… ▽ More

    Submitted 27 April, 2021; v1 submitted 16 July, 2017; originally announced July 2017.

  16. arXiv:1705.04898  [pdf, ps, other

    cs.DC cs.DS

    Faster and Simpler Distributed Algorithms for Testing and Correcting Graph Properties in the CONGEST-Model

    Authors: Guy Even, Reut Levi, Moti Medina

    Abstract: In this paper we present distributed testing algorithms of graph properties in the CONGEST-model [Censor-Hillel et al. 2016]. We present one-sided error testing algorithms in the general graph model. We first describe a general procedure for converting $ε$-testers with a number of rounds $f(D)$, where $D$ denotes the diameter of the graph, to $O((\log n)/ε)+f((\log n)/ε)$ rounds, where $n$ is th… ▽ More

    Submitted 13 May, 2017; originally announced May 2017.

  17. arXiv:1703.05418  [pdf, other

    cs.DS

    A Local Algorithm for the Sparse Spanning Graph Problem

    Authors: Christoph Lenzen, Reut Levi

    Abstract: Constructing a sparse spanning subgraph is a fundamental primitive in graph theory. In this paper, we study this problem in the Centralized Local model, where the goal is to decide whether an edge is part of the spanning subgraph by examining only a small part of the input; yet, answers must be globally consistent and independent of prior queries. Unfortunately, maximally sparse spanning subgrap… ▽ More

    Submitted 18 July, 2017; v1 submitted 15 March, 2017; originally announced March 2017.

  18. arXiv:1604.07038  [pdf, ps, other

    cs.DS

    A Local Algorithm for Constructing Spanners in Minor-Free Graphs

    Authors: Reut Levi, Dana Ron, Ronitt Rubinfeld

    Abstract: Constructing a spanning tree of a graph is one of the most basic tasks in graph theory. We consider this problem in the setting of local algorithms: one wants to quickly determine whether a given edge $e$ is in a specific spanning tree, without computing the whole spanning tree, but rather by inspecting the local neighborhood of $e$. The challenge is to maintain consistency. That is, to answer que… ▽ More

    Submitted 24 April, 2016; originally announced April 2016.

    Comments: arXiv admin note: substantial text overlap with arXiv:1402.3609

  19. arXiv:1603.08432  [pdf, other

    q-bio.NC cs.DS math.AT

    Quantifying topological invariants of neuronal morphologies

    Authors: Lida Kanari, Paweł Dłotko, Martina Scolamiero, Ran Levi, Julian Shillcock, Kathryn Hess, Henry Markram

    Abstract: Nervous systems are characterized by neurons displaying a diversity of morphological shapes. Traditionally, different shapes have been qualitatively described based on visual inspection and quantitatively described based on morphometric parameters. Neither process provides a solid foundation for categorizing the various morphologies, a problem that is important in many fields. We propose a stable… ▽ More

    Submitted 28 March, 2016; originally announced March 2016.

    Comments: 10 pages, 5 figures, conference or other essential info

  20. arXiv:1602.06159  [pdf, ps, other

    cs.DS

    Sublinear Random Access Generators for Preferential Attachment Graphs

    Authors: Guy Even, Reut Levi, Moti Medina, Adi Rosen

    Abstract: We consider the problem of sampling from a distribution on graphs, specifically when the distribution is defined by an evolving graph model, and consider the time, space and randomness complexities of such samplers. In the standard approach, the whole graph is chosen randomly according to the randomized evolving process, stored in full, and then queries on the sampled graph are answered by simpl… ▽ More

    Submitted 19 May, 2017; v1 submitted 19 February, 2016; originally announced February 2016.

    Comments: ICALP 2017

  21. arXiv:1512.05411  [pdf, other

    cs.DS

    Non-Local Probes Do Not Help with Graph Problems

    Authors: Mika Göös, Juho Hirvonen, Reut Levi, Moti Medina, Jukka Suomela

    Abstract: This work bridges the gap between distributed and centralised models of computing in the context of sublinear-time graph algorithms. A priori, typical centralised models of computing (e.g., parallel decision trees or centralised local algorithms) seem to be much more powerful than distributed message-passing algorithms: centralised algorithms can directly probe any part of the input, while in dist… ▽ More

    Submitted 16 December, 2015; originally announced December 2015.

  22. arXiv:1505.03774  [pdf, ps, other

    math.PR cs.PF

    Dynamic Allocation Problems in Loss Network Systems with Advanced Reservation

    Authors: Retsef Levi, Cong Shi

    Abstract: We consider a class of well-known dynamic resource allocation models in loss network systems with advanced reservation. The most important performance measure in any loss network system is to compute its blocking probability, i.e., the probability of an arriving customer in equilibrium finds a fully utilized system (thereby getting rejected by the system). In this paper, we derive upper bounds on… ▽ More

    Submitted 14 May, 2015; originally announced May 2015.

  23. arXiv:1502.04022  [pdf, ps, other

    cs.DS

    Local Computation Algorithms for Graphs of Non-Constant Degrees

    Authors: Reut Levi, Ronitt Rubinfeld, Anak Yodpinyanee

    Abstract: In the model of \emph{local computation algorithms} (LCAs), we aim to compute the queried part of the output by examining only a small (sublinear) portion of the input. Many recently developed LCAs on graph problems achieve time and space complexities with very low dependence on $n$, the number of vertices. Nonetheless, these complexities are generally at least exponential in $d$, the upper bound… ▽ More

    Submitted 13 February, 2015; originally announced February 2015.

  24. arXiv:1502.00413  [pdf, ps, other

    math.CO cs.DS

    Constructing Near Spanning Trees with Few Local Inspections

    Authors: Reut Levi, Guy Moshkovitz, Dana Ron, Ronitt Rubinfeld, Asaf Shapira

    Abstract: Constructing a spanning tree of a graph is one of the most basic tasks in graph theory. Motivated by several recent studies of local graph algorithms, we consider the following variant of this problem. Let G be a connected bounded-degree graph. Given an edge $e$ in $G$ we would like to decide whether $e$ belongs to a connected subgraph $G'$ consisting of $(1+ε)n$ edges (for a prespecified constant… ▽ More

    Submitted 3 February, 2015; v1 submitted 2 February, 2015; originally announced February 2015.

    Comments: References fixed

  25. arXiv:1402.3609  [pdf, ps, other

    cs.DS

    Local Algorithms for Sparse Spanning Graphs

    Authors: Reut Levi, Dana Ron, Ronitt Rubinfeld

    Abstract: Constructing a spanning tree of a graph is one of the most basic tasks in graph theory. We consider a relaxed version of this problem in the setting of local algorithms. The relaxation is that the constructed subgraph is a sparse spanning subgraph containing at most $(1+ε)n$ edges (where $n$ is the number of vertices and $ε$ is a given approximation/sparsity parameter). In the local setting, the g… ▽ More

    Submitted 27 April, 2021; v1 submitted 14 February, 2014; originally announced February 2014.

    Comments: Upper bounds for expanding graphs and minor free graphs

  26. arXiv:1302.3417  [pdf, ps, other

    cs.DS

    A Quasi-Polynomial Time Partition Oracle for Graphs with an Excluded Minor

    Authors: Reut Levi, Dana Ron

    Abstract: Motivated by the problem of testing planarity and related properties, we study the problem of designing efficient {\em partition oracles}. A {\em partition oracle} is a procedure that, given access to the incidence lists representation of a bounded-degree graph $G= (V,E)$ and a parameter $\eps$, when queried on a vertex $v\in V$, returns the part (subset of vertices) which $v$ belongs to in a part… ▽ More

    Submitted 14 February, 2013; originally announced February 2013.

    Comments: 13 pages, 1 figure

  27. arXiv:1301.2495  [pdf, ps, other

    cs.DS

    A simple online competitive adaptation of Lempel-Ziv compression with efficient random access support

    Authors: Akashnil Dutta, Reut Levi, Dana Ron, Ronitt Rubinfeld

    Abstract: We present a simple adaptation of the Lempel Ziv 78' (LZ78) compression scheme ({\em IEEE Transactions on Information Theory, 1978}) that supports efficient random access to the input string. Namely, given query access to the compressed string, it is possible to efficiently recover any symbol of the input string. The compression algorithm is given as input a parameter $\eps >0$, and with very high… ▽ More

    Submitted 11 January, 2013; originally announced January 2013.