-
On the existence of $δ$-temporal cliques in random simple temporal graphs
Authors:
George B. Mertzios,
Sotiris Nikoletseas,
Christoforos Raptopoulos,
Paul G. Spirakis
Abstract:
We consider random simple temporal graphs in which every edge of the complete graph $K_n$ appears once within the time interval [0,1] independently and uniformly at random. Our main result is a sharp threshold on the size of any maximum $δ$-clique (namely a clique with edges appearing at most $δ$ apart within [0,1]) in random instances of this model, for any constant~$δ$. In particular, using the…
▽ More
We consider random simple temporal graphs in which every edge of the complete graph $K_n$ appears once within the time interval [0,1] independently and uniformly at random. Our main result is a sharp threshold on the size of any maximum $δ$-clique (namely a clique with edges appearing at most $δ$ apart within [0,1]) in random instances of this model, for any constant~$δ$. In particular, using the probabilistic method, we prove that the size of a maximum $δ$-clique is approximately $\frac{2\log{n}}{\log{\frac{1}δ}}$ with high probability (whp). What seems surprising is that, even though the random simple temporal graph contains $Θ(n^2)$ overlapping $δ$-windows, which (when viewed separately) correspond to different random instances of the Erdos-Renyi random graphs model, the size of the maximum $δ$-clique in the former model and the maximum clique size of the latter are approximately the same. Furthermore, we show that the minimum interval containing a $δ$-clique is $δ-o(δ)$ whp. We use this result to show that any polynomial time algorithm for $δ$-TEMPORAL CLIQUE is unlikely to have very large probability of success.
△ Less
Submitted 10 April, 2024;
originally announced April 2024.
-
A spectral algorithm for finding maximum cliques in dense random intersection graphs
Authors:
Filippos Christodoulou,
Sotiris Nikoletseas,
Christoforos Raptopoulos,
Paul Spirakis
Abstract:
In a random intersection graph $G_{n,m,p}$, each of $n$ vertices selects a random subset of a set of $m$ labels by including each label independently with probability $p$ and edges are drawn between vertices that have at least one label in common. Among other applications, such graphs have been used to model social networks, in which individuals correspond to vertices and various features (e.g. id…
▽ More
In a random intersection graph $G_{n,m,p}$, each of $n$ vertices selects a random subset of a set of $m$ labels by including each label independently with probability $p$ and edges are drawn between vertices that have at least one label in common. Among other applications, such graphs have been used to model social networks, in which individuals correspond to vertices and various features (e.g. ideas, interests) correspond to labels; individuals sharing at least one common feature are connected and this is abstracted by edges in random intersection graphs. In this paper, we consider the problem of finding maximum cliques when the input graph is $G_{n,m,p}$. Current algorithms for this problem are successful with high probability only for relatively sparse instances, leaving the dense case mostly unexplored. We present a spectral algorithm for finding large cliques that processes vertices according to respective values in the second largest eigenvector of the adjacency matrix of induced subgraphs of the input graph corresponding to common neighbors of small cliques. Leveraging on the Single Label Clique Theorem from [15], we were able to construct random instances, without the need to externally plant a large clique in the input graph. In particular, we used label choices to determine the maximum clique and then concealed label information by just giving the adjacency matrix of $G_{n, m, p}$ as input to the algorithm. Our experimental evaluation showed that our spectral algorithm clearly outperforms existing polynomial time algorithms, both with respect to the failure probability and the approximation guarantee metrics, especially in the dense regime, thus suggesting that spectral properties of random intersection graphs may be also used to construct efficient algorithms for other NP-hard graph theoretical problems as well.
△ Less
Submitted 5 October, 2022;
originally announced October 2022.
-
An algorithmic study in the vector model for Wireless Power Transfer maximization
Authors:
Ioannis Katsidimas,
Sotiris Nikoletseas,
Theofanis P. Raptis,
Christoforos Raptopoulos
Abstract:
Rapid technological advances in the domain of Wireless Power Transfer (WPT) pave the way for novel methods for power management in systems of wireless devices and recent research works have already started considering algorithmic solutions for tackling emerging problems. However, many of those works are limited by the system modelling, and more specifically the one-dimensional abstraction suggeste…
▽ More
Rapid technological advances in the domain of Wireless Power Transfer (WPT) pave the way for novel methods for power management in systems of wireless devices and recent research works have already started considering algorithmic solutions for tackling emerging problems. However, many of those works are limited by the system modelling, and more specifically the one-dimensional abstraction suggested by Friis formula for the power received by one antenna under idealized conditions given another antenna some distance away. Different to those works, we use a model which arises naturally from fundamental properties of the superposition of energy fields. This model has been shown to be more realistic than other one-dimensional models that have been used in the past and can capture superadditive and cancellation effects. Under this model, we define two new interesting problems for configuring the wireless power transmitters so as to maximize the total power in the system and we prove that the first problem can be solved in polynomial time. We present a distributed solution that runs in pseudo-polynomial time and uses various knowledge levels and we provide theoretical performance guarantees. Finally, we design three heuristics for the second problem and evaluate them via simulations.
△ Less
Submitted 24 September, 2021;
originally announced September 2021.
-
Wireless charging for weighted energy balance in populations of mobile peers
Authors:
Sotiris Nikoletseas,
Theofanis P. Raptis,
Christoforos Raptopoulos
Abstract:
Wireless energy transfer is an emerging technology that is used in networks of battery-powered devices in order to deliver energy and keep the network functional. Existing state-of-the-art studies have mainly focused on applying this technology on networks of relatively strong computational and communicational capabilities (wireless sensor networks, ad-hoc networks); also they assume energy transf…
▽ More
Wireless energy transfer is an emerging technology that is used in networks of battery-powered devices in order to deliver energy and keep the network functional. Existing state-of-the-art studies have mainly focused on applying this technology on networks of relatively strong computational and communicational capabilities (wireless sensor networks, ad-hoc networks); also they assume energy transfer from special chargers to regular network nodes. Different from these works, we study how to efficiently transfer energy wirelessly in populations of battery-limited devices, towards prolonging their lifetime. In contrast to the state-of-the-art, we assume a much weaker population of distributed devices which are exchanging energy in a "peer to peer" manner with each other, without any special charger nodes. We address a quite general case of diverse energy levels and priorities in the network and study the problem of how the system can efficiently reach a weighted energy balance state distributively, under both loss-less and lossy power transfer assumptions. Three protocols are designed, analyzed and evaluated, achieving different performance trade-offs between energy balance quality, convergence time and energy efficiency.
△ Less
Submitted 24 September, 2021;
originally announced September 2021.
-
Radiation-constrained algorithms for Wireless Energy Transfer in Ad hoc Networks
Authors:
Sotiris Nikoletseas,
Theofanis P. Raptis,
Christoforos Raptopoulos
Abstract:
We study the problem of efficiently charging a set of rechargeable nodes using a set of wireless chargers, under safety constraints on the electromagnetic radiation incurred. In particular, we define a new charging model that greatly differs from existing models in that it takes into account real technology restrictions of the chargers and nodes of the network, mainly regarding energy limitations.…
▽ More
We study the problem of efficiently charging a set of rechargeable nodes using a set of wireless chargers, under safety constraints on the electromagnetic radiation incurred. In particular, we define a new charging model that greatly differs from existing models in that it takes into account real technology restrictions of the chargers and nodes of the network, mainly regarding energy limitations. Our model also introduces non-linear constraints (in the time domain), that radically change the nature of the computational problems we consider. In this charging model, we present and study the Low Radiation Efficient Charging Problem (LREC), in which we wish to optimize the amount of "useful" energy transferred from chargers to nodes (under constraints on the maximum level of imposed radiation). We present several fundamental properties of this problem and provide indications of its hardness. Finally, we propose an iterative local improvement heuristic for LREC, which runs in polynomial time and we evaluate its performance via simulation. Our algorithm decouples the computation of the objective function from the computation of the maximum radiation and also does not depend on the exact formula used for the computation of the electromagnetic radiation in each point of the network, achieving good trade-offs between charging efficiency and radiation control; it also exhibits good energy balance properties. We provide extensive simulation results supporting our claims and theoretical results.
△ Less
Submitted 24 September, 2021;
originally announced September 2021.
-
MAX CUT in Weighted Random Intersection Graphs and Discrepancy of Sparse Random Set Systems
Authors:
Sotiris Nikoletseas,
Christoforos Raptopoulos,
Paul Spirakis
Abstract:
Let $V$ be a set of $n$ vertices, ${\cal M}$ a set of $m$ labels, and let $\mathbf{R}$ be an $m \times n$ matrix of independent Bernoulli random variables with success probability $p$. A random instance $G(V,E,\mathbf{R}^T\mathbf{R})$ of the weighted random intersection graph model is constructed by drawing an edge with weight $[\mathbf{R}^T\mathbf{R}]_{v,u}$ between any two vertices $u,v$ for whi…
▽ More
Let $V$ be a set of $n$ vertices, ${\cal M}$ a set of $m$ labels, and let $\mathbf{R}$ be an $m \times n$ matrix of independent Bernoulli random variables with success probability $p$. A random instance $G(V,E,\mathbf{R}^T\mathbf{R})$ of the weighted random intersection graph model is constructed by drawing an edge with weight $[\mathbf{R}^T\mathbf{R}]_{v,u}$ between any two vertices $u,v$ for which this weight is larger than 0. In this paper we study the average case analysis of Weighted Max Cut, assuming the input is a weighted random intersection graph, i.e. given $G(V,E,\mathbf{R}^T\mathbf{R})$ we wish to find a partition of $V$ into two sets so that the total weight of the edges having one endpoint in each set is maximized. We initially prove concentration of the weight of a maximum cut of $G(V,E,\mathbf{R}^T\mathbf{R})$ around its expected value, and then show that, when the number of labels is much smaller than the number of vertices, a random partition of the vertices achieves asymptotically optimal cut weight with high probability (whp). Furthermore, in the case $n=m$ and constant average degree, we show that whp, a majority type algorithm outputs a cut with weight that is larger than the weight of a random cut by a multiplicative constant strictly larger than 1. Then, we highlight a connection between the computational problem of finding a weighted maximum cut in $G(V,E,\mathbf{R}^T\mathbf{R})$ and the problem of finding a 2-coloring with minimum discrepancy for a set system $Σ$ with incidence matrix $\mathbf{R}$. We exploit this connection by proposing a (weak) bipartization algorithm for the case $m=n, p=\frac{Θ(1)}{n}$ that, when it terminates, its output can be used to find a 2-coloring with minimum discrepancy in $Σ$. Finally, we prove that, whp this 2-coloring corresponds to a bipartition with maximum cut-weight in $G(V,E,\mathbf{R}^T\mathbf{R})$.
△ Less
Submitted 14 September, 2021; v1 submitted 3 September, 2020;
originally announced September 2020.
-
How fast can we reach a target vertex in stochastic temporal graphs?
Authors:
Eleni C. Akrida,
George B. Mertzios,
Sotiris Nikoletseas,
Christoforos Raptopoulos,
Paul G. Spirakis,
Viktor Zamaraev
Abstract:
Temporal graphs are used to abstractly model real-life networks that are inherently dynamic in nature. Given a static underlying graph $G=(V,E)$, a temporal graph on $G$ is a sequence of snapshots $G_t$, one for each time step $t\geq 1$. In this paper we study stochastic temporal graphs, i.e. stochastic processes $\mathcal{G}$ whose random variables are the snapshots of a temporal graph on $G$. A…
▽ More
Temporal graphs are used to abstractly model real-life networks that are inherently dynamic in nature. Given a static underlying graph $G=(V,E)$, a temporal graph on $G$ is a sequence of snapshots $G_t$, one for each time step $t\geq 1$. In this paper we study stochastic temporal graphs, i.e. stochastic processes $\mathcal{G}$ whose random variables are the snapshots of a temporal graph on $G$. A natural feature observed in various real-life scenarios is a memory effect in the appearance probabilities of particular edges; i.e. the probability an edge $e\in E$ appears at time step $t$ depends on its appearance (or absence) at the previous $k$ steps. In this paper we study the hierarchy of models memory-$k$, addressing this memory effect in an edge-centric network evolution: every edge of $G$ has its own independent probability distribution for its appearance over time. Clearly, for every $k\geq 1$, memory-$(k-1)$ is a special case of memory-$k$. We make a clear distinction between the values $k=0$ ("no memory") and $k\geq 1$ ("some memory"), as in some cases these models exhibit a fundamentally different computational behavior, as our results indicate. For every $k\geq 0$ we investigate the complexity of two naturally related, but fundamentally different, temporal path (journey) problems: MINIMUM ARRIVAL and BEST POLICY. In the first problem we are looking for the expected arrival time of a foremost journey between two designated vertices $s,y$. In the second one we are looking for the arrival time of the best policy for actually choosing a particular $s$-$y$ journey. We present a detailed investigation of the computational landscape of both problems for the different values of memory $k$. Among other results we prove that, surprisingly, MINIMUM ARRIVAL is strictly harder than BEST POLICY; in fact, for $k=0$, MINIMUM ARRIVAL is #P-hard while BEST POLICY is solvable in $O(n^2)$ time.
△ Less
Submitted 8 March, 2019;
originally announced March 2019.
-
An extension of the Moran process using type-specific connection graphs
Authors:
Themistoklis Melissourgos,
Sotiris Nikoletseas,
Christoforos Raptopoulos,
Paul Spirakis
Abstract:
The Moran process, as studied by [Lieberman, E., Hauert, C. and Nowak, M. Evolutionary dynamics on graphs. Nature 433, pp. 312-316 (2005)], is a stochastic process modeling the spread of genetic mutations in populations. In this process, agents of a two-type population (i.e. mutants and residents) are associated with the vertices of a graph. Initially, only one vertex chosen uniformly at random is…
▽ More
The Moran process, as studied by [Lieberman, E., Hauert, C. and Nowak, M. Evolutionary dynamics on graphs. Nature 433, pp. 312-316 (2005)], is a stochastic process modeling the spread of genetic mutations in populations. In this process, agents of a two-type population (i.e. mutants and residents) are associated with the vertices of a graph. Initially, only one vertex chosen uniformly at random is a mutant, with fitness $r > 0$, while all other individuals are residents, with fitness $1$. In every step, an individual is chosen with probability proportional to its fitness, and its state (mutant or resident) is passed on to a neighbor which is chosen uniformly at random. In this paper, we introduce and study a generalization of the model of Lieberman et al. by assuming that different types of individuals perceive the population through different graphs, namely $G_R(V,E_R)$ for residents and $G_M(V,E_M)$ for mutants. In this model, we study the fixation probability, i.e. the probability that eventually only mutants remain in the population, for various pairs of graphs. First, we transfer known results from the original single-graph model of Lieberman et al. to our 2-graph model. Among them, we provide a generalization of the Isothermal Theorem of Lieberman et al., that gives sufficient conditions for a pair of graphs to have the same fixation probability as a pair of cliques. Next, we give a 2-player strategic game view of the process where player payoffs correspond to fixation and/or extinction probabilities. In this setting, we attempt to identify best responses for each player and give evidence that the clique is the most beneficial graph for both players. Finally, we examine the possibility of efficient approximation of the fixation probability and provide a FPRAS for the special case where the mutant graph is complete.
△ Less
Submitted 26 July, 2021; v1 submitted 19 October, 2017;
originally announced October 2017.
-
A 3-player protocol preventing persistence in strategic contention with limited feedback
Authors:
George Christodoulou,
Martin Gairing,
Sotiris Nikoletseas,
Christoforos Raptopoulos,
Paul Spirakis
Abstract:
In this paper, we study contention resolution protocols from a game-theoretic perspective. In a recent work, we considered acknowledgment-based protocols, where a user gets feedback from the channel only when she attempts transmission. In this case she will learn whether her transmission was successful or not. One of the main results of ESA2016 was that no acknowledgment-based protocol can be in e…
▽ More
In this paper, we study contention resolution protocols from a game-theoretic perspective. In a recent work, we considered acknowledgment-based protocols, where a user gets feedback from the channel only when she attempts transmission. In this case she will learn whether her transmission was successful or not. One of the main results of ESA2016 was that no acknowledgment-based protocol can be in equilibrium. In fact, it seems that many natural acknowledgment-based protocols fail to prevent users from unilaterally switching to persistent protocols that always transmit with probability 1. It is therefore natural to ask how powerful a protocol must be so that it can beat persistent deviators.
In this paper we consider age-based protocols, which can be described by a sequence of probabilities of transmitting in each time step. Those probabilities are given beforehand and do not change based on the transmission history. We present a 3-player age-based protocol that can prevent users from unilaterally deviating to a persistent protocol in order to decrease their expected transmission time. It is worth noting that the answer to this question does not follow from the results and proof ideas of ESA2016. Our protocol is non-trivial, in the sense that, when all players use it, finite expected transmission time is guaranteed. In fact, we show that this protocol is preferable to any deadline protocol in which, after some fixed time, attempt transmission with probability 1 in every subsequent step. An advantage of our protocol is that it is very simple to describe, and users only need a counter to keep track of time. Whether there exist $n$-player age-based protocols that do not use counters and can prevent persistence is left as an open problem for future research.
△ Less
Submitted 4 July, 2017;
originally announced July 2017.
-
Strategic Contention Resolution with Limited Feedback
Authors:
George Christodoulou,
Martin Gairing,
Sotiris Nikoletseas,
Christoforos Raptopoulos,
Paul Spirakis
Abstract:
In this paper, we study contention resolution protocols from a game-theoretic perspective. We focus on \emph{acknowledgment-based} protocols, where a user gets feedback from the channel only when she attempts transmission. In this case she will learn whether her transmission was successful or not. Users that do not transmit will not receive any feedback. We are interested in equilibrium protocols,…
▽ More
In this paper, we study contention resolution protocols from a game-theoretic perspective. We focus on \emph{acknowledgment-based} protocols, where a user gets feedback from the channel only when she attempts transmission. In this case she will learn whether her transmission was successful or not. Users that do not transmit will not receive any feedback. We are interested in equilibrium protocols, where no player has an incentive to deviate.
The limited feedback makes the design of equilibrium protocols a hard task as best response policies usually have to be modeled as Partially Observable Markov Decision Processes, which are hard to analyze. Nevertheless, we show how to circumvent this for the case of two players and present an equilibrium protocol. For many players, we give impossibility results for a large class of acknowledgment-based protocols, namely \emph{age-based} and \emph{backoff} protocols with finite expected finishing time. Finally, we provide an age-based equilibrium protocol, which has infinite expected finishing time, but every player finishes in linear time with high probability.
△ Less
Submitted 21 June, 2016;
originally announced June 2016.
-
Determining Majority in Networks with Local Interactions and very Small Local Memory
Authors:
George B. Mertzios,
Sotiris E. Nikoletseas,
Christoforos L. Raptopoulos,
Paul G. Spirakis
Abstract:
We study here the problem of determining the majority type in an arbitrary connected network, each vertex of which has initially two possible types. The vertices may have a few additional possible states and can interact in pairs only if they share an edge. Any (population) protocol is required to stabilize in the initial majority. We first present and analyze a protocol with 4 states per vertex t…
▽ More
We study here the problem of determining the majority type in an arbitrary connected network, each vertex of which has initially two possible types. The vertices may have a few additional possible states and can interact in pairs only if they share an edge. Any (population) protocol is required to stabilize in the initial majority. We first present and analyze a protocol with 4 states per vertex that always computes the initial majority value, under any fair scheduler. As we prove, this protocol is optimal, in the sense that there is no population protocol that always computes majority with fewer than 4 states per vertex. However this does not rule out the existence of a protocol with 3 states per vertex that is correct with high probability. To this end, we examine a very natural majority protocol with 3 states per vertex, introduced in [Angluin et al. 2008] where its performance has been analyzed for the clique graph. We study the performance of this protocol in arbitrary networks. We prove that, when the two initial states are put uniformly at random on the vertices, this protocol converges to the initial majority with probability higher than the probability of converging to the initial minority. In contrast, we present an infinite family of graphs, on which the protocol can fail whp, even when the difference between the initial majority and the initial minority is $n - Θ(\ln{n})$. We also present another infinite family of graphs in which the protocol of Angluin et al. takes an expected exponential time to converge. These two negative results build upon a very positive result concerning the robustness of the protocol on the clique. Surprisingly, the resistance of the clique to failure causes the failure in general graphs. Our techniques use new domination and coupling arguments for suitably defined processes whose dynamics capture the antagonism between the states involved.
△ Less
Submitted 30 April, 2014;
originally announced April 2014.
-
On the Structure of Equilibria in Basic Network Formation
Authors:
S. Nikoletseas,
P. Panagopoulou,
C. Raptopoulos,
P. G. Spirakis
Abstract:
We study network connection games where the nodes of a network perform edge swaps in order to improve their communication costs. For the model proposed by Alon et al. (2010), in which the selfish cost of a node is the sum of all shortest path distances to the other nodes, we use the probabilistic method to provide a new, structural characterization of equilibrium graphs. We show how to use this ch…
▽ More
We study network connection games where the nodes of a network perform edge swaps in order to improve their communication costs. For the model proposed by Alon et al. (2010), in which the selfish cost of a node is the sum of all shortest path distances to the other nodes, we use the probabilistic method to provide a new, structural characterization of equilibrium graphs. We show how to use this characterization in order to prove upper bounds on the diameter of equilibrium graphs in terms of the size of the largest $k$-vicinity (defined as the the set of vertices within distance $k$ from a vertex), for any $k \geq 1$ and in terms of the number of edges, thus settling positively a conjecture of Alon et al. in the cases of graphs of large $k$-vicinity size (including graphs of large maximum degree) and of graphs which are dense enough.
Next, we present a new swap-based network creation game, in which selfish costs depend on the immediate neighborhood of each node; in particular, the profit of a node is defined as the sum of the degrees of its neighbors. We prove that, in contrast to the previous model, this network creation game admits an exact potential, and also that any equilibrium graph contains an induced star. The existence of the potential function is exploited in order to show that an equilibrium can be reached in expected polynomial time even in the case where nodes can only acquire limited knowledge concerning non-neighboring nodes.
△ Less
Submitted 7 June, 2013;
originally announced June 2013.
-
Maximum Cliques in Graphs with Small Intersection Number and Random Intersection Graphs
Authors:
S. Nikoletseas,
C. Raptopoulos,
P. G. Spirakis
Abstract:
In this paper, we relate the problem of finding a maximum clique to the intersection number of the input graph (i.e. the minimum number of cliques needed to edge cover the graph). In particular, we consider the maximum clique problem for graphs with small intersection number and random intersection graphs (a model in which each one of $m$ labels is chosen independently with probability $p$ by each…
▽ More
In this paper, we relate the problem of finding a maximum clique to the intersection number of the input graph (i.e. the minimum number of cliques needed to edge cover the graph). In particular, we consider the maximum clique problem for graphs with small intersection number and random intersection graphs (a model in which each one of $m$ labels is chosen independently with probability $p$ by each one of $n$ vertices, and there are edges between any vertices with overlaps in the labels chosen).
We first present a simple algorithm which, on input $G$ finds a maximum clique in $O(2^{2^m + O(m)} + n^2 \min\{2^m, n\})$ time steps, where $m$ is an upper bound on the intersection number and $n$ is the number of vertices. Consequently, when $m \leq \ln{\ln{n}}$ the running time of this algorithm is polynomial.
We then consider random instances of the random intersection graphs model as input graphs. As our main contribution, we prove that, when the number of labels is not too large ($m=n^α, 0< α<1$), we can use the label choices of the vertices to find a maximum clique in polynomial time whp. The proof of correctness for this algorithm relies on our Single Label Clique Theorem, which roughly states that whp a "large enough" clique cannot be formed by more than one label. This theorem generalizes and strengthens other related results in the state of the art, but also broadens the range of values considered.
As an important consequence of our Single Label Clique Theorem, we prove that the problem of inferring the complete information of label choices for each vertex from the resulting random intersection graph (i.e. the \emph{label representation of the graph}) is \emph{solvable} whp. Finding efficient algorithms for constructing such a label representation is left as an interesting open problem for future research.
△ Less
Submitted 18 April, 2012;
originally announced April 2012.
-
Natural Models for Evolution on Networks
Authors:
George B. Mertzios,
Sotiris Nikoletseas,
Christoforos Raptopoulos,
Paul G. Spirakis
Abstract:
Evolutionary dynamics have been traditionally studied in the context of homogeneous populations, mainly described my the Moran process. Recently, this approach has been generalized in \cite{LHN} by arranging individuals on the nodes of a network. Undirected networks seem to have a smoother behavior than directed ones, and thus it is more challenging to find suppressors/amplifiers of selection. In…
▽ More
Evolutionary dynamics have been traditionally studied in the context of homogeneous populations, mainly described my the Moran process. Recently, this approach has been generalized in \cite{LHN} by arranging individuals on the nodes of a network. Undirected networks seem to have a smoother behavior than directed ones, and thus it is more challenging to find suppressors/amplifiers of selection. In this paper we present the first class of undirected graphs which act as suppressors of selection, by achieving a fixation probability that is at most one half of that of the complete graph, as the number of vertices increases. Moreover, we provide some generic upper and lower bounds for the fixation probability of general undirected graphs. As our main contribution, we introduce the natural alternative of the model proposed in \cite{LHN}, where all individuals interact simultaneously and the result is a compromise between aggressive and non-aggressive individuals. That is, the behavior of the individuals in our new model and in the model of \cite{LHN} can be interpreted as an "aggregation" vs. an "all-or-nothing" strategy, respectively. We prove that our new model of mutual influences admits a \emph{potential function}, which guarantees the convergence of the system for any graph topology and any initial fitness vector of the individuals. Furthermore, we prove fast convergence to the stable state for the case of the complete graph, as well as we provide almost tight bounds on the limit fitness of the individuals. Apart from being important on its own, this new evolutionary model appears to be useful also in the abstract modeling of control mechanisms over invading populations in networks. We demonstrate this by introducing and analyzing two alternative control approaches, for which we bound the time needed to stabilize to the "healthy" state of the system.
△ Less
Submitted 21 June, 2012; v1 submitted 16 February, 2011;
originally announced February 2011.