-
Queue or lounge: strategic design for strategic customer
Authors:
Riya Sultana,
Khushboo Agarwal,
Veeraruna Kavitha
Abstract:
Considering an M/M/1 queue with an additional lounge facility (LF), the quest of this paper is to understand the instances when LF is an attractive option, from customer perspective as well as from system perspective: will the customers choose to join the queue or prefer to detour briefly to lounge? In reality, customers do not perform complex computations for such tasks, but instead choose based…
▽ More
Considering an M/M/1 queue with an additional lounge facility (LF), the quest of this paper is to understand the instances when LF is an attractive option, from customer perspective as well as from system perspective: will the customers choose to join the queue or prefer to detour briefly to lounge? In reality, customers do not perform complex computations for such tasks, but instead choose based on some heuristics. We further assume that the customers pessimistically anticipate the future congestion while making the choice. Our analysis reveals that the customers use the LF only when the queue is too crowded, and the lounge is relatively empty; however, strikingly, the customer choice is more inclined towards rejection for the LF in systems with higher traffic (load).
We also explore an optimization problem where the system determines whether to implement an LF and what capacity it should have, while accounting for customers' behavioral responses. Under low load conditions, the system benefits from designing a high-capacity lounge, and the customers also prefer to use the LF actively. Surprisingly, neither the system prefers big LF, nor the customers prefer to use the LF profusely at high load conditions; optimal for either is to use the LF sparingly. Thus, importantly, the strategic system and the bounded-rational customers are not in a tug-of-war situation.
△ Less
Submitted 28 April, 2025;
originally announced April 2025.
-
Limiting behaviour of Branching Processes and Online Social Networks
Authors:
Khushboo Agarwal
Abstract:
The literature considers multi-type Markov branching processes (BPs), where the offspring distribution depends only on the living (current) population. We analyse the total-current population-dependent BPs where the offspring distribution can also depend on the total (dead and living) population. Such a generalization is inspired by the need to accurately model content propagation over online soci…
▽ More
The literature considers multi-type Markov branching processes (BPs), where the offspring distribution depends only on the living (current) population. We analyse the total-current population-dependent BPs where the offspring distribution can also depend on the total (dead and living) population. Such a generalization is inspired by the need to accurately model content propagation over online social networks (OSNs). The key question investigated is the time-asymptotic proportion of the populations, which translates to the proportional visibility of the posts on the OSN. We provide the answer using a stochastic approximation (SA) technique, which has not been used in the existing BP literature. The analysis is derived using a non-trivial autonomous measurable ODE. Interestingly, we prove the possibility of a new limiting behaviour for the stochastic trajectory, named as hovering around. Such a result is not just new to the theory of BPs but also to the SA based literature.
Later, we explore three new variants of BPs: (i) any living individual of a population can attack and acquire the living individuals of the other population, in addition to producing its offspring; (ii) the individuals can die due to abnormal circumstances, and not just at the completion of their lifetimes; (iii) the expected number of offspring decreases as the total-population increases, leading to the saturation of the total-population.
Such variants aid in analysing unexplored aspects of content propagation over OSNs: (i) competition in advertisement posts for similar products; (ii) controlling fake-post propagation, while not affecting the sharing of real-post; (iii) impact of re-forwarding the posts. We also designed and analysed a participation (mean-field) game where the OSN lures the users with a reward-based scheme to provide their opinion about the actuality of the post (fake or real).
△ Less
Submitted 12 June, 2024;
originally announced June 2024.
-
Robust fake-post detection against real-coloring adversaries
Authors:
Khushboo Agarwal,
Veeraruna Kavitha
Abstract:
The viral propagation of fake posts on online social networks (OSNs) has become an alarming concern. The paper aims to design control mechanisms for fake post detection while negligibly affecting the propagation of real posts. Towards this, a warning mechanism based on crowd-signals was recently proposed, where all users actively declare the post as real or fake. In this paper, we consider a more…
▽ More
The viral propagation of fake posts on online social networks (OSNs) has become an alarming concern. The paper aims to design control mechanisms for fake post detection while negligibly affecting the propagation of real posts. Towards this, a warning mechanism based on crowd-signals was recently proposed, where all users actively declare the post as real or fake. In this paper, we consider a more realistic framework where users exhibit different adversarial or non-cooperative behaviour: (i) they can independently decide whether to provide their response, (ii) they can choose not to consider the warning signal while providing the response, and (iii) they can be real-coloring adversaries who deliberately declare any post as real. To analyze the post-propagation process in this complex system, we propose and study a new branching process, namely total-current population-dependent branching process with multiple death types. At first, we compare and show that the existing warning mechanism significantly under-performs in the presence of adversaries. Then, we design new mechanisms which remarkably perform better than the existing mechanism by cleverly eliminating the influence of the responses of the adversaries. Finally, we propose another enhanced mechanism which assumes minimal knowledge about the user-specific parameters. The theoretical results are validated using Monte-Carlo simulations.
△ Less
Submitted 20 September, 2023;
originally announced September 2023.
-
Single-out fake posts: participation game and its design
Authors:
Khushboo Agarwal,
Veeraruna Kavitha
Abstract:
Crowd-sourcing models, which leverage the collective opinions/signals of users on online social networks (OSNs), are well-accepted for fake post detection; however, motivating the users to provide the crowd signals is challenging, even more so in the presence of adversarial users.
We design a participation (mean-field) game where users of the OSN are lured by a reward-based scheme to provide the…
▽ More
Crowd-sourcing models, which leverage the collective opinions/signals of users on online social networks (OSNs), are well-accepted for fake post detection; however, motivating the users to provide the crowd signals is challenging, even more so in the presence of adversarial users.
We design a participation (mean-field) game where users of the OSN are lured by a reward-based scheme to provide the binary (real/fake) signals such that the OSN achieves $(θ, δ)$-level of actuality identification (AI) - not more than $δ$ fraction of non-adversarial users incorrectly judge the real post, and at least $θ$ fraction of non-adversarial users identify the fake post as fake. An appropriate warning mechanism is proposed to influence the decision-making of the users such that the resultant game has at least one Nash Equilibrium (NE) achieving AI. We also identify the conditions under which all NEs achieve AI. Further, we numerically illustrate that one can always design an AI game if the normalized difference in the innate identification capacities of the users is at least $1\%$, when desired $θ= 75\%$.
△ Less
Submitted 15 March, 2023;
originally announced March 2023.
-
Saturated total-population dependent branching process and viral markets
Authors:
Khushboo Agarwal,
Veeraruna Kavitha
Abstract:
Interesting posts are continually forwarded by the users of the online social network (OSN). Such propagation leads to re-forwarding of the post to some of the previous recipients, which increases as the post reaches a large number of users. Consequently, the effective forwards (after deleting the re-forwards) reduce, eventually leading to the saturation of the total number of copies. We model thi…
▽ More
Interesting posts are continually forwarded by the users of the online social network (OSN). Such propagation leads to re-forwarding of the post to some of the previous recipients, which increases as the post reaches a large number of users. Consequently, the effective forwards (after deleting the re-forwards) reduce, eventually leading to the saturation of the total number of copies. We model this process as a new variant of the branching process, the `saturated total-population-dependent branching process', and analyse it using the stochastic approximation technique. Notably, we obtain deterministic trajectories which approximate the total and unread copies of the post `asymptotically and almost surely' over any finite time window; this trajectory depends only on four parameters related to the network characteristics. Further, we provide expressions for the peak unread copies, maximum outreach and the life span of the post. We observe known exponential growth but with time-varying rates. We also validate our theory through detailed simulations on the SNAP Twitter dataset.
△ Less
Submitted 13 September, 2022; v1 submitted 30 March, 2022;
originally announced March 2022.
-
Graph Neural Network and Koopman Models for Learning Networked Dynamics: A Comparative Study on Power Grid Transients Prediction
Authors:
Sai Pushpak Nandanoori,
Sheng Guan,
Soumya Kundu,
Seemita Pal,
Khushbu Agarwal,
Yinghui Wu,
Sutanay Choudhury
Abstract:
Continuous monitoring of the spatio-temporal dynamic behavior of critical infrastructure networks, such as the power systems, is a challenging but important task. In particular, accurate and timely prediction of the (electro-mechanical) transient dynamic trajectories of the power grid is necessary for early detection of any instability and prevention of catastrophic failures. Existing approaches f…
▽ More
Continuous monitoring of the spatio-temporal dynamic behavior of critical infrastructure networks, such as the power systems, is a challenging but important task. In particular, accurate and timely prediction of the (electro-mechanical) transient dynamic trajectories of the power grid is necessary for early detection of any instability and prevention of catastrophic failures. Existing approaches for the prediction of dynamic trajectories either rely on the availability of accurate physical models of the system, use computationally expensive time-domain simulations, or are applicable only at local prediction problems (e.g., a single generator). In this paper, we report the application of two broad classes of data-driven learning models -- along with their algorithmic implementation and performance evaluation -- in predicting transient trajectories in power networks using only streaming measurements and the network topology as input. One class of models is based on the Koopman operator theory which allows for capturing the nonlinear dynamic behavior via an infinite-dimensional linear operator. The other class of models is based on the graph convolutional neural networks which are adept at capturing the inherent spatio-temporal correlations within the power network. Transient dynamic datasets for training and testing the models are synthesized by simulating a wide variety of load change events in the IEEE 68-bus system, categorized by the load change magnitudes, as well as by the degree of connectivity and the distance to nearest generator nodes. The results confirm that the proposed predictive models can successfully predict the post-disturbance transient evolution of the system with a high level of accuracy.
△ Less
Submitted 16 February, 2022;
originally announced February 2022.
-
New results in Branching processes using Stochastic Approximation
Authors:
Khushboo Agarwal,
Veeraruna Kavitha
Abstract:
We consider a broad class of continuous-time two-type population size-dependent Markov Branching Processes. The offspring distribution can depend on the current (alive) and total (dead and alive) populations. Using stochastic approximation techniques, we show that the time-asymptotic proportion of the populations either converges to the equilibrium points or infinitely often enters every neighbour…
▽ More
We consider a broad class of continuous-time two-type population size-dependent Markov Branching Processes. The offspring distribution can depend on the current (alive) and total (dead and alive) populations. Using stochastic approximation techniques, we show that the time-asymptotic proportion of the populations either converges to the equilibrium points or infinitely often enters every neighbourhood and exits some neighbourhood of a saddle point of an appropriate ordinary differential equation with a certain probability (almost surely for the process with attack and proportion-dependent branching process). The result holds under finite second-moment conditions. We also show that certain normalized trajectories of the embedded chain almost surely converge to the solution of the ordinary differential equation uniformly over any finite time window as time progresses. In addition to extending the analysis of several existing BPs, we analyze two new variants: BP with attack and acquisition, and BP with proportion-dependent offspring. Using these results, we study competition in viral markets and fake news control on online social networks.
△ Less
Submitted 3 April, 2023; v1 submitted 29 November, 2021;
originally announced November 2021.
-
Evolutionary Vaccination Games with premature vaccines to combat ongoing deadly pandemic
Authors:
Vartika Singh,
Khushboo Agarwal,
Shubham,
Veeraruna Kavitha
Abstract:
We consider a vaccination game that results with the introduction of premature and possibly scarce vaccines introduced in a desperate bid to combat the otherwise ravaging deadly pandemic. The response of unsure agents amid many uncertainties makes this game completely different from the previous studies. We construct a framework that combines SIS epidemic model with a variety of dynamic behavioral…
▽ More
We consider a vaccination game that results with the introduction of premature and possibly scarce vaccines introduced in a desperate bid to combat the otherwise ravaging deadly pandemic. The response of unsure agents amid many uncertainties makes this game completely different from the previous studies. We construct a framework that combines SIS epidemic model with a variety of dynamic behavioral vaccination responses and demographic aspects. The response of each agent is influenced by the vaccination hesitancy and urgency, which arise due to their personal belief about efficacy and side-effects of the vaccine, disease characteristics, and relevant reported information (e.g., side-effects, disease statistics etc.). Based on such aspects, we identify the responses that are stable against static mutations. By analysing the attractors of the resulting ODEs, we observe interesting patterns in the limiting state of the system under evolutionary stable (ES) strategies, as a function of various defining parameters. There are responses for which the disease is eradicated completely (at limiting state), but none are stable against mutations. Also, vaccination abundance results in higher infected fractions at ES limiting state, irrespective of the disease death rate.
△ Less
Submitted 13 September, 2021;
originally announced September 2021.
-
Controlling Fake News by Tagging: A Branching Process Analysis
Authors:
Suyog Kapsikar,
Indrajit Saha,
Khushboo Agarwal,
Veeraruna Kavitha,
Quanyan Zhu
Abstract:
The spread of fake news on online social networks (OSNs) has become a matter of concern. These platforms are also used for propagating important authentic information. Thus, there is a need for mitigating fake news without significantly influencing the spread of real news. We leverage users' inherent capabilities of identifying fake news and propose a warning-based control mechanism to curb this s…
▽ More
The spread of fake news on online social networks (OSNs) has become a matter of concern. These platforms are also used for propagating important authentic information. Thus, there is a need for mitigating fake news without significantly influencing the spread of real news. We leverage users' inherent capabilities of identifying fake news and propose a warning-based control mechanism to curb this spread. Warnings are based on previous users' responses that indicate the authenticity of the news. We use population-size dependent continuous-time multi-type branching processes to describe the spreading under the warning mechanism. We also have new results towards these branching processes. The (time) asymptotic proportions of the individual populations are derived using stochastic approximation tools. Using these, relevant type 1, type 2 performances are derived and an appropriate optimization problem is solved. The proposed mechanism effectively controls fake news, with negligible influence on the propagation of authentic news. We validate performance measures using Monte Carlo simulations on network connections provided by Twitter data.
△ Less
Submitted 15 July, 2022; v1 submitted 4 September, 2020;
originally announced September 2020.
-
Model-Agnostic Algorithm for Real-Time Attack Identification in Power Grid using Koopman Modes
Authors:
Sai Pushpak Nandanoori,
Soumya Kundu,
Seemita Pal,
Khushbu Agarwal,
Sutanay Choudhury
Abstract:
Malicious activities on measurements from sensors like Phasor Measurement Units (PMUs) can mislead the control center operator into taking wrong control actions resulting in disruption of operation, financial losses, and equipment damage. In particular, false data attacks initiated during power systems transients caused due to abrupt changes in load and generation can fool the conventional model-b…
▽ More
Malicious activities on measurements from sensors like Phasor Measurement Units (PMUs) can mislead the control center operator into taking wrong control actions resulting in disruption of operation, financial losses, and equipment damage. In particular, false data attacks initiated during power systems transients caused due to abrupt changes in load and generation can fool the conventional model-based detection methods relying on thresholds comparison to trigger an anomaly. In this paper, we propose a Koopman mode decomposition (KMD) based algorithm to detect and identify false data attacks in real-time. The Koopman modes (KMs) are capable of capturing the nonlinear modes of oscillation in the transient dynamics of the power networks and reveal the spatial embedding of both natural and anomalous modes of oscillations in the sensor measurements. The Koopman-based spatio-temporal nonlinear modal analysis is used to filter out the false data injected by an attacker. The performance of the algorithm is illustrated on the IEEE 68-bus test system using synthetic attack scenarios generated on GridSTAGE, a recently developed multivariate spatio-temporal data generation framework for simulation of adversarial scenarios in cyber-physical power systems.
△ Less
Submitted 27 August, 2020; v1 submitted 22 July, 2020;
originally announced July 2020.
-
Stable Delaunay Graphs
Authors:
Pankaj K. Agarwal,
Jie Gao,
Leonidas J. Guibas,
Haim Kaplan,
Natan Rubin,
Micha Sharir
Abstract:
Let $P$ be a set of $n$ points in $\mathrm{R}^2$, and let $\mathrm{DT}(P)$ denote its Euclidean Delaunay triangulation. We introduce the notion of an edge of $\mathrm{DT}(P)$ being {\it stable}. Defined in terms of a parameter $α>0$, a Delaunay edge $pq$ is called $α$-stable, if the (equal) angles at which $p$ and $q$ see the corresponding Voronoi edge $e_{pq}$ are at least $α$. A subgraph $G$ of…
▽ More
Let $P$ be a set of $n$ points in $\mathrm{R}^2$, and let $\mathrm{DT}(P)$ denote its Euclidean Delaunay triangulation. We introduce the notion of an edge of $\mathrm{DT}(P)$ being {\it stable}. Defined in terms of a parameter $α>0$, a Delaunay edge $pq$ is called $α$-stable, if the (equal) angles at which $p$ and $q$ see the corresponding Voronoi edge $e_{pq}$ are at least $α$. A subgraph $G$ of $\mathrm{DT}(P)$ is called {\it $(cα, α)$-stable Delaunay graph} ($\mathrm{SDG}$ in short), for some constant $c \ge 1$, if every edge in $G$ is $α$-stable and every $cα$-stable of $\mathrm{DT}(P)$ is in $G$.
We show that if an edge is stable in the Euclidean Delaunay triangulation of $P$, then it is also a stable edge, though for a different value of $α$, in the Delaunay triangulation of $P$ under any convex distance function that is sufficiently close to the Euclidean norm, and vice-versa. In particular, a $6α$-stable edge in $\mathrm{DT}(P)$ is $α$-stable in the Delaunay triangulation under the distance function induced by a regular $k$-gon for $k \ge 2π/α$, and vice-versa. Exploiting this relationship and the analysis in~\cite{polydel}, we present a linear-size kinetic data structure (KDS) for maintaining an $(8α,α)$-$\mathrm{SDG}$ as the points of $P$ move. If the points move along algebraic trajectories of bounded degree, the KDS processes nearly quadratic events during the motion, each of which can processed in $O(\log n)$ time. Finally, we show that a number of useful properties of $\mathrm{DT}(P)$ are retained by $\mathrm{SDG}$ of $P$.
△ Less
Submitted 26 April, 2015;
originally announced April 2015.
-
Kinetic Voronoi Diagrams and Delaunay Triangulations under Polygonal Distance Functions
Authors:
Pankaj K. Agarwal,
Haim Kaplan,
Natan Rubin,
Micha Sharir
Abstract:
Let $P$ be a set of $n$ points and $Q$ a convex $k$-gon in ${\mathbb R}^2$. We analyze in detail the topological (or discrete) changes in the structure of the Voronoi diagram and the Delaunay triangulation of $P$, under the convex distance function defined by $Q$, as the points of $P$ move along prespecified continuous trajectories. Assuming that each point of $P$ moves along an algebraic trajecto…
▽ More
Let $P$ be a set of $n$ points and $Q$ a convex $k$-gon in ${\mathbb R}^2$. We analyze in detail the topological (or discrete) changes in the structure of the Voronoi diagram and the Delaunay triangulation of $P$, under the convex distance function defined by $Q$, as the points of $P$ move along prespecified continuous trajectories. Assuming that each point of $P$ moves along an algebraic trajectory of bounded degree, we establish an upper bound of $O(k^4nλ_r(n))$ on the number of topological changes experienced by the diagrams throughout the motion; here $λ_r(n)$ is the maximum length of an $(n,r)$-Davenport-Schinzel sequence, and $r$ is a constant depending on the algebraic degree of the motion of the points. Finally, we describe an algorithm for efficiently maintaining the above structures, using the kinetic data structure (KDS) framework.
△ Less
Submitted 18 April, 2014;
originally announced April 2014.
-
$n$-Colour self-inverse compositions
Authors:
Geetika Narang,
A K Agarwal
Abstract:
MacMahon's definition of self-inverse composition is extended to $n$-colour self-inverse composition. This introduces four new sequences which satisfy the same recurrence relation with different initial conditions like the famous Fibonacci and Lucas sequences. For these new sequences explicit formulas, recurrence relations, generating functions and a summation formula are obtained. Two new binom…
▽ More
MacMahon's definition of self-inverse composition is extended to $n$-colour self-inverse composition. This introduces four new sequences which satisfy the same recurrence relation with different initial conditions like the famous Fibonacci and Lucas sequences. For these new sequences explicit formulas, recurrence relations, generating functions and a summation formula are obtained. Two new binomial identities with combinatorial meaning are also given.
△ Less
Submitted 31 August, 2006;
originally announced August 2006.
-
Emerging Challenges in Computational Topology
Authors:
Marshall Bern,
David Eppstein,
Pankaj K. Agarwal,
Nina Amenta,
Paul Chew,
Tamal Dey,
David P. Dobkin,
Herbert Edelsbrunner,
Cindy Grimm,
Leonidas J. Guibas,
John Harer,
Joel Hass,
Andrew Hicks,
Carroll K. Johnson,
Gilad Lerman,
David Letscher,
Paul Plassmann,
Eric Sedgwick,
Jack Snoeyink,
Jeff Weeks,
Chee Yap,
Denis Zorin
Abstract:
Here we present the results of the NSF-funded Workshop on Computational Topology, which met on June 11 and 12 in Miami Beach, Florida. This report identifies important problems involving both computation and topology.
Here we present the results of the NSF-funded Workshop on Computational Topology, which met on June 11 and 12 in Miami Beach, Florida. This report identifies important problems involving both computation and topology.
△ Less
Submitted 1 September, 1999;
originally announced September 1999.