-
On Computing Optimal Temporal Branchings and Spanning Subgraphs
Authors:
Daniela Bubboloni,
Costanza Catalano,
Andrea Marino,
Ana Silva
Abstract:
In this work we extend the concept of out/in-branchings spanning the vertices of a digraph (also called directed spanning trees) to temporal graphs, which are digraphs where arcs are available only at prescribed times. While the literature has focused on minimum weight/earliest arrival time Temporal Out-Branchings (TOB), we solve the problem for other optimization criteria. In particular, we defin…
▽ More
In this work we extend the concept of out/in-branchings spanning the vertices of a digraph (also called directed spanning trees) to temporal graphs, which are digraphs where arcs are available only at prescribed times. While the literature has focused on minimum weight/earliest arrival time Temporal Out-Branchings (TOB), we solve the problem for other optimization criteria. In particular, we define five different types of TOBs based on the optimization of the travel duration (FT-TOB), of the departure time (LD-TOB), of the number of transfers (MT-TOB), of the total waiting time (MW-TOB), and of the travelling time (ST-TOB). For D$\in \{$LD,MT,ST$\}$, we provide necessary and sufficient conditions for the existence of a spanning D-TOB; when it does not exist, we characterize the maximum vertex set that a D-TOB can span. Moreover, we provide a log linear algorithm for computing such branchings. For D$\in \{$FT,MW$\}$, we prove that deciding the existence of a spanning D-TOB is NP-complete; we also show that the same results hold for optimal temporal in-branchings. Finally, we investigate the related problem of computing a spanning temporal subgraph with the minimum number of arcs and optimizing a chosen criterion D. This problem turns out to be NP-hard for any D. The hardness results are quite surprising, as computing optimal paths between nodes can always be done in polynomial time.
△ Less
Submitted 18 December, 2023;
originally announced December 2023.
-
A robust statistical framework for cyber-vulnerability prioritisation under partial information in threat intelligence
Authors:
Mario Angelelli,
Serena Arima,
Christian Catalano,
Enrico Ciavolino
Abstract:
Proactive cyber-risk assessment is gaining momentum due to the wide range of sectors that can benefit from the prevention of cyber-incidents by preserving integrity, confidentiality, and the availability of data. The rising attention to cybersecurity also results from the increasing connectivity of cyber-physical systems, which generates multiple sources of uncertainty about emerging cyber-vulnera…
▽ More
Proactive cyber-risk assessment is gaining momentum due to the wide range of sectors that can benefit from the prevention of cyber-incidents by preserving integrity, confidentiality, and the availability of data. The rising attention to cybersecurity also results from the increasing connectivity of cyber-physical systems, which generates multiple sources of uncertainty about emerging cyber-vulnerabilities. This work introduces a robust statistical framework for quantitative and qualitative reasoning under uncertainty about cyber-vulnerabilities and their prioritisation. Specifically, we take advantage of mid-quantile regression to deal with ordinal risk assessments, and we compare it to current alternatives for cyber-risk ranking and graded responses. For this purpose, we identify a novel accuracy measure suited for rank invariance under partial knowledge of the whole set of existing vulnerabilities. The model is tested on both simulated and real data from selected databases that support the evaluation, exploitation, or response to cyber-vulnerabilities in realistic contexts. Such datasets allow us to compare multiple models and accuracy measures, discussing the implications of partial knowledge about cyber-vulnerabilities on threat intelligence and decision-making in operational scenarios.
△ Less
Submitted 13 June, 2024; v1 submitted 16 February, 2023;
originally announced February 2023.
-
On a Network Centrality Maximization Game
Authors:
Costanza Catalano,
Maria Castaldo,
Giacomo Como,
Fabio Fagnani
Abstract:
We study a network formation game where $n$ players, identified with the nodes of a directed graph to be formed, choose where to wire their outgoing links in order to maximize their PageRank centrality. Specifically, the action of every player $i$ consists in the wiring of a predetermined number $d_i$ of directed out-links, and her utility is her own PageRank centrality in the network resulting fr…
▽ More
We study a network formation game where $n$ players, identified with the nodes of a directed graph to be formed, choose where to wire their outgoing links in order to maximize their PageRank centrality. Specifically, the action of every player $i$ consists in the wiring of a predetermined number $d_i$ of directed out-links, and her utility is her own PageRank centrality in the network resulting from the actions of all players. We show that this is a potential game and that the best response correspondence always exhibits a local structure in that it is never convenient for a node $i$ to link to other nodes that are at incoming distance more than $d_i $ from her. We then study the equilibria of this game determining necessary conditions for a graph to be a (strict, recurrent) Nash equilibrium. Moreover, in the homogeneous case, where players all have the same number $d$ of out-links, we characterize the structure of the potential maximizing equilibria and, in the special cases $ d=1 $ and $ d=2 $, we provide a complete classification of the set of (strict, recurrent) Nash equilibria. Our analysis shows in particular that the considered formation mechanism leads to the emergence of undirected and disconnected or loosely connected networks.
△ Less
Submitted 11 September, 2023; v1 submitted 7 November, 2022;
originally announced November 2022.
-
Liver Fibrosis and NAS scoring from CT images using self-supervised learning and texture encoding
Authors:
Ananya Jana,
Hui Qu,
Carlos D. Minacapelli,
Carolyn Catalano,
Vinod Rustgi,
Dimitris Metaxas
Abstract:
Non-alcoholic fatty liver disease (NAFLD) is one of the most common causes of chronic liver diseases (CLD) which can progress to liver cancer. The severity and treatment of NAFLD is determined by NAFLD Activity Scores (NAS)and liver fibrosis stage, which are usually obtained from liver biopsy. However, biopsy is invasive in nature and involves risk of procedural complications. Current methods to p…
▽ More
Non-alcoholic fatty liver disease (NAFLD) is one of the most common causes of chronic liver diseases (CLD) which can progress to liver cancer. The severity and treatment of NAFLD is determined by NAFLD Activity Scores (NAS)and liver fibrosis stage, which are usually obtained from liver biopsy. However, biopsy is invasive in nature and involves risk of procedural complications. Current methods to predict the fibrosis and NAS scores from noninvasive CT images rely heavily on either a large annotated dataset or transfer learning using pretrained networks. However, the availability of a large annotated dataset cannot be always ensured andthere can be domain shifts when using transfer learning. In this work, we propose a self-supervised learning method to address both problems. As the NAFLD causes changes in the liver texture, we also propose to use texture encoded inputs to improve the performance of the model. Given a relatively small dataset with 30 patients, we employ a self-supervised network which achieves better performance than a network trained via transfer learning. The code is publicly available at https://github.com/ananyajana/fibrosis_code.
△ Less
Submitted 15 March, 2021; v1 submitted 5 March, 2021;
originally announced March 2021.
-
On a Centrality Maximization Game
Authors:
Maria Castaldo,
Costanza Catalano,
Giacomo Como,
Fabio Fagnani
Abstract:
The Bonacich centrality is a well-known measure of the relative importance of nodes in a network. This notion is, for example, at the core of Google's PageRank algorithm. In this paper we study a network formation game where each player corresponds to a node in the network to be formed and can decide how to rewire his m out-links aiming at maximizing his own Bonacich centrality, which is his utili…
▽ More
The Bonacich centrality is a well-known measure of the relative importance of nodes in a network. This notion is, for example, at the core of Google's PageRank algorithm. In this paper we study a network formation game where each player corresponds to a node in the network to be formed and can decide how to rewire his m out-links aiming at maximizing his own Bonacich centrality, which is his utility function. We study the Nash equilibria (NE) and the best response dynamics of this game and we provide a complete classification of the set of NE when m=1 and a fairly complete classification of the NE when m=2. Our analysis shows that the centrality maximization performed by each node tends to create undirected and disconnected or loosely connected networks, namely 2-cliques for m=1 and rings or a special "Butterfly"-shaped graph when m=2. Our results build on locality property of the best response function in such game that we formalize and prove in the paper.
△ Less
Submitted 6 May, 2020; v1 submitted 15 November, 2019;
originally announced November 2019.
-
A linear bound on the k-rendezvous time for primitive sets of NZ matrices
Authors:
Costanza Catalano,
Umer Azfar,
Ludovic Charlier,
Raphaël Jungers
Abstract:
A set of nonnegative matrices is called primitive if there exists a product of these matrices that is entrywise positive. Motivated by recent results relating synchronizing automata and primitive sets, we study the length of the shortest product of a primitive set having a column or a row with k positive entries, called its k-rendezvous time (k-RT}), in the case of sets of matrices having no zero…
▽ More
A set of nonnegative matrices is called primitive if there exists a product of these matrices that is entrywise positive. Motivated by recent results relating synchronizing automata and primitive sets, we study the length of the shortest product of a primitive set having a column or a row with k positive entries, called its k-rendezvous time (k-RT}), in the case of sets of matrices having no zero rows and no zero columns. We prove that the k-RT is at most linear w.r.t. the matrix size n for small k, while the problem is still open for synchronizing automata. We provide two upper bounds on the k-RT: the second is an improvement of the first one, although the latter can be written in closed form. We then report numerical results comparing our upper bounds on the k-RT with heuristic approximation methods.
△ Less
Submitted 20 January, 2021; v1 submitted 25 March, 2019;
originally announced March 2019.
-
On random primitive sets, directable NDFAs and the generation of slowly synchronizing DFAs
Authors:
Costanza Catalano,
Raphaël M. Jungers
Abstract:
We tackle the problem of the randomized generation of slowly synchronizing deterministic automata (DFAs) by generating random primitive sets of matrices. We show that when the randomized procedure is too simple the exponent of the generated sets is O(n log n) with high probability, thus the procedure fails to return DFAs with large reset threshold. We extend this result to random nondeterministic…
▽ More
We tackle the problem of the randomized generation of slowly synchronizing deterministic automata (DFAs) by generating random primitive sets of matrices. We show that when the randomized procedure is too simple the exponent of the generated sets is O(n log n) with high probability, thus the procedure fails to return DFAs with large reset threshold. We extend this result to random nondeterministic automata (NDFAs) by showing, in particular, that a uniformly sampled NDFA has both a 2-directing word and a 3-directing word of length O(n log n) with high probability. We then present a more involved randomized algorithm that manages to generate DFAs with large reset threshold and we finally leverage this finding for exhibiting new families of DFAs with reset threshold of order $ Ω(n^2/4) $.
△ Less
Submitted 24 October, 2018;
originally announced October 2018.
-
First observations of speed of light tracks by a fluorescence detector looking down on the atmosphere
Authors:
G. Abdellaoui,
S. Abe,
J. H. Adams Jr.,
A. Ahriche,
D. Allard,
L. Allen,
G. Alonso,
L. Anchordoqui,
A. Anzalone,
Y. Arai,
K. Asano,
R. Attallah,
H. Attoui,
M. Ave Pernas,
S. Bacholle,
M. Bakiri,
P. Baragatti,
P. Barrillon,
S. Bartocci,
J. Bayer,
B. Beldjilali,
T. Belenguer,
N. Belkhalfa,
R. Bellotti,
A. Belov
, et al. (289 additional authors not shown)
Abstract:
EUSO-Balloon is a pathfinder mission for the Extreme Universe Space Observatory onboard the Japanese Experiment Module (JEM-EUSO). It was launched on the moonless night of the 25$^{th}$ of August 2014 from Timmins, Canada. The flight ended successfully after maintaining the target altitude of 38 km for five hours. One part of the mission was a 2.5 hour underflight using a helicopter equipped with…
▽ More
EUSO-Balloon is a pathfinder mission for the Extreme Universe Space Observatory onboard the Japanese Experiment Module (JEM-EUSO). It was launched on the moonless night of the 25$^{th}$ of August 2014 from Timmins, Canada. The flight ended successfully after maintaining the target altitude of 38 km for five hours. One part of the mission was a 2.5 hour underflight using a helicopter equipped with three UV light sources (LED, xenon flasher and laser) to perform an inflight calibration and examine the detectors capability to measure tracks moving at the speed of light. We describe the helicopter laser system and details of the underflight as well as how the laser tracks were recorded and found in the data. These are the first recorded laser tracks measured from a fluorescence detector looking down on the atmosphere. Finally, we present a first reconstruction of the direction of the laser tracks relative to the detector.
△ Less
Submitted 7 August, 2018;
originally announced August 2018.
-
On randomized generation of slowly synchronizing automata
Authors:
Costanza Catalano,
Raphaël M. Jungers
Abstract:
Motivated by the randomized generation of slowly synchronizing automata, we study automata made of permutation letters and a merging letter of rank $ n\!-\!1 $. We present a constructive randomized procedure to generate synchronizing automata of that kind with (potentially) large alphabet size based on recent results on \textit{primitive} sets of matrices. We report numerical results showing that…
▽ More
Motivated by the randomized generation of slowly synchronizing automata, we study automata made of permutation letters and a merging letter of rank $ n\!-\!1 $. We present a constructive randomized procedure to generate synchronizing automata of that kind with (potentially) large alphabet size based on recent results on \textit{primitive} sets of matrices. We report numerical results showing that our algorithm finds automata with much larger reset threshold than a mere uniform random generation and we present new families of automata with reset threshold of $ Ω(n^2/4) $. We finally report theoretical results on randomized generation of primitive sets of matrices: a set of permutation matrices with a $ 0 $ entry changed into a $ 1 $ is primitive and has exponent of $ O(n\log n) $ with high probability in case of uniform random distribution and the same holds for a random set of binary matrices where each entry is set, independently, equal to $ 1 $ with probability $ p $ and equal to $ 0 $ with probability $ 1-p $, when $ np-\log n\rightarrow\infty $ as $ n\rightarrow\infty $.
△ Less
Submitted 26 June, 2018; v1 submitted 17 May, 2018;
originally announced May 2018.
-
The Synchronizing Probability Function for Primitive Sets of Matrices
Authors:
Costanza Catalano,
Raphaël M. Jungers
Abstract:
Motivated by recent results relating synchronizing DFAs and primitive sets, we tackle the synchronization process and the related longstanding Černý conjecture by studying the primitivity phenomenon for sets of nonnegative matrices having neither zero-rows nor zero-columns. We formulate the primitivity process in the setting of a two-player probabilistic game and we make use of convex optimization…
▽ More
Motivated by recent results relating synchronizing DFAs and primitive sets, we tackle the synchronization process and the related longstanding Černý conjecture by studying the primitivity phenomenon for sets of nonnegative matrices having neither zero-rows nor zero-columns. We formulate the primitivity process in the setting of a two-player probabilistic game and we make use of convex optimization techniques to describe its behavior. We develop a tool for approximating and upper bounding the exponent of any primitive set and supported by numerical results we state a conjecture that, if true, would imply a quadratic upper bound on the reset threshold of a new class of automata.
△ Less
Submitted 5 March, 2019; v1 submitted 17 May, 2018;
originally announced May 2018.
-
Challenging packaging limits and infectivity of phage λ
Authors:
Elmar Nurmemmedov,
Martin Castelnovo,
Elizabeth Medina,
Carlos Enrique Catalano,
Alex Evilevitch
Abstract:
The terminase motors of bacteriophages have been shown to be among the strongest active machines in the biomolecular world, being able to package several tens of kilobase pairs of viral genome into a capsid within minutes. Yet these motors are hindered at the end of the packaging process by the progressive build-up of a force resisting packaging associated with already packaged DNA. In this experi…
▽ More
The terminase motors of bacteriophages have been shown to be among the strongest active machines in the biomolecular world, being able to package several tens of kilobase pairs of viral genome into a capsid within minutes. Yet these motors are hindered at the end of the packaging process by the progressive build-up of a force resisting packaging associated with already packaged DNA. In this experimental work, we raise the issue of what sets the upper limit on the length of the genome that can be packaged by the terminase motor of phage λ and still yield infectious virions, and the conditions under which this can be efficiently performed. Using a packaging strategy developed in our laboratory of building phage λ from scratch, together with plaque assay monitoring, we have been able to show that the terminase motor of phage λ is able to produce infectious particles with up to 110% of the wild-type (WT) λ-DNA length. However, the phage production rate, and thus the infectivity, decreased exponentially with increasing DNA length, and was a factor of 103 lower for the 110% λ-DNA phage. Interestingly, our in vitro strategy was still efficient in fully packaging phages with DNA lengths as high as 114% of the WT length, but these viruses were unable to infect bacterial cells efficiently. Further, we demonstrated that the phage production rate is modulated by the presence of multivalent ionic species. The biological consequences of these finding are discussed.
△ Less
Submitted 9 November, 2011;
originally announced November 2011.