Skip to main content

Showing 1–19 of 19 results for author: Gutfraind, A

.
  1. arXiv:2309.03133  [pdf

    q-fin.RM cs.AI math.OC

    Risk-reducing design and operations toolkit: 90 strategies for managing risk and uncertainty in decision problems

    Authors: Alexander Gutfraind

    Abstract: Uncertainty is a pervasive challenge in decision analysis, and decision theory recognizes two classes of solutions: probabilistic models and cognitive heuristics. However, engineers, public planners and other decision-makers instead use a third class of strategies that could be called RDOT (Risk-reducing Design and Operations Toolkit). These include incorporating robustness into designs, contingen… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

    MSC Class: 60A05; 91B05; 62C05 ACM Class: F.1.3

  2. arXiv:2301.10244  [pdf

    cs.AI math.OC math.PR

    On solving decision and risk management problems subject to uncertainty

    Authors: Alexander Gutfraind

    Abstract: Uncertainty is a pervasive challenge in decision and risk management and it is usually studied by quantification and modeling. Interestingly, engineers and other decision makers usually manage uncertainty with strategies such as incorporating robustness, or by employing decision heuristics. The focus of this paper is then to develop a systematic understanding of such strategies, determine their ra… ▽ More

    Submitted 18 January, 2023; originally announced January 2023.

    Comments: 12 pages

    MSC Class: 60A05; 91B05; 62C05 ACM Class: F.1.3

  3. arXiv:1912.13032  [pdf

    cs.LG stat.ML

    Using massive health insurance claims data to predict very high-cost claimants: a machine learning approach

    Authors: José M. Maisog, Wenhong Li, Yanchun Xu, Brian Hurley, Hetal Shah, Ryan Lemberg, Tina Borden, Stephen Bandeian, Melissa Schline, Roxanna Cross, Alan Spiro, Russ Michael, Alexander Gutfraind

    Abstract: Due to escalating healthcare costs, accurately predicting which patients will incur high costs is an important task for payers and providers of healthcare. High-cost claimants (HiCCs) are patients who have annual costs above $\$250,000… ▽ More

    Submitted 30 December, 2019; originally announced December 2019.

    Comments: 34 pages, 2 figures, In review in PLoS ONE

    MSC Class: J.3; I.2.6 ACM Class: J.3; I.2.6

  4. arXiv:1901.07313  [pdf

    cs.CR

    Risk analysis beyond vulnerability and resilience - characterizing the defensibility of critical systems

    Authors: Vicki Bier, Alexander Gutfraind

    Abstract: A common problem in risk analysis is to characterize the overall security of a system of valuable assets (e.g., government buildings or communication hubs), and to suggest measures to mitigate any hazards or security threats. Currently, analysts typically rely on a combination of indices, such as resilience, robustness, redundancy, security, and vulnerability. However, these indices are not by the… ▽ More

    Submitted 8 January, 2019; originally announced January 2019.

    Comments: 36 pages; Keywords: Risk Analysis, Defensibility, Vulnerability, Resilience, Counter-terrorism

    Journal ref: European Journal of Operational Research 2019

  5. arXiv:1802.09617  [pdf, other

    cs.SI cs.DS

    Multiscale Planar Graph Generation

    Authors: Varsha Chauhan, Alexander Gutfraind, Ilya Safro

    Abstract: The study of network representations of physical, biological, and social phenomena can help us better understand the structural and functional dynamics of their networks and formulate predictive models of these phenomena. However, due to the scarcity of real-world network data owing to factors such as cost and effort required in collection of network data and the sensitivity of this data towards t… ▽ More

    Submitted 12 May, 2019; v1 submitted 26 February, 2018; originally announced February 2018.

  6. arXiv:1609.02121  [pdf, other

    cs.SI cs.DS physics.soc-ph

    Generating realistic scaled complex networks

    Authors: Christian L. Staudt, Michael Hamann, Alexander Gutfraind, Ilya Safro, Henning Meyerhenke

    Abstract: Research on generative models is a central project in the emerging field of network science, and it studies how statistical patterns found in real networks could be generated by formal rules. Output from these generative models is then the basis for designing and evaluating computational methods on networks, and for verification and simulation studies. During the last two decades, a variety of mod… ▽ More

    Submitted 23 March, 2017; v1 submitted 7 September, 2016; originally announced September 2016.

    Comments: 26 pages, 13 figures, extended version, a preliminary version of the paper was presented at the 5th International Workshop on Complex Networks and their Applications

  7. arXiv:1508.01230  [pdf

    physics.soc-ph physics.data-an

    Operational resilience: concepts, design and analysis

    Authors: Alexander A. Ganin, Emanuele Massaro, Alexander Gutfraind, Nicolas Steen, Jeffrey M. Keisler, Alexander Kott, Rami Mangoubi, Igor Linkov

    Abstract: Building resilience into today's complex infrastructures is critical to the daily functioning of society and its ability to withstand and recover from natural disasters, epidemics, and cyber-threats. This study proposes quantitative measures that implement the definition of engineering resilience advanced by the National Academy of Sciences. The approach is applicable across physical, information,… ▽ More

    Submitted 5 August, 2015; originally announced August 2015.

    Comments: Nature Scientific Reports (under review)

    Journal ref: Nature Scientific Reports, 6 (1), 2016

  8. arXiv:1411.3640  [pdf, other

    cs.DM

    Network installation and recovery: approximation lower bounds and faster exact formulations

    Authors: Alexander Gutfraind, Jeremy Kun, Ádám D. Lelkes, Lev Reyzin

    Abstract: We study the Neighbor Aided Network Installation Problem (NANIP) introduced previously which asks for a minimal cost ordering of the vertices of a graph, where the cost of visiting a node is a function of the number of neighbors that have already been visited. This problem has applications in resource management and disaster recovery. In this paper we analyze the computational hardness of NANIP. I… ▽ More

    Submitted 13 November, 2014; originally announced November 2014.

  9. arXiv:1207.4266  [pdf, other

    cs.DM cond-mat.stat-mech cs.SI math.CO physics.soc-ph

    Multiscale Network Generation

    Authors: Alexander Gutfraind, Lauren Ancel Meyers, Ilya Safro

    Abstract: Networks are widely used in science and technology to represent relationships between entities, such as social or ecological links between organisms, enzymatic interactions in metabolic systems, or computer infrastructure. Statistical analyses of networks can provide critical insights into the structure, function, dynamics, and evolution of those systems. However, the structures of real-world netw… ▽ More

    Submitted 18 July, 2012; originally announced July 2012.

    Comments: 28 pages

  10. arXiv:1207.2799  [pdf, other

    math.OC cs.DM

    Optimal recovery of damaged infrastructure network

    Authors: Alexander Gutfraind, Milan Bradonjić, Tim Novikoff

    Abstract: Natural disasters or attacks may disrupt infrastructure networks on a vast scale. Parts of the damaged network are interdependent, making it difficult to plan and optimally execute the recovery operations. To study how interdependencies affect the recovery schedule, we introduce a new discrete optimization problem where the goal is to minimize the total cost of installing (or recovering) a given n… ▽ More

    Submitted 11 July, 2012; originally announced July 2012.

    Comments: In review with Optimization Letters

  11. arXiv:1108.0894  [pdf, other

    cs.SI

    Evader Interdiction and Collateral Damage

    Authors: Matthew P. Johnson, Alexander Gutfraind

    Abstract: In network interdiction problems, evaders (e.g., hostile agents or data packets) may be moving through a network towards targets and we wish to choose locations for sensors in order to intercept the evaders before they reach their destinations. The evaders might follow deterministic routes or Markov chains, or they may be reactive}, i.e., able to change their routes in order to avoid sensors place… ▽ More

    Submitted 3 August, 2011; originally announced August 2011.

    Comments: Proceedings of the 7th International Symposium on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities (ALGOSENSORS) 2011

    Report number: LA-UR-11-10123 ACM Class: E.1; F.2; G.1.2

  12. arXiv:1106.4358  [pdf, ps, other

    math.DS nlin.AO

    Lanchester Theory and the Fate of Armed Revolts

    Authors: Michael P. Atkinson, Alexander Gutfraind, Moshe Kress

    Abstract: Major revolts have recently erupted in parts of the Middle East with substantial international repercussions. Predicting, co** with and winning those revolts have become a grave problem for many regimes and for world powers. We propose a new model of such revolts that describes their evolution by building on the classic Lanchester theory of combat. The model accounts for the split in the populat… ▽ More

    Submitted 21 June, 2011; originally announced June 2011.

    MSC Class: 37N99; 91B74;

  13. arXiv:1009.0556  [pdf, other

    math.OC cs.DS

    Interdiction of a Markovian Evader

    Authors: Alexander Gutfraind, Aric A. Hagberg, David Izraelevitz, Feng Pan

    Abstract: Shortest path network interdiction is a combinatorial optimization problem on an activity network arising in a number of important security-related applications. It is classically formulated as a bilevel maximin problem representing an "interdictor" and an "evader". The evader tries to move from a source node to the target node along a path of the least cost while the interdictor attempts to frust… ▽ More

    Submitted 2 September, 2010; originally announced September 2010.

    Comments: Submitted to INFORMS Computing Society Conference (ICS2011)

    Report number: LA-UR-08-06551 ACM Class: I.2.8

  14. arXiv:1008.4776  [pdf, other

    cs.GT nlin.AO physics.soc-ph

    Targeting by Transnational Terrorist Groups

    Authors: Alexander Gutfraind

    Abstract: Many successful terrorist groups operate across international borders where different countries host different stages of terrorist operations. Often the recruits for the group come from one country or countries, while the targets of the operations are in another. Stop** such attacks is difficult because intervention in any region or route might merely shift the terrorists elsewhere. Here we prop… ▽ More

    Submitted 27 August, 2010; originally announced August 2010.

    Report number: LA-UR 10-05689

  15. arXiv:1005.3470  [pdf, ps, other

    math.PR physics.data-an

    Monotonic and Non-Monotonic Epidemiological Models on Networks

    Authors: Alexander Gutfraind

    Abstract: Contact networks can significantly change the course of epidemics, affecting the rate of new infections and the mean size of an outbreak. Despite this dependence, some characteristics of epidemics are not contingent on the contact network and are probably predictable based only on the pathogen. Here we consider SIR-like pathogens and give an elementary proof that for any network increasing the pro… ▽ More

    Submitted 25 May, 2011; v1 submitted 19 May, 2010; originally announced May 2010.

    Comments: 10 pages. v2: added 2FleeSIR model

    Report number: LA-UR-11-01481 MSC Class: 60J05; 92D30; 05C90

  16. arXiv:0911.4322  [pdf, other

    cs.DM cs.CC

    Markovian Network Interdiction and the Four Color Theorem

    Authors: Alexander Gutfraind, Kiyan Ahmadizadeh

    Abstract: The Unreactive Markovian Evader Interdiction Problem (UME) asks to optimally place sensors on a network to detect Markovian motion by one or more "evaders". It was previously proved that finding the optimal sensor placement is NP-hard if the number of evaders is unbounded. Here we show that the problem is NP-hard with just 2 evaders using a connection to coloring of planar graphs. The results su… ▽ More

    Submitted 22 November, 2009; originally announced November 2009.

    Comments: 7 pages, 2 figures

    Report number: LA-UR-09-07611 ACM Class: E.1; F.2; G.1.2

  17. Optimizing topological cascade resilience based on the structure of terrorist networks

    Authors: Alexander Gutfraind

    Abstract: Complex socioeconomic networks such as information, finance and even terrorist networks need resilience to cascades - to prevent the failure of a single node from causing a far-reaching domino effect. We show that terrorist and guerrilla networks are uniquely cascade-resilient while maintaining high efficiency, but they become more vulnerable beyond a certain threshold. We also introduce an optimi… ▽ More

    Submitted 27 August, 2010; v1 submitted 3 June, 2009; originally announced June 2009.

    Comments: 26 pages. v2: In review at Public Library of Science ONE

    Report number: LA-UR 10-01563 MSC Class: 05C90; 90C35; 90C29; 05C12; 05C35

    Journal ref: PLoS ONE 5(11): e13448 (2010)

  18. arXiv:0903.0173  [pdf, ps, other

    cs.DM cs.CC cs.DS

    Optimal Interdiction of Unreactive Markovian Evaders

    Authors: Alexander Gutfraind, Aric Hagberg, Feng Pan

    Abstract: The interdiction problem arises in a variety of areas including military logistics, infectious disease control, and counter-terrorism. In the typical formulation of network interdiction, the task of the interdictor is to find a set of edges in a weighted network such that the removal of those edges would maximally increase the cost to an evader of traveling on a path through the network. Our w… ▽ More

    Submitted 1 March, 2009; originally announced March 2009.

    Comments: Accepted at the Sixth International Conference on integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems (CPAIOR 2009)

    Report number: LA-UR-09-00560 ACM Class: E.1; F.2; G.1.2

    Journal ref: CPAIOR 2009

  19. Understanding Terrorist Organizations with a Dynamic Model

    Authors: Alexander Gutfraind

    Abstract: Terrorist organizations change over time because of processes such as recruitment and training as well as counter-terrorism (CT) measures, but the effects of these processes are typically studied qualitatively and in separation from each other. Seeking a more quantitative and integrated understanding, we constructed a simple dynamic model where equations describe how these processes change an or… ▽ More

    Submitted 7 January, 2009; v1 submitted 26 November, 2008; originally announced November 2008.

    Comments: To appear as Springer Lecture Notes in Computer Science v2: vectorized 4 figures, fixed two typos, more detailed bibliography

    MSC Class: 34A30; 91F10; 93A30