-
Reeb graph invariants of Morse functions and $3$-manifold groups
Authors:
Łukasz Patryk Michalak
Abstract:
In this work we are focused on the existence of Morse functions on a closed manifold $M$ which are far from being ordered, i.e. whose Reeb graphs have positive first Betti number, especially the maximal possible, equals $\operatorname{corank}(π_1(M))$. In the case of $3$-manifolds we describe the minimal number of critical points needed to construct such functions, which is related with the number…
▽ More
In this work we are focused on the existence of Morse functions on a closed manifold $M$ which are far from being ordered, i.e. whose Reeb graphs have positive first Betti number, especially the maximal possible, equals $\operatorname{corank}(π_1(M))$. In the case of $3$-manifolds we describe the minimal number of critical points needed to construct such functions, which is related with the number of vertices of degree $2$ in Reeb graphs. We define a new invariant of $3$-manifold groups and their presentations, and using Heegaard splittings we show its utility in determining occurrence of disordered Morse functions. In particular, the Freiheitssatz, a result for one-relator groups, allows us to calculate this invariant in the case of orientable circle-bundles over a surface, which provides an interesting example of the behaviour of Morse functions.
△ Less
Submitted 4 March, 2024;
originally announced March 2024.
-
Infomathic
Authors:
Karim Zayana,
Régis Queruel,
Pierre Michalak
Abstract:
Since its existence, the computer tool has often supported mathematicians, whether it is to implement an approximation method (numerical calculation of a root, of an integral, ...) or to simulate a phenomenon (geometric in nature, probabilistic, ...) to verify or establish a conjecture. But, and this is another point on which we will concentrate our attention here, computing will also have served…
▽ More
Since its existence, the computer tool has often supported mathematicians, whether it is to implement an approximation method (numerical calculation of a root, of an integral, ...) or to simulate a phenomenon (geometric in nature, probabilistic, ...) to verify or establish a conjecture. But, and this is another point on which we will concentrate our attention here, computing will also have served the cause of mathematics by inspiring certain reasoning or by taking charge of whole sections of a demonstration. We will illustrate this fruitful partnership with two example saccessible from high school.
△ Less
Submitted 28 August, 2023;
originally announced August 2023.
-
Graph Anomaly Detection at Group Level: A Topology Pattern Enhanced Unsupervised Approach
Authors:
Xing Ai,
Jialong Zhou,
Yulin Zhu,
Gaolei Li,
Tomasz P. Michalak,
Xiapu Luo,
Kai Zhou
Abstract:
Graph anomaly detection (GAD) has achieved success and has been widely applied in various domains, such as fraud detection, cybersecurity, finance security, and biochemistry. However, existing graph anomaly detection algorithms focus on distinguishing individual entities (nodes or graphs) and overlook the possibility of anomalous groups within the graph. To address this limitation, this paper intr…
▽ More
Graph anomaly detection (GAD) has achieved success and has been widely applied in various domains, such as fraud detection, cybersecurity, finance security, and biochemistry. However, existing graph anomaly detection algorithms focus on distinguishing individual entities (nodes or graphs) and overlook the possibility of anomalous groups within the graph. To address this limitation, this paper introduces a novel unsupervised framework for a new task called Group-level Graph Anomaly Detection (Gr-GAD). The proposed framework first employs a variant of Graph AutoEncoder (GAE) to locate anchor nodes that belong to potential anomaly groups by capturing long-range inconsistencies. Subsequently, group sampling is employed to sample candidate groups, which are then fed into the proposed Topology Pattern-based Graph Contrastive Learning (TPGCL) method. TPGCL utilizes the topology patterns of groups as clues to generate embeddings for each candidate group and thus distinct anomaly groups. The experimental results on both real-world and synthetic datasets demonstrate that the proposed framework shows superior performance in identifying and localizing anomaly groups, highlighting it as a promising solution for Gr-GAD. Datasets and codes of the proposed framework are at the github repository https://anonymous.4open.science/r/Topology-Pattern-Enhanced-Unsupervised-Group-level-Graph-Anomaly-Detection.
△ Less
Submitted 2 August, 2023;
originally announced August 2023.
-
Coupled-Space Attacks against Random-Walk-based Anomaly Detection
Authors:
Yuni Lai,
Marcin Waniek,
Liying Li,
**gwen Wu,
Yulin Zhu,
Tomasz P. Michalak,
Talal Rahwan,
Kai Zhou
Abstract:
Random Walks-based Anomaly Detection (RWAD) is commonly used to identify anomalous patterns in various applications. An intriguing characteristic of RWAD is that the input graph can either be pre-existing or constructed from raw features. Consequently, there are two potential attack surfaces against RWAD: graph-space attacks and feature-space attacks. In this paper, we explore this vulnerability b…
▽ More
Random Walks-based Anomaly Detection (RWAD) is commonly used to identify anomalous patterns in various applications. An intriguing characteristic of RWAD is that the input graph can either be pre-existing or constructed from raw features. Consequently, there are two potential attack surfaces against RWAD: graph-space attacks and feature-space attacks. In this paper, we explore this vulnerability by designing practical coupled-space attacks, investigating the interplay between graph-space and feature-space attacks. To this end, we conduct a thorough complexity analysis, proving that attacking RWAD is NP-hard. Then, we proceed to formulate the graph-space attack as a bi-level optimization problem and propose two strategies to solve it: alternative iteration (alterI-attack) or utilizing the closed-form solution of the random walk model (cf-attack). Finally, we utilize the results from the graph-space attacks as guidance to design more powerful feature-space attacks (i.e., graph-guided attacks). Comprehensive experiments demonstrate that our proposed attacks are effective in enabling the target nodes from RWAD with a limited attack budget. In addition, we conduct transfer attack experiments in a black-box setting, which show that our feature attack significantly decreases the anomaly scores of target nodes. Our study opens the door to studying the coupled-space attack against graph anomaly detection in which the graph space relies on the feature space.
△ Less
Submitted 23 October, 2023; v1 submitted 26 July, 2023;
originally announced July 2023.
-
Spontaneous scale symmetry breaking at high temperature
Authors:
Zygmunt Lalak,
Paulina Michalak
Abstract:
We consider a scale symmetric extension of the Standard Model Higgs scalar sector. The new sector, dilaton, is responsible for the generation of mass scales and may have geometric origin in the Weyl gravity $\tilde{R}^2$ term. We show how temperature as a mass scale breaks scale symmetry explicitly and through a nonvanishing thermal vev. In addition we demonstrate that cosmological evolution of th…
▽ More
We consider a scale symmetric extension of the Standard Model Higgs scalar sector. The new sector, dilaton, is responsible for the generation of mass scales and may have geometric origin in the Weyl gravity $\tilde{R}^2$ term. We show how temperature as a mass scale breaks scale symmetry explicitly and through a nonvanishing thermal vev. In addition we demonstrate that cosmological evolution of the dilaton-Higgs system can lead to late time mass scales, which agree with the Standard Model.
△ Less
Submitted 8 August, 2023; v1 submitted 16 November, 2022;
originally announced November 2022.
-
Beyond Adult and COMPAS: Fairness in Multi-Class Prediction
Authors:
Wael Alghamdi,
Hsiang Hsu,
Haewon Jeong,
Hao Wang,
P. Winston Michalak,
Shahab Asoodeh,
Flavio P. Calmon
Abstract:
We consider the problem of producing fair probabilistic classifiers for multi-class classification tasks. We formulate this problem in terms of "projecting" a pre-trained (and potentially unfair) classifier onto the set of models that satisfy target group-fairness requirements. The new, projected model is given by post-processing the outputs of the pre-trained classifier by a multiplicative factor…
▽ More
We consider the problem of producing fair probabilistic classifiers for multi-class classification tasks. We formulate this problem in terms of "projecting" a pre-trained (and potentially unfair) classifier onto the set of models that satisfy target group-fairness requirements. The new, projected model is given by post-processing the outputs of the pre-trained classifier by a multiplicative factor. We provide a parallelizable iterative algorithm for computing the projected classifier and derive both sample complexity and convergence guarantees. Comprehensive numerical comparisons with state-of-the-art benchmarks demonstrate that our approach maintains competitive performance in terms of accuracy-fairness trade-off curves, while achieving favorable runtime on large datasets. We also evaluate our method at scale on an open dataset with multiple classes, multiple intersectional protected groups, and over 1M samples.
△ Less
Submitted 15 June, 2022;
originally announced June 2022.
-
An unbiased spatiotemporal risk model for COVID-19 with epidemiologically meaningful dynamics (A systematic framework for spatiotemporal modelling of COVID-19 disease)
Authors:
Michał Paweł Michalak,
Jack Cordes,
Agnieszka Kulawik,
Sławomir Sitek,
Sławomir Pytel,
Elżbieta Zuzańska-Żyśko,
Radosław Wieczorek
Abstract:
Spatiotemporal modelling of infectious diseases such as COVID-19 involves using a variety of epidemiological metrics such as regional proportion of cases or regional positivity rates. Although observing their changes over time is critical to estimate the regional disease burden, the dynamical properties of these measures as well as cross-relationships are not systematically explained. Here we prov…
▽ More
Spatiotemporal modelling of infectious diseases such as COVID-19 involves using a variety of epidemiological metrics such as regional proportion of cases or regional positivity rates. Although observing their changes over time is critical to estimate the regional disease burden, the dynamical properties of these measures as well as cross-relationships are not systematically explained. Here we provide a spatiotemporal framework composed of six commonly used and newly constructed epidemiological metrics and conduct a case study evaluation. We introduce a refined risk model that is biased neither by the differences in population sizes nor by the spatial heterogeneity of testing. In particular, the proposed methodology is useful for the unbiased identification of time periods with elevated COVID-19 risk, without sensitivity to spatial heterogeneity of neither population nor testing. Our results also provide insights regarding regional prioritization of testing and the consequences of potential synchronization of epidemics between regions.
△ Less
Submitted 11 December, 2020; v1 submitted 7 October, 2020;
originally announced October 2020.
-
Relations between Reeb graphs, systems of hypersurfaces and epimorphisms onto free groups
Authors:
Wacław Marzantowicz,
Łukasz Patryk Michalak
Abstract:
We construct a correspondence between epimorphisms $\varphi \colon π_1(M) \to F_r$ from the fundamental group of a compact manifold $M$ onto the free group of rank $r$, and systems of $r$ framed non-separating hypersurfaces in $M$, which induces a bijection onto framed cobordism classes of such systems. In consequence, for closed manifolds any such $\varphi$ can be represented by the Reeb epimorph…
▽ More
We construct a correspondence between epimorphisms $\varphi \colon π_1(M) \to F_r$ from the fundamental group of a compact manifold $M$ onto the free group of rank $r$, and systems of $r$ framed non-separating hypersurfaces in $M$, which induces a bijection onto framed cobordism classes of such systems. In consequence, for closed manifolds any such $\varphi$ can be represented by the Reeb epimorphism of a Morse function $f\colon M \to \mathbb{R}$, i.e. by the epimorphism induced by the quotient map $M \to \mathcal{R}(f)$ onto the Reeb graph of $f$. Applying this construction we discuss the problem of classification up to (strong) equivalence of epimorphisms onto free groups, providing a new purely geometrical-topological proof of the solution of this problem for surface groups.
△ Less
Submitted 4 March, 2024; v1 submitted 6 February, 2020;
originally announced February 2020.
-
Monte Carlo Techniques for Approximating the Myerson Value -- Theoretical and Empirical Analysis
Authors:
Mateusz K. Tarkowski,
Szymon Matejczyk,
Tomasz P. Michalak,
Michael Wooldridge
Abstract:
Myerson first introduced graph-restricted games in order to model the interaction of cooperative players with an underlying communication network. A dedicated solution concept -- the Myerson value -- is perhaps the most important normative solution concept for cooperative games on graphs. Unfortunately, its computation is computationally challenging. In particular, although exact algorithms have b…
▽ More
Myerson first introduced graph-restricted games in order to model the interaction of cooperative players with an underlying communication network. A dedicated solution concept -- the Myerson value -- is perhaps the most important normative solution concept for cooperative games on graphs. Unfortunately, its computation is computationally challenging. In particular, although exact algorithms have been proposed, they must traverse all connected coalitions of the graph of which there may be exponentially many. In this paper, we consider the issue of approximating the Myerson value for arbitrary graphs and characteristic functions. While Monte Carlo approximations have been proposed for the related concept of the Shapley value, their suitability for the Myerson value has not been studied. Given this, we evaluate and compare (both theoretically and empiraclly) three Monte Carlo sampling methods for the Myerson value: conventional method of sampling permutations; a new, hybrid algorithm that combines exact computations and sampling; and sampling of connected coalitions. We find that our hybrid algorithm performs very well and also significantly improves on the conventional methods.
△ Less
Submitted 31 December, 2019;
originally announced January 2020.
-
Hiding in Multilayer Networks
Authors:
Marcin Waniek,
Tomasz P. Michalak,
Talal Rahwan
Abstract:
Multilayer networks allow for modeling complex relationships, where individuals are embedded in multiple social networks at the same time. Given the ubiquity of such relationships, these networks have been increasingly gaining attention in the literature. This paper presents the first analysis of the robustness of centrality measures against strategic manipulation in multilayer networks. More spec…
▽ More
Multilayer networks allow for modeling complex relationships, where individuals are embedded in multiple social networks at the same time. Given the ubiquity of such relationships, these networks have been increasingly gaining attention in the literature. This paper presents the first analysis of the robustness of centrality measures against strategic manipulation in multilayer networks. More specifically, we consider an "evader" who strategically chooses which connections to form in a multilayer network in order to obtain a low centrality-based ranking-thereby reducing the chance of being highlighted as a key figure in the network-while ensuring that she remains connected to a certain group of people. We prove that determining an optimal way to "hide" is NP-complete and hard to approximate for most centrality measures considered in our study. Moreover, we empirically evaluate a number of heuristics that the evader can use. Our results suggest that the centrality measures that are functions of the entire network topology are more robust to such a strategic evader than their counterparts which consider each layer separately.
△ Less
Submitted 14 November, 2019;
originally announced November 2019.
-
Adversarial Robustness of Similarity-Based Link Prediction
Authors:
Kai Zhou,
Tomasz P. Michalak,
Yevgeniy Vorobeychik
Abstract:
Link prediction is one of the fundamental problems in social network analysis. A common set of techniques for link prediction rely on similarity metrics which use the topology of the observed subnetwork to quantify the likelihood of unobserved links. Recently, similarity metrics for link prediction have been shown to be vulnerable to attacks whereby observations about the network are adversarially…
▽ More
Link prediction is one of the fundamental problems in social network analysis. A common set of techniques for link prediction rely on similarity metrics which use the topology of the observed subnetwork to quantify the likelihood of unobserved links. Recently, similarity metrics for link prediction have been shown to be vulnerable to attacks whereby observations about the network are adversarially modified to hide target links. We propose a novel approach for increasing robustness of similarity-based link prediction by endowing the analyst with a restricted set of reliable queries which accurately measure the existence of queried links. The analyst aims to robustly predict a collection of possible links by optimally allocating the reliable queries. We formalize the analyst problem as a Bayesian Stackelberg game in which they first choose the reliable queries, followed by an adversary who deletes a subset of links among the remaining (unreliable) queries by the analyst. The analyst in our model is uncertain about the particular target link the adversary attempts to hide, whereas the adversary has full information about the analyst and the network. Focusing on similarity metrics using only local information, we show that the problem is NP-Hard for both players, and devise two principled and efficient approaches for solving it approximately. Extensive experiments with real and synthetic networks demonstrate the effectiveness of our approach.
△ Less
Submitted 3 September, 2019;
originally announced September 2019.
-
Combinatorial modifications of Reeb graphs and the realization problem
Authors:
Łukasz Patryk Michalak
Abstract:
We prove that, up to homeomorphism, any graph subject to natural necessary conditions on orientation and the cycle rank can be realized as the Reeb graph of a Morse function on a given closed manifold $M$. Along the way, we show that the Reeb number $\mathcal{R}(M)$, i.e. the maximum cycle rank among all Reeb graphs of functions on $M$, is equal to the corank of fundamental group $π_1(M)$, thus ex…
▽ More
We prove that, up to homeomorphism, any graph subject to natural necessary conditions on orientation and the cycle rank can be realized as the Reeb graph of a Morse function on a given closed manifold $M$. Along the way, we show that the Reeb number $\mathcal{R}(M)$, i.e. the maximum cycle rank among all Reeb graphs of functions on $M$, is equal to the corank of fundamental group $π_1(M)$, thus extending a previous result of Gelbukh to the non-orientable case.
△ Less
Submitted 4 March, 2024; v1 submitted 19 November, 2018;
originally announced November 2018.
-
Strategic Attack & Defense in Security Diffusion Games
Authors:
Marcin Waniek,
Tomasz P. Michalak,
Aamena Alshamsi
Abstract:
Security games model the confrontation between a defender protecting a set of targets and an attacker who tries to capture them. A variant of these games assumes security interdependence between targets, facilitating contagion of an attack. So far only stochastic spread of an attack has been considered. In this work, we introduce a version of security games, where the attacker strategically drives…
▽ More
Security games model the confrontation between a defender protecting a set of targets and an attacker who tries to capture them. A variant of these games assumes security interdependence between targets, facilitating contagion of an attack. So far only stochastic spread of an attack has been considered. In this work, we introduce a version of security games, where the attacker strategically drives the entire spread of attack and where interconnections between nodes affect their susceptibility to be captured.
We find that the strategies effective in the settings without contagion or with stochastic contagion are no longer feasible when spread of attack is strategic. While in the former settings it was possible to efficiently find optimal strategies of the attacker, doing so in the latter setting turns out to be an NP-complete problem for an arbitrary network. However, for some simpler network structures, such as cliques, stars, and trees, we show that it is possible to efficiently find optimal strategies of both players. For arbitrary networks, we study and compare the efficiency of various heuristic strategies. As opposed to previous works with no or stochastic contagion, we find that centrality-based defense is often effective when spread of attack is strategic, particularly for centrality measures based on the Shapley value.
△ Less
Submitted 16 December, 2019; v1 submitted 23 September, 2018;
originally announced September 2018.
-
Attacking Similarity-Based Link Prediction in Social Networks
Authors:
Kai Zhou,
Tomasz P. Michalak,
Talal Rahwan,
Marcin Waniek,
Yevgeniy Vorobeychik
Abstract:
Link prediction is one of the fundamental problems in computational social science. A particularly common means to predict existence of unobserved links is via structural similarity metrics, such as the number of common neighbors; node pairs with higher similarity are thus deemed more likely to be linked. However, a number of applications of link prediction, such as predicting links in gang or ter…
▽ More
Link prediction is one of the fundamental problems in computational social science. A particularly common means to predict existence of unobserved links is via structural similarity metrics, such as the number of common neighbors; node pairs with higher similarity are thus deemed more likely to be linked. However, a number of applications of link prediction, such as predicting links in gang or terrorist networks, are adversarial, with another party incentivized to minimize its effectiveness by manipulating observed information about the network. We offer a comprehensive algorithmic investigation of the problem of attacking similarity-based link prediction through link deletion, focusing on two broad classes of such approaches, one which uses only local information about target links, and another which uses global network information. While we show several variations of the general problem to be NP-Hard for both local and global metrics, we exhibit a number of well-motivated special cases which are tractable. Additionally, we provide principled and empirically effective algorithms for the intractable cases, in some cases proving worst-case approximation guarantees.
△ Less
Submitted 31 December, 2018; v1 submitted 21 September, 2018;
originally announced September 2018.
-
Attack Tolerance of Link Prediction Algorithms: How to Hide Your Relations in a Social Network
Authors:
Marcin Waniek,
Kai Zhou,
Yevgeniy Vorobeychik,
Esteban Moro,
Tomasz P. Michalak,
Talal Rahwan
Abstract:
Link prediction is one of the fundamental research problems in network analysis. Intuitively, it involves identifying the edges that are most likely to be added to a given network, or the edges that appear to be missing from the network when in fact they are present. Various algorithms have been proposed to solve this problem over the past decades. For all their benefits, such algorithms raise ser…
▽ More
Link prediction is one of the fundamental research problems in network analysis. Intuitively, it involves identifying the edges that are most likely to be added to a given network, or the edges that appear to be missing from the network when in fact they are present. Various algorithms have been proposed to solve this problem over the past decades. For all their benefits, such algorithms raise serious privacy concerns, as they could be used to expose a connection between two individuals who wish to keep their relationship private. With this in mind, we investigate the ability of such individuals to evade link prediction algorithms. More precisely, we study their ability to strategically alter their connections so as to increase the probability that some of their connections remain unidentified by link prediction algorithms. We formalize this question as an optimization problem, and prove that finding an optimal solution is NP-complete. Despite this hardness, we show that the situation is not bleak in practice. In particular, we propose two heuristics that can easily be applied by members of the general public on existing social media. We demonstrate the effectiveness of those heuristics on a wide variety of networks and against a plethora of link prediction algorithms.
△ Less
Submitted 1 September, 2018;
originally announced September 2018.
-
Realization of a graph as the Reeb graph of a Morse function on a manifold
Authors:
Łukasz Patryk Michalak
Abstract:
We investigate the problem of the realization of a given graph as the Reeb graph $\mathcal{R}(f)$ of a smooth function $f\colon M\rightarrow \mathbb{R}$ with finitely many critical points, where $M$ is a closed manifold. We show that for any $n\geq2$ and any graph $Γ$ admitting the so called good orientation there exist an $n$-manifold $M$ and a Morse function $f\colon M\rightarrow \mathbb{R} $ su…
▽ More
We investigate the problem of the realization of a given graph as the Reeb graph $\mathcal{R}(f)$ of a smooth function $f\colon M\rightarrow \mathbb{R}$ with finitely many critical points, where $M$ is a closed manifold. We show that for any $n\geq2$ and any graph $Γ$ admitting the so called good orientation there exist an $n$-manifold $M$ and a Morse function $f\colon M\rightarrow \mathbb{R} $ such that its Reeb graph $\mathcal{R}(f)$ is isomorphic to $Γ$, extending previous results of Sharko and Masumoto-Saeki. We prove that Reeb graphs of simple Morse functions maximize the number of cycles. Furthermore, we provide a complete characterization of graphs which can arise as Reeb graphs of surfaces.
△ Less
Submitted 17 September, 2018; v1 submitted 17 May, 2018;
originally announced May 2018.
-
Game-theoretic Network Centrality: A Review
Authors:
Mateusz K. Tarkowski,
Tomasz P. Michalak,
Talal Rahwan,
Michael Wooldridge
Abstract:
Game-theoretic centrality is a flexible and sophisticated approach to identify the most important nodes in a network. It builds upon the methods from cooperative game theory and network theory. The key idea is to treat nodes as players in a cooperative game, where the value of each coalition is determined by certain graph-theoretic properties. Using solution concepts from cooperative game theory,…
▽ More
Game-theoretic centrality is a flexible and sophisticated approach to identify the most important nodes in a network. It builds upon the methods from cooperative game theory and network theory. The key idea is to treat nodes as players in a cooperative game, where the value of each coalition is determined by certain graph-theoretic properties. Using solution concepts from cooperative game theory, it is then possible to measure how responsible each node is for the worth of the network.
The literature on the topic is already quite large, and is scattered among game-theoretic and computer science venues. We review the main game-theoretic network centrality measures from both bodies of literature and organize them into two categories: those that are more focused on the connectivity of nodes, and those that are more focused on the synergies achieved by nodes in groups. We present and explain each centrality, with a focus on algorithms and complexity.
△ Less
Submitted 30 December, 2017;
originally announced January 2018.
-
sense2vec - A Fast and Accurate Method for Word Sense Disambiguation In Neural Word Embeddings
Authors:
Andrew Trask,
Phil Michalak,
John Liu
Abstract:
Neural word representations have proven useful in Natural Language Processing (NLP) tasks due to their ability to efficiently model complex semantic and syntactic word relationships. However, most techniques model only one representation per word, despite the fact that a single word can have multiple meanings or "senses". Some techniques model words by using multiple vectors that are clustered bas…
▽ More
Neural word representations have proven useful in Natural Language Processing (NLP) tasks due to their ability to efficiently model complex semantic and syntactic word relationships. However, most techniques model only one representation per word, despite the fact that a single word can have multiple meanings or "senses". Some techniques model words by using multiple vectors that are clustered based on context. However, recent neural approaches rarely focus on the application to a consuming NLP algorithm. Furthermore, the training process of recent word-sense models is expensive relative to single-sense embedding processes. This paper presents a novel approach which addresses these concerns by modeling multiple embeddings for each word based on supervised disambiguation, which provides a fast and accurate way for a consuming NLP model to select a sense-disambiguated embedding. We demonstrate that these embeddings can disambiguate both contrastive senses such as nominal and verbal senses as well as nuanced senses such as sarcasm. We further evaluate Part-of-Speech disambiguated embeddings on neural dependency parsing, yielding a greater than 8% average error reduction in unlabeled attachment scores across 6 languages.
△ Less
Submitted 19 November, 2015;
originally announced November 2015.
-
Coalition Structure Generation on Graphs
Authors:
Talal Rahwan,
Tomasz P. Michalak
Abstract:
Two fundamental algorithm-design paradigms are Tree Search and Dynamic Programming. The techniques used therein have been shown to complement one another when solving the complete set partitioning problem, also known as the coalition structure generation problem [5]. Inspired by this observation, we develop in this paper an algorithm to solve the coalition structure generation problem on graphs, w…
▽ More
Two fundamental algorithm-design paradigms are Tree Search and Dynamic Programming. The techniques used therein have been shown to complement one another when solving the complete set partitioning problem, also known as the coalition structure generation problem [5]. Inspired by this observation, we develop in this paper an algorithm to solve the coalition structure generation problem on graphs, where the goal is to identifying an optimal partition of a graph into connected subgraphs. More specifically, we develop a new depth-first search algorithm, and combine it with an existing dynamic programming algorithm due to Vinyals et al. [9]. The resulting hybrid algorithm is empirically shown to significantly outperform both its constituent parts when the subset-evaluation function happens to have certain intuitive properties.
△ Less
Submitted 23 August, 2018; v1 submitted 23 October, 2014;
originally announced October 2014.
-
How good is the Shapley value-based approach to the influence maximization problem?
Authors:
Kamil Adamczewski,
Szymon Matejczyk,
Tomasz P. Michalak
Abstract:
The Shapley value has been recently advocated as a method to choose the seed nodes for the process of information diffusion. Intuitively, since the Shapley value evaluates the average marginal contribution of a player to the coalitional game, it can be used in the network context to evaluate the marginal contribution of a node in the process of information diffusion given various groups of already…
▽ More
The Shapley value has been recently advocated as a method to choose the seed nodes for the process of information diffusion. Intuitively, since the Shapley value evaluates the average marginal contribution of a player to the coalitional game, it can be used in the network context to evaluate the marginal contribution of a node in the process of information diffusion given various groups of already 'infected' nodes. Although the above direction of research seems promising, the current liter- ature is missing a throughout assessment of its performance. The aim of this work is to provide such an assessment of the existing Shapley value-based approaches to information diffusion.
△ Less
Submitted 27 September, 2014;
originally announced September 2014.
-
Efficient Computation of the Shapley Value for Game-Theoretic Network Centrality
Authors:
Tomasz Pawel Michalak,
Karthik V Aadithya,
Piotr L. Szczepanski,
Balaraman Ravindran,
Nicholas R. Jennings
Abstract:
The Shapley value---probably the most important normative payoff division scheme in coalitional games---has recently been advocated as a useful measure of centrality in networks. However, although this approach has a variety of real-world applications (including social and organisational networks, biological networks and communication networks), its computational properties have not been widely st…
▽ More
The Shapley value---probably the most important normative payoff division scheme in coalitional games---has recently been advocated as a useful measure of centrality in networks. However, although this approach has a variety of real-world applications (including social and organisational networks, biological networks and communication networks), its computational properties have not been widely studied. To date, the only practicable approach to compute Shapley value-based centrality has been via Monte Carlo simulations which are computationally expensive and not guaranteed to give an exact answer. Against this background, this paper presents the first study of the computational aspects of the Shapley value for network centralities. Specifically, we develop exact analytical formulae for Shapley value-based centrality in both weighted and unweighted networks and develop efficient (polynomial time) and exact algorithms based on them. We empirically evaluate these algorithms on two real-life examples (an infrastructure network representing the topology of the Western States Power Grid and a collaboration network from the field of astrophysics) and demonstrate that they deliver significant speedups over the Monte Carlo approach. For instance, in the case of unweighted networks our algorithms are able to return the exact solution about 1600 times faster than the Monte Carlo approximation, even if we allow for a generous 10% error margin for the latter method.
△ Less
Submitted 3 February, 2014;
originally announced February 2014.
-
The Shapley Axiomatization for Values in Partition Function Games
Authors:
Oskar Skibski,
Tomasz P. Michalak,
Michael Wooldridge
Abstract:
One of the long-debated issues in coalitional game theory is how to extend the Shapley value to games with externalities (partition-function games). When externalities are present, not only can a player's marginal contribution - a central notion to the Shapley value - be defined in a variety of ways, but it is also not obvious which axiomatization should be used. Consequently, a number of authors…
▽ More
One of the long-debated issues in coalitional game theory is how to extend the Shapley value to games with externalities (partition-function games). When externalities are present, not only can a player's marginal contribution - a central notion to the Shapley value - be defined in a variety of ways, but it is also not obvious which axiomatization should be used. Consequently, a number of authors extended the Shapley value using complex and often unintuitive axiomatizations. Furthermore, no algorithm to approximate any extension of the Shapley value to partition-function games has been proposed to date. Given this background, we prove in this paper that, for any well-defined measure of marginal contribution, Shapley's original four axioms imply a unique value for games with externalities. As an consequence of this general theorem, we show that values proposed by Macho-Stadler et al., McQuillin and Bolger can be derived from Shapley's axioms. Building upon our analysis of marginal contribution, we develop a general algorithm to approximate extensions of the Shapley value to games with externalities using a Monte Carlo simulation technique.
△ Less
Submitted 28 August, 2013;
originally announced August 2013.
-
Matching Games with Additive Externalities
Authors:
Simina Brânzei,
Tomasz P. Michalak,
Talal Rahwan,
Kate Larson,
Nicholas R. Jennings
Abstract:
Two-sided matchings are an important theoretical tool used to model markets and social interactions. In many real life problems the utility of an agent is influenced not only by their own choices, but also by the choices that other agents make. Such an influence is called an externality. Whereas fully expressive representations of externalities in matchings require exponential space, in this paper…
▽ More
Two-sided matchings are an important theoretical tool used to model markets and social interactions. In many real life problems the utility of an agent is influenced not only by their own choices, but also by the choices that other agents make. Such an influence is called an externality. Whereas fully expressive representations of externalities in matchings require exponential space, in this paper we propose a compact model of externalities, in which the influence of a match on each agent is computed additively. In this framework, we analyze many-to-many and one-to-one matchings under neutral, optimistic, and pessimistic behaviour, and provide both computational hardness results and polynomial-time algorithms for computing stable outcomes.
△ Less
Submitted 16 July, 2012;
originally announced July 2012.