Skip to main content

Showing 1–14 of 14 results for author: Gutfraind, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2309.03133  [pdf

    q-fin.RM cs.AI math.OC

    Risk-reducing design and operations toolkit: 90 strategies for managing risk and uncertainty in decision problems

    Authors: Alexander Gutfraind

    Abstract: Uncertainty is a pervasive challenge in decision analysis, and decision theory recognizes two classes of solutions: probabilistic models and cognitive heuristics. However, engineers, public planners and other decision-makers instead use a third class of strategies that could be called RDOT (Risk-reducing Design and Operations Toolkit). These include incorporating robustness into designs, contingen… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

    MSC Class: 60A05; 91B05; 62C05 ACM Class: F.1.3

  2. arXiv:2301.10244  [pdf

    cs.AI math.OC math.PR

    On solving decision and risk management problems subject to uncertainty

    Authors: Alexander Gutfraind

    Abstract: Uncertainty is a pervasive challenge in decision and risk management and it is usually studied by quantification and modeling. Interestingly, engineers and other decision makers usually manage uncertainty with strategies such as incorporating robustness, or by employing decision heuristics. The focus of this paper is then to develop a systematic understanding of such strategies, determine their ra… ▽ More

    Submitted 18 January, 2023; originally announced January 2023.

    Comments: 12 pages

    MSC Class: 60A05; 91B05; 62C05 ACM Class: F.1.3

  3. arXiv:1912.13032  [pdf

    cs.LG stat.ML

    Using massive health insurance claims data to predict very high-cost claimants: a machine learning approach

    Authors: José M. Maisog, Wenhong Li, Yanchun Xu, Brian Hurley, Hetal Shah, Ryan Lemberg, Tina Borden, Stephen Bandeian, Melissa Schline, Roxanna Cross, Alan Spiro, Russ Michael, Alexander Gutfraind

    Abstract: Due to escalating healthcare costs, accurately predicting which patients will incur high costs is an important task for payers and providers of healthcare. High-cost claimants (HiCCs) are patients who have annual costs above $\$250,000… ▽ More

    Submitted 30 December, 2019; originally announced December 2019.

    Comments: 34 pages, 2 figures, In review in PLoS ONE

    MSC Class: J.3; I.2.6 ACM Class: J.3; I.2.6

  4. arXiv:1901.07313  [pdf

    cs.CR

    Risk analysis beyond vulnerability and resilience - characterizing the defensibility of critical systems

    Authors: Vicki Bier, Alexander Gutfraind

    Abstract: A common problem in risk analysis is to characterize the overall security of a system of valuable assets (e.g., government buildings or communication hubs), and to suggest measures to mitigate any hazards or security threats. Currently, analysts typically rely on a combination of indices, such as resilience, robustness, redundancy, security, and vulnerability. However, these indices are not by the… ▽ More

    Submitted 8 January, 2019; originally announced January 2019.

    Comments: 36 pages; Keywords: Risk Analysis, Defensibility, Vulnerability, Resilience, Counter-terrorism

    Journal ref: European Journal of Operational Research 2019

  5. arXiv:1802.09617  [pdf, other

    cs.SI cs.DS

    Multiscale Planar Graph Generation

    Authors: Varsha Chauhan, Alexander Gutfraind, Ilya Safro

    Abstract: The study of network representations of physical, biological, and social phenomena can help us better understand the structural and functional dynamics of their networks and formulate predictive models of these phenomena. However, due to the scarcity of real-world network data owing to factors such as cost and effort required in collection of network data and the sensitivity of this data towards t… ▽ More

    Submitted 12 May, 2019; v1 submitted 26 February, 2018; originally announced February 2018.

  6. arXiv:1609.02121  [pdf, other

    cs.SI cs.DS physics.soc-ph

    Generating realistic scaled complex networks

    Authors: Christian L. Staudt, Michael Hamann, Alexander Gutfraind, Ilya Safro, Henning Meyerhenke

    Abstract: Research on generative models is a central project in the emerging field of network science, and it studies how statistical patterns found in real networks could be generated by formal rules. Output from these generative models is then the basis for designing and evaluating computational methods on networks, and for verification and simulation studies. During the last two decades, a variety of mod… ▽ More

    Submitted 23 March, 2017; v1 submitted 7 September, 2016; originally announced September 2016.

    Comments: 26 pages, 13 figures, extended version, a preliminary version of the paper was presented at the 5th International Workshop on Complex Networks and their Applications

  7. arXiv:1411.3640  [pdf, other

    cs.DM

    Network installation and recovery: approximation lower bounds and faster exact formulations

    Authors: Alexander Gutfraind, Jeremy Kun, Ádám D. Lelkes, Lev Reyzin

    Abstract: We study the Neighbor Aided Network Installation Problem (NANIP) introduced previously which asks for a minimal cost ordering of the vertices of a graph, where the cost of visiting a node is a function of the number of neighbors that have already been visited. This problem has applications in resource management and disaster recovery. In this paper we analyze the computational hardness of NANIP. I… ▽ More

    Submitted 13 November, 2014; originally announced November 2014.

  8. arXiv:1207.4266  [pdf, other

    cs.DM cond-mat.stat-mech cs.SI math.CO physics.soc-ph

    Multiscale Network Generation

    Authors: Alexander Gutfraind, Lauren Ancel Meyers, Ilya Safro

    Abstract: Networks are widely used in science and technology to represent relationships between entities, such as social or ecological links between organisms, enzymatic interactions in metabolic systems, or computer infrastructure. Statistical analyses of networks can provide critical insights into the structure, function, dynamics, and evolution of those systems. However, the structures of real-world netw… ▽ More

    Submitted 18 July, 2012; originally announced July 2012.

    Comments: 28 pages

  9. arXiv:1207.2799  [pdf, other

    math.OC cs.DM

    Optimal recovery of damaged infrastructure network

    Authors: Alexander Gutfraind, Milan Bradonjić, Tim Novikoff

    Abstract: Natural disasters or attacks may disrupt infrastructure networks on a vast scale. Parts of the damaged network are interdependent, making it difficult to plan and optimally execute the recovery operations. To study how interdependencies affect the recovery schedule, we introduce a new discrete optimization problem where the goal is to minimize the total cost of installing (or recovering) a given n… ▽ More

    Submitted 11 July, 2012; originally announced July 2012.

    Comments: In review with Optimization Letters

  10. arXiv:1108.0894  [pdf, other

    cs.SI

    Evader Interdiction and Collateral Damage

    Authors: Matthew P. Johnson, Alexander Gutfraind

    Abstract: In network interdiction problems, evaders (e.g., hostile agents or data packets) may be moving through a network towards targets and we wish to choose locations for sensors in order to intercept the evaders before they reach their destinations. The evaders might follow deterministic routes or Markov chains, or they may be reactive}, i.e., able to change their routes in order to avoid sensors place… ▽ More

    Submitted 3 August, 2011; originally announced August 2011.

    Comments: Proceedings of the 7th International Symposium on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities (ALGOSENSORS) 2011

    Report number: LA-UR-11-10123 ACM Class: E.1; F.2; G.1.2

  11. arXiv:1009.0556  [pdf, other

    math.OC cs.DS

    Interdiction of a Markovian Evader

    Authors: Alexander Gutfraind, Aric A. Hagberg, David Izraelevitz, Feng Pan

    Abstract: Shortest path network interdiction is a combinatorial optimization problem on an activity network arising in a number of important security-related applications. It is classically formulated as a bilevel maximin problem representing an "interdictor" and an "evader". The evader tries to move from a source node to the target node along a path of the least cost while the interdictor attempts to frust… ▽ More

    Submitted 2 September, 2010; originally announced September 2010.

    Comments: Submitted to INFORMS Computing Society Conference (ICS2011)

    Report number: LA-UR-08-06551 ACM Class: I.2.8

  12. arXiv:1008.4776  [pdf, other

    cs.GT nlin.AO physics.soc-ph

    Targeting by Transnational Terrorist Groups

    Authors: Alexander Gutfraind

    Abstract: Many successful terrorist groups operate across international borders where different countries host different stages of terrorist operations. Often the recruits for the group come from one country or countries, while the targets of the operations are in another. Stop** such attacks is difficult because intervention in any region or route might merely shift the terrorists elsewhere. Here we prop… ▽ More

    Submitted 27 August, 2010; originally announced August 2010.

    Report number: LA-UR 10-05689

  13. arXiv:0911.4322  [pdf, other

    cs.DM cs.CC

    Markovian Network Interdiction and the Four Color Theorem

    Authors: Alexander Gutfraind, Kiyan Ahmadizadeh

    Abstract: The Unreactive Markovian Evader Interdiction Problem (UME) asks to optimally place sensors on a network to detect Markovian motion by one or more "evaders". It was previously proved that finding the optimal sensor placement is NP-hard if the number of evaders is unbounded. Here we show that the problem is NP-hard with just 2 evaders using a connection to coloring of planar graphs. The results su… ▽ More

    Submitted 22 November, 2009; originally announced November 2009.

    Comments: 7 pages, 2 figures

    Report number: LA-UR-09-07611 ACM Class: E.1; F.2; G.1.2

  14. arXiv:0903.0173  [pdf, ps, other

    cs.DM cs.CC cs.DS

    Optimal Interdiction of Unreactive Markovian Evaders

    Authors: Alexander Gutfraind, Aric Hagberg, Feng Pan

    Abstract: The interdiction problem arises in a variety of areas including military logistics, infectious disease control, and counter-terrorism. In the typical formulation of network interdiction, the task of the interdictor is to find a set of edges in a weighted network such that the removal of those edges would maximally increase the cost to an evader of traveling on a path through the network. Our w… ▽ More

    Submitted 1 March, 2009; originally announced March 2009.

    Comments: Accepted at the Sixth International Conference on integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems (CPAIOR 2009)

    Report number: LA-UR-09-00560 ACM Class: E.1; F.2; G.1.2

    Journal ref: CPAIOR 2009