Skip to main content

Showing 1–21 of 21 results for author: Vaccaro, U

Searching in archive cs. Search in all archives.
.
  1. A Note on Equivalent Conditions for Majorization

    Authors: Roberto Bruno, Ugo Vaccaro

    Abstract: In this paper, we introduce novel characterizations of the classical concept of majorization in terms of upper triangular (resp., lower triangular) row-stochastic matrices, and in terms of sequences of linear transforms on vectors. We used our new characterizations of majorization to derive an improved entropy inequality.

    Submitted 13 May, 2024; originally announced May 2024.

    Comments: Published in: AIMS Mathematics - Special Issue on Mathematical Foundations of Information Theory

    Journal ref: AIMS Mathematics 2024, 9(4), 8641-8660

  2. Entropic Bounds on the Average Length of Codes with a Space

    Authors: Roberto Bruno, Ugo Vaccaro

    Abstract: We consider the problem of constructing prefix-free codes in which a designated symbol, a space, can only appear at the end of codewords. We provide a linear-time algorithm to construct almost-optimal codes with this property, meaning that their average length differs from the minimum possible by at most one. We obtain our results by uncovering a relation between our class of codes and the class o… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

    Comments: Published in Entropy 2024, 26, 283

    Journal ref: Entropy 2024, 26(4), 283;

  3. arXiv:2303.07211  [pdf, ps, other

    cs.IT cs.DS

    Bounds and Algorithms for Frameproof Codes and Related Combinatorial Structures

    Authors: Marco Dalai, Stefano Della Fiore, Adele A. Rescigno, Ugo Vaccaro

    Abstract: In this paper, we study upper bounds on the minimum length of frameproof codes introduced by Boneh and Shaw to protect copyrighted materials. A $q$-ary $(k,n)$-frameproof code of length $t$ is a $t \times n$ matrix having entries in $\{0,1,\ldots, q-1\}$ and with the property that for any column $\mathbf{c}$ and any other $k$ columns, there exists a row where the symbols of the $k$ columns are all… ▽ More

    Submitted 13 March, 2023; originally announced March 2023.

    Comments: 5 pages plus extra one reference page, accepted to the IEEE Information Theory Workshop (ITW 2023)

  4. arXiv:2208.14066  [pdf, ps, other

    cs.IT cs.DS math.CO

    Achievable Rates and Algorithms for Group Testing with Runlength Constraints

    Authors: Stefano Della Fiore, Marco Dalai, Ugo Vaccaro

    Abstract: In this paper, we study bounds on the minimum length of $(k,n,d)$-superimposed codes introduced by Agarwal et al. [1], in the context of Non-Adaptive Group Testing algorithms with runlength constraints. A $(k,n,d)$-superimposed code of length $t$ is a $t \times n$ binary matrix such that any two 1's in each column are separated by a run of at least $d$ 0's, and such that for any column… ▽ More

    Submitted 30 August, 2022; originally announced August 2022.

    Comments: 5 pages plus extra one reference page, accepted to the IEEE Information Theory Workshop (ITW 2022)

  5. arXiv:1901.07530  [pdf, other

    cs.IT cs.DS

    Minimum--Entropy Couplings and their Applications

    Authors: Ferdinando Cicalese, Luisa Gargano, Ugo Vaccaro

    Abstract: Given two discrete random variables $X$ and $Y,$ with probability distributions ${\bf p}=(p_1, \ldots , p_n)$ and ${\bf q}=(q_1, \ldots , q_m)$, respectively, denote by ${\cal C}({\bf p}, {\bf q})$ the set of all couplings of ${\bf p}$ and ${\bf q}$, that is, the set of all bivariate probability distributions that have ${\bf p}$ and ${\bf q}$ as marginals. In this paper, we study the problem of fi… ▽ More

    Submitted 19 January, 2019; originally announced January 2019.

    Comments: This paper has been accepted for publication in IEEE Transactions on Information Theory. arXiv admin note: text overlap with arXiv:1701.05243

  6. arXiv:1807.06921  [pdf, ps, other

    cs.DS cs.SI math.CO physics.soc-ph

    Time-Bounded Influence Diffusion with Incentives

    Authors: Gennaro Cordasco, Luisa Gargano, Joseph Peters, Adele Anna Rescigno, Ugo Vaccaro

    Abstract: A widely studied model of influence diffusion in social networks represents the network as a graph $G=(V,E)$ with an influence threshold $t(v)$ for each node. Initially the members of an initial set $S\subseteq V$ are influenced. During each subsequent round, the set of influenced nodes is augmented by including every node $v$ that has at least $t(v)$ previously influenced neighbours. The general… ▽ More

    Submitted 18 July, 2018; originally announced July 2018.

    Comments: An extended abstract of this paper was presented at the 25th International Colloquium on Structural Information and Communication Complexity (Sirocco 2018) June 18-21, 2018 Ma'ale HaHamisha, Israel

  7. arXiv:1805.05375  [pdf, ps, other

    cs.IT cs.DS

    Maximum Entropy Interval Aggregations

    Authors: Ferdinando Cicalese, Ugo Vaccaro

    Abstract: Given a probability distribution ${\bf p} = (p_1, \dots, p_n)$ and an integer $1\leq m < n$, we say that ${\bf q} = (q_1, \dots, q_m)$ is a contiguous $m$-aggregation of ${\bf p}$ if there exist indices $0=i_0 < i_1 < \cdots < i_{m-1} < i_m = n$ such that for each $j = 1, \dots, m$ it holds that $q_j = \sum_{k=i_{j-1}+1}^{i_j} p_k.$ In this paper, we consider the problem of efficiently finding the… ▽ More

    Submitted 14 May, 2018; originally announced May 2018.

    Comments: To be presented at ISIT 2018

  8. arXiv:1712.07906  [pdf, other

    cs.IT cs.DS

    Bounds on the Entropy of a Function of a Random Variable and their Applications

    Authors: Ferdinando Cicalese, Luisa Gargano, Ugo Vaccaro

    Abstract: It is well known that the entropy $H(X)$ of a discrete random variable $X$ is always greater than or equal to the entropy $H(f(X))$ of a function $f$ of $X$, with equality if and only if $f$ is one-to-one. In this paper, we give tight bounds on $H(f(X))$ when the function $f$ is not one-to-one, and we illustrate a few scenarios where this matters. As an intermediate step towards our main result, w… ▽ More

    Submitted 21 December, 2017; originally announced December 2017.

    Comments: Accepted for publications to IEEE Transactions on Information Theory

  9. arXiv:1704.07059  [pdf, ps, other

    cs.IT

    $H(X)$ vs. $H(f(X))$

    Authors: Ferdinando Cicalese, Luisa Gargano, Ugo Vaccaro

    Abstract: It is well known that the entropy $H(X)$ of a finite random variable is always greater or equal to the entropy $H(f(X))$ of a function $f$ of $X$, with equality if and only if $f$ is one-to-one. In this paper, we give tights bounds on $H(f(X))$ when the function $f$ is not one-to-one, and we illustrate a few scenarios where this matters. As an intermediate step towards our main result, we prove a… ▽ More

    Submitted 24 April, 2017; originally announced April 2017.

    Comments: To appear in ISIT 2017

  10. arXiv:1701.05243  [pdf, ps, other

    cs.IT cs.DS

    How to Find a Joint Probability Distribution of Minimum Entropy (almost) given the Marginals

    Authors: Ferdinando Cicalese, Luisa Gargano, Ugo Vaccaro

    Abstract: Given two discrete random variables $X$ and $Y$, with probability distributions ${\bf p} =(p_1, \ldots , p_n)$ and ${\bf q}=(q_1, \ldots , q_m)$, respectively, denote by ${\cal C}({\bf p}, {\bf q})$ the set of all couplings of ${\bf p}$ and ${\bf q}$, that is, the set of all bivariate probability distributions that have ${\bf p}$ and ${\bf q}$ as marginals. In this paper, we study the problem of f… ▽ More

    Submitted 28 March, 2017; v1 submitted 18 January, 2017; originally announced January 2017.

    Comments: This new version extend the results of the previous version from the case of two random variables to the general case of $k\geq 2$ random variables

  11. arXiv:1611.08687  [pdf, ps, other

    cs.DS cs.SI math.CO physics.soc-ph

    Whom to befriend to influence people

    Authors: Gennaro Cordasco, Luisa Gargano, Manuel Lafond, Lata Narayanan, Adele A. Rescigno, Ugo Vaccaro, Kangkang Wu

    Abstract: Alice wants to join a new social network, and influence its members to adopt a new product or idea. Each person $v$ in the network has a certain threshold $t(v)$ for {\em activation}, i.e adoption of the product or idea. If $v$ has at least $t(v)$ activated neighbors, then $v$ will also become activated. If Alice wants to activate the entire social network, whom should she befriend? More generally… ▽ More

    Submitted 29 November, 2016; v1 submitted 26 November, 2016; originally announced November 2016.

  12. arXiv:1610.09486  [pdf, ps, other

    cs.DS cs.SI math.CO physics.soc-ph

    Evangelism in Social Networks: Algorithms and Complexity

    Authors: Gennaro Cordasco, Luisa Gargano, Adele Anna Rescigno, Ugo Vaccaro

    Abstract: We consider a population of interconnected individuals that, with respect to a piece of information, at each time instant can be subdivided into three (time-dependent) categories: agnostics, influenced, and evangelists. A dynamical process of information diffusion evolves among the individuals of the population according to the following rules. Initially, all individuals are agnostic. Then, a set… ▽ More

    Submitted 29 October, 2016; originally announced October 2016.

    Comments: An extended abstract of this paper was presented at the 27th International Workshop on Combinatorial Algorithms (IWOCA 2016), Helsinki, Finland, August 17-19, 2016

  13. arXiv:1610.03721  [pdf, ps, other

    cs.DS cs.SI math.CO physics.soc-ph

    Discovering Small Target Sets in Social Networks: A Fast and Effective Algorithm

    Authors: Gennaro Cordasco, Luisa Gargano, Marco Mecchia, Adele A. Rescigno, Ugo Vaccaro

    Abstract: Given a network represented by a graph $G=(V,E)$, we consider a dynamical process of influence diffusion in $G$ that evolves as follows: Initially only the nodes of a given $S\subseteq V$ are influenced; subsequently, at each round, the set of influenced nodes is augmented by all the nodes in the network that have a sufficiently large number of already influenced neighbors. The question is to dete… ▽ More

    Submitted 12 October, 2016; originally announced October 2016.

    Comments: A preliminary version of this paper was presented at the 9th Annual International Conference on Combinatorial Optimization and Applications (COCOA'15), December 18-20, 2015, Houston, Texas, USA

  14. arXiv:1605.02131  [pdf, other

    math.CO cs.DM

    Partial Covering Arrays: Algorithms and Asymptotics

    Authors: Kaushik Sarkar, Charles J. Colbourn, Annalisa De Bonis, Ugo Vaccaro

    Abstract: A covering array $\mathsf{CA}(N;t,k,v)$ is an $N\times k$ array with entries in $\{1, 2, \ldots , v\}$, for which every $N\times t$ subarray contains each $t$-tuple of $\{1, 2, \ldots , v\}^t$ among its rows. Covering arrays find application in interaction testing, including software and hardware testing, advanced materials development, and biological systems. A central question is to determine or… ▽ More

    Submitted 6 May, 2016; originally announced May 2016.

    MSC Class: 05B30 (primary); 05B40; 05D40; 68R05; 68W20 (secondary)

  15. arXiv:1512.06372  [pdf, ps, other

    cs.DS cs.SI math.CO physics.soc-ph

    Optimizing Spread of Influence in Weighted Social Networks via Partial Incentives

    Authors: Gennaro Cordasco, Luisa Gargano, Adele A. Rescigno, Ugo Vaccaro

    Abstract: A widely studied process of influence diffusion in social networks posits that the dynamics of influence diffusion evolves as follows: Given a graph $G=(V,E)$, representing the network, initially \emph{only} the members of a given $S\subseteq V$ are influenced; subsequently, at each round, the set of influenced nodes is augmented by all the nodes in the network that have a sufficiently large numbe… ▽ More

    Submitted 20 December, 2015; originally announced December 2015.

    Comments: An extended abstract of a preliminary version of this paper appeared in: Proceedings of 22nd International Colloquium on Structural Information and Communication Complexity (SIROCCO 2015), Lectures Notes in Computer Science vol. 9439, C. Scheideler (Ed.), pp. 119-134, 2015

  16. arXiv:1502.05599  [pdf, other

    cs.SI cs.DS math.CO

    Spread of Influence in Weighted Networks under Time and Budget Constraints

    Authors: Ferdinando Cicalese, Gennaro Cordasco, Luisa Gargano, Martin Milanic, Joseph Peters, Ugo Vaccaro

    Abstract: Given a network represented by a weighted directed graph G, we consider the problem of finding a bounded cost set of nodes S such that the influence spreading from S in G, within a given time bound, is as large as possible. The dynamic that governs the spread of influence is the following: initially only elements in S are influenced; subsequently at each round, the set of influenced elements is au… ▽ More

    Submitted 20 February, 2015; v1 submitted 15 February, 2015; originally announced February 2015.

    Comments: This paper will appear in the special issue of Theoretical Computer Science devoted to selected papers presented at Fun 2014

  17. arXiv:1404.3033  [pdf, ps, other

    cs.SI cs.DS math.CO

    How to go Viral: Cheaply and Quickly

    Authors: Ferdinando Cicalese, Gennaro Cordasco, Luisa Gargano, Martin Milanic, Joseph Peters, Ugo Vaccaro

    Abstract: Given a social network represented by a graph $G$, we consider the problem of finding a bounded cardinality set of nodes $S$ with the property that the influence spreading from $S$ in $G$ is as large as possible. The dynamics that govern the spread of influence is the following: initially only elements in $S$ are influenced; subsequently at each round, the set of influenced elements is augmented b… ▽ More

    Submitted 15 February, 2015; v1 submitted 11 April, 2014; originally announced April 2014.

    Comments: An extended abstract of this paper will appear in Proceedings of Seventh International conference on Fun with Algorithms (FUN 2014), Lectures Notes in Computer Science, Springer

    Journal ref: 7th International Conference, FUN 2014, Lipari Island, Sicily, Italy, July 1-3, 2014. Proceedings ISBN 978-3-319-07889-2

  18. arXiv:1311.5193  [pdf, ps, other

    cs.DS cs.SI math.CO physics.soc-ph

    Influence Diffusion in Social Networks under Time Window Constraints

    Authors: Luisa Gargano, Pavol Hell, Joseph G. Peters, Ugo Vaccaro

    Abstract: We study a combinatorial model of the spread of influence in networks that generalizes existing schemata recently proposed in the literature. In our model, agents change behaviors/opinions on the basis of information collected from their neighbors in a time interval of bounded size whereas agents are assumed to have unbounded memory in previously studied scenarios. In our mathematical framework, o… ▽ More

    Submitted 20 November, 2013; originally announced November 2013.

    Comments: An extended abstract of a preliminary version of this paper appeared in: Proceedings of 20th International Colloquium on Structural Information and Communication Complexity (Sirocco 2013), Lectures Notes in Computer Science vol. 8179, T. Moscibroda and A.A. Rescigno (Eds.), pp. 141-152, 2013

  19. arXiv:1303.6785  [pdf, ps, other

    cs.DS cs.SI math.CO

    Latency-Bounded Target Set Selection in Social Networks

    Authors: Ferdinando Cicalese, Gennaro Cordasco, Luisa Gargano, M. Milanic, Ugo Vaccaro

    Abstract: Motivated by applications in sociology, economy and medicine, we study variants of the Target Set Selection problem, first proposed by Kempe, Kleinberg and Tardos. In our scenario one is given a graph $G=(V,E)$, integer values $t(v)$ for each vertex $v$ (\emph{thresholds}), and the objective is to determine a small set of vertices (\emph{target set}) that activates a given number (or a given subse… ▽ More

    Submitted 17 April, 2014; v1 submitted 27 March, 2013; originally announced March 2013.

    Comments: An extended version of this paper will appear in Theoretical Computer Science, Elsevier. See also Proceedings of Computability in Europe 2013 (CiE 2013), The Nature of Computation: Logic, Algorithms, Applications, Lectures Notes in Computer Science, Springer

  20. arXiv:1012.1529  [pdf, other

    cs.DM cs.DS math.CO

    On the approximability and exact algorithms for vector domination and related problems in graphs

    Authors: Ferdinando Cicalese, Martin Milanic, Ugo Vaccaro

    Abstract: We consider two graph optimization problems called vector domination and total vector domination. In vector domination one seeks a small subset S of vertices of a graph such that any vertex outside S has a prescribed number of neighbors in S. In total vector domination, the requirement is extended to all vertices of the graph. We prove that these problems (and several variants thereof) cannot be a… ▽ More

    Submitted 5 January, 2013; v1 submitted 7 December, 2010; originally announced December 2010.

    Comments: In the version published in DAM, weaker lower bounds for vector domination and total vector domination were stated. Being these problems generalization of domination and total domination, the lower bounds of 0.2267 ln n and (1-epsilon) ln n clearly hold for both problems, unless P = NP or NP \subseteq DTIME(n^{O(log log n)}), respectively. The claims are corrected in the present version

    MSC Class: 68Q17; 68Q25; 68W25 ACM Class: F.2.2; G.2.2

    Journal ref: Discrete Applied Mathematics 2012 (online)

  21. arXiv:1010.1024  [pdf, ps, other

    cs.DS cs.DM cs.IT

    Superselectors: Efficient Constructions and Applications

    Authors: Ferdinando Cicalese, Ugo Vaccaro

    Abstract: We introduce a new combinatorial structure: the superselector. We show that superselectors subsume several important combinatorial structures used in the past few years to solve problems in group testing, compressed sensing, multi-channel conflict resolution and data security. We prove close upper and lower bounds on the size of superselectors and we provide efficient algorithms for their construc… ▽ More

    Submitted 5 October, 2010; originally announced October 2010.

    MSC Class: 68R05; 68W40; 68P30; 68P05; 68P10 ACM Class: G.2.1; F.2.2; E.4