Collaborative learning of stochastic bandits over a social network

RK Kolla, K Jagannathan… - IEEE/ACM Transactions …, 2018 - ieeexplore.ieee.org
We consider a collaborative online learning paradigm, wherein a group of agents connected
through a social network are engaged in learning a stochastic multi-armed bandit problem …

Node-differentially private estimation of the number of connected components

I Kalemaj, S Raskhodnikova, A Smith… - Proceedings of the …, 2023 - dl.acm.org
We design the first node-differentially private algorithm for approximating the number of
connected components in a graph. Given a database representing an n-vertex graph G and …

A graphical representation of membrane filtration

B Gu, L Kondic, LJ Cummings - SIAM Journal on Applied Mathematics, 2022 - SIAM
We analyze the performance of membrane filters represented by pore networks using two
criteria:(1) total volumetric throughput of filtrate over the filter lifetime and (2) accumulated …

Core-periphery models for hypergraphs

M Papachristou, J Kleinberg - Proceedings of the 28th ACM SIGKDD …, 2022 - dl.acm.org
We introduce a random hypergraph model for core-periphery structure. By leveraging our
model's sufficient statistics, we develop a novel statistical inference algorithm that is able to …

Network analysis of the NetHealth data: exploring co-evolution of individuals' social network positions and physical activities

S Liu, D Hachen, O Lizardo, C Poellabauer… - Applied network …, 2018 - Springer
Understanding the relationship between individuals' social networks and health could help
devise public health interventions for reducing incidence of unhealthy behaviors or …

Linear Bandits With Side Observations on Networks

A Kar, R Singh, F Liu, X Liu… - IEEE/ACM Transactions …, 2024 - ieeexplore.ieee.org
We investigate linear bandits in a network setting in the presence of side-observations
across nodes in order to design recommendation algorithms for users connected via social …

[HTML][HTML] Distributed Consensus Gossip-Based Data Fusion for Suppressing Incorrect Sensor Readings in Wireless Sensor Networks

M Kenyeres, J Kenyeres… - Journal of Low Power …, 2025 - mdpi.com
Incorrect sensor readings can cause serious problems in Wireless Sensor Networks
(WSNs), potentially disrupting the operation of the entire system. As shown in the literature …

The iterated local transitivity model for tournaments

A Bonato, K Chaudhary - … Workshop on Algorithms and Models for the …, 2023 - Springer
A key generative principle within social and other complex networks is transitivity, where
friends of friends are more likely friends. We propose a new model for highly dense complex …

Sublinear domination and core–periphery networks

M Papachristou - Scientific Reports, 2021 - nature.com
In this paper we devise a generative random network model with core–periphery properties
whose core nodes act as sublinear dominators, that is, if the network has n nodes, the core …

Biased domination games

AD Bagdas, D Clemens, F Hamann… - arxiv preprint arxiv …, 2024 - arxiv.org
We consider a biased version of Maker-Breaker domination games, which were recently
introduced by Gledel, Ir {\v {s}} i {\v {c}}, and Klav {\v {z}} ar. Two players, Dominator and …