Collaborative learning of stochastic bandits over a social network
We consider a collaborative online learning paradigm, wherein a group of agents connected
through a social network are engaged in learning a stochastic multi-armed bandit problem …
through a social network are engaged in learning a stochastic multi-armed bandit problem …
Node-differentially private estimation of the number of connected components
We design the first node-differentially private algorithm for approximating the number of
connected components in a graph. Given a database representing an n-vertex graph G and …
connected components in a graph. Given a database representing an n-vertex graph G and …
A graphical representation of membrane filtration
We analyze the performance of membrane filters represented by pore networks using two
criteria:(1) total volumetric throughput of filtrate over the filter lifetime and (2) accumulated …
criteria:(1) total volumetric throughput of filtrate over the filter lifetime and (2) accumulated …
Core-periphery models for hypergraphs
We introduce a random hypergraph model for core-periphery structure. By leveraging our
model's sufficient statistics, we develop a novel statistical inference algorithm that is able to …
model's sufficient statistics, we develop a novel statistical inference algorithm that is able to …
Network analysis of the NetHealth data: exploring co-evolution of individuals' social network positions and physical activities
Understanding the relationship between individuals' social networks and health could help
devise public health interventions for reducing incidence of unhealthy behaviors or …
devise public health interventions for reducing incidence of unhealthy behaviors or …
Linear Bandits With Side Observations on Networks
We investigate linear bandits in a network setting in the presence of side-observations
across nodes in order to design recommendation algorithms for users connected via social …
across nodes in order to design recommendation algorithms for users connected via social …
[HTML][HTML] Distributed Consensus Gossip-Based Data Fusion for Suppressing Incorrect Sensor Readings in Wireless Sensor Networks
M Kenyeres, J Kenyeres… - Journal of Low Power …, 2025 - mdpi.com
Incorrect sensor readings can cause serious problems in Wireless Sensor Networks
(WSNs), potentially disrupting the operation of the entire system. As shown in the literature …
(WSNs), potentially disrupting the operation of the entire system. As shown in the literature …
The iterated local transitivity model for tournaments
A Bonato, K Chaudhary - … Workshop on Algorithms and Models for the …, 2023 - Springer
A key generative principle within social and other complex networks is transitivity, where
friends of friends are more likely friends. We propose a new model for highly dense complex …
friends of friends are more likely friends. We propose a new model for highly dense complex …
Sublinear domination and core–periphery networks
M Papachristou - Scientific Reports, 2021 - nature.com
In this paper we devise a generative random network model with core–periphery properties
whose core nodes act as sublinear dominators, that is, if the network has n nodes, the core …
whose core nodes act as sublinear dominators, that is, if the network has n nodes, the core …
Biased domination games
We consider a biased version of Maker-Breaker domination games, which were recently
introduced by Gledel, Ir {\v {s}} i {\v {c}}, and Klav {\v {z}} ar. Two players, Dominator and …
introduced by Gledel, Ir {\v {s}} i {\v {c}}, and Klav {\v {z}} ar. Two players, Dominator and …