Life Sciences strategy and analytics, ex-McKinsey
Dynamic surveillance and contact-tracing policies for outbreaks
By
S ESHGHI,
FW Crawford
Pre-print, last updated 2021
During an infectious disease outbreak, finding infected individuals is a necessary first step before targeted interventions can be administered (e.g., curative treatment, quarantine). Enhanced surveillance and contact-tracing are two policies that lead to the discovery of infected individuals in outbreaks. Enhanced surveillance involves augmenting baseline surveillance, due to infected individuals seeking treatment, by finding and treating infected individuals through (potentially random) testing. Once an index case has been found, contact-tracing involves finding, monitoring, and testing their contacts, and possibly contacts of their contacts, etc., for infection and subsequently treating the infected. Both of these policies are costly, having both fixed costs, e.g., training and wages to providers, and variable ones, e.g., providing information and care to found infected individuals. We show that, under a simple epidemic model, when these policies are dynamically coordinated, the optimal policy that balances a trade-off between disease burden and policy-related expenditure uses each of these methods at either their highest possible intensity or not at all. We also show that the optimal policy uses contact-tracing at a subset of the times at which enhanced surveillance is active. Furthermore, enhanced surveillance and contact-tracing are only switched on and off once, for all model parameters. This structure suggests simple heuristic policies that would be straightforward to implement in real-world responses to infectious disease outbreaks. We present a sample applications of this approach using data calibrated to the EVD outbreak in Liberia (2014-15) to retrospectively evaluate implemented case-finding policies against a counterfactual optimal.
During an infectious disease outbreak, finding infected individuals is a necessary first step before targeted interventions can be administered (e.g., curative treatment, quarantine). Enhanced surveillance and contact-tracing are two policies that lead to the discovery of infected individuals in outbreaks. Enhanced surveillance involves augmenting baseline surveillance, due to infected individuals seeking treatment, by finding and treating infected individuals through (potentially random) testing. Once an index case has been found, contact-tracing involves finding, monitoring, and testing their contacts, and possibly contacts of their contacts, etc., for infection and subsequently treating the infected. Both of these policies are costly, having both fixed costs, e.g., training and wages to providers, and variable ones, e.g., providing information and care to found infected individuals. We show that, under a simple epidemic model, when these policies are dynamically coordinated, the optimal policy that balances a trade-off between disease burden and policy-related expenditure uses each of these methods at either their highest possible intensity or not at all. We also show that the optimal policy uses contact-tracing at a subset of the times at which enhanced surveillance is active. Furthermore, enhanced surveillance and contact-tracing are only switched on and off once, for all model parameters. This structure suggests simple heuristic policies that would be straightforward to implement in real-world responses to infectious disease outbreaks. We present a sample applications of this approach using data calibrated to the EVD outbreak in Liberia (2014-15) to retrospectively evaluate implemented case-finding policies against a counterfactual optimal.
Modeling COVID-19 care capacity in a major health system
By
M Erlendsdottir,
S ESHGHI,
FW Crawford
Pre-print (medRxiv), last updated 2021
Hospital resources, especially critical care beds and ventilators, have been strained by additional demand throughout the COVID-19 pandemic. Rationing of scarce critical care resources may occur when available resource limits are exceeded. However, the dynamic nature of the COVID-19 pandemic and variability in projections of the future burden of COVID-19 infection pose challenges for optimizing resource allocation to critical care units in hospitals. Connecticut experienced a spike in the number of COVID-19 cases between March and June 2020. Uncertainty about future incidence made it difficult to predict the magnitude and duration of the increased COVID-19 burden on the healthcare system. In this paper, we describe a model of COVID-19 hospital capacity and occupancy that generates estimates of the resources necessary to accommodate COVID-19 patients under infection scenarios of varying severity. We present the model structure and dynamics, procedure for parameter estimation, and publicly available web application where we implemented the tool. We then describe calibration using data from over 3,000 COVID-19 patients seen at the Yale-New Haven Health System between March and July 2020. We conclude with recommendations for modeling tools to inform decision-making using incomplete information during future crises.
Hospital resources, especially critical care beds and ventilators, have been strained by additional demand throughout the COVID-19 pandemic. Rationing of scarce critical care resources may occur when available resource limits are exceeded. However, the dynamic nature of the COVID-19 pandemic and variability in projections of the future burden of COVID-19 infection pose challenges for optimizing resource allocation to critical care units in hospitals. Connecticut experienced a spike in the number of COVID-19 cases between March and June 2020. Uncertainty about future incidence made it difficult to predict the magnitude and duration of the increased COVID-19 burden on the healthcare system. In this paper, we describe a model of COVID-19 hospital capacity and occupancy that generates estimates of the resources necessary to accommodate COVID-19 patients under infection scenarios of varying severity. We present the model structure and dynamics, procedure for parameter estimation, and publicly available web application where we implemented the tool. We then describe calibration using data from over 3,000 COVID-19 patients seen at the Yale-New Haven Health System between March and July 2020. We conclude with recommendations for modeling tools to inform decision-making using incomplete information during future crises.
Defining high-value information for COVID-19 decision-making
By
COVID-19 Statistics, Policy modeling and Epidemiology Collective (C-SPEC)
(including S ESHGHI)
Pre-print (medRxiv), last updated 2020
Initial projections from the first generation of COVID-19 models focused public attention on worst-case scenarios in the absence of decisive policy action. These underscored the imperative for strong and immediate measures to slow the spread of infection. In the coming weeks, however, as policymakers continue enlisting models to inform decisions on COVID-19, answers to the most difficult and pressing policy questions will be much more sensitive to underlying uncertainties. In this study, we demonstrate a model-based approach to assessing the potential value of reducing critical uncertainties most salient to COVID-19 decision-making and discuss priorities for acquiring new data to reduce these uncertainties. We demonstrate how information about the impact of non-pharmaceutical interventions could narrow prediction intervals around hospitalizations over the next few weeks, while information about the prevalence of undetected cases could narrow prediction intervals around the timing and height of the peak of the epidemic.
Initial projections from the first generation of COVID-19 models focused public attention on worst-case scenarios in the absence of decisive policy action. These underscored the imperative for strong and immediate measures to slow the spread of infection. In the coming weeks, however, as policymakers continue enlisting models to inform decisions on COVID-19, answers to the most difficult and pressing policy questions will be much more sensitive to underlying uncertainties. In this study, we demonstrate a model-based approach to assessing the potential value of reducing critical uncertainties most salient to COVID-19 decision-making and discuss priorities for acquiring new data to reduce these uncertainties. We demonstrate how information about the impact of non-pharmaceutical interventions could narrow prediction intervals around hospitalizations over the next few weeks, while information about the prevalence of undetected cases could narrow prediction intervals around the timing and height of the peak of the epidemic.
Spread, then target, and advertise in waves: optimal budget allocation across advertising channels
By
S ESHGHI,
VM Preciado,
S Sarkar,
SS Venkatesh,
Q Zhao,
R D’Souza,
A Swami
IEEE Transactions on Network Science and Engineering (TNSE), vol. 7, no. 2, pp. 750–763, IEEE, 2020
We analyze optimal strategies for the allocation of a finite budget that can be invested in different advertising channels over time with the objective of influencing social opinions in a network of individuals. In our analysis, we consider both exogenous influence mechanisms, such as advertising campaigns, as well as endogenous mechanisms of social influence, such as word-of-mouth and peerpressure, which are modeled using diffusion dynamics. We show that for a general set of objective functions, the optimal influence strategy at every time uses all channels at either their maximum rate or not at all, i.e., a bang-bang strategy. Furthermore, we prove that the number of switches between these extremes is bounded above by a term that is typically much smaller than the number of agents. This means that the optimal influence strategy is to exert maximum effort in waves for every channel, and then cease effort and let the effects propagate. We also show that, at the beginning of the campaign, the total cost-adjusted reach of an exogenous advertising channel determines its relative value. In contrast, as we approach our investment horizon (e.g., election day), the optimal strategy is to invest in channels able to target individuals instead of broad-reaching channels. We demonstrate that the optimal influence strategies are easily computable in several practical cases, and explicitly characterize the optimal controls for the case of linear objective functions in closed form. Finally, we see that, in the canonical example of designing an election campaign, identifying late-deciders is a critical component in the optimal design.
We analyze optimal strategies for the allocation of a finite budget that can be invested in different advertising channels over time with the objective of influencing social opinions in a network of individuals. In our analysis, we consider both exogenous influence mechanisms, such as advertising campaigns, as well as endogenous mechanisms of social influence, such as word-of-mouth and peerpressure, which are modeled using diffusion dynamics. We show that for a general set of objective functions, the optimal influence strategy at every time uses all channels at either their maximum rate or not at all, i.e., a bang-bang strategy. Furthermore, we prove that the number of switches between these extremes is bounded above by a term that is typically much smaller than the number of agents. This means that the optimal influence strategy is to exert maximum effort in waves for every channel, and then cease effort and let the effects propagate. We also show that, at the beginning of the campaign, the total cost-adjusted reach of an exogenous advertising channel determines its relative value. In contrast, as we approach our investment horizon (e.g., election day), the optimal strategy is to invest in channels able to target individuals instead of broad-reaching channels. We demonstrate that the optimal influence strategies are easily computable in several practical cases, and explicitly characterize the optimal controls for the case of linear objective functions in closed form. Finally, we see that, in the canonical example of designing an election campaign, identifying late-deciders is a critical component in the optimal design.
Dynamic Policy Counterfactuals: Evaluating Contact-Tracing in the EVD Outbreak in Liberia 2014-15
By
S ESHGHI,
FW Crawford
Joint Statistical Meetings (JSM), 2020
In an acute infectious disease outbreak, finding infectives is a necessary precursor to treatment administration and exposure mitigation. Enhanced surveillance (ES), i.e., expanding random testing above baseline, and contact-tracing (CT) are 2 prominent case-finding policies. Once an index case is found, CT involves testing their contacts and treating the infected. Evaluating their empirical effectiveness requires careful model calibration and cost-assessment of dynamic counterfactuals. We use an epidemic model to show that the optimal dynamic coordinated case-finding policy that balances disease burden and policy-related expenditure only activates CT at maximal rate in a subset of the ES window, leading to a policy with up to 5 phases. We use prevalence and contact-tracing data from the 2014-15 EVD outbreak in Liberia to build assumption-free estimators of the empirical case-finding policy and the optimal (counterfactual) one. We estimate infection and response costs using standard-of-care, wage, and disease progression data. We find that the best such policy would have increased the ES window while curtailing CT. This finding is robust and matches on-the-ground observations.
In an acute infectious disease outbreak, finding infectives is a necessary precursor to treatment administration and exposure mitigation. Enhanced surveillance (ES), i.e., expanding random testing above baseline, and contact-tracing (CT) are 2 prominent case-finding policies. Once an index case is found, CT involves testing their contacts and treating the infected. Evaluating their empirical effectiveness requires careful model calibration and cost-assessment of dynamic counterfactuals. We use an epidemic model to show that the optimal dynamic coordinated case-finding policy that balances disease burden and policy-related expenditure only activates CT at maximal rate in a subset of the ES window, leading to a policy with up to 5 phases. We use prevalence and contact-tracing data from the 2014-15 EVD outbreak in Liberia to build assumption-free estimators of the empirical case-finding policy and the optimal (counterfactual) one. We estimate infection and response costs using standard-of-care, wage, and disease progression data. We find that the best such policy would have increased the ES window while curtailing CT. This finding is robust and matches on-the-ground observations.
Optimizing dynamic surveillance and contact-tracing policies for acute outbreaks, with application to the EVD outbreak in Liberia 2014-15
By
S ESHGHI,
FW Crawford
Harvard Center for Research on Computation and Society (CRCS) Rising Stars Workshop, 2020
Distributed algorithms for multi-layer connected edge dominating sets
By
D Papakostas,
S ESHGHI,
D Katsaros,
L Tassiulas
IEEE Control Systems Letters (L-CSS), vol. 3, no. 1, pp. 31–36, IEEE, 2019
Monitoring the state of communications in a distributed (multi-layer) network with differing node capabilities requires the maintenance of a backbone which is a connected edge dominating set. In this paper, we present distributed algorithms that provide efficient distributed solutions that can create such multi-layer resilient connected edge-dominating sets. After establishing the complexity of the problem and our proposed heuristics, we experimentally compare their performance while varying multiple characteristics of the underlying networks.
Monitoring the state of communications in a distributed (multi-layer) network with differing node capabilities requires the maintenance of a backbone which is a connected edge dominating set. In this paper, we present distributed algorithms that provide efficient distributed solutions that can create such multi-layer resilient connected edge-dominating sets. After establishing the complexity of the problem and our proposed heuristics, we experimentally compare their performance while varying multiple characteristics of the underlying networks.
Dynamic Surveillance and Contact-tracing Policies for Outbreaks
By
S ESHGHI,
WR KhudaBukhsh,
E Kenah,
GA Rempala,
FW Crawford
The Institute for Operations Research and the Management Sciences (INFORMS) Annual Meeting, 2019
Enhanced surveillance (ES) and contact-tracing (CT) are policies that find and treat infected individuals in outbreaks. ES augments baseline surveillance through random testing. Once an index case is found, CT finds and treats their infected contacts. Each policy has fixed and variable costs. Under a simple epidemic model, the optimal dynamic coordinated policy that balances a trade-off between disease burden and policy expenditure uses each of these policies at either their highest intensity or not at all, traces at a subset of the times it surveils, and only switches each on and off once. This structure suggests simple heuristic policies for real-world outbreaks.
Enhanced surveillance (ES) and contact-tracing (CT) are policies that find and treat infected individuals in outbreaks. ES augments baseline surveillance through random testing. Once an index case is found, CT finds and treats their infected contacts. Each policy has fixed and variable costs. Under a simple epidemic model, the optimal dynamic coordinated policy that balances a trade-off between disease burden and policy expenditure uses each of these policies at either their highest intensity or not at all, traces at a subset of the times it surveils, and only switches each on and off once. This structure suggests simple heuristic policies for real-world outbreaks.
Energy-aware distributed edge domination of multilayer networks
By
D Papakostas,
S ESHGHI,
D Katsaros,
L Tassiulas
American Control Conference (ACC), 2019
Monitoring and maintaining communications in a multilayer ad hoc wireless network requires a stable communication overlay. Such monitoring should be resilient, avoiding reliance on a single (or a few) layers, and energy-aware, not being vulnerable to the exhaustion of available energy in a single network element. Thus, there is possibly a trade-off between overlay size, interlayer connectivity and the energy distribution within the overlay. In this paper, we present three distributed energy-aware multilayer connected edge dominating set algorithms, show how they manage such trade-offs in practical scenarios, and show that CCEDS, a pruned centrality-based distributed algorithm, has the best performance.
Monitoring and maintaining communications in a multilayer ad hoc wireless network requires a stable communication overlay. Such monitoring should be resilient, avoiding reliance on a single (or a few) layers, and energy-aware, not being vulnerable to the exhaustion of available energy in a single network element. Thus, there is possibly a trade-off between overlay size, interlayer connectivity and the energy distribution within the overlay. In this paper, we present three distributed energy-aware multilayer connected edge dominating set algorithms, show how they manage such trade-offs in practical scenarios, and show that CCEDS, a pruned centrality-based distributed algorithm, has the best performance.
Efficient Influence Maximization Under Network Uncertainty
By
S ESHGHI,
S Maghsudi,
V Restocchi,
S Stein,
L Tassiulas
In INFOCOM Workshop on the Communications and Networking Aspects of Online Social Networks (CAOS), 2019
We consider the influence maximization (IM) problem in a partially visible social network. The goal is to design a decision-making framework for an autonomous agent to select a limited set of influential seed nodes to spread a message as widely as possible across the network. We consider the realistic case where only a partial section of the network is visible to the agent, while the rest is one of a finite set of known structures, each with a given realization probability. We show that solving the IM problem in this setting is NP-hard, and we provide analytical guarantees for the performance of a novel computationally-efficient seed-selection approximation algorithm for the agent. In empirical experiments on real-world social networks, we demonstrate the efficiency of our scheme and show that it outperforms state-of-the-art approaches that do not model the uncertainty.
We consider the influence maximization (IM) problem in a partially visible social network. The goal is to design a decision-making framework for an autonomous agent to select a limited set of influential seed nodes to spread a message as widely as possible across the network. We consider the realistic case where only a partial section of the network is visible to the agent, while the rest is one of a finite set of known structures, each with a given realization probability. We show that solving the IM problem in this setting is NP-hard, and we provide analytical guarantees for the performance of a novel computationally-efficient seed-selection approximation algorithm for the agent. In empirical experiments on real-world social networks, we demonstrate the efficiency of our scheme and show that it outperforms state-of-the-art approaches that do not model the uncertainty.
Energy-aware backbone formation in military multilayer ad hoc networks
By
D Papakostas,
S ESHGHI,
D Katsaros,
L Tassiulas
Ad Hoc Networks, vol. 81, pp. 17–44, Elsevier, 2018
Ad hoc networks designed for deployment in modern battlefields need to take care of traditional requirements related to their backbone’s size, their energy efficiency, their scalability in terms of network size, but also of their nature which allows for combining networks of different units that act altogether towards a common operational goal. This article develops a distributed algorithm for developing an energy-efficient backbone for military ad hoc network composed of multiple layers, namely E2CLB. The algorithm is based on the concepts of connected dominating sets and also on node centrality concepts, and results as a heuristic solution to the problem of calculating a maximum energy, minimum connected dominating set for a multilayer network by including into the dominating set those nodes which are highly connected to their and other layers (i.e., they have large centrality value) and moreover they are energy-rich. The computation and communication complexities of the algorithm are analyzed, and a thorough simulation-based evaluation of it against six competitors is presented. The results show that E2CLB is either the best performing algorithm across the examined performance measures or it is able to trade a very small increase in the size of the backbone’s network in order to reap improved performance in the energy realm.
Ad hoc networks designed for deployment in modern battlefields need to take care of traditional requirements related to their backbone’s size, their energy efficiency, their scalability in terms of network size, but also of their nature which allows for combining networks of different units that act altogether towards a common operational goal. This article develops a distributed algorithm for developing an energy-efficient backbone for military ad hoc network composed of multiple layers, namely E2CLB. The algorithm is based on the concepts of connected dominating sets and also on node centrality concepts, and results as a heuristic solution to the problem of calculating a maximum energy, minimum connected dominating set for a multilayer network by including into the dominating set those nodes which are highly connected to their and other layers (i.e., they have large centrality value) and moreover they are energy-rich. The computation and communication complexities of the algorithm are analyzed, and a thorough simulation-based evaluation of it against six competitors is presented. The results show that E2CLB is either the best performing algorithm across the examined performance measures or it is able to trade a very small increase in the size of the backbone’s network in order to reap improved performance in the energy realm.
Whistleblowing games in networks
By
S ESHGHI,
L Tassiulas
In 57th IEEE Conference on Decision and Control (CDC), 2018
We model the effect of networks on the uptake of risky innovations by workers and the policy-making of their employers as a Stackelberg game. We individuals can report specific instances of observed risky behavior to management, in contrast with anonymous cases where only the existence of such behavior is reported without mention of potential culprits. We contrast the subgame-perfect equilibria of the semi-anonymous model for general networks and for regular graphs with the corresponding anonymous whistleblowing case, in which whistleblowing has been shown to only flourish in a light-punishment regime. We observe that semi-anonymous whistleblowing can lead to better equilibrium outcomes for the manager, as the network structure induces differences in policies chosen by the workers which can be exploited by the manager to maintain moderate amounts of risky innovation. Workers will choose degreedependent threshold policies that instruct them to cheat if the audit probability is below the threshold and to report observed cheating otherwise. Without this network-induced heterogeneity (e.g., for regular graphs), the outcome of semi-anonymous whistleblowing resembles that of anonymous policies. Finally, we show that in a light-punishment regime, workers with the fewest neighbors will be the likeliest to cheat.
We model the effect of networks on the uptake of risky innovations by workers and the policy-making of their employers as a Stackelberg game. We individuals can report specific instances of observed risky behavior to management, in contrast with anonymous cases where only the existence of such behavior is reported without mention of potential culprits. We contrast the subgame-perfect equilibria of the semi-anonymous model for general networks and for regular graphs with the corresponding anonymous whistleblowing case, in which whistleblowing has been shown to only flourish in a light-punishment regime. We observe that semi-anonymous whistleblowing can lead to better equilibrium outcomes for the manager, as the network structure induces differences in policies chosen by the workers which can be exploited by the manager to maintain moderate amounts of risky innovation. Workers will choose degreedependent threshold policies that instruct them to cheat if the audit probability is below the threshold and to report observed cheating otherwise. Without this network-induced heterogeneity (e.g., for regular graphs), the outcome of semi-anonymous whistleblowing resembles that of anonymous policies. Finally, we show that in a light-punishment regime, workers with the fewest neighbors will be the likeliest to cheat.
Distributed algorithms for multi-layer connected edge-dominating sets
By
D Papakostas,
S ESHGHI,
D Katsaros,
L Tassiulas,
In 57th IEEE Conference on Decision and Control (CDC), 2018
Monitoring the state of communications in a distributed (multi-layer) network with differing node capabilities requires the maintenance of a backbone which is a connected edge dominating set. In this paper, we present distributed algorithms that provide efficient distributed solutions that can create such multi-layer resilient connected edge-dominating sets. After establishing the complexity of the problem and our proposed heuristics, we experimentally compare their performance while varying multiple characteristics of the underlying networks.
Monitoring the state of communications in a distributed (multi-layer) network with differing node capabilities requires the maintenance of a backbone which is a connected edge dominating set. In this paper, we present distributed algorithms that provide efficient distributed solutions that can create such multi-layer resilient connected edge-dominating sets. After establishing the complexity of the problem and our proposed heuristics, we experimentally compare their performance while varying multiple characteristics of the underlying networks.
Innovation, cheating, and whistleblowing - a game theoretic perspective
By
S ESHGHI,
L Tassiulas
In 52nd Annual Conference on Information Sciences and Systems (CISS), 2018
We model the coupled decision-making of workers and the policy-making of an organization in response to an effort-saving, yet risky innovation. We examine the cases where individuals can only alert the organization of wide-spread wrong-doing (anonymous whistleblowing) and where they can report specific illicit behavior (semi-anonymous reporting). We show that depending on policy parameters and individual characteristics, one of 4 equilibria may arise, with the interesting outcomes that whistleblowing only flourishes in a light-punishment regime, and that semi-anonymous reporting leads to the relative prevalence of illicit behavior.
We model the coupled decision-making of workers and the policy-making of an organization in response to an effort-saving, yet risky innovation. We examine the cases where individuals can only alert the organization of wide-spread wrong-doing (anonymous whistleblowing) and where they can report specific illicit behavior (semi-anonymous reporting). We show that depending on policy parameters and individual characteristics, one of 4 equilibria may arise, with the interesting outcomes that whistleblowing only flourishes in a light-punishment regime, and that semi-anonymous reporting leads to the relative prevalence of illicit behavior.
A computational framework for modelling inter-group behaviour using psychological theory
By
RKE Bellamy,
GB Colombo,
S ESHGHI,
G De Mel,
C Giammanco,
R Morris,
DG Rand,
L Turner,
RM Whitaker,
GR Williams
In SPIE Defense + Commercial Sensing, 2018
Psychological theories of inter-group behaviour oer justied representations for interaction, influence, and motivation for coalescence. Agent-based modelling of this behaviour, using evolutionary approaches, further provides a powerful tool to examine the implications of these theories in a dynamic context. In particular, this can enhance our understanding of the escalation of hostility and warfare, and its mitigation, contributing to policy and interventions. In this paper we propose a framework through which social psychology can be embedded in computation for the examination of inter-group behaviour. We examine how various social-psychological theories can be embedded in evolutionary models, and identify ways in which visualisation can support the objective assessment of emergent behaviour. We also discuss how real-world data can be used to parameterise scenarios on which modelling is conducted.
Psychological theories of inter-group behaviour oer justied representations for interaction, influence, and motivation for coalescence. Agent-based modelling of this behaviour, using evolutionary approaches, further provides a powerful tool to examine the implications of these theories in a dynamic context. In particular, this can enhance our understanding of the escalation of hostility and warfare, and its mitigation, contributing to policy and interventions. In this paper we propose a framework through which social psychology can be embedded in computation for the examination of inter-group behaviour. We examine how various social-psychological theories can be embedded in evolutionary models, and identify ways in which visualisation can support the objective assessment of emergent behaviour. We also discuss how real-world data can be used to parameterise scenarios on which modelling is conducted.
Visibility-aware optimal contagion of malware epidemics
By
S ESHGHI,
S Sarkar,
SS Venkatesh
IEEE Transactions on Automatic Control (TAC), vol. 62, no. 10, pp. 5205 - 5212, , 2017
Recent innovations in the design of computer viruses have led to new trade-offs for the attacker. Multiple variants of a malware may spread at different rates and have different levels of visibility to the network. In this work we examine the optimal strategies for the attacker so as to trade off the extent of spread of the malware against the need for stealth. We show that in the mean-field deterministic regime, this spread-stealth trade-off is optimized by computationally simple single-threshold policies. Specifically, we show that only one variant of the malware is spread by the attacker at each time, as there exists a time up to which the attacker prioritizes maximizing the spread of the malware, and after which she prioritizes stealth.
Recent innovations in the design of computer viruses have led to new trade-offs for the attacker. Multiple variants of a malware may spread at different rates and have different levels of visibility to the network. In this work we examine the optimal strategies for the attacker so as to trade off the extent of spread of the malware against the need for stealth. We show that in the mean-field deterministic regime, this spread-stealth trade-off is optimized by computationally simple single-threshold policies. Specifically, we show that only one variant of the malware is spread by the attacker at each time, as there exists a time up to which the attacker prioritizes maximizing the spread of the malware, and after which she prioritizes stealth.
A framework for modelling the effect of emotion on uncritical reasoning
By
D Mott,
T Kelley,
C Giammanco,
S ESHGHI,
Y Zhang,
In Workshop on Knowledge Systems for Coalition Operations (KSCO), 2017
We describe research on understanding group mutability in the behaviour of external groups, and how interventions by coalition forces may affect the behaviour in terms of controlling hostile groups and encouraging friendly groups. We explore how emotion may influence the behaviour of individuals by affecting the type of reasoning that they undertake, encouraging “uncritical” rather than “critical” thinking. We describe a computational framework holding a cognitive model of an individual operating within a group context, inspired by theories from social science. Individuals relate to in-groups and out-groups and have beliefs that are associated with emotions. Cognitive Appraisal Theory is used to evaluate incoming memes “pronounced” by external speakers, appraising the effects of the memes on an individual’s self-esteem taking account of their group relationships as indicated by social identity theory, and leading to an emotion in the individual. Appraisal is followed by a process of coping that seeks to handle the effects by either performing problem-focused (critical) or emotion-focused (uncritical) thinking, according to the current emotional state of the individual. This model is implemented within a Cognitive Architecture (Soar) as a set of reasoning processes that handle beliefs and emotion. The model is integrated into a multi-agent simulation tool (Repast Simphony) allowing the simulation of populations of individuals interacting and spreading rumours, or memes, together with interventions. We describe how this framework could be used to construct experiments to explore how different situations lead to group mutability and behaviour, together with the effects of interventions by coalition forces.
We describe research on understanding group mutability in the behaviour of external groups, and how interventions by coalition forces may affect the behaviour in terms of controlling hostile groups and encouraging friendly groups. We explore how emotion may influence the behaviour of individuals by affecting the type of reasoning that they undertake, encouraging “uncritical” rather than “critical” thinking. We describe a computational framework holding a cognitive model of an individual operating within a group context, inspired by theories from social science. Individuals relate to in-groups and out-groups and have beliefs that are associated with emotions. Cognitive Appraisal Theory is used to evaluate incoming memes “pronounced” by external speakers, appraising the effects of the memes on an individual’s self-esteem taking account of their group relationships as indicated by social identity theory, and leading to an emotion in the individual. Appraisal is followed by a process of coping that seeks to handle the effects by either performing problem-focused (critical) or emotion-focused (uncritical) thinking, according to the current emotional state of the individual. This model is implemented within a Cognitive Architecture (Soar) as a set of reasoning processes that handle beliefs and emotion. The model is integrated into a multi-agent simulation tool (Repast Simphony) allowing the simulation of populations of individuals interacting and spreading rumours, or memes, together with interventions. We describe how this framework could be used to construct experiments to explore how different situations lead to group mutability and behaviour, together with the effects of interventions by coalition forces.
Social group stability and fracture
By
S ESHGHI,
GR Williams,
GB Colombo,
L Turner,
DG Rand,
RM Whitaker,
L Tassiulas
In 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2017
In this paper, we present a mathematical model for the mutation of social groups. Group mutability has been studied in multiple domains, with insights generated on significant factors at differing scales. Mathematical modeling enables the simultaneous study of such phenomena, understanding interactions and generating hypotheses for experiments. In particular, we focus on group fracture, where individuals leave groups of which they are members. For example, this can be due to perceived differences with other group members due to norm related conflict (such as extreme actions by some members). Our aim is to consider simple mathematical models incorporating a selection of social and psychological theory which describes these phenomena as a way to understand their interplay, and describe the trade-offs and challenges.
In this paper, we present a mathematical model for the mutation of social groups. Group mutability has been studied in multiple domains, with insights generated on significant factors at differing scales. Mathematical modeling enables the simultaneous study of such phenomena, understanding interactions and generating hypotheses for experiments. In particular, we focus on group fracture, where individuals leave groups of which they are members. For example, this can be due to perceived differences with other group members due to norm related conflict (such as extreme actions by some members). Our aim is to consider simple mathematical models incorporating a selection of social and psychological theory which describes these phenomena as a way to understand their interplay, and describe the trade-offs and challenges.
Heuristic algorithms for influence maximization in partially observable social networks
By
S Stein,
S ESHGHI,
S Maghsudi,
L Tassiulas,
RKE Bellamy,
NR Jennings
In International Workshop on Social Influence Analysis (SocInf), 2017
We consider the problem of selecting the most influential members within a social network, in order to disseminate a message as widely as possible. This problem, also referred to as \textitseed selection for influence maximization, has been under intensive investigation since the emergence of social networks. Nonetheless, a large body of existing research is based on the assumption that the network is completely known, whereas little work considers partially observable networks. Yet, due to many issues including the extremely large size of current networks and privacy considerations, assuming full knowledge of the network is rather unrealistic. Despite this, an influencer often wishes to distribute its message far beyond the boundaries of the known network. In this paper, we propose a set of novel heuristic algorithms that specifically target nodes at this boundary, in order to maximize influence across the whole network. We show that these algorithms outperform the state of the art by up to 38% in networks with partial observability.
We consider the problem of selecting the most influential members within a social network, in order to disseminate a message as widely as possible. This problem, also referred to as \textitseed selection for influence maximization, has been under intensive investigation since the emergence of social networks. Nonetheless, a large body of existing research is based on the assumption that the network is completely known, whereas little work considers partially observable networks. Yet, due to many issues including the extremely large size of current networks and privacy considerations, assuming full knowledge of the network is rather unrealistic. Despite this, an influencer often wishes to distribute its message far beyond the boundaries of the known network. In this paper, we propose a set of novel heuristic algorithms that specifically target nodes at this boundary, in order to maximize influence across the whole network. We show that these algorithms outperform the state of the art by up to 38% in networks with partial observability.
Heuristic algorithms for influence maximization in partially observable social networks
By
S ESHGHI,
S Maghsudi,
V Restocchi,
L Tassiulas,
RKE Bellamy,
NR Jennings,
S Stein
In 7th International Conference on Complex Networks and Their Applications (COMPLEX NETWORKS), 2017
Models to study the propagation of opinions and influence in social networks have been extensively studied and, in particular, the computer science literature has focused on developing algorithms to maximise the spread of influence. However, little work considers the common real-world scenario in which only portions of the full network are visible or only a subset of nodes can be chosen to spread influence from. In particular, in this paper we explore influence maximisation under a type of uncertainty which has not been investigated so far. In our setting, a part (or some parts) of a network is known (e.g., individuals that belong to the decision maker’s organisation), while the rest is completely unobservable. We propose a set of heuristic algorithms designed to maximise the spread of influence in such a setting, by preferentially targeting boundary nodes. We consider the case of organisation-partitioned networks, i.e., networks in which a subset of nodes (a community) and all links among them are fully visible, but the rest are unknown. We show that, in such a setting, the proposed algorithms outperform the state of the art by up to 38%.
Models to study the propagation of opinions and influence in social networks have been extensively studied and, in particular, the computer science literature has focused on developing algorithms to maximise the spread of influence. However, little work considers the common real-world scenario in which only portions of the full network are visible or only a subset of nodes can be chosen to spread influence from. In particular, in this paper we explore influence maximisation under a type of uncertainty which has not been investigated so far. In our setting, a part (or some parts) of a network is known (e.g., individuals that belong to the decision maker’s organisation), while the rest is completely unobservable. We propose a set of heuristic algorithms designed to maximise the spread of influence in such a setting, by preferentially targeting boundary nodes. We consider the case of organisation-partitioned networks, i.e., networks in which a subset of nodes (a community) and all links among them are fully visible, but the rest are unknown. We show that, in such a setting, the proposed algorithms outperform the state of the art by up to 38%.
Mathematical models for social group behavior
By
S ESHGHI,
GR Williams,
GB Colombo,
L Turner,
DG Rand,
RM Whitaker,
L Tassiulas
In Workshop on Distributed Analytics InfraStructure and Algorithms for Multi-Organization Federations (DAIS), 2017
In this paper, we seek to identity how mathematical and economic analysis can be used to gain insights about the mutation of social groups. Group mutability has been studied in multiple domains, with insights generated on significant factors at differing scales. Mathematical modeling enables the simultaneous study of such phenomena, understanding interactions and generating hypotheses for experiments. In particular, we focus on group fracture, where individuals leave groups of which they are members. For example, this can be due to perceived differences with other group members due to norm related conflict (such as extreme actions by some members). Our aim is to consider simple mathematical models incorporating a selection of social and psychological theory which describes these phenomena as a way to understand their interplay, and describe the trade-offs and challenges. This will help a federation model the behavior of extremist groups, and determine not only when an intervention is necessary, but also the best course of action to take to induce the fracture of such groups. This paper is an exploratory investigation into methods of achieving this goal and evaluating the usefulness of the outputs to federations.
In this paper, we seek to identity how mathematical and economic analysis can be used to gain insights about the mutation of social groups. Group mutability has been studied in multiple domains, with insights generated on significant factors at differing scales. Mathematical modeling enables the simultaneous study of such phenomena, understanding interactions and generating hypotheses for experiments. In particular, we focus on group fracture, where individuals leave groups of which they are members. For example, this can be due to perceived differences with other group members due to norm related conflict (such as extreme actions by some members). Our aim is to consider simple mathematical models incorporating a selection of social and psychological theory which describes these phenomena as a way to understand their interplay, and describe the trade-offs and challenges. This will help a federation model the behavior of extremist groups, and determine not only when an intervention is necessary, but also the best course of action to take to induce the fracture of such groups. This paper is an exploratory investigation into methods of achieving this goal and evaluating the usefulness of the outputs to federations.
Influence maximisation beyond organisational boundaries
By
S Stein,
S ESHGHI,
S Maghsudi,
L Tassiulas,
RKE Bellamy,
NR Jennings,
In Workshop on Distributed Analytics InfraStructure and Algorithms for Multi-Organization Federations (DAIS), 2017
We consider the problem of choosing influential members within a social network, in order to disseminate a message as widely as possible. While this so-called problem of influence maximisation has been widely studied, little work considers partially-observable networks, where only part of a network is visible to the decision maker. Yet, this is critical in many applications, where an organisation needs to distribute its message far beyond its boundaries and beyond its usual sphere of influence. In this paper, we show that existing algorithms are not sufficient to handle such scenarios. To address this, we propose a set of novel adaptive algorithms that perform well in partially observable settings, achieving an up to 18% improvement on the non-adaptive state of the art.
We consider the problem of choosing influential members within a social network, in order to disseminate a message as widely as possible. While this so-called problem of influence maximisation has been widely studied, little work considers partially-observable networks, where only part of a network is visible to the decision maker. Yet, this is critical in many applications, where an organisation needs to distribute its message far beyond its boundaries and beyond its usual sphere of influence. In this paper, we show that existing algorithms are not sufficient to handle such scenarios. To address this, we propose a set of novel adaptive algorithms that perform well in partially observable settings, achieving an up to 18% improvement on the non-adaptive state of the art.
Spread, then target, and advertise in waves: optimal capital allocation across advertising channels
By
S ESHGHI,
VM Preciado,
S Sarkar,
SS Venkatesh,
Q Zhao,
R D’Souza,
A Swami
In IEEE Information Theory and Applications Workshop (ITA), 2017
We obtain optimal strategies for the allocation of influence budget across multiple channels and across time for an external influencer, e.g., a political campaign, seeking to maximize its effect on an election given a network of agents with linear consensus-seeking opinion dynamics. We show that for a general set of objective functions, the optimal influence strategy at every time uses all channels at either their maximum rate or not at all. Furthermore, we prove that the number of switches between these extremes is bounded above both by a term that is typically much smaller than the number of agents. This means that the optimal influence strategy is to exert maximum effort in waves for every channel, and then cease effort and let the effects propagate. We also show that at the beginning, the total cost-adjusted reach of a channel determines its relative value, while targeting matters more closer to election time. We demonstrate that the optimal influence structures are easily computable in several practical cases. We explicitly characterize the optimal controls for the case of linear objective functions via a closed form. Finally, we see that in the canonical election example, identifying late-deciders approximately determines the optimal campaign resource allocation strategy.
We obtain optimal strategies for the allocation of influence budget across multiple channels and across time for an external influencer, e.g., a political campaign, seeking to maximize its effect on an election given a network of agents with linear consensus-seeking opinion dynamics. We show that for a general set of objective functions, the optimal influence strategy at every time uses all channels at either their maximum rate or not at all. Furthermore, we prove that the number of switches between these extremes is bounded above both by a term that is typically much smaller than the number of agents. This means that the optimal influence strategy is to exert maximum effort in waves for every channel, and then cease effort and let the effects propagate. We also show that at the beginning, the total cost-adjusted reach of a channel determines its relative value, while targeting matters more closer to election time. We demonstrate that the optimal influence structures are easily computable in several practical cases. We explicitly characterize the optimal controls for the case of linear objective functions via a closed form. Finally, we see that in the canonical election example, identifying late-deciders approximately determines the optimal campaign resource allocation strategy.
Efficient dynamic centrality metrics for election advertising - a case study
By
S ESHGHI,
L Tassiulas
In Yale Day of Data 2017 (Poster), 2017
In prior work, we have shown how optimal choice of advertising channels for a budget-constrained electoral campaign can be structured. In this poster, we apply the resulting proposed algorithm to the MIT Social Evolution data-set (N=84), which captured political discussions, inclinations, and voting behaviors around the 2008 US Presidential Election within a student dorm. We compare the resulting centrality metrics developed from our algorithm (which have a direct mapping to optimal channel choice decisions) against more traditional static centralities.
In prior work, we have shown how optimal choice of advertising channels for a budget-constrained electoral campaign can be structured. In this poster, we apply the resulting proposed algorithm to the MIT Social Evolution data-set (N=84), which captured political discussions, inclinations, and voting behaviors around the 2008 US Presidential Election within a student dorm. We compare the resulting centrality metrics developed from our algorithm (which have a direct mapping to optimal channel choice decisions) against more traditional static centralities.
Optimal patching in clustered malware epidemics
By
S ESHGHI,
MHR Khouzani,
S Sarkar,
SS Venkatesh
IEEE/ACM Transactions on Networking (ToN), vol. 24, no. 1, pp. 283–298, IEEE, 2016
Studies on the propagation of malware in mobile networks have revealed that the spread of malware can be highly inhomogeneous. Platform diversity, contact list utilization by the malware, clustering in the network structure, etc., can also lead to differing spreading rates. In this paper, a general formal framework is proposed for leveraging such heterogeneity to derive optimal patching policies that attain the minimum aggregate cost due to the spread of malware and the surcharge of patching. Using Pontryagin’s Maximum Principle for a stratified epidemic model, it is analytically proven that in the mean-field deterministic regime, optimal patch disseminations are simple single-threshold policies. These policies are amenable to implementation and can serve as benchmarks for policies that have less knowledge of the network. Through numerical simulations, the behavior of optimal patching policies is investigated in sample topologies, and their advantages are demonstrated.
Studies on the propagation of malware in mobile networks have revealed that the spread of malware can be highly inhomogeneous. Platform diversity, contact list utilization by the malware, clustering in the network structure, etc., can also lead to differing spreading rates. In this paper, a general formal framework is proposed for leveraging such heterogeneity to derive optimal patching policies that attain the minimum aggregate cost due to the spread of malware and the surcharge of patching. Using Pontryagin’s Maximum Principle for a stratified epidemic model, it is analytically proven that in the mean-field deterministic regime, optimal patch disseminations are simple single-threshold policies. These policies are amenable to implementation and can serve as benchmarks for policies that have less knowledge of the network. Through numerical simulations, the behavior of optimal patching policies is investigated in sample topologies, and their advantages are demonstrated.
Optimal battery pricing and energy management for localized energy resources
By
S ESHGHI,
RM Patil,
R Sharma
US Patent 20,160,093,002 (Application), 2016
A method and system are provided for managing local energy resources of an energy system. The method includes determining, offline by a processor, an offline optimal resource allocation of the local energy resources using a Pontryagin Maximum Principle that involves a continuous, unbounded state. The method further includes determining, in real-time by the processor, a real-time optimal resource allocation of the local energy resources using offline-determined energy storage shadow pricing. The method also includes managing, by the processor, an allocation of the local energy resources in accordance with the offline optimal resource allocation and the real-time optimal resource allocation.
A method and system are provided for managing local energy resources of an energy system. The method includes determining, offline by a processor, an offline optimal resource allocation of the local energy resources using a Pontryagin Maximum Principle that involves a continuous, unbounded state. The method further includes determining, in real-time by the processor, a real-time optimal resource allocation of the local energy resources using offline-determined energy storage shadow pricing. The method also includes managing, by the processor, an allocation of the local energy resources in accordance with the offline optimal resource allocation and the real-time optimal resource allocation.
Optimal control of epidemics in the presence of heterogeneity
By
S ESHGHI
University of Pennsylvania, 2015
We seek to identify and address how different types of heterogeneity affect the optimal control of epidemic processes in social, biological, and computer networks. Epidemic processes encompass a variety of models of propagation that are based on contact between agents. Assumptions of homogeneity of communication rates, resources, and epidemics themselves in prior literature gloss over the heterogeneities inherent to such networks and lead to the design of sub-optimal control policies. However, the added complexity that comes with a more nuanced view of such networks complicates the generalizing of most prior work and necessitates the use of new analytical methods. We first create a taxonomy of heterogeneity in the spread of epidemics. We then model the evolution of heterogeneous epidemics in the realms of biology and sociology, as well as those arising from practice in the fields of communication networks (e.g., DTN message routing) and security (e.g., malware spread and patching). In each case, we obtain computational frameworks using Pontryagin’s Maximum Principle that will lead to the derivation of dynamic controls that optimize general, context-specific objectives. We then prove structures for each of these vectors of optimal controls that can simplify the derivation, storage, and implementation of optimal policies. Finally, using simulations and real-world traces, we examine the benefits achieved by including heterogeneity in the control decision, as well as the sensitivity of the models and the controls to model parameters in each case.
We seek to identify and address how different types of heterogeneity affect the optimal control of epidemic processes in social, biological, and computer networks. Epidemic processes encompass a variety of models of propagation that are based on contact between agents. Assumptions of homogeneity of communication rates, resources, and epidemics themselves in prior literature gloss over the heterogeneities inherent to such networks and lead to the design of sub-optimal control policies. However, the added complexity that comes with a more nuanced view of such networks complicates the generalizing of most prior work and necessitates the use of new analytical methods. We first create a taxonomy of heterogeneity in the spread of epidemics. We then model the evolution of heterogeneous epidemics in the realms of biology and sociology, as well as those arising from practice in the fields of communication networks (e.g., DTN message routing) and security (e.g., malware spread and patching). In each case, we obtain computational frameworks using Pontryagin’s Maximum Principle that will lead to the derivation of dynamic controls that optimize general, context-specific objectives. We then prove structures for each of these vectors of optimal controls that can simplify the derivation, storage, and implementation of optimal policies. Finally, using simulations and real-world traces, we examine the benefits achieved by including heterogeneity in the control decision, as well as the sensitivity of the models and the controls to model parameters in each case.
Optimal energy-aware epidemic routing in DTNs
By
S ESHGHI,
MHR Khouzani,
S Sarkar,
NB Shroff,
SS Venkatesh
IEEE Transactions on Automatic Control (TAC), vol. 60, no. 6, pp. 1554–1569, IEEE, 2015
In this work, we investigate the use of epidemic routing in energy constrained delay tolerant networks (DTNs). In epidemic routing, messages are relayed by intermediate nodes at contact opportunities, i.e., when pairs of nodes come within the transmission range of each other. Each node needs to decide whether to forward its message upon contact with a new node based on its own residual energy level and the age of that message. We mathematically characterize the fundamental trade-off between energy conservation and a measure of Quality of Service as a dynamic energy-dependent optimal control problem. We prove that in the mean-field regime, the optimal dynamic forwarding decisions follow simple threshold-based structures in which the forwarding threshold for each node depends on its current remaining energy. We then characterize the nature of this dependence. Our simulations reveal that the optimal dynamic policy significantly outperforms heuristics.
In this work, we investigate the use of epidemic routing in energy constrained delay tolerant networks (DTNs). In epidemic routing, messages are relayed by intermediate nodes at contact opportunities, i.e., when pairs of nodes come within the transmission range of each other. Each node needs to decide whether to forward its message upon contact with a new node based on its own residual energy level and the age of that message. We mathematically characterize the fundamental trade-off between energy conservation and a measure of Quality of Service as a dynamic energy-dependent optimal control problem. We prove that in the mean-field regime, the optimal dynamic forwarding decisions follow simple threshold-based structures in which the forwarding threshold for each node depends on its current remaining energy. We then characterize the nature of this dependence. Our simulations reveal that the optimal dynamic policy significantly outperforms heuristics.
Visibility-aware optimal contagion of malware epidemics
By
S ESHGHI,
S Sarkar,
SS Venkatesh
In IEEE Information Theory and Applications Workshop (ITA), 2015
Optimal battery pricing and energy management for microgrids
By
S ESHGHI,
RM Patil,
In American Control Conference (ACC), 2015
This paper develops an optimal dispatch strategy for a microgrid’s resources through battery pricing. A microgrid fulfills local demand using local generation (conventional and renewable) and storage, along with the electric grid (macrogrid). Demand and renewables such as Photovoltaic (PV) generation are uncertain throughout the day. Optimal management of the resources in a microgrid is necessary to integrate the uncertain renewable energy, serve the uncertain demand and provide the highest returns in terms of cost or emissions. The approach developed in this paper requires minimal modeling effort with regards to uncertainties and emphasizes battery pricing using realized profiles of demand and PV generation. We show that the optimal decision at each time instant is an economic dispatch that takes a rigorously-defined shadow-price for the battery power as input. Furthermore, we show that the calculation of this shadow-price can be simplified to avoid state-constraints in the computation of the optimal control solution. Finally, the results highlight the practical utility of this approach and the developed quasi-optimal solution is comparable to the deterministic optimum cost.
This paper develops an optimal dispatch strategy for a microgrid’s resources through battery pricing. A microgrid fulfills local demand using local generation (conventional and renewable) and storage, along with the electric grid (macrogrid). Demand and renewables such as Photovoltaic (PV) generation are uncertain throughout the day. Optimal management of the resources in a microgrid is necessary to integrate the uncertain renewable energy, serve the uncertain demand and provide the highest returns in terms of cost or emissions. The approach developed in this paper requires minimal modeling effort with regards to uncertainties and emphasizes battery pricing using realized profiles of demand and PV generation. We show that the optimal decision at each time instant is an economic dispatch that takes a rigorously-defined shadow-price for the battery power as input. Furthermore, we show that the calculation of this shadow-price can be simplified to avoid state-constraints in the computation of the optimal control solution. Finally, the results highlight the practical utility of this approach and the developed quasi-optimal solution is comparable to the deterministic optimum cost.
Optimal patching in clustered epidemics of malware
By
MHR Khouzani,
S ESHGHI,
S Sarkar,
SS Venkatesh,
In IEEE Information Theory and Applications Workshop (ITA), 2012
Optimal energy-aware epidemic routing in DTNs
By
MHR Khouzani,
S ESHGHI,
S Sarkar,
NB Shroff,
SS Venkatesh
In 13th ACM international symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2012
In this work, we investigate the use of epidemic routing in energy constrained Delay Tolerant Networks (DTNs). In DTNs, connected paths between source and destination rarely materialize due to the mobility and sparse density of nodes. Epidemic routing is well-suited for these environments due to its simplicity and fully distributed implementation. In epidemic routing, messages are relayed by intermediate nodes at contact opportunities, i.e., when pairs of nodes come within transmission range. Each node needs to decide whether to forward its message upon contact with a new node based on its residual energy level and the age of that message. We mathematically characterize the fundamental trade-off between energy conservation and forwarding efficacy as a heterogeneous dynamic energy-dependent optimal control problem. We prove, somewhat surprisingly given the complex nature of the problem, that in the mean field regime, the optimal dynamic forwarding decisions follow simple threshold-based structures in which the forwarding threshold for each node depends on its current remaining energy. We analytically establish this result under generalized classes of utility functions for DTNs. We then characterize the dependence of these thresholds on current energy reserves in each node.
In this work, we investigate the use of epidemic routing in energy constrained Delay Tolerant Networks (DTNs). In DTNs, connected paths between source and destination rarely materialize due to the mobility and sparse density of nodes. Epidemic routing is well-suited for these environments due to its simplicity and fully distributed implementation. In epidemic routing, messages are relayed by intermediate nodes at contact opportunities, i.e., when pairs of nodes come within transmission range. Each node needs to decide whether to forward its message upon contact with a new node based on its residual energy level and the age of that message. We mathematically characterize the fundamental trade-off between energy conservation and forwarding efficacy as a heterogeneous dynamic energy-dependent optimal control problem. We prove, somewhat surprisingly given the complex nature of the problem, that in the mean field regime, the optimal dynamic forwarding decisions follow simple threshold-based structures in which the forwarding threshold for each node depends on its current remaining energy. We analytically establish this result under generalized classes of utility functions for DTNs. We then characterize the dependence of these thresholds on current energy reserves in each node.