-
Identification of soft modes across the commensurate-to-incommensurate charge density wave transition in 1$T$-TaSe$_2$
Authors:
M. Ruggeri,
D. Wolverson,
V. Romano,
G. Cerullo,
C. J. Sayers,
G. D'Angelo
Abstract:
1$T$-TaSe$_2$ is a prototypical charge density wave (CDW) material for which electron-phonon coupling and associated lattice distortion play an important role in driving and stabilizing the CDW phase. Here, we investigate the lattice dynamics of bulk 1$T$-TaSe$_2$ using angle-resolved ultralow wavenumber Raman spectroscopy down to 10 cm$^{-1}$. Our high-resolution spectra allow us to identify at l…
▽ More
1$T$-TaSe$_2$ is a prototypical charge density wave (CDW) material for which electron-phonon coupling and associated lattice distortion play an important role in driving and stabilizing the CDW phase. Here, we investigate the lattice dynamics of bulk 1$T$-TaSe$_2$ using angle-resolved ultralow wavenumber Raman spectroscopy down to 10 cm$^{-1}$. Our high-resolution spectra allow us to identify at least 27 Raman-active modes in the commensurate (CCDW) phase. Contrary to other layered materials, we do not find evidence of interlayer breathing or shear modes, suggestive of $AA$ stacking in the bulk, or sufficiently weak interlayer coupling. Polarization dependence of the mode intensities allows the assignment of their symmetry, which is supported by first-principles calculations of the phonons for the bulk structure using density functional theory. A detailed temperature dependence in the range $T$ = 80 - 500 K allows us to identify soft modes associated with the CDW superlattice. Upon entering the incommensurate (ICCDW) phase above 473 K, we observe a dramatic loss of resolution of all modes, and significant linewidth broadening associated with a reduced phonon lifetime as the charge-order becomes incommensurate with the lattice.
△ Less
Submitted 20 May, 2024;
originally announced May 2024.
-
Planet Formation by Gas-Assisted Accretion of Small Solids
Authors:
Gennaro D'Angelo,
Peter Bodenheimer
Abstract:
We compute the accretion efficiency of small solids, with radii 1 cm $\le$ Rs $\le$ 10 m, on planets embedded in gaseous disks. Planets have masses 3 $\le$ Mp $\le$ 20 Earth masses (Me) and orbit within 10 AU of a solar-mass star. Disk thermodynamics is modeled via three-dimensional radiation-hydrodynamic calculations that typically resolve the planetary envelopes. Both icy and rocky solids are co…
▽ More
We compute the accretion efficiency of small solids, with radii 1 cm $\le$ Rs $\le$ 10 m, on planets embedded in gaseous disks. Planets have masses 3 $\le$ Mp $\le$ 20 Earth masses (Me) and orbit within 10 AU of a solar-mass star. Disk thermodynamics is modeled via three-dimensional radiation-hydrodynamic calculations that typically resolve the planetary envelopes. Both icy and rocky solids are considered, explicitly modeling their thermodynamic evolution. The maximum efficiencies of 1 $\le$ Rs $\le$ 100 cm particles are generally $\lesssim$ 10%, whereas 10 m solids tend to accrete efficiently or be segregated beyond the planet's orbit. A simplified approach is applied to compute the accretion efficiency of small cores, with masses Mp $\le$ 1 Me and without envelopes, for which efficiencies are approximately proportional to Mp^(2/3). The mass flux of solids, estimated from unperturbed drag-induced drift velocities, provides typical accretion rates dMp/dt $\lesssim$ 1e-5 Mearth/yr. In representative disk models with an initial gas-to-dust mass ratio of 70-100 and total mass of 0.05-0.06 Msun, solids' accretion falls below 1e-6 Mearth/yr after 1-1.5 million years (Myr). The derived accretion rates, as functions of time and planet mass, are applied to formation calculations that compute dust opacity self-consistently with the delivery of solids to the envelope. Assuming dust-to-solid coagulation times of approximately 0.3 Myr and disk lifetimes of approximately 3.5 Myr, heavy-element inventories in the range 3-7 Me require that approximately 90-150 Me of solids cross the planet's orbit. The formation calculations encompass a variety of outcomes, from planets a few times the Earth mass, predominantly composed of heavy elements, to giant planets. The peak luminosities during the epoch of solids' accretion range from $\approx$ 1e-7 to $\approx$ 1e-6 times the solar luminosity.
△ Less
Submitted 4 June, 2024; v1 submitted 8 April, 2024;
originally announced April 2024.
-
Multilevel Modeling as a Methodology for the Simulation of Human Mobility
Authors:
Luca Serena,
Moreno Marzolla,
Gabriele D'Angelo,
Stefano Ferretti
Abstract:
Multilevel modeling is increasingly relevant in the context of modelling and simulation since it leads to several potential benefits, such as software reuse and integration, the split of semantically separated levels into sub-models, the possibility to employ different levels of detail, and the potential for parallel execution. The coupling that inevitably exists between the sub-models, however, i…
▽ More
Multilevel modeling is increasingly relevant in the context of modelling and simulation since it leads to several potential benefits, such as software reuse and integration, the split of semantically separated levels into sub-models, the possibility to employ different levels of detail, and the potential for parallel execution. The coupling that inevitably exists between the sub-models, however, implies the need for maintaining consistency between the various components, more so when different simulation paradigms are employed (e.g., sequential vs parallel, discrete vs continuous). In this paper we argue that multilevel modelling is well suited for the simulation of human mobility, since it naturally leads to the decomposition of the model into two layers, the "micro" and "macro" layer, where individual entities (micro) and long-range interactions (macro) are described. In this paper we investigate the challenges of multilevel modeling, and describe some preliminary results using prototype implementations of multilayer simulators in the context of epidemic diffusion and vehicle pollution.
△ Less
Submitted 25 March, 2024;
originally announced March 2024.
-
Design Patterns for Multilevel Modeling and Simulation
Authors:
Luca Serena,
Moreno Marzolla,
Gabriele D'Angelo,
Stefano Ferretti
Abstract:
Multilevel modeling and simulation (M&S) is becoming increasingly relevant due to the benefits that this methodology offers. Multilevel models allow users to describe a system at multiple levels of detail. From one side, this can make better use of computational resources, since the more detailed and time-consuming models can be executed only when/where required. From the other side, multilevel mo…
▽ More
Multilevel modeling and simulation (M&S) is becoming increasingly relevant due to the benefits that this methodology offers. Multilevel models allow users to describe a system at multiple levels of detail. From one side, this can make better use of computational resources, since the more detailed and time-consuming models can be executed only when/where required. From the other side, multilevel models can be assembled from existing components, cutting down development and verification/validation time. A downside of multilevel M&S is that the development process becomes more complex due to some recurrent issues caused by the very nature of multilevel models: how to make sub-models interoperate, how to orchestrate execution, how state variables are to be updated when changing scale, and so on. In this paper, we address some of these issues by presenting a set of design patterns that provide a systematic approach for designing and implementing multilevel models. The proposed design patterns cover multiple aspects, including how to represent different levels of detail, how to combine incompatible models, how to exchange data across models, and so on. Some of the patterns are derived from the general software engineering literature, while others are specific to the multilevel M&S application area.
△ Less
Submitted 25 March, 2024;
originally announced March 2024.
-
Gamma-Ray Burst observations by the high-energy charged particle detector on board the CSES-01 satellite between 2019 and 2021
Authors:
Francesco Palma,
Matteo Martucci,
Coralie Neubüser,
Alessandro Sotgiu,
Francesco Maria Follega,
Pietro Ubertini,
Angela Bazzano,
James Rodi,
Roberto Ammendola,
Davide Badoni,
Simona Bartocci,
Roberto Battiston,
Stefania Beolè,
Igor Bertello,
William Jerome Burger,
Donatella Campana,
Antonio Cicone,
Piero Cipollone,
Silvia Coli,
Livio Conti,
Andrea Contin,
Marco Cristoforetti,
Giulia D'Angelo,
Fabrizio De Angelis,
Cinzia De Donato
, et al. (46 additional authors not shown)
Abstract:
In this paper we report the detection of five strong Gamma-Ray Bursts (GRBs) by the High-Energy Particle Detector (HEPD-01) mounted on board the China Seismo-Electromagnetic Satellite (CSES-01), operational since 2018 on a Sun-synchronous polar orbit at a $\sim$ 507 km altitude and 97$^\circ$ inclination. HEPD-01 was designed to detect high-energy electrons in the energy range 3 - 100 MeV, protons…
▽ More
In this paper we report the detection of five strong Gamma-Ray Bursts (GRBs) by the High-Energy Particle Detector (HEPD-01) mounted on board the China Seismo-Electromagnetic Satellite (CSES-01), operational since 2018 on a Sun-synchronous polar orbit at a $\sim$ 507 km altitude and 97$^\circ$ inclination. HEPD-01 was designed to detect high-energy electrons in the energy range 3 - 100 MeV, protons in the range 30 - 300 MeV, and light nuclei in the range 30 - 300 MeV/n. Nonetheless, Monte Carlo simulations have shown HEPD-01 is sensitive to gamma-ray photons in the energy range 300 keV - 50 MeV, even if with a moderate effective area above $\sim$ 5 MeV. A dedicated time correlation analysis between GRBs reported in literature and signals from a set of HEPD-01 trigger configuration masks has confirmed the anticipated detector sensitivity to high-energy photons. A comparison between the simultaneous time profiles of HEPD-01 electron fluxes and photons from GRB190114C, GRB190305A, GRB190928A, GRB200826B and GRB211211A has shown a remarkable similarity, in spite of the different energy ranges. The high-energy response, with peak sensitivity at about 2 MeV, and moderate effective area of the detector in the actual flight configuration explain why these five GRBs, characterised by a fluence above $\sim$ 3 $\times$ 10$^{-5}$ erg cm$^{-2}$ in the energy interval 300 keV - 50 MeV, have been detected.
△ Less
Submitted 25 October, 2023;
originally announced October 2023.
-
Improving Fairness in Information Exposure by Adding Links
Authors:
Ruben Becker,
Gianlorenzo D'Angelo,
Sajjad Ghobadi
Abstract:
Fairness in influence maximization has been a very active research topic recently. Most works in this context study the question of how to find seeding strategies (deterministic or probabilistic) such that nodes or communities in the network get their fair share of coverage. Different fairness criteria have been used in this context. All these works assume that the entity that is spreading the inf…
▽ More
Fairness in influence maximization has been a very active research topic recently. Most works in this context study the question of how to find seeding strategies (deterministic or probabilistic) such that nodes or communities in the network get their fair share of coverage. Different fairness criteria have been used in this context. All these works assume that the entity that is spreading the information has an inherent interest in spreading the information fairly, otherwise why would they want to use the developed fair algorithms? This assumption may however be flawed in reality -- the spreading entity may be purely \emph{efficiency-oriented}. In this paper we propose to study two optimization problems with the goal to modify the network structure by adding links in such a way that efficiency-oriented information spreading becomes \emph{automatically fair}. We study the proposed optimization problems both from a theoretical and experimental perspective, that is, we give several hardness and hardness of approximation results, provide efficient algorithms for some special cases, and more importantly provide heuristics for solving one of the problems in practice. In our experimental study we then first compare the proposed heuristics against each other and establish the most successful one. In a second experiment, we then show that our approach can be very successful in practice. That is, we show that already after adding a few edges to the networks the greedy algorithm that purely maximizes spread surpasses all fairness-tailored algorithms in terms of ex-post fairness. Maybe surprisingly, we even show that our approach achieves ex-post fairness values that are comparable or even better than the ex-ante fairness values of the currently most efficient algorithms that optimize ex-ante fairness.
△ Less
Submitted 25 February, 2023;
originally announced February 2023.
-
On the Cost of Demographic Parity in Influence Maximization
Authors:
Ruben Becker,
Gianlorenzo D'Angelo,
Sajjad Ghobadi
Abstract:
Modeling and shaping how information spreads through a network is a major research topic in network analysis. While initially the focus has been mostly on efficiency, recently fairness criteria have been taken into account in this setting. Most work has focused on the maximin criteria however, and thus still different groups can receive very different shares of information. In this work we propose…
▽ More
Modeling and shaping how information spreads through a network is a major research topic in network analysis. While initially the focus has been mostly on efficiency, recently fairness criteria have been taken into account in this setting. Most work has focused on the maximin criteria however, and thus still different groups can receive very different shares of information. In this work we propose to consider fairness as a notion to be guaranteed by an algorithm rather than as a criterion to be maximized. To this end, we propose three optimization problems that aim at maximizing the overall spread while enforcing strict levels of demographic parity fairness via constraints (either ex-post or ex-ante). The level of fairness hence becomes a user choice rather than a property to be observed upon output. We study this setting from various perspectives. First, we prove that the cost of introducing demographic parity can be high in terms of both overall spread and computational complexity, i.e., the price of fairness may be unbounded for all three problems and optimal solutions are hard to compute, in some case even approximately or when fairness constraints may be violated. For one of our problems, we still design an algorithm with both constant approximation factor and fairness violation. We also give two heuristics that allow the user to choose the tolerated fairness violation. By means of an extensive experimental study, we show that our algorithms perform well in practice, that is, they achieve the best demographic parity fairness values. For certain instances we additionally even obtain an overall spread comparable to the most efficient algorithms that come without any fairness guarantee, indicating that the empirical price of fairness may actually be small when using our algorithms.
△ Less
Submitted 25 February, 2023;
originally announced February 2023.
-
Approximation algorithms for Node-weighted Steiner Problems: Digraphs with Additive Prizes and Graphs with Submodular Prizes
Authors:
Gianlorenzo D'Angelo,
Esmaeil Delfaraz
Abstract:
In the \emph{budgeted rooted node-weighted Steiner tree} problem, we are given a graph $G$ with $n$ nodes, a predefined node $r$, two weights associated to each node modelling costs and prizes. The aim is to find a tree in $G$ rooted at $r$ such that the total cost of its nodes is at most a given budget $B$ and the total prize is maximized. In the \emph{quota rooted node-weighted Steiner tree} pro…
▽ More
In the \emph{budgeted rooted node-weighted Steiner tree} problem, we are given a graph $G$ with $n$ nodes, a predefined node $r$, two weights associated to each node modelling costs and prizes. The aim is to find a tree in $G$ rooted at $r$ such that the total cost of its nodes is at most a given budget $B$ and the total prize is maximized. In the \emph{quota rooted node-weighted Steiner tree} problem, we are given a real-valued quota $Q$, instead of the budget, and we aim at minimizing the cost of a tree rooted at $r$ whose overall prize is at least $Q$.
For the case of directed graphs with additive prize function, we develop a technique resorting on a standard flow-based linear programming relaxation to compute a tree with good trade-off between prize and cost, which allows us to provide very simple polynomial time approximation algorithms for both the budgeted and the quota problems. For the \emph{budgeted} problem, our algorithm achieves a bicriteria $(1+ε, O(\frac{1}{ε^2}n^{2/3}\ln{n}))$-approximation, for any $ε\in (0, 1]$. For the \emph{quota} problem, our algorithm guarantees a bicriteria approximation factor of $(2, O(n^{2/3}\ln{n}))$. Next, by using the flow-based LP, we provide a surprisingly simple polynomial time $O((1+ε)\sqrt{n} \ln {n})$-approximation algorithm for the node-weighted version of the directed Steiner tree problem, for any $ε>0$.
For the case of undirected graphs with monotone submodular prize functions over subsets of nodes, we provide a polynomial time $O(\frac{1}{ε^3}\sqrt{n}\log{n})$-approximation algorithm for the budgeted problem that violates the budget constraint by a factor of at most $1+ε$, for any $ε\in (0, 1]$. Our technique allows us to provide a good approximation also for the quota problem.
△ Less
Submitted 12 November, 2022; v1 submitted 7 November, 2022;
originally announced November 2022.
-
Sparse Temporal Spanners with Low Stretch
Authors:
Davide Bilò,
Gianlorenzo D'Angelo,
Luciano Gualà,
Stefano Leucci,
Mirko Rossi
Abstract:
A temporal graph is an undirected graph $G=(V,E)$ along with a function that assigns a time-label to each edge in $E$. A path in $G$ with non-decreasing time-labels is called temporal path and the distance from $u$ to $v$ is the minimum length (i.e., the number of edges) of a temporal path from $u$ to $v$. A temporal $α$-spanner of $G$ is a (temporal) subgraph $H$ that preserves the distances betw…
▽ More
A temporal graph is an undirected graph $G=(V,E)$ along with a function that assigns a time-label to each edge in $E$. A path in $G$ with non-decreasing time-labels is called temporal path and the distance from $u$ to $v$ is the minimum length (i.e., the number of edges) of a temporal path from $u$ to $v$. A temporal $α$-spanner of $G$ is a (temporal) subgraph $H$ that preserves the distances between any pair of vertices in $V$, up to a multiplicative stretch factor of $α$. The size of $H$ is the number of its edges.
In this work we study the size-stretch trade-offs of temporal spanners. We show that temporal cliques always admit a temporal $(2k-1)-$spanner with $\tilde{O}(kn^{1+\frac{1}{k}})$ edges, where $k>1$ is an integer parameter of choice. Choosing $k=\lfloor\log n\rfloor$, we obtain a temporal $O(\log n)$-spanner with $\tilde{O}(n)$ edges that has almost the same size (up to logarithmic factors) as the temporal spanner in [Casteigts et al., JCSS 2021] which only preserves temporal connectivity.
We then consider general temporal graphs. Since $Ω(n^2)$ edges might be needed by any connectivity-preserving temporal subgraph [Axiotis et al., ICALP'16], we focus on approximating distances from a single source. We show that $\tilde{O}(n/\log(1+\varepsilon))$ edges suffice to obtain a stretch of $(1+\varepsilon)$, for any small $\varepsilon>0$. This result is essentially tight since there are temporal graphs for which any temporal subgraph preserving exact distances from a single-source must use $Ω(n^2)$ edges. We extend our analysis to prove an upper bound of $\tilde{O}(n^2/β)$ on the size of any temporal $β$-additive spanner, which is tight up to polylogarithmic factors.
Finally, we investigate how the lifetime of $G$, i.e., the number of its distinct time-labels, affects the trade-off between the size and the stretch of a temporal spanner.
△ Less
Submitted 22 June, 2022;
originally announced June 2022.
-
Current density in solar fuel technologies
Authors:
Valentino Romano,
Giovanna D'Angelo,
Siglinda Perathoner,
Gabriele Centi
Abstract:
Solar-to-fuel direct conversion devices are a key component to realize a full transition to a renewable-energy based chemistry and energy, but their limits and possibilities are still under large debate. In this review article, we focus on the current density as a fundamental figure of merit to analyse these aspects and to compare different device configurations and types of solar fuels produced f…
▽ More
Solar-to-fuel direct conversion devices are a key component to realize a full transition to a renewable-energy based chemistry and energy, but their limits and possibilities are still under large debate. In this review article, we focus on the current density as a fundamental figure of merit to analyse these aspects and to compare different device configurations and types of solar fuels produced from small molecules such as H$_2$O, CO$_2$ and N$_2$. Devices with physical separation of the anodic and cathodic zones, photoelectrochemical-type (PEC) or with a photovoltaic element integrated in an electrochemical cell (PV/EC), are analysed. The physico-chemical mechanisms involved in device operation that affect the current density and relations with device architecture are first discussed. Aspects relevant to device design in relation to practical use are also commented on. Then discussion is moved towards the relevance of these aspects to compare the behaviour in the state-of-the-art of the conversion of these small molecules, with focus on solar fuels from H$_2$O, CO$_2$ and N$_2$ conversion, highligthing the gaps and perspectives of such technologies. The still significant lack of crucial data, notwithstanding the extensive literature on the topic, has to be remarked on, particularly in terms of the need to operate these cells in conjunction with sun concentration (in the 50-100 sun range) which emerges as the necessary direction from this analysis, with consequent aspects in terms of cell and materials design to operate in these conditions. The work provides a guide for the optimisation of the investigated technology and the fixing of their practical limits for large-scale applications.
△ Less
Submitted 26 April, 2022;
originally announced May 2022.
-
Budgeted Out-tree Maximization with Submodular Prizes
Authors:
Gianlorenzo D'Angelo,
Esmaeil Delfaraz,
Hugo Gilbert
Abstract:
We consider a variant of the prize collecting Steiner tree problem in which we are given a \emph{directed graph} $D=(V,A)$, a monotone submodular prize function $p:2^V \rightarrow \mathbb{R}^+ \cup \{0\}$, a cost function $c:V \rightarrow \mathbb{Z}^{+}$, a root vertex $r \in V$, and a budget $B$. The aim is to find an out-subtree $T$ of $D$ rooted at $r$ that costs at most $B$ and maximizes the p…
▽ More
We consider a variant of the prize collecting Steiner tree problem in which we are given a \emph{directed graph} $D=(V,A)$, a monotone submodular prize function $p:2^V \rightarrow \mathbb{R}^+ \cup \{0\}$, a cost function $c:V \rightarrow \mathbb{Z}^{+}$, a root vertex $r \in V$, and a budget $B$. The aim is to find an out-subtree $T$ of $D$ rooted at $r$ that costs at most $B$ and maximizes the prize function. We call this problem \emph{Directed Rooted Submodular Tree} (\textbf{DRSO}).
Very recently, Ghuge and Nagarajan [SODA\ 2020] gave an optimal quasi-polynomial-time $O\left(\frac{\log n'}{\log \log n'}\right)$-approximation algorithm, where $n'$ is the number of vertices in an optimal solution, for the case in which the costs are associated to the edges.
In this paper, we give a polynomial-time algorithm for \textbf{DRSO} that guarantees an approximation factor of $O(\sqrt{B}/ε^3)$ at the cost of a budget violation of a factor $1+ε$, for any $ε\in (0,1]$. The same result holds for the edge-cost case, to the best of our knowledge this is the first polynomial-time approximation algorithm for this case. We further show that the unrooted version of \textbf{DRSO} can be approximated to a factor of $O(\sqrt{B})$ without budget violation, which is an improvement over the factor $O(Δ\sqrt{B})$ given in~[Kuo et al.\ IEEE/ACM\ Trans.\ Netw.\ 2015] for the undirected and unrooted case, where $Δ$ is the maximum degree of the graph. Finally, we provide some new/improved approximation bounds for several related problems, including the additive-prize version of \textbf{DRSO}, the maximum budgeted connected set cover problem, and the budgeted sensor cover problem.
△ Less
Submitted 1 October, 2022; v1 submitted 26 April, 2022;
originally announced April 2022.
-
Mixing of Condensable Constituents with H-He During the Formation & Evolution of Jupiter
Authors:
David Stevenson,
Peter Bodenheimer,
Jack J. Lissauer,
Gennaro D'Angelo
Abstract:
Simulations of Jupiter's formation are presented that incorporate mixing of H-He with denser material entering the planet as solids. Heavy compounds and gas mix substantially when the planet becomes roughly as massive as Earth, because incoming planetesimals can fully vaporize. Supersaturation of vaporized silicates causes the excess to sink as droplets, but water remains at higher altitudes. Beca…
▽ More
Simulations of Jupiter's formation are presented that incorporate mixing of H-He with denser material entering the planet as solids. Heavy compounds and gas mix substantially when the planet becomes roughly as massive as Earth, because incoming planetesimals can fully vaporize. Supersaturation of vaporized silicates causes the excess to sink as droplets, but water remains at higher altitudes. Because the mean molecular weight decreases rapidly outward, some of the compositional inhomogeneities produced during formation can survive for billions of years. After 4.57 Gyr, our Jupiter model retains compositional gradients; proceeding outwards one finds: i) an inner heavy-element core, the outer part derived from hot supersaturated rain-out; ii) a composition-gradient region, containing most of the heavy elements, where H-He abundance increases outward, reaching about 0.9 mass fraction at 0.3 of the radius, with silicates enhanced relative to water in the lower parts and depleted in the upper parts; iii) a uniform composition region (neglecting He immiscibility) that is enriched over protosolar and contains most of the planet's mass; and iv) an outer region where cloud formation (condensation) of heavy constituents occurs. This radial compositional profile has heavy elements more broadly distributed than predicted by classical formation models, but less diluted than suggested by Juno-constrained gravity models. The compositional gradients in the region containing the bulk of the heavy elements prevent convection, in both our models and those fitting current gravity, resulting in a hot interior where much of the accretion energy remains trapped.
△ Less
Submitted 29 March, 2022; v1 submitted 18 February, 2022;
originally announced February 2022.
-
Second-generation dust in planetary systems: The case of HD 163296
Authors:
Gennaro D'Angelo,
Francesco Marzari
Abstract:
Observations indicate that large, dust-laden protoplanetary discs are common. Some features, like gaps, rings and spirals, suggest they may host young planets, which can excite the orbits of nearby leftover planetesimals. Energetic collisions among these bodies can lead to the production of second-generation dust. Grains produced by collisions may have a dynamical behaviour different from that of…
▽ More
Observations indicate that large, dust-laden protoplanetary discs are common. Some features, like gaps, rings and spirals, suggest they may host young planets, which can excite the orbits of nearby leftover planetesimals. Energetic collisions among these bodies can lead to the production of second-generation dust. Grains produced by collisions may have a dynamical behaviour different from that of first-generation, primordial dust out of which planetesimals and planets formed. We aim to study these differences for the HD 163296 system and determine whether dynamical signatures in the mixture of the two dust populations can help separate their contributions. We use three-dimensional (3-D) hydrodynamic models to describe the gaseous disc with three, Saturn- to Jupiter-mass, embedded planets. Dust grains, of sizes 1um-1mm, are treated as Lagrangean particles with resolved thermodynamics and mass loss. Initial disc and planet configurations are derived from observation-based work, which indicates low gas viscosity. The 3-D approach also allows us to detect the formation of vortices induced by Rossby waves, where dust becomes concentrated and may contribute to planetesimal formation. We find that the main differences in the dynamical behaviour of first- and second-generation dust occur in the vertical distribution. The two populations have similar distributions around the disc mid-plane, although second-generation dust shows longer residence times close to the radial locations of the planets' gas gaps. Sedimentation rates of um-size grains are comparable to or lower than the production rates by planetesimals' collisions, making this population potentially observable. These outcomes can be extended to similar systems harbouring giant planets.
△ Less
Submitted 5 November, 2021;
originally announced November 2021.
-
Cryptocurrencies Activity as a Complex Network: Analysis of Transactions Graphs
Authors:
Luca Serena,
Stefano Ferretti,
Gabriele D'Angelo
Abstract:
The number of users approaching the world of cryptocurrencies exploded in the last years, and consequently the daily interactions on their underlying distributed ledgers have intensified. In this paper, we analyze the flow of these digital transactions in a certain period of time, trying to discover important insights on the typical use of these technologies by studying, through complex network th…
▽ More
The number of users approaching the world of cryptocurrencies exploded in the last years, and consequently the daily interactions on their underlying distributed ledgers have intensified. In this paper, we analyze the flow of these digital transactions in a certain period of time, trying to discover important insights on the typical use of these technologies by studying, through complex network theory, the patterns of interactions in four prominent and different Distributed Ledger Technologies (DLTs), namely Bitcoin, DogeCoin, Ethereum, Ripple. In particular, we describe the Distributed Ledger Network Analyzer (DiLeNA), a software tool for the investigation of the transactions network recorded in DLTs. We show that studying the network characteristics and peculiarities is of paramount importance, in order to understand how users interact in the DLT. For instance, our analyses reveal that all transaction graphs exhibit small world properties.
△ Less
Submitted 14 September, 2021;
originally announced October 2021.
-
Security Analysis of Distributed Ledgers and Blockchains through Agent-based Simulation
Authors:
Luca Serena,
Gabriele D'Angelo,
Stefano Ferretti
Abstract:
In this paper we describe LUNES-Blockchain, an agent-based simulator of blockchains that relies on Parallel and Distributed Simulation (PADS) techniques to obtain high scalability. The software is organized as a multi-level simulator that permits to simulate a virtual environment, made of many nodes running the protocol of a specific Distributed Ledger Technology (DLT), such as the Bitcoin or the…
▽ More
In this paper we describe LUNES-Blockchain, an agent-based simulator of blockchains that relies on Parallel and Distributed Simulation (PADS) techniques to obtain high scalability. The software is organized as a multi-level simulator that permits to simulate a virtual environment, made of many nodes running the protocol of a specific Distributed Ledger Technology (DLT), such as the Bitcoin or the Ethereum blockchains. This virtual environment is executed on top of a lower-level Peer-to-Peer (P2P) network overlay, which can be structured based on different topologies and with a given number of nodes and edges. Functionalities at different levels of abstraction are managed separately, by different software modules and with different time granularity. This allows for accurate simulations, where (and when) it is needed, and enhances the simulation performance. Using LUNES-Blockchain, it is possible to simulate different types of attacks on the DLT. In this paper, we specifically focus on the P2P layer, considering the selfish mining, the 51% attack and the Sybil attack. For which concerns selfish mining and the 51% attack, our aim is to understand how much the hash-rate (i.e. a general measure of the processing power in the blockchain network) of the attacker can influence the outcome of the misbehaviour. On the other hand, in the filtering denial of service (i.e. Sybil Attack), we investigate which dissemination protocol in the underlying P2P network makes the system more resilient to a varying number of nodes that drop the messages. The results confirm the viability of the simulation-based techniques for the investigation of security aspects of DLTs.
△ Less
Submitted 17 September, 2021;
originally announced September 2021.
-
Simulation of Hybrid Edge Computing Architectures
Authors:
Luca Serena,
Mirko Zichichi,
Gabriele D'Angelo,
Stefano Ferretti
Abstract:
Dealing with a growing amount of data is a crucial challenge for the future of information and communication technologies. More and more devices are expected to transfer data through the Internet, therefore new solutions have to be designed in order to guarantee low latency and efficient traffic management. In this paper, we propose a solution that combines the edge computing paradigm with a decen…
▽ More
Dealing with a growing amount of data is a crucial challenge for the future of information and communication technologies. More and more devices are expected to transfer data through the Internet, therefore new solutions have to be designed in order to guarantee low latency and efficient traffic management. In this paper, we propose a solution that combines the edge computing paradigm with a decentralized communication approach based on Peer-to-Peer (P2P). According to the proposed scheme, participants to the system are employed to relay messages of other devices, so as to reach a destination (usually a server at the edge of the network) even in absence of an Internet connection. This approach can be useful in dynamic and crowded environments, allowing the system to outsource part of the traffic management from the Cloud servers to end-devices. To evaluate our proposal, we carry out some experiments with the help of LUNES, an open source discrete events simulator specifically designed for distributed environments. In our simulations, we tested several system configurations in order to understand the impact of the algorithms involved in the data dissemination and some possible network arrangements.
△ Less
Submitted 28 August, 2021;
originally announced August 2021.
-
Governing Decentralized Complex Queries Through a DAO
Authors:
Mirko Zichichi,
Luca Serena,
Stefano Ferretti,
Gabriele D'Angelo
Abstract:
Recently, a new generation of P2P systems capable of addressing data integrity and authenticity has emerged for the development of new applications for a "more" decentralized Internet, i.e., Distributed Ledger Technologies (DLT) and Decentralized File Systems (DFS). However, these technologies still have some unanswered issues, mostly related to data lookup and discovery. In this paper, first, we…
▽ More
Recently, a new generation of P2P systems capable of addressing data integrity and authenticity has emerged for the development of new applications for a "more" decentralized Internet, i.e., Distributed Ledger Technologies (DLT) and Decentralized File Systems (DFS). However, these technologies still have some unanswered issues, mostly related to data lookup and discovery. In this paper, first, we propose a Distributed Hash Table (DHT) system that efficiently manages decentralized keyword-based queries executed on data stored in DFS. Through a hypercube logical layout, queries are efficiently routed among the network, where each node is responsible for a specific keywords set and the related contents. Second, we provide a framework for the governance of the above network, based on a Decentralized Autonomous Organization (DAO) implementation. We show how the use of smart contracts enables organizational decision making and rewards for nodes that have actively contributed to the DHT. Finally, we provide experimental validation of an implementation of our proposal, where the execution of the same protocol for different logical nodes of the hypercube allows us to evaluate the efficiency of communication within the network.
△ Less
Submitted 10 September, 2021; v1 submitted 14 July, 2021;
originally announced July 2021.
-
Simulation of Dissemination Strategies on Temporal Networks
Authors:
Luca Serena,
Mirko Zichichi,
Gabriele D'Angelo,
Stefano Ferretti
Abstract:
In distributed environments, such as distributed ledgers technologies and other peer-to-peer architectures, communication represents a crucial topic. The ability to efficiently disseminate contents is strongly influenced by the type of system architecture, the protocol used to spread such contents over the network and the actual dynamicity of the communication links (i.e. static vs. temporal nets)…
▽ More
In distributed environments, such as distributed ledgers technologies and other peer-to-peer architectures, communication represents a crucial topic. The ability to efficiently disseminate contents is strongly influenced by the type of system architecture, the protocol used to spread such contents over the network and the actual dynamicity of the communication links (i.e. static vs. temporal nets). In particular, the dissemination strategies either focus on achieving an optimal coverage, minimizing the network traffic or providing assurances on anonymity (that is a fundamental requirement of many cryptocurrencies). In this work, the behaviour of multiple dissemination protocols is discussed and studied through simulation. The performance evaluation has been carried out on temporal networks with the help of LUNES-temporal, a discrete event simulator that allows to test algorithms running on a distributed environment. The experiments show that some gossip protocols allow to either save a considerable number of messages or to provide better anonymity guarantees, at the cost of a little lower coverage achieved and/or a little increase of the delivery time.
△ Less
Submitted 14 July, 2021;
originally announced July 2021.
-
Finding single-source shortest $p$-disjoint paths: fast computation and sparse preservers
Authors:
Davide Bilò,
Gianlorenzo D'Angelo,
Luciano Gualà,
Stefano Leucci,
Guido Proietti,
Mirko Rossi
Abstract:
Let $G$ be a directed graph with $n$ vertices, $m$ edges, and non-negative edge costs. Given $G$, a fixed source vertex $s$, and a positive integer $p$, we consider the problem of computing, for each vertex $t\neq s$, $p$ edge-disjoint paths of minimum total cost from $s$ to $t$ in $G$. Suurballe and Tarjan~[Networks, 1984] solved the above problem for $p=2$ by designing a $O(m+n\log n)$ time algo…
▽ More
Let $G$ be a directed graph with $n$ vertices, $m$ edges, and non-negative edge costs. Given $G$, a fixed source vertex $s$, and a positive integer $p$, we consider the problem of computing, for each vertex $t\neq s$, $p$ edge-disjoint paths of minimum total cost from $s$ to $t$ in $G$. Suurballe and Tarjan~[Networks, 1984] solved the above problem for $p=2$ by designing a $O(m+n\log n)$ time algorithm which also computes a sparse \emph{single-source $2$-multipath preserver}, i.e., a subgraph containing $2$ edge-disjoint paths of minimum total cost from $s$ to every other vertex of $G$. The case $p \geq 3$ was left as an open problem.
We study the general problem ($p\geq 2$) and prove that any graph admits a sparse single-source $p$-multipath preserver with $p(n-1)$ edges. This size is optimal since the in-degree of each non-root vertex $v$ must be at least $p$. Moreover, we design an algorithm that requires $O(pn^2 (p + \log n))$ time to compute both $p$ edge-disjoint paths of minimum total cost from the source to all other vertices and an optimal-size single-source $p$-multipath preserver. The running time of our algorithm outperforms that of a natural approach that solves $n-1$ single-pair instances using the well-known \emph{successive shortest paths} algorithm by a factor of $Θ(\frac{m}{np})$ and is asymptotically near optimal if $p=O(1)$ and $m=Θ(n^2)$. Our results extend naturally to the case of $p$ vertex-disjoint paths.
△ Less
Submitted 23 June, 2021;
originally announced June 2021.
-
Towards Decentralized Complex Queries over Distributed Ledgers: a Data Marketplace Use-case
Authors:
Mirko Zichichi,
Luca Serena,
Stefano Ferretti,
Gabriele D'Angelo
Abstract:
Distributed Ledger Technologies (DLT) and Decentralized File Storages (DFS) are becoming increasingly used to create common, decentralized and trustless infrastructures where participants interact and collaborate in Peer-to-Peer interactions. A prominent use case is represented by decentralized data marketplaces, where users are consumers and providers at the same time, and trustless interactions…
▽ More
Distributed Ledger Technologies (DLT) and Decentralized File Storages (DFS) are becoming increasingly used to create common, decentralized and trustless infrastructures where participants interact and collaborate in Peer-to-Peer interactions. A prominent use case is represented by decentralized data marketplaces, where users are consumers and providers at the same time, and trustless interactions are required. However, data in DLTs and DFS are usually unstructured and there are no efficient mechanisms to query a certain type of data for the search in the market. In this paper, we propose the use of a Distributed Hash Table (DHT) as a layer on top of DLTs where, once the data are acquired and stored in the ledger, these can be searched through multiple keyword based queries, thanks to the lookup functionalities offered by the DHT. The DHT network is a hypercube overlay structure, organized for an efficient processing of multiple keyword-based queries. We provide the architecture of such solution for a decentralized data marketplace and an analysis based on a simulation that proves the viability of the proposed approach.
△ Less
Submitted 10 September, 2021; v1 submitted 28 April, 2021;
originally announced April 2021.
-
MOVO: a dApp for DLT-based Smart Mobility
Authors:
Mirko Zichichi,
Stefano Ferretti,
Gabriele D'Angelo
Abstract:
Plenty of research on smart mobility is currently devoted to the inclusion of novel decentralized software architectures to these systems, due to the inherent advantages in terms of transparency, traceability, trustworthiness. MOVO is a decentralized application (dApp) for smart mobility. It includes: (i) a module for collecting data from vehicles and smartphones sensors; (ii) a component for inte…
▽ More
Plenty of research on smart mobility is currently devoted to the inclusion of novel decentralized software architectures to these systems, due to the inherent advantages in terms of transparency, traceability, trustworthiness. MOVO is a decentralized application (dApp) for smart mobility. It includes: (i) a module for collecting data from vehicles and smartphones sensors; (ii) a component for interacting with Distributed Ledger Technologies (DLT) and Decentralized File Storages (DFS), for storing and validating sensor data; (iii) a module for "offline" interaction between devices. The dApp consists of an Android application intended for use inside a vehicle, which helps the user/driver collect contextually generated data (e.g. a driver's stress level, an electric vehicle's battery level), which can then be shared through the use of DLT (i.e., IOTA DLT and Ethereum smart contracts) and DFS (i.e., IPFS). The third module consists of an implementation of a communication channel that, via Wi-Fi Direct, allows two devices to exchange data and payment information with respect to DLT (i.e. cryptocurrency and token) assets. In this paper, we describe the main software components and provide an experimental evaluation that confirms the viability of the MOVO dApp in real mobility scenarios.
△ Less
Submitted 10 September, 2021; v1 submitted 28 April, 2021;
originally announced April 2021.
-
Computation and Bribery of Voting Power in Delegative Simple Games
Authors:
Gianlorenzo D'Angelo,
Esmaeil Delfaraz,
Hugo Gilbert
Abstract:
Following Zhang and Grossi~(AAAI 2021), we study in more depth a variant of weighted voting games in which agents' weights are induced by a transitive support structure. This class of simple games is notably well suited to study the relative importance of agents in the liquid democracy framework. We first propose a pseudo-polynomial time algorithm to compute the Banzhaf and Shapley-Shubik indices…
▽ More
Following Zhang and Grossi~(AAAI 2021), we study in more depth a variant of weighted voting games in which agents' weights are induced by a transitive support structure. This class of simple games is notably well suited to study the relative importance of agents in the liquid democracy framework. We first propose a pseudo-polynomial time algorithm to compute the Banzhaf and Shapley-Shubik indices for this class of game. Then, we study a bribery problem, in which one tries to maximize/minimize the voting power/weight of a given agent by changing the support structure under a budget constraint. We show that these problems are computationally hard and provide several parameterized complexity results.
△ Less
Submitted 24 January, 2022; v1 submitted 8 April, 2021;
originally announced April 2021.
-
When Can Liquid Democracy Unveil the Truth?
Authors:
Ruben Becker,
Gianlorenzo D'Angelo,
Esmaeil Delfaraz,
Hugo Gilbert
Abstract:
In this paper, we investigate the so-called ODP-problem that has been formulated by Caragiannis and Micha [10]. Here, we are in a setting with two election alternatives out of which one is assumed to be correct. In ODP, the goal is to organise the delegations in the social network in order to maximize the probability that the correct alternative, referred to as ground truth, is elected. While the…
▽ More
In this paper, we investigate the so-called ODP-problem that has been formulated by Caragiannis and Micha [10]. Here, we are in a setting with two election alternatives out of which one is assumed to be correct. In ODP, the goal is to organise the delegations in the social network in order to maximize the probability that the correct alternative, referred to as ground truth, is elected. While the problem is known to be computationally hard, we strengthen existing hardness results by providing a novel strong approximation hardness result: For any positive constant $C$, we prove that, unless $P=NP$, there is no polynomial-time algorithm for ODP that achieves an approximation guarantee of $α\ge (\ln n)^{-C}$, where $n$ is the number of voters. The reduction designed for this result uses poorly connected social networks in which some voters suffer from misinformation. Interestingly, under some hypothesis on either the accuracies of voters or the connectivity of the network, we obtain a polynomial-time $1/2$-approximation algorithm. This observation proves formally that the connectivity of the social network is a key feature for the efficiency of the liquid democracy paradigm. Lastly, we run extensive simulations and observe that simple algorithms (working either in a centralized or decentralized way) outperform direct democracy on a large class of instances. Overall, our contributions yield new insights on the question in which situations liquid democracy can be beneficial.
△ Less
Submitted 5 April, 2021;
originally announced April 2021.
-
Personal Data Access Control Through Distributed Authorization
Authors:
Mirko Zichichi,
Stefano Ferretti,
Gabriele D'Angelo,
Víctor Rodríguez-Doncel
Abstract:
This paper presents an architecture of a Personal Information Management System, in which individuals can define the access to their personal data by means of smart contracts. These smart contracts, running on the Ethereum blockchain, implement access control lists and grant immutability, traceability and verifiability of the references to personal data, which is stored itself in a (possibly distr…
▽ More
This paper presents an architecture of a Personal Information Management System, in which individuals can define the access to their personal data by means of smart contracts. These smart contracts, running on the Ethereum blockchain, implement access control lists and grant immutability, traceability and verifiability of the references to personal data, which is stored itself in a (possibly distributed) file system. A distributed authorization mechanism is devised, where trust from multiple network nodes is necessary to grant the access to the data. To this aim, two possible alternatives are described: a Secret Sharing scheme and Threshold Proxy Re-Encryption scheme. The performance of these alternatives is experimentally compared in terms of execution time. Threshold Proxy Re-Encryption appears to be faster in different scenarios, in particular when increasing message size, number of nodes and the threshold value, i.e. number of nodes needed to grant the data disclosure.
△ Less
Submitted 25 January, 2021;
originally announced January 2021.
-
Sound absorption in glasses
Authors:
U. Buchenau,
G. D'Angelo,
G. Carini,
X. Liu,
M. A. Ramos
Abstract:
The paper presents a description of the sound wave absorption in glasses, from the lowest temperatures up to the glass transition, in terms of three compatible phenomenological models. Resonant tunneling, the rise of the relaxational tunneling to the tunneling plateau and the crossover to classical relaxation are universal features of glasses and are well described by the tunneling model and its e…
▽ More
The paper presents a description of the sound wave absorption in glasses, from the lowest temperatures up to the glass transition, in terms of three compatible phenomenological models. Resonant tunneling, the rise of the relaxational tunneling to the tunneling plateau and the crossover to classical relaxation are universal features of glasses and are well described by the tunneling model and its extension to include soft vibrations and low barrier relaxations, the soft potential model. Its further extension to non-universal features at higher temperatures is the very flexible Gilroy-Phillips model, which allows to determine the barrier density of the energy landscape of the specific glass from the frequency and temperature dependence of the sound wave absorption in the classical relaxation domain. To apply it properly at elevated temperatures, one needs its formulation in terms of the shear compliance. As one approaches the glass transition, universality sets in again with an exponential rise of the barrier density reflecting the frozen fast Kohlrausch t^beta-tail (in time t, with beta close to 1/2) of the viscous flow at the glass temperature. The validity of the scheme is checked for literature data of several glasses and polymers with and without secondary relaxation peaks. The frozen Kohlrausch tail of the mechanical relaxation shows no indication of the strongly temperature-dependent barrier density observed in dielectric data of molecular glasses with hydrogen bonds. Instead, the mechanical relaxation data indicate an energy landscape describable with a frozen temperature-independent barrier density for any glass.
△ Less
Submitted 26 August, 2022; v1 submitted 18 December, 2020;
originally announced December 2020.
-
Group-Harmonic and Group-Closeness Maximization -- Approximation and Engineering
Authors:
Eugenio Angriman,
Ruben Becker,
Gianlorenzo D'Angelo,
Hugo Gilbert,
Alexander van der Grinten,
Henning Meyerhenke
Abstract:
Centrality measures characterize important nodes in networks. Efficiently computing such nodes has received a lot of attention. When considering the generalization of computing central groups of nodes, challenging optimization problems occur. In this work, we study two such problems, group-harmonic maximization and group-closeness maximization both from a theoretical and from an algorithm engineer…
▽ More
Centrality measures characterize important nodes in networks. Efficiently computing such nodes has received a lot of attention. When considering the generalization of computing central groups of nodes, challenging optimization problems occur. In this work, we study two such problems, group-harmonic maximization and group-closeness maximization both from a theoretical and from an algorithm engineering perspective.
On the theoretical side, we obtain the following results. For group-harmonic maximization, unless $P=NP$, there is no polynomial-time algorithm that achieves an approximation factor better than $1-1/e$ (directed) and $1-1/(4e)$ (undirected), even for unweighted graphs. On the positive side, we show that a greedy algorithm achieves an approximation factor of $λ(1-2/e)$ (directed) and $λ(1-1/e)/2$ (undirected), where $λ$ is the ratio of minimal and maximal edge weights. For group-closeness maximization, the undirected case is $NP$-hard to be approximated to within a factor better than $1-1/(e+1)$ and a constant approximation factor is achieved by a local-search algorithm. For the directed case, however, we show that, for any $ε<1/2$, the problem is $NP$-hard to be approximated within a factor of $4|V|^{-ε}$.
From the algorithm engineering perspective, we provide efficient implementations of the above greedy and local search algorithms. In our experimental study we show that, on small instances where an optimum solution can be computed in reasonable time, the quality of both the greedy and the local search algorithms come very close to the optimum. On larger instances, our local search algorithms yield results with superior quality compared to existing greedy and local search solutions, at the cost of additional running time. We thus advocate local search for scenarios where solution quality is of highest concern.
△ Less
Submitted 29 October, 2020;
originally announced October 2020.
-
Fairness in Influence Maximization through Randomization
Authors:
Ruben Becker,
Gianlorenzo D'Angelo,
Sajjad Ghobadi,
Hugo Gilbert
Abstract:
The influence maximization paradigm has been used by researchers in various fields in order to study how information spreads in social networks. While previously the attention was mostly on efficiency, more recently fairness issues have been taken into account in this scope. In this paper, we propose to use randomization as a mean for achieving fairness. Similar to previous works like Fish et al.…
▽ More
The influence maximization paradigm has been used by researchers in various fields in order to study how information spreads in social networks. While previously the attention was mostly on efficiency, more recently fairness issues have been taken into account in this scope. In this paper, we propose to use randomization as a mean for achieving fairness. Similar to previous works like Fish et al. (WWW '19) and Tsang et al. (IJCAI '19), we study the maximin criterion for (group) fairness. In contrast to their work however, we model the problem in such a way that, when choosing the seed sets, probabilistic strategies are possible rather than only deterministic ones. We introduce two different variants of this probabilistic problem, one that entails probabilistic strategies over nodes (node-based problem) and a second one that entails probabilistic strategies over sets of nodes (set-based problem). While the original deterministic problem involving the maximin criterion has been shown to be inapproximable, interestingly, we show that both probabilistic variants permit approximation algorithms that achieve a constant multiplicative factor of 1-1/e plus an additive arbitrarily small error that is due to the simulation of the information spread. For an experimental study, we provide implementations of multiplicative-weight routines for both problems and compare the achieved fairness values to existing methods. Maybe non-surprisingly, we show that the ex-ante values of the computed probabilistic strategies are significantly larger than the (ex-post) fairness values of previous methods. This indicates that studying fairness via randomization is a worthwhile path to follow. Interestingly and maybe more surprisingly, we observe that even the ex-post fairness values computed by our routines, dominate over the fairness achieved by previous methods on most of the instances tested.
△ Less
Submitted 9 November, 2021; v1 submitted 7 October, 2020;
originally announced October 2020.
-
Growth of Jupiter: Formation in Disks of Gas and Solids and Evolution to the Present Epoch
Authors:
Gennaro D'Angelo,
Stuart J. Weidenschilling,
Jack J. Lissauer,
Peter Bodenheimer
Abstract:
[Abridged] The formation of Jupiter is modeled via core-nucleated accretion, and the planet's evolution is simulated up to the present epoch. The growth from a small embryo until gas accretion overtakes solids' accretion was presented by D'Angelo et al. (Icarus 2014, 241, 298). Those calculations followed the formation for $4\times 10^{5}$ years, until the heavy-element and H/He masses were…
▽ More
[Abridged] The formation of Jupiter is modeled via core-nucleated accretion, and the planet's evolution is simulated up to the present epoch. The growth from a small embryo until gas accretion overtakes solids' accretion was presented by D'Angelo et al. (Icarus 2014, 241, 298). Those calculations followed the formation for $4\times 10^{5}$ years, until the heavy-element and H/He masses were $M_{Z}\approx 7.3$ and $M_{XY}\approx 0.15$ Earth's masses ($M_{\oplus}$), respectively, and $dM_{XY}/dt\approx dM_{Z}/dt$. The calculation is continued through the phase when $M_{XY}=M_{Z}$, at which age, about $2.4\times 10^{6}$ years, the planet mass is $M_{p}\approx 20\,M_{\oplus}$. About $9\times 10^{5}$ years later, $M_{p}$ is approximately $60\,M_{\oplus}$ and $M_{Z}\approx 16\,M_{\oplus}$. Around this epoch, the contraction of the envelope dictates gas accretion rates a few times $10^{-3}\,M_{\oplus}$ per year, initiating the regime of disk-limited accretion, when the planet's evolution is tied to disk's evolution. Growth is continued by constructing simplified models of accretion disks that evolve through viscous diffusion, winds, and accretion on the planet. Jupiter's formation ends after $\approx 3.4$-$4.2$ Myr, when nebula gas disperses. The young Jupiter is $4.5$-$5.5$ times as voluminous as it is presently and thousands of times as luminous, $\sim 10^{-5}\,L_{\odot}$. The heavy-element mass is $\approx 20\,M_{\oplus}$. The evolution proceeds through the cooling and contraction phase, in isolation except for solar irradiation. After $4570$ Myr, radius and luminosity of the planet are within $10$% of current values. During formation, and soon thereafter, the planet exhibits features, e.g., luminosity and effective temperature, that may probe aspects of the latter stages of formation, if observable. These possibly distinctive features, however, seem to disappear within a few tens of Myr.
△ Less
Submitted 14 October, 2020; v1 submitted 10 September, 2020;
originally announced September 2020.
-
Dust distribution around low-mass planets on converging orbits
Authors:
Francesco Marzari,
Gennaro D'Angelo
Abstract:
Super-Earths can form at large orbital radii and migrate inward due to tidal interactions with the circumstellar disk. In this scenario, convergent migration may occur and lead to the formation of resonant pairs of planets. We explore the conditions under which convergent migration and resonance capture take place, and what dynamical consequences can be expected on the dust distribution surroundin…
▽ More
Super-Earths can form at large orbital radii and migrate inward due to tidal interactions with the circumstellar disk. In this scenario, convergent migration may occur and lead to the formation of resonant pairs of planets. We explore the conditions under which convergent migration and resonance capture take place, and what dynamical consequences can be expected on the dust distribution surrounding the resonant pair. We combine hydrodynamic planet--disk interaction models with dust evolution calculations to investigate the signatures produced in the dust distribution by a pair of planets in mean-motion resonances. We find that convergent migration takes place when the outer planet is the more massive. However, convergent migration also depends on the local properties of the disk, and divergent migration may result as well. For similar disk parameters, the capture in low degree resonances (e.g., 2:1 or 3:2) is preferred close to the star where the resonance strength can more easily overcome the tidal torques exerted by the gaseous disk. Farther away from the star, convergent migration may result in capture in high degree resonances. The dust distribution shows potentially observable features typically when the planets are trapped in a 2:1 resonance. In other cases, with higher degree resonances (e.g., 5:4 or 6:5) dust features may not be sufficiently pronounced to be easily observable. The degree of resonance established by a pair of super-Earths may be indicative of the location in the disk where capture occurred. There can be significant differences in the dust distribution around a single super-Earth and a pair of super-Earths in resonance.
△ Less
Submitted 31 August, 2020;
originally announced August 2020.
-
Implications of Dissemination Strategies on the Security of Distributed Ledgers
Authors:
Luca Serena,
Gabriele D'Angelo,
Stefano Ferretti
Abstract:
This paper describes a simulation study on security attacks over Distributed Ledger Technologies (DLTs). We specifically focus on attacks at the underlying peer-to-peer layer of these systems, that is in charge of disseminating messages containing data and transaction to be spread among all participants. In particular, we consider the Sybil attack, according to which a malicious node creates many…
▽ More
This paper describes a simulation study on security attacks over Distributed Ledger Technologies (DLTs). We specifically focus on attacks at the underlying peer-to-peer layer of these systems, that is in charge of disseminating messages containing data and transaction to be spread among all participants. In particular, we consider the Sybil attack, according to which a malicious node creates many Sybils that drop messages coming from a specific attacked node, or even all messages from honest nodes. Our study shows that the selection of the specific dissemination protocol, as well as the amount of connections each peer has, have an influence on the resistance to this attack.
△ Less
Submitted 30 July, 2020;
originally announced July 2020.
-
DiLeNA: Distributed Ledger Network Analyzer
Authors:
Luca Serena,
Stefano Ferretti,
Gabriele D'Angelo
Abstract:
This paper describes the Distributed Ledger Network Analyzer (DiLeNA), a new software tool for the analysis of the transactions network recorded in Distributed Ledger Technologies (DLTs). The set of transactions in a DLT forms a complex network. Studying its characteristics and peculiarities is of paramount importance, in order to understand how users interact in the distributed ledger system. The…
▽ More
This paper describes the Distributed Ledger Network Analyzer (DiLeNA), a new software tool for the analysis of the transactions network recorded in Distributed Ledger Technologies (DLTs). The set of transactions in a DLT forms a complex network. Studying its characteristics and peculiarities is of paramount importance, in order to understand how users interact in the distributed ledger system. The tool design and implementation is introduced and some results are provided. In particular, the Bitcoin and Ethereum blockchains, i.e. the most famous and used DLTs at the time of writing, have been analyzed and compared.
△ Less
Submitted 29 July, 2020;
originally announced July 2020.
-
Improved Approximation Factor for Adaptive Influence Maximization via Simple Greedy Strategies
Authors:
Gianlorenzo D'Angelo,
Debashmita Poddar,
Cosimo Vinci
Abstract:
In the adaptive influence maximization problem, we are given a social network and a budget $k$, and we iteratively select $k$ nodes, called seeds, in order to maximize the expected number of nodes that are reached by an influence cascade that they generate according to a stochastic model for influence diffusion. Differently from the non-adaptive influence maximization problem, where all the seeds…
▽ More
In the adaptive influence maximization problem, we are given a social network and a budget $k$, and we iteratively select $k$ nodes, called seeds, in order to maximize the expected number of nodes that are reached by an influence cascade that they generate according to a stochastic model for influence diffusion. Differently from the non-adaptive influence maximization problem, where all the seeds must be selected beforehand, here nodes are selected sequentially one by one, and the decision on the $i$th seed is based on the observed cascade produced by the first $i-1$ seeds. We focus on the myopic feedback model, in which we can only observe which neighbors of previously selected seeds have been influenced and on the independent cascade model, where each edge is associated with an independent probability of diffusing influence. Previous works showed that the adaptivity gap is at most $4$, which implies that the non-adaptive greedy algorithm guarantees an approximation factor of $\frac{1}{4}\left(1-\frac{1}{e}\right)$ for the adaptive problem. In this paper, we improve the bounds on both the adaptivity gap and on the approximation factor. We directly analyze the approximation factor of the non-adaptive greedy algorithm, without passing through the adaptivity gap, and show that it is at least $\frac{1}{2}\left(1-\frac{1}{e}\right)$. Therefore, the adaptivity gap is at most $\frac{2e}{e-1}\approx 3.164$. To prove these bounds, we introduce a new approach to relate the greedy non-adaptive algorithm to the adaptive optimum. The new approach does not rely on multi-linear extensions or random walks on optimal decision trees, which are commonly used techniques in the field. We believe that it is of independent interest and may be used to analyze other adaptive optimization problems.
△ Less
Submitted 2 May, 2021; v1 submitted 16 July, 2020;
originally announced July 2020.
-
On the Efficiency of Decentralized File Storage for Personal Information Management Systems
Authors:
Mirko Zichichi,
Stefano Ferretti,
Gabriele D'Angelo
Abstract:
This paper presents an architecture, based on Distributed Ledger Technologies (DLTs) and Decentralized File Storage (DFS) systems, to support the use of Personal Information Management Systems (PIMS). DLT and DFS are used to manage data sensed by mobile users equipped with devices with sensing capability. DLTs guarantee the immutability, traceability and verifiability of references to personal dat…
▽ More
This paper presents an architecture, based on Distributed Ledger Technologies (DLTs) and Decentralized File Storage (DFS) systems, to support the use of Personal Information Management Systems (PIMS). DLT and DFS are used to manage data sensed by mobile users equipped with devices with sensing capability. DLTs guarantee the immutability, traceability and verifiability of references to personal data, that are stored in DFS. In fact, the inclusion of data digests in the DLT makes it possible to obtain an unalterable reference and a tamper-proof log, while remaining compliant with the regulations on personal data, i.e. GDPR. We provide an experimental evaluation on the feasibility of the use of DFS. Three different scenarios have been studied: i) a proprietary IPFS approach with a dedicated node interfacing with the data producers, ii) a public IPFS service and iii) Sia Skynet. Results show that through proper configuration of the system infrastructure, it is viable to build a decentralized Personal Data Storage (PDS).
△ Less
Submitted 7 July, 2020;
originally announced July 2020.
-
Better Bounds on the Adaptivity Gap of Influence Maximization under Full-adoption Feedback
Authors:
Gianlorenzo D'Angelo,
Debashmita Poddar,
Cosimo Vinci
Abstract:
In the influence maximization (IM) problem, we are given a social network and a budget $k$, and we look for a set of $k$ nodes in the network, called seeds, that maximize the expected number of nodes that are reached by an influence cascade generated by the seeds, according to some stochastic model for influence diffusion. In this paper, we study the adaptive IM, where the nodes are selected seque…
▽ More
In the influence maximization (IM) problem, we are given a social network and a budget $k$, and we look for a set of $k$ nodes in the network, called seeds, that maximize the expected number of nodes that are reached by an influence cascade generated by the seeds, according to some stochastic model for influence diffusion. In this paper, we study the adaptive IM, where the nodes are selected sequentially one by one, and the decision on the $i$th seed can be based on the observed cascade produced by the first $i-1$ seeds. We focus on the full-adoption feedback in which we can observe the entire cascade of each previously selected seed and on the independent cascade model where each edge is associated with an independent probability of diffusing influence.
Our main result is the first sub-linear upper bound that holds for any graph. Specifically, we show that the adaptivity gap is upper-bounded by $\lceil n^{1/3}\rceil $, where $n$ is the number of nodes in the graph. Moreover, we improve over the known upper bound for in-arborescences from $\frac{2e}{e-1}\approx 3.16$ to $\frac{2e^2}{e^2-1}\approx 2.31$. Finally, we study $α$-bounded graphs, a class of undirected graphs in which the sum of node degrees higher than two is at most $α$, and show that the adaptivity gap is upper-bounded by $\sqrtα+O(1)$. Moreover, we show that in 0-bounded graphs, i.e. undirected graphs in which each connected component is a path or a cycle, the adaptivity gap is at most $\frac{3e^3}{e^3-1}\approx 3.16$. To prove our bounds, we introduce new techniques to relate adaptive policies with non-adaptive ones that might be of their own interest.
△ Less
Submitted 27 June, 2020;
originally announced June 2020.
-
Multi-Winner Election Control via Social Influence
Authors:
Mohammad Abouei Mehrizi,
Gianlorenzo D'Angelo
Abstract:
In an election, we are given a set of voters, each having a preference list over a set of candidates, that are distributed on a social network. We consider a scenario where voters may change their preference lists as a consequence of the messages received by their neighbors in a social network. Specifically, we consider a political campaign that spreads messages in a social network in support or a…
▽ More
In an election, we are given a set of voters, each having a preference list over a set of candidates, that are distributed on a social network. We consider a scenario where voters may change their preference lists as a consequence of the messages received by their neighbors in a social network. Specifically, we consider a political campaign that spreads messages in a social network in support or against a given candidate and the spreading follows a dynamic model for information diffusion. When a message reaches a voter, this latter changes its preference list according to an update rule. The election control problem asks to find a bounded set of nodes to be the starter of a political campaign in support (constructive problem) or against (destructive problem) a given target candidate $c$, in such a way that the margin of victory of $c$ w.r.t. its most voted opponents is maximized. It has been shown that several variants of the problem can be solved within a constant factor approximation of the optimum, which shows that controlling elections by means of social networks is doable and constitutes a real problem for modern democracies. Most of the literature, however, focuses on the case of single-winner elections. In this paper, we define the election control problem in social networks for "multi-winner elections" with the aim of modeling parliamentarian elections. Differently from the single-winner case, we show that the multi-winner election control problem is NP-hard to approximate within any factor in both constructive and destructive cases. We then study a relaxation of the problem where votes are aggregated on the basis of parties (instead of single candidates), which is a variation of the so-called "straight-party voting" used in some real parliamentarian elections. We show that the latter problem remains NP-hard but can be approximated within a constant factor.
△ Less
Submitted 28 May, 2020; v1 submitted 8 May, 2020;
originally announced May 2020.
-
Maximizing Influence-based Group Shapley Centrality
Authors:
Ruben Becker,
Gianlorenzo D'Angelo,
Hugo Gilbert
Abstract:
One key problem in network analysis is the so-called influence maximization problem, which consists in finding a set $S$ of at most $k$ seed users, in a social network, maximizing the spread of information from $S$. This paper studies a related but slightly different problem: We want to find a set $S$ of at most $k$ seed users that maximizes the spread of information, when $S$ is added to an alrea…
▽ More
One key problem in network analysis is the so-called influence maximization problem, which consists in finding a set $S$ of at most $k$ seed users, in a social network, maximizing the spread of information from $S$. This paper studies a related but slightly different problem: We want to find a set $S$ of at most $k$ seed users that maximizes the spread of information, when $S$ is added to an already pre-existing - but unknown - set of seed users $T$. We consider such scenario to be very realistic. Assume a central entity wants to spread a piece of news, while having a budget to influence $k$ users. This central authority may know that some users are already aware of the information and are going to spread it anyhow. The identity of these users being however completely unknown. We model this optimization problem using the Group Shapley value, a well-founded concept from cooperative game theory. While the standard influence maximization problem is easy to approximate within a factor $1-1/e-ε$ for any $ε>0$, assuming common computational complexity conjectures, we obtain strong hardness of approximation results for the problem at hand in this paper. Maybe most prominently, we show that it cannot be approximated within $1/n^{o(1)}$ under the Gap Exponential Time Hypothesis. Hence, it is unlikely to achieve anything better than a polynomial factor approximation. Nevertheless, we show that a greedy algorithm can achieve a factor of $\frac{1-1/e}{k}-ε$ for any $ε>0$, showing that not all is lost in settings where $k$ is bounded.
△ Less
Submitted 17 March, 2020;
originally announced March 2020.
-
Capture and migration of Jupiter and Saturn in mean motion resonance in a gaseous protoplanetary disc
Authors:
Raul O. Chametla,
Gennaro D'Angelo,
Mauricio Reyes-Ruiz,
F. Javier Sanchez-Salcedo
Abstract:
We study the dynamical evolution of Jupiter and Saturn embedded in a gaseous, solar-nebula-type disc by means of hydrodynamics simulations with the FARGO2D1D code. We study the evolution for different initial separations of the planets' orbits, Delta a_SJ , to investigate whether they become captured in mean motion resonance (MMR) and the direction of the subsequent migration of the planet (inward…
▽ More
We study the dynamical evolution of Jupiter and Saturn embedded in a gaseous, solar-nebula-type disc by means of hydrodynamics simulations with the FARGO2D1D code. We study the evolution for different initial separations of the planets' orbits, Delta a_SJ , to investigate whether they become captured in mean motion resonance (MMR) and the direction of the subsequent migration of the planet (inward or outward). We also provide an assessment of the planet's orbital dynamics at different epochs of Saturn's growth. We find that the evolution of initially compact orbital configurations is dependent on the value of Delta a_SJ . This implies that an evolution as that proposed in the Grand Tack model depends on the precise initial orbits of Jupiter and Saturn and on the timescales for their formation. Capture in the 1:2 MMR and inward or (nearly) stalled migration are highly favoured. Within its limits, our work suggests that the reversed migration, associated with the resonance capture of Jupiter and Saturn, may be a low probability evolutionary scenario, so that other planetary systems with giant planets are not expected to have experienced a Grand Tack-like evolutionary path.
△ Less
Submitted 24 January, 2020;
originally announced January 2020.
-
Are Distributed Ledger Technologies Ready for Smart Transportation Systems?
Authors:
Mirko Zichichi,
Stefano Ferretti,
Gabriele D'Angelo
Abstract:
The aim of this paper is to understand whether Distributed Ledger Technologies (DLTs) are ready to support complex services, such as those related to Intelligent Transportation Systems (ITS). In smart transportation services, a huge amount of sensed data is generated by a multitude of vehicles. While DLTs provide very interesting features, such as immutability, traceability and verifiability of da…
▽ More
The aim of this paper is to understand whether Distributed Ledger Technologies (DLTs) are ready to support complex services, such as those related to Intelligent Transportation Systems (ITS). In smart transportation services, a huge amount of sensed data is generated by a multitude of vehicles. While DLTs provide very interesting features, such as immutability, traceability and verifiability of data, some doubts on the scalability and responsiveness of these technologies appear to be well-founded. We propose an architecture for ITS that resorts to DLT features. Moreover, we provide experimental results of a real test-bed over IOTA, a promising DLT for IoT. Results clearly show that, while the viability of the proposal cannot be rejected, further work is needed on the responsiveness of DLT infrastructures.
△ Less
Submitted 30 July, 2020; v1 submitted 23 January, 2020;
originally announced January 2020.
-
Parallel Data Distribution Management on Shared-Memory Multiprocessors
Authors:
Moreno Marzolla,
Gabriele D'Angelo
Abstract:
The problem of identifying intersections between two sets of d-dimensional axis-parallel rectangles appears frequently in the context of agent-based simulation studies. For this reason, the High Level Architecture (HLA) specification -- a standard framework for interoperability among simulators -- includes a Data Distribution Management (DDM) service whose responsibility is to report all intersect…
▽ More
The problem of identifying intersections between two sets of d-dimensional axis-parallel rectangles appears frequently in the context of agent-based simulation studies. For this reason, the High Level Architecture (HLA) specification -- a standard framework for interoperability among simulators -- includes a Data Distribution Management (DDM) service whose responsibility is to report all intersections between a set of subscription and update regions. The algorithms at the core of the DDM service are CPU-intensive, and could greatly benefit from the large computing power of modern multi-core processors. In this paper we propose two parallel solutions to the DDM problem that can operate effectively on shared-memory multiprocessors. The first solution is based on a data structure (the Interval Tree) that allows concurrent computation of intersections between subscription and update regions. The second solution is based on a novel parallel extension of the Sort Based Matching algorithm, whose sequential version is considered among the most efficient solutions to the DDM problem. Extensive experimental evaluation of the proposed algorithms confirm their effectiveness on taking advantage of multiple execution units in a shared-memory architecture.
△ Less
Submitted 26 February, 2020; v1 submitted 7 November, 2019;
originally announced November 2019.
-
Fast Session Resumption in DTLS for Mobile Communications
Authors:
Gyordan Caminati,
Sara Kiade,
Gabriele D'Angelo,
Stefano Ferretti,
Vittorio Ghini
Abstract:
DTLS is a protocol that provides security guarantees to Internet communications. It can operate on top of both TCP and UDP transport protocols. Thus, it is particularly suited for peer-to-peer and distributed multimedia applications. The same holds if the endpoints are mobile devices. In this scenario, mechanisms are needed to surmount possible network disconnections, often arising due to the mobi…
▽ More
DTLS is a protocol that provides security guarantees to Internet communications. It can operate on top of both TCP and UDP transport protocols. Thus, it is particularly suited for peer-to-peer and distributed multimedia applications. The same holds if the endpoints are mobile devices. In this scenario, mechanisms are needed to surmount possible network disconnections, often arising due to the mobility or the scarce resources of devices, that can jeopardize the quality of the communications. Session resumption is thus a main issue to deal with. To this aim, we propose a fast reconnection scheme that employs non-connected sockets to quickly resume DTLS communication sessions. The proposed scheme is assessed in a performance evaluation that confirms its viability.
△ Less
Submitted 31 March, 2020; v1 submitted 8 October, 2019;
originally announced October 2019.
-
A Distributed Ledger Based Infrastructure for Smart Transportation System and Social Good
Authors:
Mirko Zichichi,
Stefano Ferretti,
Gabriele D'Angelo
Abstract:
This paper presents a system architecture to promote the development of smart transportation systems. Thanks to the use of distributed ledgers and related technologies, it is possible to create, store and share data generated by users through their sensors, while moving. In particular, IOTA and IPFS are used to store and certify data (and their related metadata) coming from sensors or by the users…
▽ More
This paper presents a system architecture to promote the development of smart transportation systems. Thanks to the use of distributed ledgers and related technologies, it is possible to create, store and share data generated by users through their sensors, while moving. In particular, IOTA and IPFS are used to store and certify data (and their related metadata) coming from sensors or by the users themselves. Ethereum is exploited as the smart contract platform that coordinates the data sharing and provisioning. The necessary privacy guarantees are provided by the usage of Zero Knowledge Proof. We show some results obtained from some use case scenarios that demonstrate how such technologies can be integrated to build novel smart services and to promote social good in user mobility.
△ Less
Submitted 31 March, 2020; v1 submitted 8 October, 2019;
originally announced October 2019.
-
Agent-based Simulation of Blockchains
Authors:
Edoardo Rosa,
Gabriele D'Angelo,
Stefano Ferretti
Abstract:
In this paper, we describe LUNES-Blockchain, an agent-based simulator of blockchains that is able to exploit Parallel and Distributed Simulation (PADS) techniques to offer a high level of scalability. To assess the preliminary implementation of our simulator, we provide a simplified modelling of the Bitcoin protocol and we study the effect of a security attack on the consensus protocol in which a…
▽ More
In this paper, we describe LUNES-Blockchain, an agent-based simulator of blockchains that is able to exploit Parallel and Distributed Simulation (PADS) techniques to offer a high level of scalability. To assess the preliminary implementation of our simulator, we provide a simplified modelling of the Bitcoin protocol and we study the effect of a security attack on the consensus protocol in which a set of malicious nodes implements a filtering denial of service (i.e. Sybil Attack). The results confirm the viability of the agent-based modelling of blockchains implemented by means of PADS.
△ Less
Submitted 6 November, 2019; v1 submitted 29 August, 2019;
originally announced August 2019.
-
On the Ethereum Blockchain Structure: a Complex Networks Theory Perspective
Authors:
Stefano Ferretti,
Gabriele D'Angelo
Abstract:
In this paper, we analyze the Ethereum blockchain using the complex networks modeling framework. Accounts acting on the blockchain are represented as nodes, while the interactions among these accounts, recorded on the blockchain, are treated as links in the network. Using this representation, it is possible to derive interesting mathematical characteristics that improve the understanding of the ac…
▽ More
In this paper, we analyze the Ethereum blockchain using the complex networks modeling framework. Accounts acting on the blockchain are represented as nodes, while the interactions among these accounts, recorded on the blockchain, are treated as links in the network. Using this representation, it is possible to derive interesting mathematical characteristics that improve the understanding of the actual interactions happening in the blockchain. Not only, by looking at the history of the blockchain, it is possible to verify if radical changes in the blockchain evolution happened.
△ Less
Submitted 29 August, 2019;
originally announced August 2019.
-
Internet-based Adaptive Distributed Simulation of Mobile Ad-hoc Networks
Authors:
Gabriele D'Angelo,
Stefano Ferretti,
Gary S. H. Tan
Abstract:
In this paper we focus on Internet-based simulation, a form of distributed simulation in which a set of execution units that are physically located around the globe work together to run a simulation model. This setup is very challenging because of the latency/variability of communications. Thus, clever mechanisms must be adopted in the distributed simulation, such as the adaptive partitioning of t…
▽ More
In this paper we focus on Internet-based simulation, a form of distributed simulation in which a set of execution units that are physically located around the globe work together to run a simulation model. This setup is very challenging because of the latency/variability of communications. Thus, clever mechanisms must be adopted in the distributed simulation, such as the adaptive partitioning of the simulated model and load balancing strategies among execution units. We simulate a wireless model over a real Internet-based distributed simulation setup, and evaluate the scalability of the simulator with and without the use of adaptive strategies for both communication overhead reduction and load-balancing enhancement. The results confirm the viability of our approach to build Internet-based simulations.
△ Less
Submitted 31 March, 2020; v1 submitted 30 August, 2019;
originally announced August 2019.
-
Balancing spreads of influence in a social network
Authors:
Ruben Becker,
Federico Corò,
Gianlorenzo D'Angelo,
Hugo Gilbert
Abstract:
The personalization of our news consumption on social media has a tendency to reinforce our pre-existing beliefs instead of balancing our opinions. This finding is a concern for the health of our democracies which rely on an access to information providing diverse viewpoints. To tackle this issue from a computational perspective, Garimella et al. (NIPS'17) modeled the spread of these viewpoints, a…
▽ More
The personalization of our news consumption on social media has a tendency to reinforce our pre-existing beliefs instead of balancing our opinions. This finding is a concern for the health of our democracies which rely on an access to information providing diverse viewpoints. To tackle this issue from a computational perspective, Garimella et al. (NIPS'17) modeled the spread of these viewpoints, also called campaigns, using the well-known independent cascade model and studied an optimization problem that aims at balancing information exposure in a social network when two opposing campaigns propagate in the network. The objective in their $NP$-hard optimization problem is to maximize the number of people that are exposed to either both or none of the viewpoints. For two different settings, one corresponding to a model where campaigns spread in a correlated manner, and a second one, where the two campaigns spread in a heterogeneous manner, they provide constant ratio approximation algorithms. In this paper, we investigate a more general formulation of this problem. That is, we assume that $μ$ different campaigns propagate in a social network and we aim to maximize the number of people that are exposed to either $ν$ or none of the campaigns, where $μ\geν\ge2$. We provide dedicated approximation algorithms for both the correlated and heterogeneous settings. Interestingly, for the heterogeneous setting with $ν\ge 3$, we give a reduction leading to several approximation hardness results. Maybe most importantly, we obtain that the problem cannot be approximated within a factor of $n^{-g(n)}$ for any $g(n)=o(1)$ assuming Gap-ETH, denoting with $n$ the number of nodes in the social network. For $ν\ge 4$, there is no $n^{-ε}$-approximation algorithm if a certain class of one-way functions exists, where $ε> 0$ is a given constant which depends on $ν$.
△ Less
Submitted 31 May, 2019;
originally announced June 2019.
-
LikeStarter: a Smart-contract based Social DAO for Crowdfunding
Authors:
Mirko Zichichi,
Michele Contu,
Stefano Ferretti,
Gabriele D'Angelo
Abstract:
Crowdfunding has become a popular form of collective funding, in which small donations or investments, made by groups of people, support the development of new projects in exchange of free products or different types of recognition. Social network sites, on the other hand, promote user cooperation and currently are at the basis of any individuals cyber-interactions. In this paper, we present LikeS…
▽ More
Crowdfunding has become a popular form of collective funding, in which small donations or investments, made by groups of people, support the development of new projects in exchange of free products or different types of recognition. Social network sites, on the other hand, promote user cooperation and currently are at the basis of any individuals cyber-interactions. In this paper, we present LikeStarter, a blockchain-based decentralized platform that combines social interactions with crowdfunding mechanisms, allowing any user to raise funds while becoming popular in the social network. Being built over the Ethereum blockchain, LikeStarter is structured as a Decentralized Autonomous Organization (DAO), that fosters crowdfunding without the intervention of any central authority, and recognizes the active role of donors, enabling them to support artists or projects, while making profits.
△ Less
Submitted 6 November, 2019; v1 submitted 14 May, 2019;
originally announced May 2019.
-
Election Control through Social Influence with Unknown Preferences
Authors:
Mohammad Abouei Mehrizi,
Federico Corò,
Emilio Cruciani,
Gianlorenzo D'Angelo
Abstract:
The election control problem through social influence asks to find a set of nodes in a social network of voters to be the starters of a political campaign aiming at supporting a given target candidate. Voters reached by the campaign change their opinions on the candidates. The goal is to shape the diffusion of the campaign in such a way that the chances of victory of the target candidate are maxim…
▽ More
The election control problem through social influence asks to find a set of nodes in a social network of voters to be the starters of a political campaign aiming at supporting a given target candidate. Voters reached by the campaign change their opinions on the candidates. The goal is to shape the diffusion of the campaign in such a way that the chances of victory of the target candidate are maximized. Previous work shows that the problem can be approximated within a constant factor in several models of information diffusion and voting systems, assuming that the controller, i.e., the external agent that starts the campaign, has full knowledge of the preferences of voters. However this information is not always available since some voters might not reveal it. Herein we relax this assumption by considering that each voter is associated with a probability distribution over the candidates. We propose two models in which, when an electoral campaign reaches a voter, this latter modifies its probability distribution according to the amount of influence it received from its neighbors in the network. We then study the election control problem through social influence on the new models: In the first model, under the Gap-ETH, election control cannot be approximated within a factor better than $1/n^{o(1)}$, where $n$ is the number of voters; in the second model, which is a slight relaxation of the first one, the problem admits a constant factor approximation algorithm.
△ Less
Submitted 13 July, 2020; v1 submitted 12 May, 2019;
originally announced May 2019.
-
On the fixed-parameter tractability of the maximum connectivity improvement problem
Authors:
Federico Corò,
Gianlorenzo D'Angelo,
Vahan Mkrtchyan
Abstract:
In the Maximum Connectivity Improvement (MCI) problem, we are given a directed graph $G=(V,E)$ and an integer $B$ and we are asked to find $B$ new edges to be added to $G$ in order to maximize the number of connected pairs of vertices in the resulting graph. The MCI problem has been studied from the approximation point of view. In this paper, we approach it from the parameterized complexity perspe…
▽ More
In the Maximum Connectivity Improvement (MCI) problem, we are given a directed graph $G=(V,E)$ and an integer $B$ and we are asked to find $B$ new edges to be added to $G$ in order to maximize the number of connected pairs of vertices in the resulting graph. The MCI problem has been studied from the approximation point of view. In this paper, we approach it from the parameterized complexity perspective in the case of directed acyclic graphs. We show several hardness and algorithmic results with respect to different natural parameters. Our main result is that the problem is $W[2]$-hard for parameter $B$ and it is FPT for parameters $|V| - B$ and $ν$, the matching number of $G$. We further characterize the MCI problem with respect to other complementary parameters.
△ Less
Submitted 26 April, 2019;
originally announced April 2019.
-
Exploiting Social Influence to Control Elections Based on Scoring Rules
Authors:
Federico Corò,
Emilio Cruciani,
Gianlorenzo D'Angelo,
Stefano Ponziani
Abstract:
Online social networks are used to diffuse opinions and ideas among users, enabling a faster communication and a wider audience. The way in which opinions are conditioned by social interactions is usually called social influence. Social influence is extensively used during political campaigns to advertise and support candidates. Herein we consider the problem of exploiting social influence in a ne…
▽ More
Online social networks are used to diffuse opinions and ideas among users, enabling a faster communication and a wider audience. The way in which opinions are conditioned by social interactions is usually called social influence. Social influence is extensively used during political campaigns to advertise and support candidates. Herein we consider the problem of exploiting social influence in a network of voters in order to change their opinion about a target candidate with the aim of increasing his chance to win/lose the election in a wide range of voting systems.
We introduce the Linear Threshold Ranking, a natural and powerful extension of the well-established Linear Threshold Model, which describes the change of opinions taking into account the amount of exercised influence. We are able to maximize the score of a target candidate up to a factor of $1-1/e$ by showing submodularity. We exploit such property to provide a $\frac{1}{3}(1-1/e)$-approximation algorithm for the constructive election control problem. Similarly, we get a $\frac{1}{2}(1-1/e)$-approximation ratio in the destructive scenario. The algorithm can be used in arbitrary scoring rule voting systems, including plurality rule and borda count. Finally, we perform an experimental study on real-world networks, measuring Probability of Victory (PoV) and Margin of Victory (MoV) of the target candidate, to validate the model and to test the capability of the algorithm.
△ Less
Submitted 2 July, 2019; v1 submitted 20 February, 2019;
originally announced February 2019.
-
Circumstellar dust distribution in systems with two planets in resonance
Authors:
Francesco Marzari,
Gennaro D'Angelo,
Giovanni Picogna
Abstract:
We investigate via numerical modeling the effects of two planets locked in resonance, and migrating outward, on the dust distribution of the natal circumstellar disk. We aim to test whether the dust distribution exhibits peculiar features arising from the interplay among the gravitational perturbations of the planets in resonance, the evolution of the gas, and its influence on the dust grains' dyn…
▽ More
We investigate via numerical modeling the effects of two planets locked in resonance, and migrating outward, on the dust distribution of the natal circumstellar disk. We aim to test whether the dust distribution exhibits peculiar features arising from the interplay among the gravitational perturbations of the planets in resonance, the evolution of the gas, and its influence on the dust grains' dynamics. We focus on the 3:2 and 2:1 resonance, where the trapping may be caused by the convergent migration of a Jupiter- and Saturn-mass planet, preceding the common gap formation and ensuing outward (or inward) migration. Models show that a common gap also forms in the dust component -- similarly to what a single, more massive planet would generate -- and that outward migration leads to a progressive widening of the dust gap and to a decoupling from the gas gap. As the system evolves, a significantly wider gap is observed in the dust distribution, which ceases to overlap with the gas gap in the inner disk regions. At the outer edge of the gas gap, outward migration of the planets produces an over-density of dust particles, which evolve differently in the 3:2 and 2:1 resonances. For the 3:2, the dust trap at the gap's outer edge is partly efficient and a significant fraction of the grains filters through the gap. For the 2:1 resonance, the trap is more efficient and very few grains cross the gap, while the vast majority accumulate at the outer edge of the gap.
△ Less
Submitted 18 December, 2018;
originally announced December 2018.