Controlling Epidemic Spread Under Immunization Delay Constraints

被引:0
作者
Li, Shiju [1 ]
Huang, Xin [2 ]
Lee, Chul-Ho [2 ]
Eun, Do Young [3 ]
机构
[1] Florida Inst Technol, Melbourne, FL 32901 USA
[2] Texas State Univ, San Marcos, TX USA
[3] North Carolina State Univ, Raleigh, NC USA
来源
2023 IFIP NETWORKING CONFERENCE, IFIP NETWORKING | 2023年
基金
美国国家科学基金会;
关键词
VIRUS SPREAD; NETWORK;
D O I
10.23919/IFIPNetworking57963.2023.10186397
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper, we study the problem of minimizing the spread of a viral epidemic when immunization takes a non-negligible amount of time to take into effect. Specifically, our problem is to determine which set of nodes to be vaccinated when vaccines take a random amount of time in order to maximize the total reward, which is the expected number of saved nodes. We first provide a mathematical analysis for the reward function of vaccinating an arbitrary number of nodes when there is a single source of infection. While it is infeasible to obtain the optimal solution analytically due to the combinatorial nature of the problem, we establish that the problem is a monotone sub-modular maximization problem and develop a greedy algorithm that achieves a (1-1/e)-approximation. We further extend the scenario to the ones with multiple infection sources and discuss how the greedy algorithm can be applied systematically for the multiple-source scenarios. We finally present extensive simulation results to demonstrate the superiority of our greedy algorithm over other baseline vaccination strategies.
引用
收藏
页数:9
相关论文
共 27 条
  • [1] [Anonymous], 2023, HACKER NEWS
  • [2] [Anonymous], 1999, Epidemic Modeling
  • [3] Bilge L., 2012, P 2012 ACM C COMP CO, P833, DOI [10.1145/2382196.2382284, DOI 10.1145/2382196.2382284]
  • [4] Epidemic thresholds in real networks
    Chakrabarti, Deepayan
    Wang, Yang
    Wang, Chenxi
    Leskovec, Jurij
    Faloutsos, Christos
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 10 (04)
  • [5] Eigen-Optimization on Large Graphs by Edge Manipulation
    Chen, Chen
    Tong, Hanghang
    Prakash, B. Aditya
    Eliassi-Rad, Tina
    Faloutsos, Michalis
    Faloutsos, Christos
    [J]. ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2016, 10 (04)
  • [6] Node Immunization on Large Graphs: Theory and Algorithms
    Chen, Chen
    Tong, Hanghang
    Prakash, B. Aditya
    Tsourakakis, Charalampos E.
    Eliassi-Rad, Tina
    Faloutsos, Christos
    Chau, Duen Horng
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2016, 28 (01) : 113 - 126
  • [7] Choi J, 2019, J COMMUN NETW-S KOR, V21, P136
  • [8] Software security patch management-A systematic literature review of challenges, approaches, tools and practices
    Dissanayake, Nesara
    Jayatilaka, Asangi
    Zahedi, Mansooreh
    Babar, M. Ali
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2022, 144
  • [9] Thresholds for virus spread on networks
    Draief, Moez
    Ganesh, Ayalvadi
    Massoulie, Laurent
    [J]. ANNALS OF APPLIED PROBABILITY, 2008, 18 (02) : 359 - 378
  • [10] Ganesh A, 2005, IEEE INFOCOM SER, P1455