An Analysis of One-Dimensional Schelling Segregation G AUTAM K AMATH, C ORNELL U NIVERSITY C HRISTINA B RANDT, S TANFORD U NIVERSITY N ICOLE I MMORLICA,

Slides:



Advertisements
Similar presentations
Motion in One Dimension
Advertisements

Routing Complexity of Faulty Networks Omer Angel Itai Benjamini Eran Ofek Udi Wieder The Weizmann Institute of Science.
Jennifer Tour Chayes Joint work with N. Berger, C. Borgs, A. Ganesh, A. Saberi, D. B. Wilson Controlling the Spread of Viruses on Power-Law Networks.
Scalable and Dynamic Quorum Systems Moni Naor & Udi Wieder The Weizmann Institute of Science.
Shortest Vector In A Lattice is NP-Hard to approximate
Bart Jansen 1.  Problem definition  Instance: Connected graph G, positive integer k  Question: Is there a spanning tree for G with at least k leaves?
Isolation Technique April 16, 2001 Jason Ku Tao Li.
Differential Equations Brannan Copyright © 2010 by John Wiley & Sons, Inc. All rights reserved. Chapter 08: Series Solutions of Second Order Linear Equations.
Size-estimation framework with applications to transitive closure and reachability Presented by Maxim Kalaev Edith Cohen AT&T Bell Labs 1996.
Routing in a Parallel Computer. A network of processors is represented by graph G=(V,E), where |V| = N. Each processor has unique ID between 1 and N.
DYNAMICS OF RANDOM BOOLEAN NETWORKS James F. Lynch Clarkson University.
COMP 553: Algorithmic Game Theory Fall 2014 Yang Cai Lecture 21.
Maximizing the Spread of Influence through a Social Network
Gibbs sampler - simple properties It’s not hard to show that this MC chain is aperiodic. Often is reversible distribution. If in addition the chain is.
Theory of Computing Lecture 3 MAS 714 Hartmut Klauck.
Flows and Networks Plan for today (lecture 2): Questions? Continuous time Markov chain Birth-death process Example: pure birth process Example: pure death.
1 Finite-Length Scaling and Error Floors Abdelaziz Amraoui Andrea Montanari Ruediger Urbanke Tom Richardson.
Entropy Rates of a Stochastic Process
Why almost all k-colorable graphs are easy A. Coja-Oghlan, M. Krivelevich, D. Vilenchik.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Minimaxity & Admissibility Presenting: Slava Chernoi Lehman and Casella, chapter 5 sections 1-2,7.
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
Hypercubes and Neural Networks bill wolfe 10/23/2005.
Random Walks Great Theoretical Ideas In Computer Science Steven Rudich, Anupam GuptaCS Spring 2004 Lecture 24April 8, 2004Carnegie Mellon University.
Ramanujan Graphs of Every Degree Adam Marcus (Crisply, Yale) Daniel Spielman (Yale) Nikhil Srivastava (MSR India)
Monte Carlo Methods in Partial Differential Equations.
Efficient and Robust Query Processing in Dynamic Environments Using Random Walk Techniques Chen Avin Carlos Brito.
Entropy Rate of a Markov Chain
Decentralised load balancing in closed and open systems A. J. Ganesh University of Bristol Joint work with S. Lilienthal, D. Manjunath, A. Proutiere and.
Additional Topics in Differential Equations
Random Sampling, Point Estimation and Maximum Likelihood.
Lecture #9 Analysis tools for hybrid systems: Impact maps João P. Hespanha University of California at Santa Barbara Hybrid Control and Switched Systems.
1 Sampling Distributions Lecture 9. 2 Background  We want to learn about the feature of a population (parameter)  In many situations, it is impossible.
Random Walks Great Theoretical Ideas In Computer Science Steven Rudich, Anupam GuptaCS Spring 2005 Lecture 24April 7, 2005Carnegie Mellon University.
Describing Motion: Kinematics in One Dimension. Sub units Reference Frames and Displacement Average Velocity Instantaneous Velocity Acceleration Motion.
Week 21 Conditional Probability Idea – have performed a chance experiment but don’t know the outcome (ω), but have some partial information (event A) about.
More statistical stuff CS 394C Feb 6, Today Review of material from Jan 31 Calculating pattern probabilities Why maximum parsimony and UPGMA are.
Expectation. Let X denote a discrete random variable with probability function p(x) (probability density function f(x) if X is continuous) then the expected.
Linear Program Set Cover. Given a universe U of n elements, a collection of subsets of U, S = {S 1,…, S k }, and a cost function c: S → Q +. Find a minimum.
Review of Probability. Important Topics 1 Random Variables and Probability Distributions 2 Expected Values, Mean, and Variance 3 Two Random Variables.
Asymptotic behaviour of blinking (stochastically switched) dynamical systems Vladimir Belykh Mathematics Department Volga State Academy Nizhny Novgorod.
MAIN RESULT: We assume utility exhibits strategic complementarities. We show: Membership in larger k-core implies higher actions in equilibrium Higher.
SS r SS r This model characterizes how S(t) is changing.
3.6 First Passage Time Distribution
Giansalvo EXIN Cirrincione unit #4 Single-layer networks They directly compute linear discriminant functions using the TS without need of determining.
Numerical Analysis Yu Jieun.
Flows and Networks (158052) Richard Boucherie Stochastische Operations Research -- TW wwwhome.math.utwente.nl/~boucherierj/onderwijs/158052/ html.
Theory of Computational Complexity Probability and Computing Chapter Hikaru Inada Iwama and Ito lab M1.
Optimization Problems
Turing’s Thesis.
Networks of queues Networks of queues reversibility, output theorem, tandem networks, partial balance, product-form distribution, blocking, insensitivity,
New Characterizations in Turnstile Streams with Applications
Path Coupling And Approximate Counting
Chapter 7: Sampling Distributions
Enumerating Distances Using Spanners of Bounded Degree
Hidden Markov Models Part 2: Algorithms
Haim Kaplan and Uri Zwick
Class Notes 9: Power Series (1/3)
Estimating Networks With Jumps
Optimization Problems
Great Theoretical Ideas in Computer Science
182A – Engineering Mathematics
Introduction Wireless Ad-Hoc Network
Lecture #10 Switched systems
Mean-Independent Noise Control of Cell Fates via Intermediate States
MATH 175: Numerical Analysis II
Stochastic Pacing Inhibits Spatially Discordant Cardiac Alternans
Theorem 9.3 A problem Π is in P if and only if there exist a polynomial p( ) and a constant c such that ICp (x|Π) ≤ c holds for all instances x of Π.
Stochastic Pacing Inhibits Spatially Discordant Cardiac Alternans
Chapter 5 Integration Section R Review.
Presentation transcript:

An Analysis of One-Dimensional Schelling Segregation G AUTAM K AMATH, C ORNELL U NIVERSITY C HRISTINA B RANDT, S TANFORD U NIVERSITY N ICOLE I MMORLICA, N ORTHWESTERN U NIVERSITY R OBERT K LEINBERG, C ORNELL U NIVERSITY

- White - Black - Hispanic - Asian The New Yorker Hotel In a one-dimensional network with local neighborhoods, segregation exhibits only local effects. map by Eric Fischer Goal: Mathematically model and understand residential segregation

Start with a random coloring of the ring n = size of ring

Happy if at least 50% like-colored near neighbors. w = window size

At each time step, swap position of two unhappy individuals of opposite color

Segregation: run-lengths in stable configuration

Local dynamics lead to segregation. Schellings experiment: n = 70, w = 4 Average run length: 12 Schellings Experimental Result:

The Big Questions Is run length a function of n or w? Global vs. local segregation If function of w, polynomial vs. exponential?

In the perturbed Schelling model, segregation is global and severe. (stable run length: O(n)) Youngs result: [Young, 2001] In the unperturbed Schelling model, segregation is local and modest. (stable run length: O(w 2 )) Our main result (informal): [Brandt, Immorlica, Kamath, Kleinberg, 2012]

Working our way up 1.With high probability, process will reach a stable configuration 2.Average run length independent of ring size 3.Average run length is modest

Techniques Defn. A firewall is a sequence of w+1 consecutive individuals of the same type. Claim: Firewalls are stable with respect to the dynamics.

Convergence Theorem. For any fixed window size w, as n grows, the probability that the process reaches a stable configuration converges to 1. Proof Sketch: 1.With high probability, there exists a firewall in the initial configuration 2.Individual has positive probability of joining a firewall, and can never leave

Working our way up 1.With high probability, process will reach a stable configuration 2.Average run length independent of ring size 3.Average run length is modest

An easy bound on run length Theorem. Ave run length in final state is O(2 w ). Proof. Expect to look O(2 w ) steps before we find a blue firewall in both directions Bounds length of a green firewall containing site Symmetric for a blue firewall containing site random site look for blue firewall

Working our way up 1.With high probability, process will reach a stable configuration 2.Average run length independent of ring size 3.Average run length is modest

Techniques 1.Define firewall incubators, frequent at initialization. 2.Show firewall incubators are likely to become firewalls. A blue firewall incubator, rich in blue nodes. A green firewall incubator, rich in green nodes.

Simulation, n = 1000, w = 10 time t = 0

time t = 40 Simulation, n = 1000, w = 10

time t = 80 Simulation, n = 1000, w = 10

time t = 120 Simulation, n = 1000, w = 10

time t = 160 Simulation, n = 1000, w = 10

time t = 260 (final) Simulation, n = 1000, w = 10

time t = 160 Simulation, n = 1000, w = 10

time t = 120 Simulation, n = 1000, w = 10

time t = 80 Simulation, n = 1000, w = 10

time t = 40 Simulation, n = 1000, w = 10

time t = 0

time t = 40 Simulation, n = 1000, w = 10

time t = 80 Simulation, n = 1000, w = 10

time t = 120 Simulation, n = 1000, w = 10

time t = 160 Simulation, n = 1000, w = 10

time t = 260 (final) Simulation, n = 1000, w = 10

Four steps to O(w 2 ) 1.Firewall incubators are common

Firewall Incubators w sites Definition. The bias of a site i at time t is the sum of the signs of sites in its neighborhood Bias = +3

Firewall Incubators w+1 sites defender internalattacker w sites leftright Definition. A firewall incubator is a sequence of 3 biased blocks – left defender of length w+1, internal, right defender of length w+1. At least 2w + 2 sites, where the bias of every site is > w 1/2.

Birth of a Firewall Incubator Lemma. For any 6w consecutive sites, theres a constant probability that a uniformly random labeling of sites contains a firewall incubator. Proof Sketch. Random walks + central limit theorem 0 5w 1/2 -2w 1/2

Four steps to O(w 2 ) 1.Firewall incubators are common 2.Define an event in which an incubator deterministically becomes a firewall

Lifecycle of a Firewall Incubator attackerdefender GOOD swap

Lifecycle of a Firewall Incubator attackerdefender BAD swap

Lifecycle of a Firewall Incubator Definition. The transcript is the sign-sequence obtained by associating each blue attacker with a +1, each green defender by a -1, and then listing signs in reverse-order of when individuals move. attackerdefender swap time: sign: transcript: +1, -1, +1, +1, -1 Proposition. If the partial sums of a transcript are non-negative, then the firewall incubator becomes a firewall

Four steps to O(w 2 ) 1.Firewall incubators are common 2.There is an event in which an incubator deterministically becomes a firewall 3.Assuming swap order is random, this event happens

Lifecycle of a Firewall Incubator Ballot Theorem. With probability (A – D)/(A + D), all the partial sums of a random permutation of A +1s and D -1s are positive. Firewall incubator definition implies 1.A-D Ɵ(w 0.5 )(bias condition of incubator) 2.A+D Ɵ(w)(length of attacker + defender) Each defender survives with probability (1/w 0.5 ) Incubator becomes a firewall with probability (1/w)

Four steps to O(w 2 ) 1.Firewall incubators are common 2.There is an event in which an incubator deterministically becomes a firewall 3.Assuming swap order is random, this event happens 4.Swap order is close to random

Lifecycle of a Firewall Incubator Swaps are random if there is # unhappy green = # unhappy blue.

Wormalds Technique We show numbers are approx. equal using Wormalds theorem Theorem [Wormald]. Under suitable technical conditions, a discrete-time stochastic process is well approximated by the solution of a continuous-time differential equation Technically non-trivial due to complications with infinite differential equations Dont need to solve diff. eq., only exploit symmetry

Firewall incubators occur every O(w) locations + Incubator becomes firewall with probability (1/w) = Firewalls occur every O(w 2 ) locations

An better bound on run length Theorem. Ave run length in final state is O(w 2 ). Proof. Expect to look O(w 2 ) steps before we find a blue firewall in both directions Bounds length of a green firewall containing site Symmetric for a blue firewall containing site random site look for blue firewall

Summary First rigorous analysis of Schellings segregation model on one-dimensional ring Demonstrated that only local, modest segregation occurs – Average run length is independent of n and poly(w) – Subsequent work: Ɵ(w) run length

Open Questions Vary parameters (proportion and number of types, tolerance) Study segregation on other graphs – 2D grid