Maria Serna

Maria Serna
  • PhD
  • Professor (Full) at Polytechnic University of Catalonia

About

239
Publications
19,685
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,884
Citations
Current institution
Polytechnic University of Catalonia
Current position
  • Professor (Full)
Additional affiliations
April 2006 - October 2015
Polytechnic University of Catalonia
Position
  • Professor (Full)

Publications

Publications (239)
Preprint
Full-text available
An edge-colored multigraph $G$ is rainbow connected if every pair of vertices is joined by at least one rainbow path, i.e., a path where no two edges are of the same color. In the context of multilayered networks we introduce the notion of multilayered random geometric graphs, from $h\ge 2$ independent random geometric graphs $G(n,r)$ on the unit s...
Article
Full-text available
In voting theory and social choice theory, decision systems can be represented as simple games, i.e., cooperative games defined through their players or voters and their set of winning coalitions. The weighted voting games form a well-known strict subclass of simple games, where each player has a voting weight so that a coalition wins if the sum of...
Conference Paper
Full-text available
Sustainability constraints ask for quick and drastic changes in the ways to teach at university. Here we study the amount of carbon emissions of lecturing a first course in programming. In addition to fix costs estimations, our study relies on a pool on student mobility patterns at our university. We estimate, per campus and level of presentiality,...
Preprint
Full-text available
Vertex bisection is a graph partitioning problem in which the aim is to find a partition into two equal parts that minimizes the number of vertices in one partition set that have a neighbor in the other set. We are interested in giving upper bounds on the vertex bisection width of random $d$-regular graphs for constant values of $d$. Our approach i...
Preprint
Full-text available
Social networks are the natural space for the spreading of information and influence and have become a media themselves. Several models capturing that diffusion process have been proposed, most of them based on the Independent Cascade (IC) model or on the Linear Threshold (LT) model. The IC model is probabilistic while the LT model relies on the kn...
Article
We introduce the multicolored graph realization problem (MGR). The input to this problem is a colored graph (G,φ), i.e., a graph G together with a coloring φ on its vertices. We associate each colored graph (G,φ) with a cluster graph (Gφ) in which, after collapsing all vertices with the same color to a node, we remove multiple edges and self-loops....
Article
Weighted voting games are simple games that can be represented by a collection of integer weights for each player so that a coalition wins if the sum of the player weights matches or exceeds a given quota. It is known that a simple game can be expressed as the intersection or the union of weighted voting games. The dimension (codimension) of a simp...
Article
Full-text available
In this paper, we analyze the frequency distributions of weights and quotas in weighted majority voting games (WMVG) up to eight players. We also show different procedures that allow us to obtain some minimum or minimum sum representations of WMVG, for any desired number of players, starting from a minimum or minimum sum representation. We also pro...
Article
Full-text available
An influence game is a simple game represented over an influence graph (i.e., a labeled, weighted graph) on which the influence spread phenomenon is exerted. Influence games allow applying different properties and parameters coming from cooperative game theory to the contexts of social network analysis, decision-systems, voting systems, and collect...
Preprint
We introduce the Multicolored Graph Realization problem (MGRP). The input to the problem is a colored graph $(G,\varphi)$, i.e., a graph together with a coloring on its vertices. We can associate to each colored graph a cluster graph ($G_\varphi)$ in which, after collapsing to a node all vertices with the same color, we remove multiple edges and se...
Chapter
List k-Coloring (Lik-Col) is the decision problem asking if a given graph admits a proper coloring compatible with a given list assignment to its vertices with colors in {1, 2, …, k}. The problem is known to be NP-hard even for k = 3 within the class of 3-regular planar bipartite graphs and for k = 4 within the class of chordal bipartite graphs. In...
Article
Full-text available
Often, uncertainty is present in processes that are part of our routines. Having tools to understand the consequences of unpredictability is convenient. We introduce a general framework to deal with uncertainty in the realm of distribution sets that are descriptions of imprecise probabilities. We propose several non-biased refinement strategies to...
Preprint
Full-text available
List k-Coloring (Li k-Col) is the decision problem asking if a given graph admits a proper coloring compatible with a given list assignment to its vertices with colors in {1,2,..,k}. The problem is known to be NP-hard even for k=3 within the class of 3-regular planar bipartite graphs and for k=4 within the class of chordal bipartite graphs. In 2015...
Chapter
In order to make sound economic decisions it is important to measure the possibilities offered by a market in relation to investments. Provided an investment scheme \(S=\langle r; R_1,\dots ,R_n\rangle \), where r is a lower bound on the desired investment return and the \(R_i\)’s are the asset yields, the power to invest measures the capability of...
Article
Centrality and influence spread are two of the most studied concepts in social network analysis. Several centrality measures, most of them, based on topological criteria, have been proposed and studied. In recent years new centrality measures have been defined inspired by the two main influence spread models, namely, the Independent Cascade Model (...
Chapter
Nowadays interactions with the World Wide Web are ubiquitous. Users interact through a number of steps consisting of site calls and handling results that can be automatized as orchestrations. Orchestration results have an inherent degree of uncertainty due to incomplete Web knowledge and orchestration semantics are characterized in terms of impreci...
Article
We introduce collective decision-making models associated with influence spread under the linear threshold model in social networks. We define the oblivious and the non-oblivious influence models. We also introduce the generalized opinion leader–follower model (gOLF) as an extension of the opinion leader–follower model (OLF) proposed by van den Bri...
Preprint
Full-text available
We study the concept of \emph{compactor}, which may be seen as a counting-analogue of kernelization in counting parameterized complexity. For a function $F:\Sigma^*\to \Bbb{N}$ and a parameterization $\kappa: \Sigma^*\to \Bbb{N}$, a compactor $({\sf P},{\sf M})$ consists of a polynomial-time computable function ${\sf P}$, called \emph{condenser}, a...
Article
We consider decision models associated with cooperative influence games, the oblivious and the non-oblivious influence models. In those models the satisfaction and the power measures were introduced and studied. We analyze the computational complexity of those measures when the influence level is set to unanimity and the rule of decision is simple...
Conference Paper
Full-text available
University education is facing new strategical changes that will lead to deep structural changes. Course organization is evolving and the organizational decisions have an economical impact. We propose a method to measure the present value of a pedagogical asset under a return rate. We apply the method to three courses in the Computer Science curric...
Chapter
We propose a model for the behaviour of Web apps in the unreliable WWW. Web apps are described by orchestrations. An orchestration mimics the personal use of the Web by defining the way in which Web services are invoked. The WWW is unreliable as poorly maintained Web sites are prone to fail. We model this source of unreliability trough a probabilis...
Article
Centrality and influence spread are two of the most studied concepts in social network analysis. In recent years, centrality measures have attracted the attention of many researchers, generating a large and varied number of new studies about social network analysis and its applications. However, as far as we know, traditional models of influence sp...
Article
Full-text available
We consider Web services defined by orchestrations in the Orc language and two natural quality of services measures, the number of outputs and a discrete version of the first response time. We analyse first those subfamilies of finite orchestrations in which the measures are well defined and consider their evaluation in both reliable and probabilis...
Conference Paper
We propose the use of the angel-daemon (\(\mathfrak {a}/\mathfrak {d}\)) framework to assess the Coleman’s power of a collectivity to act under uncertainty in weighted voting games. In this framework uncertainty profiles describe the potential changes in the weights of a weighted game and fixes the spread of the weights’ change. For each uncertaint...
Book
This book is divided into two parts, the first of which seeks to connect the phase transitions of various disciplines, including game theory, and to explore the synergies between statistical physics and combinatorics. Phase Transitions has been an active multidisciplinary field of research, bringing together physicists, computer scientists and math...
Article
We analyze the computational complexity of the power measure in models of collective decision: the generalized opinion leader-follower model and the oblivious and non-oblivious influence models. We show that computing the power measure is #P-hard in all these models, and provide two subfamilies in which the power measure can be computed in polynomi...
Article
Full-text available
We propose the use of an angel-daemon framework to perform an uncertainty analysis of short-term macroeconomic models with exogenous components. An uncertainty profile $\mathcal U$ is a short and macroscopic description of a potentially perturbed situation. The angel-daemon framework uses $\mathcal U$ to define a strategic game where two agents, th...
Article
The Moran process models the spread of mutations in populations on graphs. We investigate the absorption time of the process, which is the time taken for a mutation introduced at a randomly chosen vertex to either spread to the whole population, or to become extinct. It is known that the expected absorption time for an advantageous mutation is O(n4...
Article
We introduce Celebrity games, a new model of network creation games. In this model players have weights (W being the sum of all the player's weights) and there is a critical distance β as well as a link cost α. The cost incurred by a player depends on the cost of establishing links to other players and on the sum of the weights of those players tha...
Article
The Generalized Second Price (GSP) auction used typically to model sponsored search auctions does not include the notion of budget constraints, which is present in practice. Motivated by this, we introduce the different variants of GSP auctions that take budgets into account in natural ways. We examine their stability by focusing on the existence o...
Article
The metric dimension of a graph . G is the size of a smallest subset . L⊆V(G) such that for any . x,y∈V(G) with . x≠y there is a . z∈L such that the graph distance between . x and . z differs from the graph distance between . y and . z. Even though this notion has been part of the literature for almost 40 years, prior to our work the computational...
Article
Full-text available
An opinion leader-follower model (OLF) is a two-action collective decision-making model for societies, in which three kinds of actors are considered: "opinion leaders", "followers", and "independent actors". In OLF the initial decision of the followers can be modified by the influence of the leaders. Once the final decision is set, a collective dec...
Article
Full-text available
This paper studies the complexity of computing a representation of a simple game as the intersection (union) of weighted majority games, as well as, the dimension or the codimension. We also present some examples with linear dimension and exponential codimension with respect to the number of players.
Preprint
This paper studies the complexity of computing a representation of a simple game as the intersection (union) of weighted majority games, as well as, the dimension or the codimension. We also present some examples with linear dimension and exponential codimension with respect to the number of players.
Conference Paper
Full-text available
The first programming course (Programming-1, CS1) in the Informatics Engineering Degree of the Facultat d’Informàtica de Barcelona was completely redesigned in 2006 in order to reinforce the learn-by-doing methodology. Along the following eight years several pedagogical measures —mostly related with continous assessment— were introduced with the ai...
Article
Full-text available
This paper studies the complexity of computing a representation of a simple game as the intersection (union) of weighted majority games, as well as, the dimension or the codimension. We also present some examples with linear dimension and exponential codimension with respect to the number of players.
Article
We analyze the computational complexity of the problem of deciding whether, for a given simple game, there exists the possibility of rearranging the participants in a set of j given losing coalitions into a set of j winning coalitions. We also look at the problem of turning winning coalitions into losing coalitions. We analyze the problem when the...
Conference Paper
A framework for assessing the robustness of long-duration repetitive orchestrations in uncertain evolving environments is proposed. The model assumes that service-based evaluation environments are stable over short time-frames only; over longer periods service-based environments evolve as demand fluctuates and contention for shared resources varies...
Article
We study a network formation game where players wish to send traffic to other players. Players can be seen as nodes of an undirected graph whose edges are defined by contracts between the corresponding players. Each player can contract bilaterally with others to form bidirectional links or break unilaterally contracts to eliminate the corresponding...
Article
Full-text available
Celebrity games, a new model of network creation games is introduced. The specific features of this model are that players have different celebrity weights and that a critical distance is taken into consideration. The aim of any player is to be close (at distance less than critical) to the others, mainly to those with high celebrity weights. The co...
Article
We consider a simple and altruistic multiagent system in which the agents are eager to perform a collective task but where their real engagement depends on the willingness to perform the task of other influential agents. We model this scenario by an influence game, a cooperative simple game in which a team (or coalition) of players succeeds if it i...
Article
Simple games are cooperative games in which the benefit that a coalition may have is always binary, i.e., a coalition may either win or loose. This paper surveys different forms of representation of simple games, and those for some of their subfamilies like regular games and weighted games. We analyze the forms of representations that have been pro...
Article
Full-text available
We analyze the computational complexity of the problem of deciding whether, for a given simple game, there exists the possibility of rearranging the participants in a set of $j$ given losing coalitions into a set of $j$ winning coalitions. We also look at the problem of turning winning coalitions into losing coalitions. We analyze the problem when...
Article
The first course on programming is fundamental in the Facultat d'Inform atica de Barcelona. After a major redesign of the Programming-1 course in 2006 to give it a more practical flavor, an increasing number of measures have been undertaken over the years to try to increase its paß rate while maintaining a fixed quality level. These measures, that...
Article
Full-text available
We describe a new coordination mechanism for non-atomic congestion games that leads to a (selfish) social cost which is arbitrarily close to the non-selfish optimal. This mechanism does not incur any additional extra cost, like tolls, which are usually differentiated from the social cost as expressed in terms of delays only.
Conference Paper
We propose as centrality measures for social networks two classical power indices, Banzhaf and Shapley-Shubik, and two new measures, effort and satisfaction, related to the spread of influence process that emerge from the subjacent influence game. We perform a comparison of these measures with three well known centrality measures, degree, closeness...
Article
We analyze the complexity of equilibria problems for a class of strategic zero-sum games, called angel-daemon games. Those games were introduced to asses the performance of the execution of a web orchestration on a moderate faulty or under stress environment. Angel-daemon games are a natural example of zero-sum games whose representation is natural...
Article
What is the role that a university should play in the spreading of cutting-edge technologies? It is argued here that one possibility is to bring focused cutting-edge technology courses in the standard curriculum. It is contended that such courses have shorter life-spans than conventional subjects and, consequently, their implementation needs to be...
Article
The Moran process models the spread of mutations in populations on graphs. We investigate the absorption time of the process, which is the time taken for a mutation introduced at a randomly chosen vertex to either spread to the whole population, or to become extinct. It is known that the expected absorption time for an advantageous mutation is $O(n...
Article
An orchestration is a multi-threaded computation that invokes a number of remote services. In practice, the responsiveness of a web-service fluctuates with demand; during surges in activity service responsiveness may be degraded, perhaps even to the point of failure. An uncertainty profile formalizes a user's perception of the effects of stress on...
Conference Paper
Full-text available
The Generalized Second Price (GSP) auction used typically to model sponsored search auctions does not include the notion of budget constraints, which is present in practice. Motivated by this, we introduce the different variants of GSP auctions that take budgets into account in natural ways. We examine their stability by focusing on the existence o...
Article
Full-text available
The Moran process models the spread of genetic mutations through a population. A mutant with relative fitness $r$ is introduced into a population and the system evolves, either reaching fixation (in which every individual is a mutant) or extinction (in which none is). In a widely cited paper (Nature, 2005), Lieberman, Hauert and Nowak generalize th...
Article
Full-text available
In social network analysis, there is a common perception that influence is relevant to determine the global behavior of the society and thus it can be used to enforce cooperation by targeting an adequate initial set of individuals or to analyze global choice processes. Here we propose centrality measures that can be used to analyze the relevance of...
Article
We introduce a type of isomorphism among strategic games that we call local isomorphism. Local isomorphisms is a weaker version of the notions of strong and weak game isomorphism introduced in [the authors, Theor. Comput. Sci. 412, No. 48, 6675–6695 (2011; Zbl 1227.91016)]. In a local isomorphism it is required to preserve, for any player, the play...
Conference Paper
We are interested in analyzing the properties of multi-agent systems where a set of agents have to take a decision among two possible alternatives with the help of the social environment or network of the system itself. The ways in which people influence each other through their interactions in a social network and, in particular, the social rules...
Book
This book constitutes the refereed conference proceedings of the 8th International Conference on Algorithms and Complexity, CIAC 2013, held in Barcelona, Spain, during May 22-24, 2013. The 31 revised full papers presented were carefully reviewed and selected from 75 submissions. The papers present current research in all aspects of computational co...
Article
Full-text available
In this paper we propose a new way to analyze influence in networks. There is a common perception that influence is relevant to determine the global behavior of the social network and thus it can be used to determine some normative behavioral rules. From this point of view we propose to analyze influence in networks as a voting systems. For doing s...
Conference Paper
We consider a general multi-agent framework in which a set of n agents are roaming a network where m valuable and sharable goods (resources, services, information ….) are hidden in m different vertices of the network. We analyze several strategic situations that arise in this setting by means of game theory. To do so, we introduce a class of strate...
Article
Full-text available
We consider the Moran process, as generalized by Lieberman, Hauert and Nowak (Nature, 433:312--316, 2005). A population resides on the vertices of a finite, connected, undirected graph and, at each time step, an individual is chosen at random with probability proportional to its assigned 'fitness' value. It reproduces, placing a copy of itself on a...
Article
In the area of communication systems, stability refers to the property of keeping the amount of traffic in the system always bounded over time. Different communication system models have been proposed in order to capture the unpredictable behavior of some users and applications. Among those proposed models the adversarial queueing theory (aqt) mode...
Article
We address the question of whether two multiplayer strategic games are equivalent and the computational complexity of deciding such a property. We introduce two notions of isomorphisms, strong and weak. Each one of those isomorphisms preserves a different structure of the game. Strong isomorphisms are defined to preserve the utility functions and N...
Article
We study the computational complexity of problems involving equilibria in strategic games and in perfect information extensive games when the number of players is large. We consider, among others, the problems of deciding the existence of a Pure Nash Equilibrium in strategic games or deciding the existence of a pure Nash or a subgame perfect Nash e...
Conference Paper
In this work we consider the problem of continuously monitoring a collection of data sets produced by sensors placed on mobile or static targets. Our computational model, the dynamic sensor field model, is an extension of the static sensor field model [3] allowing computation in the presence of mobility. The dynamicity comes from both the mobile co...
Conference Paper
Full-text available
The metric dimension of a graph $G$ is the size of a smallest subset $L \subseteq V(G)$ such that for any $x,y \in V(G)$ there is a $z \in L$ such that the graph distance between $x$ and $z$ differs from the graph distance between $y$ and $z$. Even though this notion has been part of the literature for almost 40 years, the computational complexity...
Conference Paper
The robustness of orchestrations of unreliable web-services to failure can be analysed using Angel Daemon (A/D) games. A measure of the reliability of an orchestration O can be determined by characterising a user's perception of underlying services and, additionally, making assumptions about the number of services that will fail during an evaluatio...
Article
We survey here some recent computational models for networks of tiny artifacts. In particular, we focus on networks consisting of artifacts with sensing capabilities. We first imagine the artifacts moving passively, that is, being mobile but unable to control their own movement. This leads us to the population protocol model of Angluin et al. (2004...
Conference Paper
Full-text available
We consider the behaviour of a set of services in a stressed web environment where performance patterns may be difficult to predict. In stressed environments the performances of some providers may degrade while the performances of others, with elastic resources, may improve. The allocation of web-based providers to users (brokering) is modelled by...
Article
Full-text available
Motivated by problems on the field of reconfigurable systems, in partic- ular field programmable gate arrays (fpga), we introduce in this paper an extension of the H-coloring problem that allows to model the above communication problem in a locally reconfigurable network. We propose to model this feature by a set of graphs H1,...,H`, each one of th...
Article
Full-text available
This paper studies the computational complexity of the proper interval colored graph problem (PICG), when the input graph is a colored caterpillar, parameterized by hair length. In order prove our result we establish a close relationship between the PICG and a graph layout problem the proper colored layout problem (PCLP). We show a dichotomy: the...
Article
In this paper, we analyze parameter improvement under vertex fusion in a graph G. This is a setting in which a new graph G′ is obtained after identifying a subset of vertices of G in a single vertex. We are interested in distance parameters, in particular diameter, radius and eccentricity of a vertex v. We show that the corresponding problem is NP-...
Conference Paper
Full-text available
We introduce a formal model of computation for networks of tiny artifacts, the static synchronous sensor field model (SSSF) which considers that the devices communicate through a fixed communication graph and interact with the environment through input/output data streams. We analyze the performance of SSSFs solving two sensing problems the Average...
Article
Full-text available
Simple games cover voting systems in which a single alternative, such as a bill or an amendment, is pitted against the status quo. A simple game or a yes–no voting system is a set of rules that specifies exactly which collections of “yea” votes yield passage of the issue at hand, each of these collections of “yea” voters forms a winning coalition....
Article
Full-text available
In this paper we initiate the generalization of the Adversarial Queueing Theory (aqt) model to capture the dynamics of continuous scenarios in which the usually assumed synchronicity of the evolution is not required anymore. We propose an asynchronous model, named continuous aqt (caqt), in which packets can have arbitrary lengths, and the network l...
Chapter
Full-text available
In this paper game theory is used to analyse the effect of a number of service failures during the execution of a grid orchestration. A service failure may be catastrophic in that it causes an entire orchestration to fail. Alternatively, a grid manager may utilise alternative services in the case of failure, allowing an orchestration to recover. A...
Article
In this paper we show how to establish a reliable and efficient high level communication system in a randomly deployed network of sensors equipped with directional antennas. This high level communication system enables the programming of the sensor network using high level communication functionalities without the burden of taking care of their phy...
Article
We study the fixed parameter tractability of the counting version of a parameter- ization of the restrictive list H-coloring problem. The parameterization is defined by fixing the number of preimages of a subset C of the vertices in H through a weight assignment K on C. We show the fixed parameter tractability of counting the number of list (H, C,...
Conference Paper
Full-text available
We analyze the complexity of equilibria problems for a class of strategic zero-sum games, called Angel-Daemon games. Those games were introduced to asses the goodness of a web or grid orchestration on a faulty environment with bounded amount of failures [6]. It turns out that Angel-Daemon games are, at the best of our knowledge, the first natural e...
Article
We are interested in finding bounds for the distant-2 chromatic number of geo- metric graphs drawn from different models. We consider two undirected models of random graphs: random geometric graphs and random proximity graphs for which sharp connectivity thresholds have been shown. We are interested in a.a.s. connected graphs close just above the c...
Article
Full-text available
Simple games cover voting systems in which a single alternative, such as a bill or an amendment, is pitted against the status quo. A simple game or a yes-no voting system is a set of rules that specifies exactly which collections of ``yea'' votes yield passage of the issue at hand. A collection of ``yea'' voters forms a winning coalition. We are in...
Article
Full-text available
We consider the parallel approximability of two problems arising from High Multiplicity Scheduling, namely the Unweighted Model with Variable Processing Requirements and the Weighted Model with Identical Processing Requirements. These two problems are known to be modelled by a class of quadratic programs that are eciently solv- able in polynomial t...
Article
We present a model of the establishment and maintenance of communication between mobile agents. We assume that the agents move through a fixed environment modeled by a motion graph and are able to communicate if they are within distance at most d of each other. As the agents move randomly, we analyze the evolution in time of the connectivity betwee...
Conference Paper
Full-text available
In this paper we present a randomized parallel algorithm to sample matchings from an almost uniform distribution on the set of matchings of all sizes in a graph. First we prove that the direct NC simulation of the sequential Markov chain technique for this problem is P-complete. Afterwards we present a randomized parallel algorithm for the problem....
Article
Full-text available
We present a model of the establishment and maintenance of communication between mobile agents. We assume that the agents move through a fixed environment modeled by a motion graph, and are able to communicate if they are at distance at most d. As the agents move randomly, we analyse the evolution in time of the connectivity between a set of w agen...

Network

Cited By