Cancelled Classes (tentative):
September 29 and October 01 2015 (Organizer and Lecturer, Como Summer School on Cancer, Causality and Complexity),
December 03 2015 (Invited Talk at BICT 2015, Columbia University, NY),
Note that some of these classes may be covered by Guest Lectures.
(due 10/13/15) (due 10/15/15)
(1) SHOW: For all graphs G, either G or its complement G' is connected.
(2) SHOW: For all graphs G, some two vertices have the same degree.
#3 (due 10/20/15)
(1) SHOW: Ramsey Number R(3) = 6.
(2) SHOW: For p > 0, G(n,p) almost surely contains a triangle, K_3.
#4 (due 10/29/15)
(1) Compute Page Ranks of the pages in figures 14.15 and 14.16 on page 378.
[pp 429-430 in here]
(2) Ex. 14.7 (5, pp 382)
[pp 433 in here]
#5 (due 11/05/15)
(1) Ex. 6.11 (1, pp 179)
(2) Ex. 6.11 (3, pp 180)
[pp 200 and 201 in here]
#6 (due 11/12/15)
(1) Ex. 6.11 (5, pp 180)
(2) Ex. 6.11 (6, pp 181)
[pp 201 in here]
#7 (due 11/19/15)
(1) Ex. 22.11 (1, pp 641)
[pp 730 in here]
They also link us, often through important but weak ties, to other humans. Their origin is biological: going back to quorum-sensing, swarming, flocking, social grooming, gossip, etc. Yet, as we have connected our social networks to traditional human institutions (markets, justice systems, education, etc.) through new technologies, the underlying biology has become obscured, but not dormant.
This course will introduce the tools, analytics and algorithms for the study of networks and their data. It will show how certain common principles permeate the functioning of these diverse networks: e.g., issues related to robustness, fragility, and interlinkages etc. The lectures will emphasize following topics:
(1) Introduction to Networks (Biological, Social, Economic and Communication)
(2) Historical developments in computer science, culminating now in ubiquitous social-technological netwroks
(3) Fundamental principles of computer science
(4) Graph Theory and Evolving Social Networks
(5) Graph Laplacians and Social Ranks
(6) Game theory: Information Asymmetric Games and Deception
(7) Signaling and Cyber Security
(8) Digital Market Places
(9) Ad Exchanges
(10) Crypto-Coins and Payment Systems
(9) Case Studies:
Personal Data Markets, Wikileaks, Bit-coins, Cyber Security (M-coins), Information Finance Markets (WealthFront, etc.), Market Microstructure
Fequently Asked Questions (FAQs)
Q1. The course description says, `underlying biology has become
obscured, but not dormant,' but the syllabus does not mention how this is
going to be brought up. Will the class require prior knowledge of
A1. The course does not require any prior knowledge of biology, nor will any biology be covered in the class in great details. The course will use ideas from evolutionary game theory and its connection to signaling and evolutionary games.
Q2. What is the goal of the class? Will it be:
descriptive/prescriptive? qualitative/quantitative? Will it involve
algorithms, architectures and simulations?
A2. The intent is to make the class as quantitative and algorithmic as possible, while being descriptive (how current internet works) as well as prescriptive (how the future internet should work). The students will engage in class projects that will involve some implementation and simulation.