Skip to main content

Showing 1–10 of 10 results for author: Ndiaye, N

  1. arXiv:2407.02412  [pdf, other

    math.CO cs.DM

    $k$-Leaf Powers Cannot be Characterized by a Finite Set of Forbidden Induced Subgraphs for $k \geq 5$

    Authors: Max Dupré la Tour, Manuel Lafond, Ndiamé Ndiaye, Adrian Vetta

    Abstract: A graph $G=(V,E)$ is a $k$-leaf power if there is a tree $T$ whose leaves are the vertices of $G$ with the property that a pair of leaves $u$ and $v$ induce an edge in $G$ if and only if they are distance at most $k$ apart in $T$. For $k\le 4$, it is known that there exists a finite set $F_k$ of graphs such that the class $L(k)$ of $k$-leaf power graphs is characterized as the set of strongly chor… ▽ More

    Submitted 2 July, 2024; originally announced July 2024.

  2. arXiv:2312.15778  [pdf, other

    math.OC

    Age-of-Information in UAV-assisted Networks: a Decentralized Multi-Agent Optimization

    Authors: Mouhamed Naby Ndiaye, El Houcine Bergou, Hajar El Hammouti

    Abstract: Unmanned aerial vehicles (UAVs) are a highly promising technology with diverse applications in wireless networks. One of their primary uses is the collection of time-sensitive data from Internet of Things (IoT) devices. In UAV-assisted networks, the Age-of-Information (AoI) serves as a fundamental metric for quantifying data timeliness and freshness. In this work, we are interested in a generalize… ▽ More

    Submitted 25 December, 2023; originally announced December 2023.

  3. arXiv:2309.02913  [pdf, ps, other

    math.OC cs.LG cs.NI

    Ensemble DNN for Age-of-Information Minimization in UAV-assisted Networks

    Authors: Mouhamed Naby Ndiaye, El Houcine Bergou, Hajar El Hammouti

    Abstract: This paper addresses the problem of Age-of-Information (AoI) in UAV-assisted networks. Our objective is to minimize the expected AoI across devices by optimizing UAVs' stopping locations and device selection probabilities. To tackle this problem, we first derive a closed-form expression of the expected AoI that involves the probabilities of selection of devices. Then, we formulate the problem as a… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

    Comments: 6 pages, 3 figures

  4. arXiv:2303.08680  [pdf, other

    math.OC cs.LG

    Muti-Agent Proximal Policy Optimization For Data Freshness in UAV-assisted Networks

    Authors: Mouhamed Naby Ndiaye, El Houcine Bergou, Hajar El Hammouti

    Abstract: Unmanned aerial vehicles (UAVs) are seen as a promising technology to perform a wide range of tasks in wireless communication networks. In this work, we consider the deployment of a group of UAVs to collect the data generated by IoT devices. Specifically, we focus on the case where the collected data is time-sensitive, and it is critical to maintain its timeliness. Our objective is to optimally de… ▽ More

    Submitted 15 March, 2023; originally announced March 2023.

  5. arXiv:2301.01367  [pdf, other

    cs.GT math.OC

    The Price of Anarchy of the Asymmetric One-Sided Allocation Problem

    Authors: Sissi Jiang, Ndiame Ndiaye, Adrian Vetta, Eggie Wu

    Abstract: We study fair mechanisms for the (asymmetric) one-sided allocation problem with m items and n multi-unit demand agents with additive, unit-sum valuations. The symmetric case (m=n), the one-sided matching problem, has been studied extensively for the class of unit demand agents, in particular with respect to the folklore Random Priority mechanism and the Probabilistic Serial mechanism, introduced b… ▽ More

    Submitted 13 May, 2023; v1 submitted 3 January, 2023; originally announced January 2023.

    Comments: 32 pages, 4 figures

  6. arXiv:2210.08300  [pdf, ps, other

    cs.CC math.CO

    On depth-3 circuits and covering number: an explicit counter-example

    Authors: Lianna Hambardzumyan, Hamed Hatami, Ndiamé Ndiaye

    Abstract: We give a simple construction of $n\times n$ Boolean matrices with $Ω(n^{4/3})$ zero entries that are free of $2 \times 2$ all-zero submatrices and have covering number $O(\log^4(n))$. This construction provides an explicit counterexample to a conjecture of Pudlák, Rödl and Savický and Research Problems 1.33, 4.9, 11.17 of Jukna [Boolean function complexity]. These conjectures were previously refu… ▽ More

    Submitted 15 October, 2022; originally announced October 2022.

    Comments: 3 pages

  7. arXiv:2209.05370  [pdf, other

    math.OC

    Age-of-Updates Optimization for UAV-assisted Networks

    Authors: Mouhamed Naby Ndiaye, El Houcine Bergou, Mounir Ghogho, Hajar El Hammouti

    Abstract: Unmanned aerial vehicles (UAVs) have been proposed as a promising technology to collect data from IoT devices and relay it to the network. In this work, we are interested in scenarios where the data is updated periodically, and the collected updates are time-sensitive. In particular, the data updates may lose their value if they are not collected and analyzed timely. To maximize the data freshness… ▽ More

    Submitted 12 September, 2022; originally announced September 2022.

    Comments: 6 pages, 4 figures, IEE GLOBECOM 2022

    MSC Class: 90C30

  8. arXiv:2012.04302  [pdf, ps, other

    math.CO

    The Speed and Threshold of the Biased Hamilton Cycle Game

    Authors: Noah Brustle, Sarah Clusiau, Vishnu V. Narayan, Ndiamé Ndiaye, Bruce Reed, Ben Seamone

    Abstract: We show that there is a constant C such that for any $b<\frac{n}{\ln{n}}-\frac{Cn}{(\ln{n})^{3/2}}$, Maker wins the Maker-Breaker Hamilton cycle game in $n+\frac{Cn}{\sqrt{\ln{n}}}$ steps.

    Submitted 8 December, 2020; originally announced December 2020.

    Comments: 11 pages

    MSC Class: 05C57

  9. arXiv:2012.04289  [pdf, ps, other

    math.CO

    The Speed and Threshold of the Biased Perfect Matching Game

    Authors: Noah Brustle, Sarah Clusiau, Vishnu V. Narayan, Ndiamé Ndiaye, Bruce Reed, Ben Seamone

    Abstract: We show that Maker wins the Maker-Breaker perfect matching game in $\frac{n}{2}+o(n)$ turns when the bias is at least $\frac{n}{\log{n}}-\frac{f(n)n}{(\log{n})^{5/4}}$, for any $f$ going to infinity with $n$ and $n$ sufficiently large (in terms of $f$).

    Submitted 8 December, 2020; originally announced December 2020.

    Comments: 13 pages, 1 figure

    MSC Class: 05C57

  10. arXiv:2007.15748  [pdf, ps, other

    math.CO

    Descending the Stable Matching Lattice: How many Strategic Agents are required to turn Pessimality to Optimality?

    Authors: Ndiame Ndiaye, Sergey Norin, Adrian Vetta

    Abstract: The set of stable matchings induces a distributive lattice. The supremum of the stable matching lattice is the boy-optimal (girl-pessimal) stable matching and the infimum is the girl-optimal (boy-pessimal) stable matching. The classical boy-proposal deferred-acceptance algorithm returns the supremum of the lattice, that is, the boy-optimal stable matching. In this paper, we study the smallest grou… ▽ More

    Submitted 11 July, 2021; v1 submitted 30 July, 2020; originally announced July 2020.