Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where John P. Dickerson is active.

Publication


Featured researches published by John P. Dickerson.


electronic commerce | 2013

Failure-aware kidney exchange

John P. Dickerson; Ariel D. Procaccia; Tuomas Sandholm

Most algorithmic matches in fielded kidney exchanges do not result in an actual transplant. In this paper, we address the problem of cycles and chains in a proposed match failing after the matching algorithm has committed to them. We show that failure-aware kidney exchange can significantly increase the expected number of lives saved (i) in theory, on random graph models; (ii) on real data from kidney exchange match runs between 2010 and 2012; (iii) on synthetic data generated via a model of dynamic kidney exchange. From the computational viewpoint, we design a branch-and-price-based optimal clearing algorithm specifically for the probabilistic exchange clearing problem and show that this new solver scales well on large simulated data, unlike prior clearing algorithms.


advances in social networks analysis and mining | 2014

Using sentiment to detect bots on Twitter: are humans more opinionated than bots?

John P. Dickerson; Vadim Kagan; V. S. Subrahmanian

In many Twitter applications, developers collect only a limited sample of tweets and a local portion of the Twitter network. Given such Twitter applications with limited data, how can we classify Twitter users as either bots or humans? We develop a collection of network-, linguistic-, and application-oriented variables that could be used as possible features, and identify specific features that distinguish well between humans and bots. In particular, by analyzing a large dataset relating to the 2014 Indian election, we show that a number of sentimentrelated factors are key to the identification of bots, significantly increasing the Area under the ROC Curve (AUROC). The same method may be used for other applications as well.


Archive | 2012

Computational Analysis of Terrorist Groups: Lashkar-e-Taiba

V. S. Subrahmanian; Aaron Mannes; Amy Sliva; Jana Shakarian; John P. Dickerson

Computational Analysis of Terrorist Groups: Lashkar-e-Taiba provides an in-depth look at Web intelligence, and how advanced mathematics and modern computing technology can influence the insights we have on terrorist groups. This book primarily focuses on one famous terrorist group known as Lashkar-e-Taiba (or LeT), and how it operates. After 10 years of counter Al Qaeda operations, LeT is considered by many in the counter-terrorism community to be an even greater threat to the US and world peace than Al Qaeda. Computational Analysis of Terrorist Groups: Lashkar-e-Taiba is the first book that demonstrates how to use modern computational analysis techniques including methods for big data analysis. This book presents how to quantify both the environment in which LeT operate, and the actions it took over a 20-year period, and represent it as a relational database table. This table is then mined using sophisticated data mining algorithms in order to gain detailed, mathematical, computational and statistical insights into LeT and its operations. This book also provides a detailed history of Lashkar-e-Taiba based on extensive analysis conducted by using open source information and public statements. Each chapter includes a case study, as well as a slide describing the key results which are available on the authors web sites. Computational Analysis of Terrorist Groups: Lashkar-e-Taiba is designed for a professional market composed of government or military workers, researchers and computer scientists working in the web intelligence field. Advanced-level students in computer science will also find this valuable as a reference book.


economics and computation | 2016

Position-Indexed Formulations for Kidney Exchange

John P. Dickerson; David F. Manlove; Benjamin Plaut; Tuomas Sandholm; James Trimble

A kidney exchange is an organized barter market where patients in need of a kidney swap willing but incompatible donors. Determining an optimal set of exchanges is theoretically and empirically hard. Traditionally, exchanges took place in cycles, with each participating patient-donor pair both giving and receiving a kidney. The recent introduction of chains, where a donor without a paired patient triggers a sequence of donations without requiring a kidney in return, increased the efficacy of fielded kidney exchanges---while also dramatically raising the empirical computational hardness of clearing the market in practice. While chains can be quite long, unbounded-length chains are not desirable: planned donations can fail before transplant for a variety of reasons, and the failure of a single donation causes the rest of that chain to fail, so parallel shorter chains are better in practice. In this paper, we address the tractable clearing of kidney exchanges with short cycles and chains that are long but bounded. This corresponds to the practice at most modern fielded kidney exchanges. We introduce three new integer programming formulations, two of which are compact. Furthermore, one of these models has a linear programming relaxation that is exactly as tight as the previous tightest formulation (which was not compact) for instances in which each donor has a paired patient. On real data from the UNOS nationwide exchange in the United States and the NLDKSS nationwide exchange in the United Kingdom, as well as on generated realistic large-scale data, we show that our new models are competitive with all existing solvers---in many cases outperforming all other solvers by orders of magnitude. Finally, we note that our position-indexed chain-edge formulation can be modified in a straightforward way to take post-match edge failure into account, under the restriction that edges have equal probabilities of failure. Post-match edge failure is a primary source of inefficiency in presently-fielded kidney exchanges. We show how to implement such failure-aware matching in our model, and also extend the state-of-the-art general branch-and-price-based non-compact formulation for the failure-aware problem to run its pricing problem in polynomial time.


economics and computation | 2015

Ignorance is Almost Bliss: Near-Optimal Stochastic Matching With Few Queries

Avrim Blum; John P. Dickerson; Nika Haghtalab; Ariel D. Procaccia; Tuomas Sandholm; Ankit Sharma

The stochastic matching problem deals with finding a maximum matching in a graph whose edges are unknown but can be accessed via queries. This is a special case of stochastic k-set packing, where the problem is to find a maximum packing of sets, each of which exists with some probability. In this paper, we provide edge and set query algorithms for these two problems, respectively, that provably achieve some fraction of the omniscient optimal solution. Our main theoretical result for the stochastic matching (i.e., 2-set packing) problem is the design of an adaptive algorithm that queries only a constant number of edges per vertex and achieves a (1-ε) fraction of the omniscient optimal solution, for an arbitrarily small ε > 0. Moreover, this adaptive algorithm performs the queries in only a constant number of rounds. We complement this result with a non-adaptive (i.e., one round of queries) algorithm that achieves a (0.5 - ε) fraction of the omniscient optimum. We also extend both our results to stochastic k-set packing by designing an adaptive algorithm that achieves a (2/k - ε) fraction of the omniscient optimal solution, again with only O(1) queries per element. This guarantee is close to the best known polynomial-time approximation ratio of 3/k+1 -ε for the deterministic k-set packing problem [Furer 2013]. We empirically explore the application of (adaptations of) these algorithms to the kidney exchange problem, where patients with end-stage renal failure swap willing but incompatible donors. We show on both generated data and on real data from the first 169 match runs of the UNOS nationwide kidney exchange that even a very small number of non-adaptive edge queries per vertex results in large gains in expected successful matches.


Science | 2009

What Can Virtual Worlds and Games Do for National Security

V. S. Subrahmanian; John P. Dickerson

Virtual environments based on behavorial models allow analysts to explore different outcomes of proposed actions in military conflicts. Military planners have long used war games to plan for future conflicts. Beginning in the 1950s, defense analysts began to develop computer-based models to predict the outcomes of military battles that incorporated elements of game theory. Such models were often restricted to two opposing forces, and often had a strict win-lose resolution. Today, defense analysts face situations that are more complex, not only in that conflicts may involve several opposing groups within a region, but also in that military actions are only part of an array of options available in trying to foster stable, peaceful conditions. For example, in the current conflict in Afghanistan, analysts must try to estimate how particular actions by their forces—building schools, burning drug crops, or performing massive security sweeps—will affect interactions between the many diverse ethnic groups in the region. We discuss one approach to addressing this prediction problem in which possible outcomes are explored through computer-based virtual-world environments.


ACM Transactions on Intelligent Systems and Technology | 2012

Adversarial Geospatial Abduction Problems

Paulo Shakarian; John P. Dickerson; V. S. Subrahmanian

Geospatial Abduction Problems (GAPs) involve the inference of a set of locations that “best explain” a given set of locations of observations. For example, the observations might include locations where a serial killer committed murders or where insurgents carried out Improvised Explosive Device (IED) attacks. In both these cases, we would like to infer a set of locations that explain the observations, for example, the set of locations where the serial killer lives/works, and the set of locations where insurgents locate weapons caches. However, unlike all past work on abduction, there is a strong adversarial component to this; an adversary actively attempts to prevent us from discovering such locations. We formalize such abduction problems as a two-player game where both players (an “agent” and an “adversary”) use a probabilistic model of their opponent (i.e., a mixed strategy). There is asymmetry as the adversary can choose both the locations of the observations and the locations of the explanation, while the agent (i.e., us) tries to discover these. In this article, we study the problem from the point of view of both players. We define reward functions axiomatically to capture the similarity between two sets of explanations (one corresponding to the locations chosen by the adversary, one guessed by the agent). Many different reward functions can satisfy our axioms. We then formalize the Optimal Adversary Strategy (OAS) problem and the Maximal Counter-Adversary strategy (MCA) and show that both are NP-hard, that their associated counting complexity problems are #P-hard, and that MCA has no fully polynomial approximation scheme unless P=NP. We show that approximation guarantees are possible for MCA when the reward function satisfies two simple properties (zero-starting and monotonicity) which many natural reward functions satisfy. We develop a mixed integer linear programming algorithm to solve OAS and two algorithms to (approximately) compute MCA; the algorithms yield different approximation guarantees and one algorithm assumes a monotonic reward function. Our experiments use real data about IED attacks over a 21-month period in Baghdad. We are able to show that both the MCA algorithms work well in practice; while MCA-GREEDY-MONO is both highly accurate and slightly faster than MCA-LS, MCA-LS (to our surprise) always completely and correctly maximized the expected benefit to the agent while running in an acceptable time period.


european intelligence and security informatics conference | 2011

Dealing with Lashkar-e-Taiba: A Multi-player Game-Theoretic Perspective

John P. Dickerson; Aaron Mannes; V. S. Subrahmanian

Lashkar-e-Taiba (LET) is one of the deadliest terrorist groups in the world. With over 100 attacks worldwide since 2004, LET has become a political force within Pakistan, a proxy fighting force for the Pakistani Army, and a terror group that can carry out complex, coordinated attacks such as the 2008 Mumbai attacks. In this paper, we develop a game-theoretic analysis of how to deal with LET using a 5-player game whose players include LET, India, the Pakistani military, the (civilian) Pakistani government, and the US. We use an expert on LET and Pakistan to develop a payoff matrix and compute pure and mixed Nash equilibria (NE) in this payoff matrix. We study several of these NEs in detail. Our analysis shows that: (i) there are 6 pure NEs in which LET eliminates its armed wing, (ii) increasing external financial/military support for Pakistan leads to no NEs where LET reduces violence, (iii) almost all NEs in which LET significantly reduces violence involve coordinated actions by both the US and India.


Journal of Experimental Child Psychology | 2015

Endogenously and exogenously driven selective sustained attention: Contributions to learning in kindergarten children.

Lucy C. Erickson; Erik D. Thiessen; Karrie E. Godwin; John P. Dickerson; Anna V. Fisher

Selective sustained attention is vital for higher order cognition. Although endogenous and exogenous factors influence selective sustained attention, assessment of the degree to which these factors influence performance and learning is often challenging. We report findings from the Track-It task, a paradigm that aims to assess the contribution of endogenous and exogenous factors to selective sustained attention within the same task. Behavioral accuracy and eye-tracking data on the Track-It task were correlated with performance on an explicit learning task. Behavioral accuracy and fixations to distractors during the Track-It task did not predict learning when exogenous factors supported selective sustained attention. In contrast, when endogenous factors supported selective sustained attention, fixations to distractors were negatively correlated with learning. Similarly, when endogenous factors supported selective sustained attention, higher behavioral accuracy was correlated with greater learning. These findings suggest that endogenously and exogenously driven selective sustained attention, as measured through different conditions of the Track-It task, may support different kinds of learning.


international joint conference on artificial intelligence | 2017

Diverse Weighted Bipartite b-Matching

Faez Ahmed; John P. Dickerson; Mark Fuge

Bipartite matching, where agents on one side of a market are matched to agents or items on the other, is a classical problem in computer science and economics, with widespread application in healthcare, education, advertising, and general resource allocation. A practitioners goal is typically to maximize a matching markets economic efficiency, possibly subject to some fairness requirements that promote equal access to resources. A natural balancing act exists between fairness and efficiency in matching markets, and has been the subject of much research. In this paper, we study a complementary goal---balancing diversity and efficiency---in a generalization of bipartite matching where agents on one side of the market can be matched to sets of agents on the other. Adapting a classical definition of the diversity of a set, we propose a quadratic programming-based approach to solving a supermodular minimization problem that balances diversity and total weight of the solution. We also provide a scalable greedy algorithm with theoretical performance bounds. We then define the price of diversity, a measure of the efficiency loss due to enforcing diversity, and give a worst-case theoretical bound. Finally, we demonstrate the efficacy of our methods on three real-world datasets, and show that the price of diversity is not bad in practice.

Collaboration


Dive into the John P. Dickerson's collaboration.

Top Co-Authors

Avatar

Tuomas Sandholm

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Amy Sliva

Charles River Laboratories

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Anna V. Fisher

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Erik D. Thiessen

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Karrie E. Godwin

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Gerardo I. Simari

Universidad Nacional del Sur

View shared research outputs
Top Co-Authors

Avatar

Benjamin Plaut

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Lucy C. Erickson

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge