Malwina J. Luczak
London School of Economics and Political Science
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Malwina J. Luczak.
Annals of Probability | 2006
Malwina J. Luczak; Colin McDiarmid
There are n queues, each with a single server. Customers arrive in a Poisson process at rate An, where 0 < λ < 1. Upon arrival each customer selects d ≥ 2 servers uniformly at random, and joins the queue at a least-loaded server among those chosen. Service times are independent exponentially distributed random variables with mean 1. We show that the system is rapidly mixing, and then investigate the maximum length of a queue in the equilibrium distribution. We prove that with probability tending to 1 as n → ∞ the maximum queue length takes at most two values, which are ln ln n / ln d + O(1).
Random Structures and Algorithms | 2007
Svante Janson; Malwina J. Luczak
We study the k-core of a random (multi)graph on n vertices with a given degree sequence. We let n tend to infinity. Then, under some regularity conditions on the degree sequences, we give conditions on the asymptotic shape of the degree sequence that imply that with high probability the k-core is empty, and other conditions that imply that with high probability the k-core is non-empty and the sizes of its vertex and edge sets satisfy a law of large numbers; under suitable assumptions these are the only two possibilities. In particular, we recover the result by Pittel, Spencer and Wormald on the existence and size of a k-core in G(n,p) and G(n,m). Our method is based on the properties of empirical distributions of independent random variables, and leads to simple proofs.
Random Structures and Algorithms | 2014
Svante Janson; Malwina J. Luczak; Peter Windridge
We study the susceptible-infective-recovered SIR epidemic on a random graph chosen uniformly subject to having given vertex degrees. In this model infective vertices infect each of their susceptible neighbours, and recover, at a constant rate. Suppose that initially there are only a few infective vertices. We prove there is a threshold for a parameter involving the rates and vertex degrees below which only a small number of infections occur. Above the threshold a large outbreak occurs with probability bounded away from zero. Our main result is that, conditional on a large outbreak, the evolutions of certain quantities of interest, such as the fraction of infective vertices, converge to deterministic functions of time. We also consider more general initial conditions for the epidemic, and derive criteria for a simple vaccination strategy to be successful. In contrast to earlier results for this model, our approach only requires basic regularity conditions and a uniformly bounded second moment of the degree of a random vertex. En route, we prove analogous results for the epidemic on the configuration model multigraph under much weaker conditions. Essentially, our main result requires only that the initial values for our processes converge, i.e. it is the best possible.
Annals of Applied Probability | 2008
Svante Janson; Malwina J. Luczak
We study the k-core of a random (multi)graph on n vertices with a given degree sequence. In our previous paper [Random Structures Algorithms 30 (2007) 50–62] we used properties of empirical distributions of independent random variables to give a simple proof of the fact that the size of the giant k-core obeys a law of large numbers as n→∞. Here we develop the method further and show that the fluctuations around the deterministic limit converge to a Gaussian law above and near the threshold, and to a non-normal law at the threshold. Further, we determine precisely the location of the phase transition window for the emergence of a giant k-core. Hence, we deduce corresponding results for the k-core in G(n, p) and G(n, m).
foundations of computer science | 1999
Malwina J. Luczak; Eli Upfal
We compare the performance of a variant of the standard dynamic alternative routing (DAR) technique commonly used in telephone and ATM networks to a path selection algorithm that is based on the balanced allocations principle-the Balanced Dynamic Alternative Routing (BDAR) algorithm. While the standard technique checks alternative routes sequentially until available bandwidth is found, the BDAR algorithm compares and chooses the best among a small number of alternatives. We show that, at the expense of a minor increase in routing overhead, the BDAR gives a substantial improvement in network performance in terms of both network congestion and blocking probabilities.
Journal of Mathematical Physics | 2008
Svante Janson; Malwina J. Luczak
We study the evolution of the susceptibility in the subcritical random graph G(n,p) as n tends to infinity. We obtain precise asymptotics of its expectation and variance and show that it obeys a law of large numbers. We also prove that the scaled fluctuations of the susceptibility around its deterministic limit converge to a Gaussian law. We further extend our results to higher moments of the component size of a random vertex and prove that they are jointly asymptotically normal.
Annals of Applied Probability | 2005
Malwina J. Luczak; Colin McDiarmid
Suppose that there are n bins, and balls arrive in a Poisson process at rate \lambda n, where \lambda >0 is a constant. Upon arrival, each ball chooses a fixed number d of random bins, and is placed into one with least load. Balls have independent exponential lifetimes with unit mean. We show that the system converges rapidly to its equilibrium distribution; and when d\geq 2, there is an integer-valued function m_d(n)=\ln \ln n/\ln d+O(1) such that, in the equilibrium distribution, the maximum load of a bin is concentrated on the two values m_d(n) and m_d(n)-1, with probability tending to 1, as n\to \infty. We show also that the maximum load usually does not vary by more than a constant amount from \ln \ln n/\ln d, even over quite long periods of time.
Random Structures and Algorithms | 2001
Malwina J. Luczak; Colin McDiarmid
Consider partitions of the vertex set of a graph G into two sets with sizes differing by at most 1: the bisection width of G is the minimum over all such partitions of the number of ‘‘cross edges’’ between the parts. We are interested in sparse random graphs Ž . G with edge probability c n. We show that, if c ln 4, then the bisection width is n n, c n with high probability; while if c ln 4, then it is equal to 0 with high probability. There are corresponding threshold results for partitioning into any fixed number of parts. 2001 John Wiley & Sons, Inc. Random Struct. Alg., 18, 31 38, 2001
Annals of Applied Probability | 2008
A. D. Barbour; Malwina J. Luczak
In modeling parasitic diseases, it is natural to distinguish hosts according to the number of parasites that they carry, leading to a countably infinite type space. Proving the analogue of the deterministic equations, used in models with finitely many types as a “law of large numbers” approximation to the underlying stochastic model, has previously either been done case by case, using some special structure, or else not attempted. In this paper we prove a general theorem of this sort, and complement it with a rate of convergence in the l1-norm.
Random Structures and Algorithms | 2017
Graham R. Brightwell; Svante Janson; Malwina J. Luczak
We analyse the size of an independent set in a random graph on n vertices with specified vertex degrees, constructed via a simple greedy algorithm: order the vertices arbitrarily, and, for each vertex in turn, place it in the independent set unless it is adjacent to some vertex already chosen. We find the limit of the expected proportion of vertices in the greedy independent set as n→∞, expressed as an integral whose upper limit is defined implicitly, valid whenever the second moment of a random vertex degree is uniformly bounded. We further show that the random proportion of vertices in the independent set converges to the jamming constant as n→∞. The results hold under weaker assumptions in a random multigraph with given degrees constructed via the configuration model.