Below is the full program of the conference. You can find the list of invited speakers, their bios, and the abstracts of their talks here. The program with abstracts is also available here: pdf (pdf 389 kB)
July 1
8:30 - 9:00: Breakfast and registration
9:00 - 9:15: Opening remarks
Morning session chair: Bert Zwart
Emma Horton -- Genealogies of critical branching processes
Abstract: Branching processes are pertinent to understanding many different real world processes such as cell division, population growth and neutron transport. In particular, understanding their genealogical structures can prove useful for parameter estimation, Monte Carlo simulations and scaling limits. In this talk we discuss a decomposition of the branching process known as the many-to-few formula, which allows one to understand the behaviour of a branching process in terms of a weighted subtree. I will then give two applications of this decomposition to demonstrate its use in understanding the genealogical structure of the branching process.
10:30 - 11:00: Coffee break
Jim Dai - The BAR-approach for continuous-time stochastic systems
Abstract: I will survey the basic adjoint relationship (BAR)-approach
that has been advanced recently by Braverman, Dai, and Miyazawa (2017,
2024) for steady-state analysis of continuous-time stochastic systems.
In such a system, the distributions of stochastic primitives (e.g,
service times) are assumed to be general, not necessarily exponential
or phase-type. I will illustrate that the BAR-approach is an effective
too to prove (1) the state space collapse in a join-shortest-queue
system, (2) asymptotic steady-state independence for multiclass
queueing networks in multi-scale heavy traffic.
Lunch in Ljusgård (KTH E building)
Afternoon session chair: Amber Puha
Ruth Williams - Stochastic Analysis of Chemical Reaction Networks with Applications to Epigenetic Cell Memory
Abstract: Epigenetic cell memory, the inheritance of gene expression patterns across subsequent cell divisions, is a critical property of multi-cellular organisms. Simulation studies have shown how stochastic dynamics and time-scale differences between establishment and erasure processes in chromatin modifications can have a critical effect on epigenetic cell memory.
In this talk, we describe a mathematical framework to rigorously validate and extend beyond these computational findings. Viewing ourstochasticmodel of a chromatin modification circuit as a singularly perturbed, finite state, continuous time Markov chain, we extend beyond existing theory in order to characterize the leading coefficients in the series expansions of stationary distributions and mean first passage times. In particular, we characterize the limiting stationary distribution in terms of a reduced Markov chain, provide an algorithm to determine the orders of the poles of mean first passage times, and describe a comparison theorem which can be used to explore how changing erasure rates affects system behavior. These theoretical tools not only allow us to set a rigorous mathematical basis for the computational findings of prior work, highlighting the effect of chromatin modification dynamics on epigenetic cell memory, but they can also be applied to other singularly perturbed Markov chains especially those associated with chemical reaction networks.
Based on joint work with Simone Bruno, Felipe Campos, Yi Fu and Domitilla Del Vecchio.
Session organized and chaired by Stefan Stojanovic
Aditya S. Gopalan
UIUC
Scaling Limit of a Stochastic Hegselmann-Krause Model
1
Bharath Roy Choudhury
INRIA
Genealogies of records of stochastic processes with stationary increments as unimodular trees
2
Burak Buke
University of Edinburgh
Modelling Individuality and Strategic Behaviour in Large Service Systems
3
Gal Mendelson
Technion
Worst case analysis of non-stationary Multi-Armed-Bandits
4
John Hasenbein
University of Texas at Austin
Naor's Unobservable Model with Partial Arrival Rate Information
5
Juniper Cocomello
Brown University
Exact description of limiting SIR and SEIR dynamics on locally tree-like graphs
6
Mauricio Daros Andrade
University of Pennsylvania
Joint Convergence of Monochromatic Subgraphs in Randomly Colored Dense Multiplex Networks
7
Omar De la Cruz Cabrera
Kent State University
A Diffusion Process with Markov Matrix Values
8
Priya Mittal
IIT Dehli
Pricing exchange option with stochastic liquidity risk and stochastic volatility
9
Purva Joshi
Eindhoven University of Technology
Dynamic Scheduling and Trajectory Planning for Intersections with Heterogeneous Autonomous Traffic
10
Ebru Kasikaralar
Chicago Booth School of Business
Dynamic Scheduling of a Multiclass Queue in the Halfin-Whitt Regime: A Computational Approach for High-Dimensional Problems
11
3:10 – 3:30: Coffee break
Peter Taylor - A strategy for constructing tractable models of malarial superinfection
Abstract: Superinfection, that is the concurrent presentation of separately-acquired infections, is an important feature of several infectious diseases. A particularly pertinent example is malaria. Population-level compartment models allowing for malarial superinfection may take the form of countably infinite systems of ordinary differential equations, which poses complications for simulation and analysis. Here, we present a novel strategy for deriving tractable systems of integrodifferential equations for epidemic models of malarial superinfection. Our approach is predicated on the fact that we can characterise the within-host dynamics using a network of infinite-server queues with a time dependent batch arrival rate that is a function of the intensity of mosquito-to-human transmission. We shall illustrate this approach in the context of the classical model of superinfection for Plasmodium falciparum malaria. By observing that the classical deterministic compartment model has the same form as the Kolmogorov forward differential equations for an infinite server queue, we recover a reduced system of integro-differential equations governing the intensity of mosquito-to-human transmission. The resultant systems of IDEs are amenable to numerical solution, allowing us to explore the transient, population-level dynamics of superinfection without resorting to approximation. We can also derive threshold parameters governing the existence of non-trivial (endemic) equilibria. This approach can be generalised to account for additional biological complexity, in particular the accrual of the hypnozoite reservoir — a bank of dormant liver-stage parasites that can activate to yield repeated relapses of Plasmodium vivax malaria. It can also be used in models that take into account demography, drug treatment and the development of immunity.
Aditya S. Gopalan
UIUC
Scaling Limit of a Stochastic Hegselmann-Krause Model
Bharath Roy Choudhury
INRIA
Genealogies of records of stochastic processes with stationary increments as unimodular trees
Alessia Rigonat
INRIA
Stochastic averaging and mean-field for a large system with fast varying environment
Burak Buke
University of Edinburgh
Modelling Individuality and Strategic Behaviour in Large Service Systems
Ebru Kasikaralar
Chicago Booth School of Business
Dynamic Scheduling of a Multiclass Queue in the Halfin-Whitt Regime: A Computational Approach for High-Dimensional Problems
Fethi Bencherki
Lund University
Learning Optimal Dispatching Policies for Queueing Systems
Gal Mendelson
Technion
Worst case analysis of non-stationary Multi-Armed-Bandits
John Hasenbein
University of Texas at Austin
Naor's Unobservable Model with Partial Arrival Rate Information
Juniper Cocomello
Brown University
Exact description of limiting SIR and SEIR dynamics on locally tree-like graphs
Mahmoud Khabou
Imperial Cellege London
Periodic Network Count Autoregression with Infinite Memory
Mauricio Daros Andrade
University of Pennsylvania
Joint Convergence of Monochromatic Subgraphs in Randomly Colored Dense Multiplex Networks
Omar De la Cruz Cabrera
Kent State University
A Diffusion Process with Markov Matrix Values
Priya Mittal
IIT Dehli
Pricing exchange option with stochastic liquidity risk and stochastic volatility
Purva Joshi
Eindhoven University of Technology
Dynamic Scheduling and Trajectory Planning for Intersections with Heterogeneous Autonomous Traffic
Simon Linståhl
KTH / Ericsson Research
Change point detection with adaptive measurement schedules for network performance verification
Stefan Stojanovic
KTH
Leveraged Entry-wise Matrix Completion for Reinforcement Learning
July 2
8:30 - 9:00: Breakfast and registration
Morning session chair: Fiona Skerman
Souvik Dhara - Community Detection with Censoring
Abstract: Recovering latent communities is a key unsupervised learning task in network data with applications spanning across a multitude of disciplines. For example, identifying communities in web pages can lead to faster search, classifying regions of the human brain in communities can be used to predict onset of psychosis, and identifying communities of assets can help investors manage risk by investing in different communities of assets. However, the scale of these massive networks has become so large that it is often impossible to work with the entire network data. In this talk, I will talk about some theoretical progress for community detection in a probabilistic set up especially when we have missing data about the network.
Based on joint works with Julia Gaudio, Elchanan Mossel and Colin Sandon.
10-00 - 10:30: Coffee break
Sen Subhabrata - Fundamental thresholds for community detection on multi-view networks
Abstract: We will discuss sharp thresholds for weak recovery in multi-view networks. Specifically, we will discuss the inhomogeneous multi-layer Stochastic Block Model (SBM) and the dynamical SBM. In addition, we provide efficient algorithms for community recovery using Approximate Message Passing. Based on joint work with Xiaodong Yang and Buyu Lin (Harvard).
Shuangping Li - Spectral clustering in the Gaussian mixture block model
Abstract: Gaussian mixture block models are distributions over graphs that strive to model modern networks: to generate a graph from such a model, we associate each vertex with a latent feature vector sampled from a mixture of Gaussians, and we add edge if and only if the feature vectors are sufficiently similar. The different components of the Gaussian mixture represent the fact that there may be different types of nodes with different distributions over features---for example, in a social network each component represents the different attributes of a distinct community. Natural algorithmic tasks associated with these networks are embedding (recovering the latent feature vectors) and clustering (grouping nodes by their mixture component).
In this talk, we focus on clustering and embedding graphs sampled from high-dimensional Gaussian mixture block models, where the dimension of the latent feature vectors goes to infinity as the size of the network goes to infinity. This high-dimensional setting is most appropriate in the context of modern networks, in which we think of the latent feature space as being high-dimensional. We analyze the performance of canonical spectral clustering and embedding algorithms for such graphs in the case of 2-component spherical Gaussian mixtures and begin to sketch out the information- computation landscape for clustering and embedding in these models.
This is based on joint work with Tselil Schramm.
Lunch in Ljusgård (KTH E building)
Afternoon session chair: Rajesh Sundaresan
Svante Janson - Inhomogeneous random graphs
Abstract: This is a survey of "Inhomogeneous random graphs" starting with their definition by Bollobas, Janson & Riordan (2007) and discussing some later developments and results, in particular the connections to graphons. I want to stress the flexibility of the model, but also its limits.
3:00 - 3:30: Coffee break
François Baccelli - Phase transitions in unimodular random graphs
Abstract: The talk will survey recent results on unimodular random networks. Several applications will be discussed, including perfect simulation, unsupervised classification, and phylogenetic
classification.
July 3
8:30 – 9:00: Breakfast
9:00 - 9:10 About Stochastic Networks 2026: Amy Ward
Morning session chair: Pierre Nyquist
Mariana Olvera-Cravioto - Local limits and preferential attachment graphs
Abstract: This talk is meant to provide an overview of local weak convergence techniques for a large class of directed random graphs, including static models such as the Erdos-Renyi, Chung-Lu, stochastic block model, and configuration models, as well as dynamic models such as the collapsed branching process and the directed preferential attachment graph. We explain how local limits can be used to study important structural graph properties, including centrality measures such as the PageRank distribution. We further use the insights obtained from our analysis of centrality measures to explain how static models and evolving models differ in how large degree vertices are distributed within the graph and how they shape their neighborhoods. In particular, we show that the empirically accepted “power-law hypothesis” on scale-free graphs, which states that the PageRank distribution follows a power-law with the same tail index as the in-degree distribution, holds in most static models but not in the dynamic models we study.
This is joint work with: Sayan Banerjee and Prabhanka Deka.
10:10 – 10:30: Coffee break
10:25 Group photo -- In front of the E building
Jiaming Xu - Recent advances on random graph matching problems
Abstract: Random graph matching, the problem of recovering vertex correspondences between two random graphs through their correlated edge connections, is a pivotal challenge with extensive applications. This interdisciplinary problem holds great importance in areas such as network privacy, computational biology, computer vision, and natural language processing, while also raising intricate theoretical questions at the intersection of algorithms, computational complexity, and information theory. Remarkable strides have recently been made in the study of matching correlated Erdős–Rényi graphs. In this talk, the speaker will overview these recent developments,
highlight key breakthroughs, and point out important directions for future investigation.
Clara Stegehuis - Optimal structures in random networks
Abstract: Subgraphs contain important information about network structures and their functions. But where can we find these subgraphs in random graphs? And how likely are we to find a much larger amount of them than expected? Interestingly, these question leads to mixed integer optimization problems on random graphs that identify the dominant structure of any given subgraph. The optimizer describes the degrees and the spatial locations of the vertices that together create the most likely subgraph. On the popular hyperbolic random graph model, our optimization problem shows the trade-off between geometry and popularity: some subgraphs are most likely formed by vertices that are close by, whereas others are most likely formed by vertices of high degree. This insight makes it possible to create optimal statistics that detect the presence of an underlying spatial structure.
Lunch in Ljusgård (KTH E building)
Afternoon session chair: Kuang Xu
Adam Wierman - Learning Augmented Algorithms for MDPs
Abstract: Making use of modern black-box AI tools such as deep reinforcement learning is potentially transformational for sustainable systems such as data centers, electric vehicles, and the electricity grid. However, such machine-learned algorithms typically do not have formal guarantees on their worst-case performance, stability, or safety. So, while their performance may improve upon traditional approaches in “typical” cases, they may perform arbitrarily worse in scenarios where the training examples are not representative due to, e.g., distribution shift. Thus, a challenging open question emerges: Is it possible to provide guarantees that allow black-box AI tools to be used in safety-critical applications? In this talk, I will provide an overview of an emerging area studying learning-augmented algorithms that seeks to answer this question in the affirmative. I will survey recent results in the area, focusing on online optimization and MDPs, and then describe applications of these results to the design of sustainable data centers and electric vehicle charging.
Junghyun Lee
KAIST
Nearly Optimal Latent State Decoding in Block MDPs
1
Sanne van Kempen
Eindhoven University of Technology
Learning payoffs while routing in skill-based queues
2
Sayeh Khaniha
INRIA
HIERARCHICAL THINNING NEAREST NEIGHBOR ALGORITHM
3
Shamiksha
IIT Dehli
Infinite-server systems with dynamic contagion arrivals and Hawkes services.
4
Taha Ameen
UIUC
Exact Random Graph Matching with Multiple Graphs
5
Utpal Jyoti Deba Sarma
Indian Institute of Technology Delhi
Asymptotic analysis for discrete-time Hawkes process and its compensator
6
Yaosheng Xu
University of Chicago
Asymptotic steady-state independence for generalized Jackson Networks in multi-scale heavy traffic
7
Yashaswini Murthy
UIUC
Performance Bounds for Policy Based Average Reward RL Algorithms
8
Yonatan Shadmi
Imperial Cellege London
Importance Sampling in High Dimension
9
Yunfang Yang
National University of Singapore
Economies of operational hybridity in large-scale service systems
10
Zhiqiang Zhang
Chicago Booth School of Business
Admission Decisions Under Imperfect Classification: An Application in Criminal Justice
11
Po-An Wang
KTH
On universally optimal algorithms for AB testing
12
3:40 – 4:00: Coffee break
Title: Further Adventures of the Compensated Coupling
Abstract: Around five years ago, my collaborators and I introduced the compensated coupling: a simple paradigm for designing sequential decision-making policies based on sample-pathwise comparisons to a hindsight benchmark. Our approach generalized many standard results used in studying MDPs and reinforcement learning, but also gives new policies which are much simpler and more effective than existing heuristics for a large class of widely-studied problems -- including online packing and covering, dynamic pricing, generalized assignment, online bin packing, fair allocation, bandits with knapsacks, and many others. In this talk, I will provide a brief overview of the main technique, and then try to illustrate some newer extensions that illustrate the power of the approach: 1. how to achieve constant regret (i.e., additive loss compared to a hindsight benchmark which is independent of state-space size) for a wide range of problems, and under minimal conditions, 2. how we can use it to derive tradeoff laws between different objectives, and 3. how we can incorporate side information and historical data, and achieve constant regret with as little as a single data trace.
Junghyun Lee
KAIST
Nearly Optimal Latent State Decoding in Block MDPs
Frederic Zheng
KTH
Conformal Prediction under Markovian data
Po-An Wang
KTH
On universally optimal algorithms for AB testing
Sanne van Kempen
Eindhoven University of Technology
Learning payoffs while routing in skill-based queues
Sayeh Khaniha
INRIA
HIERARCHICAL THINNING NEAREST NEIGHBOR ALGORITHM
Shamiksha
IIT Dehli
Infinite-server systems with dynamic contagion arrivals and Hawkes services.
Taha Ameen
UIUC
Exact Random Graph Matching with Multiple Graphs
Utpal Jyoti Deba Sarma
Indian Institute of Technology Delhi
Asymptotic analysis for discrete-time Hawkes process and its compensator
William Reveillard
KTH
Low-Rank Bandits via Tight Two-to-Infinity Singular Subspace Recovery
Yaosheng Xu
University of Chicago
Asymptotic steady-state independence for generalized Jackson Networks in multi-scale heavy traffic
Yashaswini Murthy
UIUC
Performance Bounds for Policy Based Average Reward RL Algorithms
Yonatan Shadmi
Imperial Cellege London
Importance Sampling in High Dimension
Yunfang Yang
National University of Singapore
Economies of operational hybridity in large-scale service systems
Zhiqiang Zhang
Chicago Booth School of Business
Admission Decisions Under Imperfect Classification: An Application in Criminal Justice
July 4
8:15 – 8:45: Breakfast
Morning session chair: Fiona Sloothaak
Niao He - Reinforcement Learning in Mean Field Games: the pitfalls and promises
Abstract: Amidst its diverse applications, multi-agent reinforcement learning (MARL) stands as a formidable challenge in general due to the “curse of many agents”. Mean-field games (MFGs) have merged as a popular surrogate for modeling game dynamics involving a large population of interacting decision-makers. Despite the widespread use of reinforcement learning techniques in recent literature to address MFGs, several foundational questions persist: (1) When are MFGs good approximations of MARL problems, (2) When does learning MFGs exhibit computational or statistical tractability, (3) Can equilibrium be achieved through independent learning? This talk will explore these crucial dimensions of learning MFGs, shedding light on their fundamental limits.
Abstract: In a first part, based on joint work with Mathieu Even, we discuss collaborative approaches where agents who each seek to learn a model of their personal dataset can benefit from each other by learning a shared linear representation.
In a second part, based on joint work with Romain Cosson, we propose strategies for multiple agents to collaboratively explore unknown environments with improved worst-case overhead and competitive ratio.
10:45 - 11:00 Coffee break
Siva Theja Magaluri - Finite-time Tail Bounds for Stochastic Approximation of Contractive Operators
Abstract: Motivated by applications in Reinforcement Learning (RL), this talk focuses on the Stochastic Appproximation (SA) method to find fixed points of a contractive operator. First proposed by Robins and Monro, SA is a popular approach for solving fixed point equations when the information is corrupted by noise. We consider the SA algorithm for possibly nonlinear operators that are contractive under arbitrary norms (especially the l-infinity norm). The focus of this talk is on presenting finite sample bounds on the convergence error. First, we will briefly recap bounds on the mean square error which are obtained using a Lyapunov framework based on infimal convolution and generalized Moreau envelope. Then, we present more recent result on concentration of the tail error. A key challenge is handling the multiplicative form of the noise, which can lead to the iterates being potentially unbounded. Our tail bounds are obtained using exponential supermartingales in conjunction with the Moreau envelope and a novel bootstrapping approach. Our results immediately imply the state-of-the-art sample complexity results for a large class of RL algorithms.
Cynthia Rush - Characterizing Model Selection Performance of Sorted L1 Regularization Using Approximate Message Passing
Abstract: Sorted L1 regularization has been incorporated into many methods for solving high- dimensional statistical estimation problems, including the SLOPE estimator in linear regression. In this talk, we study how this regularization technique improves variable selection by characterizing the optimal SLOPE trade-off between the false discovery proportion (FDP) and true positive proportion (TPP) or, equivalently, between measures of type I and type II error. Additionally, we show that on any problem instance, SLOPE with a certain simplified two-level regularization sequence outperforms the Lasso, in the sense of having an asymptotically smaller FDP, larger TPP and smaller L2 estimation risk simultaneously. We discuss how this simplified version of SLOPE with a two-level regularization sequence, which we refer to as 2-level SLOPE, performs nearly as well as SLOPE in its full generality and has far fewer tuning parameters. Our proofs are based on a novel technique that reduces a variational calculus problem to a class of infinite-dimensional convex optimization problems and a recent results from approximate message passing (AMP) theory. With SLOPE being a particular example, we discuss these results in the context of a general program for systematically deriving exact expressions for the asymptotic risk of estimators that are solutions to a broad class of convex optimization problems via AMP. Collaborators on this work include Zhiqi Bu, Jason Klusowski, and Weijie Su (https://arxiv.org/abs/1907.07502 and https://arxiv.org/abs/2105.13302), Oliver Feng, Ramji Venkataramanan, and Richard Samworth (https://arxiv.org/abs/2105.02180) and Ruijia Wu.
10:00 – 10:30: Coffee break
Amy Ward - Integrating Machine Learning and Queueing to Enhance Decision-Making: An Application in Criminal Justice
Joint work with: Bingxuan Li, Pengyi Shi, Zhiqiang Zhang
Abstract: Recidivism, or the repetition of criminal acts after being punished, is a significant problem in the U.S., where over 70% of prisoners reoffend. Incarceration diversion programs are one attempt to combat recidivism, by focusing on societal reintegration rather than incarceration. Machine learning (ML) algorithms play an important role in program admission decisions, by assigning a risk score, that helps to quantify the trade-off between the potential benefit of the program to the individual, and the risk that the individual may reoffend while completing program requirements. Since incarceration diversion programs often have limited capacity, admission decisions are made by prioritizing individuals based on this tradeoff. However, ML classifications are imperfect, resulting in potentially incorrect admission decisions. Furthermore, algorithmic bias in the machine learning model may lead to unfairness with respect to which subpopulations have the opportunity to benefit from the incarceration diversion programs. Errors in decision making and unfairness are especially worrying in this environment, as these decisions affect both the life path of an individual and society’s exposure to offenders.
Motivated by the incarceration diversion program setting, we formulate an admission control problem in a queueing model with heterogeneous classes, in which an underlying ML algorithm estimates each arriving individual’s class. The queueing model is a loss model with reneging from service. The loss feature replicates the fact that individuals admitted to an incarceration diversion program should begin in the program immediately. The reneging from service feature is unique compared to most reneging models in the literature and is motivated by the fact that an individual in the incarceration diversion program may either be successfully served (complete the program) or renege (recidivate while in the program). Our main theoretical results pertain to the performance of a priority score policy under imperfect estimation, and our main computational results focus on calibrating a simulation model to underlying program data.
Maria Deijfen - Mean field stable matching
Abstract: Consider a situation where a number of objects acting to maximize their own satisfaction are to be matched. Each object ranks the other objects and a matching is then said to be stable if there is no pair of objects that would prefer to be matched to each other rather than their current partners. We consider stable matching of the vertices in the complete graph based on i.i.d. exponential edge costs. Our results concern the total cost of the matching, the typical cost and rank of an edge in the matching, and the sensitivity of the matching and the matching cost to small perturbations of the underlying edge costs.