Skip to main content

Simulating a Coupon Collector

  • Conference paper
  • First Online:
Cyber Security, Cryptology, and Machine Learning (CSCML 2022)

Abstract

The coupon collector’s problem (CCP) reads as follows: How many drawings are needed on average in order to complete a collection of n types of coupons, if at each step a single coupon is drawn uniformly randomly, independently of all the other drawings?

Since CCP was first introduced, numerous questions have been posed on its basis, and it also turned out to appear in many applications, such as DDoS cyber attacks and machine learning. It is well known that, in CCP, the convergence of various quantities of interest to their asymptotic values is rather slow. Thus, simulating the process to get a feeling for their behavior is often impractical.

We present here an alternative view of the process, which allows us, for equally probable coupons, to perform fast simulation for large values of the parameters.

Research supported in part by the Milken Families Foundation Chair in Mathematics and the Cyber Security Research Center at Ben-Gurion University.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Adler, I., Oren, S., Ross, S.M.: The coupon-collector’s problem revisited. J. Appl. Probab. 40(2), 513–518 (2003)

    Article  MathSciNet  Google Scholar 

  2. Anderson, J., Goyal, N., Rademacher, L.: Efficient learning of simplices. In: Conference on Learning Theory, PMLR, pp. 1020–1045 (2013)

    Google Scholar 

  3. Barak-Pelleg, D., Berend, D.: The Time For Reconstructing the Attack Graph in DDoS Attacks (Submitted)

    Google Scholar 

  4. Barak-Pelleg, D., Berend, D., Robinson, T.J., Zimmerman, I.: Algorithms for Reconstructing DDoS Attack Graphs Using Probabilistic Packet Marking (Submitted)

    Google Scholar 

  5. Barbour, A., Holst, L.D., Janson, S.: Poisson Approximation. The Clarendon Press, Oxford (1992)

    MATH  Google Scholar 

  6. Boneh, A., Hofri, M.: The coupon-collector problem revisited - a survey of engineering problems and computational methods. Commun. Stat. Stochast. Mod. 13(1), 39–66 (1997)

    Article  MathSciNet  Google Scholar 

  7. Brayton, R.K.: On the asymptotic behavior of the number of trials necessary to complete a set with random selection. J. Math. Anal. Appl. 7(1), 31–61 (1963)

    Article  MathSciNet  Google Scholar 

  8. Brown, M., Peköz, E.A., Ross, S.M.: Coupon collecting. Probab. Eng. Inf. Sci. 22(2), 221–229 (2008)

    Article  MathSciNet  Google Scholar 

  9. Brown, M., Ross, S.M.: Optimality results for coupon collection. J. Appl. Probab. 53(3), 930–937 (2016)

    Article  MathSciNet  Google Scholar 

  10. Brunskill, E., Li, L.: The online coupon-collector problem and its application to lifelong reinforcement learning. arXiv preprint arXiv:1506.03379 (2015)

  11. Doumas, A.V., Papanicolaou, V.G.: The siblings of the coupon collector. Theory Probab. Appl. 62(3), 444–470 (2018)

    Article  MathSciNet  Google Scholar 

  12. Erdős, P., Rényi, A.: On a classical problem of probability theory. Publ. Math. Inst. Hung. Acad. Sci. Ser. A 6, 215–220 (1961)

    Google Scholar 

  13. Feller, W.: An Introduction to Probability Theory and Its Applications, vol. 1, 3rd edn. Wiley, New York, London, Sydney (1968)

    Google Scholar 

  14. Flajolet, P., Gardy, D., Thimonier, L.: Birthday paradox, coupon collectors, caching algorithms and self-organizing search. Discret. Appl. Math. 39(3), 207–229 (1992)

    Article  MathSciNet  Google Scholar 

  15. Flatto, L.: The Dixie Cup Problem and FKG inequality. High Frequency 2(3–4), 1–6 (2019)

    Google Scholar 

  16. Foata, D., Zeilberger, D.: The collector’s brotherhood problem using the Newman-Shepp symbolic method. Algebra Universalis 49(4), 387–395 (2003)

    Article  MathSciNet  Google Scholar 

  17. Gumbel, E.J.: Statistical Theory of Extreme Values and Some Practical Applications. A Series of Lectures. National Bureau of Standards Applied Mathematics Series No. 33, U. S. Government Printing Office, Washington, D. C. (1954), viii+51

    Google Scholar 

  18. Holst, L.: On birthday, collectors’, occupancy and other classical urn problems. Int. Stat. Rev. 54, 15–27 (1986)

    Article  MathSciNet  Google Scholar 

  19. Ilienko, A.: Limit theorems in the extended coupon collector’s problem. arXiv preprint arXiv:2002.00650 (2020)

  20. Laplace, P.S.: Théorie Analytique des Probabilités, vol. 2, p. 1812, Éditions Jacques Gabay, Paris (1995). (Reprint of the 1820 third edition)

    Google Scholar 

  21. Li, A., Chen, Y.: Convergence of coupon collecting process via Wormald’s differential equation method. arXiv preprint arXiv:1912.02582 (2019)

  22. Loukas, S., Kemp, C.D.: The computer generation of bivariate binomial and negative binomial random variables. Commun. Stat. Simul. Comput. 15(1), 15–25 (1986)

    Article  MathSciNet  Google Scholar 

  23. Maunsell, F.G.: A problem in cartophily. Math. Gaz. 22(251), 328–331 (1938)

    Article  Google Scholar 

  24. de Moivre, A.: The Doctrine of Chances. 1756, Republished 1967 by Chelsea, New York (1967)

    Google Scholar 

  25. Newman, D.J., Shepp, L.: The double Dixie Cup Problem. Am. Math. Mon. 67(1), 58–61 (1960)

    Article  MathSciNet  Google Scholar 

  26. Pinheiro, E.C., Ferrari, S.L.P.: A comparative review of generalizations of the Gumbel extreme value distribution with an application to wind speed data. J. Stat. Comput. Simul. 86(11), 2241–2261 (2016)

    Article  MathSciNet  Google Scholar 

  27. Raab, M., Steger, A.: “Balls into Bins’’ — a simple and tight analysis. In: Luby, M., Rolim, J.D.P., Serna, M. (eds.) RANDOM 1998. LNCS, vol. 1518, pp. 159–170. Springer, Heidelberg (1998). https://doi.org/10.1007/3-540-49543-6_13

    Chapter  MATH  Google Scholar 

  28. Ross, S.M.: Introduction to Probability Models, 10th edn. Academic Press, Oxford (2009)

    Google Scholar 

  29. Sairam, A.S., Saurabh, S.: A more accurate completion condition for attack-graph reconstruction in probabilistic packet marking algorithm. In: 2013 National Conference on Communications (NCC), pp. 1–5. IEEE (2013)

    Google Scholar 

  30. Sairam, A.S., Saurabh, S.: Increasing accuracy and reliability of IP traceback for DDoS attack using completion condition. Int. J. Netw. Secur. 18(2), 224–234 (2016)

    Google Scholar 

  31. Sasaki, Yu., Li, Y., Sakamoto, H., Sakiyama, K.: Coupon collector’s problem for fault analysis against AES—high tolerance for noisy fault injections. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 213–220. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39884-1_18

    Chapter  Google Scholar 

  32. Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Practical network support for IP traceback. In: Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp. 295–306 (2000)

    Google Scholar 

  33. von Schelling, H.: Auf Der Spur Des Zufalls. Deutsches Statistisches Zentralblatt 26, 137–146 (1934)

    MATH  Google Scholar 

  34. von Schelling, H.: Coupon collecting for unequal probabilities. Am. Math. Mon. 61, 306–311 (1954)

    Article  MathSciNet  Google Scholar 

  35. Zhou, M.G., et al.: Experimental quantum advantage with quantum coupon collector. arXiv preprint arXiv:2112.07884 (2021)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dina Barak-Pelleg .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Barak-Pelleg, D., Berend, D. (2022). Simulating a Coupon Collector. In: Dolev, S., Katz, J., Meisels, A. (eds) Cyber Security, Cryptology, and Machine Learning. CSCML 2022. Lecture Notes in Computer Science, vol 13301. Springer, Cham. https://doi.org/10.1007/978-3-031-07689-3_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-07689-3_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-07688-6

  • Online ISBN: 978-3-031-07689-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics