Abstract
The coupon collector’s problem (CCP) reads as follows: How many drawings are needed on average in order to complete a collection of n types of coupons, if at each step a single coupon is drawn uniformly randomly, independently of all the other drawings?
Since CCP was first introduced, numerous questions have been posed on its basis, and it also turned out to appear in many applications, such as DDoS cyber attacks and machine learning. It is well known that, in CCP, the convergence of various quantities of interest to their asymptotic values is rather slow. Thus, simulating the process to get a feeling for their behavior is often impractical.
We present here an alternative view of the process, which allows us, for equally probable coupons, to perform fast simulation for large values of the parameters.
Research supported in part by the Milken Families Foundation Chair in Mathematics and the Cyber Security Research Center at Ben-Gurion University.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Adler, I., Oren, S., Ross, S.M.: The coupon-collector’s problem revisited. J. Appl. Probab. 40(2), 513–518 (2003)
Anderson, J., Goyal, N., Rademacher, L.: Efficient learning of simplices. In: Conference on Learning Theory, PMLR, pp. 1020–1045 (2013)
Barak-Pelleg, D., Berend, D.: The Time For Reconstructing the Attack Graph in DDoS Attacks (Submitted)
Barak-Pelleg, D., Berend, D., Robinson, T.J., Zimmerman, I.: Algorithms for Reconstructing DDoS Attack Graphs Using Probabilistic Packet Marking (Submitted)
Barbour, A., Holst, L.D., Janson, S.: Poisson Approximation. The Clarendon Press, Oxford (1992)
Boneh, A., Hofri, M.: The coupon-collector problem revisited - a survey of engineering problems and computational methods. Commun. Stat. Stochast. Mod. 13(1), 39–66 (1997)
Brayton, R.K.: On the asymptotic behavior of the number of trials necessary to complete a set with random selection. J. Math. Anal. Appl. 7(1), 31–61 (1963)
Brown, M., Peköz, E.A., Ross, S.M.: Coupon collecting. Probab. Eng. Inf. Sci. 22(2), 221–229 (2008)
Brown, M., Ross, S.M.: Optimality results for coupon collection. J. Appl. Probab. 53(3), 930–937 (2016)
Brunskill, E., Li, L.: The online coupon-collector problem and its application to lifelong reinforcement learning. arXiv preprint arXiv:1506.03379 (2015)
Doumas, A.V., Papanicolaou, V.G.: The siblings of the coupon collector. Theory Probab. Appl. 62(3), 444–470 (2018)
Erdős, P., Rényi, A.: On a classical problem of probability theory. Publ. Math. Inst. Hung. Acad. Sci. Ser. A 6, 215–220 (1961)
Feller, W.: An Introduction to Probability Theory and Its Applications, vol. 1, 3rd edn. Wiley, New York, London, Sydney (1968)
Flajolet, P., Gardy, D., Thimonier, L.: Birthday paradox, coupon collectors, caching algorithms and self-organizing search. Discret. Appl. Math. 39(3), 207–229 (1992)
Flatto, L.: The Dixie Cup Problem and FKG inequality. High Frequency 2(3–4), 1–6 (2019)
Foata, D., Zeilberger, D.: The collector’s brotherhood problem using the Newman-Shepp symbolic method. Algebra Universalis 49(4), 387–395 (2003)
Gumbel, E.J.: Statistical Theory of Extreme Values and Some Practical Applications. A Series of Lectures. National Bureau of Standards Applied Mathematics Series No. 33, U. S. Government Printing Office, Washington, D. C. (1954), viii+51
Holst, L.: On birthday, collectors’, occupancy and other classical urn problems. Int. Stat. Rev. 54, 15–27 (1986)
Ilienko, A.: Limit theorems in the extended coupon collector’s problem. arXiv preprint arXiv:2002.00650 (2020)
Laplace, P.S.: Théorie Analytique des Probabilités, vol. 2, p. 1812, Éditions Jacques Gabay, Paris (1995). (Reprint of the 1820 third edition)
Li, A., Chen, Y.: Convergence of coupon collecting process via Wormald’s differential equation method. arXiv preprint arXiv:1912.02582 (2019)
Loukas, S., Kemp, C.D.: The computer generation of bivariate binomial and negative binomial random variables. Commun. Stat. Simul. Comput. 15(1), 15–25 (1986)
Maunsell, F.G.: A problem in cartophily. Math. Gaz. 22(251), 328–331 (1938)
de Moivre, A.: The Doctrine of Chances. 1756, Republished 1967 by Chelsea, New York (1967)
Newman, D.J., Shepp, L.: The double Dixie Cup Problem. Am. Math. Mon. 67(1), 58–61 (1960)
Pinheiro, E.C., Ferrari, S.L.P.: A comparative review of generalizations of the Gumbel extreme value distribution with an application to wind speed data. J. Stat. Comput. Simul. 86(11), 2241–2261 (2016)
Raab, M., Steger, A.: “Balls into Bins’’ — a simple and tight analysis. In: Luby, M., Rolim, J.D.P., Serna, M. (eds.) RANDOM 1998. LNCS, vol. 1518, pp. 159–170. Springer, Heidelberg (1998). https://doi.org/10.1007/3-540-49543-6_13
Ross, S.M.: Introduction to Probability Models, 10th edn. Academic Press, Oxford (2009)
Sairam, A.S., Saurabh, S.: A more accurate completion condition for attack-graph reconstruction in probabilistic packet marking algorithm. In: 2013 National Conference on Communications (NCC), pp. 1–5. IEEE (2013)
Sairam, A.S., Saurabh, S.: Increasing accuracy and reliability of IP traceback for DDoS attack using completion condition. Int. J. Netw. Secur. 18(2), 224–234 (2016)
Sasaki, Yu., Li, Y., Sakamoto, H., Sakiyama, K.: Coupon collector’s problem for fault analysis against AES—high tolerance for noisy fault injections. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 213–220. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39884-1_18
Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Practical network support for IP traceback. In: Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp. 295–306 (2000)
von Schelling, H.: Auf Der Spur Des Zufalls. Deutsches Statistisches Zentralblatt 26, 137–146 (1934)
von Schelling, H.: Coupon collecting for unequal probabilities. Am. Math. Mon. 61, 306–311 (1954)
Zhou, M.G., et al.: Experimental quantum advantage with quantum coupon collector. arXiv preprint arXiv:2112.07884 (2021)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Switzerland AG
About this paper
Cite this paper
Barak-Pelleg, D., Berend, D. (2022). Simulating a Coupon Collector. In: Dolev, S., Katz, J., Meisels, A. (eds) Cyber Security, Cryptology, and Machine Learning. CSCML 2022. Lecture Notes in Computer Science, vol 13301. Springer, Cham. https://doi.org/10.1007/978-3-031-07689-3_5
Download citation
DOI: https://doi.org/10.1007/978-3-031-07689-3_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-07688-6
Online ISBN: 978-3-031-07689-3
eBook Packages: Computer ScienceComputer Science (R0)