
proceeds in the second phase, and the tracer’s objective is to identify infected nodes efficiently so as to
maximize a total “benefit”. In contrast, this paper studies concurrent infection and tracing processes, where
the tracer’s objective is to contain the spread of the infection.
Armbruster and Brandeau also study contact tracing under resource constraints in [1,2]. In their model there
are fixed resources to allocate across the two interventions, contact tracing and surveillance testing. The
primary goal is to find the optimal allocation of resources so as to provide the best health outcomes for the
population. They evaluate a few simple policies for prioritizing contacts in [2], and choose the policy that
results in the lowest prevalence of infection for their main analysis in [1]. However, their main focus is on
determining the best allocation of resources across these two systems. In comparison, our work focuses on
analyzing and measuring the performance of different prioritization policies across a wide range of infection
parameters. Finally, in a somewhat different context, Ben-Eliezer, Mossel, and Sudan study a mathematical
model of information spreading on a network with errors in communication and investigate approaches for
error correction [4].
The model.
To address our questions, we need to be able to define trade-offs between the tracer’s policy
for querying individuals and factors such as an individual’s rate of meeting new contacts and the probability
that they transmit the infection to a contact. To do this, we develop a simple model of contact tracing on a
tree, which involves concurrent infection and tracing processes.
First we describe the infection process uninhibited by any tracing. Each individual is represented as a node
with a binary infection status. A node
v
is governed by two parameters: the probability
qv
that it meets a
new contact and the probability
pv
that it transmits the infection to a contact. These parameters are sampled
independently for each node, with
pv∼Dp
and
qv∼Dq
. We will discuss more about these distributions later
on, but the problem is still interesting even when both distributions take just a single fixed value. Initially
all nodes are uninfected. In round
t
= 0 a node
r
becomes infected with a probability drawn from
Dp
. In
each round
t >
0, each node
v
meets a new contact
u
with probability
qv
. If
v
is infected, it infects
u
with
probability
pv
. This process generates a tree, where
r
is the root, the nodes in the first layer are
r
’s contacts,
the nodes in the second layer are contacts of those contacts, and so on. If a node
v
joins the tree in round
t
,
its time-of-arrival is τv=t.
In order to define the tracing process, we assign each node a second binary status, indicating whether it is
active or stable. A node that is active probabilistically generates new contacts at each round, as defined by
the infection process. A node that is stable no longer generates new contacts and therefore cannot further
spread the infection. Initially, every node is active.
Contact tracing starts once the infection is already underway, at time
t
=
k
, when the tracer identifies a root
r
as an index case. From then on the tracer selects one node to query at each step. Note that, while the
tracer only queries one node at each step, we can change the rate of tracing relative to the infection process
by changing the contact probability
q
. Increasing
q
causes the infection to spread more quickly thereby
decreasing the relative rate of tracing, and decreasing
q
causes the infection to spread more slowly, thereby
increasing the relative rate of tracing. Querying a node reveals its infection status, and if a node is infected,
two events occur: (1) the node is stabilized and (2) the node’s children (ie contacts) are revealed. Thus
querying an infected node has two benefits: it prevents further infections and reveals individuals exposed to
infection.
1
At step
t
=
k
the only node the tracer may query is the root
r
. From then on the tracer may only
query a node if its parent is an infected node queried on an earlier step.
We now describe the concurrent infection and tracing processes. We say that an instance of the contact
tracing problem is defined by the three parameters
Dp
,
Dq
, and
k
. The process begins at step
t
= 0 when the
root
r
becomes infected with a probability drawn from
Dp
. The infection process runs uninhibited for steps
0
≤t < k
. During each step
t≥k
, first the tracer queries a node and then a single round of the infection
process runs. During the infection round only active nodes generate new contacts. The infection is contained
if the tracer stabilizes all infected nodes.
1If an individual is found to be uninfected, they do not need to be stabilized, since they cannot infect any contacts.
2