HEPGAME: Physics, Artificial Intelligence, and the Simplification of Expressions
|
|
- Ethelbert Reeves
- 5 years ago
- Views:
Transcription
1 HEPGAME: Physics, Artificial Intelligence, and the Simplification of Expressions Aske Plaat LIACS/LCDS Leiden University December 17, 2014 based on [Ruijl, Vermaseren, Plaat, Van den Herik] presented at ICAART 2014 This work is supported in part by ERC Advanced Grant no , HEPGAME awarded on for the period 1 July 2013 to 1 July 2018
2 Overview Overview ERC Team CERN HEPGAME Expressions HEPGAME Horner s rule (refresher) (Go) SA-
3 ERC Team Overview ERC Team CERN HEPGAME Expressions Jos Vermaseren Mathias Ritzman Takahiro Ueda Franz Herzog Ben Ruijl Ali Mirsoleimani Aske Plaat Jaap van den Herik
4 CERN Overview ERC Team CERN HEPGAME Expressions
5 4July2012 Overview ERC Team CERN HEPGAME Expressions
6 Champagne at Nikhef Overview ERC Team CERN HEPGAME Expressions
7 HEPGAME Overview ERC Team CERN HEPGAME Expressions Goal HEPGAME is about solving very large expressions in High Energy Physics using combinatorial methods from Artificial Intelligence.
8 Example of a short expression Overview ERC Team CERN HEPGAME Expressions +32o 3 n 2 m + 32o 3 n 2 l 48o 3 n 2 km 48o 3 n 2 kl + 32o 4 j 2 m + 32o 4 j 2 l + 64o 4 ijm 128o 4 ijh + 64o 4 ijl + 64o 4 i 2 m 128o 4 i 2 h + 64o 4 i 2 l 128o 4 gjh + 64o 4 gim 128o 4 gih + 64o 4 gil + 32o 4 g 2 m + 32o 4 g 2 l 64o 4 km 64o 4 kl +32o 4 kjm + 32o 4 kjl 32o 4 kj 2 m 32o 4 kj 2 l + 64o 4 kim 192o 4 kih + 64o 4 kil 64o 4 kijm + 128o 4 kijh 64o 4 kijl 64o 4 ki 2 m + 128o 4 ki 2 h 64o 4 ki 2 l + 96o 4 kgm 192o 4 kgh + 96o 4 kgl + 128o 4 kgjh 64o 4 kgim + 128o 4 kgih 64o 4 kgil 32o 4 kg 2 m 32o 4 kg 2 l + 64o 4 k 2 m + 64o 4 k 2 l 64o 4 k 2 jm 64o 4 k 2 jl 64o 4 k 2 im 64o 4 k 2 il 64o 4 k 2 gm 64o 4 k 2 gl 32o 4 k 3 m 32o 4 k 3 l + 48fo 2 n 2 m + 32fo 2 n 2 h + 48fo 2 n 2 l 48fo 2 n 2 jm + 64fo 2 n 2 jh 48n 3 h 2 48fo 2 n 2 jl 96fo 2 n 2 im 96fo 2 n 2 il 64fo 2 n 2 gh 48fo 2 n 2 km 48fo 2 n 2 kl + 256fo 3 jh + 32fo 3 j 2 m 128fo 3 j 2 h + 32fo 3 j 2 l 32fo 3 j 3 m 32fo 3 j 3 l 64fo 3 im + 256fo 3 ih 64fo 3 il + 128fo 3 ijm 448fo 3 ijh +128fo 3 ijl 128fo 3 ij 2 m + 64fo 3 ij 2 h 128fo 3 ij 2 l + 192fo 3 i 2 m 384fo 3 i 2 h + 192fo 3 i 2 l 192fo 3 i 2 jm +256fo 3 i 2 jh 192fo 3 i 2 jl 128fo 3 i 3 m + 128fo 3 i 3 h 128fo 3 i 3 l + 64fo 3 gm + 64fo 3 gl 448fo 3 gjh +64fo 3 gj 2 h + 192fo 3 gim 576fo 3 gih + 192fo 3 gil 64fo 3 gijm + 384fo 3 gijh 64fo 3 gijl 128fo 3 gi 2 m +128fo 3 gi 2 h 128fo 3 gi 2 l + 32fo 3 g 2 m 64fo 3 g 2 h + 32fo 3 g 2 l 32fo 3 g 2 jm + 128fo 3 g 2 jh 32fo 3 g 2 jl 64fo 3 g 2 im 64fo 3 g 2 ih 64fo 3 g 2 il 64fo 3 g 3 h 64fo 3 km + 128fo 3 kh 64fo 3 kl + 32fo 3 kjm 448fo 3 kjh +32fo 3 kjl 96fo 3 kj 2 m + 256fo 3 kj 2 h 96fo 3 kj 2 l + 128f 2 o 2 i 2 m 384f 2 o 2 i 2 h + 128f 2 o 2 i 2 l 384f 2 o 2 i 2 jm
9 Why optimize? Why optimize? Horner schemes Common subexpression elimination Optimization is important: Expressions will be evaluated many times in numerical integration This may take weeks! Reducing the number of operations may save many days
10 Horner schemes Why optimize? Horner schemes Common subexpression elimination Say we have x 3 y 2 + x 2 y + x 3 z x x x y y + x x y + x x x z 9 Horner scheme: x 2 (y + x(y 2 + z)) x x (y + x (y y + z)) 4 Other possibility: x 3 z + y(x 2 (1 + xy)) x x x z + y (x x (1 + x y)) 7 Optimal order problem is NP-hard
11 Horner schemes Why optimize? Horner schemes Common subexpression elimination Say we have x 3 y 2 + x 2 y + x 3 z x x x y y + x x y + x x x z 9 Horner scheme: x 2 (y + x(y 2 + z)) x x (y + x (y y + z)) 4 Other possibility: x 3 z + y(x 2 (1 + xy)) x x x z + y (x x (1 + x y)) 7 Optimal order problem is NP-hard
12 Horner schemes Why optimize? Horner schemes Common subexpression elimination Say we have x 3 y 2 + x 2 y + x 3 z x x x y y + x x y + x x x z 9 Horner scheme: x 2 (y + x(y 2 + z)) x x (y + x (y y + z)) 4 Other possibility: x 3 z + y(x 2 (1 + xy)) x x x z + y (x x (1 + x y)) 7 Optimal order problem is NP-hard
13 Horner schemes Why optimize? Horner schemes Common subexpression elimination Say we have x 3 y 2 + x 2 y + x 3 z x x x y y + x x y + x x x z 9 Horner scheme: x 2 (y + x(y 2 + z)) x x (y + x (y y + z)) 4 Other possibility: x 3 z + y(x 2 (1 + xy)) x x x z + y (x x (1 + x y)) 7 Optimal order problem is NP-hard
14 Why optimize? Horner schemes Common subexpression elimination Common SubExpression Elimination (CSEE) Find most common subexpressions and build a replacement tree b (a + e) is found CSEE reduces both and + + b + b c + a e a e
15 Games, Minimax, Chess Selection Expansion Simulation Backpropagation UCT The power resides in - minimax plus enhancements, i.e., evaluation in each node of the tree is possible
16 Chess Minimax Tree Selection Expansion Simulation Backpropagation UCT Size: O(10 46 ) 1. Search 2. Since the tree is too large we need heuristic evaluation
17 Selection Expansion Simulation Backpropagation UCT Monte Carlo Tree Search () Successes with Go inspired us to apply to Horner schemes
18 Selection Expansion Simulation Backpropagation UCT
19 Selection Expansion Simulation Backpropagation UCT Monte Carlo Tree Search () Successes with Go inspired us to apply to Horner schemes Build a state tree selectively Each node is a variable Idea Use to find near optimal Horner scheme, which reduces the number of operations the most
20 Selection Selection Expansion Simulation Backpropagation UCT x z w
21 Expansion Selection Expansion Simulation Backpropagation UCT x z w y
22 Simulation/Playout Selection Expansion Simulation Backpropagation UCT x z w y Random scheme Number of operations after Horner + CSEE
23 Backpropagation Selection Expansion Simulation Backpropagation UCT
24 Selection Expansion Simulation Backpropagation UCT Upper confidence bounds applied to trees (UCT) UCT best child: argmax children c of s Û x(c) 2lnn(s) n(c) + 2C p n(c) x(c) is score of c n(s) visits at s C p is exploration-exploitation constant
25 The problems with UCT Selection Expansion Simulation Backpropagation UCT Tuning C p is expensive Exploration is mostly done at the top of the tree The final iterations are wasted on exploration Idea Spend first iterations exploring, but start exploiting later on. Let C p decrease with iteration number i.
26 SA-UCT Selection Expansion Simulation Backpropagation UCT Inspiration from Physics: Simulated Annealing Introduce parameter: T = C p N i N (1) N: total number of updates i: currentupdatenumber C p : exploration-exploitation constant at i = 0
27 SA-UCT Selection Expansion Simulation Backpropagation UCT SA-UCT: argmax children c of s Û x(c) 2lnn(s) n(c) + 2 T n(c) Role of T similar to temperature in Simulated Annealing
28 Sensitivity analysis Sensitivity analysis Two parameters: N: number of tree updates C p :foruct C p = T (0): forsa-uct Question How does behave when we vary N and C p?
29 Sensitivity analysis Left: too much exploitation (local minima) Right: too much exploration (di usion) Middle: just right Number of operations Number of operations C p C p (a) UCT (b) SA-UCT Figure : Expression HEP( ) at N = 300
30 Sensitivity analysis Number of operations Number of operations C p C p (a) UCT (b) SA-UCT Figure : Expression HEP( ) at N = 1000
31 Sensitivity analysis Number of operations Number of operations C p C p (a) UCT (b) SA-UCT Figure : Expression HEP( ) at N = 3000
32 Future work The end SA-UCT SA-UCT widens the region for C p for which good results are obtained (in the above example: 10 times larger) With larger N results are more pronounced
33 Our results compared Future work The end For res(6,7) polynomial with 587,880 operations: Early experiments using frequency occurrence + CSE: 8 times fewer operations Mathematica and Maple: optimization is di Haggies: 6 times fewer operations : 16 times fewer operations Practical use Numerical integration will be 16 times faster cult to measure
34 Future work Future work The end Gauging the C p parameter automatically Exploit domain specific knowledge Apply to more general expressions with tensors Future plans We are looking for large expressions from various fields!
35 Future work The end Thank you for your attention
The HEPGAME project. J.A.M. Vermaseren Nikhef in collaboration with J. Kuipers (Nikhef/Google), J. van den Herik and A. Plaat (Tilburg University)
The HEPGAME project J.A.M. Vermaseren Nikhef in collaboration with J. Kuipers (Nikhef/Google), J. van den Herik and A. Plaat (Tilburg University) Introduction Particle Physics FORM Recursion Relations
More informationGame playing. Chapter 6. Chapter 6 1
Game playing Chapter 6 Chapter 6 1 Outline Minimax α β pruning UCT for games Chapter 6 2 Game tree (2-player, deterministic, turns) Chapter 6 3 Minimax Perfect play for deterministic, perfect-information
More informationProperties of Forward Pruning in Game-Tree Search
Properties of Forward Pruning in Game-Tree Search Yew Jin Lim and Wee Sun Lee School of Computing National University of Singapore {limyewji,leews}@comp.nus.edu.sg Abstract Forward pruning, or selectively
More informationScout and NegaScout. Tsan-sheng Hsu.
Scout and NegaScout Tsan-sheng Hsu tshsu@iis.sinica.edu.tw http://www.iis.sinica.edu.tw/~tshsu 1 Abstract It looks like alpha-beta pruning is the best we can do for an exact generic searching procedure.
More informationMarks. bonus points. } Assignment 1: Should be out this weekend. } Mid-term: Before the last lecture. } Mid-term deferred exam:
Marks } Assignment 1: Should be out this weekend } All are marked, I m trying to tally them and perhaps add bonus points } Mid-term: Before the last lecture } Mid-term deferred exam: } This Saturday, 9am-10.30am,
More informationRollout-based Game-tree Search Outprunes Traditional Alpha-beta
Journal of Machine Learning Research vol:1 8, 2012 Submitted 6/2012 Rollout-based Game-tree Search Outprunes Traditional Alpha-beta Ari Weinstein Michael L. Littman Sergiu Goschin aweinst@cs.rutgers.edu
More informationScout, NegaScout and Proof-Number Search
Scout, NegaScout and Proof-Number Search Tsan-sheng Hsu tshsu@iis.sinica.edu.tw http://www.iis.sinica.edu.tw/~tshsu 1 Introduction It looks like alpha-beta pruning is the best we can do for a generic searching
More informationAlgorithms and Complexity theory
Algorithms and Complexity theory Thibaut Barthelemy Some slides kindly provided by Fabien Tricoire University of Vienna WS 2014 Outline 1 Algorithms Overview How to write an algorithm 2 Complexity theory
More informationPoS(LL2018)061. The HEPGAME project. J.A.M. Vermaseren, Nikhef, Science Park 105, 1098XG, Amsterdam
, Nikhef, Science Park 105, 1098XG, msterdam E-mail: t68@nikhef.nl was funded by an EC advanced grand to study the introduction of I techniques in the evaluation of complicated Feynman diagrams. Its organization
More informationInteger Programming ISE 418. Lecture 8. Dr. Ted Ralphs
Integer Programming ISE 418 Lecture 8 Dr. Ted Ralphs ISE 418 Lecture 8 1 Reading for This Lecture Wolsey Chapter 2 Nemhauser and Wolsey Sections II.3.1, II.3.6, II.4.1, II.4.2, II.5.4 Duality for Mixed-Integer
More informationLearning in Zero-Sum Team Markov Games using Factored Value Functions
Learning in Zero-Sum Team Markov Games using Factored Value Functions Michail G. Lagoudakis Department of Computer Science Duke University Durham, NC 27708 mgl@cs.duke.edu Ronald Parr Department of Computer
More informationFunction approximation
Week 9: Monday, Mar 26 Function approximation A common task in scientific computing is to approximate a function. The approximated function might be available only through tabulated data, or it may be
More informationWho Has Heard of This Problem? Courtesy: Jeremy Kun
P vs. NP 02-201 Who Has Heard of This Problem? Courtesy: Jeremy Kun Runtime Analysis Last time, we saw that there is no solution to the Halting Problem. Halting Problem: Determine if a program will halt.
More informationAnt Colony Optimization: an introduction. Daniel Chivilikhin
Ant Colony Optimization: an introduction Daniel Chivilikhin 03.04.2013 Outline 1. Biological inspiration of ACO 2. Solving NP-hard combinatorial problems 3. The ACO metaheuristic 4. ACO for the Traveling
More informationCITS4211 Mid-semester test 2011
CITS4211 Mid-semester test 2011 Fifty minutes, answer all four questions, total marks 60 Question 1. (12 marks) Briefly describe the principles, operation, and performance issues of iterative deepening.
More informationArtificial Neural Networks. MGS Lecture 2
Artificial Neural Networks MGS 2018 - Lecture 2 OVERVIEW Biological Neural Networks Cell Topology: Input, Output, and Hidden Layers Functional description Cost functions Training ANNs Back-Propagation
More informationMath 253 Homework due Wednesday, March 9 SOLUTIONS
Math 53 Homework due Wednesday, March 9 SOLUTIONS 1. Do Section 8.8, problems 11,, 15, 17 (these problems have to do with Taylor s Inequality, and they are very similar to what we did on the last homework.
More informationCSE 473: Artificial Intelligence Spring 2014
CSE 473: Artificial Intelligence Spring 2014 Hanna Hajishirzi Problem Spaces and Search slides from Dan Klein, Stuart Russell, Andrew Moore, Dan Weld, Pieter Abbeel, Luke Zettelmoyer Outline Agents that
More informationVasil Khalidov & Miles Hansard. C.M. Bishop s PRML: Chapter 5; Neural Networks
C.M. Bishop s PRML: Chapter 5; Neural Networks Introduction The aim is, as before, to find useful decompositions of the target variable; t(x) = y(x, w) + ɛ(x) (3.7) t(x n ) and x n are the observations,
More informationSampling from Bayes Nets
from Bayes Nets http://www.youtube.com/watch?v=mvrtaljp8dm http://www.youtube.com/watch?v=geqip_0vjec Paper reviews Should be useful feedback for the authors A critique of the paper No paper is perfect!
More informationPrinciples of AI Planning
Principles of AI Planning 5. Planning as search: progression and regression Albert-Ludwigs-Universität Freiburg Bernhard Nebel and Robert Mattmüller October 30th, 2013 Introduction Classification Planning
More informationMCMC Simulated Annealing Exercises.
Aula 10. Simulated Annealing. 0 MCMC Simulated Annealing Exercises. Anatoli Iambartsev IME-USP Aula 10. Simulated Annealing. 1 [Wiki] Salesman problem. The travelling salesman problem (TSP), or, in recent
More informationVariable Elimination: Algorithm
Variable Elimination: Algorithm Sargur srihari@cedar.buffalo.edu 1 Topics 1. Types of Inference Algorithms 2. Variable Elimination: the Basic ideas 3. Variable Elimination Sum-Product VE Algorithm Sum-Product
More informationBalancing and Control of a Freely-Swinging Pendulum Using a Model-Free Reinforcement Learning Algorithm
Balancing and Control of a Freely-Swinging Pendulum Using a Model-Free Reinforcement Learning Algorithm Michail G. Lagoudakis Department of Computer Science Duke University Durham, NC 2778 mgl@cs.duke.edu
More informationV C V L T I 0 C V B 1 V T 0 I. l nk
Multifrontal Method Kailai Xu September 16, 2017 Main observation. Consider the LDL T decomposition of a SPD matrix [ ] [ ] [ ] [ ] B V T L 0 I 0 L T L A = = 1 V T V C V L T I 0 C V B 1 V T, 0 I where
More informationPrinciples of AI Planning
Principles of 5. Planning as search: progression and regression Malte Helmert and Bernhard Nebel Albert-Ludwigs-Universität Freiburg May 4th, 2010 Planning as (classical) search Introduction Classification
More informationFacets for the Cardinality Constrained Quadratic Knapsack Problem and the Quadratic Selective Travelling Salesman Problem
Facets for the Cardinality Constrained Quadratic Knapsack Problem and the Quadratic Selective Travelling Salesman Problem Vicky Mak Tommy Thomadsen November 1, 004 Abstract This paper considers the Cardinality
More informationApplying Bayesian networks in the game of Minesweeper
Applying Bayesian networks in the game of Minesweeper Marta Vomlelová Faculty of Mathematics and Physics Charles University in Prague http://kti.mff.cuni.cz/~marta/ Jiří Vomlel Institute of Information
More informationBandit View on Continuous Stochastic Optimization
Bandit View on Continuous Stochastic Optimization Sébastien Bubeck 1 joint work with Rémi Munos 1 & Gilles Stoltz 2 & Csaba Szepesvari 3 1 INRIA Lille, SequeL team 2 CNRS/ENS/HEC 3 University of Alberta
More informationReinforcement Learning and Optimal Control. ASU, CSE 691, Winter 2019
Reinforcement Learning and Optimal Control ASU, CSE 691, Winter 2019 Dimitri P. Bertsekas dimitrib@mit.edu Lecture 8 Bertsekas Reinforcement Learning 1 / 21 Outline 1 Review of Infinite Horizon Problems
More informationVariable Elimination: Algorithm
Variable Elimination: Algorithm Sargur srihari@cedar.buffalo.edu 1 Topics 1. Types of Inference Algorithms 2. Variable Elimination: the Basic ideas 3. Variable Elimination Sum-Product VE Algorithm Sum-Product
More informationCS 4100 // artificial intelligence. Recap/midterm review!
CS 4100 // artificial intelligence instructor: byron wallace Recap/midterm review! Attribution: many of these slides are modified versions of those distributed with the UC Berkeley CS188 materials Thanks
More informationIntegrating Factorization Ranked Features in MCTS: an Experimental Study
Integrating Factorization Ranked Features in MCTS: an Experimental Study Chenjun Xiao and Martin Müller Computing Science, University of Alberta Edmonton, Canada {chenjun,mmueller}@ualberta.ca Abstract.
More informationForcer: a FORM program for 4-loop massless propagators
Forcer: a FORM program for 4-loop massless propagators, a B. Ruijl ab and J.A.M. Vermaseren a a Nikhef Theory Group, Science Park 105, 1098 XG Amsterdam, The Netherlands b Leiden Centre of Data Science,
More informationSensitive Ant Model for Combinatorial Optimization
Sensitive Ant Model for Combinatorial Optimization CAMELIA CHIRA cchira@cs.ubbcluj.ro D. DUMITRESCU ddumitr@cs.ubbcluj.ro CAMELIA-MIHAELA PINTEA cmpintea@cs.ubbcluj.ro Abstract: A combinatorial optimization
More informationPart III: Traveling salesman problems
Transportation Logistics Part III: Traveling salesman problems c R.F. Hartl, S.N. Parragh 1/282 Motivation Motivation Why do we study the TSP? c R.F. Hartl, S.N. Parragh 2/282 Motivation Motivation Why
More informationChapter 30 Design and Analysis of
Chapter 30 Design and Analysis of 2 k DOEs Introduction This chapter describes design alternatives and analysis techniques for conducting a DOE. Tables M1 to M5 in Appendix E can be used to create test
More informationSemi-Markov/Graph Cuts
Semi-Markov/Graph Cuts Alireza Shafaei University of British Columbia August, 2015 1 / 30 A Quick Review For a general chain-structured UGM we have: n n p(x 1, x 2,..., x n ) φ i (x i ) φ i,i 1 (x i, x
More informationComputational Linear Algebra
Computational Linear Algebra PD Dr. rer. nat. habil. Ralf Peter Mundani Computation in Engineering / BGU Scientific Computing in Computer Science / INF Winter Term 2017/18 Part 2: Direct Methods PD Dr.
More informationDeep Reinforcement Learning
Martin Matyášek Artificial Intelligence Center Czech Technical University in Prague October 27, 2016 Martin Matyášek VPD, 2016 1 / 50 Reinforcement Learning in a picture R. S. Sutton and A. G. Barto 2015
More informationImplementation of Travelling Salesman Problem Using ant Colony Optimization
RESEARCH ARTICLE OPEN ACCESS Implementation of Travelling Salesman Problem Using ant Colony Optimization Gaurav Singh, Rashi Mehta, Sonigoswami, Sapna Katiyar* ABES Institute of Technology, NH-24, Vay
More informationNeural Networks Learning the network: Backprop , Fall 2018 Lecture 4
Neural Networks Learning the network: Backprop 11-785, Fall 2018 Lecture 4 1 Recap: The MLP can represent any function The MLP can be constructed to represent anything But how do we construct it? 2 Recap:
More informationMaster Thesis. Enhancements for Real-Time Monte-Carlo Tree Search in General Video Game Playing
Master Thesis Enhancements for Real-Time Monte-Carlo Tree Search in General Video Game Playing Dennis J. N. J. Soemers Master Thesis DKE 16-11 Thesis submitted in partial fulfillment of the requirements
More informationA.1 Appendix on Cartesian tensors
1 Lecture Notes on Fluid Dynamics (1.63J/2.21J) by Chiang C. Mei, February 6, 2007 A.1 Appendix on Cartesian tensors [Ref 1] : H Jeffreys, Cartesian Tensors; [Ref 2] : Y. C. Fung, Foundations of Solid
More informationIntroduction to Fall 2008 Artificial Intelligence Midterm Exam
CS 188 Introduction to Fall 2008 Artificial Intelligence Midterm Exam INSTRUCTIONS You have 80 minutes. 70 points total. Don t panic! The exam is closed book, closed notes except a one-page crib sheet,
More informationCS 188 Introduction to Fall 2007 Artificial Intelligence Midterm
NAME: SID#: Login: Sec: 1 CS 188 Introduction to Fall 2007 Artificial Intelligence Midterm You have 80 minutes. The exam is closed book, closed notes except a one-page crib sheet, basic calculators only.
More informationalgorithms Alpha-Beta Pruning and Althöfer s Pathology-Free Negamax Algorithm Algorithms 2012, 5, ; doi: /a
Algorithms 01, 5, 51-58; doi:10.3390/a504051 Article OPEN ACCESS algorithms ISSN 1999-4893 www.mdpi.com/journal/algorithms Alpha-Beta Pruning and Althöfer s Pathology-Free Negamax Algorithm Ashraf M. Abdelbar
More informationLecture 2: Computing functions of dense matrices
Lecture 2: Computing functions of dense matrices Paola Boito and Federico Poloni Università di Pisa Pisa - Hokkaido - Roma2 Summer School Pisa, August 27 - September 8, 2018 Introduction In this lecture
More informationLecture 8: Complete Problems for Other Complexity Classes
IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 8: Complete Problems for Other Complexity Classes David Mix Barrington and Alexis Maciel
More informationSoftware for Integer and Nonlinear Optimization
Software for Integer and Nonlinear Optimization Sven Leyffer, leyffer@mcs.anl.gov Mathematics & Computer Science Division Argonne National Laboratory Roger Fletcher & Jeff Linderoth Advanced Methods and
More informationBayesian Regression of Piecewise Constant Functions
Marcus Hutter - 1 - Bayesian Regression of Piecewise Constant Functions Bayesian Regression of Piecewise Constant Functions Marcus Hutter Istituto Dalle Molle di Studi sull Intelligenza Artificiale IDSIA,
More informationCOMP3702/7702 Artificial Intelligence Lecture 11: Introduction to Machine Learning and Reinforcement Learning. Hanna Kurniawati
COMP3702/7702 Artificial Intelligence Lecture 11: Introduction to Machine Learning and Reinforcement Learning Hanna Kurniawati Today } What is machine learning? } Where is it used? } Types of machine learning
More informationAnomalous dimensions and splitting functions beyond the next-to-next-to-leading order
Anomalous dimensions and splitting functions beyond the next-to-next-to-leading order Department of Mathematical Sciences, University of Liverpool, Liverpool L69 3BX, UK E-mail: Andreas.Vogt@liverpool.ac.uk
More informationAlpha-Beta Pruning for Games with Simultaneous Moves
Alpha-Beta Pruning for Games with Simultaneous Moves Abdallah Saffidine LAMSADE, Université Paris-Dauphine, 75775 Paris Cedex 6, France Email: abdallahsaffidine@dauphinefr Hilmar Finnsson Reykjavík University,
More informationCalculating four-loop massless propagators with Forcer
Calculating four-loop massless propagators with Forcer Takahiro Ueda Nikhef, The Netherlands Collaboration with: Ben Ruijl and Jos Vermaseren 18 Jan. 2016 ACAT2016, UTFSM, Valparaíso 1 / 30 Contents Introduction
More informationAlpha-Beta Pruning for Games with Simultaneous Moves
Alpha-Beta Pruning for Games with Simultaneous Moves Abdallah Saffidine LAMSADE, Université Paris-Dauphine, 75775 Paris Cedex 6, France Email: abdallahsaffidine@dauphinefr Hilmar Finnsson Reykjavík University,
More informationCS Data Structures and Algorithm Analysis
CS 483 - Data Structures and Algorithm Analysis Lecture VII: Chapter 6, part 2 R. Paul Wiegand George Mason University, Department of Computer Science March 22, 2006 Outline 1 Balanced Trees 2 Heaps &
More informationSolving a Production Scheduling Problem as a Time-Dependent Traveling Salesman Problem
Solving a Production Scheduling Problem as a Time-Dependent Traveling Salesman Problem GABRIELLA STECCO Department of Applied Mathematics, University Ca Foscari of Venice, Dorsoduro n. 3825/E, 30123 Venice,
More informationAI Programming CS F-20 Neural Networks
AI Programming CS662-2008F-20 Neural Networks David Galles Department of Computer Science University of San Francisco 20-0: Symbolic AI Most of this class has been focused on Symbolic AI Focus or symbols
More informationBayes Nets III: Inference
1 Hal Daumé III (me@hal3.name) Bayes Nets III: Inference Hal Daumé III Computer Science University of Maryland me@hal3.name CS 421: Introduction to Artificial Intelligence 10 Apr 2012 Many slides courtesy
More informationCSE 417T: Introduction to Machine Learning. Final Review. Henry Chai 12/4/18
CSE 417T: Introduction to Machine Learning Final Review Henry Chai 12/4/18 Overfitting Overfitting is fitting the training data more than is warranted Fitting noise rather than signal 2 Estimating! "#$
More informationBounded Approximation Algorithms
Bounded Approximation Algorithms Sometimes we can handle NP problems with polynomial time algorithms which are guaranteed to return a solution within some specific bound of the optimal solution within
More informationTable-Based Polynomials for Fast Hardware Function Evaluation
ASAP 05 Table-Based Polynomials for Fast Hardware Function Evaluation Jérémie Detrey Florent de Dinechin Projet Arénaire LIP UMR CNRS ENS Lyon UCB Lyon INRIA 5668 http://www.ens-lyon.fr/lip/arenaire/ CENTRE
More informationCS 188: Artificial Intelligence. Bayes Nets
CS 188: Artificial Intelligence Probabilistic Inference: Enumeration, Variable Elimination, Sampling Pieter Abbeel UC Berkeley Many slides over this course adapted from Dan Klein, Stuart Russell, Andrew
More informationSwarm intelligence: Ant Colony Optimisation
Swarm intelligence: Ant Colony Optimisation S Luz luzs@cs.tcd.ie October 7, 2014 Simulating problem solving? Can simulation be used to improve distributed (agent-based) problem solving algorithms? Yes:
More information( ) ( ) ( ) ( ) Simulated Annealing. Introduction. Pseudotemperature, Free Energy and Entropy. A Short Detour into Statistical Mechanics.
Aims Reference Keywords Plan Simulated Annealing to obtain a mathematical framework for stochastic machines to study simulated annealing Parts of chapter of Haykin, S., Neural Networks: A Comprehensive
More informationFinal Examination. CS 205A: Mathematical Methods for Robotics, Vision, and Graphics (Spring 2016), Stanford University
Final Examination CS 205A: Mathematical Methods for Robotics, Vision, and Graphics (Spring 2016), Stanford University The exam runs for 3 hours. The exam contains seven problems. You must complete the
More informationHill climbing: Simulated annealing and Tabu search
Hill climbing: Simulated annealing and Tabu search Heuristic algorithms Giovanni Righini University of Milan Department of Computer Science (Crema) Hill climbing Instead of repeating local search, it is
More informationArtificial Intelligence Heuristic Search Methods
Artificial Intelligence Heuristic Search Methods Chung-Ang University, Jaesung Lee The original version of this content is created by School of Mathematics, University of Birmingham professor Sandor Zoltan
More informationIntroduction to data-flow analysis. Data-flow analysis. Control-flow graphs. Data-flow analysis. Example: liveness. Requirements
Data-flow analysis Michel Schinz based on material by Erik Stenman and Michael Schwartzbach Introduction to data-flow analysis Data-flow analysis Example: liveness Data-flow analysis is a global analysis
More informationArtificial Intelligence
Artificial Intelligence Dynamic Programming Marc Toussaint University of Stuttgart Winter 2018/19 Motivation: So far we focussed on tree search-like solvers for decision problems. There is a second important
More informationBayesian networks in Mastermind
Bayesian networks in Mastermind Jiří Vomlel http://www.utia.cas.cz/vomlel/ Laboratory for Intelligent Systems Inst. of Inf. Theory and Automation University of Economics Academy of Sciences Ekonomická
More informationFast reversion of formal power series
Fast reversion of formal power series Fredrik Johansson LFANT, INRIA Bordeaux RAIM, 2016-06-29, Banyuls-sur-mer 1 / 30 Reversion of power series F = exp(x) 1 = x + x 2 2! + x 3 3! + x 4 G = log(1 + x)
More informationReconstructing Chemical Reaction Networks by Solving Boolean Polynomial Systems
Reconstructing Chemical Reaction Networks by Solving Boolean Polynomial Systems Chenqi Mou Wei Niu LMIB-School of Mathematics École Centrale Pékin and Systems Science Beihang University, Beijing 100191,
More informationAnnouncements. CS 188: Artificial Intelligence Fall Causality? Example: Traffic. Topology Limits Distributions. Example: Reverse Traffic
CS 188: Artificial Intelligence Fall 2008 Lecture 16: Bayes Nets III 10/23/2008 Announcements Midterms graded, up on glookup, back Tuesday W4 also graded, back in sections / box Past homeworks in return
More informationACO Comprehensive Exam October 14 and 15, 2013
1. Computability, Complexity and Algorithms (a) Let G be the complete graph on n vertices, and let c : V (G) V (G) [0, ) be a symmetric cost function. Consider the following closest point heuristic for
More information2 Notation and Preliminaries
On Asymmetric TSP: Transformation to Symmetric TSP and Performance Bound Ratnesh Kumar Haomin Li epartment of Electrical Engineering University of Kentucky Lexington, KY 40506-0046 Abstract We show that
More informationThe P versus NP Problem. Ker-I Ko. Stony Brook, New York
The P versus NP Problem Ker-I Ko Stony Brook, New York ? P = NP One of the seven Millenium Problems The youngest one A folklore question? Has hundreds of equivalent forms Informal Definitions P : Computational
More informationCS 188: Artificial Intelligence
CS 188: Artificial Intelligence Adversarial Search II Instructor: Anca Dragan University of California, Berkeley [These slides adapted from Dan Klein and Pieter Abbeel] Minimax Example 3 12 8 2 4 6 14
More informationApplication of Optimization Methods and Edge AI
and Hai-Liang Zhao hliangzhao97@gmail.com November 17, 2018 This slide can be downloaded at Link. Outline 1 How to Design Novel Models with Methods Embedded Naturally? Outline 1 How to Design Novel Models
More informationFast Probability Generating Function Method for Stochastic Chemical Reaction Networks
MATCH Communications in Mathematical and in Computer Chemistry MATCH Commun. Math. Comput. Chem. 71 (2014) 57-69 ISSN 0340-6253 Fast Probability Generating Function Method for Stochastic Chemical Reaction
More informationGame Theory and its Applications to Networks - Part I: Strict Competition
Game Theory and its Applications to Networks - Part I: Strict Competition Corinne Touati Master ENS Lyon, Fall 200 What is Game Theory and what is it for? Definition (Roger Myerson, Game Theory, Analysis
More informationExistence of Nash Networks in One-Way Flow Models
Existence of Nash Networks in One-Way Flow Models pascal billand a, christophe bravard a, sudipta sarangi b a CREUSET, Jean Monnet University, Saint-Etienne, France. email: pascal.billand@univ-st-etienne.fr
More informationSymmetry Breaking Ordering Constraints
Symmetry Breaking Ordering Constraints PhD dissertation Uppsala University, Sweden, March 2004 Zeynep KIZILTAN Università di Bologna, Italy URL: http://lia.deis.unibo.it/~zk/ Overview Brief Background
More informationSingle Solution-based Metaheuristics
Parallel Cooperative Optimization Research Group Single Solution-based Metaheuristics E-G. Talbi Laboratoire d Informatique Fondamentale de Lille Single solution-based metaheuristics Improvement of a solution.
More informationA Decentralized Approach to Multi-agent Planning in the Presence of Constraints and Uncertainty
2011 IEEE International Conference on Robotics and Automation Shanghai International Conference Center May 9-13, 2011, Shanghai, China A Decentralized Approach to Multi-agent Planning in the Presence of
More informationLecture 9: PGM Learning
13 Oct 2014 Intro. to Stats. Machine Learning COMP SCI 4401/7401 Table of Contents I Learning parameters in MRFs 1 Learning parameters in MRFs Inference and Learning Given parameters (of potentials) and
More information16.21 Techniques of Structural Analysis and Design Spring 2003 Unit #5 - Constitutive Equations
6.2 Techniques of Structural Analysis and Design Spring 2003 Unit #5 - Constitutive quations Constitutive quations For elastic materials: If the relation is linear: Û σ ij = σ ij (ɛ) = ρ () ɛ ij σ ij =
More informationMathematical Approaches to the Pure Parsimony Problem
Mathematical Approaches to the Pure Parsimony Problem P. Blain a,, A. Holder b,, J. Silva c, and C. Vinzant d, July 29, 2005 Abstract Given the genetic information of a population, the Pure Parsimony problem
More informationWeek 4. (1) 0 f ij u ij.
Week 4 1 Network Flow Chapter 7 of the book is about optimisation problems on networks. Section 7.1 gives a quick introduction to the definitions of graph theory. In fact I hope these are already known
More informationNeural Networks: Backpropagation
Neural Networks: Backpropagation Machine Learning Fall 2017 Based on slides and material from Geoffrey Hinton, Richard Socher, Dan Roth, Yoav Goldberg, Shai Shalev-Shwartz and Shai Ben-David, and others
More informationLecture 8: PGM Inference
15 September 2014 Intro. to Stats. Machine Learning COMP SCI 4401/7401 Table of Contents I 1 Variable elimination Max-product Sum-product 2 LP Relaxations QP Relaxations 3 Marginal and MAP X1 X2 X3 X4
More informationON THE LOCAL VERSION OF THE CHERN CONJECTURE: CMC HYPERSURFACES WITH CONSTANT SCALAR CURVATURE IN S n+1
Kragujevac Journal of Mathematics Volume 441 00, Pages 101 111. ON THE LOCAL VERSION OF THE CHERN CONJECTURE: CMC HYPERSURFACES WITH CONSTANT SCALAR CURVATURE IN S n+1 S. C. DE ALMEIDA 1, F. G. B. BRITO,
More informationAdvanced statistical methods for data analysis Lecture 2
Advanced statistical methods for data analysis Lecture 2 RHUL Physics www.pp.rhul.ac.uk/~cowan Universität Mainz Klausurtagung des GK Eichtheorien exp. Tests... Bullay/Mosel 15 17 September, 2008 1 Outline
More informationReinforcement Learning
Reinforcement Learning Model-Based Reinforcement Learning Model-based, PAC-MDP, sample complexity, exploration/exploitation, RMAX, E3, Bayes-optimal, Bayesian RL, model learning Vien Ngo MLR, University
More informationSelf-Tuning Spectral Clustering
Self-Tuning Spectral Clustering Lihi Zelnik-Manor Pietro Perona Department of Electrical Engineering Department of Electrical Engineering California Institute of Technology California Institute of Technology
More information8: Splay Trees. Move-to-Front Heuristic. Splaying. Splay(12) CSE326 Spring April 16, Search for Pebbles: Move found item to front of list
: Splay Trees SE Spring 00 pril, 00 Move-to-Front Heuristic Search for ebbles: Fred Wilma ebbles ino Fred Wilma ino ebbles Move found item to front of list Frequently searched items will move to start
More informationChapter 1. Introduction
Chapter 1 Introduction Symbolical artificial intelligence is a field of computer science that is highly related to quantum computation. At first glance, this statement appears to be a contradiction. However,
More informationData Warehousing & Data Mining
13. Meta-Algorithms for Classification Data Warehousing & Data Mining Wolf-Tilo Balke Silviu Homoceanu Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 13.
More informationAnnouncements. Inference. Mid-term. Inference by Enumeration. Reminder: Alarm Network. Introduction to Artificial Intelligence. V22.
Introduction to Artificial Intelligence V22.0472-001 Fall 2009 Lecture 15: Bayes Nets 3 Midterms graded Assignment 2 graded Announcements Rob Fergus Dept of Computer Science, Courant Institute, NYU Slides
More information