The Cut-Norm and Combinatorial Optimization. Alan Frieze and Ravi Kannan
|
|
- Jayson Davidson
- 5 years ago
- Views:
Transcription
1 The Cut-Norm and Combinatorial Optimization Alan Frieze and Ravi Kannan
2 Outline of the Talk The Cut-Norm and a Matrix Decomposition. Max-Cut given the Matrix Decomposition. Quadratic Assignment given the Matrix Decomposition. Constructing Matrix Decomposition via the Grothendieck Identity Alon and Naor Multi-Dimensional Matrices
3 The cut-norm of the R C matrix A is defined to be A = max A(S, T). S R T C
4 The cut-norm of the R C matrix A is defined to be A = max A(S, T). S R T C Relation to regularity: D is an R C matrix with D(i, j) = d. W is an R C matrix with W ǫ R C. A = D + W. A(S, T) d S T ǫ R C.
5 Cut Matrices Given S R, T C and real value d: R C Cut Matrix C = CUT(S, T, d): { d if (i, j) S T, C(i, j) = 0 otherwise. d d d d 0 0 d d d d
6 D (t) = CUT(R t, C t, d t ). Matrix Decomposition A = D (1) + D (2) + + D (s) + W.
7 D (t) = CUT(R t, C t, d t ). Matrix Decomposition A = D (1) + D (2) + + D (s) + W. We want s, max t { d t } and W to be small.
8 D (t) = CUT(R t, C t, d t ). Matrix Decomposition A = D (1) + D (2) + + D (s) + W. We want s, max t { d t } and W to be small. W ǫmn m = R, n = C max{ d t } t is achievable. s = O(1/ǫ 2 ) = O(1)
9 Let A F = i,j A(i, j) 2 1/2 be the Frobenius Norm of A.
10 Assume inductively that we have found cut matrices D (j) = CUT(R j, C j, d j ), such that W (t) = A (D (1) + D (2) + + D (t) ) satisfies W (t) 2 F (1 ǫ2 t) A 2 F.
11 Assume inductively that we have found cut matrices D (j) = CUT(R j, C j, d j ), such that W (t) = A (D (1) + D (2) + + D (t) ) satisfies W (t) 2 F (1 ǫ2 t) A 2 F. Suppose there exist S R, T C such that W (t) (S, T) ǫ mn A F. Let R t+1 = S, C t+1 = T, d t+1 = W(t) (S, T). S T
12 W (t+1) 2 F W(t) 2 F = W(t) D (t+1) 2 F W(t) 2 F = ((W (t) (i, j) d t+1 ) 2 W (t) (i, j) 2 ) = i R t+1 j C t+1 R t+1 C t+1 d 2 t+1 = W(t) (R t+1, C t+1 ) 2 R t+1 C t+1 ǫ 2 A 2 F.
13 W (t+1) 2 F W(t) 2 F = W(t) D (t+1) 2 F W(t) 2 F = ((W (t) (i, j) d t+1 ) 2 W (t) (i, j) 2 ) = i R t+1 j C t+1 R t+1 C t+1 d 2 t+1 = W(t) (R t+1, C t+1 ) 2 R t+1 C t+1 ǫ 2 A 2 F. Conclusion: D (1),...,D (s), s ǫ 2 such that. W (s) ǫ mn A F
14 Refinements Suppose that we can only compute R t+1, C t+1 such that W (t) (R t+1, C t+1 ) ρ W (t) where ρ 1.
15 Refinements Suppose that we can only compute R t+1, C t+1 such that W (t) (R t+1, C t+1 ) ρ W (t) where ρ 1. Conclusion: We can compute D (1),..., D (s), s ρ 2 ǫ 2 such that W (s) ǫ mn A F.
16 Suppose that W (t) ǫ mn A F and we have computed R t+1, C t+1 such that W (t) (R, C t+1 ) ρǫ mn A F.
17 Suppose that W (t) ǫ mn A F and we have computed R t+1, C t+1 such that W (t) (R, C t+1 ) ρǫ mn A F. If R t+1 < m/2 then either (i) W (t) (R, C t+1 ) 1 2 ρǫ mn A F or (ii) W (t) (R \ R t+1, C t+1 ) 1 2 ρǫ mn A F
18 Suppose that W (t) ǫ mn A F and we have computed R t+1, C t+1 such that W (t) (R, C t+1 ) ρǫ mn A F. If R t+1 < m/2 then either (i) W (t) (R, C t+1 ) 1 2 ρǫ mn A F or (ii) W (t) (R \ R t+1, C t+1 ) 1 2 ρǫ mn A F Conclusion: We can compute D (1),..., D (s), s 4ρ 2 ǫ 2 such that W (s) ǫ mn A F and such that R i m/2 and C i n/2.
19 Suppose that W (t) ǫ mn A F and we have computed R t+1, C t+1 such that W (t) (R, C t+1 ) ρǫ mn A F. If R t+1 < m/2 then either (i) W (t) (R, C t+1 ) 1 2 ρǫ mn A F or (ii) W (t) (R \ R t+1, C t+1 ) 1 2 ρǫ mn A F Conclusion: We can compute D (1),..., D (s), s 4ρ 2 ǫ 2 such that W (s) ǫ mn A F and such that R i m/2 and C i n/2. Then s s R t C t dt 2 A 2 F = dt 2 4 A. t=1 t=1
20 MAX-CUT
21 G = (V, E) is a graph with n n adjacency A and A = D (1) + D (2) + + D (s) + W. D (t) = CUT(R t, C t, d t ), d t 2, s = O(1/ǫ 2 ) and W ǫn 2
22 G = (V, E) is a graph with n n adjacency A and A = D (1) + D (2) + + D (s) + W. D (t) = CUT(R t, C t, d t ), d t 2, s = O(1/ǫ 2 ) and W ǫn 2 If (S, S) is a cut in G then the weight of this cut satisfies A(S, S) (D (1) + D (2) + + D (s) )(S, S) ǫn 2.
23 G = (V, E) is a graph with n n adjacency A and A = D (1) + D (2) + + D (s) + W. D (t) = CUT(R t, C t, d t ), d t 2, s = O(1/ǫ 2 ) and W ǫn 2 If (S, S) is a cut in G then the weight of this cut satisfies A(S, S) (D (1) + D (2) + + D (s) )(S, S) ǫn 2. where s D (t) (S, S) s = d t f t g t t=1 t=1 f t = S R t and g t = S C t
24 So we look for S to (approximately) minimize s t=1 d tf t g t.
25 So we look for S to (approximately) minimize s t=1 d tf t g t. Let ν = ǫn and ft ft = ν, ḡ t = ν gt ν ν Then s f t g t d t f t ḡ t d t 6νns 6ǫn 2. t=1
26 So we look for S to (approximately) minimize s t=1 d tf t g t. Let ν = ǫn and ft ft = ν, ḡ t = ν gt ν ν Then s f t g t d t f t ḡ t d t 6νns 6ǫn 2. t=1 So we can look for S to (approximately) minimize s t=1 d t f t ḡ t.
27 There are (2/ǫ) 2s choices for the sequence ( f t, ḡ t ) and so we enumerate all possiblities and see if there is a cut with (approximately) these parameters.
28 There are (2/ǫ) 2s choices for the sequence ( f t, ḡ t ) and so we enumerate all possiblities and see if there is a cut with (approximately) these parameters. P = V 1, V 2,...,V k is the coarsest partition of V (with at most 2 2s parts in it) such that each R t, C t is the union of sets in P.
29 There are (2/ǫ) 2s choices for the sequence ( f t, ḡ t ) and so we enumerate all possiblities and see if there is a cut with (approximately) these parameters. P = V 1, V 2,...,V k is the coarsest partition of V (with at most 2 2s parts in it) such that each R t, C t is the union of sets in P. We check ( f t, ḡ t ) by solving the LP relaxation of the integer program 0 x P P P P ft x P < f t + ν 1 t s P Rt ḡ t P C t ( P x P ) ḡ t + ν and doing some adjusting. (x P = S P ).
30 There are (2/ǫ) 2s choices for the sequence ( f t, ḡ t ) and so we enumerate all possiblities and see if there is a cut with (approximately) these parameters. P = V 1, V 2,...,V k is the coarsest partition of V (with at most 2 2s parts in it) such that each R t, C t is the union of sets in P. The partition P has the property that for disjoint S, T V we have e(s, T) d i,j S i T j 2 W 2ǫn 2 i [k] j [k] where d i,j = e(v i, V j )/( V i V j ).
31 There are (2/ǫ) 2s choices for the sequence ( f t, ḡ t ) and so we enumerate all possiblities and see if there is a cut with (approximately) these parameters. P = V 1, V 2,...,V k is the coarsest partition of V (with at most 2 2s parts in it) such that each R t, C t is the union of sets in P. The partition P has the property that for disjoint S, T V we have e(s, T) d i,j S i T j 2 W 2ǫn 2 i [k] j [k] where d i,j = e(v i, V j )/( V i V j ). We could replace P with an ordinary regular partition. The constants as a function of ǫ get worse.
32 Quadratic Assignment Minimise A i,j,p,q z i,p z j,q i,j,p,q subject to z i,k = z k,j = 1 k k z i,j = 0, 1. i, j.
33 A set of n items V have to be assigned to a set of n locations X, one per location. z i,p = 1: Place item i in position p = π(i) T(i, i ) 1 is the amount of traffic between item i and i. D(x, x ) is the distance between location x and x. If item i is assigned to location π(i) for i [n] the total cost c(π) is defined by c(π) = n n T(i, i )D(π(i), π(i )). i=1 i =1 The problem is to minimise c(π) over all bijections π : V X.
34 Metric space X with metric D. Metric QAP. 1 diam(x)=1 i.e. max x,y D(x, y) = 1. 2 For all ǫ > 0 there exists a partition X = X 1 X 2 X l, l = l(ǫ), such that diam(x j ) ǫ. We call this an ǫ refinement of X. So there is a l l matrix ˆD such that if x X j and x X j then D(x, x ) ˆD(j, j ) 2ǫ. This partition must be computable in time polynomial in n and 1/ǫ. We call this the metric QAP.
35 We decompose T = T 1 + T T s + W where W ǫn 2. For bijection π : V X we have c(π) = s k=1 i,j=1 n T k (i, j)d(π(i), π(j)) + 1 We compute an O(ǫ 3 )-refinement of X and let S (π) i = π 1 (X i ). s k=1 i,j=1 n T k (i, j)d(π(i), π(j)) = s l k=1 i,j=1 d k R k S (π) i C k S (π) j ˆD(i, j) + 2.
36 Computing a decomposition.
37 Computing a decomposition. Reducible to finding an approximation to the cut-norm.
38 Computing a decomposition. Reducible to finding an approximation to the cut-norm. Our paper gave algorithms with a small additive error.
39 Computing a decomposition. Reducible to finding an approximation to the cut-norm. Our paper gave algorithms with a small additive error. Alon and Naor gave an approximation algorithm with multiplicative error!
40 Let A 1 = max x i,y j {±1} A(i, j)x i y j. i,j
41 Let A 1 = max x i,y j {±1} A(i, j)x i y j. i,j i,j A(i, j)x i y j = A i,j x i =1 x i =1 y j =1 y j = 1 A i,j x i = 1 y j =1 + x i = 1 y j = 1 A i,j. So A 1 4 A.
42 Let A 1 = max x i,y j {±1} A(i, j)x i y j. i,j i,j A(i, j)x i y j = A i,j x i =1 x i =1 y j =1 y j = 1 A i,j x i = 1 y j =1 + x i = 1 y j = 1 A i,j. So A 1 4 A. A similar argument gives A A 1.
43 Grothendieck s Identity u, v are unit vectors in a Hilbert space H. z is chosen uniformly from B = {x : x = 1}. π E[sign(u z) sign(v z)] = arcsin(u.v). 2
44 Let (u i, v j ) define L A = max u i,v j A(i, j)u i v j ( A 1 ) i,j where (u i, v j ) lie in R m+n and u i = v j = 1.
45 Let (u i, v j ) define L A = max u i,v j A(i, j)u i v j ( A 1 ) i,j where (u i, v j ) lie in R m+n and u i = v j = 1. (u i, v j ) are computable via Semi-Definite Programming.
46 Let c = sinh 1 (1) = ln(1 + 2). sin(cu i v j ) = = ( 1) k c 2k+1 (2k + 1)! (u i v k=0 j ) 2k+1 ( 1) k c 2k+1 (2k + 1)! (u i ) (2k+1) (v k=0 = S(u i ) T(v j ). j ) (2k+1)
47 Here and S(u i ) = T(v j ) = ( 1) k c 2k+1 (2k + 1)! (u i ) (2k+1) c 2k+1 (2k + 1)! (v j ) (2k+1) k=0 k=0 (u 1, u 2, u 3, u 4 ) (3) = (u 3 1, u2 1 u 2, u 2 1 u 3, u 2 1 u 4, u 1 u 2 u 3,...).
48 Here and S(u i ) = T(v j ) = ( 1) k c 2k+1 (2k + 1)! (u i ) (2k+1) c 2k+1 (2k + 1)! (v j ) (2k+1) k=0 k=0 (u 1, u 2, u 3, u 4 ) (3) = (u 3 1, u2 1 u 2, u 2 1 u 3, u 2 1 u 4, u 1 u 2 u 3,...). Note that c has been chosen so that S(u i ) = T(v j ) = 1.
49 L A = i,j A i,j u i v j = c 1 i,j = c 1π A i,j E[sign(S(ui 2 i,j A i,j arcsin(s(u i ) T(v j )) ) z) sign(t(v j ) z)]
50 L A = i,j A i,j u i v j A i,j arcsin(s(u i ) T(v j )) = c 1 i,j = c 1π A i,j E[sign(S(ui 2 i,j ) z) sign(t(v j ) z)] We embed the S(ui ), T(v j ) in R m+n and choose z randomly and put x i = sign(t(ui z), y j = sign(t(vj ) z)). By choosing many z we get a good estimate of A 1. One can recover a good solution (x i, y j ) by first deciding whether x 1 = 1 or x 1 = 1 etcetera.
51 L A = i,j A i,j u i v j = c 1 i,j = c 1π A i,j E[sign(S(ui 2 i,j A i,j arcsin(s(u i ) T(v j )) ) z) sign(t(v j ) z)] One can extend the idea to approximate the cut-norm, with the same guarantee.
52 In Frieze, Kannan we gave a randomised algorithm for computing a weak partition using only 2Õ(ǫ 2) time.
53 In Frieze, Kannan we gave a randomised algorithm for computing a weak partition using only 2Õ(ǫ 2) time. Subsequently, Alon,Fernandez de la Vega,Kannan, Karpinski, Yuster show how to compute such a partition using only Õ(ǫ 4 ) probes. (A similar but weaker result was obtained by Anderson, Engebretson). See also Borgs, Chayes, Lovász, Sós, Vesztergombi.
54 In Frieze, Kannan we gave a randomised algorithm for computing a weak partition using only 2Õ(ǫ 2) time. Subsequently, Alon,Fernandez de la Vega,Kannan, Karpinski, Yuster show how to compute such a partition using only Õ(ǫ 4 ) probes. (A similar but weaker result was obtained by Anderson, Engebretson). See also Borgs, Chayes, Lovász, Sós, Vesztergombi. Above also applies to Multi-Dimensional Arrays.
55 A multi-dimensional version Max-r-CSP is the following problem: We are given m Boolean functions f i defined on Y i = (y 1, y 2,...,y r ) where {y 1, y 2,..., y r } {x 1, x 2,...,x n } and the aim to choose a setting for the variables x 1, x 2,...,x n that makes as many of the functions f i as possible, true.
56 A multi-dimensional version Max-r-CSP is the following problem: We are given m Boolean functions f i defined on Y i = (y 1, y 2,...,y r ) where {y 1, y 2,..., y r } {x 1, x 2,...,x n } and the aim to choose a setting for the variables x 1, x 2,...,x n that makes as many of the functions f i as possible, true. For each z {0, 1} r and (i 1, i 2,...,i r ) [n] r we define A (z) (i 1, i 2,...,i r ) = { j : Y j = x i1,...,x ir and f j (z 1,...,z r ) = T }.
57 A multi-dimensional version Max-r-CSP is the following problem: We are given m Boolean functions f i defined on Y i = (y 1, y 2,...,y r ) where {y 1, y 2,..., y r } {x 1, x 2,...,x n } and the aim to choose a setting for the variables x 1, x 2,...,x n that makes as many of the functions f i as possible, true. For each z {0, 1} r and (i 1, i 2,...,i r ) [n] r we define A (z) (i 1, i 2,...,i r ) = { j : Y j = x i1,...,x ir and f j (z 1,...,z r ) = T }. Problem becomes to maximize, over x 1, x 2,...,x n, r (z) (i 1, i 2,...,i r )( 1) r z (x it + z t 1). A z i 1,i 2,...,i r t=1
58 For this it is useful to have a decomposition for r-dimensional matrices: An r-dimensional matrix A on X 1 X 2... X r is a map A : X 1 X 2 X r R. If S i X i for i = 1, 2,... r, and d is a real number the matrix M satisfying { d for e S1 S M(e) = 2 S r 0 otherwise is called a cut matrix and is denoted M = CUT(S 1, S 2,... S r ; d).
59 B is the (2-dimensional) matrix with rows indexed by Y 1 = X 1 Xˆr, ˆr = r/2 and columns indexed by Y 2 = Xˆr+1 X r. For i = (x 1,..., xˆr ) Y 1 j = (xˆr+1,..., x r ) Y 2 let B(i, j) = A(x 1, x 2,...,x r ).
60 Applying a decompositon algorithm we obtain B = D (1) + D (2) + + D (s0) + W where for 1 t s 0, D (t) = CUT(R t, C t, d t ), and W is small.
61 Each R t defines an ˆr-dimensional 0-1 matrix R (t) where R (t) (x 1,..., xˆr ) = 1 iff (x 1,..., xˆr ) R t. C (t) is defined similarly. Assume inductively that we can further decompose R (t) = D (t,1) + + D (t,s 1) + W (t) C (t) = ˆDt, ˆDt, ŝ 1 + Ŵ(t) Here D (t,u) = CUT(R t,u,1,...,r t,u,ˆr, d t,u ) ˆDt, û = CUT(R t,û,ˆr+1,...,r t,û,r, ˆd t,û )
62 Each R t defines an ˆr-dimensional 0-1 matrix R (t) where R (t) (x 1,..., xˆr ) = 1 iff (x 1,..., xˆr ) R t. C (t) is defined similarly. Assume inductively that we can further decompose R (t) = D (t,1) + + D (t,s 1) + W (t) C (t) = ˆDt, ˆDt, ŝ 1 + Ŵ(t) Here D (t,u) = CUT(R t,u,1,...,r t,u,ˆr, d t,u ) ˆDt, û = CUT(R t,û,ˆr+1,...,r t,û,r, ˆd t,û ) It follows that we can write A = t,u,û CUT(R t,u,1,..., R t,u,ˆr, ˆR t,û,ˆr+1,..., ˆR t,û,r, d t,u,û ) + W 1, where W 1 is small.
63 THANK YOU
Grothendieck s Inequality
Grothendieck s Inequality Leqi Zhu 1 Introduction Let A = (A ij ) R m n be an m n matrix. Then A defines a linear operator between normed spaces (R m, p ) and (R n, q ), for 1 p, q. The (p q)-norm of A
More informationSzemerédi s Lemma for the Analyst
Szemerédi s Lemma for the Analyst László Lovász and Balázs Szegedy Microsoft Research April 25 Microsoft Research Technical Report # MSR-TR-25-9 Abstract Szemerédi s Regularity Lemma is a fundamental tool
More informationStatistical Inference on Large Contingency Tables: Convergence, Testability, Stability. COMPSTAT 2010 Paris, August 23, 2010
Statistical Inference on Large Contingency Tables: Convergence, Testability, Stability Marianna Bolla Institute of Mathematics Budapest University of Technology and Economics marib@math.bme.hu COMPSTAT
More informationPartitioning Metric Spaces
Partitioning Metric Spaces Computational and Metric Geometry Instructor: Yury Makarychev 1 Multiway Cut Problem 1.1 Preliminaries Definition 1.1. We are given a graph G = (V, E) and a set of terminals
More informationIntroduction to Semidefinite Programming I: Basic properties a
Introduction to Semidefinite Programming I: Basic properties and variations on the Goemans-Williamson approximation algorithm for max-cut MFO seminar on Semidefinite Programming May 30, 2010 Semidefinite
More informationThe Algorithmic Aspects of the Regularity Lemma
The Algorithmic Aspects of the Regularity Lemma N. Alon R. A. Duke H. Lefmann V. Rödl R. Yuster Abstract The Regularity Lemma of Szemerédi is a result that asserts that every graph can be partitioned in
More informationThe maximal stable set problem : Copositive programming and Semidefinite Relaxations
The maximal stable set problem : Copositive programming and Semidefinite Relaxations Kartik Krishnan Department of Mathematical Sciences Rensselaer Polytechnic Institute Troy, NY 12180 USA kartis@rpi.edu
More informationSzemerédi s Lemma for the Analyst
Szemerédi s Lemma for the Analyst László Lovász and Balázs Szegedy Microsoft Research February 6 Abstract Szemerédi s Regularity Lemma is a fundamental tool in graph theory: it has many applications to
More informationFinite Metric Spaces & Their Embeddings: Introduction and Basic Tools
Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools Manor Mendel, CMI, Caltech 1 Finite Metric Spaces Definition of (semi) metric. (M, ρ): M a (finite) set of points. ρ a distance function
More informationApproximation Algorithms
Approximation Algorithms Chapter 26 Semidefinite Programming Zacharias Pitouras 1 Introduction LP place a good lower bound on OPT for NP-hard problems Are there other ways of doing this? Vector programs
More informationApproximation of Global MAX-CSP Problems
Electronic Colloquium on Computational Complexity, Report No. 24 (2006) Approximation of Global MAX-CSP Problems W. Fernandez de la Vega Ravi Kannan Marek Karpinski Abstract We study the problem of absolute
More informationMaximum sum contiguous subsequence Longest common subsequence Matrix chain multiplication All pair shortest path Kna. Dynamic Programming
Dynamic Programming Arijit Bishnu arijit@isical.ac.in Indian Statistical Institute, India. August 31, 2015 Outline 1 Maximum sum contiguous subsequence 2 Longest common subsequence 3 Matrix chain multiplication
More informationConstructing c-ary Perfect Factors
Constructing c-ary Perfect Factors Chris J. Mitchell Computer Science Department Royal Holloway University of London Egham Hill Egham Surrey TW20 0EX England. Tel.: +44 784 443423 Fax: +44 784 443420 Email:
More informationAn Approximation Algorithm for Approximation Rank
An Approximation Algorithm for Approximation Rank Troy Lee Columbia University Adi Shraibman Weizmann Institute Conventions Identify a communication function f : X Y { 1, +1} with the associated X-by-Y
More informationCombinatorial Enumeration. Jason Z. Gao Carleton University, Ottawa, Canada
Combinatorial Enumeration Jason Z. Gao Carleton University, Ottawa, Canada Counting Combinatorial Structures We are interested in counting combinatorial (discrete) structures of a given size. For example,
More informationA Unified Theorem on SDP Rank Reduction. yyye
SDP Rank Reduction Yinyu Ye, EURO XXII 1 A Unified Theorem on SDP Rank Reduction Yinyu Ye Department of Management Science and Engineering and Institute of Computational and Mathematical Engineering Stanford
More informationREGULARITY LEMMAS FOR GRAPHS
REGULARITY LEMMAS FOR GRAPHS Abstract. Szemerédi s regularity lemma proved to be a fundamental result in modern graph theory. It had a number of important applications and is a widely used tool in extremal
More informationMatrices: 2.1 Operations with Matrices
Goals In this chapter and section we study matrix operations: Define matrix addition Define multiplication of matrix by a scalar, to be called scalar multiplication. Define multiplication of two matrices,
More informationDiscrete Geometry. Problem 1. Austin Mohr. April 26, 2012
Discrete Geometry Austin Mohr April 26, 2012 Problem 1 Theorem 1 (Linear Programming Duality). Suppose x, y, b, c R n and A R n n, Ax b, x 0, A T y c, and y 0. If x maximizes c T x and y minimizes b T
More informationApproximating sparse binary matrices in the cut-norm
Approximating sparse binary matrices in the cut-norm Noga Alon Abstract The cut-norm A C of a real matrix A = (a ij ) i R,j S is the maximum, over all I R, J S of the quantity i I,j J a ij. We show that
More informationMATRICES. a m,1 a m,n A =
MATRICES Matrices are rectangular arrays of real or complex numbers With them, we define arithmetic operations that are generalizations of those for real and complex numbers The general form a matrix of
More informationOn the Tightness of an LP Relaxation for Rational Optimization and its Applications
OPERATIONS RESEARCH Vol. 00, No. 0, Xxxxx 0000, pp. 000 000 issn 0030-364X eissn 526-5463 00 0000 000 INFORMS doi 0.287/xxxx.0000.0000 c 0000 INFORMS Authors are encouraged to submit new papers to INFORMS
More informationVery few Moore Graphs
Very few Moore Graphs Anurag Bishnoi June 7, 0 Abstract We prove here a well known result in graph theory, originally proved by Hoffman and Singleton, that any non-trivial Moore graph of diameter is regular
More informationConflict-Free Colorings of Rectangles Ranges
Conflict-Free Colorings of Rectangles Ranges Khaled Elbassioni Nabil H. Mustafa Max-Planck-Institut für Informatik, Saarbrücken, Germany felbassio, nmustafag@mpi-sb.mpg.de Abstract. Given the range space
More informationOn the complexity of approximate multivariate integration
On the complexity of approximate multivariate integration Ioannis Koutis Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213 USA ioannis.koutis@cs.cmu.edu January 11, 2005 Abstract
More informationCS100: DISCRETE STRUCTURES. Lecture 3 Matrices Ch 3 Pages:
CS100: DISCRETE STRUCTURES Lecture 3 Matrices Ch 3 Pages: 246-262 Matrices 2 Introduction DEFINITION 1: A matrix is a rectangular array of numbers. A matrix with m rows and n columns is called an m x n
More informationCSC Linear Programming and Combinatorial Optimization Lecture 10: Semidefinite Programming
CSC2411 - Linear Programming and Combinatorial Optimization Lecture 10: Semidefinite Programming Notes taken by Mike Jamieson March 28, 2005 Summary: In this lecture, we introduce semidefinite programming
More informationThe large deviation principle for the Erdős-Rényi random graph
The large deviation principle for the Erdős-Rényi random graph (Courant Institute, NYU) joint work with S. R. S. Varadhan Main objective: how to count graphs with a given property Only consider finite
More informationLecture 23 Branch-and-Bound Algorithm. November 3, 2009
Branch-and-Bound Algorithm November 3, 2009 Outline Lecture 23 Modeling aspect: Either-Or requirement Special ILPs: Totally unimodular matrices Branch-and-Bound Algorithm Underlying idea Terminology Formal
More informationUndecidability of Linear Inequalities Between Graph Homomorphism Densities
Undecidability of Linear Inequalities Between Graph Homomorphism Densities Hamed Hatami joint work with Sergey Norin School of Computer Science McGill University December 4, 2013 Hamed Hatami (McGill University)
More information- Well-characterized problems, min-max relations, approximate certificates. - LP problems in the standard form, primal and dual linear programs
LP-Duality ( Approximation Algorithms by V. Vazirani, Chapter 12) - Well-characterized problems, min-max relations, approximate certificates - LP problems in the standard form, primal and dual linear programs
More informationMATH 205C: STATIONARY PHASE LEMMA
MATH 205C: STATIONARY PHASE LEMMA For ω, consider an integral of the form I(ω) = e iωf(x) u(x) dx, where u Cc (R n ) complex valued, with support in a compact set K, and f C (R n ) real valued. Thus, I(ω)
More informationKnowledge Discovery and Data Mining 1 (VO) ( )
Knowledge Discovery and Data Mining 1 (VO) (707.003) Review of Linear Algebra Denis Helic KTI, TU Graz Oct 9, 2014 Denis Helic (KTI, TU Graz) KDDM1 Oct 9, 2014 1 / 74 Big picture: KDDM Probability Theory
More informationNot all counting problems are efficiently approximable. We open with a simple example.
Chapter 7 Inapproximability Not all counting problems are efficiently approximable. We open with a simple example. Fact 7.1. Unless RP = NP there can be no FPRAS for the number of Hamilton cycles in a
More informationReverse mathematics of some topics from algorithmic graph theory
F U N D A M E N T A MATHEMATICAE 157 (1998) Reverse mathematics of some topics from algorithmic graph theory by Peter G. C l o t e (Chestnut Hill, Mass.) and Jeffry L. H i r s t (Boone, N.C.) Abstract.
More informationData Mining and Matrices
Data Mining and Matrices 08 Boolean Matrix Factorization Rainer Gemulla, Pauli Miettinen June 13, 2013 Outline 1 Warm-Up 2 What is BMF 3 BMF vs. other three-letter abbreviations 4 Binary matrices, tiles,
More informationFinite Model Theory and Graph Isomorphism. II.
Finite Model Theory and Graph Isomorphism. II. Anuj Dawar University of Cambridge Computer Laboratory visiting RWTH Aachen Beroun, 13 December 2013 Recapitulation Finite Model Theory aims to study the
More informationDifferentiable Functions
Differentiable Functions Let S R n be open and let f : R n R. We recall that, for x o = (x o 1, x o,, x o n S the partial derivative of f at the point x o with respect to the component x j is defined as
More informationQuick Tour of Linear Algebra and Graph Theory
Quick Tour of Linear Algebra and Graph Theory CS224W: Social and Information Network Analysis Fall 2014 David Hallac Based on Peter Lofgren, Yu Wayne Wu, and Borja Pelato s previous versions Matrices and
More informationAdvanced Linear Programming: The Exercises
Advanced Linear Programming: The Exercises The answers are sometimes not written out completely. 1.5 a) min c T x + d T y Ax + By b y = x (1) First reformulation, using z smallest number satisfying x z
More informationInstitutionen för matematik, KTH.
Institutionen för matematik, KTH. Contents 7 Affine Varieties 1 7.1 The polynomial ring....................... 1 7.2 Hypersurfaces........................... 1 7.3 Ideals...............................
More informationExplicit bounds on the entangled value of multiplayer XOR games. Joint work with Thomas Vidick (MIT)
Explicit bounds on the entangled value of multiplayer XOR games Jop Briët Joint work with Thomas Vidick (MIT) Waterloo, 2012 Entanglement and nonlocal correlations [Bell64] Measurements on entangled quantum
More informationGRAPH ALGORITHMS Week 7 (13 Nov - 18 Nov 2017)
GRAPH ALGORITHMS Week 7 (13 Nov - 18 Nov 2017) C. Croitoru croitoru@info.uaic.ro FII November 12, 2017 1 / 33 OUTLINE Matchings Analytical Formulation of the Maximum Matching Problem Perfect Matchings
More informationCutting Planes for First Level RLT Relaxations of Mixed 0-1 Programs
Cutting Planes for First Level RLT Relaxations of Mixed 0-1 Programs 1 Cambridge, July 2013 1 Joint work with Franklin Djeumou Fomeni and Adam N. Letchford Outline 1. Introduction 2. Literature Review
More informationON COST MATRICES WITH TWO AND THREE DISTINCT VALUES OF HAMILTONIAN PATHS AND CYCLES
ON COST MATRICES WITH TWO AND THREE DISTINCT VALUES OF HAMILTONIAN PATHS AND CYCLES SANTOSH N. KABADI AND ABRAHAM P. PUNNEN Abstract. Polynomially testable characterization of cost matrices associated
More informationLecture 5. Max-cut, Expansion and Grothendieck s Inequality
CS369H: Hierarchies of Integer Programming Relaxations Spring 2016-2017 Lecture 5. Max-cut, Expansion and Grothendieck s Inequality Professor Moses Charikar Scribes: Kiran Shiragur Overview Here we derive
More informationSAMPLE TEX FILE ZAJJ DAUGHERTY
SAMPLE TEX FILE ZAJJ DAUGHERTY Contents. What is the partition algebra?.. Graphs and equivalence relations.. Diagrams and their compositions.. The partition algebra. Combinatorial representation theory:
More informationAlexander Ostrowski
Ostrowski p. 1/3 Alexander Ostrowski 1893 1986 Walter Gautschi wxg@cs.purdue.edu Purdue University Ostrowski p. 2/3 Collected Mathematical Papers Volume 1 Determinants Linear Algebra Algebraic Equations
More informationSpectral gaps and geometric representations. Amir Yehudayoff (Technion)
Spectral gaps and geometric representations Amir Yehudayoff (Technion) Noga Alon (Tel Aviv) Shay Moran (Simons) pseudorandomness random objects have properties difficult to describe hard to compute expanders
More informationACO Comprehensive Exam October 14 and 15, 2013
1. Computability, Complexity and Algorithms (a) Let G be the complete graph on n vertices, and let c : V (G) V (G) [0, ) be a symmetric cost function. Consider the following closest point heuristic for
More informationConvex Optimization M2
Convex Optimization M2 Lecture 8 A. d Aspremont. Convex Optimization M2. 1/57 Applications A. d Aspremont. Convex Optimization M2. 2/57 Outline Geometrical problems Approximation problems Combinatorial
More informationInduced subgraphs with many repeated degrees
Induced subgraphs with many repeated degrees Yair Caro Raphael Yuster arxiv:1811.071v1 [math.co] 17 Nov 018 Abstract Erdős, Fajtlowicz and Staton asked for the least integer f(k such that every graph with
More informationElementary Equivalence in Finite Structures
Elementary Equivalence in Finite Structures Anuj Dawar University of Cambridge Computer Laboratory YuriFest, Berlin, 11 September 2015 When I First Met Yuri When I was a graduate student, I sent Yuri a
More informationBasic Calculus Review
Basic Calculus Review Lorenzo Rosasco ISML Mod. 2 - Machine Learning Vector Spaces Functionals and Operators (Matrices) Vector Space A vector space is a set V with binary operations +: V V V and : R V
More informationFunctional Analysis Review
Outline 9.520: Statistical Learning Theory and Applications February 8, 2010 Outline 1 2 3 4 Vector Space Outline A vector space is a set V with binary operations +: V V V and : R V V such that for all
More informationClosest String and Closest Substring Problems
January 8, 2010 Problem Formulation Problem Statement I Closest String Given a set S = {s 1, s 2,, s n } of strings each length m, find a center string s of length m minimizing d such that for every string
More informationDiscrepancy Theory in Approximation Algorithms
Discrepancy Theory in Approximation Algorithms Rajat Sen, Soumya Basu May 8, 2015 1 Introduction In this report we would like to motivate the use of discrepancy theory in algorithms. Discrepancy theory
More informationApproximation Basics
Approximation Basics, Concepts, and Examples Xiaofeng Gao Department of Computer Science and Engineering Shanghai Jiao Tong University, P.R.China Fall 2012 Special thanks is given to Dr. Guoqiang Li for
More informationACO Comprehensive Exam March 17 and 18, Computability, Complexity and Algorithms
1. Computability, Complexity and Algorithms (a) Let G(V, E) be an undirected unweighted graph. Let C V be a vertex cover of G. Argue that V \ C is an independent set of G. (b) Minimum cardinality vertex
More informationOut-colourings of Digraphs
Out-colourings of Digraphs N. Alon J. Bang-Jensen S. Bessy July 13, 2017 Abstract We study vertex colourings of digraphs so that no out-neighbourhood is monochromatic and call such a colouring an out-colouring.
More informationConstruction of Smooth Fractal Surfaces Using Hermite Fractal Interpolation Functions. P. Bouboulis, L. Dalla and M. Kostaki-Kosta
BULLETIN OF THE GREEK MATHEMATICAL SOCIETY Volume 54 27 (79 95) Construction of Smooth Fractal Surfaces Using Hermite Fractal Interpolation Functions P. Bouboulis L. Dalla and M. Kostaki-Kosta Received
More informationTopological properties
CHAPTER 4 Topological properties 1. Connectedness Definitions and examples Basic properties Connected components Connected versus path connected, again 2. Compactness Definition and first examples Topological
More informationREPRESENTATION THEORY WEEK 7
REPRESENTATION THEORY WEEK 7 1. Characters of L k and S n A character of an irreducible representation of L k is a polynomial function constant on every conjugacy class. Since the set of diagonalizable
More informationLecture 1 Introduction
L. Vandenberghe EE236A (Fall 2013-14) Lecture 1 Introduction course overview linear optimization examples history approximate syllabus basic definitions linear optimization in vector and matrix notation
More informationSampling Subproblems of Heterogeneous Max-Cut Problems and Approximation Algorithms*
Sampling Subproblems of Heterogeneous Max-Cut Problems and Approximation Algorithms* Petros Drineas, Ravi Kannan, 2, Michael W. Mahoney 3 Department of Computer Science, Rensselaer Polytechnic Institute,
More informationMath/CS 466/666: Homework Solutions for Chapter 3
Math/CS 466/666: Homework Solutions for Chapter 3 31 Can all matrices A R n n be factored A LU? Why or why not? Consider the matrix A ] 0 1 1 0 Claim that this matrix can not be factored A LU For contradiction,
More informationIr O D = D = ( ) Section 2.6 Example 1. (Bottom of page 119) dim(v ) = dim(l(v, W )) = dim(v ) dim(f ) = dim(v )
Section 3.2 Theorem 3.6. Let A be an m n matrix of rank r. Then r m, r n, and, by means of a finite number of elementary row and column operations, A can be transformed into the matrix ( ) Ir O D = 1 O
More informationGraph Limits and Parameter Testing
Graph Limits and Parameter Testing Christian Borgs borgs@microsoft.com Jennifer Chayes jchayes@microsoft.com Microsoft Research, Redmond, WA 98052 László Lovász lovasz@microsoft.com Vera T. Sós Rényi Institute
More informationApproximation Algorithms for Asymmetric TSP by Decomposing Directed Regular Multigraphs
Approximation Algorithms for Asymmetric TSP by Decomposing Directed Regular Multigraphs Haim Kaplan Tel-Aviv University, Israel haimk@post.tau.ac.il Nira Shafrir Tel-Aviv University, Israel shafrirn@post.tau.ac.il
More informationConvergent sequences of dense graphs II. Multiway cuts and statistical physics
Annals of Mathematics 176 (2012), 151 219 http://dx.doi.org/10.4007/annals.2012.176.1.2 Convergent sequences of dense graphs II. Multiway cuts and statistical physics By C. Borgs, J. T. Chayes, L. Lovász,
More informationOptimal File Sharing in Distributed Networks
Optimal File Sharing in Distributed Networks Moni Naor Ron M. Roth Abstract The following file distribution problem is considered: Given a network of processors represented by an undirected graph G = (V,
More informationEE263 Review Session 1
EE263 Review Session 1 October 5, 2018 0.1 Importing Variables from a MALAB.m file If you are importing variables given in file vars.m, use the following code at the beginning of your script. close a l
More informationDifferential equations
Differential equations Math 7 Spring Practice problems for April Exam Problem Use the method of elimination to find the x-component of the general solution of x y = 6x 9x + y = x 6y 9y Soln: The system
More informationA method for construction of Lie group invariants
arxiv:1206.4395v1 [math.rt] 20 Jun 2012 A method for construction of Lie group invariants Yu. Palii Laboratory of Information Technologies, Joint Institute for Nuclear Research, Dubna, Russia and Institute
More informationAnalysis Comprehensive Exam Questions Fall F(x) = 1 x. f(t)dt. t 1 2. tf 2 (t)dt. and g(t, x) = 2 t. 2 t
Analysis Comprehensive Exam Questions Fall 2. Let f L 2 (, ) be given. (a) Prove that ( x 2 f(t) dt) 2 x x t f(t) 2 dt. (b) Given part (a), prove that F L 2 (, ) 2 f L 2 (, ), where F(x) = x (a) Using
More informationAnalysis-3 lecture schemes
Analysis-3 lecture schemes (with Homeworks) 1 Csörgő István November, 2015 1 A jegyzet az ELTE Informatikai Kar 2015. évi Jegyzetpályázatának támogatásával készült Contents 1. Lesson 1 4 1.1. The Space
More informationMatrix Arithmetic. j=1
An m n matrix is an array A = Matrix Arithmetic a 11 a 12 a 1n a 21 a 22 a 2n a m1 a m2 a mn of real numbers a ij An m n matrix has m rows and n columns a ij is the entry in the i-th row and j-th column
More informationPARTITIONING PROBLEMS IN DENSE HYPERGRAPHS
PARTITIONING PROBLEMS IN DENSE HYPERGRAPHS A. CZYGRINOW Abstract. We study the general partitioning problem and the discrepancy problem in dense hypergraphs. Using the regularity lemma [16] and its algorithmic
More informationLINEAR ALGEBRA REVIEW
LINEAR ALGEBRA REVIEW JC Stuff you should know for the exam. 1. Basics on vector spaces (1) F n is the set of all n-tuples (a 1,... a n ) with a i F. It forms a VS with the operations of + and scalar multiplication
More informationNonlinear Discrete Optimization
Nonlinear Discrete Optimization Technion Israel Institute of Technology http://ie.technion.ac.il/~onn Billerafest 2008 - conference in honor of Lou Billera's 65th birthday (Update on Lecture Series given
More informationSome notes on Coxeter groups
Some notes on Coxeter groups Brooks Roberts November 28, 2017 CONTENTS 1 Contents 1 Sources 2 2 Reflections 3 3 The orthogonal group 7 4 Finite subgroups in two dimensions 9 5 Finite subgroups in three
More informationSelf-dual interval orders and row-fishburn matrices
Self-dual interval orders and row-fishburn matrices Sherry H. F. Yan Department of Mathematics Zhejiang Normal University Jinhua 321004, P.R. China huifangyan@hotmail.com Yuexiao Xu Department of Mathematics
More informationChapter 2. Divide-and-conquer. 2.1 Strassen s algorithm
Chapter 2 Divide-and-conquer This chapter revisits the divide-and-conquer paradigms and explains how to solve recurrences, in particular, with the use of the master theorem. We first illustrate the concept
More informationMaximum union-free subfamilies
Maximum union-free subfamilies Jacob Fox Choongbum Lee Benny Sudakov Abstract An old problem of Moser asks: how large of a union-free subfamily does every family of m sets have? A family of sets is called
More informationQuadratic forms. Here. Thus symmetric matrices are diagonalizable, and the diagonalization can be performed by means of an orthogonal matrix.
Quadratic forms 1. Symmetric matrices An n n matrix (a ij ) n ij=1 with entries on R is called symmetric if A T, that is, if a ij = a ji for all 1 i, j n. We denote by S n (R) the set of all n n symmetric
More informationPlanning maximum capacity Wireless Local Area Networks
Edoardo Amaldi Sandro Bosio Antonio Capone Matteo Cesana Federico Malucelli Di Yuan Planning maximum capacity Wireless Local Area Networks http://www.elet.polimi.it/upload/malucell Outline Application
More informationAN EFFECTIVE METRIC ON C(H, K) WITH NORMAL STRUCTURE. Mona Nabiei (Received 23 June, 2015)
NEW ZEALAND JOURNAL OF MATHEMATICS Volume 46 (2016), 53-64 AN EFFECTIVE METRIC ON C(H, K) WITH NORMAL STRUCTURE Mona Nabiei (Received 23 June, 2015) Abstract. This study first defines a new metric with
More informationBranching proofs of infeasibility in low density subset sum problems
Branching proofs of infeasibility in low density subset sum problems Gábor Pataki and Mustafa Tural We prove that the subset sum problem Abstract ax = β x {0, 1} n (SUB) has a polynomial time computable
More informationFinding Hamilton cycles in robustly expanding digraphs
Journal of Graph Algorithms and Applications http://jgaa.info/ vol. 16, no. 2, pp. 335 358 (2012) Finding Hamilton cycles in robustly expanding digraphs Demetres Christofides 1 Peter Keevash 1 Daniela
More informationDeterminants of Partition Matrices
journal of number theory 56, 283297 (1996) article no. 0018 Determinants of Partition Matrices Georg Martin Reinhart Wellesley College Communicated by A. Hildebrand Received February 14, 1994; revised
More informationLecture: Examples of LP, SOCP and SDP
1/34 Lecture: Examples of LP, SOCP and SDP Zaiwen Wen Beijing International Center For Mathematical Research Peking University http://bicmr.pku.edu.cn/~wenzw/bigdata2018.html wenzw@pku.edu.cn Acknowledgement:
More informationYOUNG TABLEAUX AND THE REPRESENTATIONS OF THE SYMMETRIC GROUP
YOUNG TABLEAUX AND THE REPRESENTATIONS OF THE SYMMETRIC GROUP YUFEI ZHAO ABSTRACT We explore an intimate connection between Young tableaux and representations of the symmetric group We describe the construction
More informationQuick Tour of Linear Algebra and Graph Theory
Quick Tour of Linear Algebra and Graph Theory CS224w: Social and Information Network Analysis Fall 2012 Yu Wayne Wu Based on Borja Pelato s version in Fall 2011 Matrices and Vectors Matrix: A rectangular
More information1 + z 1 x (2x y)e x2 xy. xe x2 xy. x x3 e x, lim x log(x). (3 + i) 2 17i + 1. = 1 2e + e 2 = cosh(1) 1 + i, 2 + 3i, 13 exp i arctan
Complex Analysis I MT333P Problems/Homework Recommended Reading: Bak Newman: Complex Analysis Springer Conway: Functions of One Complex Variable Springer Ahlfors: Complex Analysis McGraw-Hill Jaenich:
More informationTopic: Primal-Dual Algorithms Date: We finished our discussion of randomized rounding and began talking about LP Duality.
CS787: Advanced Algorithms Scribe: Amanda Burton, Leah Kluegel Lecturer: Shuchi Chawla Topic: Primal-Dual Algorithms Date: 10-17-07 14.1 Last Time We finished our discussion of randomized rounding and
More informationSingular value decomposition (SVD) of large random matrices. India, 2010
Singular value decomposition (SVD) of large random matrices Marianna Bolla Budapest University of Technology and Economics marib@math.bme.hu India, 2010 Motivation New challenge of multivariate statistics:
More informationSOME STRUCTURE THEOREMS FOR INVERSE LIMITS WITH SET-VALUED FUNCTIONS
http://topology.auburn.edu/tp/ TOPOLOGY PROCEEDINGS Volume 42 (2013) Pages 237-258 E-Published on January 10, 2013 SOME STRUCTURE THEOREMS FOR INVERSE LIMITS WITH SET-VALUED FUNCTIONS M. M. MARSH Abstract.
More informationPolynomial-Time Perfect Matchings in Dense Hypergraphs
Polynomial-Time Perfect Matchings in Dense Hypergraphs Peter Keevash School of Mathematical Sciences, Queen Mary, University of London London E 4NS United Kingdom p.keevash@qmul.ac.uk Fiachra Knox School
More informationPhys 201. Matrices and Determinants
Phys 201 Matrices and Determinants 1 1.1 Matrices 1.2 Operations of matrices 1.3 Types of matrices 1.4 Properties of matrices 1.5 Determinants 1.6 Inverse of a 3 3 matrix 2 1.1 Matrices A 2 3 7 =! " 1
More informationTHREE CASES AN EXAMPLE: THE ALTERNATING GROUP A 5
THREE CASES REPRESENTATIONS OF FINITE GROUPS OF LIE TYPE LECTURE II: DELIGNE-LUSZTIG THEORY AND SOME APPLICATIONS Gerhard Hiss Lehrstuhl D für Mathematik RWTH Aachen University Summer School Finite Simple
More information