An Algorithm for Quantization of Discrete Probability Distributions

Size: px
Start display at page:

Download "An Algorithm for Quantization of Discrete Probability Distributions"

Transcription

1 An Algorith for Quantization of Discrete Probability Distributions Yuriy A. Reznik Qualco Inc., San Diego, CA Eail: Abstract We study the proble of quantization of discrete probability distributions, arising in universal coding, as well as other applications. We show, that in any situations this proble can be reduced to the covering proble for the unit siplex, yielding precise characterization in the high-rate regie. We present siple and asyptotically optial algorith for solving this proble. Perforance of this algorith is studied and copared with several known solutions. I. INTRODUCTION The proble of coding of probability distributions surfaces any ties in the history of source coding. First universal codes, developed in late 1960s, such as Lynch-Davisson [9], [21], cobinatorial [28], and enuerative codes [7] used lossless encoding of frequencies of sybols in an input sequence. The Rice achine [24], developed in early 1970 s, transitted quantized estiate of variance of source s distribution. Two-step universal codes, developed by J. Rissanen in 1980s, explicitly estiate, quantize, and transit paraeters of distribution as a first step of the encoding process [25], [26]. Vector quantization techniques for two-step universal coding were proposed in [4], [30]. In practice, twostep coding was often ipleented by constructing a Huffan tree, then encoding and transitting this code tree, and then encoding and transitting the data. Such algoriths becoe very popular in 1980s and 1990s, and were used, for exaple, in ZIP archiver [17], and JPEG iage copression standard [16]. In recent years, the proble of coding of distributions has attracted a new wave of interest coing fro other fields. For exaple, in coputer vision, it is now custoary to use histogra-derived descriptions of iage features. Exaples of such descriptors include SIFT [20], SURF [1], and CHoG [2], differentiating ainly in a way they quantize histogras. Several other uses of coding of distributions are described in [11]. To the best of our knowledge, ost related prior studies were otivated by optial design of two-step universal codes [25], [26], [30], [4], [15]. In such context, quantization of distributions becoes a sall sub-proble in a coplex rate optiization process, and final solutions yield few insights about it. In this paper, we treat quantization of distributions as a stand-alone proble. In Section 2, we explain setting of the proble and survey relevant analytic results. In Section 3, we propose and study an algorith for solving this proble. In Section 4, we provide coparisons with other known techniques. Conclusions are drawn in Section 5. II. DESCRIPTION OF THE PROBLEM Let A = {r 1,..., r }, <, denote a discrete set of events, and let Ω denote the set of probability distributions over A: { Ω = [ω 1,..., ω ] R ωi 0, } i ω i = 1. (1) Let p Ω be an input distribution that we need to encode, and let Q Ω be a set of distributions that we will be able to reproduce. We will call eleents of Q reconstruction points or centers in Ω.

2 We will further assue that Q is finite Q <, and that its eleents are enuerated and encoded by using fixed-rate code. The rate of such code is R(Q) = log 2 Q bits. By d (p, q) we will denote a distance easure between distributions p, q Ω. In order to coplete traditional setting of the quantization proble, it reains to assue that input quantity p Ω is produced by soe rando process, e.g. a eoryless process with density θ over Ω. Then the proble of quantization can be forulated as iniization of the average distance to the nearest reconstruction point (cf. [14, Lea 3.1]) d(ω, θ, R) = inf E p Ω Q Ω p θ Q 2 R in d(p, q), (2) q Q However, we notice that in ost applications, best possible accuracy of the reconstructed distribution is needed instantaneously. For exaple, in the design of a two-step universal code, saple-derived distribution is quantized and iediately used for encoding of this saple [26]. Siilarly, in coputer vision / iage recognition applications, histogras of gradients fro an iage are extracted, quantized, and used right away to find nearest atch for this iage. In all such cases, instead of iniizing the expected distance, it akes ore sense to design a quantizer that iniizes the worst case- or axial distance to the nearest reconstruction point. In other words, we need to solve the following proble 1 d (Ω, R) = We next survey soe known results about it. A. Achievable Perforance Liits inf Q Ω Q 2 R ax p Ω in d(p, q). (3) q Q We note that the proble (3) is purely geoetric in nature. It is equivalent to the proble of covering of Ω with at ost 2 R balls of equal radius. Related and iediately applicable results can be found in Graf and Luschgy [14, Chapter 10]. First, observe that Ω is a copact set in R (unit 1-siplex), and that its volue in R can be coputed as follows [29]: λ (Ω ) = ak k! k k k= a= 2 Here and below we assue that 3. Next, we bring result for asyptotic covering radius [14, Theore 10.7] = ( 1)!. (4) li 2 R d (Ω, R) = C λ (Ω ), (5) R where C > 0 is a constant known as covering coefficient for the unit cube C = inf 2 R d ([0, 1], R). (6) R 0 1 The dual proble: R(ε) = inf log Q Ω : ax p Ω in 2 Q, q Q d(p,q) ε ay also be posed. The quantity R(ε) can be understood as Kologorov s ε-entropy for etric space (Ω, d) [18].

3 The exact value of C depends on a distance easure d(p, q). For exaple, for L nor it is known that d (p, q) = p q = ax i p i q i, C, = 1 2. Hereafter, when we work with specific L r - nors: ( ) 1/r d r (p, q) = p q r = p i q i r (7) we will attach subscripts r to covering radius d (.) and other expressions to indicate the type of nor being used. By putting all these facts together, we obtain: Proposition 1. With R : where C,r are soe known constants. d r(ω, R) C,r i ()! 2 We now note, that with large the leading ter in (8) turns into = e ( ) 1 ()! + O 2 R, (8) which is a decaying function of. This highlights an interesting property of this quantization proble, distinguishing it fro well known cases, such as quantization of the unit ( 1)-diensional cube. III. AN ALGORITHM FOR CODING OF DISTRIBUTIONS The following algorith 2 can be viewed as a custo designed lattice quantizer. It is interesting in a sense that its lattice coincides with the concept of types in universal coding [8]. A. Choice of Lattice Given soe integer n 1, we define a set: { Q n = [q 1,..., q ] Q qi = k i, } n i k i = n, (10) where n, k 1,..., k Z +. Paraeter n serves as a coon denoinator to all fractions, and can be used to control the density and nuber of points in Q n. By analogy with the concept of types in universal coding [8] we will refer to distributions q Q n as types. For sae reason we will (soewhat inforally) call Q n a type lattice. Several exaples of sets Q n are shown in Figure 1. 2 An earlier publication related to this technique is [3]. (9)

4 Figure 1. Exaples of type lattices and their Voronoi cells (for L-nors) in 3 diensions. B. Quantization The task of finding the nearest type in Q n can be solved by using the following siple algorith 3 : Algorith 1. Given p, n, find nearest q = [ ] k 1 n,..., k n : 1) Copute values (i = 1,..., ) k i = np i + 1 2, n = i k i. 2) If n = n the nearest type is given by: k i = k i. Otherwise, copute errors and sort the such that δ i = k i np i, 1 2 δ j 1 δ j2... δ j 1 2, 3) Let = n n. If > 0 then decreent d values k i with largest errors [ k k ji = ji j = i,..., 1, k j i 1 i =,...,, otherwise, if < 0 increent values k i with sallest errors [ k k ji = ji + 1 i = 1,...,, k j i i = + 1,...,. The correctness of this algorith in ters of L, L 1, and L 2 -nors is self-evident. C. Enueration and Encoding As entioned earlier, the nuber of types in lattice Q n depends on the paraeter n. It is essentially the nuber of partitions of n into ters k k = n: ( ) n + 1 Q n =. (11) 1 In order to encode a type with paraeters k 1,..., k, we need to obtain its unique index ξ(k 1,..., k ). We suggest to copute it as follows: n 2 k j 1 ( n i j 1 l=1 ξ(k 1,..., k n ) = k ) l + j 1 + k n 1. (12) j 1 j=1 i=0 3 This algorith is siilar in concept to Conway and Sloane s quantizer for lattice A n [5, Chapter 20], but it is naturally scaled and reduced to find solutions within (-1) siplex.

5 This forula follows by induction (starting with = 2, 3, etc.), and it ipleents lexicographic enueration of types. For exaple: ξ(0, 0,..., 0, n) = 0, ξ(0, 0,..., 1, n 1) = 1,... ξ(n, 0,..., 0, 0) = ( ) n+ 1. Siilar cobinatorial enueration techniques were discussed in [7], [27], [28]. Once index is coputed, it is transitted by using direct binary representation at rate: R(n) = ( log n+ ) 2. (13) D. Perforance Analysis The set of types Q n is related to so-called lattice A n in lattice theory [5, Chapter 4]. It can be understood as a bounded subset of A n with n = 1 diensions, which is subsequently scaled, and placed in the unit siplex. Using this analogy, we can show that vertices of Voronoi cells (so called holes) in type lattice Q n are located at: q i = q + v i, q Q n, i = 1,..., 1, (14) where v i are so-called glue vectors [5, Chapter 21]: v i = 1 n [ i,..., i }{{} i ties ],..., i. (15) }{{}, i We next copute axiu distances (covering radii). i ties Proposition 2. Let a = /2. The following holds: ( ax in d (p, q) = 1 p Ω q Q n 1 1 n ), (16) ax in d 2 (p, q) = 1 a( a) p Ω q Q n n (17) ax in d 1 (p, q) = 1 2a( a). (18) p Ω q Q n n Proof: We use vectors (15). The largest coponent values appear when i = 1 or i = 1. E.g. for i = 1: [ v 1 = 1, 1,..., ] 1 n. This produces L - radius. The largest absolute su is achieved when all coponents are approxiately the sae in agnitude. This happens when i = a: [ ] v a = 1 a,..., a a, n }{{},..., a. }{{} a ties a ties This produces L 1 - radius. L 2 nor is the sae for all vectors v i, i > 0. It reains to evaluate distance / rate characteristics of type-lattice quantizer: d r[q n ](Ω, R) = in n: Q n 2 R ax p Ω in q Q n d r (p, q).

6 We report the following. Theore 1. Let a = /2. Then, with R : d [Q n ](Ω, R) 2 R d 2[Q n ](Ω, R) 2 R d 1[Q n ](Ω, R) 2 R 1 1 ( 1)!, (19) a( a) ( 1)!, (20) 2a( a) ( 1)!. (21) Proof: We first obtain asyptotic (with n ) expansion for the rate of our code (13): This iplies that R = ( 1) log 2 n log 2 ( 1)! + O ( 1 n). n 2 R ( 1)!. (22) Stateents of theore are obtained by cobination of this relation with expressions (16-18). 1) Optiality: We now copare the result of Theore 1 with theoretical asyptotic estiates for covering radius for Ω (8). As evident, the axiu distance in our schee decays with the rate R as: 1 2 d [Q n ](Ω, R) 2 which atches the decay rate of theoretical estiates. The only difference is in a leading constant factor. For exaple, under L nor, such factor in expression (8) is ( ) log. 1 = 2 + O Our algorith, on the other hand, uses a factor 1 1, which starts with 1 when = 2, and tends to 1 with. 2 2) Perforance in ters of KL-distance: All previous results are obtained using L-nors. Such distance easures are coon in coputer vision and iage recognition applications [1], [20], [22]. In source coding, ain interest presents Kullback-Leibler (KL) distance: d KL (p, q) = D(p q) = i R, p i log 2 p i q i. (23) This is not a true distance easure, so precise analysis is coplicated. Yet, by observing 4 that for sall distances between p and q: d KL (p, q) 1 (p i q i ) 2 (24) 2 ln 2 q i i 4 For exaple, by considering Tailor series of h(p) = i p i log p i at point q: h(p) = h(q) + (p q) T h(q) (p q)t 2 h(q) (p-q) +..., we note that D(p q) is just a tail of this series: D(p q) = h(q) h(p) + (p q) T h(q).

7 Figure 2. Two 10-point lattices: Q 3 (left), and Q 2 (right). The second has noticeably saller cells. we can at least say, that for a cell in the iddle of the siplex { q i = } 1, KL-distances to the nearest holes q will satisfy: [ d KL (q, q) d2 (q, q) ] ( ) 2 2 ln 2 = 1 a( a) 1 = O. (25) 2 ln 2 n 2 n 2 As evident fro (24), KL-radii of our cells will increase as we ove point q closer to the boundary of the siplex. However, in the asyptotic sense (and excluding boundary points), their agnitude will still decrease at the rate of O (n 2 ). This follows, for exaple, fro inequality: (p i q i ) 2 i q i i (p i q i ) (ax 2 1 i q i ). By translating n to bitrate (cf. (22)), we obtain ) d KL (q, q) = O (2 2R. (26) Precise lower bounds, supporting this siple estiate, can be obtained by using Pinsker inequality [23], and its recent refineents [10]. E. Additional iproveents 1) Introducing bias: As easily observed, type lattice Q n places reconstruction points with k i = 0 precisely on edges of the probability siplex Ω. This is not best placeent fro quantization standpoint, particularly when n is sall. This placeent can be iproved by using biased types: q i = k i + β n + β, i = 1,...,, where β 0 is a constant that defines shift towards the iddle of the siplex. In traditional source coding applications, it is custoary to use β = 1/2 [19]. In our case, setting β = 1/ appears to work best for L-nors, as it introduces sae distance to edges of the siplex as covering radius of the lattice. 2) Using dual type lattice Q n: Another idea for iproving perforance of our quantization algorith is to define and use dual type lattice Q n. Such a lattice consists of all points: q = q + v i, q Q n, q Ω i = 0,..., 1, where v i are the glue vectors (15). The ain advantage of using dual lattice is thinner covering in high diensions (cf. [5, Chapter 2]). But even at sall diensions, it ay soeties be useful. An exaple of such a situation for = 3 is shown in Figure. 2.

8 Figure 3. L 1-radius vs rate characteristics d 1[H](R), d 1[GM](R), d 1[Q n](r) achievable by Huffan-, Gilbert-Moore-, and type-based quantization schees. IV. COMPARISON WITH TREE-BASED QUANTIZATION TECHNIQUES Given a probability distribution p Ω, one popular in practice way of copressing it is to design a prefix code (for exaple, a Huffan code) for this distribution p first, and then encode the binary tree of such a code. Below we suarize soe known results about perforance of such schees. By denoting by l 1,..., l lengths of prefix codes, recalling that they satisfy Kraft inequality [6], and noting that 2 l i can be used to ap lengths back to probabilities, we arrive at the following set: Q tree = { [q 1,..., q ] Q q i = 2 l i, i 2 l i 1 }. There are several specific algoriths that one can eploy for construction of codes, producing different subsets of Q tree. Below we only consider the use of classic Huffan and Gilbert-Moore [13] codes. Soe additional tree-based quantization schees can be found in [11]. Proposition 3. There exists a set Q GM Q tree, such that where and C n = 1 n+1( 2n n ) is the Catalan nuber. d KL[Q GM ](R GM ) 2, (27) d 1[Q GM ](R GM ) 2 ln 2, (28) d [Q GM ](R GM ) 1, (29) R GM = log 2 Q GM = log 2 C = log 2 + O(1), (30) Proof: We use Gilbert-Moore code [13]. Upper bound for KL-distance is well known [13]. L 1 bound follows by Pinsker inequality [23]: d KL (p, q) 1 d 2 ln 2 1(p, q) 2. L bound is obvious: p i, q i (0, 1). Gilbert-Moore code uses fixed assignent (e.g. fro left to right) of letters to the codewords. Any

9 binary rooted tree with leaves can serve as a code. The nuber of such trees is given by the Catalan nuber C. Proposition 4. There exists a set Q H Q tree, such that where d KL[Q H ](R H ) 1, (31) d 1[Q H )](R H ) 2 ln 2, (32) d [Q H ](R H ) 1 2, (33) R H = log 2 Q H = log 2 + O (). (34) Proof: We use Huffan code. Its KL-distance bound is well known [6]. L 1 bound follows by Pinsker inequality [23]. L bound follows fro sibling property of Huffan trees [12]. It reains to estiate the nuber of Huffan trees T with leaves. Consider a skewed tree, with leaves at depths 1, 2,..., 1, 1. The last two leaves can be labeled by ( ) 2 cobinations of letters, whereas the other leaves - by ( 2)! possible cobinations. Hence T ( ) 2 ( 2)! = 1!. Upper bound is 2 obtained by arbitrary labeling all binary trees with leaves: T <! C, where C is the Catalan nuber. Cobining both we obtain: 1 < log ln 2 2 T log 2 < ( 2 1 ln 2). We present coparison of axial L 1 distances achievable by tree-based and type-based quantization schees in Figure 3. We consider cases of = 5 and = 10 diensions. It can be observed that the proposed type-based schee is ore efficient and ore versatile, allowing a wide range of possible rate/distance tradeoffs. V. CONCLUSIONS The proble of quantization of discrete probability distributions is studied. It is shown, that in any cases, this proble can be reduced to the covering radius proble for the unit siplex. Precise characterization of this proble in high-rate regie is reported. A siple algorith for solving this proble is also presented, analyzed, and copared to other known solutions. ACKNOWLEDGEMENTS The author would like to thank Prof. K. Zeger (UCSD) for reviewing and providing very useful coents on the initial draft of this paper. The author also wishes to thank Prof. B. Girod and his students V. Chandrasekhar, G. Takacs, D. Chen, S. Tsai (Stanford University), and Dr. R. Grzeszczuk (Nokia Research Center, Palo Alto) for introduction to the field of coputer vision, and collaboration that propted study of this quantization proble [3]. REFERENCES [1] H. Bay, A. Ess, T. Tuytelaars, L. Van Gool, SURF: Speeded Up Robust Features, Coputer Vision and Iage Understanding (CVIU), vol. 110, no. 3, pp , [2] V. Chandrasekhar, G. Takacs, D. Chen, S. Tsai, R. Grzeszczuk, B. Girod, CHoG: Copressed histogra of gradients A low bit-rate feature descriptor, in Proc. Coputer Vision and Pattern Recognition (CVPR 09), pp , [3] V. Chandrasekhar, Y. Reznik, G. Takacs, D. Chen, S. Tsai, R. Grzeszczuk, and B. Girod, Quantization Schees for Low Bitrate Copressed Histogra of Gradient Descriptors, in Proc. Coputer Vision and Pattern Recognition (CVPR 10), [4] P. A. Chou, M. Effros, and R. M. Gray, A vector quantization approach to universal noiseless coding and quantization, IEEE Trans. Inforation Theory, vol. 42, no. 4, pp , [5] J. H. Conway and N. J. A. Sloane, Sphere Packings, Lattices and Groups. New York: Springer-Verlag, [6] T. M. Cover and J. M. Thoas, Eleents of Inforation Theory. New York: John Wiley & Sons, 2006.

10 [7] T. Cover, Enuerative source coding, IEEE Trans. Infor. Theory, vol. 19, pp , Jan [8] I. Csiszár, The ethod of types, IEEE Trans. Inf. Theory, vol.44, no. 66, pp , [9] L. D. Davisson, Coents on Sequence tie coding for data copression, Proc. IEEE, vol. 54, p Dec [10] A. A. Fedotov, P. Harreoës, and F. Topsøe, Refineents of Pinsker s inequality, IEEE Trans. Inf. Theory, vol. 49, no. 6, pp , [11] T. Gagie, Copressing Probability Distributions, Inforation Processing Letters, vol. 97, no. 4, pp , [12] R. Gallager, Variations on a thee by Huffan, IEEE Trans. Infor. Theory, vol.24, no.6, pp , Nov [13] E. N. Gilbert and E. F. Moore, Variable-Length Binary Encodings, The Bell Syste Tech. Journal, vol. 7, pp , [14] S. Graf, and H. Luschgy, Foundations of Quantization for Probability Distributions. Berlin: Springer-Verlag, [15] T. S. Han, and K. Kobayashi, Matheatics of Inforation and Coding. Boston: Aerican Matheatical Society, [16] ITU-T and ISO/IEC JTC1, Digital Copression and Coding of Continuous-Tone Still Iages, ISO/IEC ITU-T Rec. T.81, Sept [17] P. W. Katz, PKZIP. Data copression utility, version 1.1, [18] A. N. Kologorov and V. M. Tikhoirov, ε-entropy and ε-capacity of sets in etric spaces, Uspekhi Math. Nauk, vol. 14, no. 2, pp. 3 86, (in Russian) [19] R. E. Krichevsky and V. K. Trofiov, The Perforance of Universal Encoding, IEEE Trans. Inforation Theory, vol. 27, pp , [20] D. Lowe, Distinctive Iage Features fro Scale-Invariant Keypoints, International Journal of Coputer Vision, vol. 60, no. 2, pp , [21] T. J. Lynch, Sequence tie coding for data copression, Proc. IEEE, vol. 54, pp , [22] K. Mikolajczyk and C. Schid, Perforance Evaluation of Local Descriptors, IEEE Trans. Pattern Anal. Mach. Intell., vol. 27, no. 10, pp , [23] M. S. Pinsker, Inforation and Inforation Stability of Rando Variables and Processes, Probley Peredachi Inforacii, vol. 7, AN SSSR, Moscow (in Russian). [24] R. F. Rice and J. R. Plaunt, Adaptive variable length coding for efficient copression of spacecraft television data, IEEE Trans. Co. Tech., vol. 19, no.1, pp , [25] J. Rissanen, Universal coding, inforation, prediction and estiation, IEEE Trans. Infor. Theory, vol. 30, pp , [26] J. Rissanen, Fisher Inforation and Stochastic Coprexity, IEEE Trans. Infor. Theory, vol. 42, pp , [27] J. P. M. Schalkwijk, An algorith for source coding, IEEE Trans. Infor. Theory, vol. 18, pp , May [28] Yu. M. Shtarkov and V. F. Babkin, Cobinatorial encoding for discrete stationary sources, in Proc. 2nd Int. Syp. on Inforation Theory, Akadéiai Kiadó, 1971, pp [29] D. Soerville, An Introduction to the Geoetry of n Dientions. New York: Dover, [30] K. Zeger, A. Bist, and T. Linder, Universal Source Coding with Codebook Transission, IEEE Trans. Counications, vol. 42, no. 2, pp , 1994.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

Fixed-to-Variable Length Distribution Matching

Fixed-to-Variable Length Distribution Matching Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de

More information

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

Pattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition

Pattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lesson 1 4 October 2017 Outline Learning and Evaluation for Pattern Recognition Notation...2 1. The Pattern Recognition

More information

A Simple Regression Problem

A Simple Regression Problem A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where

More information

A Note on the Applied Use of MDL Approximations

A Note on the Applied Use of MDL Approximations A Note on the Applied Use of MDL Approxiations Daniel J. Navarro Departent of Psychology Ohio State University Abstract An applied proble is discussed in which two nested psychological odels of retention

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

On Constant Power Water-filling

On Constant Power Water-filling On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives

More information

Compression and Predictive Distributions for Large Alphabet i.i.d and Markov models

Compression and Predictive Distributions for Large Alphabet i.i.d and Markov models 2014 IEEE International Syposiu on Inforation Theory Copression and Predictive Distributions for Large Alphabet i.i.d and Markov odels Xiao Yang Departent of Statistics Yale University New Haven, CT, 06511

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2016/2017 Lessons 9 11 Jan 2017 Outline Artificial Neural networks Notation...2 Convolutional Neural Networks...3

More information

ESE 523 Information Theory

ESE 523 Information Theory ESE 53 Inforation Theory Joseph A. O Sullivan Sauel C. Sachs Professor Electrical and Systes Engineering Washington University 11 Urbauer Hall 10E Green Hall 314-935-4173 (Lynda Marha Answers) jao@wustl.edu

More information

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

Support recovery in compressed sensing: An estimation theoretic approach

Support recovery in compressed sensing: An estimation theoretic approach Support recovery in copressed sensing: An estiation theoretic approach Ain Karbasi, Ali Horati, Soheil Mohajer, Martin Vetterli School of Coputer and Counication Sciences École Polytechnique Fédérale de

More information

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis E0 370 tatistical Learning Theory Lecture 6 (Aug 30, 20) Margin Analysis Lecturer: hivani Agarwal cribe: Narasihan R Introduction In the last few lectures we have seen how to obtain high confidence bounds

More information

Multi-Scale/Multi-Resolution: Wavelet Transform

Multi-Scale/Multi-Resolution: Wavelet Transform Multi-Scale/Multi-Resolution: Wavelet Transfor Proble with Fourier Fourier analysis -- breaks down a signal into constituent sinusoids of different frequencies. A serious drawback in transforing to the

More information

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

Lower Bounds for Quantized Matrix Completion

Lower Bounds for Quantized Matrix Completion Lower Bounds for Quantized Matrix Copletion Mary Wootters and Yaniv Plan Departent of Matheatics University of Michigan Ann Arbor, MI Eail: wootters, yplan}@uich.edu Mark A. Davenport School of Elec. &

More information

Computational and Statistical Learning Theory

Computational and Statistical Learning Theory Coputational and Statistical Learning Theory Proble sets 5 and 6 Due: Noveber th Please send your solutions to learning-subissions@ttic.edu Notations/Definitions Recall the definition of saple based Radeacher

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

Error Exponents in Asynchronous Communication

Error Exponents in Asynchronous Communication IEEE International Syposiu on Inforation Theory Proceedings Error Exponents in Asynchronous Counication Da Wang EECS Dept., MIT Cabridge, MA, USA Eail: dawang@it.edu Venkat Chandar Lincoln Laboratory,

More information

Computable Shell Decomposition Bounds

Computable Shell Decomposition Bounds Coputable Shell Decoposition Bounds John Langford TTI-Chicago jcl@cs.cu.edu David McAllester TTI-Chicago dac@autoreason.co Editor: Leslie Pack Kaelbling and David Cohn Abstract Haussler, Kearns, Seung

More information

CS Lecture 13. More Maximum Likelihood

CS Lecture 13. More Maximum Likelihood CS 6347 Lecture 13 More Maxiu Likelihood Recap Last tie: Introduction to axiu likelihood estiation MLE for Bayesian networks Optial CPTs correspond to epirical counts Today: MLE for CRFs 2 Maxiu Likelihood

More information

The accelerated expansion of the universe is explained by quantum field theory.

The accelerated expansion of the universe is explained by quantum field theory. The accelerated expansion of the universe is explained by quantu field theory. Abstract. Forulas describing interactions, in fact, use the liiting speed of inforation transfer, and not the speed of light.

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lessons 7 20 Dec 2017 Outline Artificial Neural networks Notation...2 Introduction...3 Key Equations... 3 Artificial

More information

ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD

ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical and Matheatical Sciences 04,, p. 7 5 ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD M a t h e a t i c s Yu. A. HAKOPIAN, R. Z. HOVHANNISYAN

More information

Convex Programming for Scheduling Unrelated Parallel Machines

Convex Programming for Scheduling Unrelated Parallel Machines Convex Prograing for Scheduling Unrelated Parallel Machines Yossi Azar Air Epstein Abstract We consider the classical proble of scheduling parallel unrelated achines. Each job is to be processed by exactly

More information

Weighted- 1 minimization with multiple weighting sets

Weighted- 1 minimization with multiple weighting sets Weighted- 1 iniization with ultiple weighting sets Hassan Mansour a,b and Özgür Yılaza a Matheatics Departent, University of British Colubia, Vancouver - BC, Canada; b Coputer Science Departent, University

More information

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness A Note on Scheduling Tall/Sall Multiprocessor Tasks with Unit Processing Tie to Miniize Maxiu Tardiness Philippe Baptiste and Baruch Schieber IBM T.J. Watson Research Center P.O. Box 218, Yorktown Heights,

More information

Intelligent Systems: Reasoning and Recognition. Artificial Neural Networks

Intelligent Systems: Reasoning and Recognition. Artificial Neural Networks Intelligent Systes: Reasoning and Recognition Jaes L. Crowley MOSIG M1 Winter Seester 2018 Lesson 7 1 March 2018 Outline Artificial Neural Networks Notation...2 Introduction...3 Key Equations... 3 Artificial

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Notes for EE227C (Spring 2018): Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee227c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee227c@berkeley.edu October

More information

Upper bound on false alarm rate for landmine detection and classification using syntactic pattern recognition

Upper bound on false alarm rate for landmine detection and classification using syntactic pattern recognition Upper bound on false alar rate for landine detection and classification using syntactic pattern recognition Ahed O. Nasif, Brian L. Mark, Kenneth J. Hintz, and Nathalia Peixoto Dept. of Electrical and

More information

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and

More information

Estimating Parameters for a Gaussian pdf

Estimating Parameters for a Gaussian pdf Pattern Recognition and achine Learning Jaes L. Crowley ENSIAG 3 IS First Seester 00/0 Lesson 5 7 Noveber 00 Contents Estiating Paraeters for a Gaussian pdf Notation... The Pattern Recognition Proble...3

More information

arxiv: v1 [math.nt] 14 Sep 2014

arxiv: v1 [math.nt] 14 Sep 2014 ROTATION REMAINDERS P. JAMESON GRABER, WASHINGTON AND LEE UNIVERSITY 08 arxiv:1409.411v1 [ath.nt] 14 Sep 014 Abstract. We study properties of an array of nubers, called the triangle, in which each row

More information

Research Article On the Isolated Vertices and Connectivity in Random Intersection Graphs

Research Article On the Isolated Vertices and Connectivity in Random Intersection Graphs International Cobinatorics Volue 2011, Article ID 872703, 9 pages doi:10.1155/2011/872703 Research Article On the Isolated Vertices and Connectivity in Rando Intersection Graphs Yilun Shang Institute for

More information

Fairness via priority scheduling

Fairness via priority scheduling Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation

More information

In this chapter, we consider several graph-theoretic and probabilistic models

In this chapter, we consider several graph-theoretic and probabilistic models THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions

More information

Keywords: Estimator, Bias, Mean-squared error, normality, generalized Pareto distribution

Keywords: Estimator, Bias, Mean-squared error, normality, generalized Pareto distribution Testing approxiate norality of an estiator using the estiated MSE and bias with an application to the shape paraeter of the generalized Pareto distribution J. Martin van Zyl Abstract In this work the norality

More information

Probability Distributions

Probability Distributions Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples

More information

time time δ jobs jobs

time time δ jobs jobs Approxiating Total Flow Tie on Parallel Machines Stefano Leonardi Danny Raz y Abstract We consider the proble of optiizing the total ow tie of a strea of jobs that are released over tie in a ultiprocessor

More information

Computable Shell Decomposition Bounds

Computable Shell Decomposition Bounds Journal of Machine Learning Research 5 (2004) 529-547 Subitted 1/03; Revised 8/03; Published 5/04 Coputable Shell Decoposition Bounds John Langford David McAllester Toyota Technology Institute at Chicago

More information

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Proc. of the IEEE/OES Seventh Working Conference on Current Measureent Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Belinda Lipa Codar Ocean Sensors 15 La Sandra Way, Portola Valley, CA 98 blipa@pogo.co

More information

A Bernstein-Markov Theorem for Normed Spaces

A Bernstein-Markov Theorem for Normed Spaces A Bernstein-Markov Theore for Nored Spaces Lawrence A. Harris Departent of Matheatics, University of Kentucky Lexington, Kentucky 40506-0027 Abstract Let X and Y be real nored linear spaces and let φ :

More information

1 Bounding the Margin

1 Bounding the Margin COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #12 Scribe: Jian Min Si March 14, 2013 1 Bounding the Margin We are continuing the proof of a bound on the generalization error of AdaBoost

More information

Recovering Data from Underdetermined Quadratic Measurements (CS 229a Project: Final Writeup)

Recovering Data from Underdetermined Quadratic Measurements (CS 229a Project: Final Writeup) Recovering Data fro Underdeterined Quadratic Measureents (CS 229a Project: Final Writeup) Mahdi Soltanolkotabi Deceber 16, 2011 1 Introduction Data that arises fro engineering applications often contains

More information

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder Convolutional Codes Lecture Notes 8: Trellis Codes In this lecture we discuss construction of signals via a trellis. That is, signals are constructed by labeling the branches of an infinite trellis with

More information

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest

More information

Maximum Entropy Interval Aggregations

Maximum Entropy Interval Aggregations Maxiu Entropy Interval Aggregations Ferdinando Cicalese Università di Verona, Verona, Italy Eail: cclfdn@univr.it Ugo Vaccaro Università di Salerno, Salerno, Italy Eail: uvaccaro@unisa.it arxiv:1805.05375v1

More information

Bounds on the Minimax Rate for Estimating a Prior over a VC Class from Independent Learning Tasks

Bounds on the Minimax Rate for Estimating a Prior over a VC Class from Independent Learning Tasks Bounds on the Miniax Rate for Estiating a Prior over a VC Class fro Independent Learning Tasks Liu Yang Steve Hanneke Jaie Carbonell Deceber 01 CMU-ML-1-11 School of Coputer Science Carnegie Mellon University

More information

Introduction to Discrete Optimization

Introduction to Discrete Optimization Prof. Friedrich Eisenbrand Martin Nieeier Due Date: March 9 9 Discussions: March 9 Introduction to Discrete Optiization Spring 9 s Exercise Consider a school district with I neighborhoods J schools and

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2016 Lessons 7 14 Dec 2016 Outline Artificial Neural networks Notation...2 1. Introduction...3... 3 The Artificial

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation

More information

Upper and Lower Bounds on the Capacity of Wireless Optical Intensity Channels

Upper and Lower Bounds on the Capacity of Wireless Optical Intensity Channels ISIT7, Nice, France, June 4 June 9, 7 Upper and Lower Bounds on the Capacity of Wireless Optical Intensity Channels Ahed A. Farid and Steve Hranilovic Dept. Electrical and Coputer Engineering McMaster

More information

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES

More information

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp

More information

arxiv: v1 [cs.ds] 3 Feb 2014

arxiv: v1 [cs.ds] 3 Feb 2014 arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/

More information

Kernel Methods and Support Vector Machines

Kernel Methods and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley ENSIAG 2 / osig 1 Second Seester 2012/2013 Lesson 20 2 ay 2013 Kernel ethods and Support Vector achines Contents Kernel Functions...2 Quadratic

More information

Sharp Time Data Tradeoffs for Linear Inverse Problems

Sharp Time Data Tradeoffs for Linear Inverse Problems Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used

More information

About the definition of parameters and regimes of active two-port networks with variable loads on the basis of projective geometry

About the definition of parameters and regimes of active two-port networks with variable loads on the basis of projective geometry About the definition of paraeters and regies of active two-port networks with variable loads on the basis of projective geoetry PENN ALEXANDR nstitute of Electronic Engineering and Nanotechnologies "D

More information

Machine Learning Basics: Estimators, Bias and Variance

Machine Learning Basics: Estimators, Bias and Variance Machine Learning Basics: Estiators, Bias and Variance Sargur N. srihari@cedar.buffalo.edu This is part of lecture slides on Deep Learning: http://www.cedar.buffalo.edu/~srihari/cse676 1 Topics in Basics

More information

On the Maximum Number of Codewords of X-Codes of Constant Weight Three

On the Maximum Number of Codewords of X-Codes of Constant Weight Three On the Maxiu Nuber of Codewords of X-Codes of Constant Weight Three arxiv:190.097v1 [cs.it] 2 Mar 2019 Yu Tsunoda Graduate School of Science and Engineering Chiba University 1- Yayoi-Cho Inage-Ku, Chiba

More information

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China 6th International Conference on Machinery, Materials, Environent, Biotechnology and Coputer (MMEBC 06) Solving Multi-Sensor Multi-Target Assignent Proble Based on Copositive Cobat Efficiency and QPSO Algorith

More information

IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 60, NO. 2, FEBRUARY ETSP stands for the Euclidean traveling salesman problem.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 60, NO. 2, FEBRUARY ETSP stands for the Euclidean traveling salesman problem. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 60, NO., FEBRUARY 015 37 Target Assignent in Robotic Networks: Distance Optiality Guarantees and Hierarchical Strategies Jingjin Yu, Meber, IEEE, Soon-Jo Chung,

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

Constant-Space String-Matching. in Sublinear Average Time. (Extended Abstract) Wojciech Rytter z. Warsaw University. and. University of Liverpool

Constant-Space String-Matching. in Sublinear Average Time. (Extended Abstract) Wojciech Rytter z. Warsaw University. and. University of Liverpool Constant-Space String-Matching in Sublinear Average Tie (Extended Abstract) Maxie Crocheore Universite de Marne-la-Vallee Leszek Gasieniec y Max-Planck Institut fur Inforatik Wojciech Rytter z Warsaw University

More information

Bipartite subgraphs and the smallest eigenvalue

Bipartite subgraphs and the smallest eigenvalue Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.

More information

The Transactional Nature of Quantum Information

The Transactional Nature of Quantum Information The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.

More information

On the Analysis of the Quantum-inspired Evolutionary Algorithm with a Single Individual

On the Analysis of the Quantum-inspired Evolutionary Algorithm with a Single Individual 6 IEEE Congress on Evolutionary Coputation Sheraton Vancouver Wall Centre Hotel, Vancouver, BC, Canada July 16-1, 6 On the Analysis of the Quantu-inspired Evolutionary Algorith with a Single Individual

More information

On Conditions for Linearity of Optimal Estimation

On Conditions for Linearity of Optimal Estimation On Conditions for Linearity of Optial Estiation Erah Akyol, Kuar Viswanatha and Kenneth Rose {eakyol, kuar, rose}@ece.ucsb.edu Departent of Electrical and Coputer Engineering University of California at

More information

Homework 3 Solutions CSE 101 Summer 2017

Homework 3 Solutions CSE 101 Summer 2017 Hoework 3 Solutions CSE 0 Suer 207. Scheduling algoriths The following n = 2 jobs with given processing ties have to be scheduled on = 3 parallel and identical processors with the objective of iniizing

More information

Compressive Sensing Over Networks

Compressive Sensing Over Networks Forty-Eighth Annual Allerton Conference Allerton House, UIUC, Illinois, USA Septeber 29 - October, 200 Copressive Sensing Over Networks Soheil Feizi MIT Eail: sfeizi@it.edu Muriel Médard MIT Eail: edard@it.edu

More information

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,

More information

Necessity of low effective dimension

Necessity of low effective dimension Necessity of low effective diension Art B. Owen Stanford University October 2002, Orig: July 2002 Abstract Practitioners have long noticed that quasi-monte Carlo ethods work very well on functions that

More information

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography Tight Bounds for axial Identifiability of Failure Nodes in Boolean Network Toography Nicola Galesi Sapienza Università di Roa nicola.galesi@uniroa1.it Fariba Ranjbar Sapienza Università di Roa fariba.ranjbar@uniroa1.it

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information Cite as: Straub D. (2014). Value of inforation analysis with structural reliability ethods. Structural Safety, 49: 75-86. Value of Inforation Analysis with Structural Reliability Methods Daniel Straub

More information

Supplementary Material for Fast and Provable Algorithms for Spectrally Sparse Signal Reconstruction via Low-Rank Hankel Matrix Completion

Supplementary Material for Fast and Provable Algorithms for Spectrally Sparse Signal Reconstruction via Low-Rank Hankel Matrix Completion Suppleentary Material for Fast and Provable Algoriths for Spectrally Sparse Signal Reconstruction via Low-Ran Hanel Matrix Copletion Jian-Feng Cai Tianing Wang Ke Wei March 1, 017 Abstract We establish

More information

Approximation in Stochastic Scheduling: The Power of LP-Based Priority Policies

Approximation in Stochastic Scheduling: The Power of LP-Based Priority Policies Approxiation in Stochastic Scheduling: The Power of -Based Priority Policies Rolf Möhring, Andreas Schulz, Marc Uetz Setting (A P p stoch, r E( w and (B P p stoch E( w We will assue that the processing

More information

Iterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel

Iterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel 1 Iterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel Rai Cohen, Graduate Student eber, IEEE, and Yuval Cassuto, Senior eber, IEEE arxiv:1510.05311v2 [cs.it] 24 ay 2016 Abstract In

More information

Testing equality of variances for multiple univariate normal populations

Testing equality of variances for multiple univariate normal populations University of Wollongong Research Online Centre for Statistical & Survey Methodology Working Paper Series Faculty of Engineering and Inforation Sciences 0 esting equality of variances for ultiple univariate

More information

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40 On Poset Merging Peter Chen Guoli Ding Steve Seiden Abstract We consider the follow poset erging proble: Let X and Y be two subsets of a partially ordered set S. Given coplete inforation about the ordering

More information

Solutions of some selected problems of Homework 4

Solutions of some selected problems of Homework 4 Solutions of soe selected probles of Hoework 4 Sangchul Lee May 7, 2018 Proble 1 Let there be light A professor has two light bulbs in his garage. When both are burned out, they are replaced, and the next

More information

A Note on Online Scheduling for Jobs with Arbitrary Release Times

A Note on Online Scheduling for Jobs with Arbitrary Release Times A Note on Online Scheduling for Jobs with Arbitrary Release Ties Jihuan Ding, and Guochuan Zhang College of Operations Research and Manageent Science, Qufu Noral University, Rizhao 7686, China dingjihuan@hotail.co

More information

Finite-State Markov Modeling of Flat Fading Channels

Finite-State Markov Modeling of Flat Fading Channels International Telecounications Syposiu ITS, Natal, Brazil Finite-State Markov Modeling of Flat Fading Channels Cecilio Pientel, Tiago Falk and Luciano Lisbôa Counications Research Group - CODEC Departent

More information

When Short Runs Beat Long Runs

When Short Runs Beat Long Runs When Short Runs Beat Long Runs Sean Luke George Mason University http://www.cs.gu.edu/ sean/ Abstract What will yield the best results: doing one run n generations long or doing runs n/ generations long

More information

Lec 05 Arithmetic Coding

Lec 05 Arithmetic Coding Outline CS/EE 5590 / ENG 40 Special Topics (7804, 785, 7803 Lec 05 Arithetic Coding Lecture 04 ReCap Arithetic Coding About Hoework- and Lab Zhu Li Course Web: http://l.web.ukc.edu/lizhu/teaching/06sp.video-counication/ain.htl

More information

On Process Complexity

On Process Complexity On Process Coplexity Ada R. Day School of Matheatics, Statistics and Coputer Science, Victoria University of Wellington, PO Box 600, Wellington 6140, New Zealand, Eail: ada.day@cs.vuw.ac.nz Abstract Process

More information

Transformation-invariant Collaborative Sub-representation

Transformation-invariant Collaborative Sub-representation Transforation-invariant Collaborative Sub-representation Yeqing Li, Chen Chen, Jungzhou Huang Departent of Coputer Science and Engineering University of Texas at Arlington, Texas 769, USA. Eail: yeqing.li@avs.uta.edu,

More information

ma x = -bv x + F rod.

ma x = -bv x + F rod. Notes on Dynaical Systes Dynaics is the study of change. The priary ingredients of a dynaical syste are its state and its rule of change (also soeties called the dynaic). Dynaical systes can be continuous

More information

New Slack-Monotonic Schedulability Analysis of Real-Time Tasks on Multiprocessors

New Slack-Monotonic Schedulability Analysis of Real-Time Tasks on Multiprocessors New Slack-Monotonic Schedulability Analysis of Real-Tie Tasks on Multiprocessors Risat Mahud Pathan and Jan Jonsson Chalers University of Technology SE-41 96, Göteborg, Sweden {risat, janjo}@chalers.se

More information

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm Acta Polytechnica Hungarica Vol., No., 04 Sybolic Analysis as Universal Tool for Deriving Properties of Non-linear Algoriths Case study of EM Algorith Vladiir Mladenović, Miroslav Lutovac, Dana Porrat

More information

Efficient Filter Banks And Interpolators

Efficient Filter Banks And Interpolators Efficient Filter Banks And Interpolators A. G. DEMPSTER AND N. P. MURPHY Departent of Electronic Systes University of Westinster 115 New Cavendish St, London W1M 8JS United Kingdo Abstract: - Graphical

More information