The Entropy Rounding Method in Approximation Algorithms
|
|
- Francis Goodman
- 5 years ago
- Views:
Transcription
1 The Entropy Rounding Method in Approximation Algorithms Thomas Rothvoß Department of Mathematics, M.I.T. SODA 2012
2 A general LP rounding problem Problem: Given: A R n m, fractional solution x [0,1] m Find: y {0,1} m : Ax Ay
3 A general LP rounding problem Problem: Given: A R n m, fractional solution x [0,1] m Find: y {0,1} m : Ax Ay General strategies: Randomized rounding: Flip Pr[y i = 1] = x i (in)dependently
4 A general LP rounding problem Problem: Given: A R n m, fractional solution x [0,1] m Find: y {0,1} m : Ax Ay General strategies: Randomized rounding: Flip Pr[y i = 1] = x i (in)dependently Use properties of basic solutions: supp(x) #rows(a)
5 A general LP rounding problem Problem: Given: A R n m, fractional solution x [0,1] m Find: y {0,1} m : Ax Ay General strategies: Randomized rounding: Flip Pr[y i = 1] = x i (in)dependently Use properties of basic solutions: supp(x) #rows(a) Try another way: Entropy rounding method based on discrepancy theory
6 A schematic view Input: x [0,1] m, matrix A Bansal algorithm Lovász, Spencer & Entropy. Vesztergombi Theoremrounding Beck s entropy method Output: y {0,1} m with Ax Ay small
7 A schematic view Input: x [0,1] m, matrix A Lovász, Spencer &. Vesztergombi Theorem Bansal algorithm Beck s entropy method Output: y {0,1} m with Ax Ay small
8 A schematic view Input: x [0,1] m, matrix A Lovász, Spencer &. Vesztergombi Theorem Bansal algorithm Beck s entropy method Output: y {0,1} m with Ax Ay small
9 A schematic view Input: x [0,1] m, matrix A Lovász, Spencer &. Vesztergombi Theorem Bansal algorithm Beck s entropy method Output: y {0,1} m with Ax Ay small
10 Discrepancy theory Set system S = {S 1,...,S m },S i [n] i S
11 Discrepancy theory Set system S = {S 1,...,S m },S i [n] Coloring χ : [n] { 1,+1} i S
12 Discrepancy theory Set system S = {S 1,...,S m },S i [n] Coloring χ : [n] { 1,+1} Discrepancy disc(s) = min max χ(s). χ:[n] {±1} S S i S where χ(s) = i S χ(i).
13 Discrepancy theory Set system S = {S 1,...,S m },S i [n] Coloring χ : [n] { 1,+1} Discrepancy disc(s) = min max χ(s). χ:[n] {±1} S S i S where χ(s) = i S χ(i). Known results: n sets, n elements: disc(s) = O( n) [Spencer 85]
14 Discrepancy theory Set system S = {S 1,...,S m },S i [n] Coloring χ : [n] { 1,+1} Discrepancy disc(s) = min max χ(s). χ:[n] {±1} S S i S where χ(s) = i S χ(i). Known results: n sets, n elements: disc(s) = O( n) [Spencer 85] Every element in t sets: disc(s) < 2t [Beck & Fiala 81] Conjecture: disc(s) O( t)
15 Discrepancy theory Set system S = {S 1,...,S m },S i [n] Coloring χ : [n] { 1,+1} Discrepancy disc(s) = min max χ(s). χ:[n] {±1} S S i S where χ(s) = i S χ(i). Known results: n sets, n elements: disc(s) = O( n) [Spencer 85] Every element in t sets: disc(s) < 2t [Beck & Fiala 81] Conjecture: disc(s) O( t) More definitions: Half coloring: χ : [n] {0, 1,+1}, supp(χ) n/2
16 Discrepancy theory Set system S = {S 1,...,S m },S i [n] Coloring χ : [n] { 1,+1} Discrepancy disc(s) = min max χ(s). χ:[n] {±1} S S i S where χ(s) = i S χ(i). Known results: n sets, n elements: disc(s) = O( n) [Spencer 85] Every element in t sets: disc(s) < 2t [Beck & Fiala 81] Conjecture: disc(s) O( t) More definitions: Half coloring: χ : [n] {0, 1,+1}, supp(χ) n/2 For matrix A: disc(a) = min χ {±1} n Aχ
17 The LSV-Theorem Theorem (Lovász, Spencer & Vesztergombi 86) Given A R n m,x [0,1] m. Suppose for any A A, coloring χ : A χ. Then y {0,1} m with Ax Ay.
18 The LSV-Theorem Theorem (Lovász, Spencer & Vesztergombi 86) Given A R n m,x [0,1] m. Suppose for any A A, coloring χ : A χ. Then y {0,1} m with Ax Ay. Suffices to find good matrix colorings!
19 The LSV-Theorem Theorem (Lovász, Spencer & Vesztergombi 86) Given A R n m,x [0,1] m. Suppose for any A A, half coloring χ : A χ. Then y {0,1} m with Ax Ay log m. Suffices to find good matrix half colorings!
20 A schematic view Input: x [0,1] m, matrix A Lovász, Spencer &. Vesztergombi Theorem Bansal algorithm Beck s entropy method Output: y {0,1} m with Ax Ay small
21 Entropy Definition For random variable Z, the entropy is H(Z) = ( ) 1 Pr[Z = z] log 2 Pr[Z = z] z
22 Entropy Definition For random variable Z, the entropy is H(Z) = ( ) 1 Pr[Z = z] log 2 Pr[Z = z] z Properties: One likely event: z : Pr[Z = z] ( 1 2 )H(Z)
23 Entropy Definition For random variable Z, the entropy is H(Z) = ( ) 1 Pr[Z = z] log 2 Pr[Z = z] z Properties: One likely event: z : Pr[Z = z] ( 1 2 )H(Z) Subadditivity: H(f(Z,Z )) H(Z)+H(Z ).
24 Theorem [Beck s entropy method] ) m 5 half-coloring χ0 : Aχ 0. H χ i {±1} ( Aχ A = m ( ) A 2 χ A 1 χ {±1} m
25 Theorem [Beck s entropy method] ) m 5 half-coloring χ0 : Aχ 0. H χ i {±1} ( Aχ A = m ( ) A 2 χ A 1 χ {±1} m
26 Theorem [Beck s entropy method] ) m 5 half-coloring χ0 : Aχ 0. H χ i {±1} ( Aχ A = m ( ) A 2 χ A 1 χ {±1} m
27 Theorem [Beck s entropy method] ) m 5 half-coloring χ0 : Aχ 0. H χ i {±1} ( Aχ A = {±1} m m ( ) A 2 χ A 1 χ
28 Theorem [Beck s entropy method] ) m 5 half-coloring χ0 : Aχ 0. H χ i {±1} ( Aχ A = {±1} m m ( ) A 2 χ A 1 χ
29 Theorem [Beck s entropy method] ) m 5 half-coloring χ0 : Aχ 0. H χ i {±1} ( Aχ A 2 χ A = {±1} m m ( ) A 1 χ
30 Theorem [Beck s entropy method] ) m 5 half-coloring χ0 : Aχ 0. H χ i {±1} ( Aχ A 2 χ A = {±1} m m ( ) A 1 χ
31 Theorem [Beck s entropy method] ) m 5 half-coloring χ0 : Aχ 0. H χ i {±1} ( Aχ A 2 χ A = {±1} m m ( ) A 1 χ
32 Theorem [Beck s entropy method] ) m 5 half-coloring χ0 : Aχ 0. H χ i {±1} ( Aχ A 2 χ A = {±1} m m ( ) A 1 χ
33 Theorem [Beck s entropy method] ) m 5 half-coloring χ0 : Aχ 0. H χ i {±1} ( Aχ cell : Pr[Aχ cell] ( 1 2 )m/5. A 2 χ A = {±1} m m ( ) A 1 χ
34 Theorem [Beck s entropy method] ) m 5 half-coloring χ0 : Aχ 0. H χ i {±1} ( Aχ cell : Pr[Aχ cell] ( 1 2 )m/5. At least 2 m ( 1 2 )m/5 = 2 0.8m colorings χ have Aχ cell A 2 χ A = m ( ) A 1 χ {±1} m
35 Theorem [Beck s entropy method] ) m 5 half-coloring χ0 : Aχ 0. H χ i {±1} ( Aχ cell : Pr[Aχ cell] ( 1 2 )m/5. At least 2 m ( 1 2 )m/5 = 2 0.8m colorings χ have Aχ cell Pick χ 1,χ 2 differing in half of entries A = {±1} m χ 2 m ( ) χ 1 A 2 χ Aχ 1 Aχ 2 A 1 χ
36 Theorem [Beck s entropy method] ) m 5 half-coloring χ0 : Aχ 0. H χ i {±1} ( Aχ cell : Pr[Aχ cell] ( 1 2 )m/5. At least 2 m ( 1 2 )m/5 = 2 0.8m colorings χ have Aχ cell Pick χ 1,χ 2 differing in half of entries Define χ 0 (i) := 1 2 (χ1 (i) χ 2 (i)) {0,±1}. A = {±1} m χ 2 m ( ) χ 1 A 2 χ Aχ 1 Aχ 2 A 1 χ
37 Theorem [Beck s entropy method] ) m 5 half-coloring χ0 : Aχ 0. H χ i {±1} ( Aχ cell : Pr[Aχ cell] ( 1 2 )m/5. At least 2 m ( 1 2 )m/5 = 2 0.8m colorings χ have Aχ cell Pick χ 1,χ 2 differing in half of entries Define χ 0 (i) := 1 2 (χ1 (i) χ 2 (i)) {0,±1}. Then Aχ Aχ1 Aχ 2. A 2 χ A = {±1} m χ 2 m ( ) χ 1 Aχ 1 Aχ 2 A 1 χ
38 A bound on the entropy Let α = (α 1,...,α m ) R m. j Consider Z := χ(j) α j λ α 2 with χ(j) {±1} at random
39 A bound on the entropy Let α = (α 1,...,α m ) R m. j Consider Z := χ(j) α j λ α 2 with χ(j) {±1} at random 1 Pr[Z = 0] 0 1 λ
40 A bound on the entropy Let α = (α 1,...,α m ) R m. j Consider Z := χ(j) α j λ α 2 with χ(j) {±1} at random 1 Pr[Z = 0] 0 H(Z) 1 λ e Ω(λ2 ) 1 λ
41 A bound on the entropy Let α = (α 1,...,α m ) R m. j Consider Z := χ(j) α j λ α 2 with χ(j) {±1} at random 1 Pr[Z = 0] 0 H(Z) 1 λ O(log( 1 λ )) e Ω(λ2 ) 1 λ
42 A bound on the entropy Let α = (α 1,...,α m ) R m. j Consider Z := χ(j) α j λ α 2 with χ(j) {±1} at random 1 Pr[Z = 0] 0 H(Z) 1 λ O(log( 1 λ )) randomized rounding e Ω(λ2 ) 1 λ
43 A schematic view Input: x [0,1] m, matrix A Lovász, Spencer &. Vesztergombi Theorem Bansal algorithm Beck s entropy method Output: y {0,1} m with Ax Ay small
44 A general rounding theorem Theorem Input: matrix A [ 1,1] n m, i > 0 satisfying entropy condition for all submatrices vector x [0,1] m row weights w(i) ( iw(i) = 1) There is a random variable y {0,1} m with Bounded difference: Ai x A i y O(log(m)) i Ai x A i y O( 1/w(i)) Preserved expectation: E[y i ] = x i.
45 Bin Packing With Rejection Input: Items i {1,...,n} with size s i [0,1], and rejection penalty π i [0,1] Goal: Pack or reject. Minimize # bins + rejection cost. 1 0 bin 1 bin 2 1 s i input π i
46 Bin Packing With Rejection Input: Items i {1,...,n} with size s i [0,1], and rejection penalty π i [0,1] Goal: Pack or reject. Minimize # bins + rejection cost. 1 0 bin 1 bin 2 1 s i input π i
47 Bin Packing With Rejection Input: Items i {1,...,n} with size s i [0,1], and rejection penalty π i [0,1] Goal: Pack or reject. Minimize # bins + rejection cost s i bin 1 bin 2 π i input
48 Bin Packing With Rejection Input: Items i {1,...,n} with size s i [0,1], and rejection penalty π i [0,1] Goal: Pack or reject. Minimize # bins + rejection cost s i bin 1 bin 2 π i input
49 Bin Packing With Rejection Input: Items i {1,...,n} with size s i [0,1], and rejection penalty π i [0,1] Goal: Pack or reject. Minimize # bins + rejection cost s i bin 1 bin 2 π i 0.7 input
50 The column-based LP Set Cover formulation: Bins: Sets S [n] with i S s i 1 of cost c(s) = 1 Rejections: Sets S = {i} of cost c(s) = π i LP: min c(s) x S S S 1 S x S 1 S S x S 0 S S
51 The column-based LP - Example 1 s i π i input
52 The column-based LP - Example 1 s i π i input min ( ) x x x 0
53 The column-based LP - Example 1 s i π i input min ( ) x x x 0 1/2 1/2 1/2
54 Our results Theorem There is a randomized poly-time approximation algorithm for Bin Packing With Rejection with (with high probability). APX OPT f +O(log 2 OPT f ) Previously best known: APX OPT f + [Epstein & Levin 10] OPT f (logopt f ) 1 o(1) As good as classical Bin Packing [Karmarkar & Karp 82]
55 The end Open question Are there more (convincing) applications?
56 The end Open question Are there more (convincing) applications? Thanks for your attention
Discrepancy Theory in Approximation Algorithms
Discrepancy Theory in Approximation Algorithms Rajat Sen, Soumya Basu May 8, 2015 1 Introduction In this report we would like to motivate the use of discrepancy theory in algorithms. Discrepancy theory
More informationarxiv: v3 [cs.ds] 10 Mar 2014
Approximating Bin Packing within O(logOPT loglogopt ) bins Thomas Rothvoß arxiv:1301.4010v3 [cs.ds] 10 Mar 2014 Massachusetts Institute of Technology Abstract For bin packing, the input consists of n items
More informationThe Entropy Rounding Method in Approximation Algorithms
The Entropy Rounding Method in Approximation Algorithms Thomas Rothvoß Abstract LetAbe a matrix,cbe any linear objective function and x be a fractional vector, say an LP solution to some discrete optimization
More informationLecture Constructive Algorithms for Discrepancy Minimization
Approximation Algorithms Workshop June 13, 2011, Princeton Lecture Constructive Algorithms for Discrepancy Minimization Nikhil Bansal Scribe: Daniel Dadush 1 Combinatorial Discrepancy Given a universe
More informationMatrix approximation and Tusnády s problem
European Journal of Combinatorics 28 (2007) 990 995 www.elsevier.com/locate/ejc Matrix approximation and Tusnády s problem Benjamin Doerr Max-Planck-Institut für Informatik, Stuhlsatzenhausweg 85, 66123
More informationHereditary discrepancy and factorization norms
Hereditary discrepancy and factorization norms organized by Aleksandar Nikolov and Kunal Talwar Workshop Summary Background and Goals This workshop was devoted to the application of methods from functional
More informationA Fast Asymptotic Approximation Scheme for Bin Packing with Rejection
A Fast Asymptotic Approximation Scheme for Bin Packing with Rejection p. 1/3 A Fast Asymptotic Approximation Scheme for Bin Packing with Rejection Wolfgang Bein 1, José R. Correa 2, Xin Han 3 1 School
More informationThe discrepancy of permutation families
The discrepancy of permutation families J. H. Spencer A. Srinivasan P. Tetali Abstract In this note, we show that the discrepancy of any family of l permutations of [n] = {1, 2,..., n} is O( l log n),
More informationarxiv: v2 [cs.ds] 11 Oct 2012
Constructive Discrepancy Minimization by Walking on The Edges Shachar Lovett Institute for Advanced Study slovett@math.ias.edu Raghu Meka Institute for Advanced Study raghu@math.ias.edu arxiv:1203.5747v2
More informationBetter Algorithms and Hardness for Broadcast Scheduling via a Discrepancy Approach
Better Algorithms and Hardness for Broadcast Scheduling via a Discrepancy Approach Nikhil Bansal Moses Charikar Ravishankar Krishnaswamy Shi Li Abstract We study the broadcast scheduling problem with the
More informationApproximation Preserving Reductions
Approximation Preserving Reductions - Memo Summary - AP-reducibility - L-reduction technique - Complete problems - Examples: MAXIMUM CLIQUE, MAXIMUM INDEPENDENT SET, MAXIMUM 2-SAT, MAXIMUM NAE 3-SAT, MAXIMUM
More informationCS6999 Probabilistic Methods in Integer Programming Randomized Rounding Andrew D. Smith April 2003
CS6999 Probabilistic Methods in Integer Programming Randomized Rounding April 2003 Overview 2 Background Randomized Rounding Handling Feasibility Derandomization Advanced Techniques Integer Programming
More informationRandomized Algorithms Week 2: Tail Inequalities
Randomized Algorithms Week 2: Tail Inequalities Rao Kosaraju In this section, we study three ways to estimate the tail probabilities of random variables. Please note that the more information we know about
More informationA Robust APTAS for the Classical Bin Packing Problem
A Robust APTAS for the Classical Bin Packing Problem Leah Epstein 1 and Asaf Levin 2 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. Email: lea@math.haifa.ac.il 2 Department of Statistics,
More information1 The linear algebra of linear programs (March 15 and 22, 2015)
1 The linear algebra of linear programs (March 15 and 22, 2015) Many optimization problems can be formulated as linear programs. The main features of a linear program are the following: Variables are real
More informationTight Hardness Results for Minimizing Discrepancy
Tight Hardness Results for Minimizing Discrepancy Moses Charikar Alantha Newman Aleksandar Nikolov Abstract In the Discrepancy problem, we are given M sets {S 1,..., S M } on N elements. Our goal is to
More informationTight Hardness Results for Minimizing Discrepancy
Tight Hardness Results for Minimizing Discrepancy Moses Charikar Alantha Newman Aleksandar Nikolov January 13, 2011 Abstract In the Discrepancy problem, we are given M sets {S 1,..., S M } on N elements.
More informationWelfare Maximization with Friends-of-Friends Network Externalities
Welfare Maximization with Friends-of-Friends Network Externalities Extended version of a talk at STACS 2015, Munich Wolfgang Dvořák 1 joint work with: Sayan Bhattacharya 2, Monika Henzinger 1, Martin Starnberger
More informationApproximation Basics
Approximation Basics, Concepts, and Examples Xiaofeng Gao Department of Computer Science and Engineering Shanghai Jiao Tong University, P.R.China Fall 2012 Special thanks is given to Dr. Guoqiang Li for
More information/ / MET Day 000 NC1^ INRTL MNVR I E E PRE SLEEP K PRE SLEEP R E
05//0 5:26:04 09/6/0 (259) 6 7 8 9 20 2 22 2 09/7 0 02 0 000/00 0 02 0 04 05 06 07 08 09 0 2 ay 000 ^ 0 X Y / / / / ( %/ ) 2 /0 2 ( ) ^ 4 / Y/ 2 4 5 6 7 8 9 2 X ^ X % 2 // 09/7/0 (260) ay 000 02 05//0
More informationApproximation Algorithms for the k-set Packing Problem
Approximation Algorithms for the k-set Packing Problem Marek Cygan Institute of Informatics University of Warsaw 20th October 2016, Warszawa Marek Cygan Approximation Algorithms for the k-set Packing Problem
More informationU.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 12 Luca Trevisan October 3, 2017
U.C. Berkeley CS94: Beyond Worst-Case Analysis Handout 1 Luca Trevisan October 3, 017 Scribed by Maxim Rabinovich Lecture 1 In which we begin to prove that the SDP relaxation exactly recovers communities
More informationPREEMPTIVE RESOURCE CONSTRAINED SCHEDULING WITH TIME-WINDOWS
PREEMPTIVE RESOURCE CONSTRAINED SCHEDULING WITH TIME-WINDOWS Kanthi Sarpatwar IBM Research Joint Work With: Baruch Schieber (IBM Research) Hadas Shachnai (Technion) Kanthi Kiran Sarpatwar 1 / 22 Introduction
More informationLecture 13 October 6, Covering Numbers and Maurey s Empirical Method
CS 395T: Sublinear Algorithms Fall 2016 Prof. Eric Price Lecture 13 October 6, 2016 Scribe: Kiyeon Jeon and Loc Hoang 1 Overview In the last lecture we covered the lower bound for p th moment (p > 2) and
More informationAlgorithms. Outline! Approximation Algorithms. The class APX. The intelligence behind the hardware. ! Based on
6117CIT - Adv Topics in Computing Sci at Nathan 1 Algorithms The intelligence behind the hardware Outline! Approximation Algorithms The class APX! Some complexity classes, like PTAS and FPTAS! Illustration
More informationLecture 11 October 7, 2013
CS 4: Advanced Algorithms Fall 03 Prof. Jelani Nelson Lecture October 7, 03 Scribe: David Ding Overview In the last lecture we talked about set cover: Sets S,..., S m {,..., n}. S has cost c S. Goal: Cover
More informationClosest String and Closest Substring Problems
January 8, 2010 Problem Formulation Problem Statement I Closest String Given a set S = {s 1, s 2,, s n } of strings each length m, find a center string s of length m minimizing d such that for every string
More informationSome Open Problems in Approximation Algorithms
Some Open Problems in Approximation Algorithms David P. Williamson School of Operations Research and Information Engineering Cornell University November 2, 2010 Egerváry Research Group on Combinatorial
More informationTechnische Universität München, Zentrum Mathematik Lehrstuhl für Angewandte Geometrie und Diskrete Mathematik. Combinatorial Optimization (MA 4502)
Technische Universität München, Zentrum Mathematik Lehrstuhl für Angewandte Geometrie und Diskrete Mathematik Combinatorial Optimization (MA 4502) Dr. Michael Ritter Problem Sheet 1 Homework Problems Exercise
More informationSome Open Problems in Approximation Algorithms
Some Open Problems in Approximation Algorithms David P. Williamson School of Operations Research and Information Engineering Cornell University February 28, 2011 University of Bonn Bonn, Germany David
More informationA robust APTAS for the classical bin packing problem
A robust APTAS for the classical bin packing problem Leah Epstein Asaf Levin Abstract Bin packing is a well studied problem which has many applications. In this paper we design a robust APTAS for the problem.
More informationLecture 5: Probabilistic tools and Applications II
T-79.7003: Graphs and Networks Fall 2013 Lecture 5: Probabilistic tools and Applications II Lecturer: Charalampos E. Tsourakakis Oct. 11, 2013 5.1 Overview In the first part of today s lecture we will
More informationInteger Linear Programs
Lecture 2: Review, Linear Programming Relaxations Today we will talk about expressing combinatorial problems as mathematical programs, specifically Integer Linear Programs (ILPs). We then see what happens
More informationRoundings Respecting Hard Constraints
Roundings Respecting Hard Constraints Benjamin Doerr Mathematisches Seminar II, Christian Albrechts Universität zu Kiel, D 24098 Kiel, Germany, bed@numerik.uni-kiel.de Abstract. A problem arising in integer
More informationOn the Approximability of the Maximum Interval Constrained Coloring Problem
S. Canzar 1 K. Elbassioni 2 A. Elmasry 3 R. Raman 4 On the Approximability of the Maximum Interval Constrained Coloring Problem 1 Centrum Wiskunde & Informatica, Amsterdam, The Netherlands 2 Max-Planck-Institut
More informationAsymptotic Polynomial-Time Approximation (APTAS) and Randomized Approximation Algorithms
Approximation Algorithms Asymptotic Polynomial-Time Approximation (APTAS) and Randomized Approximation Algorithms Jens Egeblad November 29th, 2006 Agenda First lesson (Asymptotic Approximation): Bin-Packing
More informationCS Foundations of Communication Complexity
CS 49 - Foundations of Communication Complexity Lecturer: Toniann Pitassi 1 The Discrepancy Method Cont d In the previous lecture we ve outlined the discrepancy method, which is a method for getting lower
More informationRandomized algorithm
Tutorial 4 Joyce 2009-11-24 Outline Solution to Midterm Question 1 Question 2 Question 1 Question 2 Question 3 Question 4 Question 5 Solution to Midterm Solution to Midterm Solution to Midterm Question
More informationPoly-APX- and PTAS-completeness in standard and differential approximation
Poly-APX- and PTAS-completeness in standard and differential approximation (Extended abstract) Cristina Bazgan, Bruno Escoffier, and Vangelis Th. Paschos LAMSADE, Université Paris-Dauphine, Place du Maréchal
More informationLinear Sketches A Useful Tool in Streaming and Compressive Sensing
Linear Sketches A Useful Tool in Streaming and Compressive Sensing Qin Zhang 1-1 Linear sketch Random linear projection M : R n R k that preserves properties of any v R n with high prob. where k n. M =
More informationNotes on the decomposition result of Karlin et al. [2] for the hierarchy of Lasserre by M. Laurent, December 13, 2012
Notes on the decomposition result of Karlin et al. [2] for the hierarchy of Lasserre by M. Laurent, December 13, 2012 We present the decomposition result of Karlin et al. [2] for the hierarchy of Lasserre
More information2 Natural Proofs: a barrier for proving circuit lower bounds
Topics in Theoretical Computer Science April 4, 2016 Lecturer: Ola Svensson Lecture 6 (Notes) Scribes: Ola Svensson Disclaimer: These notes were written for the lecturer only and may contain inconsistent
More informationKnapsack. Bag/knapsack of integer capacity B n items item i has size s i and profit/weight w i
Knapsack Bag/knapsack of integer capacity B n items item i has size s i and profit/weight w i Goal: find a subset of items of maximum profit such that the item subset fits in the bag Knapsack X: item set
More informationOn the Beck-Fiala Conjecture for Random Set Systems
On the Beck-Fiala Conjecture for Random Set Systems Esther Ezra Shachar Lovett arxiv:1511.00583v1 [math.co] 2 Nov 2015 November 3, 2015 Abstract Motivated by the Beck-Fiala conjecture, we study discrepancy
More informationMTH 215: Introduction to Linear Algebra
MTH 215: Introduction to Linear Algebra Lecture 5 Jonathan A. Chávez Casillas 1 1 University of Rhode Island Department of Mathematics September 20, 2017 1 LU Factorization 2 3 4 Triangular Matrices Definition
More informationarxiv: v1 [cs.ds] 3 Dec 2012
The Geometry of Differential Privacy: The Sparse and Approximate Cases Aleksandar Nikolov Kunal Talwar Li Zhang arxiv:1212.0297v1 [cs.ds] 3 Dec 2012 Abstract In this work, we study trade-offs between accuracy
More informationTopics on Computing and Mathematical Sciences I Graph Theory (6) Coloring I
Topics on Computing and Mathematical Sciences I Graph Theory (6) Coloring I Yoshio Okamoto Tokyo Institute of Technology May, 008 Last updated: Wed May 6: 008 Y. Okamoto (Tokyo Tech) TCMSI Graph Theory
More informationBalancing Vectors in Any Norm
2018 IEEE 59th Annual Symposium on Foundations of Computer Science Balancing Vectors in Any Norm Daniel Dadush, Aleksandar Nikolov, Kunal Talwar, Nicole Tomczak-Jaegermann Centrum Wiskunde & Informatica,
More informationCommunication Complexity
Communication Complexity Jie Ren Adaptive Signal Processing and Information Theory Group Nov 3 rd, 2014 Jie Ren (Drexel ASPITRG) CC Nov 3 rd, 2014 1 / 77 1 E. Kushilevitz and N. Nisan, Communication Complexity,
More informationApproximation Algorithms
Approximation Algorithms What do you do when a problem is NP-complete? or, when the polynomial time solution is impractically slow? assume input is random, do expected performance. Eg, Hamiltonian path
More informationarxiv: v1 [math.co] 6 Aug 2014
Combinatorial discrepancy for boxes via the ellipsoid-infinity norm arxiv:408.376v [math.co] 6 Aug 204 Jiří Matoušek Department of Applied Mathematics Charles University, Malostranské nám. 25 8 00 Praha,
More informationCMPUT 675: Approximation Algorithms Fall 2014
CMPUT 675: Approximation Algorithms Fall 204 Lecture 25 (Nov 3 & 5): Group Steiner Tree Lecturer: Zachary Friggstad Scribe: Zachary Friggstad 25. Group Steiner Tree In this problem, we are given a graph
More informationVector Bin Packing with Multiple-Choice
Vector Bin Packing with Multiple-Choice Boaz Patt-Shamir Dror Rawitz boaz@eng.tau.ac.il rawitz@eng.tau.ac.il School of Electrical Engineering Tel Aviv University Tel Aviv 69978 Israel June 17, 2010 Abstract
More informationSome Open Problems in Approximation Algorithms
Some Open Problems in Approximation Algorithms David P. Williamson School of Operations Research and Information Engineering Cornell University August 18, 2011 APPROX 2011 David P. Williamson (Cornell
More informationPositive semidefinite rank
1/15 Positive semidefinite rank Hamza Fawzi (MIT, LIDS) Joint work with João Gouveia (Coimbra), Pablo Parrilo (MIT), Richard Robinson (Microsoft), James Saunderson (Monash), Rekha Thomas (UW) DIMACS Workshop
More informationChapter 10. Chapter 10. Multinomial Experiments and. Multinomial Experiments and Contingency Tables. Contingency Tables.
Chapter 10 Multinomial Experiments and Contingency Tables 1 Chapter 10 Multinomial Experiments and Contingency Tables 10-1 1 Overview 10-2 2 Multinomial Experiments: of-fitfit 10-3 3 Contingency Tables:
More informationAPTAS for Bin Packing
APTAS for Bin Packing Bin Packing has an asymptotic PTAS (APTAS) [de la Vega and Leuker, 1980] For every fixed ε > 0 algorithm outputs a solution of size (1+ε)OPT + 1 in time polynomial in n APTAS for
More informationOblivious randomized rounding
Oblivious randomized rounding Neal E. Young April 28, 2008 What would the world be like if... SAT is hard in the worst case, BUT... generating hard random instances of SAT is hard? Lipton, 1993 worst-case
More informationRainbow matchings. Existence and counting. Guillem Perarnau. Universitat Politècnica de Catalunya Departament de Matemàtica Aplicada IV
Rainbow matchings Existence and counting Guillem Perarnau Universitat Politècnica de Catalunya Departament de Matemàtica Aplicada IV 2nd September 2011 Budapest joint work with Oriol Serra Outline 1 The
More informationDirect product theorem for discrepancy
Direct product theorem for discrepancy Troy Lee Rutgers University Joint work with: Robert Špalek Direct product theorems Knowing how to compute f, how can you compute f f f? Obvious upper bounds: If can
More informationGenerating Randomized Roundings with Cardinality Constraints and Derandomizations
Generating Randomized Roundings with Cardinality Constraints and Derandomizations Benjamin Doerr, MPI Saarbrücken 1 Introduction to randomized rounding and its derandomization. 2 Cardinality constraints.
More informationPCP Course; Lectures 1, 2
PCP Course; Lectures 1, 2 Mario Szegedy September 10, 2011 Easy and Hard Problems Easy: Polynomial Time 5n; n 2 ; 4n 3 + n Hard: Super-polynomial Time n log n ; 2 n ; n! Proving that a problem is easy:
More informationA closest vector problem arising in radiation therapy planning
A closest vector problem arising in radiation therapy planning Céline Engelbeen, Samuel Fiorini, Antje Kiesel arxiv:0907.0138v2 [cs.dm] 26 Nov 2009 March 25, 2019 Abstract In this paper we consider the
More informationC&O 355 Mathematical Programming Fall 2010 Lecture 18. N. Harvey
C&O 355 Mathematical Programming Fall 2010 Lecture 18 N. Harvey Network Flow Topics Max Flow / Min Cut Theorem Total Unimodularity Directed Graphs & Incidence Matrices Proof of Max Flow / Min Cut Theorem
More informationA simple LP relaxation for the Asymmetric Traveling Salesman Problem
A simple LP relaxation for the Asymmetric Traveling Salesman Problem Thành Nguyen Cornell University, Center for Applies Mathematics 657 Rhodes Hall, Ithaca, NY, 14853,USA thanh@cs.cornell.edu Abstract.
More information4/12/2011. Chapter 8. NP and Computational Intractability. Directed Hamiltonian Cycle. Traveling Salesman Problem. Directed Hamiltonian Cycle
Directed Hamiltonian Cycle Chapter 8 NP and Computational Intractability Claim. G has a Hamiltonian cycle iff G' does. Pf. Suppose G has a directed Hamiltonian cycle Γ. Then G' has an undirected Hamiltonian
More informationPCPs and Inapproximability Gap-producing and Gap-Preserving Reductions. My T. Thai
PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions My T. Thai 1 1 Hardness of Approximation Consider a maximization problem Π such as MAX-E3SAT. To show that it is NP-hard to approximation
More informationOptimal File Sharing in Distributed Networks
Optimal File Sharing in Distributed Networks Moni Naor Ron M. Roth Abstract The following file distribution problem is considered: Given a network of processors represented by an undirected graph G = (V,
More informationAnswering Numeric Queries
Answering Numeric Queries The Laplace Distribution: Lap(b) is the probability distribution with p.d.f.: p x b) = 1 x exp 2b b i.e. a symmetric exponential distribution Y Lap b, E Y = b Pr Y t b = e t Answering
More information10 Karmarkars Algorithm
We want to solve the following linear program: min v = c t x subject to Ax = 0 and x. Here = {x R n e t x = 1, x 0} with e t = (1,..., 1) denotes the standard simplex in R n. Further assumptions: 1. A
More informationCS 598RM: Algorithmic Game Theory, Spring Practice Exam Solutions
CS 598RM: Algorithmic Game Theory, Spring 2017 1. Answer the following. Practice Exam Solutions Agents 1 and 2 are bargaining over how to split a dollar. Each agent simultaneously demands share he would
More informationClasses of Boolean Functions
Classes of Boolean Functions Nader H. Bshouty Eyal Kushilevitz Abstract Here we give classes of Boolean functions that considered in COLT. Classes of Functions Here we introduce the basic classes of functions
More informationHYPOTHESIS TESTING: THE CHI-SQUARE STATISTIC
1 HYPOTHESIS TESTING: THE CHI-SQUARE STATISTIC 7 steps of Hypothesis Testing 1. State the hypotheses 2. Identify level of significant 3. Identify the critical values 4. Calculate test statistics 5. Compare
More informationLecture 10 Algorithmic version of the local lemma
Lecture 10 Algorithmic version of the local lemma Uriel Feige Department of Computer Science and Applied Mathematics The Weizman Institute Rehovot 76100, Israel uriel.feige@weizmann.ac.il June 9, 2014
More informationThe Probabilistic Method
The Probabilistic Method Janabel Xia and Tejas Gopalakrishna MIT PRIMES Reading Group, mentors Gwen McKinley and Jake Wellens December 7th, 2018 Janabel Xia and Tejas Gopalakrishna Probabilistic Method
More informationCS154, Lecture 15: Cook-Levin Theorem SAT, 3SAT
CS154, Lecture 15: Cook-Levin Theorem SAT, 3SAT Definition: A language B is NP-complete if: 1. B NP 2. Every A in NP is poly-time reducible to B That is, A P B When this is true, we say B is NP-hard On
More informationON RANGE SEARCHING IN THE GROUP MODEL AND COMBINATORIAL DISCREPANCY
ON RANGE SEARCHING IN THE GROUP MODEL AND COMBINATORIAL DISCREPANCY KASPER GREEN LARSEN Abstract. In this paper we establish an intimate connection between dynamic range searching in the group model and
More informationApproximation Algorithms for Generalized Assignment Problems
The Open University of Israel Department of Mathematics and Computer Science Approximation Algorithms for Generalized Assignment Problems Thesis submitted as partial fulfillment of the requirements towards
More informationApproximation & Complexity
Summer school on semidefinite optimization Approximation & Complexity David Steurer Cornell University Part 1 September 6, 2012 Overview Part 1 Unique Games Conjecture & Basic SDP Part 2 SDP Hierarchies:
More informationDivide and Conquer. Maximum/minimum. Median finding. CS125 Lecture 4 Fall 2016
CS125 Lecture 4 Fall 2016 Divide and Conquer We have seen one general paradigm for finding algorithms: the greedy approach. We now consider another general paradigm, known as divide and conquer. We have
More informationHierarchies. 1. Lovasz-Schrijver (LS), LS+ 2. Sherali Adams 3. Lasserre 4. Mixed Hierarchy (recently used) Idea: P = conv(subset S of 0,1 n )
Hierarchies Today 1. Some more familiarity with Hierarchies 2. Examples of some basic upper and lower bounds 3. Survey of recent results (possible material for future talks) Hierarchies 1. Lovasz-Schrijver
More informationNon-Approximability Results (2 nd part) 1/19
Non-Approximability Results (2 nd part) 1/19 Summary - The PCP theorem - Application: Non-approximability of MAXIMUM 3-SAT 2/19 Non deterministic TM - A TM where it is possible to associate more than one
More informationDegree of Regularity of Linear Homogeneous Equations
Degree of Regularity of Linear Homogeneous Equations Kavish Gandhi, Noah Golowich and László Miklós Lovász October 4, 2018 arxiv:13097220v3 [mathco] 27 Jan 2014 Abstract We define a linear homogeneous
More informationLearning symmetric non-monotone submodular functions
Learning symmetric non-monotone submodular functions Maria-Florina Balcan Georgia Institute of Technology ninamf@cc.gatech.edu Nicholas J. A. Harvey University of British Columbia nickhar@cs.ubc.ca Satoru
More informationInteractive Proofs 1
CS294: Probabilistically Checkable and Interactive Proofs January 24, 2017 Interactive Proofs 1 Instructor: Alessandro Chiesa & Igor Shinkar Scribe: Mariel Supina 1 Pspace IP The first proof that Pspace
More informationECE 204 Numerical Methods for Computer Engineers MIDTERM EXAMINATION /8:00-9:30
ECE 204 Numerical Methods for Computer Engineers MIDTERM EXAMINATION 2007-10-23/8:00-9:30 The examination is out of 67 marks. Instructions: No aides. Write your name and student ID number on each booklet.
More informationScheduling and fixed-parameter tractability
Math. Program., Ser. B (2015) 154:533 562 DOI 10.1007/s10107-014-0830-9 FULL LENGTH PAPER Scheduling and fixed-parameter tractability Matthias Mnich Andreas Wiese Received: 24 April 2014 / Accepted: 10
More information1 Maximizing a Submodular Function
6.883 Learning with Combinatorial Structure Notes for Lecture 16 Author: Arpit Agarwal 1 Maximizing a Submodular Function In the last lecture we looked at maximization of a monotone submodular function,
More informationBIN PACKING IN MULTIPLE DIMENSIONS: INAPPROXIMABILITY RESULTS AND APPROXIMATION SCHEMES
BIN PACKING IN MULTIPLE DIMENSIONS: INAPPROXIMABILITY RESULTS AND APPROXIMATION SCHEMES NIKHIL BANSAL 1, JOSÉ R. CORREA2, CLAIRE KENYON 3, AND MAXIM SVIRIDENKO 1 1 IBM T.J. Watson Research Center, Yorktown
More informationTheory of Computation CS3102 Spring 2014 A tale of computers, math, problem solving, life, love and tragic death
Theory of Computation CS3102 Spring 2014 A tale of computers, math, problem solving, life, love and tragic death Nathan Brunelle Department of Computer Science University of Virginia www.cs.virginia.edu/~njb2b/theory
More informationLecture 1 : Probabilistic Method
IITM-CS6845: Theory Jan 04, 01 Lecturer: N.S.Narayanaswamy Lecture 1 : Probabilistic Method Scribe: R.Krithika The probabilistic method is a technique to deal with combinatorial problems by introducing
More informationBalanced Allocation Through Random Walk
Balanced Allocation Through Random Walk Alan Frieze Samantha Petti November 25, 2017 Abstract We consider the allocation problem in which m (1 ε)dn items are to be allocated to n bins with capacity d.
More informationNotes on Complexity Theory Last updated: November, Lecture 10
Notes on Complexity Theory Last updated: November, 2015 Lecture 10 Notes by Jonathan Katz, lightly edited by Dov Gordon. 1 Randomized Time Complexity 1.1 How Large is BPP? We know that P ZPP = RP corp
More informationLecture 7: Passive Learning
CS 880: Advanced Complexity Theory 2/8/2008 Lecture 7: Passive Learning Instructor: Dieter van Melkebeek Scribe: Tom Watson In the previous lectures, we studied harmonic analysis as a tool for analyzing
More informationPolynomial kernels for constant-factor approximable problems
1 Polynomial kernels for constant-factor approximable problems Stefan Kratsch November 11, 2010 2 What do these problems have in common? Cluster Edge Deletion, Cluster Edge Editing, Edge Dominating Set,
More informationCOT 6936: Topics in Algorithms! Giri Narasimhan. ECS 254A / EC 2443; Phone: x3748
COT 6936: Topics in Algorithms! Giri Narasimhan ECS 254A / EC 2443; Phone: x3748 giri@cs.fiu.edu https://moodle.cis.fiu.edu/v2.1/course/view.php?id=612 Gaussian Elimination! Solving a system of simultaneous
More informationOptimal Online Algorithms for Multidimensional Packing Problems
Optimal Online Algorithms for Multidimensional Packing Problems Leah Epstein Rob van Stee Abstract We solve an open problem in the literature by providing an online algorithm for multidimensional bin packing
More informationWHAT IS A SKIP LIST? S 2 S 1. A skip list for a set S of distinct (key, element) items is a series of lists
CH 9.4 : SKIP LISTS 1 ACKNOWLEDGEMENT: THESE SLIDES ARE ADAPTED FROM SLIDES PROVIDED WITH DATA STRUCTURES AND ALGORITHMS IN C++, GOODRICH, TAMASSIA AND MOUNT (WILEY 2004) AND SLIDES FROM JORY DENNY AND
More informationSupremum of simple stochastic processes
Subspace embeddings Daniel Hsu COMS 4772 1 Supremum of simple stochastic processes 2 Recap: JL lemma JL lemma. For any ε (0, 1/2), point set S R d of cardinality 16 ln n S = n, and k N such that k, there
More informationLecture : Lovász Theta Body. Introduction to hierarchies.
Strong Relaations for Discrete Optimization Problems 20-27/05/6 Lecture : Lovász Theta Body. Introduction to hierarchies. Lecturer: Yuri Faenza Scribes: Yuri Faenza Recall: stable sets and perfect graphs
More information