The Entropy Rounding Method in Approximation Algorithms

Size: px
Start display at page:

Download "The Entropy Rounding Method in Approximation Algorithms"

Transcription

1 The Entropy Rounding Method in Approximation Algorithms Thomas Rothvoß Department of Mathematics, M.I.T. SODA 2012

2 A general LP rounding problem Problem: Given: A R n m, fractional solution x [0,1] m Find: y {0,1} m : Ax Ay

3 A general LP rounding problem Problem: Given: A R n m, fractional solution x [0,1] m Find: y {0,1} m : Ax Ay General strategies: Randomized rounding: Flip Pr[y i = 1] = x i (in)dependently

4 A general LP rounding problem Problem: Given: A R n m, fractional solution x [0,1] m Find: y {0,1} m : Ax Ay General strategies: Randomized rounding: Flip Pr[y i = 1] = x i (in)dependently Use properties of basic solutions: supp(x) #rows(a)

5 A general LP rounding problem Problem: Given: A R n m, fractional solution x [0,1] m Find: y {0,1} m : Ax Ay General strategies: Randomized rounding: Flip Pr[y i = 1] = x i (in)dependently Use properties of basic solutions: supp(x) #rows(a) Try another way: Entropy rounding method based on discrepancy theory

6 A schematic view Input: x [0,1] m, matrix A Bansal algorithm Lovász, Spencer & Entropy. Vesztergombi Theoremrounding Beck s entropy method Output: y {0,1} m with Ax Ay small

7 A schematic view Input: x [0,1] m, matrix A Lovász, Spencer &. Vesztergombi Theorem Bansal algorithm Beck s entropy method Output: y {0,1} m with Ax Ay small

8 A schematic view Input: x [0,1] m, matrix A Lovász, Spencer &. Vesztergombi Theorem Bansal algorithm Beck s entropy method Output: y {0,1} m with Ax Ay small

9 A schematic view Input: x [0,1] m, matrix A Lovász, Spencer &. Vesztergombi Theorem Bansal algorithm Beck s entropy method Output: y {0,1} m with Ax Ay small

10 Discrepancy theory Set system S = {S 1,...,S m },S i [n] i S

11 Discrepancy theory Set system S = {S 1,...,S m },S i [n] Coloring χ : [n] { 1,+1} i S

12 Discrepancy theory Set system S = {S 1,...,S m },S i [n] Coloring χ : [n] { 1,+1} Discrepancy disc(s) = min max χ(s). χ:[n] {±1} S S i S where χ(s) = i S χ(i).

13 Discrepancy theory Set system S = {S 1,...,S m },S i [n] Coloring χ : [n] { 1,+1} Discrepancy disc(s) = min max χ(s). χ:[n] {±1} S S i S where χ(s) = i S χ(i). Known results: n sets, n elements: disc(s) = O( n) [Spencer 85]

14 Discrepancy theory Set system S = {S 1,...,S m },S i [n] Coloring χ : [n] { 1,+1} Discrepancy disc(s) = min max χ(s). χ:[n] {±1} S S i S where χ(s) = i S χ(i). Known results: n sets, n elements: disc(s) = O( n) [Spencer 85] Every element in t sets: disc(s) < 2t [Beck & Fiala 81] Conjecture: disc(s) O( t)

15 Discrepancy theory Set system S = {S 1,...,S m },S i [n] Coloring χ : [n] { 1,+1} Discrepancy disc(s) = min max χ(s). χ:[n] {±1} S S i S where χ(s) = i S χ(i). Known results: n sets, n elements: disc(s) = O( n) [Spencer 85] Every element in t sets: disc(s) < 2t [Beck & Fiala 81] Conjecture: disc(s) O( t) More definitions: Half coloring: χ : [n] {0, 1,+1}, supp(χ) n/2

16 Discrepancy theory Set system S = {S 1,...,S m },S i [n] Coloring χ : [n] { 1,+1} Discrepancy disc(s) = min max χ(s). χ:[n] {±1} S S i S where χ(s) = i S χ(i). Known results: n sets, n elements: disc(s) = O( n) [Spencer 85] Every element in t sets: disc(s) < 2t [Beck & Fiala 81] Conjecture: disc(s) O( t) More definitions: Half coloring: χ : [n] {0, 1,+1}, supp(χ) n/2 For matrix A: disc(a) = min χ {±1} n Aχ

17 The LSV-Theorem Theorem (Lovász, Spencer & Vesztergombi 86) Given A R n m,x [0,1] m. Suppose for any A A, coloring χ : A χ. Then y {0,1} m with Ax Ay.

18 The LSV-Theorem Theorem (Lovász, Spencer & Vesztergombi 86) Given A R n m,x [0,1] m. Suppose for any A A, coloring χ : A χ. Then y {0,1} m with Ax Ay. Suffices to find good matrix colorings!

19 The LSV-Theorem Theorem (Lovász, Spencer & Vesztergombi 86) Given A R n m,x [0,1] m. Suppose for any A A, half coloring χ : A χ. Then y {0,1} m with Ax Ay log m. Suffices to find good matrix half colorings!

20 A schematic view Input: x [0,1] m, matrix A Lovász, Spencer &. Vesztergombi Theorem Bansal algorithm Beck s entropy method Output: y {0,1} m with Ax Ay small

21 Entropy Definition For random variable Z, the entropy is H(Z) = ( ) 1 Pr[Z = z] log 2 Pr[Z = z] z

22 Entropy Definition For random variable Z, the entropy is H(Z) = ( ) 1 Pr[Z = z] log 2 Pr[Z = z] z Properties: One likely event: z : Pr[Z = z] ( 1 2 )H(Z)

23 Entropy Definition For random variable Z, the entropy is H(Z) = ( ) 1 Pr[Z = z] log 2 Pr[Z = z] z Properties: One likely event: z : Pr[Z = z] ( 1 2 )H(Z) Subadditivity: H(f(Z,Z )) H(Z)+H(Z ).

24 Theorem [Beck s entropy method] ) m 5 half-coloring χ0 : Aχ 0. H χ i {±1} ( Aχ A = m ( ) A 2 χ A 1 χ {±1} m

25 Theorem [Beck s entropy method] ) m 5 half-coloring χ0 : Aχ 0. H χ i {±1} ( Aχ A = m ( ) A 2 χ A 1 χ {±1} m

26 Theorem [Beck s entropy method] ) m 5 half-coloring χ0 : Aχ 0. H χ i {±1} ( Aχ A = m ( ) A 2 χ A 1 χ {±1} m

27 Theorem [Beck s entropy method] ) m 5 half-coloring χ0 : Aχ 0. H χ i {±1} ( Aχ A = {±1} m m ( ) A 2 χ A 1 χ

28 Theorem [Beck s entropy method] ) m 5 half-coloring χ0 : Aχ 0. H χ i {±1} ( Aχ A = {±1} m m ( ) A 2 χ A 1 χ

29 Theorem [Beck s entropy method] ) m 5 half-coloring χ0 : Aχ 0. H χ i {±1} ( Aχ A 2 χ A = {±1} m m ( ) A 1 χ

30 Theorem [Beck s entropy method] ) m 5 half-coloring χ0 : Aχ 0. H χ i {±1} ( Aχ A 2 χ A = {±1} m m ( ) A 1 χ

31 Theorem [Beck s entropy method] ) m 5 half-coloring χ0 : Aχ 0. H χ i {±1} ( Aχ A 2 χ A = {±1} m m ( ) A 1 χ

32 Theorem [Beck s entropy method] ) m 5 half-coloring χ0 : Aχ 0. H χ i {±1} ( Aχ A 2 χ A = {±1} m m ( ) A 1 χ

33 Theorem [Beck s entropy method] ) m 5 half-coloring χ0 : Aχ 0. H χ i {±1} ( Aχ cell : Pr[Aχ cell] ( 1 2 )m/5. A 2 χ A = {±1} m m ( ) A 1 χ

34 Theorem [Beck s entropy method] ) m 5 half-coloring χ0 : Aχ 0. H χ i {±1} ( Aχ cell : Pr[Aχ cell] ( 1 2 )m/5. At least 2 m ( 1 2 )m/5 = 2 0.8m colorings χ have Aχ cell A 2 χ A = m ( ) A 1 χ {±1} m

35 Theorem [Beck s entropy method] ) m 5 half-coloring χ0 : Aχ 0. H χ i {±1} ( Aχ cell : Pr[Aχ cell] ( 1 2 )m/5. At least 2 m ( 1 2 )m/5 = 2 0.8m colorings χ have Aχ cell Pick χ 1,χ 2 differing in half of entries A = {±1} m χ 2 m ( ) χ 1 A 2 χ Aχ 1 Aχ 2 A 1 χ

36 Theorem [Beck s entropy method] ) m 5 half-coloring χ0 : Aχ 0. H χ i {±1} ( Aχ cell : Pr[Aχ cell] ( 1 2 )m/5. At least 2 m ( 1 2 )m/5 = 2 0.8m colorings χ have Aχ cell Pick χ 1,χ 2 differing in half of entries Define χ 0 (i) := 1 2 (χ1 (i) χ 2 (i)) {0,±1}. A = {±1} m χ 2 m ( ) χ 1 A 2 χ Aχ 1 Aχ 2 A 1 χ

37 Theorem [Beck s entropy method] ) m 5 half-coloring χ0 : Aχ 0. H χ i {±1} ( Aχ cell : Pr[Aχ cell] ( 1 2 )m/5. At least 2 m ( 1 2 )m/5 = 2 0.8m colorings χ have Aχ cell Pick χ 1,χ 2 differing in half of entries Define χ 0 (i) := 1 2 (χ1 (i) χ 2 (i)) {0,±1}. Then Aχ Aχ1 Aχ 2. A 2 χ A = {±1} m χ 2 m ( ) χ 1 Aχ 1 Aχ 2 A 1 χ

38 A bound on the entropy Let α = (α 1,...,α m ) R m. j Consider Z := χ(j) α j λ α 2 with χ(j) {±1} at random

39 A bound on the entropy Let α = (α 1,...,α m ) R m. j Consider Z := χ(j) α j λ α 2 with χ(j) {±1} at random 1 Pr[Z = 0] 0 1 λ

40 A bound on the entropy Let α = (α 1,...,α m ) R m. j Consider Z := χ(j) α j λ α 2 with χ(j) {±1} at random 1 Pr[Z = 0] 0 H(Z) 1 λ e Ω(λ2 ) 1 λ

41 A bound on the entropy Let α = (α 1,...,α m ) R m. j Consider Z := χ(j) α j λ α 2 with χ(j) {±1} at random 1 Pr[Z = 0] 0 H(Z) 1 λ O(log( 1 λ )) e Ω(λ2 ) 1 λ

42 A bound on the entropy Let α = (α 1,...,α m ) R m. j Consider Z := χ(j) α j λ α 2 with χ(j) {±1} at random 1 Pr[Z = 0] 0 H(Z) 1 λ O(log( 1 λ )) randomized rounding e Ω(λ2 ) 1 λ

43 A schematic view Input: x [0,1] m, matrix A Lovász, Spencer &. Vesztergombi Theorem Bansal algorithm Beck s entropy method Output: y {0,1} m with Ax Ay small

44 A general rounding theorem Theorem Input: matrix A [ 1,1] n m, i > 0 satisfying entropy condition for all submatrices vector x [0,1] m row weights w(i) ( iw(i) = 1) There is a random variable y {0,1} m with Bounded difference: Ai x A i y O(log(m)) i Ai x A i y O( 1/w(i)) Preserved expectation: E[y i ] = x i.

45 Bin Packing With Rejection Input: Items i {1,...,n} with size s i [0,1], and rejection penalty π i [0,1] Goal: Pack or reject. Minimize # bins + rejection cost. 1 0 bin 1 bin 2 1 s i input π i

46 Bin Packing With Rejection Input: Items i {1,...,n} with size s i [0,1], and rejection penalty π i [0,1] Goal: Pack or reject. Minimize # bins + rejection cost. 1 0 bin 1 bin 2 1 s i input π i

47 Bin Packing With Rejection Input: Items i {1,...,n} with size s i [0,1], and rejection penalty π i [0,1] Goal: Pack or reject. Minimize # bins + rejection cost s i bin 1 bin 2 π i input

48 Bin Packing With Rejection Input: Items i {1,...,n} with size s i [0,1], and rejection penalty π i [0,1] Goal: Pack or reject. Minimize # bins + rejection cost s i bin 1 bin 2 π i input

49 Bin Packing With Rejection Input: Items i {1,...,n} with size s i [0,1], and rejection penalty π i [0,1] Goal: Pack or reject. Minimize # bins + rejection cost s i bin 1 bin 2 π i 0.7 input

50 The column-based LP Set Cover formulation: Bins: Sets S [n] with i S s i 1 of cost c(s) = 1 Rejections: Sets S = {i} of cost c(s) = π i LP: min c(s) x S S S 1 S x S 1 S S x S 0 S S

51 The column-based LP - Example 1 s i π i input

52 The column-based LP - Example 1 s i π i input min ( ) x x x 0

53 The column-based LP - Example 1 s i π i input min ( ) x x x 0 1/2 1/2 1/2

54 Our results Theorem There is a randomized poly-time approximation algorithm for Bin Packing With Rejection with (with high probability). APX OPT f +O(log 2 OPT f ) Previously best known: APX OPT f + [Epstein & Levin 10] OPT f (logopt f ) 1 o(1) As good as classical Bin Packing [Karmarkar & Karp 82]

55 The end Open question Are there more (convincing) applications?

56 The end Open question Are there more (convincing) applications? Thanks for your attention

Discrepancy Theory in Approximation Algorithms

Discrepancy Theory in Approximation Algorithms Discrepancy Theory in Approximation Algorithms Rajat Sen, Soumya Basu May 8, 2015 1 Introduction In this report we would like to motivate the use of discrepancy theory in algorithms. Discrepancy theory

More information

arxiv: v3 [cs.ds] 10 Mar 2014

arxiv: v3 [cs.ds] 10 Mar 2014 Approximating Bin Packing within O(logOPT loglogopt ) bins Thomas Rothvoß arxiv:1301.4010v3 [cs.ds] 10 Mar 2014 Massachusetts Institute of Technology Abstract For bin packing, the input consists of n items

More information

The Entropy Rounding Method in Approximation Algorithms

The Entropy Rounding Method in Approximation Algorithms The Entropy Rounding Method in Approximation Algorithms Thomas Rothvoß Abstract LetAbe a matrix,cbe any linear objective function and x be a fractional vector, say an LP solution to some discrete optimization

More information

Lecture Constructive Algorithms for Discrepancy Minimization

Lecture Constructive Algorithms for Discrepancy Minimization Approximation Algorithms Workshop June 13, 2011, Princeton Lecture Constructive Algorithms for Discrepancy Minimization Nikhil Bansal Scribe: Daniel Dadush 1 Combinatorial Discrepancy Given a universe

More information

Matrix approximation and Tusnády s problem

Matrix approximation and Tusnády s problem European Journal of Combinatorics 28 (2007) 990 995 www.elsevier.com/locate/ejc Matrix approximation and Tusnády s problem Benjamin Doerr Max-Planck-Institut für Informatik, Stuhlsatzenhausweg 85, 66123

More information

Hereditary discrepancy and factorization norms

Hereditary discrepancy and factorization norms Hereditary discrepancy and factorization norms organized by Aleksandar Nikolov and Kunal Talwar Workshop Summary Background and Goals This workshop was devoted to the application of methods from functional

More information

A Fast Asymptotic Approximation Scheme for Bin Packing with Rejection

A Fast Asymptotic Approximation Scheme for Bin Packing with Rejection A Fast Asymptotic Approximation Scheme for Bin Packing with Rejection p. 1/3 A Fast Asymptotic Approximation Scheme for Bin Packing with Rejection Wolfgang Bein 1, José R. Correa 2, Xin Han 3 1 School

More information

The discrepancy of permutation families

The discrepancy of permutation families The discrepancy of permutation families J. H. Spencer A. Srinivasan P. Tetali Abstract In this note, we show that the discrepancy of any family of l permutations of [n] = {1, 2,..., n} is O( l log n),

More information

arxiv: v2 [cs.ds] 11 Oct 2012

arxiv: v2 [cs.ds] 11 Oct 2012 Constructive Discrepancy Minimization by Walking on The Edges Shachar Lovett Institute for Advanced Study slovett@math.ias.edu Raghu Meka Institute for Advanced Study raghu@math.ias.edu arxiv:1203.5747v2

More information

Better Algorithms and Hardness for Broadcast Scheduling via a Discrepancy Approach

Better Algorithms and Hardness for Broadcast Scheduling via a Discrepancy Approach Better Algorithms and Hardness for Broadcast Scheduling via a Discrepancy Approach Nikhil Bansal Moses Charikar Ravishankar Krishnaswamy Shi Li Abstract We study the broadcast scheduling problem with the

More information

Approximation Preserving Reductions

Approximation Preserving Reductions Approximation Preserving Reductions - Memo Summary - AP-reducibility - L-reduction technique - Complete problems - Examples: MAXIMUM CLIQUE, MAXIMUM INDEPENDENT SET, MAXIMUM 2-SAT, MAXIMUM NAE 3-SAT, MAXIMUM

More information

CS6999 Probabilistic Methods in Integer Programming Randomized Rounding Andrew D. Smith April 2003

CS6999 Probabilistic Methods in Integer Programming Randomized Rounding Andrew D. Smith April 2003 CS6999 Probabilistic Methods in Integer Programming Randomized Rounding April 2003 Overview 2 Background Randomized Rounding Handling Feasibility Derandomization Advanced Techniques Integer Programming

More information

Randomized Algorithms Week 2: Tail Inequalities

Randomized Algorithms Week 2: Tail Inequalities Randomized Algorithms Week 2: Tail Inequalities Rao Kosaraju In this section, we study three ways to estimate the tail probabilities of random variables. Please note that the more information we know about

More information

A Robust APTAS for the Classical Bin Packing Problem

A Robust APTAS for the Classical Bin Packing Problem A Robust APTAS for the Classical Bin Packing Problem Leah Epstein 1 and Asaf Levin 2 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. Email: lea@math.haifa.ac.il 2 Department of Statistics,

More information

1 The linear algebra of linear programs (March 15 and 22, 2015)

1 The linear algebra of linear programs (March 15 and 22, 2015) 1 The linear algebra of linear programs (March 15 and 22, 2015) Many optimization problems can be formulated as linear programs. The main features of a linear program are the following: Variables are real

More information

Tight Hardness Results for Minimizing Discrepancy

Tight Hardness Results for Minimizing Discrepancy Tight Hardness Results for Minimizing Discrepancy Moses Charikar Alantha Newman Aleksandar Nikolov Abstract In the Discrepancy problem, we are given M sets {S 1,..., S M } on N elements. Our goal is to

More information

Tight Hardness Results for Minimizing Discrepancy

Tight Hardness Results for Minimizing Discrepancy Tight Hardness Results for Minimizing Discrepancy Moses Charikar Alantha Newman Aleksandar Nikolov January 13, 2011 Abstract In the Discrepancy problem, we are given M sets {S 1,..., S M } on N elements.

More information

Welfare Maximization with Friends-of-Friends Network Externalities

Welfare Maximization with Friends-of-Friends Network Externalities Welfare Maximization with Friends-of-Friends Network Externalities Extended version of a talk at STACS 2015, Munich Wolfgang Dvořák 1 joint work with: Sayan Bhattacharya 2, Monika Henzinger 1, Martin Starnberger

More information

Approximation Basics

Approximation Basics Approximation Basics, Concepts, and Examples Xiaofeng Gao Department of Computer Science and Engineering Shanghai Jiao Tong University, P.R.China Fall 2012 Special thanks is given to Dr. Guoqiang Li for

More information

/ / MET Day 000 NC1^ INRTL MNVR I E E PRE SLEEP K PRE SLEEP R E

/ / MET Day 000 NC1^ INRTL MNVR I E E PRE SLEEP K PRE SLEEP R E 05//0 5:26:04 09/6/0 (259) 6 7 8 9 20 2 22 2 09/7 0 02 0 000/00 0 02 0 04 05 06 07 08 09 0 2 ay 000 ^ 0 X Y / / / / ( %/ ) 2 /0 2 ( ) ^ 4 / Y/ 2 4 5 6 7 8 9 2 X ^ X % 2 // 09/7/0 (260) ay 000 02 05//0

More information

Approximation Algorithms for the k-set Packing Problem

Approximation Algorithms for the k-set Packing Problem Approximation Algorithms for the k-set Packing Problem Marek Cygan Institute of Informatics University of Warsaw 20th October 2016, Warszawa Marek Cygan Approximation Algorithms for the k-set Packing Problem

More information

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 12 Luca Trevisan October 3, 2017

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 12 Luca Trevisan October 3, 2017 U.C. Berkeley CS94: Beyond Worst-Case Analysis Handout 1 Luca Trevisan October 3, 017 Scribed by Maxim Rabinovich Lecture 1 In which we begin to prove that the SDP relaxation exactly recovers communities

More information

PREEMPTIVE RESOURCE CONSTRAINED SCHEDULING WITH TIME-WINDOWS

PREEMPTIVE RESOURCE CONSTRAINED SCHEDULING WITH TIME-WINDOWS PREEMPTIVE RESOURCE CONSTRAINED SCHEDULING WITH TIME-WINDOWS Kanthi Sarpatwar IBM Research Joint Work With: Baruch Schieber (IBM Research) Hadas Shachnai (Technion) Kanthi Kiran Sarpatwar 1 / 22 Introduction

More information

Lecture 13 October 6, Covering Numbers and Maurey s Empirical Method

Lecture 13 October 6, Covering Numbers and Maurey s Empirical Method CS 395T: Sublinear Algorithms Fall 2016 Prof. Eric Price Lecture 13 October 6, 2016 Scribe: Kiyeon Jeon and Loc Hoang 1 Overview In the last lecture we covered the lower bound for p th moment (p > 2) and

More information

Algorithms. Outline! Approximation Algorithms. The class APX. The intelligence behind the hardware. ! Based on

Algorithms. Outline! Approximation Algorithms. The class APX. The intelligence behind the hardware. ! Based on 6117CIT - Adv Topics in Computing Sci at Nathan 1 Algorithms The intelligence behind the hardware Outline! Approximation Algorithms The class APX! Some complexity classes, like PTAS and FPTAS! Illustration

More information

Lecture 11 October 7, 2013

Lecture 11 October 7, 2013 CS 4: Advanced Algorithms Fall 03 Prof. Jelani Nelson Lecture October 7, 03 Scribe: David Ding Overview In the last lecture we talked about set cover: Sets S,..., S m {,..., n}. S has cost c S. Goal: Cover

More information

Closest String and Closest Substring Problems

Closest String and Closest Substring Problems January 8, 2010 Problem Formulation Problem Statement I Closest String Given a set S = {s 1, s 2,, s n } of strings each length m, find a center string s of length m minimizing d such that for every string

More information

Some Open Problems in Approximation Algorithms

Some Open Problems in Approximation Algorithms Some Open Problems in Approximation Algorithms David P. Williamson School of Operations Research and Information Engineering Cornell University November 2, 2010 Egerváry Research Group on Combinatorial

More information

Technische Universität München, Zentrum Mathematik Lehrstuhl für Angewandte Geometrie und Diskrete Mathematik. Combinatorial Optimization (MA 4502)

Technische Universität München, Zentrum Mathematik Lehrstuhl für Angewandte Geometrie und Diskrete Mathematik. Combinatorial Optimization (MA 4502) Technische Universität München, Zentrum Mathematik Lehrstuhl für Angewandte Geometrie und Diskrete Mathematik Combinatorial Optimization (MA 4502) Dr. Michael Ritter Problem Sheet 1 Homework Problems Exercise

More information

Some Open Problems in Approximation Algorithms

Some Open Problems in Approximation Algorithms Some Open Problems in Approximation Algorithms David P. Williamson School of Operations Research and Information Engineering Cornell University February 28, 2011 University of Bonn Bonn, Germany David

More information

A robust APTAS for the classical bin packing problem

A robust APTAS for the classical bin packing problem A robust APTAS for the classical bin packing problem Leah Epstein Asaf Levin Abstract Bin packing is a well studied problem which has many applications. In this paper we design a robust APTAS for the problem.

More information

Lecture 5: Probabilistic tools and Applications II

Lecture 5: Probabilistic tools and Applications II T-79.7003: Graphs and Networks Fall 2013 Lecture 5: Probabilistic tools and Applications II Lecturer: Charalampos E. Tsourakakis Oct. 11, 2013 5.1 Overview In the first part of today s lecture we will

More information

Integer Linear Programs

Integer Linear Programs Lecture 2: Review, Linear Programming Relaxations Today we will talk about expressing combinatorial problems as mathematical programs, specifically Integer Linear Programs (ILPs). We then see what happens

More information

Roundings Respecting Hard Constraints

Roundings Respecting Hard Constraints Roundings Respecting Hard Constraints Benjamin Doerr Mathematisches Seminar II, Christian Albrechts Universität zu Kiel, D 24098 Kiel, Germany, bed@numerik.uni-kiel.de Abstract. A problem arising in integer

More information

On the Approximability of the Maximum Interval Constrained Coloring Problem

On the Approximability of the Maximum Interval Constrained Coloring Problem S. Canzar 1 K. Elbassioni 2 A. Elmasry 3 R. Raman 4 On the Approximability of the Maximum Interval Constrained Coloring Problem 1 Centrum Wiskunde & Informatica, Amsterdam, The Netherlands 2 Max-Planck-Institut

More information

Asymptotic Polynomial-Time Approximation (APTAS) and Randomized Approximation Algorithms

Asymptotic Polynomial-Time Approximation (APTAS) and Randomized Approximation Algorithms Approximation Algorithms Asymptotic Polynomial-Time Approximation (APTAS) and Randomized Approximation Algorithms Jens Egeblad November 29th, 2006 Agenda First lesson (Asymptotic Approximation): Bin-Packing

More information

CS Foundations of Communication Complexity

CS Foundations of Communication Complexity CS 49 - Foundations of Communication Complexity Lecturer: Toniann Pitassi 1 The Discrepancy Method Cont d In the previous lecture we ve outlined the discrepancy method, which is a method for getting lower

More information

Randomized algorithm

Randomized algorithm Tutorial 4 Joyce 2009-11-24 Outline Solution to Midterm Question 1 Question 2 Question 1 Question 2 Question 3 Question 4 Question 5 Solution to Midterm Solution to Midterm Solution to Midterm Question

More information

Poly-APX- and PTAS-completeness in standard and differential approximation

Poly-APX- and PTAS-completeness in standard and differential approximation Poly-APX- and PTAS-completeness in standard and differential approximation (Extended abstract) Cristina Bazgan, Bruno Escoffier, and Vangelis Th. Paschos LAMSADE, Université Paris-Dauphine, Place du Maréchal

More information

Linear Sketches A Useful Tool in Streaming and Compressive Sensing

Linear Sketches A Useful Tool in Streaming and Compressive Sensing Linear Sketches A Useful Tool in Streaming and Compressive Sensing Qin Zhang 1-1 Linear sketch Random linear projection M : R n R k that preserves properties of any v R n with high prob. where k n. M =

More information

Notes on the decomposition result of Karlin et al. [2] for the hierarchy of Lasserre by M. Laurent, December 13, 2012

Notes on the decomposition result of Karlin et al. [2] for the hierarchy of Lasserre by M. Laurent, December 13, 2012 Notes on the decomposition result of Karlin et al. [2] for the hierarchy of Lasserre by M. Laurent, December 13, 2012 We present the decomposition result of Karlin et al. [2] for the hierarchy of Lasserre

More information

2 Natural Proofs: a barrier for proving circuit lower bounds

2 Natural Proofs: a barrier for proving circuit lower bounds Topics in Theoretical Computer Science April 4, 2016 Lecturer: Ola Svensson Lecture 6 (Notes) Scribes: Ola Svensson Disclaimer: These notes were written for the lecturer only and may contain inconsistent

More information

Knapsack. Bag/knapsack of integer capacity B n items item i has size s i and profit/weight w i

Knapsack. Bag/knapsack of integer capacity B n items item i has size s i and profit/weight w i Knapsack Bag/knapsack of integer capacity B n items item i has size s i and profit/weight w i Goal: find a subset of items of maximum profit such that the item subset fits in the bag Knapsack X: item set

More information

On the Beck-Fiala Conjecture for Random Set Systems

On the Beck-Fiala Conjecture for Random Set Systems On the Beck-Fiala Conjecture for Random Set Systems Esther Ezra Shachar Lovett arxiv:1511.00583v1 [math.co] 2 Nov 2015 November 3, 2015 Abstract Motivated by the Beck-Fiala conjecture, we study discrepancy

More information

MTH 215: Introduction to Linear Algebra

MTH 215: Introduction to Linear Algebra MTH 215: Introduction to Linear Algebra Lecture 5 Jonathan A. Chávez Casillas 1 1 University of Rhode Island Department of Mathematics September 20, 2017 1 LU Factorization 2 3 4 Triangular Matrices Definition

More information

arxiv: v1 [cs.ds] 3 Dec 2012

arxiv: v1 [cs.ds] 3 Dec 2012 The Geometry of Differential Privacy: The Sparse and Approximate Cases Aleksandar Nikolov Kunal Talwar Li Zhang arxiv:1212.0297v1 [cs.ds] 3 Dec 2012 Abstract In this work, we study trade-offs between accuracy

More information

Topics on Computing and Mathematical Sciences I Graph Theory (6) Coloring I

Topics on Computing and Mathematical Sciences I Graph Theory (6) Coloring I Topics on Computing and Mathematical Sciences I Graph Theory (6) Coloring I Yoshio Okamoto Tokyo Institute of Technology May, 008 Last updated: Wed May 6: 008 Y. Okamoto (Tokyo Tech) TCMSI Graph Theory

More information

Balancing Vectors in Any Norm

Balancing Vectors in Any Norm 2018 IEEE 59th Annual Symposium on Foundations of Computer Science Balancing Vectors in Any Norm Daniel Dadush, Aleksandar Nikolov, Kunal Talwar, Nicole Tomczak-Jaegermann Centrum Wiskunde & Informatica,

More information

Communication Complexity

Communication Complexity Communication Complexity Jie Ren Adaptive Signal Processing and Information Theory Group Nov 3 rd, 2014 Jie Ren (Drexel ASPITRG) CC Nov 3 rd, 2014 1 / 77 1 E. Kushilevitz and N. Nisan, Communication Complexity,

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms What do you do when a problem is NP-complete? or, when the polynomial time solution is impractically slow? assume input is random, do expected performance. Eg, Hamiltonian path

More information

arxiv: v1 [math.co] 6 Aug 2014

arxiv: v1 [math.co] 6 Aug 2014 Combinatorial discrepancy for boxes via the ellipsoid-infinity norm arxiv:408.376v [math.co] 6 Aug 204 Jiří Matoušek Department of Applied Mathematics Charles University, Malostranské nám. 25 8 00 Praha,

More information

CMPUT 675: Approximation Algorithms Fall 2014

CMPUT 675: Approximation Algorithms Fall 2014 CMPUT 675: Approximation Algorithms Fall 204 Lecture 25 (Nov 3 & 5): Group Steiner Tree Lecturer: Zachary Friggstad Scribe: Zachary Friggstad 25. Group Steiner Tree In this problem, we are given a graph

More information

Vector Bin Packing with Multiple-Choice

Vector Bin Packing with Multiple-Choice Vector Bin Packing with Multiple-Choice Boaz Patt-Shamir Dror Rawitz boaz@eng.tau.ac.il rawitz@eng.tau.ac.il School of Electrical Engineering Tel Aviv University Tel Aviv 69978 Israel June 17, 2010 Abstract

More information

Some Open Problems in Approximation Algorithms

Some Open Problems in Approximation Algorithms Some Open Problems in Approximation Algorithms David P. Williamson School of Operations Research and Information Engineering Cornell University August 18, 2011 APPROX 2011 David P. Williamson (Cornell

More information

Positive semidefinite rank

Positive semidefinite rank 1/15 Positive semidefinite rank Hamza Fawzi (MIT, LIDS) Joint work with João Gouveia (Coimbra), Pablo Parrilo (MIT), Richard Robinson (Microsoft), James Saunderson (Monash), Rekha Thomas (UW) DIMACS Workshop

More information

Chapter 10. Chapter 10. Multinomial Experiments and. Multinomial Experiments and Contingency Tables. Contingency Tables.

Chapter 10. Chapter 10. Multinomial Experiments and. Multinomial Experiments and Contingency Tables. Contingency Tables. Chapter 10 Multinomial Experiments and Contingency Tables 1 Chapter 10 Multinomial Experiments and Contingency Tables 10-1 1 Overview 10-2 2 Multinomial Experiments: of-fitfit 10-3 3 Contingency Tables:

More information

APTAS for Bin Packing

APTAS for Bin Packing APTAS for Bin Packing Bin Packing has an asymptotic PTAS (APTAS) [de la Vega and Leuker, 1980] For every fixed ε > 0 algorithm outputs a solution of size (1+ε)OPT + 1 in time polynomial in n APTAS for

More information

Oblivious randomized rounding

Oblivious randomized rounding Oblivious randomized rounding Neal E. Young April 28, 2008 What would the world be like if... SAT is hard in the worst case, BUT... generating hard random instances of SAT is hard? Lipton, 1993 worst-case

More information

Rainbow matchings. Existence and counting. Guillem Perarnau. Universitat Politècnica de Catalunya Departament de Matemàtica Aplicada IV

Rainbow matchings. Existence and counting. Guillem Perarnau. Universitat Politècnica de Catalunya Departament de Matemàtica Aplicada IV Rainbow matchings Existence and counting Guillem Perarnau Universitat Politècnica de Catalunya Departament de Matemàtica Aplicada IV 2nd September 2011 Budapest joint work with Oriol Serra Outline 1 The

More information

Direct product theorem for discrepancy

Direct product theorem for discrepancy Direct product theorem for discrepancy Troy Lee Rutgers University Joint work with: Robert Špalek Direct product theorems Knowing how to compute f, how can you compute f f f? Obvious upper bounds: If can

More information

Generating Randomized Roundings with Cardinality Constraints and Derandomizations

Generating Randomized Roundings with Cardinality Constraints and Derandomizations Generating Randomized Roundings with Cardinality Constraints and Derandomizations Benjamin Doerr, MPI Saarbrücken 1 Introduction to randomized rounding and its derandomization. 2 Cardinality constraints.

More information

PCP Course; Lectures 1, 2

PCP Course; Lectures 1, 2 PCP Course; Lectures 1, 2 Mario Szegedy September 10, 2011 Easy and Hard Problems Easy: Polynomial Time 5n; n 2 ; 4n 3 + n Hard: Super-polynomial Time n log n ; 2 n ; n! Proving that a problem is easy:

More information

A closest vector problem arising in radiation therapy planning

A closest vector problem arising in radiation therapy planning A closest vector problem arising in radiation therapy planning Céline Engelbeen, Samuel Fiorini, Antje Kiesel arxiv:0907.0138v2 [cs.dm] 26 Nov 2009 March 25, 2019 Abstract In this paper we consider the

More information

C&O 355 Mathematical Programming Fall 2010 Lecture 18. N. Harvey

C&O 355 Mathematical Programming Fall 2010 Lecture 18. N. Harvey C&O 355 Mathematical Programming Fall 2010 Lecture 18 N. Harvey Network Flow Topics Max Flow / Min Cut Theorem Total Unimodularity Directed Graphs & Incidence Matrices Proof of Max Flow / Min Cut Theorem

More information

A simple LP relaxation for the Asymmetric Traveling Salesman Problem

A simple LP relaxation for the Asymmetric Traveling Salesman Problem A simple LP relaxation for the Asymmetric Traveling Salesman Problem Thành Nguyen Cornell University, Center for Applies Mathematics 657 Rhodes Hall, Ithaca, NY, 14853,USA thanh@cs.cornell.edu Abstract.

More information

4/12/2011. Chapter 8. NP and Computational Intractability. Directed Hamiltonian Cycle. Traveling Salesman Problem. Directed Hamiltonian Cycle

4/12/2011. Chapter 8. NP and Computational Intractability. Directed Hamiltonian Cycle. Traveling Salesman Problem. Directed Hamiltonian Cycle Directed Hamiltonian Cycle Chapter 8 NP and Computational Intractability Claim. G has a Hamiltonian cycle iff G' does. Pf. Suppose G has a directed Hamiltonian cycle Γ. Then G' has an undirected Hamiltonian

More information

PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions. My T. Thai

PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions. My T. Thai PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions My T. Thai 1 1 Hardness of Approximation Consider a maximization problem Π such as MAX-E3SAT. To show that it is NP-hard to approximation

More information

Optimal File Sharing in Distributed Networks

Optimal File Sharing in Distributed Networks Optimal File Sharing in Distributed Networks Moni Naor Ron M. Roth Abstract The following file distribution problem is considered: Given a network of processors represented by an undirected graph G = (V,

More information

Answering Numeric Queries

Answering Numeric Queries Answering Numeric Queries The Laplace Distribution: Lap(b) is the probability distribution with p.d.f.: p x b) = 1 x exp 2b b i.e. a symmetric exponential distribution Y Lap b, E Y = b Pr Y t b = e t Answering

More information

10 Karmarkars Algorithm

10 Karmarkars Algorithm We want to solve the following linear program: min v = c t x subject to Ax = 0 and x. Here = {x R n e t x = 1, x 0} with e t = (1,..., 1) denotes the standard simplex in R n. Further assumptions: 1. A

More information

CS 598RM: Algorithmic Game Theory, Spring Practice Exam Solutions

CS 598RM: Algorithmic Game Theory, Spring Practice Exam Solutions CS 598RM: Algorithmic Game Theory, Spring 2017 1. Answer the following. Practice Exam Solutions Agents 1 and 2 are bargaining over how to split a dollar. Each agent simultaneously demands share he would

More information

Classes of Boolean Functions

Classes of Boolean Functions Classes of Boolean Functions Nader H. Bshouty Eyal Kushilevitz Abstract Here we give classes of Boolean functions that considered in COLT. Classes of Functions Here we introduce the basic classes of functions

More information

HYPOTHESIS TESTING: THE CHI-SQUARE STATISTIC

HYPOTHESIS TESTING: THE CHI-SQUARE STATISTIC 1 HYPOTHESIS TESTING: THE CHI-SQUARE STATISTIC 7 steps of Hypothesis Testing 1. State the hypotheses 2. Identify level of significant 3. Identify the critical values 4. Calculate test statistics 5. Compare

More information

Lecture 10 Algorithmic version of the local lemma

Lecture 10 Algorithmic version of the local lemma Lecture 10 Algorithmic version of the local lemma Uriel Feige Department of Computer Science and Applied Mathematics The Weizman Institute Rehovot 76100, Israel uriel.feige@weizmann.ac.il June 9, 2014

More information

The Probabilistic Method

The Probabilistic Method The Probabilistic Method Janabel Xia and Tejas Gopalakrishna MIT PRIMES Reading Group, mentors Gwen McKinley and Jake Wellens December 7th, 2018 Janabel Xia and Tejas Gopalakrishna Probabilistic Method

More information

CS154, Lecture 15: Cook-Levin Theorem SAT, 3SAT

CS154, Lecture 15: Cook-Levin Theorem SAT, 3SAT CS154, Lecture 15: Cook-Levin Theorem SAT, 3SAT Definition: A language B is NP-complete if: 1. B NP 2. Every A in NP is poly-time reducible to B That is, A P B When this is true, we say B is NP-hard On

More information

ON RANGE SEARCHING IN THE GROUP MODEL AND COMBINATORIAL DISCREPANCY

ON RANGE SEARCHING IN THE GROUP MODEL AND COMBINATORIAL DISCREPANCY ON RANGE SEARCHING IN THE GROUP MODEL AND COMBINATORIAL DISCREPANCY KASPER GREEN LARSEN Abstract. In this paper we establish an intimate connection between dynamic range searching in the group model and

More information

Approximation Algorithms for Generalized Assignment Problems

Approximation Algorithms for Generalized Assignment Problems The Open University of Israel Department of Mathematics and Computer Science Approximation Algorithms for Generalized Assignment Problems Thesis submitted as partial fulfillment of the requirements towards

More information

Approximation & Complexity

Approximation & Complexity Summer school on semidefinite optimization Approximation & Complexity David Steurer Cornell University Part 1 September 6, 2012 Overview Part 1 Unique Games Conjecture & Basic SDP Part 2 SDP Hierarchies:

More information

Divide and Conquer. Maximum/minimum. Median finding. CS125 Lecture 4 Fall 2016

Divide and Conquer. Maximum/minimum. Median finding. CS125 Lecture 4 Fall 2016 CS125 Lecture 4 Fall 2016 Divide and Conquer We have seen one general paradigm for finding algorithms: the greedy approach. We now consider another general paradigm, known as divide and conquer. We have

More information

Hierarchies. 1. Lovasz-Schrijver (LS), LS+ 2. Sherali Adams 3. Lasserre 4. Mixed Hierarchy (recently used) Idea: P = conv(subset S of 0,1 n )

Hierarchies. 1. Lovasz-Schrijver (LS), LS+ 2. Sherali Adams 3. Lasserre 4. Mixed Hierarchy (recently used) Idea: P = conv(subset S of 0,1 n ) Hierarchies Today 1. Some more familiarity with Hierarchies 2. Examples of some basic upper and lower bounds 3. Survey of recent results (possible material for future talks) Hierarchies 1. Lovasz-Schrijver

More information

Non-Approximability Results (2 nd part) 1/19

Non-Approximability Results (2 nd part) 1/19 Non-Approximability Results (2 nd part) 1/19 Summary - The PCP theorem - Application: Non-approximability of MAXIMUM 3-SAT 2/19 Non deterministic TM - A TM where it is possible to associate more than one

More information

Degree of Regularity of Linear Homogeneous Equations

Degree of Regularity of Linear Homogeneous Equations Degree of Regularity of Linear Homogeneous Equations Kavish Gandhi, Noah Golowich and László Miklós Lovász October 4, 2018 arxiv:13097220v3 [mathco] 27 Jan 2014 Abstract We define a linear homogeneous

More information

Learning symmetric non-monotone submodular functions

Learning symmetric non-monotone submodular functions Learning symmetric non-monotone submodular functions Maria-Florina Balcan Georgia Institute of Technology ninamf@cc.gatech.edu Nicholas J. A. Harvey University of British Columbia nickhar@cs.ubc.ca Satoru

More information

Interactive Proofs 1

Interactive Proofs 1 CS294: Probabilistically Checkable and Interactive Proofs January 24, 2017 Interactive Proofs 1 Instructor: Alessandro Chiesa & Igor Shinkar Scribe: Mariel Supina 1 Pspace IP The first proof that Pspace

More information

ECE 204 Numerical Methods for Computer Engineers MIDTERM EXAMINATION /8:00-9:30

ECE 204 Numerical Methods for Computer Engineers MIDTERM EXAMINATION /8:00-9:30 ECE 204 Numerical Methods for Computer Engineers MIDTERM EXAMINATION 2007-10-23/8:00-9:30 The examination is out of 67 marks. Instructions: No aides. Write your name and student ID number on each booklet.

More information

Scheduling and fixed-parameter tractability

Scheduling and fixed-parameter tractability Math. Program., Ser. B (2015) 154:533 562 DOI 10.1007/s10107-014-0830-9 FULL LENGTH PAPER Scheduling and fixed-parameter tractability Matthias Mnich Andreas Wiese Received: 24 April 2014 / Accepted: 10

More information

1 Maximizing a Submodular Function

1 Maximizing a Submodular Function 6.883 Learning with Combinatorial Structure Notes for Lecture 16 Author: Arpit Agarwal 1 Maximizing a Submodular Function In the last lecture we looked at maximization of a monotone submodular function,

More information

BIN PACKING IN MULTIPLE DIMENSIONS: INAPPROXIMABILITY RESULTS AND APPROXIMATION SCHEMES

BIN PACKING IN MULTIPLE DIMENSIONS: INAPPROXIMABILITY RESULTS AND APPROXIMATION SCHEMES BIN PACKING IN MULTIPLE DIMENSIONS: INAPPROXIMABILITY RESULTS AND APPROXIMATION SCHEMES NIKHIL BANSAL 1, JOSÉ R. CORREA2, CLAIRE KENYON 3, AND MAXIM SVIRIDENKO 1 1 IBM T.J. Watson Research Center, Yorktown

More information

Theory of Computation CS3102 Spring 2014 A tale of computers, math, problem solving, life, love and tragic death

Theory of Computation CS3102 Spring 2014 A tale of computers, math, problem solving, life, love and tragic death Theory of Computation CS3102 Spring 2014 A tale of computers, math, problem solving, life, love and tragic death Nathan Brunelle Department of Computer Science University of Virginia www.cs.virginia.edu/~njb2b/theory

More information

Lecture 1 : Probabilistic Method

Lecture 1 : Probabilistic Method IITM-CS6845: Theory Jan 04, 01 Lecturer: N.S.Narayanaswamy Lecture 1 : Probabilistic Method Scribe: R.Krithika The probabilistic method is a technique to deal with combinatorial problems by introducing

More information

Balanced Allocation Through Random Walk

Balanced Allocation Through Random Walk Balanced Allocation Through Random Walk Alan Frieze Samantha Petti November 25, 2017 Abstract We consider the allocation problem in which m (1 ε)dn items are to be allocated to n bins with capacity d.

More information

Notes on Complexity Theory Last updated: November, Lecture 10

Notes on Complexity Theory Last updated: November, Lecture 10 Notes on Complexity Theory Last updated: November, 2015 Lecture 10 Notes by Jonathan Katz, lightly edited by Dov Gordon. 1 Randomized Time Complexity 1.1 How Large is BPP? We know that P ZPP = RP corp

More information

Lecture 7: Passive Learning

Lecture 7: Passive Learning CS 880: Advanced Complexity Theory 2/8/2008 Lecture 7: Passive Learning Instructor: Dieter van Melkebeek Scribe: Tom Watson In the previous lectures, we studied harmonic analysis as a tool for analyzing

More information

Polynomial kernels for constant-factor approximable problems

Polynomial kernels for constant-factor approximable problems 1 Polynomial kernels for constant-factor approximable problems Stefan Kratsch November 11, 2010 2 What do these problems have in common? Cluster Edge Deletion, Cluster Edge Editing, Edge Dominating Set,

More information

COT 6936: Topics in Algorithms! Giri Narasimhan. ECS 254A / EC 2443; Phone: x3748

COT 6936: Topics in Algorithms! Giri Narasimhan. ECS 254A / EC 2443; Phone: x3748 COT 6936: Topics in Algorithms! Giri Narasimhan ECS 254A / EC 2443; Phone: x3748 giri@cs.fiu.edu https://moodle.cis.fiu.edu/v2.1/course/view.php?id=612 Gaussian Elimination! Solving a system of simultaneous

More information

Optimal Online Algorithms for Multidimensional Packing Problems

Optimal Online Algorithms for Multidimensional Packing Problems Optimal Online Algorithms for Multidimensional Packing Problems Leah Epstein Rob van Stee Abstract We solve an open problem in the literature by providing an online algorithm for multidimensional bin packing

More information

WHAT IS A SKIP LIST? S 2 S 1. A skip list for a set S of distinct (key, element) items is a series of lists

WHAT IS A SKIP LIST? S 2 S 1. A skip list for a set S of distinct (key, element) items is a series of lists CH 9.4 : SKIP LISTS 1 ACKNOWLEDGEMENT: THESE SLIDES ARE ADAPTED FROM SLIDES PROVIDED WITH DATA STRUCTURES AND ALGORITHMS IN C++, GOODRICH, TAMASSIA AND MOUNT (WILEY 2004) AND SLIDES FROM JORY DENNY AND

More information

Supremum of simple stochastic processes

Supremum of simple stochastic processes Subspace embeddings Daniel Hsu COMS 4772 1 Supremum of simple stochastic processes 2 Recap: JL lemma JL lemma. For any ε (0, 1/2), point set S R d of cardinality 16 ln n S = n, and k N such that k, there

More information

Lecture : Lovász Theta Body. Introduction to hierarchies.

Lecture : Lovász Theta Body. Introduction to hierarchies. Strong Relaations for Discrete Optimization Problems 20-27/05/6 Lecture : Lovász Theta Body. Introduction to hierarchies. Lecturer: Yuri Faenza Scribes: Yuri Faenza Recall: stable sets and perfect graphs

More information