Algorithms for Streaming Data

Size: px
Start display at page:

Download "Algorithms for Streaming Data"

Transcription

1 Algorithms for Piotr Indyk

2 Problems defined over elements P={p 1,,p n } The algorithm sees p 1, then p 2, then p 3, Key fact: it has limited storage Can store only s<<n points Can store only s<<n bits (need to assume finite precision) p 1...p 2...p 3.p 4...p 5.p 6.p 7.

3 Example - diameter

4 Problems Diameter l 2 norm of a high-dimensional vector Histograms

5 Diameter in l d Assume we measure distances according to the l norm What can we do?

6 Diameter in l, ctd. From previous lecture we know that Diam (P)=max i=1 d [max p P p i -min p P p i ] Can maintain max/min in constant space Total space = O(d ) What about l 1?

7 Diameter in l 1 Let f:l 1d l 2^d be an isometric embedding We will maintain Diam (f(p)) For each point p, we compute f(p) and feed it to the previous algorithm Return the pair p,q that maximizes f(p)-f(q) This gives O(2 d ) space for l 1 d What about l 2?

8 Diameter in l 2 Let f:l 2d l d, d =O(1/ε) (d-1)/2, be a (1+ε)- distortion embedding Apply the same algorithm as before Parameters: Space: O(1/ε) (d-1)/2

9 Maintaining l 2 norm of a vector Implicit vector x=(x 1,,x n ) Start with x=0 Stream: sequence of pairs (i,b), meaning x i =x i +b Goal: maintain (approximately) x 2

10 Motivation Consider a set of web pages, stored in some order Two pages are similar if they link to the same page Note that each page is similar to itself Want to know the number of triplets <a,b,c> using small space Web pages streamed sequentially a c b

11 Connection to l 2 norm Let In(i)be the # in-links to page i Out(i)be the # out-links of page i Out(i)is easy to compute, In(i) is not We want to compute ½* i In(i) (In(i)+1) = ½ [ i In(i) 2 + i In(i)] Every time we see link to i: In(i):=In(i)+1

12 Approximate Algorithm Algorithm: Computes a (1+ε)-approximation to x 2 with probability 1-P Stores O(log(1/P)/ε 2 ) numbers

13 Algorithm From JL lemma, it suffices to maintain Ax for random A, since Ax x Assume we have Ax Need to compute Ay, where y=x except for y i =x i +b Use linearity: Ay = A(y-x)+Ax = A(be i )+Ax = b a i + Ax

14 Pseudo-randomness In practice: use A[i,j]=Normal( RND(i,j) ) In theory: one can use bounded space random generators to generate A using only O( log n * log(1/p)/ε 2 ) random numbers

15 Histograms View x as a function x:[1 n] -> [1 M] Approximate it using piecewise constant function h, with B pieces (buckets)

16 Our goal Want to maintain the best B-bucket representation of x, under changes of x Measure the error using 2-norm (1-norm also OK)

17 Our Approach Maintain sketches Ax of x Using Ax, construct B-histogram h which approximately minimizes x-h

18 Our result Can maintain a B-histogram h such that x-h (1+ε) x-h* up to a factor of using poly(log n, B, 1/ε) time/space, with probability 1-1/poly(n)

19 Proof: by iterated improvement Bbuckets, >n B construction time O(B log n) buckets, n 3 construction time B log 2 n buckets, n 2 construction time B log 2 n buckets, n poly(b+log n) time B log O(1) n buckets, poly(b+log n) time Bbuckets, poly(b+log n) time

20 Exponential time approach There are at most (2Mn) B+1 functions h By JL lemma, can reduce dimension to O(B log (Mn)), and approximately preserve x-h for all h To reconstruct h, minimize Ax-Ah Can be trivially done by enumerating all h s

21 Greedy approach Start from h=0, i=0 Repeat Let h(i,c) be the histogram h with the values in the interval I set to c Choose h =h(i,c) to minimize Ax Ah h=h Increment i Until i> const*b*log M

22 Details The square of Ax-A h(i,c) is a quadratic function of c Once we compute the parameters of this function, e.g. E(c)=Ac 2 +Bc+D, the minimum is achieved for c=b/(2a)

23 How does it help O(n 2 ) intervals O(n) time to find best c minimizing Ax-A h(i,c) 2 Overall: O(n 3 ) time

24 Approximation factor Assume ε=0, for simplicity Let h* be the optimal B-histogram If we replaced the current histogram h by all B intervals of h* (with proper values c), we would reduce the squared error from x-h 2 to x-h* 2 Thus, there is an interval I of h* (and c) such that x h(i,c) 2 - x-h 2 - (1-1/B) ( x-h 2 - x-h* 2 ) or Err i+1 (1-1/B) Err i, where Err i = x-h 2 - x-h* in stage i Since Err 0 n M 2, we get that i=o(b ln (nm 2 )) is enough to reduce Err i to 1

25 For the curious

26 Minimum Enclosing Ball Problem: given P={p 1 p n }, find center o and radius r>0 such that P B(o,r) ris as small as possible Solve the problem in l Generalize to l 1 and l 2 via embeddings

27 MEB in l Let C be the hyper-rectangle defined by max/min in every dimension Easy to see that min radius ball B(o,r) is a min size hypercube that contains C Min radius = min side length/2 How to solve it in l 2?

28 MEB in l 2 Firstly, assume (1+ε) 1 Let f:l 2d l d be an almost isometric embedding Algorithm: For each point p, compute f(p) Maintain MEB B (o,r) of f(p 1 ) f(p n ) Compute o such that f(o)=o Report B(o,r)

29 Problem There might be NO o such that f(o)=o If it was the case, then we would always have MEB radius=diameter/2, which is not true: The problem is that f is into, not onto

30 The Correct Version Algorithm: Maintain the min/max points f(p 1 ) f(p 2d ), two points per dimension Compute MEB B(o,r) of p 1 p 2d Report B(o,r(1+ε))

31 Correctness MEB radius for P = Min r s.t. o P B(o,r) Min r s.t. o f(p) B(f(o),r) = Min r s.t. o {f(p 1 ) f(p 2d )} B(f(o),r) Min r s.t. o {p 1 p 2d } B(o,r) = MEB radius for {p 1 p 2d } Total error at most (1+ε) 2 In reality, at most (1+ε)

32 Digression: Core Sets In the previous slide we use the fact that in l, for any set P of points, there is a subset P of P, P =2d, such that MEB(P )=MEB(P) P is called a core-set for the MEB of P in l For more on core-sets, see the web page by Sariel Har-Peled

CS 372: Computational Geometry Lecture 14 Geometric Approximation Algorithms

CS 372: Computational Geometry Lecture 14 Geometric Approximation Algorithms CS 372: Computational Geometry Lecture 14 Geometric Approximation Algorithms Antoine Vigneron King Abdullah University of Science and Technology December 5, 2012 Antoine Vigneron (KAUST) CS 372 Lecture

More information

Succinct Data Structures for Approximating Convex Functions with Applications

Succinct Data Structures for Approximating Convex Functions with Applications Succinct Data Structures for Approximating Convex Functions with Applications Prosenjit Bose, 1 Luc Devroye and Pat Morin 1 1 School of Computer Science, Carleton University, Ottawa, Canada, K1S 5B6, {jit,morin}@cs.carleton.ca

More information

An Algorithmist s Toolkit Nov. 10, Lecture 17

An Algorithmist s Toolkit Nov. 10, Lecture 17 8.409 An Algorithmist s Toolkit Nov. 0, 009 Lecturer: Jonathan Kelner Lecture 7 Johnson-Lindenstrauss Theorem. Recap We first recap a theorem (isoperimetric inequality) and a lemma (concentration) from

More information

4 Locality-sensitive hashing using stable distributions

4 Locality-sensitive hashing using stable distributions 4 Locality-sensitive hashing using stable distributions 4. The LSH scheme based on s-stable distributions In this chapter, we introduce and analyze a novel locality-sensitive hashing family. The family

More information

Streaming Algorithms for Set Cover. Piotr Indyk With: Sepideh Mahabadi, Ali Vakilian

Streaming Algorithms for Set Cover. Piotr Indyk With: Sepideh Mahabadi, Ali Vakilian Streaming Algorithms for Set Cover Piotr Indyk With: Sepideh Mahabadi, Ali Vakilian Set Cover Input: a collection S of sets S 1...S m that covers U={1...n} I.e., S 1 S 2. S m = U Output: a subset I of

More information

Fast Dimension Reduction

Fast Dimension Reduction Fast Dimension Reduction MMDS 2008 Nir Ailon Google Research NY Fast Dimension Reduction Using Rademacher Series on Dual BCH Codes (with Edo Liberty) The Fast Johnson Lindenstrauss Transform (with Bernard

More information

Clustering in High Dimensions. Mihai Bădoiu

Clustering in High Dimensions. Mihai Bădoiu Clustering in High Dimensions by Mihai Bădoiu Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Bachelor of Science

More information

Wavelet decomposition of data streams. by Dragana Veljkovic

Wavelet decomposition of data streams. by Dragana Veljkovic Wavelet decomposition of data streams by Dragana Veljkovic Motivation Continuous data streams arise naturally in: telecommunication and internet traffic retail and banking transactions web server log records

More information

FUNCTIONAL ANALYSIS LECTURE NOTES: COMPACT SETS AND FINITE-DIMENSIONAL SPACES. 1. Compact Sets

FUNCTIONAL ANALYSIS LECTURE NOTES: COMPACT SETS AND FINITE-DIMENSIONAL SPACES. 1. Compact Sets FUNCTIONAL ANALYSIS LECTURE NOTES: COMPACT SETS AND FINITE-DIMENSIONAL SPACES CHRISTOPHER HEIL 1. Compact Sets Definition 1.1 (Compact and Totally Bounded Sets). Let X be a metric space, and let E X be

More information

Sparse analysis Lecture V: From Sparse Approximation to Sparse Signal Recovery

Sparse analysis Lecture V: From Sparse Approximation to Sparse Signal Recovery Sparse analysis Lecture V: From Sparse Approximation to Sparse Signal Recovery Anna C. Gilbert Department of Mathematics University of Michigan Connection between... Sparse Approximation and Compressed

More information

Lecture 18: March 15

Lecture 18: March 15 CS71 Randomness & Computation Spring 018 Instructor: Alistair Sinclair Lecture 18: March 15 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They may

More information

8. Prime Factorization and Primary Decompositions

8. Prime Factorization and Primary Decompositions 70 Andreas Gathmann 8. Prime Factorization and Primary Decompositions 13 When it comes to actual computations, Euclidean domains (or more generally principal ideal domains) are probably the nicest rings

More information

16 Embeddings of the Euclidean metric

16 Embeddings of the Euclidean metric 16 Embeddings of the Euclidean metric In today s lecture, we will consider how well we can embed n points in the Euclidean metric (l 2 ) into other l p metrics. More formally, we ask the following question.

More information

Goldreich-Levin Hardcore Predicate. Lecture 28: List Decoding Hadamard Code and Goldreich-L

Goldreich-Levin Hardcore Predicate. Lecture 28: List Decoding Hadamard Code and Goldreich-L Lecture 28: List Decoding Hadamard Code and Goldreich-Levin Hardcore Predicate Recall Let H : {0, 1} n {+1, 1} Let: L ε = {S : χ S agrees with H at (1/2 + ε) fraction of points} Given oracle access to

More information

Locality Sensitive Hashing

Locality Sensitive Hashing Locality Sensitive Hashing February 1, 016 1 LSH in Hamming space The following discussion focuses on the notion of Locality Sensitive Hashing which was first introduced in [5]. We focus in the case of

More information

An efficient approximation for point-set diameter in higher dimensions

An efficient approximation for point-set diameter in higher dimensions CCCG 2018, Winnipeg, Canada, August 8 10, 2018 An efficient approximation for point-set diameter in higher dimensions Mahdi Imanparast Seyed Naser Hashemi Ali Mohades Abstract In this paper, we study the

More information

Optimal compression of approximate Euclidean distances

Optimal compression of approximate Euclidean distances Optimal compression of approximate Euclidean distances Noga Alon 1 Bo az Klartag 2 Abstract Let X be a set of n points of norm at most 1 in the Euclidean space R k, and suppose ε > 0. An ε-distance sketch

More information

Supremum of simple stochastic processes

Supremum of simple stochastic processes Subspace embeddings Daniel Hsu COMS 4772 1 Supremum of simple stochastic processes 2 Recap: JL lemma JL lemma. For any ε (0, 1/2), point set S R d of cardinality 16 ln n S = n, and k N such that k, there

More information

PLC Papers Created For:

PLC Papers Created For: PLC Papers Created For: Year 11 Topic Practice Paper: Factorising Quadratics Factorising difficult quadratic expressions 1 Grade 7 Objective: Factorise a quadratic expression of the form ax 2 + bx + c

More information

Similarity searching, or how to find your neighbors efficiently

Similarity searching, or how to find your neighbors efficiently Similarity searching, or how to find your neighbors efficiently Robert Krauthgamer Weizmann Institute of Science CS Research Day for Prospective Students May 1, 2009 Background Geometric spaces and techniques

More information

Streaming Algorithms for Extent Problems in High Dimensions

Streaming Algorithms for Extent Problems in High Dimensions Streaming Algorithms for Extent Problems in High Dimensions Pankaj K. Agarwal R. Sharathkumar Department of Computer Science Duke University {pankaj, sharath}@cs.duke.edu Abstract We develop single-pass)

More information

Sketching and Streaming for Distributions

Sketching and Streaming for Distributions Sketching and Streaming for Distributions Piotr Indyk Andrew McGregor Massachusetts Institute of Technology University of California, San Diego Main Material: Stable distributions, pseudo-random generators,

More information

Notes taken by Costis Georgiou revised by Hamed Hatami

Notes taken by Costis Georgiou revised by Hamed Hatami CSC414 - Metric Embeddings Lecture 6: Reductions that preserve volumes and distance to affine spaces & Lower bound techniques for distortion when embedding into l Notes taken by Costis Georgiou revised

More information

Linear Sketches A Useful Tool in Streaming and Compressive Sensing

Linear Sketches A Useful Tool in Streaming and Compressive Sensing Linear Sketches A Useful Tool in Streaming and Compressive Sensing Qin Zhang 1-1 Linear sketch Random linear projection M : R n R k that preserves properties of any v R n with high prob. where k n. M =

More information

A Fast and Simple Algorithm for Computing Approximate Euclidean Minimum Spanning Trees

A Fast and Simple Algorithm for Computing Approximate Euclidean Minimum Spanning Trees A Fast and Simple Algorithm for Computing Approximate Euclidean Minimum Spanning Trees Sunil Arya Hong Kong University of Science and Technology and David Mount University of Maryland Arya and Mount HALG

More information

MA5206 Homework 4. Group 4. April 26, ϕ 1 = 1, ϕ n (x) = 1 n 2 ϕ 1(n 2 x). = 1 and h n C 0. For any ξ ( 1 n, 2 n 2 ), n 3, h n (t) ξ t dt

MA5206 Homework 4. Group 4. April 26, ϕ 1 = 1, ϕ n (x) = 1 n 2 ϕ 1(n 2 x). = 1 and h n C 0. For any ξ ( 1 n, 2 n 2 ), n 3, h n (t) ξ t dt MA526 Homework 4 Group 4 April 26, 26 Qn 6.2 Show that H is not bounded as a map: L L. Deduce from this that H is not bounded as a map L L. Let {ϕ n } be an approximation of the identity s.t. ϕ C, sptϕ

More information

Lecture 1: Introduction to Sublinear Algorithms

Lecture 1: Introduction to Sublinear Algorithms CSE 522: Sublinear (and Streaming) Algorithms Spring 2014 Lecture 1: Introduction to Sublinear Algorithms March 31, 2014 Lecturer: Paul Beame Scribe: Paul Beame Too much data, too little time, space for

More information

Similarity Search in High Dimensions II. Piotr Indyk MIT

Similarity Search in High Dimensions II. Piotr Indyk MIT Similarity Search in High Dimensions II Piotr Indyk MIT Approximate Near(est) Neighbor c-approximate Nearest Neighbor: build data structure which, for any query q returns p P, p-q cr, where r is the distance

More information

Fractional Set Cover in the Streaming Model

Fractional Set Cover in the Streaming Model Fractional Set Cover in the Streaming Model Piotr Indyk MIT Sepideh Mahabadi MIT Ronitt Rubinfeld MIT/TAU Jonathan Ullman Northeastern Univ Ali Vakilian MIT Anak Yodpinyanee MIT Set Cover Problem Input:

More information

Fast Dimension Reduction

Fast Dimension Reduction Fast Dimension Reduction Nir Ailon 1 Edo Liberty 2 1 Google Research 2 Yale University Introduction Lemma (Johnson, Lindenstrauss (1984)) A random projection Ψ preserves all ( n 2) distances up to distortion

More information

Lecture 3: Randomness in Computation

Lecture 3: Randomness in Computation Great Ideas in Theoretical Computer Science Summer 2013 Lecture 3: Randomness in Computation Lecturer: Kurt Mehlhorn & He Sun Randomness is one of basic resources and appears everywhere. In computer science,

More information

The Ellipsoid (Kachiyan) Method

The Ellipsoid (Kachiyan) Method Yinyu Ye, MS&E, Stanford MS&E310 Lecture Note: Ellipsoid Method 1 The Ellipsoid (Kachiyan) Method Yinyu Ye Department of Management Science and Engineering Stanford University Stanford, CA 94305, U.S.A.

More information

Grothendieck s Inequality

Grothendieck s Inequality Grothendieck s Inequality Leqi Zhu 1 Introduction Let A = (A ij ) R m n be an m n matrix. Then A defines a linear operator between normed spaces (R m, p ) and (R n, q ), for 1 p, q. The (p q)-norm of A

More information

USAC Colloquium. Bending Polyhedra. Andrejs Treibergs. September 4, Figure 1: A Rigid Polyhedron. University of Utah

USAC Colloquium. Bending Polyhedra. Andrejs Treibergs. September 4, Figure 1: A Rigid Polyhedron. University of Utah USAC Colloquium Bending Polyhedra Andrejs Treibergs University of Utah September 4, 2013 Figure 1: A Rigid Polyhedron. 2. USAC Lecture: Bending Polyhedra The URL for these Beamer Slides: BendingPolyhedra

More information

Optimality of the Johnson-Lindenstrauss Lemma

Optimality of the Johnson-Lindenstrauss Lemma Optimality of the Johnson-Lindenstrauss Lemma Kasper Green Larsen Jelani Nelson September 7, 2016 Abstract For any integers d, n 2 and 1/(min{n, d}) 0.4999 < ε < 1, we show the existence of a set of n

More information

In this section you will learn the following : 40.1Double integrals

In this section you will learn the following : 40.1Double integrals Module 14 : Double Integrals, Applilcations to Areas and Volumes Change of variables Lecture 40 : Double integrals over rectangular domains [Section 40.1] Objectives In this section you will learn the

More information

MAT 570 REAL ANALYSIS LECTURE NOTES. Contents. 1. Sets Functions Countability Axiom of choice Equivalence relations 9

MAT 570 REAL ANALYSIS LECTURE NOTES. Contents. 1. Sets Functions Countability Axiom of choice Equivalence relations 9 MAT 570 REAL ANALYSIS LECTURE NOTES PROFESSOR: JOHN QUIGG SEMESTER: FALL 204 Contents. Sets 2 2. Functions 5 3. Countability 7 4. Axiom of choice 8 5. Equivalence relations 9 6. Real numbers 9 7. Extended

More information

Lebesgue Measure on R n

Lebesgue Measure on R n CHAPTER 2 Lebesgue Measure on R n Our goal is to construct a notion of the volume, or Lebesgue measure, of rather general subsets of R n that reduces to the usual volume of elementary geometrical sets

More information

Functional Analysis HW #1

Functional Analysis HW #1 Functional Analysis HW #1 Sangchul Lee October 9, 2015 1 Solutions Solution of #1.1. Suppose that X

More information

Estimating Dominance Norms of Multiple Data Streams Graham Cormode Joint work with S. Muthukrishnan

Estimating Dominance Norms of Multiple Data Streams Graham Cormode Joint work with S. Muthukrishnan Estimating Dominance Norms of Multiple Data Streams Graham Cormode graham@dimacs.rutgers.edu Joint work with S. Muthukrishnan Data Stream Phenomenon Data is being produced faster than our ability to process

More information

Real Analysis Math 131AH Rudin, Chapter #1. Dominique Abdi

Real Analysis Math 131AH Rudin, Chapter #1. Dominique Abdi Real Analysis Math 3AH Rudin, Chapter # Dominique Abdi.. If r is rational (r 0) and x is irrational, prove that r + x and rx are irrational. Solution. Assume the contrary, that r+x and rx are rational.

More information

Linear Algebra and Eigenproblems

Linear Algebra and Eigenproblems Appendix A A Linear Algebra and Eigenproblems A working knowledge of linear algebra is key to understanding many of the issues raised in this work. In particular, many of the discussions of the details

More information

CS 664 Segmentation (2) Daniel Huttenlocher

CS 664 Segmentation (2) Daniel Huttenlocher CS 664 Segmentation (2) Daniel Huttenlocher Recap Last time covered perceptual organization more broadly, focused in on pixel-wise segmentation Covered local graph-based methods such as MST and Felzenszwalb-Huttenlocher

More information

Lecture 2. Frequency problems

Lecture 2. Frequency problems 1 / 43 Lecture 2. Frequency problems Ricard Gavaldà MIRI Seminar on Data Streams, Spring 2015 Contents 2 / 43 1 Frequency problems in data streams 2 Approximating inner product 3 Computing frequency moments

More information

Geometric Optimization Problems over Sliding Windows

Geometric Optimization Problems over Sliding Windows Geometric Optimization Problems over Sliding Windows Timothy M. Chan and Bashir S. Sadjad School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada {tmchan,bssadjad}@uwaterloo.ca

More information

Approximate Clustering via Core-Sets

Approximate Clustering via Core-Sets Approximate Clustering via Core-Sets Mihai Bădoiu Sariel Har-Peled Piotr Indyk 22/02/2002 17:40 Abstract In this paper, we show that for several clustering problems one can extract a small set of points,

More information

Streaming and communication complexity of Hamming distance

Streaming and communication complexity of Hamming distance Streaming and communication complexity of Hamming distance Tatiana Starikovskaya IRIF, Université Paris-Diderot (Joint work with Raphaël Clifford, ICALP 16) Approximate pattern matching Problem Pattern

More information

Chapter 8 ~ Quadratic Functions and Equations In this chapter you will study... You can use these skills...

Chapter 8 ~ Quadratic Functions and Equations In this chapter you will study... You can use these skills... Chapter 8 ~ Quadratic Functions and Equations In this chapter you will study... identifying and graphing quadratic functions transforming quadratic equations solving quadratic equations using factoring

More information

17 Random Projections and Orthogonal Matching Pursuit

17 Random Projections and Orthogonal Matching Pursuit 17 Random Projections and Orthogonal Matching Pursuit Again we will consider high-dimensional data P. Now we will consider the uses and effects of randomness. We will use it to simplify P (put it in a

More information

1. Find the real solutions, if any, of a. x 2 + 3x + 9 = 0 Discriminant: b 2 4ac = = 24 > 0, so 2 real solutions. Use the quadratic formula,

1. Find the real solutions, if any, of a. x 2 + 3x + 9 = 0 Discriminant: b 2 4ac = = 24 > 0, so 2 real solutions. Use the quadratic formula, Math 110, Winter 008, Sec, Instructor Whitehead P. 1 of 8 1. Find the real solutions, if any, of a. x + 3x + 9 = 0 Discriminant: b 4ac = 3 3 4 1 9 = 7 < 0, so NO real solutions b. x 4x = 0 Discriminant:

More information

March 25, 2010 CHAPTER 2: LIMITS AND CONTINUITY OF FUNCTIONS IN EUCLIDEAN SPACE

March 25, 2010 CHAPTER 2: LIMITS AND CONTINUITY OF FUNCTIONS IN EUCLIDEAN SPACE March 25, 2010 CHAPTER 2: LIMIT AND CONTINUITY OF FUNCTION IN EUCLIDEAN PACE 1. calar product in R n Definition 1.1. Given x = (x 1,..., x n ), y = (y 1,..., y n ) R n,we define their scalar product as

More information

Pseudorandom Generators

Pseudorandom Generators 8 Pseudorandom Generators Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 andomness is one of the fundamental computational resources and appears everywhere. In computer science,

More information

arxiv: v2 [math.mg] 25 Oct 2017

arxiv: v2 [math.mg] 25 Oct 2017 The Hausdorff Mapping Is Nonexpanding arxiv:1710.08472v2 [math.mg] 25 Oct 2017 Ivan A. Mikhaylov Abstract In the present paper we investigate the properties of the Hausdorff mapping H, which takes each

More information

Computing Minmax; Dominance

Computing Minmax; Dominance Computing Minmax; Dominance CPSC 532A Lecture 5 Computing Minmax; Dominance CPSC 532A Lecture 5, Slide 1 Lecture Overview 1 Recap 2 Linear Programming 3 Computational Problems Involving Maxmin 4 Domination

More information

Optimization and Optimal Control in Banach Spaces

Optimization and Optimal Control in Banach Spaces Optimization and Optimal Control in Banach Spaces Bernhard Schmitzer October 19, 2017 1 Convex non-smooth optimization with proximal operators Remark 1.1 (Motivation). Convex optimization: easier to solve,

More information

Sparse analysis Lecture VII: Combining geometry and combinatorics, sparse matrices for sparse signal recovery

Sparse analysis Lecture VII: Combining geometry and combinatorics, sparse matrices for sparse signal recovery Sparse analysis Lecture VII: Combining geometry and combinatorics, sparse matrices for sparse signal recovery Anna C. Gilbert Department of Mathematics University of Michigan Sparse signal recovery measurements:

More information

More Approximation Algorithms

More Approximation Algorithms CS 473: Algorithms, Spring 2018 More Approximation Algorithms Lecture 25 April 26, 2018 Most slides are courtesy Prof. Chekuri Ruta (UIUC) CS473 1 Spring 2018 1 / 28 Formal definition of approximation

More information

Mining Data Streams. The Stream Model Sliding Windows Counting 1 s

Mining Data Streams. The Stream Model Sliding Windows Counting 1 s Mining Data Streams The Stream Model Sliding Windows Counting 1 s 1 The Stream Model Data enters at a rapid rate from one or more input ports. The system cannot store the entire stream. How do you make

More information

Faster Algorithms for Sparse Fourier Transform

Faster Algorithms for Sparse Fourier Transform Faster Algorithms for Sparse Fourier Transform Haitham Hassanieh Piotr Indyk Dina Katabi Eric Price MIT Material from: Hassanieh, Indyk, Katabi, Price, Simple and Practical Algorithms for Sparse Fourier

More information

Randomized Algorithms

Randomized Algorithms Randomized Algorithms Saniv Kumar, Google Research, NY EECS-6898, Columbia University - Fall, 010 Saniv Kumar 9/13/010 EECS6898 Large Scale Machine Learning 1 Curse of Dimensionality Gaussian Mixture Models

More information

25 Minimum bandwidth: Approximation via volume respecting embeddings

25 Minimum bandwidth: Approximation via volume respecting embeddings 25 Minimum bandwidth: Approximation via volume respecting embeddings We continue the study of Volume respecting embeddings. In the last lecture, we motivated the use of volume respecting embeddings by

More information

Problem Set 6: Solutions Math 201A: Fall a n x n,

Problem Set 6: Solutions Math 201A: Fall a n x n, Problem Set 6: Solutions Math 201A: Fall 2016 Problem 1. Is (x n ) n=0 a Schauder basis of C([0, 1])? No. If f(x) = a n x n, n=0 where the series converges uniformly on [0, 1], then f has a power series

More information

Nonuniform Random Variate Generation

Nonuniform Random Variate Generation Nonuniform Random Variate Generation 1 Suppose we have a generator of i.i.d. U(0, 1) r.v. s. We want to generate r.v. s from other distributions, such as normal, Weibull, Poisson, etc. Or other random

More information

Knapsack. Bag/knapsack of integer capacity B n items item i has size s i and profit/weight w i

Knapsack. Bag/knapsack of integer capacity B n items item i has size s i and profit/weight w i Knapsack Bag/knapsack of integer capacity B n items item i has size s i and profit/weight w i Goal: find a subset of items of maximum profit such that the item subset fits in the bag Knapsack X: item set

More information

Fall 09/MAT 140/Worksheet 1 Name: Show all your work. 1. (6pts) Simplify and write the answer so all exponents are positive:

Fall 09/MAT 140/Worksheet 1 Name: Show all your work. 1. (6pts) Simplify and write the answer so all exponents are positive: Fall 09/MAT 140/Worksheet 1 Name: Show all your work. 1. (6pts) Simplify and write the answer so all exponents are positive: a) (x 3 y 6 ) 3 x 4 y 5 = b) 4x 2 (3y) 2 (6x 3 y 4 ) 2 = 2. (2pts) Convert to

More information

Maps which preserve equality of distance. Must they be linear?

Maps which preserve equality of distance. Must they be linear? Maps which preserve equality of distance. Must they be linear? Colloquium Fullerton College Bernard Russo University of California, Irvine November 16, 2017 Bernard Russo (UCI) Maps which preserve equality

More information

Introduction to Algorithms 6.046J/18.401J/SMA5503

Introduction to Algorithms 6.046J/18.401J/SMA5503 Introduction to Algorithms 6.046J/8.40J/SMA5503 Lecture 3 Prof. Piotr Indyk The divide-and-conquer design paradigm. Divide the problem (instance) into subproblems. 2. Conquer the subproblems by solving

More information

Tutorial: Sparse Recovery Using Sparse Matrices. Piotr Indyk MIT

Tutorial: Sparse Recovery Using Sparse Matrices. Piotr Indyk MIT Tutorial: Sparse Recovery Using Sparse Matrices Piotr Indyk MIT Problem Formulation (approximation theory, learning Fourier coeffs, linear sketching, finite rate of innovation, compressed sensing...) Setup:

More information

Game Theory: Lecture 3

Game Theory: Lecture 3 Game Theory: Lecture 3 Lecturer: Pingzhong Tang Topic: Mixed strategy Scribe: Yuan Deng March 16, 2015 Definition 1 (Mixed strategy). A mixed strategy S i : A i [0, 1] assigns a probability S i ( ) 0 to

More information

Proximity problems in high dimensions

Proximity problems in high dimensions Proximity problems in high dimensions Ioannis Psarros National & Kapodistrian University of Athens March 31, 2017 Ioannis Psarros Proximity problems in high dimensions March 31, 2017 1 / 43 Problem definition

More information

Game Theory. Kuhn s Theorem. Bernhard Nebel, Robert Mattmüller, Stefan Wölfl, Christian Becker-Asano

Game Theory. Kuhn s Theorem. Bernhard Nebel, Robert Mattmüller, Stefan Wölfl, Christian Becker-Asano Game Theory Albert-Ludwigs-Universität Freiburg Bernhard Nebel, Robert Mattmüller, Stefan Wölfl, Christian Becker-Asano Research Group Foundations of Artificial Intelligence June 17, 2013 June 17, 2013

More information

Computing Minmax; Dominance

Computing Minmax; Dominance Computing Minmax; Dominance CPSC 532A Lecture 5 Computing Minmax; Dominance CPSC 532A Lecture 5, Slide 1 Lecture Overview 1 Recap 2 Linear Programming 3 Computational Problems Involving Maxmin 4 Domination

More information

Combining geometry and combinatorics

Combining geometry and combinatorics Combining geometry and combinatorics A unified approach to sparse signal recovery Anna C. Gilbert University of Michigan joint work with R. Berinde (MIT), P. Indyk (MIT), H. Karloff (AT&T), M. Strauss

More information

Projective Clustering in High Dimensions using Core-Sets

Projective Clustering in High Dimensions using Core-Sets Projective Clustering in High Dimensions using Core-Sets Sariel Har-Peled Kasturi R. Varadarajan January 31, 2003 Abstract In this paper, we show that there exists a small core-set for the problem of computing

More information

Lecture 4: Knot Complements

Lecture 4: Knot Complements Lecture 4: Knot Complements Notes by Zach Haney January 26, 2016 1 Introduction Here we discuss properties of the knot complement, S 3 \ K, for a knot K. Definition 1.1. A tubular neighborhood V k S 3

More information

Optimal Data-Dependent Hashing for Approximate Near Neighbors

Optimal Data-Dependent Hashing for Approximate Near Neighbors Optimal Data-Dependent Hashing for Approximate Near Neighbors Alexandr Andoni 1 Ilya Razenshteyn 2 1 Simons Institute 2 MIT, CSAIL April 20, 2015 1 / 30 Nearest Neighbor Search (NNS) Let P be an n-point

More information

Faster Algorithms for Sparse Fourier Transform

Faster Algorithms for Sparse Fourier Transform Faster Algorithms for Sparse Fourier Transform Haitham Hassanieh Piotr Indyk Dina Katabi Eric Price MIT Material from: Hassanieh, Indyk, Katabi, Price, Simple and Practical Algorithms for Sparse Fourier

More information

1 Dimension Reduction in Euclidean Space

1 Dimension Reduction in Euclidean Space CSIS0351/8601: Randomized Algorithms Lecture 6: Johnson-Lindenstrauss Lemma: Dimension Reduction Lecturer: Hubert Chan Date: 10 Oct 011 hese lecture notes are supplementary materials for the lectures.

More information

Chapter 8. P-adic numbers. 8.1 Absolute values

Chapter 8. P-adic numbers. 8.1 Absolute values Chapter 8 P-adic numbers Literature: N. Koblitz, p-adic Numbers, p-adic Analysis, and Zeta-Functions, 2nd edition, Graduate Texts in Mathematics 58, Springer Verlag 1984, corrected 2nd printing 1996, Chap.

More information

9 Sequences of Functions

9 Sequences of Functions 9 Sequences of Functions 9.1 Pointwise convergence and uniform convergence Let D R d, and let f n : D R be functions (n N). We may think of the functions f 1, f 2, f 3,... as forming a sequence of functions.

More information

On the Optimality of the Dimensionality Reduction Method

On the Optimality of the Dimensionality Reduction Method On the Optimality of the Dimensionality Reduction Method Alexandr Andoni MIT andoni@mit.edu Piotr Indyk MIT indyk@mit.edu Mihai Pǎtraşcu MIT mip@mit.edu Abstract We investigate the optimality of (1+)-approximation

More information

Lecture 13 October 6, Covering Numbers and Maurey s Empirical Method

Lecture 13 October 6, Covering Numbers and Maurey s Empirical Method CS 395T: Sublinear Algorithms Fall 2016 Prof. Eric Price Lecture 13 October 6, 2016 Scribe: Kiyeon Jeon and Loc Hoang 1 Overview In the last lecture we covered the lower bound for p th moment (p > 2) and

More information

QALGO workshop, Riga. 1 / 26. Quantum algorithms for linear algebra.

QALGO workshop, Riga. 1 / 26. Quantum algorithms for linear algebra. QALGO workshop, Riga. 1 / 26 Quantum algorithms for linear algebra., Center for Quantum Technologies and Nanyang Technological University, Singapore. September 22, 2015 QALGO workshop, Riga. 2 / 26 Overview

More information

Solutions to Tutorial 8 (Week 9)

Solutions to Tutorial 8 (Week 9) The University of Sydney School of Mathematics and Statistics Solutions to Tutorial 8 (Week 9) MATH3961: Metric Spaces (Advanced) Semester 1, 2018 Web Page: http://www.maths.usyd.edu.au/u/ug/sm/math3961/

More information

Tutorial: Sparse Recovery Using Sparse Matrices. Piotr Indyk MIT

Tutorial: Sparse Recovery Using Sparse Matrices. Piotr Indyk MIT Tutorial: Sparse Recovery Using Sparse Matrices Piotr Indyk MIT Problem Formulation (approximation theory, learning Fourier coeffs, linear sketching, finite rate of innovation, compressed sensing...) Setup:

More information

Mining Data Streams. The Stream Model. The Stream Model Sliding Windows Counting 1 s

Mining Data Streams. The Stream Model. The Stream Model Sliding Windows Counting 1 s Mining Data Streams The Stream Model Sliding Windows Counting 1 s 1 The Stream Model Data enters at a rapid rate from one or more input ports. The system cannot store the entire stream. How do you make

More information

Bounded-parameter Markov Decision Processes

Bounded-parameter Markov Decision Processes Bounded-parameter arkov Decision Processes Robert Givan and Sonia Leach and Thomas Dean Dept of Electrical & Computer Engineering Department of Computer Science Purdue University Brown University 1285

More information

CS 473: Algorithms. Ruta Mehta. Spring University of Illinois, Urbana-Champaign. Ruta (UIUC) CS473 1 Spring / 32

CS 473: Algorithms. Ruta Mehta. Spring University of Illinois, Urbana-Champaign. Ruta (UIUC) CS473 1 Spring / 32 CS 473: Algorithms Ruta Mehta University of Illinois, Urbana-Champaign Spring 2018 Ruta (UIUC) CS473 1 Spring 2018 1 / 32 CS 473: Algorithms, Spring 2018 Universal Hashing Lecture 10 Feb 15, 2018 Most

More information

Lipschitz continuity properties

Lipschitz continuity properties properties (joint work with G. Comte and F. Loeser) K.U.Leuven, Belgium MODNET Barcelona Conference 3-7 November 2008 1/26 1 Introduction 2 3 2/26 Introduction Definition A function f : X Y is called Lipschitz

More information

1.4 The Jacobian of a map

1.4 The Jacobian of a map 1.4 The Jacobian of a map Derivative of a differentiable map Let F : M n N m be a differentiable map between two C 1 manifolds. Given a point p M we define the derivative of F at p by df p df (p) : T p

More information

Definition 6.1. A metric space (X, d) is complete if every Cauchy sequence tends to a limit in X.

Definition 6.1. A metric space (X, d) is complete if every Cauchy sequence tends to a limit in X. Chapter 6 Completeness Lecture 18 Recall from Definition 2.22 that a Cauchy sequence in (X, d) is a sequence whose terms get closer and closer together, without any limit being specified. In the Euclidean

More information

4.1 Primary Decompositions

4.1 Primary Decompositions 4.1 Primary Decompositions generalization of factorization of an integer as a product of prime powers. unique factorization of ideals in a large class of rings. In Z, a prime number p gives rise to a prime

More information

Probabilistic clustering of high dimensional norms. Assaf Naor Princeton University SODA 17

Probabilistic clustering of high dimensional norms. Assaf Naor Princeton University SODA 17 Probabilistic clustering of high dimensional norms Assaf Naor Princeton University SODA 17 Partitions of metric spaces Let (X; d X ) be a metric space and a partition of X. P Given a point x 2 X; P(x)

More information

Lecture: Convex Optimization Problems

Lecture: Convex Optimization Problems 1/36 Lecture: Convex Optimization Problems http://bicmr.pku.edu.cn/~wenzw/opt-2015-fall.html Acknowledgement: this slides is based on Prof. Lieven Vandenberghe s lecture notes Introduction 2/36 optimization

More information

ELEC system identification workshop. Subspace methods

ELEC system identification workshop. Subspace methods 1 / 33 ELEC system identification workshop Subspace methods Ivan Markovsky 2 / 33 Plan 1. Behavioral approach 2. Subspace methods 3. Optimization methods 3 / 33 Outline Exact modeling Algorithms 4 / 33

More information

CS151 Complexity Theory. Lecture 9 May 1, 2017

CS151 Complexity Theory. Lecture 9 May 1, 2017 CS151 Complexity Theory Lecture 9 Hardness vs. randomness We have shown: If one-way permutations exist then BPP δ>0 TIME(2 nδ ) ( EXP simulation is better than brute force, but just barely stronger assumptions

More information

Part IB Geometry. Theorems. Based on lectures by A. G. Kovalev Notes taken by Dexter Chua. Lent 2016

Part IB Geometry. Theorems. Based on lectures by A. G. Kovalev Notes taken by Dexter Chua. Lent 2016 Part IB Geometry Theorems Based on lectures by A. G. Kovalev Notes taken by Dexter Chua Lent 2016 These notes are not endorsed by the lecturers, and I have modified them (often significantly) after lectures.

More information

Approximate counting: count-min data structure. Problem definition

Approximate counting: count-min data structure. Problem definition Approximate counting: count-min data structure G. Cormode and S. Muthukrishhan: An improved data stream summary: the count-min sketch and its applications. Journal of Algorithms 55 (2005) 58-75. Problem

More information

Math 10C - Fall Final Exam

Math 10C - Fall Final Exam Math 1C - Fall 217 - Final Exam Problem 1. Consider the function f(x, y) = 1 x 2 (y 1) 2. (i) Draw the level curve through the point P (1, 2). Find the gradient of f at the point P and draw the gradient

More information

FRACTAL GEOMETRY, DYNAMICAL SYSTEMS AND CHAOS

FRACTAL GEOMETRY, DYNAMICAL SYSTEMS AND CHAOS FRACTAL GEOMETRY, DYNAMICAL SYSTEMS AND CHAOS MIDTERM SOLUTIONS. Let f : R R be the map on the line generated by the function f(x) = x 3. Find all the fixed points of f and determine the type of their

More information