Algorithms for Streaming Data
|
|
- Robyn Booker
- 6 years ago
- Views:
Transcription
1 Algorithms for Piotr Indyk
2 Problems defined over elements P={p 1,,p n } The algorithm sees p 1, then p 2, then p 3, Key fact: it has limited storage Can store only s<<n points Can store only s<<n bits (need to assume finite precision) p 1...p 2...p 3.p 4...p 5.p 6.p 7.
3 Example - diameter
4 Problems Diameter l 2 norm of a high-dimensional vector Histograms
5 Diameter in l d Assume we measure distances according to the l norm What can we do?
6 Diameter in l, ctd. From previous lecture we know that Diam (P)=max i=1 d [max p P p i -min p P p i ] Can maintain max/min in constant space Total space = O(d ) What about l 1?
7 Diameter in l 1 Let f:l 1d l 2^d be an isometric embedding We will maintain Diam (f(p)) For each point p, we compute f(p) and feed it to the previous algorithm Return the pair p,q that maximizes f(p)-f(q) This gives O(2 d ) space for l 1 d What about l 2?
8 Diameter in l 2 Let f:l 2d l d, d =O(1/ε) (d-1)/2, be a (1+ε)- distortion embedding Apply the same algorithm as before Parameters: Space: O(1/ε) (d-1)/2
9 Maintaining l 2 norm of a vector Implicit vector x=(x 1,,x n ) Start with x=0 Stream: sequence of pairs (i,b), meaning x i =x i +b Goal: maintain (approximately) x 2
10 Motivation Consider a set of web pages, stored in some order Two pages are similar if they link to the same page Note that each page is similar to itself Want to know the number of triplets <a,b,c> using small space Web pages streamed sequentially a c b
11 Connection to l 2 norm Let In(i)be the # in-links to page i Out(i)be the # out-links of page i Out(i)is easy to compute, In(i) is not We want to compute ½* i In(i) (In(i)+1) = ½ [ i In(i) 2 + i In(i)] Every time we see link to i: In(i):=In(i)+1
12 Approximate Algorithm Algorithm: Computes a (1+ε)-approximation to x 2 with probability 1-P Stores O(log(1/P)/ε 2 ) numbers
13 Algorithm From JL lemma, it suffices to maintain Ax for random A, since Ax x Assume we have Ax Need to compute Ay, where y=x except for y i =x i +b Use linearity: Ay = A(y-x)+Ax = A(be i )+Ax = b a i + Ax
14 Pseudo-randomness In practice: use A[i,j]=Normal( RND(i,j) ) In theory: one can use bounded space random generators to generate A using only O( log n * log(1/p)/ε 2 ) random numbers
15 Histograms View x as a function x:[1 n] -> [1 M] Approximate it using piecewise constant function h, with B pieces (buckets)
16 Our goal Want to maintain the best B-bucket representation of x, under changes of x Measure the error using 2-norm (1-norm also OK)
17 Our Approach Maintain sketches Ax of x Using Ax, construct B-histogram h which approximately minimizes x-h
18 Our result Can maintain a B-histogram h such that x-h (1+ε) x-h* up to a factor of using poly(log n, B, 1/ε) time/space, with probability 1-1/poly(n)
19 Proof: by iterated improvement Bbuckets, >n B construction time O(B log n) buckets, n 3 construction time B log 2 n buckets, n 2 construction time B log 2 n buckets, n poly(b+log n) time B log O(1) n buckets, poly(b+log n) time Bbuckets, poly(b+log n) time
20 Exponential time approach There are at most (2Mn) B+1 functions h By JL lemma, can reduce dimension to O(B log (Mn)), and approximately preserve x-h for all h To reconstruct h, minimize Ax-Ah Can be trivially done by enumerating all h s
21 Greedy approach Start from h=0, i=0 Repeat Let h(i,c) be the histogram h with the values in the interval I set to c Choose h =h(i,c) to minimize Ax Ah h=h Increment i Until i> const*b*log M
22 Details The square of Ax-A h(i,c) is a quadratic function of c Once we compute the parameters of this function, e.g. E(c)=Ac 2 +Bc+D, the minimum is achieved for c=b/(2a)
23 How does it help O(n 2 ) intervals O(n) time to find best c minimizing Ax-A h(i,c) 2 Overall: O(n 3 ) time
24 Approximation factor Assume ε=0, for simplicity Let h* be the optimal B-histogram If we replaced the current histogram h by all B intervals of h* (with proper values c), we would reduce the squared error from x-h 2 to x-h* 2 Thus, there is an interval I of h* (and c) such that x h(i,c) 2 - x-h 2 - (1-1/B) ( x-h 2 - x-h* 2 ) or Err i+1 (1-1/B) Err i, where Err i = x-h 2 - x-h* in stage i Since Err 0 n M 2, we get that i=o(b ln (nm 2 )) is enough to reduce Err i to 1
25 For the curious
26 Minimum Enclosing Ball Problem: given P={p 1 p n }, find center o and radius r>0 such that P B(o,r) ris as small as possible Solve the problem in l Generalize to l 1 and l 2 via embeddings
27 MEB in l Let C be the hyper-rectangle defined by max/min in every dimension Easy to see that min radius ball B(o,r) is a min size hypercube that contains C Min radius = min side length/2 How to solve it in l 2?
28 MEB in l 2 Firstly, assume (1+ε) 1 Let f:l 2d l d be an almost isometric embedding Algorithm: For each point p, compute f(p) Maintain MEB B (o,r) of f(p 1 ) f(p n ) Compute o such that f(o)=o Report B(o,r)
29 Problem There might be NO o such that f(o)=o If it was the case, then we would always have MEB radius=diameter/2, which is not true: The problem is that f is into, not onto
30 The Correct Version Algorithm: Maintain the min/max points f(p 1 ) f(p 2d ), two points per dimension Compute MEB B(o,r) of p 1 p 2d Report B(o,r(1+ε))
31 Correctness MEB radius for P = Min r s.t. o P B(o,r) Min r s.t. o f(p) B(f(o),r) = Min r s.t. o {f(p 1 ) f(p 2d )} B(f(o),r) Min r s.t. o {p 1 p 2d } B(o,r) = MEB radius for {p 1 p 2d } Total error at most (1+ε) 2 In reality, at most (1+ε)
32 Digression: Core Sets In the previous slide we use the fact that in l, for any set P of points, there is a subset P of P, P =2d, such that MEB(P )=MEB(P) P is called a core-set for the MEB of P in l For more on core-sets, see the web page by Sariel Har-Peled
CS 372: Computational Geometry Lecture 14 Geometric Approximation Algorithms
CS 372: Computational Geometry Lecture 14 Geometric Approximation Algorithms Antoine Vigneron King Abdullah University of Science and Technology December 5, 2012 Antoine Vigneron (KAUST) CS 372 Lecture
More informationSuccinct Data Structures for Approximating Convex Functions with Applications
Succinct Data Structures for Approximating Convex Functions with Applications Prosenjit Bose, 1 Luc Devroye and Pat Morin 1 1 School of Computer Science, Carleton University, Ottawa, Canada, K1S 5B6, {jit,morin}@cs.carleton.ca
More informationAn Algorithmist s Toolkit Nov. 10, Lecture 17
8.409 An Algorithmist s Toolkit Nov. 0, 009 Lecturer: Jonathan Kelner Lecture 7 Johnson-Lindenstrauss Theorem. Recap We first recap a theorem (isoperimetric inequality) and a lemma (concentration) from
More information4 Locality-sensitive hashing using stable distributions
4 Locality-sensitive hashing using stable distributions 4. The LSH scheme based on s-stable distributions In this chapter, we introduce and analyze a novel locality-sensitive hashing family. The family
More informationStreaming Algorithms for Set Cover. Piotr Indyk With: Sepideh Mahabadi, Ali Vakilian
Streaming Algorithms for Set Cover Piotr Indyk With: Sepideh Mahabadi, Ali Vakilian Set Cover Input: a collection S of sets S 1...S m that covers U={1...n} I.e., S 1 S 2. S m = U Output: a subset I of
More informationFast Dimension Reduction
Fast Dimension Reduction MMDS 2008 Nir Ailon Google Research NY Fast Dimension Reduction Using Rademacher Series on Dual BCH Codes (with Edo Liberty) The Fast Johnson Lindenstrauss Transform (with Bernard
More informationClustering in High Dimensions. Mihai Bădoiu
Clustering in High Dimensions by Mihai Bădoiu Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Bachelor of Science
More informationWavelet decomposition of data streams. by Dragana Veljkovic
Wavelet decomposition of data streams by Dragana Veljkovic Motivation Continuous data streams arise naturally in: telecommunication and internet traffic retail and banking transactions web server log records
More informationFUNCTIONAL ANALYSIS LECTURE NOTES: COMPACT SETS AND FINITE-DIMENSIONAL SPACES. 1. Compact Sets
FUNCTIONAL ANALYSIS LECTURE NOTES: COMPACT SETS AND FINITE-DIMENSIONAL SPACES CHRISTOPHER HEIL 1. Compact Sets Definition 1.1 (Compact and Totally Bounded Sets). Let X be a metric space, and let E X be
More informationSparse analysis Lecture V: From Sparse Approximation to Sparse Signal Recovery
Sparse analysis Lecture V: From Sparse Approximation to Sparse Signal Recovery Anna C. Gilbert Department of Mathematics University of Michigan Connection between... Sparse Approximation and Compressed
More informationLecture 18: March 15
CS71 Randomness & Computation Spring 018 Instructor: Alistair Sinclair Lecture 18: March 15 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They may
More information8. Prime Factorization and Primary Decompositions
70 Andreas Gathmann 8. Prime Factorization and Primary Decompositions 13 When it comes to actual computations, Euclidean domains (or more generally principal ideal domains) are probably the nicest rings
More information16 Embeddings of the Euclidean metric
16 Embeddings of the Euclidean metric In today s lecture, we will consider how well we can embed n points in the Euclidean metric (l 2 ) into other l p metrics. More formally, we ask the following question.
More informationGoldreich-Levin Hardcore Predicate. Lecture 28: List Decoding Hadamard Code and Goldreich-L
Lecture 28: List Decoding Hadamard Code and Goldreich-Levin Hardcore Predicate Recall Let H : {0, 1} n {+1, 1} Let: L ε = {S : χ S agrees with H at (1/2 + ε) fraction of points} Given oracle access to
More informationLocality Sensitive Hashing
Locality Sensitive Hashing February 1, 016 1 LSH in Hamming space The following discussion focuses on the notion of Locality Sensitive Hashing which was first introduced in [5]. We focus in the case of
More informationAn efficient approximation for point-set diameter in higher dimensions
CCCG 2018, Winnipeg, Canada, August 8 10, 2018 An efficient approximation for point-set diameter in higher dimensions Mahdi Imanparast Seyed Naser Hashemi Ali Mohades Abstract In this paper, we study the
More informationOptimal compression of approximate Euclidean distances
Optimal compression of approximate Euclidean distances Noga Alon 1 Bo az Klartag 2 Abstract Let X be a set of n points of norm at most 1 in the Euclidean space R k, and suppose ε > 0. An ε-distance sketch
More informationSupremum of simple stochastic processes
Subspace embeddings Daniel Hsu COMS 4772 1 Supremum of simple stochastic processes 2 Recap: JL lemma JL lemma. For any ε (0, 1/2), point set S R d of cardinality 16 ln n S = n, and k N such that k, there
More informationPLC Papers Created For:
PLC Papers Created For: Year 11 Topic Practice Paper: Factorising Quadratics Factorising difficult quadratic expressions 1 Grade 7 Objective: Factorise a quadratic expression of the form ax 2 + bx + c
More informationSimilarity searching, or how to find your neighbors efficiently
Similarity searching, or how to find your neighbors efficiently Robert Krauthgamer Weizmann Institute of Science CS Research Day for Prospective Students May 1, 2009 Background Geometric spaces and techniques
More informationStreaming Algorithms for Extent Problems in High Dimensions
Streaming Algorithms for Extent Problems in High Dimensions Pankaj K. Agarwal R. Sharathkumar Department of Computer Science Duke University {pankaj, sharath}@cs.duke.edu Abstract We develop single-pass)
More informationSketching and Streaming for Distributions
Sketching and Streaming for Distributions Piotr Indyk Andrew McGregor Massachusetts Institute of Technology University of California, San Diego Main Material: Stable distributions, pseudo-random generators,
More informationNotes taken by Costis Georgiou revised by Hamed Hatami
CSC414 - Metric Embeddings Lecture 6: Reductions that preserve volumes and distance to affine spaces & Lower bound techniques for distortion when embedding into l Notes taken by Costis Georgiou revised
More informationLinear Sketches A Useful Tool in Streaming and Compressive Sensing
Linear Sketches A Useful Tool in Streaming and Compressive Sensing Qin Zhang 1-1 Linear sketch Random linear projection M : R n R k that preserves properties of any v R n with high prob. where k n. M =
More informationA Fast and Simple Algorithm for Computing Approximate Euclidean Minimum Spanning Trees
A Fast and Simple Algorithm for Computing Approximate Euclidean Minimum Spanning Trees Sunil Arya Hong Kong University of Science and Technology and David Mount University of Maryland Arya and Mount HALG
More informationMA5206 Homework 4. Group 4. April 26, ϕ 1 = 1, ϕ n (x) = 1 n 2 ϕ 1(n 2 x). = 1 and h n C 0. For any ξ ( 1 n, 2 n 2 ), n 3, h n (t) ξ t dt
MA526 Homework 4 Group 4 April 26, 26 Qn 6.2 Show that H is not bounded as a map: L L. Deduce from this that H is not bounded as a map L L. Let {ϕ n } be an approximation of the identity s.t. ϕ C, sptϕ
More informationLecture 1: Introduction to Sublinear Algorithms
CSE 522: Sublinear (and Streaming) Algorithms Spring 2014 Lecture 1: Introduction to Sublinear Algorithms March 31, 2014 Lecturer: Paul Beame Scribe: Paul Beame Too much data, too little time, space for
More informationSimilarity Search in High Dimensions II. Piotr Indyk MIT
Similarity Search in High Dimensions II Piotr Indyk MIT Approximate Near(est) Neighbor c-approximate Nearest Neighbor: build data structure which, for any query q returns p P, p-q cr, where r is the distance
More informationFractional Set Cover in the Streaming Model
Fractional Set Cover in the Streaming Model Piotr Indyk MIT Sepideh Mahabadi MIT Ronitt Rubinfeld MIT/TAU Jonathan Ullman Northeastern Univ Ali Vakilian MIT Anak Yodpinyanee MIT Set Cover Problem Input:
More informationFast Dimension Reduction
Fast Dimension Reduction Nir Ailon 1 Edo Liberty 2 1 Google Research 2 Yale University Introduction Lemma (Johnson, Lindenstrauss (1984)) A random projection Ψ preserves all ( n 2) distances up to distortion
More informationLecture 3: Randomness in Computation
Great Ideas in Theoretical Computer Science Summer 2013 Lecture 3: Randomness in Computation Lecturer: Kurt Mehlhorn & He Sun Randomness is one of basic resources and appears everywhere. In computer science,
More informationThe Ellipsoid (Kachiyan) Method
Yinyu Ye, MS&E, Stanford MS&E310 Lecture Note: Ellipsoid Method 1 The Ellipsoid (Kachiyan) Method Yinyu Ye Department of Management Science and Engineering Stanford University Stanford, CA 94305, U.S.A.
More informationGrothendieck s Inequality
Grothendieck s Inequality Leqi Zhu 1 Introduction Let A = (A ij ) R m n be an m n matrix. Then A defines a linear operator between normed spaces (R m, p ) and (R n, q ), for 1 p, q. The (p q)-norm of A
More informationUSAC Colloquium. Bending Polyhedra. Andrejs Treibergs. September 4, Figure 1: A Rigid Polyhedron. University of Utah
USAC Colloquium Bending Polyhedra Andrejs Treibergs University of Utah September 4, 2013 Figure 1: A Rigid Polyhedron. 2. USAC Lecture: Bending Polyhedra The URL for these Beamer Slides: BendingPolyhedra
More informationOptimality of the Johnson-Lindenstrauss Lemma
Optimality of the Johnson-Lindenstrauss Lemma Kasper Green Larsen Jelani Nelson September 7, 2016 Abstract For any integers d, n 2 and 1/(min{n, d}) 0.4999 < ε < 1, we show the existence of a set of n
More informationIn this section you will learn the following : 40.1Double integrals
Module 14 : Double Integrals, Applilcations to Areas and Volumes Change of variables Lecture 40 : Double integrals over rectangular domains [Section 40.1] Objectives In this section you will learn the
More informationMAT 570 REAL ANALYSIS LECTURE NOTES. Contents. 1. Sets Functions Countability Axiom of choice Equivalence relations 9
MAT 570 REAL ANALYSIS LECTURE NOTES PROFESSOR: JOHN QUIGG SEMESTER: FALL 204 Contents. Sets 2 2. Functions 5 3. Countability 7 4. Axiom of choice 8 5. Equivalence relations 9 6. Real numbers 9 7. Extended
More informationLebesgue Measure on R n
CHAPTER 2 Lebesgue Measure on R n Our goal is to construct a notion of the volume, or Lebesgue measure, of rather general subsets of R n that reduces to the usual volume of elementary geometrical sets
More informationFunctional Analysis HW #1
Functional Analysis HW #1 Sangchul Lee October 9, 2015 1 Solutions Solution of #1.1. Suppose that X
More informationEstimating Dominance Norms of Multiple Data Streams Graham Cormode Joint work with S. Muthukrishnan
Estimating Dominance Norms of Multiple Data Streams Graham Cormode graham@dimacs.rutgers.edu Joint work with S. Muthukrishnan Data Stream Phenomenon Data is being produced faster than our ability to process
More informationReal Analysis Math 131AH Rudin, Chapter #1. Dominique Abdi
Real Analysis Math 3AH Rudin, Chapter # Dominique Abdi.. If r is rational (r 0) and x is irrational, prove that r + x and rx are irrational. Solution. Assume the contrary, that r+x and rx are rational.
More informationLinear Algebra and Eigenproblems
Appendix A A Linear Algebra and Eigenproblems A working knowledge of linear algebra is key to understanding many of the issues raised in this work. In particular, many of the discussions of the details
More informationCS 664 Segmentation (2) Daniel Huttenlocher
CS 664 Segmentation (2) Daniel Huttenlocher Recap Last time covered perceptual organization more broadly, focused in on pixel-wise segmentation Covered local graph-based methods such as MST and Felzenszwalb-Huttenlocher
More informationLecture 2. Frequency problems
1 / 43 Lecture 2. Frequency problems Ricard Gavaldà MIRI Seminar on Data Streams, Spring 2015 Contents 2 / 43 1 Frequency problems in data streams 2 Approximating inner product 3 Computing frequency moments
More informationGeometric Optimization Problems over Sliding Windows
Geometric Optimization Problems over Sliding Windows Timothy M. Chan and Bashir S. Sadjad School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada {tmchan,bssadjad}@uwaterloo.ca
More informationApproximate Clustering via Core-Sets
Approximate Clustering via Core-Sets Mihai Bădoiu Sariel Har-Peled Piotr Indyk 22/02/2002 17:40 Abstract In this paper, we show that for several clustering problems one can extract a small set of points,
More informationStreaming and communication complexity of Hamming distance
Streaming and communication complexity of Hamming distance Tatiana Starikovskaya IRIF, Université Paris-Diderot (Joint work with Raphaël Clifford, ICALP 16) Approximate pattern matching Problem Pattern
More informationChapter 8 ~ Quadratic Functions and Equations In this chapter you will study... You can use these skills...
Chapter 8 ~ Quadratic Functions and Equations In this chapter you will study... identifying and graphing quadratic functions transforming quadratic equations solving quadratic equations using factoring
More information17 Random Projections and Orthogonal Matching Pursuit
17 Random Projections and Orthogonal Matching Pursuit Again we will consider high-dimensional data P. Now we will consider the uses and effects of randomness. We will use it to simplify P (put it in a
More information1. Find the real solutions, if any, of a. x 2 + 3x + 9 = 0 Discriminant: b 2 4ac = = 24 > 0, so 2 real solutions. Use the quadratic formula,
Math 110, Winter 008, Sec, Instructor Whitehead P. 1 of 8 1. Find the real solutions, if any, of a. x + 3x + 9 = 0 Discriminant: b 4ac = 3 3 4 1 9 = 7 < 0, so NO real solutions b. x 4x = 0 Discriminant:
More informationMarch 25, 2010 CHAPTER 2: LIMITS AND CONTINUITY OF FUNCTIONS IN EUCLIDEAN SPACE
March 25, 2010 CHAPTER 2: LIMIT AND CONTINUITY OF FUNCTION IN EUCLIDEAN PACE 1. calar product in R n Definition 1.1. Given x = (x 1,..., x n ), y = (y 1,..., y n ) R n,we define their scalar product as
More informationPseudorandom Generators
8 Pseudorandom Generators Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 andomness is one of the fundamental computational resources and appears everywhere. In computer science,
More informationarxiv: v2 [math.mg] 25 Oct 2017
The Hausdorff Mapping Is Nonexpanding arxiv:1710.08472v2 [math.mg] 25 Oct 2017 Ivan A. Mikhaylov Abstract In the present paper we investigate the properties of the Hausdorff mapping H, which takes each
More informationComputing Minmax; Dominance
Computing Minmax; Dominance CPSC 532A Lecture 5 Computing Minmax; Dominance CPSC 532A Lecture 5, Slide 1 Lecture Overview 1 Recap 2 Linear Programming 3 Computational Problems Involving Maxmin 4 Domination
More informationOptimization and Optimal Control in Banach Spaces
Optimization and Optimal Control in Banach Spaces Bernhard Schmitzer October 19, 2017 1 Convex non-smooth optimization with proximal operators Remark 1.1 (Motivation). Convex optimization: easier to solve,
More informationSparse analysis Lecture VII: Combining geometry and combinatorics, sparse matrices for sparse signal recovery
Sparse analysis Lecture VII: Combining geometry and combinatorics, sparse matrices for sparse signal recovery Anna C. Gilbert Department of Mathematics University of Michigan Sparse signal recovery measurements:
More informationMore Approximation Algorithms
CS 473: Algorithms, Spring 2018 More Approximation Algorithms Lecture 25 April 26, 2018 Most slides are courtesy Prof. Chekuri Ruta (UIUC) CS473 1 Spring 2018 1 / 28 Formal definition of approximation
More informationMining Data Streams. The Stream Model Sliding Windows Counting 1 s
Mining Data Streams The Stream Model Sliding Windows Counting 1 s 1 The Stream Model Data enters at a rapid rate from one or more input ports. The system cannot store the entire stream. How do you make
More informationFaster Algorithms for Sparse Fourier Transform
Faster Algorithms for Sparse Fourier Transform Haitham Hassanieh Piotr Indyk Dina Katabi Eric Price MIT Material from: Hassanieh, Indyk, Katabi, Price, Simple and Practical Algorithms for Sparse Fourier
More informationRandomized Algorithms
Randomized Algorithms Saniv Kumar, Google Research, NY EECS-6898, Columbia University - Fall, 010 Saniv Kumar 9/13/010 EECS6898 Large Scale Machine Learning 1 Curse of Dimensionality Gaussian Mixture Models
More information25 Minimum bandwidth: Approximation via volume respecting embeddings
25 Minimum bandwidth: Approximation via volume respecting embeddings We continue the study of Volume respecting embeddings. In the last lecture, we motivated the use of volume respecting embeddings by
More informationProblem Set 6: Solutions Math 201A: Fall a n x n,
Problem Set 6: Solutions Math 201A: Fall 2016 Problem 1. Is (x n ) n=0 a Schauder basis of C([0, 1])? No. If f(x) = a n x n, n=0 where the series converges uniformly on [0, 1], then f has a power series
More informationNonuniform Random Variate Generation
Nonuniform Random Variate Generation 1 Suppose we have a generator of i.i.d. U(0, 1) r.v. s. We want to generate r.v. s from other distributions, such as normal, Weibull, Poisson, etc. Or other random
More informationKnapsack. Bag/knapsack of integer capacity B n items item i has size s i and profit/weight w i
Knapsack Bag/knapsack of integer capacity B n items item i has size s i and profit/weight w i Goal: find a subset of items of maximum profit such that the item subset fits in the bag Knapsack X: item set
More informationFall 09/MAT 140/Worksheet 1 Name: Show all your work. 1. (6pts) Simplify and write the answer so all exponents are positive:
Fall 09/MAT 140/Worksheet 1 Name: Show all your work. 1. (6pts) Simplify and write the answer so all exponents are positive: a) (x 3 y 6 ) 3 x 4 y 5 = b) 4x 2 (3y) 2 (6x 3 y 4 ) 2 = 2. (2pts) Convert to
More informationMaps which preserve equality of distance. Must they be linear?
Maps which preserve equality of distance. Must they be linear? Colloquium Fullerton College Bernard Russo University of California, Irvine November 16, 2017 Bernard Russo (UCI) Maps which preserve equality
More informationIntroduction to Algorithms 6.046J/18.401J/SMA5503
Introduction to Algorithms 6.046J/8.40J/SMA5503 Lecture 3 Prof. Piotr Indyk The divide-and-conquer design paradigm. Divide the problem (instance) into subproblems. 2. Conquer the subproblems by solving
More informationTutorial: Sparse Recovery Using Sparse Matrices. Piotr Indyk MIT
Tutorial: Sparse Recovery Using Sparse Matrices Piotr Indyk MIT Problem Formulation (approximation theory, learning Fourier coeffs, linear sketching, finite rate of innovation, compressed sensing...) Setup:
More informationGame Theory: Lecture 3
Game Theory: Lecture 3 Lecturer: Pingzhong Tang Topic: Mixed strategy Scribe: Yuan Deng March 16, 2015 Definition 1 (Mixed strategy). A mixed strategy S i : A i [0, 1] assigns a probability S i ( ) 0 to
More informationProximity problems in high dimensions
Proximity problems in high dimensions Ioannis Psarros National & Kapodistrian University of Athens March 31, 2017 Ioannis Psarros Proximity problems in high dimensions March 31, 2017 1 / 43 Problem definition
More informationGame Theory. Kuhn s Theorem. Bernhard Nebel, Robert Mattmüller, Stefan Wölfl, Christian Becker-Asano
Game Theory Albert-Ludwigs-Universität Freiburg Bernhard Nebel, Robert Mattmüller, Stefan Wölfl, Christian Becker-Asano Research Group Foundations of Artificial Intelligence June 17, 2013 June 17, 2013
More informationComputing Minmax; Dominance
Computing Minmax; Dominance CPSC 532A Lecture 5 Computing Minmax; Dominance CPSC 532A Lecture 5, Slide 1 Lecture Overview 1 Recap 2 Linear Programming 3 Computational Problems Involving Maxmin 4 Domination
More informationCombining geometry and combinatorics
Combining geometry and combinatorics A unified approach to sparse signal recovery Anna C. Gilbert University of Michigan joint work with R. Berinde (MIT), P. Indyk (MIT), H. Karloff (AT&T), M. Strauss
More informationProjective Clustering in High Dimensions using Core-Sets
Projective Clustering in High Dimensions using Core-Sets Sariel Har-Peled Kasturi R. Varadarajan January 31, 2003 Abstract In this paper, we show that there exists a small core-set for the problem of computing
More informationLecture 4: Knot Complements
Lecture 4: Knot Complements Notes by Zach Haney January 26, 2016 1 Introduction Here we discuss properties of the knot complement, S 3 \ K, for a knot K. Definition 1.1. A tubular neighborhood V k S 3
More informationOptimal Data-Dependent Hashing for Approximate Near Neighbors
Optimal Data-Dependent Hashing for Approximate Near Neighbors Alexandr Andoni 1 Ilya Razenshteyn 2 1 Simons Institute 2 MIT, CSAIL April 20, 2015 1 / 30 Nearest Neighbor Search (NNS) Let P be an n-point
More informationFaster Algorithms for Sparse Fourier Transform
Faster Algorithms for Sparse Fourier Transform Haitham Hassanieh Piotr Indyk Dina Katabi Eric Price MIT Material from: Hassanieh, Indyk, Katabi, Price, Simple and Practical Algorithms for Sparse Fourier
More information1 Dimension Reduction in Euclidean Space
CSIS0351/8601: Randomized Algorithms Lecture 6: Johnson-Lindenstrauss Lemma: Dimension Reduction Lecturer: Hubert Chan Date: 10 Oct 011 hese lecture notes are supplementary materials for the lectures.
More informationChapter 8. P-adic numbers. 8.1 Absolute values
Chapter 8 P-adic numbers Literature: N. Koblitz, p-adic Numbers, p-adic Analysis, and Zeta-Functions, 2nd edition, Graduate Texts in Mathematics 58, Springer Verlag 1984, corrected 2nd printing 1996, Chap.
More information9 Sequences of Functions
9 Sequences of Functions 9.1 Pointwise convergence and uniform convergence Let D R d, and let f n : D R be functions (n N). We may think of the functions f 1, f 2, f 3,... as forming a sequence of functions.
More informationOn the Optimality of the Dimensionality Reduction Method
On the Optimality of the Dimensionality Reduction Method Alexandr Andoni MIT andoni@mit.edu Piotr Indyk MIT indyk@mit.edu Mihai Pǎtraşcu MIT mip@mit.edu Abstract We investigate the optimality of (1+)-approximation
More informationLecture 13 October 6, Covering Numbers and Maurey s Empirical Method
CS 395T: Sublinear Algorithms Fall 2016 Prof. Eric Price Lecture 13 October 6, 2016 Scribe: Kiyeon Jeon and Loc Hoang 1 Overview In the last lecture we covered the lower bound for p th moment (p > 2) and
More informationQALGO workshop, Riga. 1 / 26. Quantum algorithms for linear algebra.
QALGO workshop, Riga. 1 / 26 Quantum algorithms for linear algebra., Center for Quantum Technologies and Nanyang Technological University, Singapore. September 22, 2015 QALGO workshop, Riga. 2 / 26 Overview
More informationSolutions to Tutorial 8 (Week 9)
The University of Sydney School of Mathematics and Statistics Solutions to Tutorial 8 (Week 9) MATH3961: Metric Spaces (Advanced) Semester 1, 2018 Web Page: http://www.maths.usyd.edu.au/u/ug/sm/math3961/
More informationTutorial: Sparse Recovery Using Sparse Matrices. Piotr Indyk MIT
Tutorial: Sparse Recovery Using Sparse Matrices Piotr Indyk MIT Problem Formulation (approximation theory, learning Fourier coeffs, linear sketching, finite rate of innovation, compressed sensing...) Setup:
More informationMining Data Streams. The Stream Model. The Stream Model Sliding Windows Counting 1 s
Mining Data Streams The Stream Model Sliding Windows Counting 1 s 1 The Stream Model Data enters at a rapid rate from one or more input ports. The system cannot store the entire stream. How do you make
More informationBounded-parameter Markov Decision Processes
Bounded-parameter arkov Decision Processes Robert Givan and Sonia Leach and Thomas Dean Dept of Electrical & Computer Engineering Department of Computer Science Purdue University Brown University 1285
More informationCS 473: Algorithms. Ruta Mehta. Spring University of Illinois, Urbana-Champaign. Ruta (UIUC) CS473 1 Spring / 32
CS 473: Algorithms Ruta Mehta University of Illinois, Urbana-Champaign Spring 2018 Ruta (UIUC) CS473 1 Spring 2018 1 / 32 CS 473: Algorithms, Spring 2018 Universal Hashing Lecture 10 Feb 15, 2018 Most
More informationLipschitz continuity properties
properties (joint work with G. Comte and F. Loeser) K.U.Leuven, Belgium MODNET Barcelona Conference 3-7 November 2008 1/26 1 Introduction 2 3 2/26 Introduction Definition A function f : X Y is called Lipschitz
More information1.4 The Jacobian of a map
1.4 The Jacobian of a map Derivative of a differentiable map Let F : M n N m be a differentiable map between two C 1 manifolds. Given a point p M we define the derivative of F at p by df p df (p) : T p
More informationDefinition 6.1. A metric space (X, d) is complete if every Cauchy sequence tends to a limit in X.
Chapter 6 Completeness Lecture 18 Recall from Definition 2.22 that a Cauchy sequence in (X, d) is a sequence whose terms get closer and closer together, without any limit being specified. In the Euclidean
More information4.1 Primary Decompositions
4.1 Primary Decompositions generalization of factorization of an integer as a product of prime powers. unique factorization of ideals in a large class of rings. In Z, a prime number p gives rise to a prime
More informationProbabilistic clustering of high dimensional norms. Assaf Naor Princeton University SODA 17
Probabilistic clustering of high dimensional norms Assaf Naor Princeton University SODA 17 Partitions of metric spaces Let (X; d X ) be a metric space and a partition of X. P Given a point x 2 X; P(x)
More informationLecture: Convex Optimization Problems
1/36 Lecture: Convex Optimization Problems http://bicmr.pku.edu.cn/~wenzw/opt-2015-fall.html Acknowledgement: this slides is based on Prof. Lieven Vandenberghe s lecture notes Introduction 2/36 optimization
More informationELEC system identification workshop. Subspace methods
1 / 33 ELEC system identification workshop Subspace methods Ivan Markovsky 2 / 33 Plan 1. Behavioral approach 2. Subspace methods 3. Optimization methods 3 / 33 Outline Exact modeling Algorithms 4 / 33
More informationCS151 Complexity Theory. Lecture 9 May 1, 2017
CS151 Complexity Theory Lecture 9 Hardness vs. randomness We have shown: If one-way permutations exist then BPP δ>0 TIME(2 nδ ) ( EXP simulation is better than brute force, but just barely stronger assumptions
More informationPart IB Geometry. Theorems. Based on lectures by A. G. Kovalev Notes taken by Dexter Chua. Lent 2016
Part IB Geometry Theorems Based on lectures by A. G. Kovalev Notes taken by Dexter Chua Lent 2016 These notes are not endorsed by the lecturers, and I have modified them (often significantly) after lectures.
More informationApproximate counting: count-min data structure. Problem definition
Approximate counting: count-min data structure G. Cormode and S. Muthukrishhan: An improved data stream summary: the count-min sketch and its applications. Journal of Algorithms 55 (2005) 58-75. Problem
More informationMath 10C - Fall Final Exam
Math 1C - Fall 217 - Final Exam Problem 1. Consider the function f(x, y) = 1 x 2 (y 1) 2. (i) Draw the level curve through the point P (1, 2). Find the gradient of f at the point P and draw the gradient
More informationFRACTAL GEOMETRY, DYNAMICAL SYSTEMS AND CHAOS
FRACTAL GEOMETRY, DYNAMICAL SYSTEMS AND CHAOS MIDTERM SOLUTIONS. Let f : R R be the map on the line generated by the function f(x) = x 3. Find all the fixed points of f and determine the type of their
More information