Graph & Geometry Problems in Data Streams
|
|
- Myles Howard
- 6 years ago
- Views:
Transcription
1 Graph & Geometry Problems in Data Streams 2009 Barbados Workshop on Computational Complexity Andrew McGregor
2 Introduction Models: Graph Streams: Stream of edges E = {e 1, e 2,..., e m } describe a graph G on n nodes. Estimate properties of G. Geometric Streams: Stream of points X = {p 1, p 2,..., p m } from some metric space (X, d). Estimate properties of X.
3 Introduction Models: Graph Streams: Stream of edges E = {e 1, e 2,..., e m } describe a graph G on n nodes. Estimate properties of G. Geometric Streams: Stream of points X = {p 1, p 2,..., p m } from some metric space (X, d). Estimate properties of X. Notes: Õ is our friend: we ll hide dependence on polylog(m, n) terms. Assume that p i can be stored in Õ(1) space and d(p i, p j ) can be calculated if both p i and p j are stored in memory. Theory isn t as cohesive but we get to cherry-pick results...
4 Counting Triangles Matching Clustering Graph Distances
5 Outline Counting Triangles Matching Clustering Graph Distances
6 Triangles Problem Given a stream of edges, estimate the number of triangles T 3 up to a factor (1 + ɛ) with probability 1 δ given promise that T 3 > t.
7 Triangles Problem Given a stream of edges, estimate the number of triangles T 3 up to a factor (1 + ɛ) with probability 1 δ given promise that T 3 > t. Warm-Up What s an algorithm using O(ɛ 2 (n 3 /t) log δ 1 ) space?
8 Triangles Problem Given a stream of edges, estimate the number of triangles T 3 up to a factor (1 + ɛ) with probability 1 δ given promise that T 3 > t. Warm-Up What s an algorithm using O(ɛ 2 (n 3 /t) log δ 1 ) space? Theorem Ω(n 2 ) space required to determine if t = 0 (with δ = 1/3).
9 Triangles Problem Given a stream of edges, estimate the number of triangles T 3 up to a factor (1 + ɛ) with probability 1 δ given promise that T 3 > t. Warm-Up What s an algorithm using O(ɛ 2 (n 3 /t) log δ 1 ) space? Theorem Ω(n 2 ) space required to determine if t = 0 (with δ = 1/3). Theorem (Sivakumar et al. 2002) Õ(ɛ 2 (nm/t) 2 log δ 1 ) space is sufficient.
10 Triangles Problem Given a stream of edges, estimate the number of triangles T 3 up to a factor (1 + ɛ) with probability 1 δ given promise that T 3 > t. Warm-Up What s an algorithm using O(ɛ 2 (n 3 /t) log δ 1 ) space? Theorem Ω(n 2 ) space required to determine if t = 0 (with δ = 1/3). Theorem (Sivakumar et al. 2002) Õ(ɛ 2 (nm/t) 2 log δ 1 ) space is sufficient. Theorem (Buriol et al. 2006) Õ(ɛ 2 (nm/t) log δ 1 ) space is sufficient.
11 Lower Bound Theorem Ω(n 2 ) space required to determine if T 3 0 when δ = 1/3.
12 Lower Bound Theorem Ω(n 2 ) space required to determine if T 3 0 when δ = 1/3. Reduce from set-disjointness: Alice has n n binary matrix A, Bob has n n binary matrix B. Is A ij = B ij = 1 for some (i, j)? Needs Ω(n 2 ) bits of communication [Razborov 1992].
13 Lower Bound Theorem Ω(n 2 ) space required to determine if T 3 0 when δ = 1/3. Reduce from set-disjointness: Alice has n n binary matrix A, Bob has n n binary matrix B. Is A ij = B ij = 1 for some (i, j)? Needs Ω(n 2 ) bits of communication [Razborov 1992]. Consider graph G = (V, E) with V = {v 1,..., v n, u 1,..., u n, w 1,..., w n } and E = {(v i, u i ) : i [n]}
14 Lower Bound Theorem Ω(n 2 ) space required to determine if T 3 0 when δ = 1/3. Reduce from set-disjointness: Alice has n n binary matrix A, Bob has n n binary matrix B. Is A ij = B ij = 1 for some (i, j)? Needs Ω(n 2 ) bits of communication [Razborov 1992]. Consider graph G = (V, E) with V = {v 1,..., v n, u 1,..., u n, w 1,..., w n } and E = {(v i, u i ) : i [n]} Alice runs algorithm on G and edges {(u i, w j ) : A ij = 1}.
15 Lower Bound Theorem Ω(n 2 ) space required to determine if T 3 0 when δ = 1/3. Reduce from set-disjointness: Alice has n n binary matrix A, Bob has n n binary matrix B. Is A ij = B ij = 1 for some (i, j)? Needs Ω(n 2 ) bits of communication [Razborov 1992]. Consider graph G = (V, E) with V = {v 1,..., v n, u 1,..., u n, w 1,..., w n } and E = {(v i, u i ) : i [n]} Alice runs algorithm on G and edges {(u i, w j ) : A ij = 1}. Bob continues running algorithm on edges {(v i, w j ) : B ij = 1}.
16 Lower Bound Theorem Ω(n 2 ) space required to determine if T 3 0 when δ = 1/3. Reduce from set-disjointness: Alice has n n binary matrix A, Bob has n n binary matrix B. Is A ij = B ij = 1 for some (i, j)? Needs Ω(n 2 ) bits of communication [Razborov 1992]. Consider graph G = (V, E) with V = {v 1,..., v n, u 1,..., u n, w 1,..., w n } and E = {(v i, u i ) : i [n]} Alice runs algorithm on G and edges {(u i, w j ) : A ij = 1}. Bob continues running algorithm on edges {(v i, w j ) : B ij = 1}. T 3 > 0 iff A ij = B ij = 1 for some (i, j).
17 First Algorithm Theorem (Sivakumar et al. 2002) Õ(ɛ 2 (nm/t 3 ) 2 log δ 1 ) space is sufficient.
18 First Algorithm Theorem (Sivakumar et al. 2002) Õ(ɛ 2 (nm/t 3 ) 2 log δ 1 ) space is sufficient. Given stream of edges induce stream of node-triples: edge (u, v) gives rise to {u, v, w} for w V \ {u, v}
19 First Algorithm Theorem (Sivakumar et al. 2002) Õ(ɛ 2 (nm/t 3 ) 2 log δ 1 ) space is sufficient. Given stream of edges induce stream of node-triples: edge (u, v) gives rise to {u, v, w} for w V \ {u, v} Consider F k = (freq. of {u,v,w}) k and note F 0 F 1 F 2 = T 1 T 2 T 3 where T i is the set of node-triples having exactly i edges in the induced subgraph.
20 First Algorithm Theorem (Sivakumar et al. 2002) Õ(ɛ 2 (nm/t 3 ) 2 log δ 1 ) space is sufficient. Given stream of edges induce stream of node-triples: edge (u, v) gives rise to {u, v, w} for w V \ {u, v} Consider F k = (freq. of {u,v,w}) k and note F 0 F 1 F 2 = T 1 T 2 T 3 where T i is the set of node-triples having exactly i edges in the induced subgraph. T 3 = F 0 3F 1 /2 + F 2 /2 so good approx. for F 0, F 1, F 2 suffice.
21 Second Algorithm Theorem (Buriol et al. 2006) Õ(ɛ 2 (nm/t 3 ) log δ 1 ) space is sufficient.
22 Second Algorithm Theorem (Buriol et al. 2006) Õ(ɛ 2 (nm/t 3 ) log δ 1 ) space is sufficient. Pick an edge e i = (u, v) uniformly at random from the stream.
23 Second Algorithm Theorem (Buriol et al. 2006) Õ(ɛ 2 (nm/t 3 ) log δ 1 ) space is sufficient. Pick an edge e i = (u, v) uniformly at random from the stream. Pick w uniformly at random from V \ {u, v}
24 Second Algorithm Theorem (Buriol et al. 2006) Õ(ɛ 2 (nm/t 3 ) log δ 1 ) space is sufficient. Pick an edge e i = (u, v) uniformly at random from the stream. Pick w uniformly at random from V \ {u, v} If e j = (u, w), e k = (v, w) for j, k > i exist return 1; else 0.
25 Second Algorithm Theorem (Buriol et al. 2006) Õ(ɛ 2 (nm/t 3 ) log δ 1 ) space is sufficient. Pick an edge e i = (u, v) uniformly at random from the stream. Pick w uniformly at random from V \ {u, v} If e j = (u, w), e k = (v, w) for j, k > i exist return 1; else 0. Lemma Expected outcome of algorithm is T 3 3m(n 2).
26 Second Algorithm Theorem (Buriol et al. 2006) Õ(ɛ 2 (nm/t 3 ) log δ 1 ) space is sufficient. Pick an edge e i = (u, v) uniformly at random from the stream. Pick w uniformly at random from V \ {u, v} If e j = (u, w), e k = (v, w) for j, k > i exist return 1; else 0. Lemma Expected outcome of algorithm is T 3 3m(n 2). Repeat O(ɛ 2 (mn/t) log δ 1 ) times in parallel and scale average up by 3m(n 2).
27 Outline Counting Triangles Matching Clustering Graph Distances
28 Maximum Weight Matching Problem Stream of weighted edges (e, w e ): Find M E that maximizes e M w e such that no two edges in M share an endpoint.
29 Maximum Weight Matching Problem Stream of weighted edges (e, w e ): Find M E that maximizes e M w e such that no two edges in M share an endpoint. Warm-Up An easy 2 approx. for unweighted case in Õ(n) space?
30 Maximum Weight Matching Problem Stream of weighted edges (e, w e ): Find M E that maximizes e M w e such that no two edges in M share an endpoint. Warm-Up An easy 2 approx. for unweighted case in Õ(n) space? Theorem = approx. in Õ(n) space.
31 Maximum Weight Matching Problem Stream of weighted edges (e, w e ): Find M E that maximizes e M w e such that no two edges in M share an endpoint. Warm-Up An easy 2 approx. for unweighted case in Õ(n) space? Theorem = approx. in Õ(n) space. Improved to [Mariano 07] and [Sarma et al. 09].
32 Maximum Weight Matching Problem Stream of weighted edges (e, w e ): Find M E that maximizes e M w e such that no two edges in M share an endpoint. Warm-Up An easy 2 approx. for unweighted case in Õ(n) space? Theorem = approx. in Õ(n) space. Improved to [Mariano 07] and [Sarma et al. 09]. Open Problem Prove a lower bound or a much better algorithm!
33 An Algorithm At all times maintain a matching M, initially M =.
34 An Algorithm At all times maintain a matching M, initially M =. On seeing e = (u, v), suppose e = (u, u 1 ), e = (v, u 2 ) M
35 An Algorithm At all times maintain a matching M, initially M =. On seeing e = (u, v), suppose e = (u, u 1 ), e = (v, u 2 ) M If w e (1 + γ)(w e + w e ), M M {e} \ {e, e }
36 An Algorithm At all times maintain a matching M, initially M =. On seeing e = (u, v), suppose e = (u, u 1 ), e = (v, u 2 ) M If w e (1 + γ)(w e + w e ), M M {e} \ {e, e } For the analysis we use the following definitions to describe the execution of the algorithm:
37 An Algorithm At all times maintain a matching M, initially M =. On seeing e = (u, v), suppose e = (u, u 1 ), e = (v, u 2 ) M If w e (1 + γ)(w e + w e ), M M {e} \ {e, e } For the analysis we use the following definitions to describe the execution of the algorithm:
38 An Algorithm At all times maintain a matching M, initially M =. On seeing e = (u, v), suppose e = (u, u 1 ), e = (v, u 2 ) M If w e (1 + γ)(w e + w e ), M M {e} \ {e, e } For the analysis we use the following definitions to describe the execution of the algorithm: An edge e kills an edge e if e was removed when e arrives.
39 An Algorithm At all times maintain a matching M, initially M =. On seeing e = (u, v), suppose e = (u, u 1 ), e = (v, u 2 ) M If w e (1 + γ)(w e + w e ), M M {e} \ {e, e } For the analysis we use the following definitions to describe the execution of the algorithm: An edge e kills an edge e if e was removed when e arrives. We say an edge is a survivor if it s in the final matching.
40 An Algorithm At all times maintain a matching M, initially M =. On seeing e = (u, v), suppose e = (u, u 1 ), e = (v, u 2 ) M If w e (1 + γ)(w e + w e ), M M {e} \ {e, e } For the analysis we use the following definitions to describe the execution of the algorithm: An edge e kills an edge e if e was removed when e arrives. We say an edge is a survivor if it s in the final matching. For survivor e, the trail of the dead is T (e) = C 1 C 2..., where C 0 = {e} and C i = e C i 1 {edges killed by e }
41 Analysis Lemma Let S be set of survivors and w(s) be weight of final matching. 1. w(t (S)) w(s)/γ 2. opt (1 + γ) (w(t (S)) + 2w(S)) Approximation factor is 1/γ γ and γ = 1/ 2 gives result.
42 Analysis Lemma Let S be set of survivors and w(s) be weight of final matching. 1. w(t (S)) w(s)/γ 2. opt (1 + γ) (w(t (S)) + 2w(S)) Approximation factor is 1/γ γ and γ = 1/ 2 gives result. Proof.
43 Analysis Lemma Let S be set of survivors and w(s) be weight of final matching. 1. w(t (S)) w(s)/γ 2. opt (1 + γ) (w(t (S)) + 2w(S)) Approximation factor is 1/γ γ and γ = 1/ 2 gives result. Proof. 1. Consider e S: (1+γ)w(T (e)) = i 1 (1+γ)w(C i ) i 0 w(c i ) = w(t (e))+w(e)
44 Analysis Lemma Let S be set of survivors and w(s) be weight of final matching. 1. w(t (S)) w(s)/γ 2. opt (1 + γ) (w(t (S)) + 2w(S)) Approximation factor is 1/γ γ and γ = 1/ 2 gives result. Proof. 1. Consider e S: (1+γ)w(T (e)) = i 1 (1+γ)w(C i ) i 0 w(c i ) = w(t (e))+w(e) 2. Can charge the weights of edges in opt to the S T (S) such that each edge e T (S) is charged at most (1 + γ)w(e) and each edge e S is charged at most 2(1 + γ)w(e).
45 Outline Counting Triangles Matching Clustering Graph Distances
46 k-center Problem Given a stream of distinct points X = {p 1,..., p n } from a metric space (X, d), find the set of k points Y X that minimizes: max min d(p i, y) i y Y
47 k-center Problem Given a stream of distinct points X = {p 1,..., p n } from a metric space (X, d), find the set of k points Y X that minimizes: max min d(p i, y) i y Y Warm-Up Find 2-approx. if you re given opt. Find (2 + ɛ)-approx. if you re given that a opt b
48 k-center Problem Given a stream of distinct points X = {p 1,..., p n } from a metric space (X, d), find the set of k points Y X that minimizes: max min d(p i, y) i y Y Warm-Up Find 2-approx. if you re given opt. Find (2 + ɛ)-approx. if you re given that a opt b Theorem (Khuller and McCutchen 2009, Guha 2009) (2 + ɛ) approx. for metric k-center in Õ(kɛ 1 log ɛ 1 ) space.
49 k-center: Algorithm and Analysis Consider first k + 1 points: this gives a lower bound a on opt.
50 k-center: Algorithm and Analysis Consider first k + 1 points: this gives a lower bound a on opt. Instantiate basic algorithm with guesses l 1 = a, l 2 = (1 + ɛ)a, l 3 = (1 + ɛ) 2 a,... l 1+t = O(ɛ 1 )a
51 k-center: Algorithm and Analysis Consider first k + 1 points: this gives a lower bound a on opt. Instantiate basic algorithm with guesses l 1 = a, l 2 = (1 + ɛ)a, l 3 = (1 + ɛ) 2 a,... l 1+t = O(ɛ 1 )a Say instantiation goes bad if it tries to open (k + 1)-th center
52 k-center: Algorithm and Analysis Consider first k + 1 points: this gives a lower bound a on opt. Instantiate basic algorithm with guesses l 1 = a, l 2 = (1 + ɛ)a, l 3 = (1 + ɛ) 2 a,... l 1+t = O(ɛ 1 )a Say instantiation goes bad if it tries to open (k + 1)-th center Suppose instantiation with guess l goes bad when processing (j + 1)-th point
53 k-center: Algorithm and Analysis Consider first k + 1 points: this gives a lower bound a on opt. Instantiate basic algorithm with guesses l 1 = a, l 2 = (1 + ɛ)a, l 3 = (1 + ɛ) 2 a,... l 1+t = O(ɛ 1 )a Say instantiation goes bad if it tries to open (k + 1)-th center Suppose instantiation with guess l goes bad when processing (j + 1)-th point Let q1,..., q k be centers chosen so far.
54 k-center: Algorithm and Analysis Consider first k + 1 points: this gives a lower bound a on opt. Instantiate basic algorithm with guesses l 1 = a, l 2 = (1 + ɛ)a, l 3 = (1 + ɛ) 2 a,... l 1+t = O(ɛ 1 )a Say instantiation goes bad if it tries to open (k + 1)-th center Suppose instantiation with guess l goes bad when processing (j + 1)-th point Let q1,..., q k be centers chosen so far. Then p1,..., p j are all at most 2l from a q i.
55 k-center: Algorithm and Analysis Consider first k + 1 points: this gives a lower bound a on opt. Instantiate basic algorithm with guesses l 1 = a, l 2 = (1 + ɛ)a, l 3 = (1 + ɛ) 2 a,... l 1+t = O(ɛ 1 )a Say instantiation goes bad if it tries to open (k + 1)-th center Suppose instantiation with guess l goes bad when processing (j + 1)-th point Let q1,..., q k be centers chosen so far. Then p1,..., p j are all at most 2l from a q i. Optimum for {q 1,..., q k, p j+1,..., p n } is at most opt + 2l.
56 k-center: Algorithm and Analysis Consider first k + 1 points: this gives a lower bound a on opt. Instantiate basic algorithm with guesses l 1 = a, l 2 = (1 + ɛ)a, l 3 = (1 + ɛ) 2 a,... l 1+t = O(ɛ 1 )a Say instantiation goes bad if it tries to open (k + 1)-th center Suppose instantiation with guess l goes bad when processing (j + 1)-th point Let q1,..., q k be centers chosen so far. Then p1,..., p j are all at most 2l from a q i. Optimum for {q 1,..., q k, p j+1,..., p n } is at most opt + 2l. Hence, for an instantiation with guess 2l/ɛ only incurs a small if we use {q 1,..., q k, p j+1,..., p n } rather than {p 1,..., p n }.
57 Outline Counting Triangles Matching Clustering Graph Distances
58 Distance Estimation Problem Stream of unweighted edges E defines a shortest path graph metric d G : V V N. For u, v V, estimate d G (u, v).
59 Distance Estimation Problem Stream of unweighted edges E defines a shortest path graph metric d G : V V N. For u, v V, estimate d G (u, v). Definition An α-spanner of a graph G = (V, E) is a subgraph H = (V, E ) such that for all u, v, d G (u, v) d H (u, v) αd G (u, v)
60 Distance Estimation Problem Stream of unweighted edges E defines a shortest path graph metric d G : V V N. For u, v V, estimate d G (u, v). Definition An α-spanner of a graph G = (V, E) is a subgraph H = (V, E ) such that for all u, v, d G (u, v) d H (u, v) αd G (u, v) Warm-Up 2t 1 spanner using Õ(n 1+1/t ) space.
61 Distance Estimation Problem Stream of unweighted edges E defines a shortest path graph metric d G : V V N. For u, v V, estimate d G (u, v). Definition An α-spanner of a graph G = (V, E) is a subgraph H = (V, E ) such that for all u, v, d G (u, v) d H (u, v) αd G (u, v) Warm-Up 2t 1 spanner using Õ(n 1+1/t ) space. Theorem (Elkin 2007) 2t 1 stretch spanner using Õ(n 1+1/t ) space with constant update time.
62 Towards better results if you re allowed mulitple passes... Problem Can we get better approximation for d G (u, v) with multiple passes?
63 Towards better results if you re allowed mulitple passes... Problem Can we get better approximation for d G (u, v) with multiple passes? Warm-Up Find d G (u, v) exactly in Õ(n 1+γ ) space and Õ(n 1 γ ) passes.
64 Towards better results if you re allowed mulitple passes... Problem Can we get better approximation for d G (u, v) with multiple passes? Warm-Up Find d G (u, v) exactly in Õ(n 1+γ ) space and Õ(n 1 γ ) passes. Theorem O(k) approx in Õ(n) space with O(n 1/k ) passes.
65 Towards better results if you re allowed mulitple passes... Problem Can we get better approximation for d G (u, v) with multiple passes? Warm-Up Find d G (u, v) exactly in Õ(n 1+γ ) space and Õ(n 1 γ ) passes. Theorem O(k) approx in Õ(n) space with O(n 1/k ) passes. Theorem (via Thorup, Zwick 2006) (1 + ɛ) approx in Õ(n) space with n O(log ɛ 1 )/ log log n passes.
66 Ramsey Partition Approach Definition (Mendel, Naor 2006) Ramsey Partition P is a random partion of metric space. Each cluster has diameter at most and for t /8, Pr(B X (x, t) P ) ( ) BX (x, /8) 16t/ B X (x, ) ( ) 1 16t/. n Can construct in stream model in Õ(n) space and O( ) passes.
67 Ramsey Partition Approach Definition (Mendel, Naor 2006) Ramsey Partition P is a random partion of metric space. Each cluster has diameter at most and for t /8, Pr(B X (x, t) P ) ( ) BX (x, /8) 16t/ B X (x, ) ( ) 1 16t/. n Can construct in stream model in Õ(n) space and O( ) passes. Algorithm 1. Sample beacons b 1,..., b n 1 1/k including s and t from V
68 Ramsey Partition Approach Definition (Mendel, Naor 2006) Ramsey Partition P is a random partion of metric space. Each cluster has diameter at most and for t /8, Pr(B X (x, t) P ) ( ) BX (x, /8) 16t/ B X (x, ) ( ) 1 16t/. n Can construct in stream model in Õ(n) space and O( ) passes. Algorithm 1. Sample beacons b 1,..., b n 1 1/k including s and t from V 2. Repeat O(n 1/k log n) times: 2.1 Create RP with diameter kn 1/k and consider t n 1/k. 2.2 For each beacon, add -weighted edge to center of its cluster.
69 Summary: We looked at some nice problems, our curiousity is piqued, and now we want to start finding more problems to solve. Thanks!
Data Stream Algorithms. S. Muthu Muthukrishnan
Data Stream Algorithms Notes from a series of lectures by S. Muthu Muthukrishnan Guest Lecturer: Andrew McGregor The 2009 Barbados Workshop on Computational Complexity March 1st March 8th, 2009 Organizer:
More informationData Streams & Communication Complexity
Data Streams & Communication Complexity Lecture 1: Simple Stream Statistics in Small Space Andrew McGregor, UMass Amherst 1/25 Data Stream Model Stream: m elements from universe of size n, e.g., x 1, x
More informationComputing the Entropy of a Stream
Computing the Entropy of a Stream To appear in SODA 2007 Graham Cormode graham@research.att.com Amit Chakrabarti Dartmouth College Andrew McGregor U. Penn / UCSD Outline Introduction Entropy Upper Bound
More information1 Approximate Quantiles and Summaries
CS 598CSC: Algorithms for Big Data Lecture date: Sept 25, 2014 Instructor: Chandra Chekuri Scribe: Chandra Chekuri Suppose we have a stream a 1, a 2,..., a n of objects from an ordered universe. For simplicity
More informationSublinear Algorithms for Big Data
Sublinear Algorithms for Big Data Qin Zhang 1-1 2-1 Part 2: Sublinear in Communication Sublinear in communication The model x 1 = 010011 x 2 = 111011 x 3 = 111111 x k = 100011 Applicaitons They want to
More informationTopics in Approximation Algorithms Solution for Homework 3
Topics in Approximation Algorithms Solution for Homework 3 Problem 1 We show that any solution {U t } can be modified to satisfy U τ L τ as follows. Suppose U τ L τ, so there is a vertex v U τ but v L
More informationCMSC 858F: Algorithmic Lower Bounds: Fun with Hardness Proofs Fall 2014 Introduction to Streaming Algorithms
CMSC 858F: Algorithmic Lower Bounds: Fun with Hardness Proofs Fall 2014 Introduction to Streaming Algorithms Instructor: Mohammad T. Hajiaghayi Scribe: Huijing Gong November 11, 2014 1 Overview In the
More informationLinear Sketches A Useful Tool in Streaming and Compressive Sensing
Linear Sketches A Useful Tool in Streaming and Compressive Sensing Qin Zhang 1-1 Linear sketch Random linear projection M : R n R k that preserves properties of any v R n with high prob. where k n. M =
More informationDistributed Statistical Estimation of Matrix Products with Applications
Distributed Statistical Estimation of Matrix Products with Applications David Woodruff CMU Qin Zhang IUB PODS 2018 June, 2018 1-1 The Distributed Computation Model p-norms, heavy-hitters,... A {0, 1} m
More informationThe Online Metric Matching Problem for Doubling Metrics
The Online Metric Matching Problem for Doubling Metrics Anupam Gupta Kevin Lewi Abstract In the online minimum-cost metric matching problem, we are given a metric space with k servers. Requests arrive
More informationOn the Locality of Distributed Sparse Spanner Constructions
On the Locality of Distributed Sparse Spanner Constructions B. Derbel, C. Gavoille, D. Peleg, L. Viennot University of Lille University of Bordeaux Weizmann Institute INRIA, Paris PODC 2008 Toronto What
More informationWelfare Maximization with Friends-of-Friends Network Externalities
Welfare Maximization with Friends-of-Friends Network Externalities Extended version of a talk at STACS 2015, Munich Wolfgang Dvořák 1 joint work with: Sayan Bhattacharya 2, Monika Henzinger 1, Martin Starnberger
More informationDistributed Distance-Bounded Network Design Through Distributed Convex Programming
Distributed Distance-Bounded Network Design Through Distributed Convex Programming OPODIS 2017 Michael Dinitz, Yasamin Nazari Johns Hopkins University December 18, 2017 Distance Bounded Network Design
More informationNew Characterizations in Turnstile Streams with Applications
New Characterizations in Turnstile Streams with Applications Yuqing Ai 1, Wei Hu 1, Yi Li 2, and David P. Woodruff 3 1 The Institute for Theoretical Computer Science (ITCS), Institute for Interdisciplinary
More informationDistributed Approximate Single-Source Shortest Paths
Distributed Approximate Single-Source Shortest Paths Sebastian Krinninger University of Vienna joint works with Ruben Monika Andreas Christoph Danupon Becker Henzinger Karrenbauer Lenzen Nanongkai 1 /
More informationCSC2420 Fall 2012: Algorithm Design, Analysis and Theory Lecture 9
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Lecture 9 Allan Borodin March 13, 2016 1 / 33 Lecture 9 Announcements 1 I have the assignments graded by Lalla. 2 I have now posted five questions
More informationStreaming and communication complexity of Hamming distance
Streaming and communication complexity of Hamming distance Tatiana Starikovskaya IRIF, Université Paris-Diderot (Joint work with Raphaël Clifford, ICALP 16) Approximate pattern matching Problem Pattern
More informationLecture 16: Communication Complexity
CSE 531: Computational Complexity I Winter 2016 Lecture 16: Communication Complexity Mar 2, 2016 Lecturer: Paul Beame Scribe: Paul Beame 1 Communication Complexity In (two-party) communication complexity
More informationSeparating Hierarchical and General Hub Labelings
Separating Hierarchical and General Hub Labelings Andrew V. Goldberg 1 Ilya Razenshteyn 2 Ruslan Savchenko 3 1 Microsoft Research Silicon Valley 2 CSAIL, MIT 3 Moscow State University June 23, 2013 Overview
More informationHardness of MST Construction
Lecture 7 Hardness of MST Construction In the previous lecture, we saw that an MST can be computed in O( n log n+ D) rounds using messages of size O(log n). Trivially, Ω(D) rounds are required, but what
More informationCMPSCI 611: Advanced Algorithms
CMPSCI 611: Advanced Algorithms Lecture 12: Network Flow Part II Andrew McGregor Last Compiled: December 14, 2017 1/26 Definitions Input: Directed Graph G = (V, E) Capacities C(u, v) > 0 for (u, v) E and
More informationMaximising the number of induced cycles in a graph
Maximising the number of induced cycles in a graph Natasha Morrison Alex Scott April 12, 2017 Abstract We determine the maximum number of induced cycles that can be contained in a graph on n n 0 vertices,
More informationTight Bounds for Distributed Streaming
Tight Bounds for Distributed Streaming (a.k.a., Distributed Functional Monitoring) David Woodruff IBM Research Almaden Qin Zhang MADALGO, Aarhus Univ. STOC 12 May 22, 2012 1-1 The distributed streaming
More informationStreaming Lower Bounds for Approximating MAX-CUT
Streaming Lower Bounds for Approximating MAX-CUT Michael Kapralov Sanjeev Khanna Madhu Sudan Abstract We consider the problem of estimating the value of max cut in a graph in the streaming model of computation.
More informationLecture 10 September 27, 2016
CS 395T: Sublinear Algorithms Fall 2016 Prof. Eric Price Lecture 10 September 27, 2016 Scribes: Quinten McNamara & William Hoza 1 Overview In this lecture, we focus on constructing coresets, which are
More informationLower Bounds for Quantile Estimation in Random-Order and Multi-Pass Streaming
Lower Bounds for Quantile Estimation in Random-Order and Multi-Pass Streaming Sudipto Guha 1 and Andrew McGregor 2 1 University of Pennsylvania sudipto@cis.upenn.edu 2 University of California, San Diego
More informationLecture 10. Sublinear Time Algorithms (contd) CSC2420 Allan Borodin & Nisarg Shah 1
Lecture 10 Sublinear Time Algorithms (contd) CSC2420 Allan Borodin & Nisarg Shah 1 Recap Sublinear time algorithms Deterministic + exact: binary search Deterministic + inexact: estimating diameter in a
More informationGeometric Optimization Problems over Sliding Windows
Geometric Optimization Problems over Sliding Windows Timothy M. Chan and Bashir S. Sadjad School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada {tmchan,bssadjad}@uwaterloo.ca
More informationMediated Population Protocols
Othon Michail Paul Spirakis Ioannis Chatzigiannakis Research Academic Computer Technology Institute (RACTI) July 2009 Michail, Spirakis, Chatzigiannakis 1 / 25 Outline I Population Protocols 1 Population
More informationDiscrete Optimization 2010 Lecture 8 Lagrangian Relaxation / P, N P and co-n P
Discrete Optimization 2010 Lecture 8 Lagrangian Relaxation / P, N P and co-n P Marc Uetz University of Twente m.uetz@utwente.nl Lecture 8: sheet 1 / 32 Marc Uetz Discrete Optimization Outline 1 Lagrangian
More informationDeterministic pivoting algorithms for constrained ranking and clustering problems 1
MATHEMATICS OF OPERATIONS RESEARCH Vol. 00, No. 0, Xxxxxx 20xx, pp. xxx xxx ISSN 0364-765X EISSN 1526-5471 xx 0000 0xxx DOI 10.1287/moor.xxxx.xxxx c 20xx INFORMS Deterministic pivoting algorithms for constrained
More information1 Randomized Computation
CS 6743 Lecture 17 1 Fall 2007 1 Randomized Computation Why is randomness useful? Imagine you have a stack of bank notes, with very few counterfeit ones. You want to choose a genuine bank note to pay at
More informationSpectral Sparsification in Dynamic Graph Streams
Spectral Sparsification in Dynamic Graph Streams Kook Jin Ahn 1, Sudipto Guha 1, and Andrew McGregor 2 1 University of Pennsylvania {kookjin,sudipto}@seas.upenn.edu 2 University of Massachusetts Amherst
More informationLecture Lecture 9 October 1, 2015
CS 229r: Algorithms for Big Data Fall 2015 Lecture Lecture 9 October 1, 2015 Prof. Jelani Nelson Scribe: Rachit Singh 1 Overview In the last lecture we covered the distance to monotonicity (DTM) and longest
More informationThe space complexity of approximating the frequency moments
The space complexity of approximating the frequency moments Felix Biermeier November 24, 2015 1 Overview Introduction Approximations of frequency moments lower bounds 2 Frequency moments Problem Estimate
More informationAn Improved Approximation Algorithm for Requirement Cut
An Improved Approximation Algorithm for Requirement Cut Anupam Gupta Viswanath Nagarajan R. Ravi Abstract This note presents improved approximation guarantees for the requirement cut problem: given an
More informationCMPUT651: Differential Privacy
CMPUT65: Differential Privacy Homework assignment # 2 Due date: Apr. 3rd, 208 Discussion and the exchange of ideas are essential to doing academic work. For assignments in this course, you are encouraged
More informationINDUCED CYCLES AND CHROMATIC NUMBER
INDUCED CYCLES AND CHROMATIC NUMBER A.D. SCOTT DEPARTMENT OF MATHEMATICS UNIVERSITY COLLEGE, GOWER STREET, LONDON WC1E 6BT Abstract. We prove that, for any pair of integers k, l 1, there exists an integer
More informationThe Quantum Query Complexity of Algebraic Properties
The Quantum Query Complexity of Algebraic Properties Sebastian Dörn Institut für Theoretische Informatik Universität Ulm 89069 Ulm, Germany Thomas Thierauf Fak. Elektronik und Informatik HTW Aalen 73430
More informationThe Lovász Local Lemma : A constructive proof
The Lovász Local Lemma : A constructive proof Andrew Li 19 May 2016 Abstract The Lovász Local Lemma is a tool used to non-constructively prove existence of combinatorial objects meeting a certain conditions.
More informationApproximation Algorithms and Hardness of Approximation. IPM, Jan Mohammad R. Salavatipour Department of Computing Science University of Alberta
Approximation Algorithms and Hardness of Approximation IPM, Jan 2006 Mohammad R. Salavatipour Department of Computing Science University of Alberta 1 Introduction For NP-hard optimization problems, we
More informationThe minimum G c cut problem
The minimum G c cut problem Abstract In this paper we define and study the G c -cut problem. Given a complete undirected graph G = (V ; E) with V = n, edge weighted by w(v i, v j ) 0 and an undirected
More informationMatching Triangles and Basing Hardness on an Extremely Popular Conjecture
Matching Triangles and Basing Hardness on an Extremely Popular Conjecture Amir Abboud 1, Virginia Vassilevska Williams 1, and Huacheng Yu 1 1 Computer Science Department, Stanford University Abstract Due
More informationSketching and Streaming for Distributions
Sketching and Streaming for Distributions Piotr Indyk Andrew McGregor Massachusetts Institute of Technology University of California, San Diego Main Material: Stable distributions, pseudo-random generators,
More informationApplications of the Sparse Regularity Lemma
Applications of the Sparse Regularity Lemma Y. Kohayakawa (Emory and São Paulo) Extremal Combinatorics II DIMACS 2004 1 Szemerédi s regularity lemma 1. Works very well for large, dense graphs: n-vertex
More informationCS Communication Complexity: Applications and New Directions
CS 2429 - Communication Complexity: Applications and New Directions Lecturer: Toniann Pitassi 1 Introduction In this course we will define the basic two-party model of communication, as introduced in the
More informationAn Overview on Compact Routing
An Overview on Compact Routing Cyril Gavoille 1 1 University of Bordeaux, France 2-6 October 2006 2nd Research Workshop on Flexible Network Design University of Bologna Residential Center Bertinoro (Forlì),
More informationCMPSCI 611 Advanced Algorithms Midterm Exam Fall 2015
NAME: CMPSCI 611 Advanced Algorithms Midterm Exam Fall 015 A. McGregor 1 October 015 DIRECTIONS: Do not turn over the page until you are told to do so. This is a closed book exam. No communicating with
More informationApproximation Algorithms for Min-Sum k-clustering and Balanced k-median
Approximation Algorithms for Min-Sum k-clustering and Balanced k-median Babak Behsaz Zachary Friggstad Mohammad R. Salavatipour Rohit Sivakumar Department of Computing Science University of Alberta Edmonton,
More informationStream Computation and Arthur- Merlin Communication
Stream Computation and Arthur- Merlin Communication Justin Thaler, Yahoo! Labs Joint Work with: Amit Chakrabarti, Dartmouth Graham Cormode, University of Warwick Andrew McGregor, Umass Amherst Suresh Venkatasubramanian,
More informationResearch Collection. Grid exploration. Master Thesis. ETH Library. Author(s): Wernli, Dino. Publication Date: 2012
Research Collection Master Thesis Grid exploration Author(s): Wernli, Dino Publication Date: 2012 Permanent Link: https://doi.org/10.3929/ethz-a-007343281 Rights / License: In Copyright - Non-Commercial
More informationBin packing with colocations
Bin packing with colocations Jean-Claude Bermond 1, Nathann Cohen, David Coudert 1, Dimitrios Letsios 1, Ioannis Milis 3, Stéphane Pérennes 1, and Vassilis Zissimopoulos 4 1 Université Côte d Azur, INRIA,
More informationLecture 5: January 30
CS71 Randomness & Computation Spring 018 Instructor: Alistair Sinclair Lecture 5: January 30 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They
More informationApproximation Algorithms
Approximation Algorithms What do you do when a problem is NP-complete? or, when the polynomial time solution is impractically slow? assume input is random, do expected performance. Eg, Hamiltonian path
More information6.842 Randomness and Computation March 3, Lecture 8
6.84 Randomness and Computation March 3, 04 Lecture 8 Lecturer: Ronitt Rubinfeld Scribe: Daniel Grier Useful Linear Algebra Let v = (v, v,..., v n ) be a non-zero n-dimensional row vector and P an n n
More informationOn the Complexity of Budgeted Maximum Path Coverage on Trees
On the Complexity of Budgeted Maximum Path Coverage on Trees H.-C. Wirth An instance of the budgeted maximum coverage problem is given by a set of weighted ground elements and a cost weighted family of
More informationPrioritized Metric Structures and Embedding
Prioritized Metric Structures and Embedding Michael Elkin 1, Arnold Filtser 1, and Ofer Neiman 1 1 Department of Computer Science, Ben-Gurion University of the Negev, Beer-Sheva, Israel. Email: {elkinm,arnoldf,neimano}@cs.bgu.ac.il
More informationRecall: Matchings. Examples. K n,m, K n, Petersen graph, Q k ; graphs without perfect matching
Recall: Matchings A matching is a set of (non-loop) edges with no shared endpoints. The vertices incident to an edge of a matching M are saturated by M, the others are unsaturated. A perfect matching of
More informationScribes: Po-Hsuan Wei, William Kuzmaul Editor: Kevin Wu Date: October 18, 2016
CS 267 Lecture 7 Graph Spanners Scribes: Po-Hsuan Wei, William Kuzmaul Editor: Kevin Wu Date: October 18, 2016 1 Graph Spanners Our goal is to compress information about distances in a graph by looking
More informationDominating Set. Chapter 7
Chapter 7 Dominating Set In this chapter we present another randomized algorithm that demonstrates the power of randomization to break symmetries. We study the problem of finding a small dominating set
More informationLecture Semidefinite Programming and Graph Partitioning
Approximation Algorithms and Hardness of Approximation April 16, 013 Lecture 14 Lecturer: Alantha Newman Scribes: Marwa El Halabi 1 Semidefinite Programming and Graph Partitioning In previous lectures,
More informationDominating Set. Chapter 26
Chapter 26 Dominating Set In this chapter we present another randomized algorithm that demonstrates the power of randomization to break symmetries. We study the problem of finding a small dominating set
More informationDominating Set. Chapter Sequential Greedy Algorithm 294 CHAPTER 26. DOMINATING SET
294 CHAPTER 26. DOMINATING SET 26.1 Sequential Greedy Algorithm Chapter 26 Dominating Set Intuitively, to end up with a small dominating set S, nodes in S need to cover as many neighbors as possible. It
More informationReconstruction for Models on Random Graphs
1 Stanford University, 2 ENS Paris October 21, 2007 Outline 1 The Reconstruction Problem 2 Related work and applications 3 Results The Reconstruction Problem: A Story Alice and Bob Alice, Bob and G root
More informationCMPSCI 711: More Advanced Algorithms
CMPSCI 711: More Advanced Algorithms Section 1-1: Sampling Andrew McGregor Last Compiled: April 29, 2012 1/14 Concentration Bounds Theorem (Markov) Let X be a non-negative random variable with expectation
More informationAditya Bhaskara CS 5968/6968, Lecture 1: Introduction and Review 12 January 2016
Lecture 1: Introduction and Review We begin with a short introduction to the course, and logistics. We then survey some basics about approximation algorithms and probability. We also introduce some of
More informationCMPSCI611: The Matroid Theorem Lecture 5
CMPSCI611: The Matroid Theorem Lecture 5 We first review our definitions: A subset system is a set E together with a set of subsets of E, called I, such that I is closed under inclusion. This means that
More informationWELL-SEPARATED PAIR DECOMPOSITION FOR THE UNIT-DISK GRAPH METRIC AND ITS APPLICATIONS
WELL-SEPARATED PAIR DECOMPOSITION FOR THE UNIT-DISK GRAPH METRIC AND ITS APPLICATIONS JIE GAO AND LI ZHANG Abstract. We extend the classic notion of well-separated pair decomposition [10] to the unit-disk
More informationCS 6820 Fall 2014 Lectures, October 3-20, 2014
Analysis of Algorithms Linear Programming Notes CS 6820 Fall 2014 Lectures, October 3-20, 2014 1 Linear programming The linear programming (LP) problem is the following optimization problem. We are given
More informationOptimization of Submodular Functions Tutorial - lecture I
Optimization of Submodular Functions Tutorial - lecture I Jan Vondrák 1 1 IBM Almaden Research Center San Jose, CA Jan Vondrák (IBM Almaden) Submodular Optimization Tutorial 1 / 1 Lecture I: outline 1
More informationTight Bounds for Single-Pass Streaming Complexity of the Set Cover Problem
Tight Bounds for Single-Pass Streaming Complexity of the Set Cover Problem Sepehr Assadi Department of Computer and Information Science University of Pennsylvania Philadelphia, PA, USA sassadi@cis.upenn.edu
More informationA Streaming Algorithm for 2-Center with Outliers in High Dimensions
CCCG 2015, Kingston, Ontario, August 10 12, 2015 A Streaming Algorithm for 2-Center with Outliers in High Dimensions Behnam Hatami Hamid Zarrabi-Zadeh Abstract We study the 2-center problem with outliers
More informationORIE 6334 Spectral Graph Theory November 22, Lecture 25
ORIE 64 Spectral Graph Theory November 22, 206 Lecture 25 Lecturer: David P. Williamson Scribe: Pu Yang In the remaining three lectures, we will cover a prominent result by Arora, Rao, and Vazirani for
More informationCS369E: Communication Complexity (for Algorithm Designers) Lecture #8: Lower Bounds in Property Testing
CS369E: Communication Complexity (for Algorithm Designers) Lecture #8: Lower Bounds in Property Testing Tim Roughgarden March 12, 2015 1 Property Testing We begin in this section with a brief introduction
More informationLecture 4 Thursday Sep 11, 2014
CS 224: Advanced Algorithms Fall 2014 Lecture 4 Thursday Sep 11, 2014 Prof. Jelani Nelson Scribe: Marco Gentili 1 Overview Today we re going to talk about: 1. linear probing (show with 5-wise independence)
More informationNotes on MapReduce Algorithms
Notes on MapReduce Algorithms Barna Saha 1 Finding Minimum Spanning Tree of a Dense Graph in MapReduce We are given a graph G = (V, E) on V = N vertices and E = m N 1+c edges for some constant c > 0. Our
More informationLeveraging Big Data: Lecture 13
Leveraging Big Data: Lecture 13 http://www.cohenwang.com/edith/bigdataclass2013 Instructors: Edith Cohen Amos Fiat Haim Kaplan Tova Milo What are Linear Sketches? Linear Transformations of the input vector
More informationAn Approximation Algorithm for Approximation Rank
An Approximation Algorithm for Approximation Rank Troy Lee Columbia University Adi Shraibman Weizmann Institute Conventions Identify a communication function f : X Y { 1, +1} with the associated X-by-Y
More informationSolving the Induced Subgraph problem in the randomized multiparty simultaneous messages model
Solving the Induced Subgraph problem in the randomized multiparty simultaneous messages model J. Kari 1, M. Matamala 2, I. Rapaport 2, and V. Salo 2 1 Department of Mathematics and Statistics, University
More informationfrom notes written mostly by Dr. Matt Stallmann: All Rights Reserved
CSC 505, Fall 000: Week 0 Objectives: understand problem complexity and classes defined by it understand relationships among decision, witness, evaluation, and optimization problems understand what it
More informationEfficient Primal- Dual Graph Algorithms for Map Reduce
Efficient Primal- Dual Graph Algorithms for Map Reduce Joint work with Bahman Bahmani Ashish Goel, Stanford Kamesh Munagala Duke University Modern Data Models Over the past decade, many commodity distributed
More informationMaximum Flow. Jie Wang. University of Massachusetts Lowell Department of Computer Science. J. Wang (UMass Lowell) Maximum Flow 1 / 27
Maximum Flow Jie Wang University of Massachusetts Lowell Department of Computer Science J. Wang (UMass Lowell) Maximum Flow 1 / 27 Flow Networks A flow network is a weighted digraph G = (V, E), where the
More informationTHE SZEMERÉDI REGULARITY LEMMA AND ITS APPLICATION
THE SZEMERÉDI REGULARITY LEMMA AND ITS APPLICATION YAQIAO LI In this note we will prove Szemerédi s regularity lemma, and its application in proving the triangle removal lemma and the Roth s theorem on
More informationApproximation Algorithms for the k-set Packing Problem
Approximation Algorithms for the k-set Packing Problem Marek Cygan Institute of Informatics University of Warsaw 20th October 2016, Warszawa Marek Cygan Approximation Algorithms for the k-set Packing Problem
More informationTopics in Theoretical Computer Science April 08, Lecture 8
Topics in Theoretical Computer Science April 08, 204 Lecture 8 Lecturer: Ola Svensson Scribes: David Leydier and Samuel Grütter Introduction In this lecture we will introduce Linear Programming. It was
More informationShortest paths with negative lengths
Chapter 8 Shortest paths with negative lengths In this chapter we give a linear-space, nearly linear-time algorithm that, given a directed planar graph G with real positive and negative lengths, but no
More informationAn exponential separation between quantum and classical one-way communication complexity
An exponential separation between quantum and classical one-way communication complexity Ashley Montanaro Centre for Quantum Information and Foundations, Department of Applied Mathematics and Theoretical
More informationMATH5011 Real Analysis I. Exercise 1 Suggested Solution
MATH5011 Real Analysis I Exercise 1 Suggested Solution Notations in the notes are used. (1) Show that every open set in R can be written as a countable union of mutually disjoint open intervals. Hint:
More informationComplexity Theory of Polynomial-Time Problems
Complexity Theory of Polynomial-Time Problems Lecture 5: Subcubic Equivalences Karl Bringmann Reminder: Relations = Reductions transfer hardness of one problem to another one by reductions problem P instance
More informationTesting k-wise Independence over Streaming Data
Testing k-wise Independence over Streaming Data Kai-Min Chung Zhenming Liu Michael Mitzenmacher Abstract Following on the work of Indyk and McGregor [5], we consider the problem of identifying correlations
More information1 Estimating Frequency Moments in Streams
CS 598CSC: Algorithms for Big Data Lecture date: August 28, 2014 Instructor: Chandra Chekuri Scribe: Chandra Chekuri 1 Estimating Frequency Moments in Streams A significant fraction of streaming literature
More informationLecture 11 October 7, 2013
CS 4: Advanced Algorithms Fall 03 Prof. Jelani Nelson Lecture October 7, 03 Scribe: David Ding Overview In the last lecture we talked about set cover: Sets S,..., S m {,..., n}. S has cost c S. Goal: Cover
More informationDifferential Analaysis of Block Ciphers SIMON and SPECK
1 / 36 Differential Analaysis of Block Ciphers SIMON and SPECK Alex Biryukov, Arnab Roy, Vesselin Velichkov 2 / 36 Outline Introduction Light-Weight Block Ciphers: SIMON and SPECK Differential Anlaysis
More informationRECAP: Extremal problems Examples
RECAP: Extremal problems Examples Proposition 1. If G is an n-vertex graph with at most n edges then G is disconnected. A Question you always have to ask: Can we improve on this proposition? Answer. NO!
More informationLecturer: Shuchi Chawla Topic: Inapproximability Date: 4/27/2007
CS880: Approximations Algorithms Scribe: Tom Watson Lecturer: Shuchi Chawla Topic: Inapproximability Date: 4/27/2007 So far in this course, we have been proving upper bounds on the approximation factors
More informationOn Stochastic Decompositions of Metric Spaces
On Stochastic Decompositions of Metric Spaces Scribe of a talk given at the fall school Metric Embeddings : Constructions and Obstructions. 3-7 November 204, Paris, France Ofer Neiman Abstract In this
More informationTopic: Balanced Cut, Sparsest Cut, and Metric Embeddings Date: 3/21/2007
CS880: Approximations Algorithms Scribe: Tom Watson Lecturer: Shuchi Chawla Topic: Balanced Cut, Sparsest Cut, and Metric Embeddings Date: 3/21/2007 In the last lecture, we described an O(log k log D)-approximation
More informationSorting Algorithms. We have already seen: Selection-sort Insertion-sort Heap-sort. We will see: Bubble-sort Merge-sort Quick-sort
Sorting Algorithms We have already seen: Selection-sort Insertion-sort Heap-sort We will see: Bubble-sort Merge-sort Quick-sort We will show that: O(n log n) is optimal for comparison based sorting. Bubble-Sort
More informationGeneral Methods for Algorithm Design
General Methods for Algorithm Design 1. Dynamic Programming Multiplication of matrices Elements of the dynamic programming Optimal triangulation of polygons Longest common subsequence 2. Greedy Methods
More informationRandomized Algorithms. Lecture 4. Lecturer: Moni Naor Scribe by: Tamar Zondiner & Omer Tamuz Updated: November 25, 2010
Randomized Algorithms Lecture 4 Lecturer: Moni Naor Scribe by: Tamar Zondiner & Omer Tamuz Updated: November 25, 2010 1 Pairwise independent hash functions In the previous lecture we encountered two families
More information