Graph & Geometry Problems in Data Streams

Size: px
Start display at page:

Download "Graph & Geometry Problems in Data Streams"

Transcription

1 Graph & Geometry Problems in Data Streams 2009 Barbados Workshop on Computational Complexity Andrew McGregor

2 Introduction Models: Graph Streams: Stream of edges E = {e 1, e 2,..., e m } describe a graph G on n nodes. Estimate properties of G. Geometric Streams: Stream of points X = {p 1, p 2,..., p m } from some metric space (X, d). Estimate properties of X.

3 Introduction Models: Graph Streams: Stream of edges E = {e 1, e 2,..., e m } describe a graph G on n nodes. Estimate properties of G. Geometric Streams: Stream of points X = {p 1, p 2,..., p m } from some metric space (X, d). Estimate properties of X. Notes: Õ is our friend: we ll hide dependence on polylog(m, n) terms. Assume that p i can be stored in Õ(1) space and d(p i, p j ) can be calculated if both p i and p j are stored in memory. Theory isn t as cohesive but we get to cherry-pick results...

4 Counting Triangles Matching Clustering Graph Distances

5 Outline Counting Triangles Matching Clustering Graph Distances

6 Triangles Problem Given a stream of edges, estimate the number of triangles T 3 up to a factor (1 + ɛ) with probability 1 δ given promise that T 3 > t.

7 Triangles Problem Given a stream of edges, estimate the number of triangles T 3 up to a factor (1 + ɛ) with probability 1 δ given promise that T 3 > t. Warm-Up What s an algorithm using O(ɛ 2 (n 3 /t) log δ 1 ) space?

8 Triangles Problem Given a stream of edges, estimate the number of triangles T 3 up to a factor (1 + ɛ) with probability 1 δ given promise that T 3 > t. Warm-Up What s an algorithm using O(ɛ 2 (n 3 /t) log δ 1 ) space? Theorem Ω(n 2 ) space required to determine if t = 0 (with δ = 1/3).

9 Triangles Problem Given a stream of edges, estimate the number of triangles T 3 up to a factor (1 + ɛ) with probability 1 δ given promise that T 3 > t. Warm-Up What s an algorithm using O(ɛ 2 (n 3 /t) log δ 1 ) space? Theorem Ω(n 2 ) space required to determine if t = 0 (with δ = 1/3). Theorem (Sivakumar et al. 2002) Õ(ɛ 2 (nm/t) 2 log δ 1 ) space is sufficient.

10 Triangles Problem Given a stream of edges, estimate the number of triangles T 3 up to a factor (1 + ɛ) with probability 1 δ given promise that T 3 > t. Warm-Up What s an algorithm using O(ɛ 2 (n 3 /t) log δ 1 ) space? Theorem Ω(n 2 ) space required to determine if t = 0 (with δ = 1/3). Theorem (Sivakumar et al. 2002) Õ(ɛ 2 (nm/t) 2 log δ 1 ) space is sufficient. Theorem (Buriol et al. 2006) Õ(ɛ 2 (nm/t) log δ 1 ) space is sufficient.

11 Lower Bound Theorem Ω(n 2 ) space required to determine if T 3 0 when δ = 1/3.

12 Lower Bound Theorem Ω(n 2 ) space required to determine if T 3 0 when δ = 1/3. Reduce from set-disjointness: Alice has n n binary matrix A, Bob has n n binary matrix B. Is A ij = B ij = 1 for some (i, j)? Needs Ω(n 2 ) bits of communication [Razborov 1992].

13 Lower Bound Theorem Ω(n 2 ) space required to determine if T 3 0 when δ = 1/3. Reduce from set-disjointness: Alice has n n binary matrix A, Bob has n n binary matrix B. Is A ij = B ij = 1 for some (i, j)? Needs Ω(n 2 ) bits of communication [Razborov 1992]. Consider graph G = (V, E) with V = {v 1,..., v n, u 1,..., u n, w 1,..., w n } and E = {(v i, u i ) : i [n]}

14 Lower Bound Theorem Ω(n 2 ) space required to determine if T 3 0 when δ = 1/3. Reduce from set-disjointness: Alice has n n binary matrix A, Bob has n n binary matrix B. Is A ij = B ij = 1 for some (i, j)? Needs Ω(n 2 ) bits of communication [Razborov 1992]. Consider graph G = (V, E) with V = {v 1,..., v n, u 1,..., u n, w 1,..., w n } and E = {(v i, u i ) : i [n]} Alice runs algorithm on G and edges {(u i, w j ) : A ij = 1}.

15 Lower Bound Theorem Ω(n 2 ) space required to determine if T 3 0 when δ = 1/3. Reduce from set-disjointness: Alice has n n binary matrix A, Bob has n n binary matrix B. Is A ij = B ij = 1 for some (i, j)? Needs Ω(n 2 ) bits of communication [Razborov 1992]. Consider graph G = (V, E) with V = {v 1,..., v n, u 1,..., u n, w 1,..., w n } and E = {(v i, u i ) : i [n]} Alice runs algorithm on G and edges {(u i, w j ) : A ij = 1}. Bob continues running algorithm on edges {(v i, w j ) : B ij = 1}.

16 Lower Bound Theorem Ω(n 2 ) space required to determine if T 3 0 when δ = 1/3. Reduce from set-disjointness: Alice has n n binary matrix A, Bob has n n binary matrix B. Is A ij = B ij = 1 for some (i, j)? Needs Ω(n 2 ) bits of communication [Razborov 1992]. Consider graph G = (V, E) with V = {v 1,..., v n, u 1,..., u n, w 1,..., w n } and E = {(v i, u i ) : i [n]} Alice runs algorithm on G and edges {(u i, w j ) : A ij = 1}. Bob continues running algorithm on edges {(v i, w j ) : B ij = 1}. T 3 > 0 iff A ij = B ij = 1 for some (i, j).

17 First Algorithm Theorem (Sivakumar et al. 2002) Õ(ɛ 2 (nm/t 3 ) 2 log δ 1 ) space is sufficient.

18 First Algorithm Theorem (Sivakumar et al. 2002) Õ(ɛ 2 (nm/t 3 ) 2 log δ 1 ) space is sufficient. Given stream of edges induce stream of node-triples: edge (u, v) gives rise to {u, v, w} for w V \ {u, v}

19 First Algorithm Theorem (Sivakumar et al. 2002) Õ(ɛ 2 (nm/t 3 ) 2 log δ 1 ) space is sufficient. Given stream of edges induce stream of node-triples: edge (u, v) gives rise to {u, v, w} for w V \ {u, v} Consider F k = (freq. of {u,v,w}) k and note F 0 F 1 F 2 = T 1 T 2 T 3 where T i is the set of node-triples having exactly i edges in the induced subgraph.

20 First Algorithm Theorem (Sivakumar et al. 2002) Õ(ɛ 2 (nm/t 3 ) 2 log δ 1 ) space is sufficient. Given stream of edges induce stream of node-triples: edge (u, v) gives rise to {u, v, w} for w V \ {u, v} Consider F k = (freq. of {u,v,w}) k and note F 0 F 1 F 2 = T 1 T 2 T 3 where T i is the set of node-triples having exactly i edges in the induced subgraph. T 3 = F 0 3F 1 /2 + F 2 /2 so good approx. for F 0, F 1, F 2 suffice.

21 Second Algorithm Theorem (Buriol et al. 2006) Õ(ɛ 2 (nm/t 3 ) log δ 1 ) space is sufficient.

22 Second Algorithm Theorem (Buriol et al. 2006) Õ(ɛ 2 (nm/t 3 ) log δ 1 ) space is sufficient. Pick an edge e i = (u, v) uniformly at random from the stream.

23 Second Algorithm Theorem (Buriol et al. 2006) Õ(ɛ 2 (nm/t 3 ) log δ 1 ) space is sufficient. Pick an edge e i = (u, v) uniformly at random from the stream. Pick w uniformly at random from V \ {u, v}

24 Second Algorithm Theorem (Buriol et al. 2006) Õ(ɛ 2 (nm/t 3 ) log δ 1 ) space is sufficient. Pick an edge e i = (u, v) uniformly at random from the stream. Pick w uniformly at random from V \ {u, v} If e j = (u, w), e k = (v, w) for j, k > i exist return 1; else 0.

25 Second Algorithm Theorem (Buriol et al. 2006) Õ(ɛ 2 (nm/t 3 ) log δ 1 ) space is sufficient. Pick an edge e i = (u, v) uniformly at random from the stream. Pick w uniformly at random from V \ {u, v} If e j = (u, w), e k = (v, w) for j, k > i exist return 1; else 0. Lemma Expected outcome of algorithm is T 3 3m(n 2).

26 Second Algorithm Theorem (Buriol et al. 2006) Õ(ɛ 2 (nm/t 3 ) log δ 1 ) space is sufficient. Pick an edge e i = (u, v) uniformly at random from the stream. Pick w uniformly at random from V \ {u, v} If e j = (u, w), e k = (v, w) for j, k > i exist return 1; else 0. Lemma Expected outcome of algorithm is T 3 3m(n 2). Repeat O(ɛ 2 (mn/t) log δ 1 ) times in parallel and scale average up by 3m(n 2).

27 Outline Counting Triangles Matching Clustering Graph Distances

28 Maximum Weight Matching Problem Stream of weighted edges (e, w e ): Find M E that maximizes e M w e such that no two edges in M share an endpoint.

29 Maximum Weight Matching Problem Stream of weighted edges (e, w e ): Find M E that maximizes e M w e such that no two edges in M share an endpoint. Warm-Up An easy 2 approx. for unweighted case in Õ(n) space?

30 Maximum Weight Matching Problem Stream of weighted edges (e, w e ): Find M E that maximizes e M w e such that no two edges in M share an endpoint. Warm-Up An easy 2 approx. for unweighted case in Õ(n) space? Theorem = approx. in Õ(n) space.

31 Maximum Weight Matching Problem Stream of weighted edges (e, w e ): Find M E that maximizes e M w e such that no two edges in M share an endpoint. Warm-Up An easy 2 approx. for unweighted case in Õ(n) space? Theorem = approx. in Õ(n) space. Improved to [Mariano 07] and [Sarma et al. 09].

32 Maximum Weight Matching Problem Stream of weighted edges (e, w e ): Find M E that maximizes e M w e such that no two edges in M share an endpoint. Warm-Up An easy 2 approx. for unweighted case in Õ(n) space? Theorem = approx. in Õ(n) space. Improved to [Mariano 07] and [Sarma et al. 09]. Open Problem Prove a lower bound or a much better algorithm!

33 An Algorithm At all times maintain a matching M, initially M =.

34 An Algorithm At all times maintain a matching M, initially M =. On seeing e = (u, v), suppose e = (u, u 1 ), e = (v, u 2 ) M

35 An Algorithm At all times maintain a matching M, initially M =. On seeing e = (u, v), suppose e = (u, u 1 ), e = (v, u 2 ) M If w e (1 + γ)(w e + w e ), M M {e} \ {e, e }

36 An Algorithm At all times maintain a matching M, initially M =. On seeing e = (u, v), suppose e = (u, u 1 ), e = (v, u 2 ) M If w e (1 + γ)(w e + w e ), M M {e} \ {e, e } For the analysis we use the following definitions to describe the execution of the algorithm:

37 An Algorithm At all times maintain a matching M, initially M =. On seeing e = (u, v), suppose e = (u, u 1 ), e = (v, u 2 ) M If w e (1 + γ)(w e + w e ), M M {e} \ {e, e } For the analysis we use the following definitions to describe the execution of the algorithm:

38 An Algorithm At all times maintain a matching M, initially M =. On seeing e = (u, v), suppose e = (u, u 1 ), e = (v, u 2 ) M If w e (1 + γ)(w e + w e ), M M {e} \ {e, e } For the analysis we use the following definitions to describe the execution of the algorithm: An edge e kills an edge e if e was removed when e arrives.

39 An Algorithm At all times maintain a matching M, initially M =. On seeing e = (u, v), suppose e = (u, u 1 ), e = (v, u 2 ) M If w e (1 + γ)(w e + w e ), M M {e} \ {e, e } For the analysis we use the following definitions to describe the execution of the algorithm: An edge e kills an edge e if e was removed when e arrives. We say an edge is a survivor if it s in the final matching.

40 An Algorithm At all times maintain a matching M, initially M =. On seeing e = (u, v), suppose e = (u, u 1 ), e = (v, u 2 ) M If w e (1 + γ)(w e + w e ), M M {e} \ {e, e } For the analysis we use the following definitions to describe the execution of the algorithm: An edge e kills an edge e if e was removed when e arrives. We say an edge is a survivor if it s in the final matching. For survivor e, the trail of the dead is T (e) = C 1 C 2..., where C 0 = {e} and C i = e C i 1 {edges killed by e }

41 Analysis Lemma Let S be set of survivors and w(s) be weight of final matching. 1. w(t (S)) w(s)/γ 2. opt (1 + γ) (w(t (S)) + 2w(S)) Approximation factor is 1/γ γ and γ = 1/ 2 gives result.

42 Analysis Lemma Let S be set of survivors and w(s) be weight of final matching. 1. w(t (S)) w(s)/γ 2. opt (1 + γ) (w(t (S)) + 2w(S)) Approximation factor is 1/γ γ and γ = 1/ 2 gives result. Proof.

43 Analysis Lemma Let S be set of survivors and w(s) be weight of final matching. 1. w(t (S)) w(s)/γ 2. opt (1 + γ) (w(t (S)) + 2w(S)) Approximation factor is 1/γ γ and γ = 1/ 2 gives result. Proof. 1. Consider e S: (1+γ)w(T (e)) = i 1 (1+γ)w(C i ) i 0 w(c i ) = w(t (e))+w(e)

44 Analysis Lemma Let S be set of survivors and w(s) be weight of final matching. 1. w(t (S)) w(s)/γ 2. opt (1 + γ) (w(t (S)) + 2w(S)) Approximation factor is 1/γ γ and γ = 1/ 2 gives result. Proof. 1. Consider e S: (1+γ)w(T (e)) = i 1 (1+γ)w(C i ) i 0 w(c i ) = w(t (e))+w(e) 2. Can charge the weights of edges in opt to the S T (S) such that each edge e T (S) is charged at most (1 + γ)w(e) and each edge e S is charged at most 2(1 + γ)w(e).

45 Outline Counting Triangles Matching Clustering Graph Distances

46 k-center Problem Given a stream of distinct points X = {p 1,..., p n } from a metric space (X, d), find the set of k points Y X that minimizes: max min d(p i, y) i y Y

47 k-center Problem Given a stream of distinct points X = {p 1,..., p n } from a metric space (X, d), find the set of k points Y X that minimizes: max min d(p i, y) i y Y Warm-Up Find 2-approx. if you re given opt. Find (2 + ɛ)-approx. if you re given that a opt b

48 k-center Problem Given a stream of distinct points X = {p 1,..., p n } from a metric space (X, d), find the set of k points Y X that minimizes: max min d(p i, y) i y Y Warm-Up Find 2-approx. if you re given opt. Find (2 + ɛ)-approx. if you re given that a opt b Theorem (Khuller and McCutchen 2009, Guha 2009) (2 + ɛ) approx. for metric k-center in Õ(kɛ 1 log ɛ 1 ) space.

49 k-center: Algorithm and Analysis Consider first k + 1 points: this gives a lower bound a on opt.

50 k-center: Algorithm and Analysis Consider first k + 1 points: this gives a lower bound a on opt. Instantiate basic algorithm with guesses l 1 = a, l 2 = (1 + ɛ)a, l 3 = (1 + ɛ) 2 a,... l 1+t = O(ɛ 1 )a

51 k-center: Algorithm and Analysis Consider first k + 1 points: this gives a lower bound a on opt. Instantiate basic algorithm with guesses l 1 = a, l 2 = (1 + ɛ)a, l 3 = (1 + ɛ) 2 a,... l 1+t = O(ɛ 1 )a Say instantiation goes bad if it tries to open (k + 1)-th center

52 k-center: Algorithm and Analysis Consider first k + 1 points: this gives a lower bound a on opt. Instantiate basic algorithm with guesses l 1 = a, l 2 = (1 + ɛ)a, l 3 = (1 + ɛ) 2 a,... l 1+t = O(ɛ 1 )a Say instantiation goes bad if it tries to open (k + 1)-th center Suppose instantiation with guess l goes bad when processing (j + 1)-th point

53 k-center: Algorithm and Analysis Consider first k + 1 points: this gives a lower bound a on opt. Instantiate basic algorithm with guesses l 1 = a, l 2 = (1 + ɛ)a, l 3 = (1 + ɛ) 2 a,... l 1+t = O(ɛ 1 )a Say instantiation goes bad if it tries to open (k + 1)-th center Suppose instantiation with guess l goes bad when processing (j + 1)-th point Let q1,..., q k be centers chosen so far.

54 k-center: Algorithm and Analysis Consider first k + 1 points: this gives a lower bound a on opt. Instantiate basic algorithm with guesses l 1 = a, l 2 = (1 + ɛ)a, l 3 = (1 + ɛ) 2 a,... l 1+t = O(ɛ 1 )a Say instantiation goes bad if it tries to open (k + 1)-th center Suppose instantiation with guess l goes bad when processing (j + 1)-th point Let q1,..., q k be centers chosen so far. Then p1,..., p j are all at most 2l from a q i.

55 k-center: Algorithm and Analysis Consider first k + 1 points: this gives a lower bound a on opt. Instantiate basic algorithm with guesses l 1 = a, l 2 = (1 + ɛ)a, l 3 = (1 + ɛ) 2 a,... l 1+t = O(ɛ 1 )a Say instantiation goes bad if it tries to open (k + 1)-th center Suppose instantiation with guess l goes bad when processing (j + 1)-th point Let q1,..., q k be centers chosen so far. Then p1,..., p j are all at most 2l from a q i. Optimum for {q 1,..., q k, p j+1,..., p n } is at most opt + 2l.

56 k-center: Algorithm and Analysis Consider first k + 1 points: this gives a lower bound a on opt. Instantiate basic algorithm with guesses l 1 = a, l 2 = (1 + ɛ)a, l 3 = (1 + ɛ) 2 a,... l 1+t = O(ɛ 1 )a Say instantiation goes bad if it tries to open (k + 1)-th center Suppose instantiation with guess l goes bad when processing (j + 1)-th point Let q1,..., q k be centers chosen so far. Then p1,..., p j are all at most 2l from a q i. Optimum for {q 1,..., q k, p j+1,..., p n } is at most opt + 2l. Hence, for an instantiation with guess 2l/ɛ only incurs a small if we use {q 1,..., q k, p j+1,..., p n } rather than {p 1,..., p n }.

57 Outline Counting Triangles Matching Clustering Graph Distances

58 Distance Estimation Problem Stream of unweighted edges E defines a shortest path graph metric d G : V V N. For u, v V, estimate d G (u, v).

59 Distance Estimation Problem Stream of unweighted edges E defines a shortest path graph metric d G : V V N. For u, v V, estimate d G (u, v). Definition An α-spanner of a graph G = (V, E) is a subgraph H = (V, E ) such that for all u, v, d G (u, v) d H (u, v) αd G (u, v)

60 Distance Estimation Problem Stream of unweighted edges E defines a shortest path graph metric d G : V V N. For u, v V, estimate d G (u, v). Definition An α-spanner of a graph G = (V, E) is a subgraph H = (V, E ) such that for all u, v, d G (u, v) d H (u, v) αd G (u, v) Warm-Up 2t 1 spanner using Õ(n 1+1/t ) space.

61 Distance Estimation Problem Stream of unweighted edges E defines a shortest path graph metric d G : V V N. For u, v V, estimate d G (u, v). Definition An α-spanner of a graph G = (V, E) is a subgraph H = (V, E ) such that for all u, v, d G (u, v) d H (u, v) αd G (u, v) Warm-Up 2t 1 spanner using Õ(n 1+1/t ) space. Theorem (Elkin 2007) 2t 1 stretch spanner using Õ(n 1+1/t ) space with constant update time.

62 Towards better results if you re allowed mulitple passes... Problem Can we get better approximation for d G (u, v) with multiple passes?

63 Towards better results if you re allowed mulitple passes... Problem Can we get better approximation for d G (u, v) with multiple passes? Warm-Up Find d G (u, v) exactly in Õ(n 1+γ ) space and Õ(n 1 γ ) passes.

64 Towards better results if you re allowed mulitple passes... Problem Can we get better approximation for d G (u, v) with multiple passes? Warm-Up Find d G (u, v) exactly in Õ(n 1+γ ) space and Õ(n 1 γ ) passes. Theorem O(k) approx in Õ(n) space with O(n 1/k ) passes.

65 Towards better results if you re allowed mulitple passes... Problem Can we get better approximation for d G (u, v) with multiple passes? Warm-Up Find d G (u, v) exactly in Õ(n 1+γ ) space and Õ(n 1 γ ) passes. Theorem O(k) approx in Õ(n) space with O(n 1/k ) passes. Theorem (via Thorup, Zwick 2006) (1 + ɛ) approx in Õ(n) space with n O(log ɛ 1 )/ log log n passes.

66 Ramsey Partition Approach Definition (Mendel, Naor 2006) Ramsey Partition P is a random partion of metric space. Each cluster has diameter at most and for t /8, Pr(B X (x, t) P ) ( ) BX (x, /8) 16t/ B X (x, ) ( ) 1 16t/. n Can construct in stream model in Õ(n) space and O( ) passes.

67 Ramsey Partition Approach Definition (Mendel, Naor 2006) Ramsey Partition P is a random partion of metric space. Each cluster has diameter at most and for t /8, Pr(B X (x, t) P ) ( ) BX (x, /8) 16t/ B X (x, ) ( ) 1 16t/. n Can construct in stream model in Õ(n) space and O( ) passes. Algorithm 1. Sample beacons b 1,..., b n 1 1/k including s and t from V

68 Ramsey Partition Approach Definition (Mendel, Naor 2006) Ramsey Partition P is a random partion of metric space. Each cluster has diameter at most and for t /8, Pr(B X (x, t) P ) ( ) BX (x, /8) 16t/ B X (x, ) ( ) 1 16t/. n Can construct in stream model in Õ(n) space and O( ) passes. Algorithm 1. Sample beacons b 1,..., b n 1 1/k including s and t from V 2. Repeat O(n 1/k log n) times: 2.1 Create RP with diameter kn 1/k and consider t n 1/k. 2.2 For each beacon, add -weighted edge to center of its cluster.

69 Summary: We looked at some nice problems, our curiousity is piqued, and now we want to start finding more problems to solve. Thanks!

Data Stream Algorithms. S. Muthu Muthukrishnan

Data Stream Algorithms. S. Muthu Muthukrishnan Data Stream Algorithms Notes from a series of lectures by S. Muthu Muthukrishnan Guest Lecturer: Andrew McGregor The 2009 Barbados Workshop on Computational Complexity March 1st March 8th, 2009 Organizer:

More information

Data Streams & Communication Complexity

Data Streams & Communication Complexity Data Streams & Communication Complexity Lecture 1: Simple Stream Statistics in Small Space Andrew McGregor, UMass Amherst 1/25 Data Stream Model Stream: m elements from universe of size n, e.g., x 1, x

More information

Computing the Entropy of a Stream

Computing the Entropy of a Stream Computing the Entropy of a Stream To appear in SODA 2007 Graham Cormode graham@research.att.com Amit Chakrabarti Dartmouth College Andrew McGregor U. Penn / UCSD Outline Introduction Entropy Upper Bound

More information

1 Approximate Quantiles and Summaries

1 Approximate Quantiles and Summaries CS 598CSC: Algorithms for Big Data Lecture date: Sept 25, 2014 Instructor: Chandra Chekuri Scribe: Chandra Chekuri Suppose we have a stream a 1, a 2,..., a n of objects from an ordered universe. For simplicity

More information

Sublinear Algorithms for Big Data

Sublinear Algorithms for Big Data Sublinear Algorithms for Big Data Qin Zhang 1-1 2-1 Part 2: Sublinear in Communication Sublinear in communication The model x 1 = 010011 x 2 = 111011 x 3 = 111111 x k = 100011 Applicaitons They want to

More information

Topics in Approximation Algorithms Solution for Homework 3

Topics in Approximation Algorithms Solution for Homework 3 Topics in Approximation Algorithms Solution for Homework 3 Problem 1 We show that any solution {U t } can be modified to satisfy U τ L τ as follows. Suppose U τ L τ, so there is a vertex v U τ but v L

More information

CMSC 858F: Algorithmic Lower Bounds: Fun with Hardness Proofs Fall 2014 Introduction to Streaming Algorithms

CMSC 858F: Algorithmic Lower Bounds: Fun with Hardness Proofs Fall 2014 Introduction to Streaming Algorithms CMSC 858F: Algorithmic Lower Bounds: Fun with Hardness Proofs Fall 2014 Introduction to Streaming Algorithms Instructor: Mohammad T. Hajiaghayi Scribe: Huijing Gong November 11, 2014 1 Overview In the

More information

Linear Sketches A Useful Tool in Streaming and Compressive Sensing

Linear Sketches A Useful Tool in Streaming and Compressive Sensing Linear Sketches A Useful Tool in Streaming and Compressive Sensing Qin Zhang 1-1 Linear sketch Random linear projection M : R n R k that preserves properties of any v R n with high prob. where k n. M =

More information

Distributed Statistical Estimation of Matrix Products with Applications

Distributed Statistical Estimation of Matrix Products with Applications Distributed Statistical Estimation of Matrix Products with Applications David Woodruff CMU Qin Zhang IUB PODS 2018 June, 2018 1-1 The Distributed Computation Model p-norms, heavy-hitters,... A {0, 1} m

More information

The Online Metric Matching Problem for Doubling Metrics

The Online Metric Matching Problem for Doubling Metrics The Online Metric Matching Problem for Doubling Metrics Anupam Gupta Kevin Lewi Abstract In the online minimum-cost metric matching problem, we are given a metric space with k servers. Requests arrive

More information

On the Locality of Distributed Sparse Spanner Constructions

On the Locality of Distributed Sparse Spanner Constructions On the Locality of Distributed Sparse Spanner Constructions B. Derbel, C. Gavoille, D. Peleg, L. Viennot University of Lille University of Bordeaux Weizmann Institute INRIA, Paris PODC 2008 Toronto What

More information

Welfare Maximization with Friends-of-Friends Network Externalities

Welfare Maximization with Friends-of-Friends Network Externalities Welfare Maximization with Friends-of-Friends Network Externalities Extended version of a talk at STACS 2015, Munich Wolfgang Dvořák 1 joint work with: Sayan Bhattacharya 2, Monika Henzinger 1, Martin Starnberger

More information

Distributed Distance-Bounded Network Design Through Distributed Convex Programming

Distributed Distance-Bounded Network Design Through Distributed Convex Programming Distributed Distance-Bounded Network Design Through Distributed Convex Programming OPODIS 2017 Michael Dinitz, Yasamin Nazari Johns Hopkins University December 18, 2017 Distance Bounded Network Design

More information

New Characterizations in Turnstile Streams with Applications

New Characterizations in Turnstile Streams with Applications New Characterizations in Turnstile Streams with Applications Yuqing Ai 1, Wei Hu 1, Yi Li 2, and David P. Woodruff 3 1 The Institute for Theoretical Computer Science (ITCS), Institute for Interdisciplinary

More information

Distributed Approximate Single-Source Shortest Paths

Distributed Approximate Single-Source Shortest Paths Distributed Approximate Single-Source Shortest Paths Sebastian Krinninger University of Vienna joint works with Ruben Monika Andreas Christoph Danupon Becker Henzinger Karrenbauer Lenzen Nanongkai 1 /

More information

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Lecture 9

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Lecture 9 CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Lecture 9 Allan Borodin March 13, 2016 1 / 33 Lecture 9 Announcements 1 I have the assignments graded by Lalla. 2 I have now posted five questions

More information

Streaming and communication complexity of Hamming distance

Streaming and communication complexity of Hamming distance Streaming and communication complexity of Hamming distance Tatiana Starikovskaya IRIF, Université Paris-Diderot (Joint work with Raphaël Clifford, ICALP 16) Approximate pattern matching Problem Pattern

More information

Lecture 16: Communication Complexity

Lecture 16: Communication Complexity CSE 531: Computational Complexity I Winter 2016 Lecture 16: Communication Complexity Mar 2, 2016 Lecturer: Paul Beame Scribe: Paul Beame 1 Communication Complexity In (two-party) communication complexity

More information

Separating Hierarchical and General Hub Labelings

Separating Hierarchical and General Hub Labelings Separating Hierarchical and General Hub Labelings Andrew V. Goldberg 1 Ilya Razenshteyn 2 Ruslan Savchenko 3 1 Microsoft Research Silicon Valley 2 CSAIL, MIT 3 Moscow State University June 23, 2013 Overview

More information

Hardness of MST Construction

Hardness of MST Construction Lecture 7 Hardness of MST Construction In the previous lecture, we saw that an MST can be computed in O( n log n+ D) rounds using messages of size O(log n). Trivially, Ω(D) rounds are required, but what

More information

CMPSCI 611: Advanced Algorithms

CMPSCI 611: Advanced Algorithms CMPSCI 611: Advanced Algorithms Lecture 12: Network Flow Part II Andrew McGregor Last Compiled: December 14, 2017 1/26 Definitions Input: Directed Graph G = (V, E) Capacities C(u, v) > 0 for (u, v) E and

More information

Maximising the number of induced cycles in a graph

Maximising the number of induced cycles in a graph Maximising the number of induced cycles in a graph Natasha Morrison Alex Scott April 12, 2017 Abstract We determine the maximum number of induced cycles that can be contained in a graph on n n 0 vertices,

More information

Tight Bounds for Distributed Streaming

Tight Bounds for Distributed Streaming Tight Bounds for Distributed Streaming (a.k.a., Distributed Functional Monitoring) David Woodruff IBM Research Almaden Qin Zhang MADALGO, Aarhus Univ. STOC 12 May 22, 2012 1-1 The distributed streaming

More information

Streaming Lower Bounds for Approximating MAX-CUT

Streaming Lower Bounds for Approximating MAX-CUT Streaming Lower Bounds for Approximating MAX-CUT Michael Kapralov Sanjeev Khanna Madhu Sudan Abstract We consider the problem of estimating the value of max cut in a graph in the streaming model of computation.

More information

Lecture 10 September 27, 2016

Lecture 10 September 27, 2016 CS 395T: Sublinear Algorithms Fall 2016 Prof. Eric Price Lecture 10 September 27, 2016 Scribes: Quinten McNamara & William Hoza 1 Overview In this lecture, we focus on constructing coresets, which are

More information

Lower Bounds for Quantile Estimation in Random-Order and Multi-Pass Streaming

Lower Bounds for Quantile Estimation in Random-Order and Multi-Pass Streaming Lower Bounds for Quantile Estimation in Random-Order and Multi-Pass Streaming Sudipto Guha 1 and Andrew McGregor 2 1 University of Pennsylvania sudipto@cis.upenn.edu 2 University of California, San Diego

More information

Lecture 10. Sublinear Time Algorithms (contd) CSC2420 Allan Borodin & Nisarg Shah 1

Lecture 10. Sublinear Time Algorithms (contd) CSC2420 Allan Borodin & Nisarg Shah 1 Lecture 10 Sublinear Time Algorithms (contd) CSC2420 Allan Borodin & Nisarg Shah 1 Recap Sublinear time algorithms Deterministic + exact: binary search Deterministic + inexact: estimating diameter in a

More information

Geometric Optimization Problems over Sliding Windows

Geometric Optimization Problems over Sliding Windows Geometric Optimization Problems over Sliding Windows Timothy M. Chan and Bashir S. Sadjad School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada {tmchan,bssadjad}@uwaterloo.ca

More information

Mediated Population Protocols

Mediated Population Protocols Othon Michail Paul Spirakis Ioannis Chatzigiannakis Research Academic Computer Technology Institute (RACTI) July 2009 Michail, Spirakis, Chatzigiannakis 1 / 25 Outline I Population Protocols 1 Population

More information

Discrete Optimization 2010 Lecture 8 Lagrangian Relaxation / P, N P and co-n P

Discrete Optimization 2010 Lecture 8 Lagrangian Relaxation / P, N P and co-n P Discrete Optimization 2010 Lecture 8 Lagrangian Relaxation / P, N P and co-n P Marc Uetz University of Twente m.uetz@utwente.nl Lecture 8: sheet 1 / 32 Marc Uetz Discrete Optimization Outline 1 Lagrangian

More information

Deterministic pivoting algorithms for constrained ranking and clustering problems 1

Deterministic pivoting algorithms for constrained ranking and clustering problems 1 MATHEMATICS OF OPERATIONS RESEARCH Vol. 00, No. 0, Xxxxxx 20xx, pp. xxx xxx ISSN 0364-765X EISSN 1526-5471 xx 0000 0xxx DOI 10.1287/moor.xxxx.xxxx c 20xx INFORMS Deterministic pivoting algorithms for constrained

More information

1 Randomized Computation

1 Randomized Computation CS 6743 Lecture 17 1 Fall 2007 1 Randomized Computation Why is randomness useful? Imagine you have a stack of bank notes, with very few counterfeit ones. You want to choose a genuine bank note to pay at

More information

Spectral Sparsification in Dynamic Graph Streams

Spectral Sparsification in Dynamic Graph Streams Spectral Sparsification in Dynamic Graph Streams Kook Jin Ahn 1, Sudipto Guha 1, and Andrew McGregor 2 1 University of Pennsylvania {kookjin,sudipto}@seas.upenn.edu 2 University of Massachusetts Amherst

More information

Lecture Lecture 9 October 1, 2015

Lecture Lecture 9 October 1, 2015 CS 229r: Algorithms for Big Data Fall 2015 Lecture Lecture 9 October 1, 2015 Prof. Jelani Nelson Scribe: Rachit Singh 1 Overview In the last lecture we covered the distance to monotonicity (DTM) and longest

More information

The space complexity of approximating the frequency moments

The space complexity of approximating the frequency moments The space complexity of approximating the frequency moments Felix Biermeier November 24, 2015 1 Overview Introduction Approximations of frequency moments lower bounds 2 Frequency moments Problem Estimate

More information

An Improved Approximation Algorithm for Requirement Cut

An Improved Approximation Algorithm for Requirement Cut An Improved Approximation Algorithm for Requirement Cut Anupam Gupta Viswanath Nagarajan R. Ravi Abstract This note presents improved approximation guarantees for the requirement cut problem: given an

More information

CMPUT651: Differential Privacy

CMPUT651: Differential Privacy CMPUT65: Differential Privacy Homework assignment # 2 Due date: Apr. 3rd, 208 Discussion and the exchange of ideas are essential to doing academic work. For assignments in this course, you are encouraged

More information

INDUCED CYCLES AND CHROMATIC NUMBER

INDUCED CYCLES AND CHROMATIC NUMBER INDUCED CYCLES AND CHROMATIC NUMBER A.D. SCOTT DEPARTMENT OF MATHEMATICS UNIVERSITY COLLEGE, GOWER STREET, LONDON WC1E 6BT Abstract. We prove that, for any pair of integers k, l 1, there exists an integer

More information

The Quantum Query Complexity of Algebraic Properties

The Quantum Query Complexity of Algebraic Properties The Quantum Query Complexity of Algebraic Properties Sebastian Dörn Institut für Theoretische Informatik Universität Ulm 89069 Ulm, Germany Thomas Thierauf Fak. Elektronik und Informatik HTW Aalen 73430

More information

The Lovász Local Lemma : A constructive proof

The Lovász Local Lemma : A constructive proof The Lovász Local Lemma : A constructive proof Andrew Li 19 May 2016 Abstract The Lovász Local Lemma is a tool used to non-constructively prove existence of combinatorial objects meeting a certain conditions.

More information

Approximation Algorithms and Hardness of Approximation. IPM, Jan Mohammad R. Salavatipour Department of Computing Science University of Alberta

Approximation Algorithms and Hardness of Approximation. IPM, Jan Mohammad R. Salavatipour Department of Computing Science University of Alberta Approximation Algorithms and Hardness of Approximation IPM, Jan 2006 Mohammad R. Salavatipour Department of Computing Science University of Alberta 1 Introduction For NP-hard optimization problems, we

More information

The minimum G c cut problem

The minimum G c cut problem The minimum G c cut problem Abstract In this paper we define and study the G c -cut problem. Given a complete undirected graph G = (V ; E) with V = n, edge weighted by w(v i, v j ) 0 and an undirected

More information

Matching Triangles and Basing Hardness on an Extremely Popular Conjecture

Matching Triangles and Basing Hardness on an Extremely Popular Conjecture Matching Triangles and Basing Hardness on an Extremely Popular Conjecture Amir Abboud 1, Virginia Vassilevska Williams 1, and Huacheng Yu 1 1 Computer Science Department, Stanford University Abstract Due

More information

Sketching and Streaming for Distributions

Sketching and Streaming for Distributions Sketching and Streaming for Distributions Piotr Indyk Andrew McGregor Massachusetts Institute of Technology University of California, San Diego Main Material: Stable distributions, pseudo-random generators,

More information

Applications of the Sparse Regularity Lemma

Applications of the Sparse Regularity Lemma Applications of the Sparse Regularity Lemma Y. Kohayakawa (Emory and São Paulo) Extremal Combinatorics II DIMACS 2004 1 Szemerédi s regularity lemma 1. Works very well for large, dense graphs: n-vertex

More information

CS Communication Complexity: Applications and New Directions

CS Communication Complexity: Applications and New Directions CS 2429 - Communication Complexity: Applications and New Directions Lecturer: Toniann Pitassi 1 Introduction In this course we will define the basic two-party model of communication, as introduced in the

More information

An Overview on Compact Routing

An Overview on Compact Routing An Overview on Compact Routing Cyril Gavoille 1 1 University of Bordeaux, France 2-6 October 2006 2nd Research Workshop on Flexible Network Design University of Bologna Residential Center Bertinoro (Forlì),

More information

CMPSCI 611 Advanced Algorithms Midterm Exam Fall 2015

CMPSCI 611 Advanced Algorithms Midterm Exam Fall 2015 NAME: CMPSCI 611 Advanced Algorithms Midterm Exam Fall 015 A. McGregor 1 October 015 DIRECTIONS: Do not turn over the page until you are told to do so. This is a closed book exam. No communicating with

More information

Approximation Algorithms for Min-Sum k-clustering and Balanced k-median

Approximation Algorithms for Min-Sum k-clustering and Balanced k-median Approximation Algorithms for Min-Sum k-clustering and Balanced k-median Babak Behsaz Zachary Friggstad Mohammad R. Salavatipour Rohit Sivakumar Department of Computing Science University of Alberta Edmonton,

More information

Stream Computation and Arthur- Merlin Communication

Stream Computation and Arthur- Merlin Communication Stream Computation and Arthur- Merlin Communication Justin Thaler, Yahoo! Labs Joint Work with: Amit Chakrabarti, Dartmouth Graham Cormode, University of Warwick Andrew McGregor, Umass Amherst Suresh Venkatasubramanian,

More information

Research Collection. Grid exploration. Master Thesis. ETH Library. Author(s): Wernli, Dino. Publication Date: 2012

Research Collection. Grid exploration. Master Thesis. ETH Library. Author(s): Wernli, Dino. Publication Date: 2012 Research Collection Master Thesis Grid exploration Author(s): Wernli, Dino Publication Date: 2012 Permanent Link: https://doi.org/10.3929/ethz-a-007343281 Rights / License: In Copyright - Non-Commercial

More information

Bin packing with colocations

Bin packing with colocations Bin packing with colocations Jean-Claude Bermond 1, Nathann Cohen, David Coudert 1, Dimitrios Letsios 1, Ioannis Milis 3, Stéphane Pérennes 1, and Vassilis Zissimopoulos 4 1 Université Côte d Azur, INRIA,

More information

Lecture 5: January 30

Lecture 5: January 30 CS71 Randomness & Computation Spring 018 Instructor: Alistair Sinclair Lecture 5: January 30 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms What do you do when a problem is NP-complete? or, when the polynomial time solution is impractically slow? assume input is random, do expected performance. Eg, Hamiltonian path

More information

6.842 Randomness and Computation March 3, Lecture 8

6.842 Randomness and Computation March 3, Lecture 8 6.84 Randomness and Computation March 3, 04 Lecture 8 Lecturer: Ronitt Rubinfeld Scribe: Daniel Grier Useful Linear Algebra Let v = (v, v,..., v n ) be a non-zero n-dimensional row vector and P an n n

More information

On the Complexity of Budgeted Maximum Path Coverage on Trees

On the Complexity of Budgeted Maximum Path Coverage on Trees On the Complexity of Budgeted Maximum Path Coverage on Trees H.-C. Wirth An instance of the budgeted maximum coverage problem is given by a set of weighted ground elements and a cost weighted family of

More information

Prioritized Metric Structures and Embedding

Prioritized Metric Structures and Embedding Prioritized Metric Structures and Embedding Michael Elkin 1, Arnold Filtser 1, and Ofer Neiman 1 1 Department of Computer Science, Ben-Gurion University of the Negev, Beer-Sheva, Israel. Email: {elkinm,arnoldf,neimano}@cs.bgu.ac.il

More information

Recall: Matchings. Examples. K n,m, K n, Petersen graph, Q k ; graphs without perfect matching

Recall: Matchings. Examples. K n,m, K n, Petersen graph, Q k ; graphs without perfect matching Recall: Matchings A matching is a set of (non-loop) edges with no shared endpoints. The vertices incident to an edge of a matching M are saturated by M, the others are unsaturated. A perfect matching of

More information

Scribes: Po-Hsuan Wei, William Kuzmaul Editor: Kevin Wu Date: October 18, 2016

Scribes: Po-Hsuan Wei, William Kuzmaul Editor: Kevin Wu Date: October 18, 2016 CS 267 Lecture 7 Graph Spanners Scribes: Po-Hsuan Wei, William Kuzmaul Editor: Kevin Wu Date: October 18, 2016 1 Graph Spanners Our goal is to compress information about distances in a graph by looking

More information

Dominating Set. Chapter 7

Dominating Set. Chapter 7 Chapter 7 Dominating Set In this chapter we present another randomized algorithm that demonstrates the power of randomization to break symmetries. We study the problem of finding a small dominating set

More information

Lecture Semidefinite Programming and Graph Partitioning

Lecture Semidefinite Programming and Graph Partitioning Approximation Algorithms and Hardness of Approximation April 16, 013 Lecture 14 Lecturer: Alantha Newman Scribes: Marwa El Halabi 1 Semidefinite Programming and Graph Partitioning In previous lectures,

More information

Dominating Set. Chapter 26

Dominating Set. Chapter 26 Chapter 26 Dominating Set In this chapter we present another randomized algorithm that demonstrates the power of randomization to break symmetries. We study the problem of finding a small dominating set

More information

Dominating Set. Chapter Sequential Greedy Algorithm 294 CHAPTER 26. DOMINATING SET

Dominating Set. Chapter Sequential Greedy Algorithm 294 CHAPTER 26. DOMINATING SET 294 CHAPTER 26. DOMINATING SET 26.1 Sequential Greedy Algorithm Chapter 26 Dominating Set Intuitively, to end up with a small dominating set S, nodes in S need to cover as many neighbors as possible. It

More information

Reconstruction for Models on Random Graphs

Reconstruction for Models on Random Graphs 1 Stanford University, 2 ENS Paris October 21, 2007 Outline 1 The Reconstruction Problem 2 Related work and applications 3 Results The Reconstruction Problem: A Story Alice and Bob Alice, Bob and G root

More information

CMPSCI 711: More Advanced Algorithms

CMPSCI 711: More Advanced Algorithms CMPSCI 711: More Advanced Algorithms Section 1-1: Sampling Andrew McGregor Last Compiled: April 29, 2012 1/14 Concentration Bounds Theorem (Markov) Let X be a non-negative random variable with expectation

More information

Aditya Bhaskara CS 5968/6968, Lecture 1: Introduction and Review 12 January 2016

Aditya Bhaskara CS 5968/6968, Lecture 1: Introduction and Review 12 January 2016 Lecture 1: Introduction and Review We begin with a short introduction to the course, and logistics. We then survey some basics about approximation algorithms and probability. We also introduce some of

More information

CMPSCI611: The Matroid Theorem Lecture 5

CMPSCI611: The Matroid Theorem Lecture 5 CMPSCI611: The Matroid Theorem Lecture 5 We first review our definitions: A subset system is a set E together with a set of subsets of E, called I, such that I is closed under inclusion. This means that

More information

WELL-SEPARATED PAIR DECOMPOSITION FOR THE UNIT-DISK GRAPH METRIC AND ITS APPLICATIONS

WELL-SEPARATED PAIR DECOMPOSITION FOR THE UNIT-DISK GRAPH METRIC AND ITS APPLICATIONS WELL-SEPARATED PAIR DECOMPOSITION FOR THE UNIT-DISK GRAPH METRIC AND ITS APPLICATIONS JIE GAO AND LI ZHANG Abstract. We extend the classic notion of well-separated pair decomposition [10] to the unit-disk

More information

CS 6820 Fall 2014 Lectures, October 3-20, 2014

CS 6820 Fall 2014 Lectures, October 3-20, 2014 Analysis of Algorithms Linear Programming Notes CS 6820 Fall 2014 Lectures, October 3-20, 2014 1 Linear programming The linear programming (LP) problem is the following optimization problem. We are given

More information

Optimization of Submodular Functions Tutorial - lecture I

Optimization of Submodular Functions Tutorial - lecture I Optimization of Submodular Functions Tutorial - lecture I Jan Vondrák 1 1 IBM Almaden Research Center San Jose, CA Jan Vondrák (IBM Almaden) Submodular Optimization Tutorial 1 / 1 Lecture I: outline 1

More information

Tight Bounds for Single-Pass Streaming Complexity of the Set Cover Problem

Tight Bounds for Single-Pass Streaming Complexity of the Set Cover Problem Tight Bounds for Single-Pass Streaming Complexity of the Set Cover Problem Sepehr Assadi Department of Computer and Information Science University of Pennsylvania Philadelphia, PA, USA sassadi@cis.upenn.edu

More information

A Streaming Algorithm for 2-Center with Outliers in High Dimensions

A Streaming Algorithm for 2-Center with Outliers in High Dimensions CCCG 2015, Kingston, Ontario, August 10 12, 2015 A Streaming Algorithm for 2-Center with Outliers in High Dimensions Behnam Hatami Hamid Zarrabi-Zadeh Abstract We study the 2-center problem with outliers

More information

ORIE 6334 Spectral Graph Theory November 22, Lecture 25

ORIE 6334 Spectral Graph Theory November 22, Lecture 25 ORIE 64 Spectral Graph Theory November 22, 206 Lecture 25 Lecturer: David P. Williamson Scribe: Pu Yang In the remaining three lectures, we will cover a prominent result by Arora, Rao, and Vazirani for

More information

CS369E: Communication Complexity (for Algorithm Designers) Lecture #8: Lower Bounds in Property Testing

CS369E: Communication Complexity (for Algorithm Designers) Lecture #8: Lower Bounds in Property Testing CS369E: Communication Complexity (for Algorithm Designers) Lecture #8: Lower Bounds in Property Testing Tim Roughgarden March 12, 2015 1 Property Testing We begin in this section with a brief introduction

More information

Lecture 4 Thursday Sep 11, 2014

Lecture 4 Thursday Sep 11, 2014 CS 224: Advanced Algorithms Fall 2014 Lecture 4 Thursday Sep 11, 2014 Prof. Jelani Nelson Scribe: Marco Gentili 1 Overview Today we re going to talk about: 1. linear probing (show with 5-wise independence)

More information

Notes on MapReduce Algorithms

Notes on MapReduce Algorithms Notes on MapReduce Algorithms Barna Saha 1 Finding Minimum Spanning Tree of a Dense Graph in MapReduce We are given a graph G = (V, E) on V = N vertices and E = m N 1+c edges for some constant c > 0. Our

More information

Leveraging Big Data: Lecture 13

Leveraging Big Data: Lecture 13 Leveraging Big Data: Lecture 13 http://www.cohenwang.com/edith/bigdataclass2013 Instructors: Edith Cohen Amos Fiat Haim Kaplan Tova Milo What are Linear Sketches? Linear Transformations of the input vector

More information

An Approximation Algorithm for Approximation Rank

An Approximation Algorithm for Approximation Rank An Approximation Algorithm for Approximation Rank Troy Lee Columbia University Adi Shraibman Weizmann Institute Conventions Identify a communication function f : X Y { 1, +1} with the associated X-by-Y

More information

Solving the Induced Subgraph problem in the randomized multiparty simultaneous messages model

Solving the Induced Subgraph problem in the randomized multiparty simultaneous messages model Solving the Induced Subgraph problem in the randomized multiparty simultaneous messages model J. Kari 1, M. Matamala 2, I. Rapaport 2, and V. Salo 2 1 Department of Mathematics and Statistics, University

More information

from notes written mostly by Dr. Matt Stallmann: All Rights Reserved

from notes written mostly by Dr. Matt Stallmann: All Rights Reserved CSC 505, Fall 000: Week 0 Objectives: understand problem complexity and classes defined by it understand relationships among decision, witness, evaluation, and optimization problems understand what it

More information

Efficient Primal- Dual Graph Algorithms for Map Reduce

Efficient Primal- Dual Graph Algorithms for Map Reduce Efficient Primal- Dual Graph Algorithms for Map Reduce Joint work with Bahman Bahmani Ashish Goel, Stanford Kamesh Munagala Duke University Modern Data Models Over the past decade, many commodity distributed

More information

Maximum Flow. Jie Wang. University of Massachusetts Lowell Department of Computer Science. J. Wang (UMass Lowell) Maximum Flow 1 / 27

Maximum Flow. Jie Wang. University of Massachusetts Lowell Department of Computer Science. J. Wang (UMass Lowell) Maximum Flow 1 / 27 Maximum Flow Jie Wang University of Massachusetts Lowell Department of Computer Science J. Wang (UMass Lowell) Maximum Flow 1 / 27 Flow Networks A flow network is a weighted digraph G = (V, E), where the

More information

THE SZEMERÉDI REGULARITY LEMMA AND ITS APPLICATION

THE SZEMERÉDI REGULARITY LEMMA AND ITS APPLICATION THE SZEMERÉDI REGULARITY LEMMA AND ITS APPLICATION YAQIAO LI In this note we will prove Szemerédi s regularity lemma, and its application in proving the triangle removal lemma and the Roth s theorem on

More information

Approximation Algorithms for the k-set Packing Problem

Approximation Algorithms for the k-set Packing Problem Approximation Algorithms for the k-set Packing Problem Marek Cygan Institute of Informatics University of Warsaw 20th October 2016, Warszawa Marek Cygan Approximation Algorithms for the k-set Packing Problem

More information

Topics in Theoretical Computer Science April 08, Lecture 8

Topics in Theoretical Computer Science April 08, Lecture 8 Topics in Theoretical Computer Science April 08, 204 Lecture 8 Lecturer: Ola Svensson Scribes: David Leydier and Samuel Grütter Introduction In this lecture we will introduce Linear Programming. It was

More information

Shortest paths with negative lengths

Shortest paths with negative lengths Chapter 8 Shortest paths with negative lengths In this chapter we give a linear-space, nearly linear-time algorithm that, given a directed planar graph G with real positive and negative lengths, but no

More information

An exponential separation between quantum and classical one-way communication complexity

An exponential separation between quantum and classical one-way communication complexity An exponential separation between quantum and classical one-way communication complexity Ashley Montanaro Centre for Quantum Information and Foundations, Department of Applied Mathematics and Theoretical

More information

MATH5011 Real Analysis I. Exercise 1 Suggested Solution

MATH5011 Real Analysis I. Exercise 1 Suggested Solution MATH5011 Real Analysis I Exercise 1 Suggested Solution Notations in the notes are used. (1) Show that every open set in R can be written as a countable union of mutually disjoint open intervals. Hint:

More information

Complexity Theory of Polynomial-Time Problems

Complexity Theory of Polynomial-Time Problems Complexity Theory of Polynomial-Time Problems Lecture 5: Subcubic Equivalences Karl Bringmann Reminder: Relations = Reductions transfer hardness of one problem to another one by reductions problem P instance

More information

Testing k-wise Independence over Streaming Data

Testing k-wise Independence over Streaming Data Testing k-wise Independence over Streaming Data Kai-Min Chung Zhenming Liu Michael Mitzenmacher Abstract Following on the work of Indyk and McGregor [5], we consider the problem of identifying correlations

More information

1 Estimating Frequency Moments in Streams

1 Estimating Frequency Moments in Streams CS 598CSC: Algorithms for Big Data Lecture date: August 28, 2014 Instructor: Chandra Chekuri Scribe: Chandra Chekuri 1 Estimating Frequency Moments in Streams A significant fraction of streaming literature

More information

Lecture 11 October 7, 2013

Lecture 11 October 7, 2013 CS 4: Advanced Algorithms Fall 03 Prof. Jelani Nelson Lecture October 7, 03 Scribe: David Ding Overview In the last lecture we talked about set cover: Sets S,..., S m {,..., n}. S has cost c S. Goal: Cover

More information

Differential Analaysis of Block Ciphers SIMON and SPECK

Differential Analaysis of Block Ciphers SIMON and SPECK 1 / 36 Differential Analaysis of Block Ciphers SIMON and SPECK Alex Biryukov, Arnab Roy, Vesselin Velichkov 2 / 36 Outline Introduction Light-Weight Block Ciphers: SIMON and SPECK Differential Anlaysis

More information

RECAP: Extremal problems Examples

RECAP: Extremal problems Examples RECAP: Extremal problems Examples Proposition 1. If G is an n-vertex graph with at most n edges then G is disconnected. A Question you always have to ask: Can we improve on this proposition? Answer. NO!

More information

Lecturer: Shuchi Chawla Topic: Inapproximability Date: 4/27/2007

Lecturer: Shuchi Chawla Topic: Inapproximability Date: 4/27/2007 CS880: Approximations Algorithms Scribe: Tom Watson Lecturer: Shuchi Chawla Topic: Inapproximability Date: 4/27/2007 So far in this course, we have been proving upper bounds on the approximation factors

More information

On Stochastic Decompositions of Metric Spaces

On Stochastic Decompositions of Metric Spaces On Stochastic Decompositions of Metric Spaces Scribe of a talk given at the fall school Metric Embeddings : Constructions and Obstructions. 3-7 November 204, Paris, France Ofer Neiman Abstract In this

More information

Topic: Balanced Cut, Sparsest Cut, and Metric Embeddings Date: 3/21/2007

Topic: Balanced Cut, Sparsest Cut, and Metric Embeddings Date: 3/21/2007 CS880: Approximations Algorithms Scribe: Tom Watson Lecturer: Shuchi Chawla Topic: Balanced Cut, Sparsest Cut, and Metric Embeddings Date: 3/21/2007 In the last lecture, we described an O(log k log D)-approximation

More information

Sorting Algorithms. We have already seen: Selection-sort Insertion-sort Heap-sort. We will see: Bubble-sort Merge-sort Quick-sort

Sorting Algorithms. We have already seen: Selection-sort Insertion-sort Heap-sort. We will see: Bubble-sort Merge-sort Quick-sort Sorting Algorithms We have already seen: Selection-sort Insertion-sort Heap-sort We will see: Bubble-sort Merge-sort Quick-sort We will show that: O(n log n) is optimal for comparison based sorting. Bubble-Sort

More information

General Methods for Algorithm Design

General Methods for Algorithm Design General Methods for Algorithm Design 1. Dynamic Programming Multiplication of matrices Elements of the dynamic programming Optimal triangulation of polygons Longest common subsequence 2. Greedy Methods

More information

Randomized Algorithms. Lecture 4. Lecturer: Moni Naor Scribe by: Tamar Zondiner & Omer Tamuz Updated: November 25, 2010

Randomized Algorithms. Lecture 4. Lecturer: Moni Naor Scribe by: Tamar Zondiner & Omer Tamuz Updated: November 25, 2010 Randomized Algorithms Lecture 4 Lecturer: Moni Naor Scribe by: Tamar Zondiner & Omer Tamuz Updated: November 25, 2010 1 Pairwise independent hash functions In the previous lecture we encountered two families

More information