Scheduling Contract Algorithms on Multiple Processors
|
|
- Arnold Cain
- 6 years ago
- Views:
Transcription
1 Fro: AAAI Technical Report FS Copilation copyright 200, AAAI ( All rights reserved. Scheduling Contract Algoriths on Multiple Processors Daniel S. Bernstein, Theodore. Perkins, Shloo Zilberstein Departent of Coputer Science University of Massachusetts Aherst, MA 0003 Lev Finkelstein Coputer Science Departent Technion--Israel Institute of Technology Haifa 32000, Israel Abstract Anytie algoriths offer a tradeoff between coputation tie and the quality of the result returned. They can be divided into two classes: contract algoriths, for which the total run tie ust be specified in advance, and interruptible algoriths, which can be queried at any tie for a solution. An interruptible algorith can be constructed fro a contract algorith by repeatedly activating the contract algorith with increasing run ties. The "acceleration ratio" of a schedule is a worst-case easure of how inefficient the constructed interruptible algorith is copared to the contract algorith. When the contracts are executed serially, i.e., on one processor, it is known how to choose contract lengths to iniize the acceleration ratio. We study the proble of scheduling contracts to n on processors in parallel. We derive an upper bound on the best possible acceleration ratio for processors, providing a siple exponential scheduling strategy that achieves this acceleration ratio. Further, we show that no schedule can yield a better acceleration ratio. Introduction In solving optiization probles, we are often faced with situations in which there is not enough tie to deterine an optial solution. We desire approxiation algoriths that can trade off coputation tie for quality of results. Algoriths with this property have been called anytie algoriths, and have been studied by researchers in artificial intelligence concerned with designing real-tie systes (Horvitz, 987; Russell & Zilberstein, 99). Anytie algoriths have been designed for a range of probles, including planning (Dean& Boddy, 988) and Bayesian inference (Wellan& Liu, 994). Also, general-purpose search algoriths such as local search and siulated annealing are naturally viewed as anytie algoriths. A useful distinction has been ade between two types of anytie algoriths: contract algoriths and interruptible algoriths. Contract algoriths require that the total coputation tie be given in advance. Once activated, a contract algorith ay not produce a useful result until the prespecified aount of tie has elapsed. This characteristic distinguishes the fro interruptible algoriths, which do not need to know the deadline a priori. Contract algoriths can be easier to design because they have access to ore inforation. Soe proble-solving techniques that can be viewed as contract algoriths include depth-bounded heuristic search and solving continuous control probles by discretizing the state space. What is coon to these techniques is that for a given contract tie they can select paraeters (e.g., the depth bound or the coarseness of the discretization) that liit the aount of coputation so as to guarantee returning a solution within the available tie. However, if a contract algorith is given ore tie than it expects, it ay have to be started fro scratch with new paraeters in order to iprove upon its current result. Interruptible algoriths are generally ore flexible and widely applicable than contract algoriths. An interruptible algorith can be fored by repeatedly running a contract algorith with increasing contract lengths, returning the last result produced in the case of an interruption. In the case of serial execution of contracts, (Russell & Zilberstein, 99) suggested the sequence contract lengths:, 2, 4, 8,... They showed that for any interruption tie t >, the last contract copleted is always of length at least t/4. This factor of four is the acceleration ratio of the schedule. In (Zilberstein et al., 999), it was shown that no sequence of contracts on a single processor can reduce the acceleration to below four. By scheduling the contract algorith on parallel processors, it is possible to achieve an acceleration ratio of less than four. In this paper, we describe a siple exponential strategy for scheduling a contract algorith on processors. By analyzing this strategy, we derive an explicit forula for an upper bound on the optial acceleration ratio in ters of ra. This bound approaches as approaches infinity. Furtherore, we show that no schedule yields a better acceleration ratio, and thus the bound is tight. Finally, we discuss extensions to this work and the connection between our proble and a proble involving ultiple robots searching for a point on ultiple rays. Scheduling a contract algorith on ultiple processors An anytie algorith A, when applied to an optiization proble instance for tie t, produces a solution of soe quality QA(t). The function QA is called the perforance profile of the algorith A on the instance. In general, one
2 does not know the perforance profile of an algorith on a proble instance. But the concept of a perforance profile is useful in reasoning about anytie algoriths. We assue that the perforance profile of an anytie algorith on any proble instance is defined for all t > 0 and is a onotonically non-decreasing function of t. We wish to construct an interruptible algorith fro a contract algorith by scheduling a sequence of contracts on processors in parallel. A schedule is a function X : {,...,} x N --+ IL where X(i,j) is the length of the jth contract run on processor i. We assue, without loss of generality, that X(, ) = and that X(i,j) > I for all i and j. A contract algorith A along with a schedule X defines an interruptible algorith B. When B is interrupted, it returns the best solution found by any of the contracts that have copleted. Since we assue perforance profiles are onotonic, this is equivalent to returning the solution of the longest contract that has copleted. This is illustrated in Figure. The algorith B has a perforance profile which depends on the profile of A and the schedule X. Before describing B s perforance profile, we need to ake a few definitions. We define the total tie spent by processor i executing its first j contracts as: = ~ X(i, For a given tie t, we define a function that specifies which contracts finish before that tie: x(t) = {(i,j)l We take the view that when a contract copletes at tie t, its solution is available to be returned upon interruption at any tie r > t. The length of the longest contract to coplete before tie t is: ] ax(i,j)e~x(t) X(i,j) if(i)x(t) Lx(t) I 0 if (I x (t) Thus, the perforance profile for the interruptible algorith B is QB(t) = QA(Lx(t)). We wish to find the schedule X that is optial for a given nuber of processors, independent of the particular contract algorith being used or the proble being solved. We copare schedules based on their acceleration ratios, which is a easure siilar to the copetitive ratio for on-line algoriths (Sleator & Tarjan, 985). Definition The acceleration ratio, R(X), for a given schedule X on processors is the sallest constant r for which QB(t) >_ QA ( t ) for all t > and any contract gorith A. The acceleration ratio tells us how uch longer the interruptible algorith has to work to ensure the sae quality as the contract algorith. The following lea will be useful in the later proofs. Lea Forall X, R(X) = supt> Z--x-x(t)" Proof: By the definitions above, QB(t) = QA(Lx(t)) QA t ) for all t >. Since this holds for any algorith A, we can suppose an algorith A with perforance profile QA(t) = t. Thus Lx(t) >_ R.~(X) >>_ t for all t >. This iplies R(X) > supt> Lx-~" t To show that equality holds, assue the contrary and derive a contradiction with the fact that R.~(X) is defined as the sallest constant enforcing the inequality between QB and QA. [] We define the inial acceleration ratio for processors to be = i{ R(X). In (Zilberstein et al., 999), it was shown that R~ = 4. the following sections, we provide tight bounds on this value for arbitrary re. Upper bound We first prove a lea foralizing the idea that the worst tie to interrupt the schedule is just as a contract ends. Lea 2 For all X, t sup - sup t>l Lx(t) (i,j)#(,) ax(i,j) Lx() Proof: Lx(t) is left-continuous everywhere and piecewise constant, with the pieces deliited by the tie points. For t >, ~ is piecewise linear, increasing, and left-continuous. Thus, the extrea of Lx--~(t can only occur at the points Gx (i, j), (i, j) # (, ); no other in tie ay play a role in the supreu. [] Theore R* < (~+)~-~-. Proof: Consider the schedule X(i, j) (+ ) ~-~+~/s-~). Note that in the one-processor case this reduces to X (i, j) 2 j-. It is straightforward to show that for (i, j) ~ (, X(i-l,j) ifi~l Lx(ax(i,j)) = X(,j - ) if/= Also, the following is true for all (i,j) (, ) = ~ X(i,k) k---=l = + Y = ( + ) -~- ~--~.(rn + k = (+l)i-l~-" (+l)j+l-(+l))-- < ( + I) -~"~ f/% t
3 Perforance profile of the interruptible algorith a" o~ _= o I, Processor X(l,2) Processor 2 x(2,0 X(2,2) [ Processor 3 x(3a) ] x(3.2) I tie Figure : Constructing interruptible algorith B by scheduling contract algorith A on three processors. So for all i,j such that i #, Lx() X(i, j) ( + ) - + < ( + ) -2+~- and for all i, j such that i = i and j #, Lx(Cx(i,j)) X(,j ) + 7 < ( + ) ~i--x -- ( + ) ( + ) Therefore R;, _< R(X) = ( + )~ + sup Lx() - (ij)#0,) o Lower bound In this section, it will be convenient to index contracts by their relative finish ties. The following function counts how any contracts finish no later than the jth contract on the ith processor finishes. For a schedule X, let q~x(i,j) = I{(i,j )lgx(i,/) <_ }l. We assue w.l.o.g, that no two contracts can finish at exactly the sae tie---it is straightforward to show that any schedule that doesn t satisfy this condition is doinated by a schedule that does. This assuption guarantees that ~x is one-to-one; it is also onto and thus an isoorphis. We refer to ~I x (i, j) as the global index of the jth contract run on processor i. We introduce a contract length function that takes as input a global index. For all i, j, let Yx(q~x(i,j)) = X(i,j). For notational siplicity, we will hereafter write Y in place of Yx. We further define a finish tie function that takes as input a global index: Gg(g~x(i,j)) =. Given this definition and the definition of acceleration ratio, it follows that Gy(k + ) _< R(Y)Y(k) for all k. Finally, we define a quantity to represent the su of the lengths of all the contracts finishing no later than contract k finishes: k a~y(k) y~y(). Lea 3 For an arbitrary schedule, for all k >, V y(k ) < R(Y)(a y(k -4- ) - G y(k) Proof: We first relate Gy and G~. Consider the contract with global index k + +. ~ --- Gy (k + l + ) is the su of the finishing ties for the last contracts to finish no later than contract k + + finishes. G~(k + + ) is the su over all processors of the finish tie for the last contract to finish on that processor no later than contract k + + finishes. It is straightforward to show that G~, (k + ) < ~ Gy(k + l + ) (and they are equal if the last contracts to finish include one fro each processor). Furtherore l= y ag(k+l+l) <_ R(Y) ) ZY(k+l /= /= = R(Y) (a r(k + ) - a y(k)). [] 2
4 (-I-l) Theore 2 R~n = Proof: Let us define H(k) = G~(k + )/G~y(k) for all k >. Fro Lea 3, we have G~(k + + ) < R(Y)(G~(k + ) - G~y(k)), and thus SO G y(k) ) G~(k++l) R(Y) a y(k + > G y (k + ) ( R(Y) (- We denote ~ > H(k + ). H(k)...H(k +- )] H*(k) = ax{h(k),..., H(k + )}. There are two cases to consider. In the first case, there exists soe k > such that H*(k ) = H(k + ). Then we have H(k )... H(k + ) < H(k + re,and Thus R~(Y) H(k + >-H(k + ). ( ) R(Y) H(k +l + ) H(k + ) - " We are interested in how sall R(Y) can be. Let C = H(k ~ + ). Suppose we iniize the right-hand side with respect to the only free variable, C, over the region C >. Setting the derivative to zero, we find d +l C (+ )C C+lC - dc C ra - C - (C TM - ) 2 -- =0 ( + )C(C "~- ) - e2~ = o =~ C2 - ( + l)c = The only solution is C = ( + ) ~. At the boundaries C and C = oo, the value goes to infinity, so this solution is the one and only iniu. Substituting into the inequality, we find R(Y) (+l)~ =-(+l)~+l ( + )~ - In the second case, we have H*(k) ~ H(k + for all k _>. Thus g*(k + ) = ax{g(k + ),...,g(k +),H(k ++ )} = ax{h(k + ),...,H(k +)} <_ H*(k), which eans that the H*(k) for a non-increasing sequence. This sequence ust be liited by, so li H*(k) = k--+~ for soe D >. Therefore lik~ H* (k) H* (k + ) = lik-~oo H*(k) "~ = D. Then = R(Y)(- lik-~/-/*(k- )..-H*(k- ( ( ) = R(g) - lisupk_,~h(k- )...H(k- ) = li supr(y)k~ >_ li sup H(k) = li H*(k) k.--~oo ----D. - H(k-)- H(k - ) Using the sae analysis as in the previous case, we have that R(Y) (+ )~+ Cobining this with Theore, we get the desired result. [] Discussion We described a siple exponential strategy for scheduling contract algoriths on ultiple processors to for an interruptible algorith. In addition, we proved that this schedule achieves the inial acceleration ratio aong the set of all schedules. In this work, we assued no knowledge of the deadline or of the contract algorith s perforance profile. In (Zilberstein et al., 999), the authors study the proble where the perforance profile is known and the deadline is drawn fro a known distribution. In this case, the proble of sequencing runs of the contract algorith on one processor to axiize the expected quality of results at the deadline can be fraed as a Markov decision process. It still reains to extend this work to the ultiple processor case. We note that the results presented in this paper are also applicable to a proble involving ultiple robots searching for a goal on ultiple rays. In this proble, k robots start at the intersection of rays and ove along the rays until the goal is found. An optial search strategy is defined to be one that iniizes the copetitive ratio, which is the worst-case ratio of the tie spent searching to the tie that would have been spent if the goal location was known initially. For k, the proble is trivial; the strategy that siply assigns one robot to each ray achieves a ratio of one. If k <, however, robots ay have to return to the origin so as not to neglect rays. The proble with k = and = 2 is studied in (Ricardo et al., 993), and it is shown that the optial copetitive ratio is 9. The general proble is briefly entioned in (Kao et al., 998), where a related proble is studied. It turns out that the analysis in this paper applies to the restricted case where k = -. A sequence of contract lengths for a ) 3
5 processor is analogous to a sequence of search extents for a robot, where a search extent is the distance a robot goes out on a ray before returning to the origin. It can be shown that the copetitive ratio for a ulti-robot schedule of search extents is I + 2r, where r is the acceleration ratio for the schedule. Acknowledgeents This work was supported in part by the National Science Foundation under grants IRI and INT , and by NASA under grants NAG and NAG Daniel Bcrnstein was also supported by a National Science Foundation Graduate Fellowship. Theodore Perkins was supported by a graduate fellowship fro the University of Massachusetts. Any opinions, findings, and conclusions or recoendations expressed in this aterial are those of the authors and do not reflect the views of the NSF or NASA. References Dean, T. & Boddy, M. (988). An analysis of tiedependent planning. In Proceedings of the Seventh National Conference on Artificial Intelligence (pp ). Horvitz, E. (987). Reasoning about beliefs and actions under coputational resource constraints. In Workshop on Uncertainty in Artificial Intelligence. Kao, M.-Y., Ma, Y., Sipser, M. & Yin, Y. (998). Optial constructions of hybrid algoriths. ournal of Algoriths, 29, Ricardo, B.-Y., Culberson,. & Rawlins, G. (993). Searching in the plane. Inforation and Coputation, 06, Russell, S.. & Zilberstein, S. (99). Coposing real-tie systes. Proceedings of the Twelth International oint Conference on Artificial Intelligence (pp ). Sleator, D. D. & Tarjan, R. E. (985). Aortized efficiency of list update and paging rules. Counications of the ACM, 28, Wellan, M. & Liu, C.-L. (994). State-space abstraction for anytie evaluation of probabilistic networks. In Proceedings of the Tenth Conference on Uncertainty in Artificial Intelligence. Zilberstein, S., Charpillet, E & Chassaing, P. (999). Realtie proble-solving with contract algoriths. In Proceedings of the Sixteenth International oint Conference on Artificial Intelligence. 4
List Scheduling and LPT Oliver Braun (09/05/2017)
List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)
More informationA Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science
A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest
More informationApproximation in Stochastic Scheduling: The Power of LP-Based Priority Policies
Approxiation in Stochastic Scheduling: The Power of -Based Priority Policies Rolf Möhring, Andreas Schulz, Marc Uetz Setting (A P p stoch, r E( w and (B P p stoch E( w We will assue that the processing
More informationA Simple Regression Problem
A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where
More informationPolygonal Designs: Existence and Construction
Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G
More informationModel Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon
Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential
More informationNew Slack-Monotonic Schedulability Analysis of Real-Time Tasks on Multiprocessors
New Slack-Monotonic Schedulability Analysis of Real-Tie Tasks on Multiprocessors Risat Mahud Pathan and Jan Jonsson Chalers University of Technology SE-41 96, Göteborg, Sweden {risat, janjo}@chalers.se
More informationThe Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate
The Siplex Method is Strongly Polynoial for the Markov Decision Proble with a Fixed Discount Rate Yinyu Ye April 20, 2010 Abstract In this note we prove that the classic siplex ethod with the ost-negativereduced-cost
More informationA Note on Online Scheduling for Jobs with Arbitrary Release Times
A Note on Online Scheduling for Jobs with Arbitrary Release Ties Jihuan Ding, and Guochuan Zhang College of Operations Research and Manageent Science, Qufu Noral University, Rizhao 7686, China dingjihuan@hotail.co
More informationHomework 3 Solutions CSE 101 Summer 2017
Hoework 3 Solutions CSE 0 Suer 207. Scheduling algoriths The following n = 2 jobs with given processing ties have to be scheduled on = 3 parallel and identical processors with the objective of iniizing
More informationIntelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines
Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes
More informationA Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness
A Note on Scheduling Tall/Sall Multiprocessor Tasks with Unit Processing Tie to Miniize Maxiu Tardiness Philippe Baptiste and Baruch Schieber IBM T.J. Watson Research Center P.O. Box 218, Yorktown Heights,
More informationDistributed Subgradient Methods for Multi-agent Optimization
1 Distributed Subgradient Methods for Multi-agent Optiization Angelia Nedić and Asuan Ozdaglar October 29, 2007 Abstract We study a distributed coputation odel for optiizing a su of convex objective functions
More information1 Identical Parallel Machines
FB3: Matheatik/Inforatik Dr. Syaantak Das Winter 2017/18 Optiizing under Uncertainty Lecture Notes 3: Scheduling to Miniize Makespan In any standard scheduling proble, we are given a set of jobs J = {j
More informationKernel Methods and Support Vector Machines
Intelligent Systes: Reasoning and Recognition Jaes L. Crowley ENSIAG 2 / osig 1 Second Seester 2012/2013 Lesson 20 2 ay 2013 Kernel ethods and Support Vector achines Contents Kernel Functions...2 Quadratic
More informatione-companion ONLY AVAILABLE IN ELECTRONIC FORM
OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer
More informationAlgorithms for parallel processor scheduling with distinct due windows and unit-time jobs
BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and
More informationBlock designs and statistics
Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent
More informationarxiv: v1 [cs.ds] 3 Feb 2014
arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/
More informationSoft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis
Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES
More informationMSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE
Proceeding of the ASME 9 International Manufacturing Science and Engineering Conference MSEC9 October 4-7, 9, West Lafayette, Indiana, USA MSEC9-8466 MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL
More informationtime time δ jobs jobs
Approxiating Total Flow Tie on Parallel Machines Stefano Leonardi Danny Raz y Abstract We consider the proble of optiizing the total ow tie of a strea of jobs that are released over tie in a ultiprocessor
More informationTight Information-Theoretic Lower Bounds for Welfare Maximization in Combinatorial Auctions
Tight Inforation-Theoretic Lower Bounds for Welfare Maxiization in Cobinatorial Auctions Vahab Mirrokni Jan Vondrák Theory Group, Microsoft Dept of Matheatics Research Princeton University Redond, WA 9805
More informationIntelligent Systems: Reasoning and Recognition. Artificial Neural Networks
Intelligent Systes: Reasoning and Recognition Jaes L. Crowley MOSIG M1 Winter Seester 2018 Lesson 7 1 March 2018 Outline Artificial Neural Networks Notation...2 Introduction...3 Key Equations... 3 Artificial
More information13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices
CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay
More informationOn Constant Power Water-filling
On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives
More informationThe Weierstrass Approximation Theorem
36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined
More informationNon-Parametric Non-Line-of-Sight Identification 1
Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,
More informationNonclairvoyant Scheduling to Minimize the Total Flow Time on Single and Parallel Machines
Nonclairvoyant Scheduling to Miniize the Total Flow Tie on Single and Parallel Machines LUCA BECCHETTI AND STEFANO LEONARDI University of Roe La Sapienza, Roe, Italy Abstract. Scheduling a sequence of
More informationMathematical Model and Algorithm for the Task Allocation Problem of Robots in the Smart Warehouse
Aerican Journal of Operations Research, 205, 5, 493-502 Published Online Noveber 205 in SciRes. http://www.scirp.org/journal/ajor http://dx.doi.org/0.4236/ajor.205.56038 Matheatical Model and Algorith
More informationInteractive Markov Models of Evolutionary Algorithms
Cleveland State University EngagedScholarship@CSU Electrical Engineering & Coputer Science Faculty Publications Electrical Engineering & Coputer Science Departent 2015 Interactive Markov Models of Evolutionary
More informationInspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information
Cite as: Straub D. (2014). Value of inforation analysis with structural reliability ethods. Structural Safety, 49: 75-86. Value of Inforation Analysis with Structural Reliability Methods Daniel Straub
More informationOn the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs
On the Inapproxiability of Vertex Cover on k-partite k-unifor Hypergraphs Venkatesan Guruswai and Rishi Saket Coputer Science Departent Carnegie Mellon University Pittsburgh, PA 1513. Abstract. Coputing
More informationTight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography
Tight Bounds for axial Identifiability of Failure Nodes in Boolean Network Toography Nicola Galesi Sapienza Università di Roa nicola.galesi@uniroa1.it Fariba Ranjbar Sapienza Università di Roa fariba.ranjbar@uniroa1.it
More informationESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics
ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS A Thesis Presented to The Faculty of the Departent of Matheatics San Jose State University In Partial Fulfillent of the Requireents
More informationBipartite subgraphs and the smallest eigenvalue
Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.
More informationPattern Recognition and Machine Learning. Artificial Neural networks
Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lessons 7 20 Dec 2017 Outline Artificial Neural networks Notation...2 Introduction...3 Key Equations... 3 Artificial
More informationSolutions of some selected problems of Homework 4
Solutions of soe selected probles of Hoework 4 Sangchul Lee May 7, 2018 Proble 1 Let there be light A professor has two light bulbs in his garage. When both are burned out, they are replaced, and the next
More informationCourse Notes for EE227C (Spring 2018): Convex Optimization and Approximation
Course Notes for EE227C (Spring 2018): Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee227c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee227c@berkeley.edu October
More informationOn Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40
On Poset Merging Peter Chen Guoli Ding Steve Seiden Abstract We consider the follow poset erging proble: Let X and Y be two subsets of a partially ordered set S. Given coplete inforation about the ordering
More informationCSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13
CSE55: Randoied Algoriths and obabilistic Analysis May 6, Lecture Lecturer: Anna Karlin Scribe: Noah Siegel, Jonathan Shi Rando walks and Markov chains This lecture discusses Markov chains, which capture
More informationSupplementary to Learning Discriminative Bayesian Networks from High-dimensional Continuous Neuroimaging Data
Suppleentary to Learning Discriinative Bayesian Networks fro High-diensional Continuous Neuroiaging Data Luping Zhou, Lei Wang, Lingqiao Liu, Philip Ogunbona, and Dinggang Shen Proposition. Given a sparse
More informationLecture 21. Interior Point Methods Setup and Algorithm
Lecture 21 Interior Point Methods In 1984, Kararkar introduced a new weakly polynoial tie algorith for solving LPs [Kar84a], [Kar84b]. His algorith was theoretically faster than the ellipsoid ethod and
More informationFixed-to-Variable Length Distribution Matching
Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de
More informationA Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay
A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer
More informationlecture 36: Linear Multistep Mehods: Zero Stability
95 lecture 36: Linear Multistep Mehods: Zero Stability 5.6 Linear ultistep ethods: zero stability Does consistency iply convergence for linear ultistep ethods? This is always the case for one-step ethods,
More informationBest Arm Identification: A Unified Approach to Fixed Budget and Fixed Confidence
Best Ar Identification: A Unified Approach to Fixed Budget and Fixed Confidence Victor Gabillon Mohaad Ghavazadeh Alessandro Lazaric INRIA Lille - Nord Europe, Tea SequeL {victor.gabillon,ohaad.ghavazadeh,alessandro.lazaric}@inria.fr
More informationExperimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis
City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna
More informationCourse Notes for EE227C (Spring 2018): Convex Optimization and Approximation
Course Notes for EE7C (Spring 018: Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee7c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee7c@berkeley.edu October 15,
More informationFairness via priority scheduling
Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation
More informationTopic 5a Introduction to Curve Fitting & Linear Regression
/7/08 Course Instructor Dr. Rayond C. Rup Oice: A 337 Phone: (95) 747 6958 E ail: rcrup@utep.edu opic 5a Introduction to Curve Fitting & Linear Regression EE 4386/530 Coputational ethods in EE Outline
More information3.8 Three Types of Convergence
3.8 Three Types of Convergence 3.8 Three Types of Convergence 93 Suppose that we are given a sequence functions {f k } k N on a set X and another function f on X. What does it ean for f k to converge to
More informationASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical
IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul
More informationKONINKL. NEDERL. AKADEMIE VAN WETENSCHAPPEN AMSTERDAM Reprinted from Proceedings, Series A, 61, No. 1 and Indag. Math., 20, No.
KONINKL. NEDERL. AKADEMIE VAN WETENSCHAPPEN AMSTERDAM Reprinted fro Proceedings, Series A, 6, No. and Indag. Math., 20, No., 95 8 MATHEMATIC S ON SEQUENCES OF INTEGERS GENERATED BY A SIEVIN G PROCES S
More informationMULTIAGENT Resource Allocation (MARA) is the
EDIC RESEARCH PROPOSAL 1 Designing Negotiation Protocols for Utility Maxiization in Multiagent Resource Allocation Tri Kurniawan Wijaya LSIR, I&C, EPFL Abstract Resource allocation is one of the ain concerns
More informationCOS 424: Interacting with Data. Written Exercises
COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well
More informationStochastic Subgradient Methods
Stochastic Subgradient Methods Lingjie Weng Yutian Chen Bren School of Inforation and Coputer Science University of California, Irvine {wengl, yutianc}@ics.uci.edu Abstract Stochastic subgradient ethods
More informationGraphical Models in Local, Asymmetric Multi-Agent Markov Decision Processes
Graphical Models in Local, Asyetric Multi-Agent Markov Decision Processes Ditri Dolgov and Edund Durfee Departent of Electrical Engineering and Coputer Science University of Michigan Ann Arbor, MI 48109
More informationChapter 6 1-D Continuous Groups
Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:
More informationQuantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search
Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths
More informationCh 12: Variations on Backpropagation
Ch 2: Variations on Backpropagation The basic backpropagation algorith is too slow for ost practical applications. It ay take days or weeks of coputer tie. We deonstrate why the backpropagation algorith
More informationAn EGZ generalization for 5 colors
An EGZ generalization for 5 colors David Grynkiewicz and Andrew Schultz July 6, 00 Abstract Let g zs(, k) (g zs(, k + 1)) be the inial integer such that any coloring of the integers fro U U k 1,..., g
More informationIEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 60, NO. 2, FEBRUARY ETSP stands for the Euclidean traveling salesman problem.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 60, NO., FEBRUARY 015 37 Target Assignent in Robotic Networks: Distance Optiality Guarantees and Hierarchical Strategies Jingjin Yu, Meber, IEEE, Soon-Jo Chung,
More informationSome Perspective. Forces and Newton s Laws
Soe Perspective The language of Kineatics provides us with an efficient ethod for describing the otion of aterial objects, and we ll continue to ake refineents to it as we introduce additional types of
More informationSupport Vector Machines MIT Course Notes Cynthia Rudin
Support Vector Machines MIT 5.097 Course Notes Cynthia Rudin Credit: Ng, Hastie, Tibshirani, Friedan Thanks: Şeyda Ertekin Let s start with soe intuition about argins. The argin of an exaple x i = distance
More informationMulti-Dimensional Hegselmann-Krause Dynamics
Multi-Diensional Hegselann-Krause Dynaics A. Nedić Industrial and Enterprise Systes Engineering Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu B. Touri Coordinated Science Laboratory
More informationFeature Extraction Techniques
Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that
More informationComputable Shell Decomposition Bounds
Coputable Shell Decoposition Bounds John Langford TTI-Chicago jcl@cs.cu.edu David McAllester TTI-Chicago dac@autoreason.co Editor: Leslie Pack Kaelbling and David Cohn Abstract Haussler, Kearns, Seung
More informationWhen Short Runs Beat Long Runs
When Short Runs Beat Long Runs Sean Luke George Mason University http://www.cs.gu.edu/ sean/ Abstract What will yield the best results: doing one run n generations long or doing runs n/ generations long
More informationNew upper bound for the B-spline basis condition number II. K. Scherer. Institut fur Angewandte Mathematik, Universitat Bonn, Bonn, Germany.
New upper bound for the B-spline basis condition nuber II. A proof of de Boor's 2 -conjecture K. Scherer Institut fur Angewandte Matheati, Universitat Bonn, 535 Bonn, Gerany and A. Yu. Shadrin Coputing
More informationMidterm 1 Sample Solution
Midter 1 Saple Solution NOTE: Throughout the exa a siple graph is an undirected, unweighted graph with no ultiple edges (i.e., no exact repeats of the sae edge) and no self-loops (i.e., no edges fro a
More informationThis model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.
CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when
More informationConstrained Consensus and Optimization in Multi-Agent Networks arxiv: v2 [math.oc] 17 Dec 2008
LIDS Report 2779 1 Constrained Consensus and Optiization in Multi-Agent Networks arxiv:0802.3922v2 [ath.oc] 17 Dec 2008 Angelia Nedić, Asuan Ozdaglar, and Pablo A. Parrilo February 15, 2013 Abstract We
More informationSharp Time Data Tradeoffs for Linear Inverse Problems
Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used
More informationVulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links
Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp
More informationarxiv: v1 [cs.ds] 29 Jan 2012
A parallel approxiation algorith for ixed packing covering seidefinite progras arxiv:1201.6090v1 [cs.ds] 29 Jan 2012 Rahul Jain National U. Singapore January 28, 2012 Abstract Penghui Yao National U. Singapore
More informationMachine Learning Basics: Estimators, Bias and Variance
Machine Learning Basics: Estiators, Bias and Variance Sargur N. srihari@cedar.buffalo.edu This is part of lecture slides on Deep Learning: http://www.cedar.buffalo.edu/~srihari/cse676 1 Topics in Basics
More informationOn the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation
journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation
More informationA Theoretical Analysis of a Warm Start Technique
A Theoretical Analysis of a War Start Technique Martin A. Zinkevich Yahoo! Labs 701 First Avenue Sunnyvale, CA Abstract Batch gradient descent looks at every data point for every step, which is wasteful
More informationU V. r In Uniform Field the Potential Difference is V Ed
SPHI/W nit 7.8 Electric Potential Page of 5 Notes Physics Tool box Electric Potential Energy the electric potential energy stored in a syste k of two charges and is E r k Coulobs Constant is N C 9 9. E
More informationWarning System of Dangerous Chemical Gas in Factory Based on Wireless Sensor Network
565 A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 59, 07 Guest Editors: Zhuo Yang, Junie Ba, Jing Pan Copyright 07, AIDIC Servizi S.r.l. ISBN 978-88-95608-49-5; ISSN 83-96 The Italian Association
More informationare equal to zero, where, q = p 1. For each gene j, the pairwise null and alternative hypotheses are,
Page of 8 Suppleentary Materials: A ultiple testing procedure for ulti-diensional pairwise coparisons with application to gene expression studies Anjana Grandhi, Wenge Guo, Shyaal D. Peddada S Notations
More informationUsing EM To Estimate A Probablity Density With A Mixture Of Gaussians
Using EM To Estiate A Probablity Density With A Mixture Of Gaussians Aaron A. D Souza adsouza@usc.edu Introduction The proble we are trying to address in this note is siple. Given a set of data points
More informationSupport recovery in compressed sensing: An estimation theoretic approach
Support recovery in copressed sensing: An estiation theoretic approach Ain Karbasi, Ali Horati, Soheil Mohajer, Martin Vetterli School of Coputer and Counication Sciences École Polytechnique Fédérale de
More informationLower Bounds for Quantized Matrix Completion
Lower Bounds for Quantized Matrix Copletion Mary Wootters and Yaniv Plan Departent of Matheatics University of Michigan Ann Arbor, MI Eail: wootters, yplan}@uich.edu Mark A. Davenport School of Elec. &
More informationEMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS
EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS Jochen Till, Sebastian Engell, Sebastian Panek, and Olaf Stursberg Process Control Lab (CT-AST), University of Dortund,
More informationUniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval
Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,
More informationA Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair
Proceedings of the 6th SEAS International Conference on Siulation, Modelling and Optiization, Lisbon, Portugal, Septeber -4, 006 0 A Siplified Analytical Approach for Efficiency Evaluation of the eaving
More informationOn the Analysis of the Quantum-inspired Evolutionary Algorithm with a Single Individual
6 IEEE Congress on Evolutionary Coputation Sheraton Vancouver Wall Centre Hotel, Vancouver, BC, Canada July 16-1, 6 On the Analysis of the Quantu-inspired Evolutionary Algorith with a Single Individual
More informationA Markov Framework for the Simple Genetic Algorithm
A arkov Fraework for the Siple Genetic Algorith Thoas E. Davis*, Jose C. Principe Electrical Engineering Departent University of Florida, Gainesville, FL 326 *WL/NGS Eglin AFB, FL32542 Abstract This paper
More informationAs a model for an ATM switch we consider the overow frequency of a queue that
BUFFER OVERFLOW ASYMPTOTICS FOR A BUFFER HANDLING MANY TRAFFIC SOURCES COSTAS COURCOUBETIS, University of Crete RICHARD WEBER, University of Cabridge Abstract As a odel for an ATM switch we consider the
More informationA method to determine relative stroke detection efficiencies from multiplicity distributions
A ethod to deterine relative stroke detection eiciencies ro ultiplicity distributions Schulz W. and Cuins K. 2. Austrian Lightning Detection and Inoration Syste (ALDIS), Kahlenberger Str.2A, 90 Vienna,
More informationRECOVERY OF A DENSITY FROM THE EIGENVALUES OF A NONHOMOGENEOUS MEMBRANE
Proceedings of ICIPE rd International Conference on Inverse Probles in Engineering: Theory and Practice June -8, 999, Port Ludlow, Washington, USA : RECOVERY OF A DENSITY FROM THE EIGENVALUES OF A NONHOMOGENEOUS
More informationarxiv: v1 [math.nt] 14 Sep 2014
ROTATION REMAINDERS P. JAMESON GRABER, WASHINGTON AND LEE UNIVERSITY 08 arxiv:1409.411v1 [ath.nt] 14 Sep 014 Abstract. We study properties of an array of nubers, called the triangle, in which each row
More informationEnvelope frequency Response Function Analysis of Mechanical Structures with Uncertain Modal Damping Characteristics
Copyright c 2007 Tech Science Press CMES, vol.22, no.2, pp.129-149, 2007 Envelope frequency Response Function Analysis of Mechanical Structures with Uncertain Modal Daping Characteristics D. Moens 1, M.
More information8.1 Force Laws Hooke s Law
8.1 Force Laws There are forces that don't change appreciably fro one instant to another, which we refer to as constant in tie, and forces that don't change appreciably fro one point to another, which
More informationAnalyzing Simulation Results
Analyzing Siulation Results Dr. John Mellor-Cruey Departent of Coputer Science Rice University johnc@cs.rice.edu COMP 528 Lecture 20 31 March 2005 Topics for Today Model verification Model validation Transient
More informationIn this chapter, we consider several graph-theoretic and probabilistic models
THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions
More informationImproved multiprocessor global schedulability analysis
Iproved ultiprocessor global schedulability analysis Sanjoy Baruah The University of North Carolina at Chapel Hill Vincenzo Bonifaci Max-Planck Institut für Inforatik Sebastian Stiller Technische Universität
More informationSupport Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization
Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering
More information