arxiv: v1 [cs.ds] 19 Dec 2016

Size: px
Start display at page:

Download "arxiv: v1 [cs.ds] 19 Dec 2016"

Transcription

1 Smlarty preservng compressons of hgh dmensonal sparse data Raghav Kulkarn LnkedIn Bangalore Rameshwar Pratap IIIT Bangalore arxv: v cs.ds 9 Dec 06 ABSTRACT The rse of nternet has resulted n an exploson of data consstng of mllons of artcles, mages, songs, and vdeos. Most of ths data s hgh dmensonal and sparse. The need to perform an effcent search for smlar obects n such hgh dmensonal bg datasets s becomng ncreasngly common. Even wth the rapd growth n computng power, the bruteforce search for such a task s mpractcal and at tmes mpossble. Therefore algorthmc solutons such as Localty Senstve Hashng LSH are requred to acheve the desred effcency n search. Any smlarty search method that acheves the effcency uses one or both of the followng methods:. Compress the data by reducng ts dmenson whle preservng the smlartes between any par of data-obects. Lmt the search space by groupng the data-obects based on ther smlartes. Typcally s obtaned as a consequence of. Our focus s on hgh dmensonal sparse data, where the standard compresson schemes, such as LSH for Hammng dstance Gons, Indyk and Motwan 7, become neffcent n both and due to at least one of the followng reasons:. o effcent compresson schemes mappng bnary vectors to bnary vectors. Compresson length s nearly lnear n the dmenson and grows nversely wth the sparsty 3. Randomness used grows lnearly wth the product of dmenson and compresson length. We propose an effcent compresson scheme mappng bnary vectors nto bnary vectors and smultaneously preservng Hammng dstance and Inner Product. Our schemes avod all the above mentoned drawbacks for hgh dmensonal sparse data. The length of our compresson depends only on the sparsty and s ndependent of the dmenson of the data. Moreover our schemes provde one-shot soluton for Hammng dstance and Inner Product, and work n the streamng settng as well. In contrast wth the local proecton strateges used by most of the prevous schemes, our scheme combnes usng sparsty the followng two strateges:. Parttonng the dmensons nto several buckets,. Then obtanng global lnear summares n each of these buckets. We generalze our scheme for real-valued data and obtan compressons for Eucldean dstance, Inner Product, and k-way Inner Product.. ITRODUCTIO The technologcal advancements have led to the generaton of huge amount of data over the web such as texts, mages, audos, and vdeos. eedless to say that most of these datasets are hgh dmensonal. Searchng for smlar data-obects n such massve and hgh dmensonal datasets s becomng a fundamental subroutne n many scenaros lke clusterng, classfcaton, nearest neghbors, rankng etc. However, due to the curse of dmensonalty a brute-force way to compute the smlarty scores on such data sets s very expensve and at tmes nfeasble. Therefore t s qute natural to nvestgate the technques that compress the dmenson of dataset whle preservng the smlarty between data obects. There are varous compressng schemes that have been already studed for dfferent smlarty measures. We would lke to emphasze that any such compressng scheme s useful only when t satsfes the followng guarantee,.e. when data obects are nearby under the desred smlarty measure, then they should reman near-by n the compressed verson, and when they are far, they should reman far n the compressed verson. In the case of probablstc compresson schemes the above should happen wth hgh probablty. Below we dscuss a few such notable schemes. In ths work we consder bnary and real-valued datasets. For bnary data we focus on Hammng dstance and Inner product, whle for real-valued data we focus on Eucldean dstance and Inner product.. Examples of smlarty preservng compressons Data obects n a datasets can be consdered as ponts vectors n hgh dmensonal space. Let we have n vectors bnary or real-valued n d-dmensonal space. Gons, Indyk, Motwan 7 proposed a data structure to solve approxmate nearest neghbor c- problem n bnary data for Hammng dstance. Ther scheme popularly known as Localty Senstve Hashng LSH. Intutvely, ther data structure can be vewed as a compresson of a bnary vector, whch s obtaned by proectng t on a randomly chosen bt postons. JL transform 0 suggests a compressng scheme for real-valued data. For any > 0, t compresses the dmenson of the ponts from d to O log n whle preservng the Eucldean dstance between any par of ponts wthn factor of ±. Gven two vectors u, v R d, the nner product

2 smlarty between them s defned as u, v := Σ d =uv. Ata Kabán suggested a compresson schemes for real data whch preserves nner product va random proecton. On the contrary, f the nput data s bnary, and t s desrable to get the compresson only n bnary data, then to the best of our knowledge no such compresson scheme s avalable whch acheves a nontrval compresson. However, wth some sparsty assumpton bound on the number of s, there are some schemes avalable whch va asymmetrc paddng addng a few extra bts n the vector reduce the nner product smlarty of the orgnal data to the Hammng 3, and Jaccard smlarty see Prelmnares for a defnton 4. Then the compresson scheme for Hammng or Jaccard can be appled on the padded verson of the data. Bnary data can also be vewed as a collecton of sets, then the underlyng smlarty measure of nterest can be the Jaccard smlarty. Broder et. al. 5, 6, 4 suggested a compresson scheme for preservng Jaccard smlarty between sets whch s popularly known as Mnwse permutatons.. Our focus: Hgh dmensonal sparse data In ths work, we focus on Hgh Dmensonal Sparse Data. In many real-lfe scenaros, data obect s represented as very hgh-dmensonal but sparse vectors,.e. number of all possble attrbutes features s huge, however, each data obect has only a very small subset of attrbutes. For example, n bag-of-word representaton of text data, the number of dmensons equals to the sze of vocabulary, whch s large. However for each data pont, say a document, contans only a small number of words n the vocabulary, leadng to a sparse vector representaton. The bag-of-words representaton s also commonly used for mage data. Data-sparsty s commonly prevalent n audo and vdeo-data as well..3 Shortcomngs of earler schemes for hgh dmensonal sparse data The qualty of any compresson scheme can be evaluated based on the followng two parameters - the compresson-length, and the amount of randomness requred for the compresson. The compresson-length s defned as the dmenson of the data after compresson. Ideally, t s desrable to have both of these to be small whle preservng a desred accuracy n the compresson. Below we wll notce that most of the above mentoned compresson schemes become n-feasble n the case of hgh dmensonal sparse datasets as ther compresson-length s very hgh, and the amount of randomness requred for the compresson s qute huge. Hammng dstance: Consder the problem of fndng c- see Defnton 0 for Hammng dstance n bnary data. In the LHS scheme, the sze of hashtable determnes the compresson-length. The sze of hashtable K = O log n see Defnton. If r = O, then the sze of p hashtable K = O log n = O d p cr log n = Od log n, whch s lnear n the dmenson. Further, n order to randomly choose a bt poston between to d, t s requre to generate Olog d many random bts. Moreover, as the sze of hash table s K, and the number of hash tables s L, t s requred to generate OKL log d many random bts to create the hashtable, whch become qute large specally when K s lnear n d. Eucldean dstance: In order to acheve compresson that preserve the dstance between any par of ponts, due to JL transform 0,, t s requred to proect the nput matrx on a random matrx of dmensons d k, where k = O log n. Each entry of the random matrx s chosen from {±} wth probablty see, or from a normal dstrbuton see 0. The compresson-length n ths scheme s O log n, and t requres O d log n randomness. Inner product: Compresson schemes whch compress bnary data nto bnary data whle preservng Inner product s not known. However usng asymmetrc paddng scheme of 3, 4 t s possble to get a compresson va Hammng or Jaccard Smlarty measure, then shortcomngs of Jaccard and Hammng wll get carry forward n such scheme. Further, n case of real valued data the compresson scheme of Ata Kabán has compressonlength = O log n, and requres O d log n randomness. Jaccard Smlarty: Mnhash permutatons 5, 6, 4 suggest a compresson scheme for preservng Jaccard smlarty for a collecton of sets. A maor dsadvantage of ths scheme s that for hgh dmensonal data computng permutatons are very expensve, and further n order to acheve a reasonable accuracy n the compresson a larger number of repetton mght be requred. A maor dsadvantage of ths scheme s that t requres substantally large amount of randomness that grows polynomally n the dmenson. Lack of good bnary to bnary compresson schemes. To summarze the above, there are two man compresson schemes currently avalable for bnary to bnary compresson. The frst one s LSH and the second one s JL-transform. The LSH requres the compresson sze to be lnear n the dmenson and the JL-transform can acheve logarthmc compresson sze but t wll compress bnary vectors to real vectors. The analogue of JL-transform whch compresses bnary vectors to bnary vectors requres the compresson-length to be lnear n the number of data ponts see Lemma 7. Snce both dmenson as well as the number of data ponts can be large, these schemes are neffcent. In ths paper we propose an effcent bnary to bnary compresson scheme for sparse data whch works smultaneously for both Hammng dstance and Inner Product.

3 .4 Our contrbuton In ths work we present a compressng scheme for hgh dmensonal sparse data. In contrast wth the local proecton strateges used by most of the prevous schemes such as LSH 9, 7 and JL 0, our scheme combnes usng sparsty the followng two step approach. Parttonng the dmensons nto several buckets,. Then obtanng global lnear summares of each of these buckets. We present our result below:.4. For bnary data For bnary data, our compresson scheme provdes one-shot soluton for both Hammng and Inner product compressed data preserves both Hammng dstance and Inner product. Moreover, the compresson-length depends only on the sparsty of data and s ndependent of the dmenson of data. We frst nformally state our compresson scheme for bnary data, see Defnton for a formal defnton. Gven a bnary vector u {0, }d, our scheme compress t nto a -dmensonal bnary vector say u0 {0, } as follows, where to be specfed later. We randomly map each bt poston say {}d= of the orgnal data to an nteger {} =. To compute the -th bt of the compressed vector u0 we check whch bts postons have been mapped to, we compute the party of bts located at those postons, and assgn t to u0. The followng fgure llustrate an example of the compresson. In the followng theorems let ψ denote the maxmum Compresson Scheme. Then for all u, u U the followng s true wth probablty at least n, IPu, u IPu 0, u 0 + IPu, u. In the followng theorem, we strengthen our result of Theorem, and shows a compresson bound whch s ndependent of the dmenson and the sparsty, but depends only on the Hammng dstance between the vectors. However, we could show our result n the Expectaton, and only for a par of vectors. Theorem 3. Consder two bnary vectors u, v {0, }d, whch get compressed nto vectors u0, v0 {0, } usng our Bnary Compresson Scheme. If we set = Or, then f dh u, v < r, then PrdH u0, v0 < r =, and f dh u, v 4r, then EdH u0, v0 > r. Remark. To the best of our knowledge, ours s the frst effcent bnary to bnary compresson scheme for preservng Hammng dstance and Inner product. For Hammng dstance n fact our scheme obtans the nofalse-negatve guarantee analogous to the one obtaned n recent paper by Pagh. Remark. When r s constant, as mentoned above, LSH 7 requres compresson length lnear n the dmenson. However, due to Theorem 3, our compresson length s only constant. Remark 3. Our compresson length s Oψ log n, whch s ndependent of the dmenson d; whereas other schemes such as LSH may requre the compresson length growng lnearly n d and the analogue of JL-transform for bnary to bnary compresson requres compresson length growng lnearly n n see Lemma 7. number of n any vector. We state our result for bnary data as follows: Theorem. Consder a set U of bnary vectors {u }n= {0, }d, a postve nteger r, and > 0. If r > 3 log n, we set = Oψ ; f r < 3 log n, we set = Oψ log n, and compress them nto a set U0 of bnary vectors {u0 }n= {0, } usng our Bnary Compresson Scheme. Then for all u, u U, f dh u, u < r, then PrdH u 0, u 0 < r =, f dh u, u + r, then PrdH u 0, u 0 < r < n. Theorem. Consder a set U of bnary vectors {u }n= {0, }d, a postve nteger r, and > 0. If r > 3 log n, we set = Oψ ; f r < 3 log n, we set = Oψ log n, and compress them nto a set U0 of bnary vectors {u0 }n= {0, } usng our Bnary Remark 4. The randomness used by our compresson scheme s Od log whch grows logarthmcally n the compresson length whereas the JL-transform uses randomness growng lnearly n the compresson length. For all-par compresson for n data ponts we use Odlog ψ+log log n randomness, whch grows logarthmcally n the sparsty and sub-logarthmcally n terms of number of data ponts..4. For real-valued data We generalze our scheme for real-valued data also and obtan compressons for Eucldean dstance, Inner product, and k-way Inner product. We frst state our compresson scheme as follows: Gven a vector a Rd, our scheme compress t nto a -dmensonal vector say α as follows. We randomly map each coordnate poston say {}d= of the orgnal data to an nteger {} =. To compute the -th coordnate of the compressed vector α we check whch coordnates of the orgnal data have been mapped to, we multply the numbers located at those postons wth a random varable x, compute ther summaton,

4 parwse Inner Product or Eucldean dstance, we have a clear advantage on the amount of randomness requred for the compresson, the randomness requred by our scheme grows logarthmcally n the compresson length, whereas the other schemes requre randomness whch grows lnearly n the compresson length. Potental applcatons and assgn t to α, where x takes a value between {, +} wth probablty /. The followng fgure llustrate an example of the compresson. In the followng we present our man result for real valued data whch s compresson bound for preservng k-way nner product. For a set of k vectors {α }k= Rd, ther k-way nner product s defned as hα α... αk = d X α α... αk, = where α denote the -th coordnate of the vector α. Theorem 4. Consder a set of k vectors {a }k= R, whch get compressed nto vectors {α }k= R usng our Real Compresson Scheme. If we set = 0Ψk k, where Ψ = max{ a }= and > 0, then the followng holds d Pr hα α... αk ha a... ak > < /0. Remark 5. An advantage of our compresson scheme s that t can be constructed n the streamng model qute effcently. The only requrement s that n the case of bnary data the maxmum number of the vectors n the stream should be bounded, and n the case of real valued data norm of the vectors should be bounded..5 Comparson wth prevous work A maor advantage of our compresson scheme s that t provdes a one-shot soluton for dfferent smlarty measures Bnary compresson scheme preserves both Hammng dstance and Inner product, and Real valued data compresson scheme preserves both Eucldean dstance, Inner product, and k-way Inner product. The second man advantage of our compresson scheme for bnary data t gves a bnary to bnary compresson as opposed to the bnary to real compresson by JLtransform. Thrd man advantage s that our compresson scheme s that ts compresson sze s ndependent of the dmensons and depends only on the sparsty as opposed to Gons, Indyk, Motwan 7 scheme whch requres lnear sze compresson. For real-valued data our results are weaker compared to prevous known works but they generalze to k-way nner product, whch none of the prevous work does. Another advantage of our real valued compresson scheme s that when the number of ponts are small constant, then for preservng a A potental use of our result s to mprove approxmate nearest neghbor search va composng wth LSH. Due to the curse of dmensonalty many search algorthms scale poorly n hgh dmensonal data. So, f t s possble to get a succnct compresson of data whle preservng the smlarty score between par of data ponts, then such compresson naturally helps for effcent search. One can frst compress the nput such that t preserve the desred smlarty measure, and then can apply a collson based hashng algorthm such as LSH 7, 9 for effcent approxmate nearest neghbor c- on the compressed data. As our compresson scheme provdes a smlar guarantee as of Defnton, then one can construct data structure for LSH for approxmate nearest neghbor problem. Thus, our smlarty preservng compresson scheme leads to an effcent approxmate nearest neghbor search. There are many smlarty based algorthmc methods used n large scale learnng and nformaton retreval, e.g., Frequent temset mnng, ROCK clusterng 8. One could potentally obtan algorthmc speed up n these methods va our compresson schemes. Recently compresson based on LSH for nner-product s used to speed up the forward and back-propagaton n neural networks 5. One could potentally use our scheme to take advantage of sparsty and obtan further speed up. Organzaton of the paper In Secton, we present the necessary background whch helps to understand the paper. In Secton 3, we present our compresson scheme for hgh dmensonal sparse bnary data. In Secton 4, we present our compresson scheme for hgh dmensonal sparse real data. Fnally n Secton 5, we conclude our dscusson, and state some possble extensons of the work.. BACKGROUD ψ Ψ a a dh u, v IPa, b otatons number of coordnates/bt postons n the compressed data upper bound on the number of s n any bnary vector. upper bound on the norm of any real-valued vector. l norm of the vector a -th bt poston coordnate of bnary real-valued vector a. Hammng dstance between bnary vectors u and v. Inner product between bnary/ real-valued vectors a and b.

5 . Probablty background Defnton. The Varance of a random varable X, denoted VarX, s defned as the expected value of the squared devaton of X from ts mean. VarX = EX EX = EX EX. Defnton. Let X and Y be ontly dstrbuted random varables. The Covarance of X and Y, denoted CovX, Y, s defned as CovX, Y = EX EXY EY. Fact 3. Let X be a random varable and λ be a constant. Then, Varλ + X = VarX and VarλX = λ VarX. Fact 4. Let X, X,..., X n be a set of n random varables. Then, n n Var X = CovX, X. = = Var X + Fact 5. Let X and Y be a par of random varables and λ be a constant. Then, CovλX, λy = λ CovX, Y. Fact 6 Chebyshev s nequalty. Let X be a random varable havng fnte mean and fnte non-zero varance σ. Then for any real number λ > 0, Pr X EX λσ λ.. Smlarty measures and ther respectve compresson schemes Hammng dstance. Let u, v {0, } d be two bnary vectors, then the Hammng dstance between these two vectors s the number of bt postons where they dffer. To the best of our knowledge, there does not exst any non-trval compresson scheme whch provde smlar compresson guarantees such as JL-lemma provdes for Eucldean dstance. In the followng lemma, we show that for a set of n-bnary vectors an analogous JL-type bnary to bnary compresson f t exst may requre compresson length lnear n n. Further collson based hashng scheme such as LSH due to Gons et al. 7, see Subsecton.3 can be consdered as a bnary to bnary compresson scheme, where the sze of hashtable determnes the compresson-length. Ther technques ncludes randomly choosng bt postons and checkng f the query and nput vectors are matchng exactly at those bt postons. Lemma 7. Consder a set of n-bnary vectors, then an analogous JL-type bnary to bnary compresson f t exst may requre compresson length lnear n n. A collson occurs when two obect hash to the same hash value. Proof. Consder a set of n bnary vectors {e } n = standard unt vectors, and the zero vector e 0. The Hammng dstance between e 0 and any e s, and the Hammng dstance between any par of vectors e and e for s. Let f be a map whch map these ponts nto bnary vectors of dmenson k by preservng the dstance between any par of vectors wthn a factor of ± ε, for a parameter ε > 0. Thus, these n ponts {fe } n = are wthn a dstance at most + ε from fe 0, and any two ponts fe and fe for are at dstance at least ε. However, the total number of ponts at dstance at most + ε from fe 0 s Ok +ε, and dstance between any two ponts fe and fe for s non-zero so each pont {e } n = has ts dstnct mage. Thus Ok +ε should be equal to n, whch gves k = Ωn +ε. Thus the compresson length can be lnear n n. Eucldean dstance. Gven two vectors a, b R d, the Eucldean dstance between them s denoted as a, b and defned as Σ d = a b. A classcal result by Johnson and Lndenstrauss 0 suggest a compressng scheme whch for any set D of n vectors n R d preserve parwse Eucldean dstance between any par of vectors n D. Lemma 8 JL transform 0. For any 0,, and any nteger n, let k be a postve nteger such that k = O log n. Then for any set D of n vectors n R d, there s a map f : R d R k such that for any par of vectors a, b n D : a, b fa, fb + a, b Furthermore, the mappng f can be found n randomzed polynomal tme. In several followup works on JL lemma, the functon f has been regarded as a random proecton matrx R R d k, and can be constructed element-wse usng Gaussan due to Indyk and Motwan 9, or unform {+, } due to Achloptas. Inner product. Gven two vectors u, v R d, the Inner product u, v between them s defned as u, v := Σ d =uv. Compresson schemes whch preserves Inner product has been studed qute a lot n the recent tme. In the case of bnary data, along wth some sparsty assumpton bound on the number of s, there are some schemes avalable whch by paddng add a few extra bts n the vector reduce the Inner product of the orgnal data to the Hammng 3, and Jaccard smlarty 4. Then the compresson scheme for Hammng or Jaccard can be appled on the padded verson of the data. Smlarly, n the case of real-valued data, a smlar paddng technque s known that due paddng reduces Inner product to Eucldean dstance 3. Recently, an nterestng work

6 by Ata Kabán suggested a compresson schemes va random proecton method. Ther scheme approxmately preserve Inner Product between any par of nput ponts and ther compresson bound matches the bound of JL-transform 0. Jaccard smlarty. Bnary vectors can also be consdered as sets over the unverse of all possble features, and a set contan only those elements whch have non-zero entres n the correspondng bnary vector. For example two vectors u, v {0, } d can be vewed as two sets u, v {,,... d}. Here, the underlyng smlarty measure of nterest s the Jaccard smlarty whch s defned as follows JSu, v = u v u v. A celebrated work by Broder et al. 5, 6, 4 suggested a technque to compress a collecton of sets whle preservng the Jaccard smlarty between any par of sets. Ther technque ncludes takng a random permutaton of {,,..., d} and assgnng a value to each set whch maps to mnmum under that permutaton. Ths compresson scheme s popularly known as Mnwse hashng. Defnton 9 Mnwse Hash functon. Let π be a permutatons over {,..., d}, then for a set u {,... d} h π u = arg mn π for u. Then due to 5, 6, 4, Prh π u = h π v = u v u v..3 Localty Senstve Hashng LSH suggest an algorthm or alternatvely a data structure for effcent approxmate nearest neghbor c- search n hgh dmensonal space. We formally state t as follows: Defnton 0. c-approxmate earest eghbor c-. Let D be set of ponts n R d, and Sm.,. be a desred smlarty measure. Then for parameters S, c > 0, the c- problem s to construct a data structure that gven any query pont q D reports a cs-near neghbor of q n D f there s an S-near neghbor of q n D. Here, we say a pont x D s S-near neghbor of q f Smq, x > S. In the followng we defne the concept of localty senstve hashng LSH whch suggest a data structure to solve c- problem. Defnton Localty senstve hashng 9. Let D be a set of n vectors n R d, and U be the hashng unverse. Then, a famly H of functons from D to U s called as S, cs, p, p -senstve for a smlarty measure Sm.,. f for any x, y D, f Smx, y S, then Pr h H hx = hy p, f Smx, y cs, then Pr h H hx = hy p. Clearly, any such scheme s nterestng only when p > p, and c <. Let K, L be the parameters of the data structure for LSH, where K s the number of hashes n each hash table, and L s the number of hash tables, then due to 9, 7, we have K = O log n p and L = O n ρ log p log n, where ρ = log p. Thus, gven a famly of S, cs, p, p -senstve hash functons, and usng result of 9, 7, one can construct a data structure for c- wth On ρ log n query tme and space On +ρ..3. How to convert smlarty preservng compresson schemes to LSH? LSH schemes for varous smlarty measures can be vewed as frst compressng the nput such that t preserve the desred smlarty measure, and then applyng collson based hashng on top of t. If any smlarty preservng compresson scheme provdes a smlar guarantee as of Defnton, then for parameters smlarty threshold S, and c, one can construct data structure for LSH hash-tables wth parameters K and L for the c- problem va 9, A COMPRESSIO SCHEME FOR HIGH DIMESIOAL SPARSE BIARY DATA We frst formally defne our Compresson Scheme as follows: Defnton Bnary Compresson Scheme. Let be the number of buckets, for = to d, we randomly assgn the -th poston to a bucket number b {,... }. Then a vector u {0, } d, compressed nto a vector u {0, } as follows: u = u mod. :b= ote 3. For brevty we denote the Bnary Compresson Scheme as BCS. Some ntuton. Consder two bnary vectors u, v {0, } d, we call a bt poston actve f at least one of the vector between u and v has value n that poston. Let ψ be the maxmum number of n any vector, then there could be at most ψ actve postons shared between vectors u and v. Further, usng the BCS, let u and v get compressed nto bnary vectors u, v {0, }. In the compressed vectors, we call a partcular bt poston pure f the number of actve postons mapped to that poston s at most one, otherwse we call t corrupted. It s easy to see that the contrbuton of pure bt postons n u, v towards Hammng dstance or Inner product smlarty, s exactly equal to the contrbuton of the bt postons n u, v whch get mapped to the pure bt postons. The number of maxmum possble corrupted bts n the compressed data s ψ because n the worst case t s possble that all the ψ actve bt poston got pared up whle compresson. The devaton of Hammng dstance or Inner product smlarty between u

7 f r > 3 log n, and we set = 6ψ, then probablty that for all u0, u0 U0 share more than r corrupted postons s at most n. and v0 from that of u and v, corresponds to the number of corrupted bt postons shared between u0 and v0. The above fgure llustrate ths wth an example, and the lemma below analyse t. Lemma 4. Consder two bnary vectors u, v {0, }d, whch get compressed nto vectors u0, v0 {0, } usng the BCS, and suppose ψ s the maxmum number of n any vector. Then for an nteger r, and > 0, 0 probablty that u0 and more than r corrupted v share r ψ postons s at most. Proof. We frst calculate the probablty that a partcular bt poston gets corrupted between u0 and v0. As there are at most ψ actve postons shared between vectors u and v, the number of ways of parng two ac tve postons from ψ actve postons s at most ψ, and ths parng wll result a corrupted bt poston n u0 or v0. Then, the probablty that a partcular bt pos ψ 0 0 ton n u or v gets corrupted s at most 4ψ. Further, f the devaton of Hammng dstance or Inner product smlarty between u0 and v0 from that of u and v s more than r, then at least r corrupted postons are shared between u0 and v0, whch mples that at least r par of actve postons n u and v got pared up whle compresson. The number of possble ways of parng r postons from ψ actve postons s actve ψ r r r at most ψ r r! ψ. Snce the probablty that a par of actve postons got mapped n the same bt poston n the compressed data s, the probabl r ty that r par of actve postons got mapped n dstnct bt postons n the compressed data s at most r. Thus, by unon bound, the probablty that at 0 least r corrupted bt poston r shared between u and ψ r ψ 0 v s at most =. r In the followng lemma we generalze the above result on a set of n bnary vectors. We suggest a compresson bound such that any par of compressed vectors share only a very small number of corrupted bts, wth hgh probablty. Lemma 5. Consder a set U of n bnary vectors {u }n= {0, }d, whch get compressed nto a set U0 of bnary vectors {u0 }n= {0, } usng the BCS. Then for any postve nteger r, and > 0, If r < 3 log n, and we set = 44ψ log n, then probablty that for all u0, u0 U0 share more than r corrupted postons s at most n. Proof. In the frst case, for a fxed par of compressed vectors u0 and u0, due to lemma 4, probablty that they share r more than r corrupted postons s at ψ most. If r > 3 log n, and = 6ψ, then the r 3 log n ψ ψ above probablty s at most < = 4t n 3 log n < n3. As there are at most pars of vec tors, then the probablty of every par of compressed vectors share more than r corrupted postons s at n most n3 < n. In the second case, as r < 3 log n, we cannot upper bound the desred probablty smlar to the frst case. Here we use a trck, n the nput data we replcate each bt poston 3 log n tmes, whch makes a d dmensonal vector to a 3d log n dmensonal, and as a consequence the Hammng dstance or Inner product smlarty s also scaled up by a multplcatve factor of 3 log n. We now apply the compresson scheme on these scaled vectors, then for a fxed par of compressed vectors u0 and u0, probablty that they have more than 3 r log n 3 r log n n corrupted postons s at most 6ψ log. As we set = 44ψ log n, the above probablty s at 3 r log n 3 log n n most 6ψ log < < n3. The f 44ψ log n nal probablty follows by applyng unon bound over all n pars. Remark 6. We would lke to emphasze that usng the BCS, for any par of vectors, the Hammng dstance between them n the compressed verson s always less than or equal to ther orgnal Hammng dstance. Thus, ths compresson scheme has only one-sded-error for the Hammng case. However, n the case of nner product smlarty ths compresson scheme can possbly have two-sded-error as the nner product n the compressed verson can be smaller or hgher than the nner product of orgnal nput. We llustrate ths by the followng example, where the compresson scheme assgns both bt postons of the nput to one bt of the compressed data. If u =, 0 and v = 0,, then IPu, v = 0; and after compresson u0 = and v0 = whch gves IPu0, v0 =. If u =, and v =,, then IPu, v =, and after compresson u0 = 0 and v0 = 0 whch gves IPu0, v0 = 0. As a consequence of Lemma 5 and the above remark, we present our compresson guarantee for the Hammng dstance and Inner product smlarty.

8 Theorem. Consder a set U of bnary vectors {u } n = {0, }d, a postve nteger r, and > 0. If r > 3 log n, we set = Oψ ; f r < 3 log n, we set = Oψ log n, and compress them nto a set U of bnary vectors {u }n = {0, } usng BCS. Then for all u, u U, f d H u, u < r, then Prd H u, u < r =, f d H u, u +r, then Prd H u, u < r < n. Theorem. Consder a set U of bnary vectors {u } n = {0, }d, a postve nteger r, and > 0. If r > 3 log n, we set = Oψ ; f r < 3 log n, we set = Oψ log n, and compress them nto a set U of bnary vectors {u }n = {0, } usng BCS. Then for all u, u U the followng s true wth probablty at least n, IPu, u IPu, u + IPu, u. 3. A tghter analyss for Hammng dstance In ths subsecton, we strengthen our analyss for the Hammng case, and shows a compresson bound whch s ndependent of the dmenson and the sparsty, and depends only on the Hammng dstance between the vectors. However, we could show our result n expectaton, and only for a par of vectors. For a par of vectors u, v {0, } d, we say that a bt poston s unmatched f exactly one of the vector has value n that poston and the other one has value 0. We say that a bt poston n the compressed data s odd-bt f odd number of unmatched postons get mapped to that bt. Let u and v get compressed nto vectors u and v usng the BCS. Our observaton s that each odd bt poston n the compressed data contrbutes to Hammng dstance n n the compressed data. We llustrate ths wth an example: let u,, k =, 0,, v,, k = 0,, 0 and let,, k get mapped to bt poston say n the compressed data, then u = 0, v =, then clearly d H u, v =. Theorem 3. Consder two bnary vectors u, v {0, } d, whch get compressed nto vectors u, v {0, } usng BCS. If we set = Or, then f d H u, v < r, then Prd H u, v < r =, and f d H u, v 4r, then Ed H u, v > r. Proof. Let ψ u denote the number of unmatched bt postons between u and v. As mentoned earler, f odd number of unmatched bt postons gets mapped to a partcular bt n the compressed data, then that bt poston corresponds to the Hammng dstance. Let we call that bt poston as odd-bt poston. In order to gve a bound on the Hammng dstance n the compressed data we need to gve a bound on number of such odd-bt postons. We frst calculate the probablty that a partcular bt poston say k-th poston n the compressed data s odd. Let we denote ths by Pr k odd. We do t usng the followng bnomal dstrbuton: Pr k odd = ψu mod = mod =0 ψu ψu. Smlarly, we compute the probablty that the k-th bt s even: ψ u Pr k ψu even = ψu. We have, Further, Pr k even Pr k = = = ψ u mod =0 ψ u mod = Pr k even + Pr k odd =. odd ψu ψu ψu ψu ψu ψu. Thus, we have the followng from Equaton and Equaton Pr k odd = ψu exp ψ u. 3 The last nequalty follows as x e x for x <. Thus expected number of odd-bts s at least exp ψ u. We now splt here n two cases: ψ u < 0r, and ψ u 0r. We address them one-by-one. Case : ψ u < 0r. We complete ths case usng Lemma 4. It s easy to verfy that n the case of Hammng dstance the analyss of Lemma 4 also holds f we consder unmatched bts nstead of actve bts n the analyss. Thus, the probablty that at least r corrupted bt poston shared between u and v s at most ψu r. We wsh to set the value of such that wth probablty at most /3 that u and v share more than r corrupted postons. If we set the value of = 4ψ u 3 r, then the above probablty s at most ψ u 4ψ u 3 r r = 3. Thus, when = 4ψ u 3 r = Oψ u = Or as ψ u < 0r and r, wth probablty at most /3, at most

9 r corrupted bts are shared between u and v. As a consequence to ths, we have Ed H u, v > 3.3r = r. Case : ψ u 0r. We contnue here from Equaton 3 Expected number of odd buckets exp ψ u exp 40r = 4r exp 5 r > 4r r = r. 4 5 Equalty 4 follows by settng = 8r and Inequalty 5 holds as exp 5 r > r for r. Fnally, Case and Case complete a proof of the theorem. 4. A COMPRESSIO SCHEME FOR HIGH DIMESIOAL SPARSE REAL DATA We frst defne our compresson scheme for the real valued data. Defnton 6. Real-valued Compresson Scheme Let be the number of buckets, for = to d, we randomly assgn the -th poston to the bucket number b {,... }. Then, for = to, the -th coordnate of the compressed vector α s computed as follows: α = ax, :b= where each x s a random varable that takes a value between {, +} wth probablty /. ote 7. For brevty we denote our Real-valued Compresson Scheme as RCS. We frst present our compresson guarantee for preservng Inner product for a par of real valued vectors. Lemma 8. Consder two vectors a, b R d, whch get compressed nto vectors α, β R usng the RCS. If we set = 0Ψ, where Ψ = max{ a, b } and > 0, then the followng holds, Pr α, β a, b > < /0. Proof. Let we have two vectors a, b R d such that a = a, a,... a d and b = b, b,... b d. Let {x } d = be a set of d random varables such that each x takes a value between {, +} wth probablty /, be a random varable that takes the value f -th dmenson of the vector s mapped to the k-th bucket of the compressed vector and 0 otherwse. Usng the compresson scheme RCS, let vectors a, b get compressed nto vectors α and β, where α = α,..α k,..α such that α k = Σ d = a x, and β = β,..β k,..β such that β k = Σ d = b x. We now compute the nner product of the compressed vectors α, β. α, β = = = α k β k = Σ d =a x Σ d =a b x Σ d =a b = Σ d =a b = Σ d =a b + = a, b + + Σ d =b x + Σ a b x x + Σ a b x x Σ a b x x Σ a b x x Σ a b x x Equaton 7 follows from Equaton 6 because x = as x = ±, and z = z as z takes value ether or 0. We contnue from Equaton 8 and compute the Expectaton and the Varance of the random varable α, β. We frst compute the Expectaton of the random varable α, β as follows: E α, β = E a, b + = E a, b + E = a, b + = a, b + Σ a b x x Σ a b x x Σ Ea b x x Σ a b Ex x 9 = a, b. 0 Equaton 9 holds due to the lnearty of expectaton. Equaton holds because Ex x = 0 as both x and x take a value between {, +} each wth probablty 0.5 whch leads to Ex x = 0. We now compute the Varance of the random varable

10 α, β as follows: Var α, β = Var a, b + = Var Σ a b x x Σ a b x x = Var Σ = Var = Var +...,,, Cov, 3 Equaton holds due to Fact 3; Equaton holds as we denote the expresson a b x x by the varable ; Equaton 3 holds due to Fact 4. We now bound the values of the two terms of Equaton 3. Var = Var... + Cov, ξl 4 k l Equaton 4 holds due to Fact 4. We bound the values of two terms of Equaton 4 one by one as follows. = = = = Var a b a b a b = Var x x Ex x E Var z k a b x x 5 Ex x 6 7 a b / a b /. 8 Equaton 5 holds due to Fact 3; Equaton 6 holds due to Defnton ; Equaton 7 holds as x, x =, k = z, and Ex x = 0; fnally, Equaton 8 holds as a b a b = a b. We now bound the second term of Equaton 4. Cov, ξl = Cov a b x x, a b x x z l z l = a b Cov x x, x x z l z l 9 = a b Ex x Ex x x x z l z l Ex x z l z l 0 = a b E x x z l z l = a b E = 0 z l z l Equaton 9 holds due to Fact 5; Equaton 0 holds due to Defnton ; Equaton holds as Ex x = 0; fnally, Equaton holds as n our compresson scheme each dmenson of the nput s mapped to a unque coordnate bucket n the compressed vector whch mples that at least one of the random varable between and has to be zero. We now bound the second term of Equaton 3. Cov, = E = E E E 3 = E a b x x k z a b x x = a b a b E x x x x k z = 0 4 Equaton 3 holds as E equal to zero because E = E ξk = and E ξk s Ea b x x = 0. A smlar argument follows for the other term as well. Equaton 4 holds as Ex x x x s equal to zero because each varable n the expectaton term takes a value between + and wth probablty 0.5. Thus, we have E α, β = a, b, and Equaton 3 n conuncton wth Equatons 4, 8,, 4 gves Var α, β a b / Ψ /, where Ψ = max{ a, b }.

11 Thus, by Chebyshev s nequalty see Fact 6, we have Pr α, β a, b > < Ψ = /0. The last nequalty follows as we set = 0Ψ. Usng a smlar analyss we can generalze our result for k-way nner product. We state our result as follows: Theorem 4. Consder a set of k vectors {a } k = R d, whch get compressed nto vectors {α } k = R usng the RCS. If we set = 0Ψk, where Ψ = max{ a } k = and > 0, then the followng holds Pr α α... α k a a... a k > < /0. We can also generalze the result of Lemma 8 for Eucldean dstance as well. Consder a par of vectors a, b R d whch get compressed nto vectors α, β R usng the compresson scheme RCS. Let α, β denote the squared eucldean dstance between the vectors α, β. Usng a smlar analyss of Lemma 8 we can compute Expectaton and Varance of the random varable α, β E α, β = a, b, and Var α, β a b Ψ, where Ψ = max{ a, b }. Thus, due to Chebyshev s nequalty see Fact 6, we have the followng result for Eucldean dstance. Theorem 5. Consder two vectors a, b R d, whch get compressed nto vectors α, β R usng the RCS. If we set = 0Ψ, where Ψ = max{ a, b } and > 0, then the followng holds Pr α, β a, b > < /0. Remark 7. In order to compress a par of data ponts our scheme requres Od log randomness, whch grows logarthmcally n the compresson length, whereas the other schemes requre randomness whch grows lnearly n the compresson length. Thus, when the number of ponts are small constant, then for preservng a parwse Inner product or Eucldean dstance, we have a clear advantage on the amount of randomness requred for the compresson. We also beleve that usng a more sophstcated concentraton result such as Martngale t s possble to obtan a more tghter concentraton guarantee, and as a consequence a smaller compresson length. 5. COCLUSIO AD OPE QUESTIOS In ths work, to the best of our knowledge, we obtan the frst effcent bnary to bnary compresson scheme for preservng Hammng dstance and Inner Product for hgh dmensonal sparse data. For Hammng dstance n fact our scheme obtans the no-false-negatve guarantee analogous to the one obtaned n recent paper by Pagh. Contrary to the local proecton approach of prevous schemes we frst randomly partton the dmenson, and then take a global summary wthn a partton. The compresson length of our scheme depends only on the sparsty and s ndependent of the dmenson as opposed to prevously known schemes. We also obtan a generalzaton of our result to real-valued settng. Our work leaves the possblty of several open questons mprovng the bounds of our compresson scheme, and extendng t to other smlarty measures such as Cosne and Jaccard smlarty are maor open questons of our work. 6. REFERECES D. Achloptas. Database-frendly random proectons: Johnson-lndenstrauss wth bnary cons. J. Comput. Syst. Sc., 664:67 687, 003. R. Agrawal and R. Srkant. Fast algorthms for mnng assocaton rules n large databases. In Proceedngs of 0th Internatonal Conference on Very Large Data Bases, September -5, 994, Santago de Chle, Chle, pages , D. Bera and R. Pratap. Frequent-temset mnng usng localty-senstve hashng. In Computng and Combnatorcs - nd Internatonal Conference, COCOO 06, Ho Ch Mnh Cty, Vetnam, August -4, 06, Proceedngs, pages 43 55, A. Z. Broder. Identfyng and flterng near-duplcate documents. In Combnatoral Pattern Matchng, th Annual Symposum, CPM 000, Montreal, Canada, June -3, 000, Proceedngs, pages 0, A. Z. Broder. Mn-wse ndependent permutatons: Theory and practce. In Automata, Languages and Programmng, 7th Internatonal Colloquum, ICALP 000, Geneva, Swtzerland, July 9-5, 000, Proceedngs, page 808, A. Z. Broder, M. Charkar, A. M. Freze, and M. Mtzenmacher. Mn-wse ndependent permutatons extended abstract. In Proceedngs of the Thrteth Annual ACM Symposum on the Theory of Computng, Dallas, Texas, USA, May 3-6, 998, pages , A. Gons, P. Indyk, and R. Motwan. Smlarty search n hgh dmensons va hashng. In VLDB 99, Proceedngs of 5th Internatonal Conference on Very Large Data Bases, September 7-0, 999, Ednburgh, Scotland, UK, pages 58 59, S. Guha, R. Rastog, and K. Shm. ROCK: A robust clusterng algorthm for categorcal attrbutes. Inf. Syst., 55: , P. Indyk and R. Motwan. Approxmate nearest neghbors: Towards removng the curse of dmensonalty. In Proceedngs of the Thrteth Annual ACM Symposum on the Theory of Computng, Dallas, Texas, USA, May 3-6, 998, pages , 998.

12 0 W. B. Johnson and J. Lndenstrauss. Extensons of lpschtz mappngs nto a hlbert space. Conference n modern analyss and probablty ew Haven, Conn., 98, Amer. Math. Soc., Provdence, R.I., pages 89 06, 983. A. Kaban. Improved bounds on the dot product under random proecton and random sgn proecton. In Proceedngs of the th ACM SIGKDD Internatonal Conference on Knowledge Dscovery and Data Mnng, Sydney, SW, Australa, August 0-3, 05, pages , 05. R. Pagh. Localty-senstve hashng wthout false negatves. In Proceedngs of the Twenty-Seventh Annual ACM-SIAM Symposum on Dscrete Algorthms, SODA 06, Arlngton, VA, USA, January 0-, 06, pages 9, A. Shrvastava and P. L. Asymmetrc LSH ALSH for sublnear tme maxmum nner product search MIPS. In Advances n eural Informaton Processng Systems 7: Annual Conference on eural Informaton Processng Systems 04, December , Montreal, Quebec, Canada, pages 3 39, A. Shrvastava and P. L. Asymmetrc mnwse hashng for ndexng bnary nner products and set contanment. In Proceedngs of the 4th Internatonal Conference on World Wde Web, WWW 05, Florence, Italy, May 8-, 05, pages 98 99, R. Sprng and A. Shrvastava. Scalable and sustanable deep learnng va randomzed hashng. CoRR, abs/ , 06.

Lecture 4: Universal Hash Functions/Streaming Cont d

Lecture 4: Universal Hash Functions/Streaming Cont d CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

Introduction to Algorithms

Introduction to Algorithms Introducton to Algorthms 6.046J/8.40J Lecture 7 Prof. Potr Indyk Data Structures Role of data structures: Encapsulate data Support certan operatons (e.g., INSERT, DELETE, SEARCH) Our focus: effcency of

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

Expected Value and Variance

Expected Value and Variance MATH 38 Expected Value and Varance Dr. Neal, WKU We now shall dscuss how to fnd the average and standard devaton of a random varable X. Expected Value Defnton. The expected value (or average value, or

More information

More metrics on cartesian products

More metrics on cartesian products More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of

More information

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4) I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes

More information

Matrix Approximation via Sampling, Subspace Embedding. 1 Solving Linear Systems Using SVD

Matrix Approximation via Sampling, Subspace Embedding. 1 Solving Linear Systems Using SVD Matrx Approxmaton va Samplng, Subspace Embeddng Lecturer: Anup Rao Scrbe: Rashth Sharma, Peng Zhang 0/01/016 1 Solvng Lnear Systems Usng SVD Two applcatons of SVD have been covered so far. Today we loo

More information

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011 Stanford Unversty CS359G: Graph Parttonng and Expanders Handout 4 Luca Trevsan January 3, 0 Lecture 4 In whch we prove the dffcult drecton of Cheeger s nequalty. As n the past lectures, consder an undrected

More information

Lecture 5 September 17, 2015

Lecture 5 September 17, 2015 CS 229r: Algorthms for Bg Data Fall 205 Prof. Jelan Nelson Lecture 5 September 7, 205 Scrbe: Yakr Reshef Recap and overvew Last tme we dscussed the problem of norm estmaton for p-norms wth p > 2. We had

More information

APPENDIX A Some Linear Algebra

APPENDIX A Some Linear Algebra APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,

More information

princeton univ. F 13 cos 521: Advanced Algorithm Design Lecture 3: Large deviations bounds and applications Lecturer: Sanjeev Arora

princeton univ. F 13 cos 521: Advanced Algorithm Design Lecture 3: Large deviations bounds and applications Lecturer: Sanjeev Arora prnceton unv. F 13 cos 521: Advanced Algorthm Desgn Lecture 3: Large devatons bounds and applcatons Lecturer: Sanjeev Arora Scrbe: Today s topc s devaton bounds: what s the probablty that a random varable

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

Lecture 10 Support Vector Machines II

Lecture 10 Support Vector Machines II Lecture 10 Support Vector Machnes II 22 February 2016 Taylor B. Arnold Yale Statstcs STAT 365/665 1/28 Notes: Problem 3 s posted and due ths upcomng Frday There was an early bug n the fake-test data; fxed

More information

Finding Dense Subgraphs in G(n, 1/2)

Finding Dense Subgraphs in G(n, 1/2) Fndng Dense Subgraphs n Gn, 1/ Atsh Das Sarma 1, Amt Deshpande, and Rav Kannan 1 Georga Insttute of Technology,atsh@cc.gatech.edu Mcrosoft Research-Bangalore,amtdesh,annan@mcrosoft.com Abstract. Fndng

More information

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016 U.C. Berkeley CS94: Spectral Methods and Expanders Handout 8 Luca Trevsan February 7, 06 Lecture 8: Spectral Algorthms Wrap-up In whch we talk about even more generalzatons of Cheeger s nequaltes, and

More information

Supporting Information

Supporting Information Supportng Informaton The neural network f n Eq. 1 s gven by: f x l = ReLU W atom x l + b atom, 2 where ReLU s the element-wse rectfed lnear unt, 21.e., ReLUx = max0, x, W atom R d d s the weght matrx to

More information

18.1 Introduction and Recap

18.1 Introduction and Recap CS787: Advanced Algorthms Scrbe: Pryananda Shenoy and Shjn Kong Lecturer: Shuch Chawla Topc: Streamng Algorthmscontnued) Date: 0/26/2007 We contnue talng about streamng algorthms n ths lecture, ncludng

More information

Introduction to Algorithms

Introduction to Algorithms Introducton to Algorthms 6.046J/18.401J Lecture 7 Prof. Potr Indyk Data Structures Role of data structures: Encapsulate data Support certan operatons (e.g., INSERT, DELETE, SEARCH) What data structures

More information

Lecture Space-Bounded Derandomization

Lecture Space-Bounded Derandomization Notes on Complexty Theory Last updated: October, 2008 Jonathan Katz Lecture Space-Bounded Derandomzaton 1 Space-Bounded Derandomzaton We now dscuss derandomzaton of space-bounded algorthms. Here non-trval

More information

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 6 Luca Trevisan September 12, 2017

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 6 Luca Trevisan September 12, 2017 U.C. Berkeley CS94: Beyond Worst-Case Analyss Handout 6 Luca Trevsan September, 07 Scrbed by Theo McKenze Lecture 6 In whch we study the spectrum of random graphs. Overvew When attemptng to fnd n polynomal

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

Lecture 3 January 31, 2017

Lecture 3 January 31, 2017 CS 224: Advanced Algorthms Sprng 207 Prof. Jelan Nelson Lecture 3 January 3, 207 Scrbe: Saketh Rama Overvew In the last lecture we covered Y-fast tres and Fuson Trees. In ths lecture we start our dscusson

More information

4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA

4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA 4 Analyss of Varance (ANOVA) 5 ANOVA 51 Introducton ANOVA ANOVA s a way to estmate and test the means of multple populatons We wll start wth one-way ANOVA If the populatons ncluded n the study are selected

More information

Stanford University CS254: Computational Complexity Notes 7 Luca Trevisan January 29, Notes for Lecture 7

Stanford University CS254: Computational Complexity Notes 7 Luca Trevisan January 29, Notes for Lecture 7 Stanford Unversty CS54: Computatonal Complexty Notes 7 Luca Trevsan January 9, 014 Notes for Lecture 7 1 Approxmate Countng wt an N oracle We complete te proof of te followng result: Teorem 1 For every

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

Kernel Methods and SVMs Extension

Kernel Methods and SVMs Extension Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general

More information

Finding Primitive Roots Pseudo-Deterministically

Finding Primitive Roots Pseudo-Deterministically Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms

More information

j) = 1 (note sigma notation) ii. Continuous random variable (e.g. Normal distribution) 1. density function: f ( x) 0 and f ( x) dx = 1

j) = 1 (note sigma notation) ii. Continuous random variable (e.g. Normal distribution) 1. density function: f ( x) 0 and f ( x) dx = 1 Random varables Measure of central tendences and varablty (means and varances) Jont densty functons and ndependence Measures of assocaton (covarance and correlaton) Interestng result Condtonal dstrbutons

More information

Maximizing the number of nonnegative subsets

Maximizing the number of nonnegative subsets Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum

More information

Grover s Algorithm + Quantum Zeno Effect + Vaidman

Grover s Algorithm + Quantum Zeno Effect + Vaidman Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the

More information

Randomness and Computation

Randomness and Computation Randomness and Computaton or, Randomzed Algorthms Mary Cryan School of Informatcs Unversty of Ednburgh RC 208/9) Lecture 0 slde Balls n Bns m balls, n bns, and balls thrown unformly at random nto bns usually

More information

Linear Classification, SVMs and Nearest Neighbors

Linear Classification, SVMs and Nearest Neighbors 1 CSE 473 Lecture 25 (Chapter 18) Lnear Classfcaton, SVMs and Nearest Neghbors CSE AI faculty + Chrs Bshop, Dan Klen, Stuart Russell, Andrew Moore Motvaton: Face Detecton How do we buld a classfer to dstngush

More information

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also

More information

8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS

8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 493 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces you have studed thus far n the text are real vector spaces because the scalars

More information

Pulse Coded Modulation

Pulse Coded Modulation Pulse Coded Modulaton PCM (Pulse Coded Modulaton) s a voce codng technque defned by the ITU-T G.711 standard and t s used n dgtal telephony to encode the voce sgnal. The frst step n the analog to dgtal

More information

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there

More information

BOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS

BOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS BOUNDEDNESS OF THE IESZ TANSFOM WITH MATIX A WEIGHTS Introducton Let L = L ( n, be the functon space wth norm (ˆ f L = f(x C dx d < For a d d matrx valued functon W : wth W (x postve sem-defnte for all

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 12 10/21/2013. Martingale Concentration Inequalities and Applications

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 12 10/21/2013. Martingale Concentration Inequalities and Applications MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.65/15.070J Fall 013 Lecture 1 10/1/013 Martngale Concentraton Inequaltes and Applcatons Content. 1. Exponental concentraton for martngales wth bounded ncrements.

More information

MATH 5707 HOMEWORK 4 SOLUTIONS 2. 2 i 2p i E(X i ) + E(Xi 2 ) ä i=1. i=1

MATH 5707 HOMEWORK 4 SOLUTIONS 2. 2 i 2p i E(X i ) + E(Xi 2 ) ä i=1. i=1 MATH 5707 HOMEWORK 4 SOLUTIONS CİHAN BAHRAN 1. Let v 1,..., v n R m, all lengths v are not larger than 1. Let p 1,..., p n [0, 1] be arbtrary and set w = p 1 v 1 + + p n v n. Then there exst ε 1,..., ε

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013 ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run

More information

Simulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests

Simulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests Smulated of the Cramér-von Mses Goodness-of-Ft Tests Steele, M., Chaselng, J. and 3 Hurst, C. School of Mathematcal and Physcal Scences, James Cook Unversty, Australan School of Envronmental Studes, Grffth

More information

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could

More information

U.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017

U.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017 U.C. Berkeley CS94: Beyond Worst-Case Analyss Handout 4s Luca Trevsan September 5, 07 Summary of Lecture 4 In whch we ntroduce semdefnte programmng and apply t to Max Cut. Semdefnte Programmng Recall that

More information

NP-Completeness : Proofs

NP-Completeness : Proofs NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem

More information

Errors for Linear Systems

Errors for Linear Systems Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Section 8.3 Polar Form of Complex Numbers

Section 8.3 Polar Form of Complex Numbers 80 Chapter 8 Secton 8 Polar Form of Complex Numbers From prevous classes, you may have encountered magnary numbers the square roots of negatve numbers and, more generally, complex numbers whch are the

More information

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of

More information

Lecture 4: Constant Time SVD Approximation

Lecture 4: Constant Time SVD Approximation Spectral Algorthms and Representatons eb. 17, Mar. 3 and 8, 005 Lecture 4: Constant Tme SVD Approxmaton Lecturer: Santosh Vempala Scrbe: Jangzhuo Chen Ths topc conssts of three lectures 0/17, 03/03, 03/08),

More information

arxiv: v1 [math.co] 1 Mar 2014

arxiv: v1 [math.co] 1 Mar 2014 Unon-ntersectng set systems Gyula O.H. Katona and Dánel T. Nagy March 4, 014 arxv:1403.0088v1 [math.co] 1 Mar 014 Abstract Three ntersecton theorems are proved. Frst, we determne the sze of the largest

More information

Feature Selection: Part 1

Feature Selection: Part 1 CSE 546: Machne Learnng Lecture 5 Feature Selecton: Part 1 Instructor: Sham Kakade 1 Regresson n the hgh dmensonal settng How do we learn when the number of features d s greater than the sample sze n?

More information

Dimensionality Reduction Notes 1

Dimensionality Reduction Notes 1 Dmensonalty Reducton Notes 1 Jelan Nelson mnlek@seas.harvard.edu August 10, 2015 1 Prelmnares Here we collect some notaton and basc lemmas used throughout ths note. Throughout, for a random varable X,

More information

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,

More information

Which Separator? Spring 1

Which Separator? Spring 1 Whch Separator? 6.034 - Sprng 1 Whch Separator? Mamze the margn to closest ponts 6.034 - Sprng Whch Separator? Mamze the margn to closest ponts 6.034 - Sprng 3 Margn of a pont " # y (w $ + b) proportonal

More information

Mining Data Streams-Estimating Frequency Moment

Mining Data Streams-Estimating Frequency Moment Mnng Data Streams-Estmatng Frequency Moment Barna Saha October 26, 2017 Frequency Moment Computng moments nvolves dstrbuton of frequences of dfferent elements n the stream. Frequency Moment Computng moments

More information

Vapnik-Chervonenkis theory

Vapnik-Chervonenkis theory Vapnk-Chervonenks theory Rs Kondor June 13, 2008 For the purposes of ths lecture, we restrct ourselves to the bnary supervsed batch learnng settng. We assume that we have an nput space X, and an unknown

More information

Lecture 3. Ax x i a i. i i

Lecture 3. Ax x i a i. i i 18.409 The Behavor of Algorthms n Practce 2/14/2 Lecturer: Dan Spelman Lecture 3 Scrbe: Arvnd Sankar 1 Largest sngular value In order to bound the condton number, we need an upper bound on the largest

More information

Computing Correlated Equilibria in Multi-Player Games

Computing Correlated Equilibria in Multi-Player Games Computng Correlated Equlbra n Mult-Player Games Chrstos H. Papadmtrou Presented by Zhanxang Huang December 7th, 2005 1 The Author Dr. Chrstos H. Papadmtrou CS professor at UC Berkley (taught at Harvard,

More information

Lecture 3: Shannon s Theorem

Lecture 3: Shannon s Theorem CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts

More information

COS 521: Advanced Algorithms Game Theory and Linear Programming

COS 521: Advanced Algorithms Game Theory and Linear Programming COS 521: Advanced Algorthms Game Theory and Lnear Programmng Moses Charkar February 27, 2013 In these notes, we ntroduce some basc concepts n game theory and lnear programmng (LP). We show a connecton

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

Week 5: Neural Networks

Week 5: Neural Networks Week 5: Neural Networks Instructor: Sergey Levne Neural Networks Summary In the prevous lecture, we saw how we can construct neural networks by extendng logstc regresson. Neural networks consst of multple

More information

Learning Theory: Lecture Notes

Learning Theory: Lecture Notes Learnng Theory: Lecture Notes Lecturer: Kamalka Chaudhur Scrbe: Qush Wang October 27, 2012 1 The Agnostc PAC Model Recall that one of the constrants of the PAC model s that the data dstrbuton has to be

More information

Approximate Nearest Neighbor (ANN) Search - II

Approximate Nearest Neighbor (ANN) Search - II Approxmate Nearest Neghbor (ANN) Search - II Sanjv Kumar, Google Research, NY EECS-6898, Columba Unversty - Fall, 2010 EECS6898 Large Scale Machne Learnng 1 Two popular ANN approaches Tree approaches Recursvely

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

Communication Complexity 16:198: February Lecture 4. x ij y ij

Communication Complexity 16:198: February Lecture 4. x ij y ij Communcaton Complexty 16:198:671 09 February 2010 Lecture 4 Lecturer: Troy Lee Scrbe: Rajat Mttal 1 Homework problem : Trbes We wll solve the thrd queston n the homework. The goal s to show that the nondetermnstc

More information

Lecture 20: Lift and Project, SDP Duality. Today we will study the Lift and Project method. Then we will prove the SDP duality theorem.

Lecture 20: Lift and Project, SDP Duality. Today we will study the Lift and Project method. Then we will prove the SDP duality theorem. prnceton u. sp 02 cos 598B: algorthms and complexty Lecture 20: Lft and Project, SDP Dualty Lecturer: Sanjeev Arora Scrbe:Yury Makarychev Today we wll study the Lft and Project method. Then we wll prove

More information

Lecture 3: Probability Distributions

Lecture 3: Probability Distributions Lecture 3: Probablty Dstrbutons Random Varables Let us begn by defnng a sample space as a set of outcomes from an experment. We denote ths by S. A random varable s a functon whch maps outcomes nto the

More information

Lecture Randomized Load Balancing strategies and their analysis. Probability concepts include, counting, the union bound, and Chernoff bounds.

Lecture Randomized Load Balancing strategies and their analysis. Probability concepts include, counting, the union bound, and Chernoff bounds. U.C. Berkeley CS273: Parallel and Dstrbuted Theory Lecture 1 Professor Satsh Rao August 26, 2010 Lecturer: Satsh Rao Last revsed September 2, 2010 Lecture 1 1 Course Outlne We wll cover a samplng of the

More information

Formulas for the Determinant

Formulas for the Determinant page 224 224 CHAPTER 3 Determnants e t te t e 2t 38 A = e t 2te t e 2t e t te t 2e 2t 39 If 123 A = 345, 456 compute the matrx product A adj(a) What can you conclude about det(a)? For Problems 40 43, use

More information

Min Cut, Fast Cut, Polynomial Identities

Min Cut, Fast Cut, Polynomial Identities Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.

More information

Generalized Linear Methods

Generalized Linear Methods Generalzed Lnear Methods 1 Introducton In the Ensemble Methods the general dea s that usng a combnaton of several weak learner one could make a better learner. More formally, assume that we have a set

More information

Support Vector Machines. Vibhav Gogate The University of Texas at dallas

Support Vector Machines. Vibhav Gogate The University of Texas at dallas Support Vector Machnes Vbhav Gogate he Unversty of exas at dallas What We have Learned So Far? 1. Decson rees. Naïve Bayes 3. Lnear Regresson 4. Logstc Regresson 5. Perceptron 6. Neural networks 7. K-Nearest

More information

CS286r Assign One. Answer Key

CS286r Assign One. Answer Key CS286r Assgn One Answer Key 1 Game theory 1.1 1.1.1 Let off-equlbrum strateges also be that people contnue to play n Nash equlbrum. Devatng from any Nash equlbrum s a weakly domnated strategy. That s,

More information

TAIL BOUNDS FOR SUMS OF GEOMETRIC AND EXPONENTIAL VARIABLES

TAIL BOUNDS FOR SUMS OF GEOMETRIC AND EXPONENTIAL VARIABLES TAIL BOUNDS FOR SUMS OF GEOMETRIC AND EXPONENTIAL VARIABLES SVANTE JANSON Abstract. We gve explct bounds for the tal probabltes for sums of ndependent geometrc or exponental varables, possbly wth dfferent

More information

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results.

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results. Neural Networks : Dervaton compled by Alvn Wan from Professor Jtendra Malk s lecture Ths type of computaton s called deep learnng and s the most popular method for many problems, such as computer vson

More information

Transfer Functions. Convenient representation of a linear, dynamic model. A transfer function (TF) relates one input and one output: ( ) system

Transfer Functions. Convenient representation of a linear, dynamic model. A transfer function (TF) relates one input and one output: ( ) system Transfer Functons Convenent representaton of a lnear, dynamc model. A transfer functon (TF) relates one nput and one output: x t X s y t system Y s The followng termnology s used: x y nput output forcng

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

STATS 306B: Unsupervised Learning Spring Lecture 10 April 30

STATS 306B: Unsupervised Learning Spring Lecture 10 April 30 STATS 306B: Unsupervsed Learnng Sprng 2014 Lecture 10 Aprl 30 Lecturer: Lester Mackey Scrbe: Joey Arthur, Rakesh Achanta 10.1 Factor Analyss 10.1.1 Recap Recall the factor analyss (FA) model for lnear

More information

Anti-van der Waerden numbers of 3-term arithmetic progressions.

Anti-van der Waerden numbers of 3-term arithmetic progressions. Ant-van der Waerden numbers of 3-term arthmetc progressons. Zhanar Berkkyzy, Alex Schulte, and Mchael Young Aprl 24, 2016 Abstract The ant-van der Waerden number, denoted by aw([n], k), s the smallest

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

SL n (F ) Equals its Own Derived Group

SL n (F ) Equals its Own Derived Group Internatonal Journal of Algebra, Vol. 2, 2008, no. 12, 585-594 SL n (F ) Equals ts Own Derved Group Jorge Macel BMCC-The Cty Unversty of New York, CUNY 199 Chambers street, New York, NY 10007, USA macel@cms.nyu.edu

More information

Composite Hypotheses testing

Composite Hypotheses testing Composte ypotheses testng In many hypothess testng problems there are many possble dstrbutons that can occur under each of the hypotheses. The output of the source s a set of parameters (ponts n a parameter

More information

10-701/ Machine Learning, Fall 2005 Homework 3

10-701/ Machine Learning, Fall 2005 Homework 3 10-701/15-781 Machne Learnng, Fall 2005 Homework 3 Out: 10/20/05 Due: begnnng of the class 11/01/05 Instructons Contact questons-10701@autonlaborg for queston Problem 1 Regresson and Cross-valdaton [40

More information

Appendix B: Resampling Algorithms

Appendix B: Resampling Algorithms 407 Appendx B: Resamplng Algorthms A common problem of all partcle flters s the degeneracy of weghts, whch conssts of the unbounded ncrease of the varance of the mportance weghts ω [ ] of the partcles

More information

A 2D Bounded Linear Program (H,c) 2D Linear Programming

A 2D Bounded Linear Program (H,c) 2D Linear Programming A 2D Bounded Lnear Program (H,c) h 3 v h 8 h 5 c h 4 h h 6 h 7 h 2 2D Lnear Programmng C s a polygonal regon, the ntersecton of n halfplanes. (H, c) s nfeasble, as C s empty. Feasble regon C s unbounded

More information

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0 MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector

More information

MMA and GCMMA two methods for nonlinear optimization

MMA and GCMMA two methods for nonlinear optimization MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons

More information

Edge Isoperimetric Inequalities

Edge Isoperimetric Inequalities November 7, 2005 Ross M. Rchardson Edge Isopermetrc Inequaltes 1 Four Questons Recall that n the last lecture we looked at the problem of sopermetrc nequaltes n the hypercube, Q n. Our noton of boundary

More information

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U)

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U) Econ 413 Exam 13 H ANSWERS Settet er nndelt 9 deloppgaver, A,B,C, som alle anbefales å telle lkt for å gøre det ltt lettere å stå. Svar er gtt . Unfortunately, there s a prntng error n the hnt of

More information

Chernoff-Hoeffding Inequality

Chernoff-Hoeffding Inequality Chernoff-Hoeffdng Inequalty When dealng wth modern bg data sets, a very common theme s reducng the set through a random process. These generally work by makng many smple estmates of the full data set,

More information

5 The Rational Canonical Form

5 The Rational Canonical Form 5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces

More information

COMPLEX NUMBERS AND QUADRATIC EQUATIONS

COMPLEX NUMBERS AND QUADRATIC EQUATIONS COMPLEX NUMBERS AND QUADRATIC EQUATIONS INTRODUCTION We know that x 0 for all x R e the square of a real number (whether postve, negatve or ero) s non-negatve Hence the equatons x, x, x + 7 0 etc are not

More information

p 1 c 2 + p 2 c 2 + p 3 c p m c 2

p 1 c 2 + p 2 c 2 + p 3 c p m c 2 Where to put a faclty? Gven locatons p 1,..., p m n R n of m houses, want to choose a locaton c n R n for the fre staton. Want c to be as close as possble to all the house. We know how to measure dstance

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

HMMT February 2016 February 20, 2016

HMMT February 2016 February 20, 2016 HMMT February 016 February 0, 016 Combnatorcs 1. For postve ntegers n, let S n be the set of ntegers x such that n dstnct lnes, no three concurrent, can dvde a plane nto x regons (for example, S = {3,

More information

Supplementary material: Margin based PU Learning. Matrix Concentration Inequalities

Supplementary material: Margin based PU Learning. Matrix Concentration Inequalities Supplementary materal: Margn based PU Learnng We gve the complete proofs of Theorem and n Secton We frst ntroduce the well-known concentraton nequalty, so the covarance estmator can be bounded Then we

More information

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003 Tornado and Luby Transform Codes Ashsh Khst 6.454 Presentaton October 22, 2003 Background: Erasure Channel Elas[956] studed the Erasure Channel β x x β β x 2 m x 2 k? Capacty of Noseless Erasure Channel

More information