arxiv: v1 [cs.ds] 3 Feb 2014

Size: px
Start display at page:

Download "arxiv: v1 [cs.ds] 3 Feb 2014"

Transcription

1 arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co February 4, 04 Abstract This paper investigates and bounds the expected solution quality of cobinatorial optiization probles when feasible solutions are chosen at rando. Loose general bounds are discovered, as well as failies of cobinatorial optiization probles for which rando feasible solutions are expected to be a constant factor of optial. One iplication of this result is that, for graphical probles, if the average edge weight in a feasible solution is sufficiently sall, then any randoly chosen feasible solution to the proble will be a constant factor of optial. For exaple, under certain well-defined circustances, the expected constant of approxiation of a randoly chosen feasible solution to the Steiner networ proble is bounded above by 3. Epirical analysis supports these bounds and actually suggest that they ight be tightened. Introduction Cobinatorial optiization is the process of selecting a set of points fro a finite topological space that axiize or iniize a given objective function. It is often very siple to find feasible solutions to such probles, however, it is usually exceedingly hard to find optial ones. For exaple, given a finite set of objects y Y each with value v : Y R and weight w : Y R 0, the napsac proble ass to find a subset of the objects S Y whose cobined weight does not exceed a given axiu, w ax, and whose cobined value is Evan is no longer affiliated with Johns Hopins University. He is currently the chief scientist at Digital Operatives and adjunct faculty at the Drexel University Departent of Coputer Science.

2 axiized: axiize y Y v(y)x y subject to: w(y)x y w ax, y Y x y {0, }, y Y, where the chosen set of objects is S = {y Y : x y = }. Finding a feasible solution to the napsac proble is trivial: Any set of objects S Y that does not outweigh the axiu, v(s) w ax, s S will be a feasible solution. Such a set of objects can be chosen in linear tie. As a second exaple, consider another NP-Coplete proble: the Steiner networ proble []. Given an undirected, edge-weighted graph on n vertices and edges, G = V, E, and also given a subset of terinal vertices T V of cardinality α = T, the Steiner networ proble ass to find a iniu weight forest that spans the terinals []: iniize e E w(e)x e subject to: e δ(s) x e f(s), S V : S x e 0, e E, where δ(s) is the set of edges having exactly one endpoint in S and f : V {0, } is a function such that f(s) = if and only if S T T. Despite the fact that finding an optial solution is hard, finding a feasible solution is not: Any spanning forest will be a feasible solution to the Steiner networ proble. Given that finding a feasible solution is often so siple relative to finding the optial, we would lie to now: In expectation, how uch worse is a given feasible certificate copared to the optial solution? This paper investigates and bounds the expected solution quality to such probles when feasible solutions are chosen at rando. We proceed by bounding the expected value of the best- and worst-case outcoes of any choice of objects. In general, let be a lower bound on the nuber of objects in an optial solution. In the case of the Steiner networ proble, for exaple, ust be greater than or equal to α edges. Let l be an upper bound on the nuber of objects chosen by a given algorith that is guaranteed to produce feasible but not necessarily optial solutions. In the worst case, the algorith will have chosen the l costliest objects while the

3 optial solution actually contained the cheapest objects. How liely is this outcoe? If we can bound the ratio of the expected value of the su of the l costliest objects over the expected value of the su of the cheapest objects, this will be an upper bound on the expected constant of approxiation of the algorith, regardless of how the algorith actually chooses a feasible solution, and also regardless of which cobinatorial optiization proble we are solving. The bound on the expected constant of approxiation is codified in the reainder of this paper. Section serves to foralize the proble and Section 3 develops the bound, the theoretical consequences of which are discussed in Section 4. The theoretical bound is supported through epirical evaluation in Section 5. Proofs of the various leas and theores are provided at the end of the paper in A. Fraing the Proble It is often useful to thin of cobinatorial optiization as the process of selecting an optial subset fro a given finite set of objects. We proceed by treating the cost of each object in a cobinatorial optiization proble as a rando variable. Let X = [X,..., X ] be a vector rando variable consisting of identically distributed (but not necessarily independent) rando variables. In a sense, each variable captures whether or not one of the objects fro the cobinatorial optiization proble will be chosen to be a part of the solution. In the napsac proble, for exaple, is the total nuber of objects. In the Steiner networ proble, is the nuber of edges in the graph. The order statistics of X are denoted X (:)... X (r:)... X (:). For l {,,..., }, let Y be the distribution of the l largest order statistics of X: Y r= l+ X (r:). Siilarly, for {,,..., }, let Y be the su of the sallest order statistics of X: Y X (r:). r= Without loss of generality, we assue in the reainder of our analysis that the objective function is being iniized. In that case, observe that Y is the probability distribution of the cost of the costliest solution of size l and, siilarly, Y is the distribution of the cost of the best possible solution of size. The expected value of Y will be an upper bound on the expected value of the costliest solution to the proble, whereas the expected value of Y will be a lower bound on the expected value of the optial solution. We are interested in answering the question: What can be said of the relationship between Y and Y? If Y and Y are nonnegative then the expected i.e., their distributions are truncated such that the probability density for all negative values is zero. 3

4 value of Y/Y will be an upper bound on the expected constant of approxiation of any algorith that produces feasible solutions to the optiization proble. In general, for arbitrary Y and Y, the expected approxiation factor is bounded above by + E[Y ]. () We develop an upper bound on this expression in the following section. 3 Bounds on Order Statistics Gascuel and Caraux discovered the following bounds on the expected value of order statistics of rando variables with syetrical distributions with ean µ and variance σ : Theore (Proposition of [3]). The bounds if r, µ σ r if r, µ σ ( r) E[X µ + σ (r:)] µ + σ r ( r+) (r ) ( r+) if r, if r, are valid and ay be reached for soe distributions. With the result of Theore and soe interediary bounds on the generalized haronic series, we are led directly to a loose lower bound for E[Y ] and a loose upper bound for E[Y ]. To achieve these bounds, let us first constrain the agnitude of and l with respect to : l. These constraints appear to be reasonable: The faily of cobinatorial optiization probles that confor to these constraints is large. In the context of the Steiner networ proble, for exaple, these constraints equate to requiring that both the optial and feasible solutions encopass fewer than half of all possible edges in the graph. This assuption clearly holds for alost every siple graph since. such graphs have ( n ) = n(n ) possible edges;. any feasible solution to the Steiner networ proble will have at ost n edges; and 3. n 4 : n n 4 (n ). The constraints on the agnitude of and l lead to the following loose bounds: 4

5 Theore (Proof of this and the reainder of the theores in this paper are given in A). Theore 3. = E[Y ] > µ σ ( + ). l = E[Y ] lµ + σ ( ) l. It is possible to bound the expected approxiation factor of Equation () by utilizing the bounds on E[Y ] and E[Y ]: Theore 4. If (l ) and then lµ µ + 3σ, if µ < σ + + σ µ E[Y ] lµ + σ µ σ, if µ > σ +, which siplifies to, if µ < σ + 3, if µ 0 4, if µ(l + ) σ ε R, if µ σ(ε 3) l +ε < σ + ε R, if σ + < µ σ(ε ) l. (lµ σ µ > σ) Corollary. If l > exp ( + 3 ) µ > σ + l, then the upper bound siplifies to 3. Corollary. If σ µ, the constant bound of 3 will hold asyptotically. 4 Discussion Theore 4 is a rather surprising result: If we now that the size of the optial solution is bounded below by and the average edge weight in a rando feasible solution is sall, then any randoly chosen solution of size at ost l will, on average, be a constant factor of optial. If the edges are weighted fro a distribution with a nonpositive ean, then any randoly chosen feasible solution of any size is guaranteed to be, on average, no ore than three ties the cost of the optial solution. 5

6 Consider the Steiner networ proble as an exaple. If there are α terinals then we now that the optial solution ust have at least α edges (this is ). Any feasible solution to the proble is going to be an acyclic graph, which will have at ost n edges (this is l). The nuber of rando variables,, is equal to the nuber of edges, which is bounded above by ( ) n. If µ is sall then, by Theore 4, the expected constant of approxiation for any randoly chosen feasible solution to the Steiner networ proble is bounded above by µ(n ) + 3σ ( n ) µ α σ ( n ) µ α, which quicly 3 converges to 3 as n. 5 Epirical Evidence In order to deonstrate the validity and tightness of the bound, we epirically evaluate the optiality of randoly chosen feasible solutions to cobinatorial optiization probles. First, let us consider a relatively siple proble that is in P: iniu spanning tree. We will later also exaine the NP-Coplete Steiner networ proble. Rando graphs are generated using the Erdős-Rényi odel G(n, ) with n {4,..., 30} vertices and {3,..., ( n ) } edges. The edges of the rando graphs are weighted according to various probability distributions (listed in the forthcoing figures, below). A rando feasible solution is chosen by solving the iniu spanning tree proble on the graph while ignoring edge weights. While this will in effect produce a rando feasible solution that is independent of the edge weights (and therefore also the optiization proble s objective function), note that this ethod is not equivalent to drawing uniforly fro the set of all possible feasible solutions. As such, these results ay slightly bias the rando solutions optiality. The optial solution is discovered by solving the proble taing edge weights into account. The constant of approxiation is then calculated by taing the ratio of the cost of the rando feasible solution over the cost of the optial solution. As we can see in Figure, the randoly chosen solutions rapidly converge to an approxiation constant of. Next, let us consider the Steiner networ proble. The rando graphs are generated siilarly to the iniu spanning tree case above. The nuber of terinals in the proble is set to n and the terinals are chosen randoly fro the vertices according to a unifor distribution. The rando feasible solutions are chosen by solving the iniu spanning tree proble on the graph. Since the Steiner networ proble is coputationally intractable to solve optially, though, we are forced to copare the randoly chosen feasible solutions against a bounded approxiation to the optial solution using a - Optial algorith []. Therefore, if the rando feasible solutions have a cost no i.e., the first case of the piecewise bound of Theore 4 is satisfied. 3 Convergence is superlinear, as confired by d Alebert s ratio test. 6

7 Mean Constant of Approxiation Gaussian(0,) Unifor (-0.5,0.5) Laplace Logistic Gaussian(0,000) Gubel Nuber of Edges Figure : The average constant of approxiation of randoly chosen feasible solutions to the iniu spanning tree proble converges to. 7

8 Ratio of Rando Solution Cost over -OPT Solution Cost Nuber of Edges Gaussian(0,) Unifor(0,) Gubel Laplace Logistic Figure : Rando feasible solutions to the Steiner networ proble copared to a -OPT algorith. Values less than iply that the rando solution was lower cost than the approxiation algorith s solution. worse than the approxiation algoriths, we now that the cost of the feasible solutions are no ore than twice the cost of the optial solution. As we see in Figure, for alost all graphs the randoly chosen solutions actually perfor better than the approxiation algorith, with iproveent as the graphs get denser. 6 Conclusions This paper investigated and bounded the expected solution quality of cobinatorial optiization probles when feasible solutions are chosen at rando. A loose general bound was discovered (Theore 4), as well as failies of cobinatorial optiization probles for which rando feasible solutions are expected to be a constant factor of optial. One iplication of this result is that, for graphical probles, if the average edge weight in a feasible solution is sufficiently sall, then any randoly chosen feasible solution to the proble will be a constant factor of optial. For exaple, under certain well-defined circustances, the expected constant of approxiation of a randoly chosen feasible solution to the Steiner networ proble is bounded above by 3. Epirical analysis supports these bounds and actually suggest that they ight be tightened. 8

9 Acnowledgeents This research was perfored under The Johns Hopins University Applied Physics Laboratory research grant X9RSTHNA and the Stuart S. Janney award. Thans are owed to Kevin Schultz and Ali Shooufandeh for their helpful coents and insight. A Proofs and Suppleentary Theores Let H n,r denote the generalized haronic nuber of order n of r: Lea. H n,r = n i= i r. n + < H n, n. Proof. Since x is onotonically decreasing in x, we can bound H n, by its definite integral using the forward and bacward rectangle rules. For the lower bound, For the upper bound, H n, H n, = > n i i= n+ x dx = n +. = + + n i= n = n. i x dx Proof of Theore. The conditions of the iplication in the theore ensure that the bounds of Theore siplify to E[X (r:) ] µ σ r. Applying this bound to the tried su of the sallest order statistics results in µ σ r. r= 9

10 Further siplification yields µ σ By Lea, () is bounded below by r= µ σ ( + ). r. () Proof of Theore 3. The conditions of the iplication in the theore ensure that the bounds of Theore siplify to E[X (r:) ] µ + σ ( r + ). Applying this bound to the tried su of the l largest order statistics results in lµ + σ r +. Further siplification yields r= l+ lµ + σ r= l+ The suation in (3) is equal to H l, : r +. (3) r= l+ r + = = l + l + l l i= i = H l,, which, by Lea, is bounded above by l. Proof of Theore 4. Let E[Y ] be the upper bound of Theore 3 and E[Y ] be the lower bound of Theore. Note that + E[Y ] + E[Y ], 0

11 allowing us to proceed by bounding the expression using E[Y ] and E[Y ]. Next, observe that E[Y ] E[Y ], so the absolute value in the nuerator can be dropped: + E[Y ] + E[Y. ] There are therefore two cases to consider, depending on the sign of the denoinator. Let us first consider the case when E[Y ] < 0. Since,, and σ are necessarily positive, observe that E[Y ] < 0 µ < σ +, producing the first case in the piecewise function of the theore. Under these circustances, evaluating Equation yields + E[Y ] + E[Y ] Since = σ ( + ) σ and = l, = σ the bound can be relaxed to (4) lµ µ + σ ( l σ ( + ) µ ( ) l , lµ µ + 3σ. σ µ In the second and final case, E[Y ] > 0 and + E[Y ] + E[Y ] lµ + σ ( l = ) µ σ ( + ) ). (4) lµ + σ µ σ, because (l ), iplies ( l+ + 5 ) and ( + ).

12 Proof of Corollary. Evaluating the expression yields lµ + σ ( + log l) µ + σ ( + ) l µ + σ (log l + ) l log l + l µ + σ ( + ) ( + ) l exp( + 3), which is satisfied by the conditions of the corollary. Proof of Corollary. Fro Theore 4, σ µ = + E[Y ] lµ µ + 3σ σ µ = Θ(3). References [] M. X. Goeans, A. V. Goldberg, S. Plotin, D. B. Shoys, E. Tardos, D. P. Williason, Iproved approxiation algoriths for networ design probles, in: Proceedings of the 5th Annual ACM-SIAM Syposiu on Discrete Algoriths, 994, pp [] M. Aggarwal, N. Garg, A Scaling Technique for Better Networ Design, in: Proceedings of the Fifth Annual ACM-SIAM Syposiu on Discrete Algoriths, Society for Industrial and Applied Matheatics, Philadelphia, PA, USA, 994, pp [3] O. Gascuel, G. Caraux, Bounds on expectations of order statistics via extreal dependences, Statistics & Probability Letters 5 () (99)

Bipartite subgraphs and the smallest eigenvalue

Bipartite subgraphs and the smallest eigenvalue Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.

More information

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

arxiv: v2 [math.co] 3 Dec 2008

arxiv: v2 [math.co] 3 Dec 2008 arxiv:0805.2814v2 [ath.co] 3 Dec 2008 Connectivity of the Unifor Rando Intersection Graph Sion R. Blacburn and Stefanie Gere Departent of Matheatics Royal Holloway, University of London Egha, Surrey TW20

More information

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

On the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs

On the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs On the Inapproxiability of Vertex Cover on k-partite k-unifor Hypergraphs Venkatesan Guruswai and Rishi Saket Coputer Science Departent Carnegie Mellon University Pittsburgh, PA 1513. Abstract. Coputing

More information

Approximation in Stochastic Scheduling: The Power of LP-Based Priority Policies

Approximation in Stochastic Scheduling: The Power of LP-Based Priority Policies Approxiation in Stochastic Scheduling: The Power of -Based Priority Policies Rolf Möhring, Andreas Schulz, Marc Uetz Setting (A P p stoch, r E( w and (B P p stoch E( w We will assue that the processing

More information

Introduction to Discrete Optimization

Introduction to Discrete Optimization Prof. Friedrich Eisenbrand Martin Nieeier Due Date: March 9 9 Discussions: March 9 Introduction to Discrete Optiization Spring 9 s Exercise Consider a school district with I neighborhoods J schools and

More information

Convex Programming for Scheduling Unrelated Parallel Machines

Convex Programming for Scheduling Unrelated Parallel Machines Convex Prograing for Scheduling Unrelated Parallel Machines Yossi Azar Air Epstein Abstract We consider the classical proble of scheduling parallel unrelated achines. Each job is to be processed by exactly

More information

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness A Note on Scheduling Tall/Sall Multiprocessor Tasks with Unit Processing Tie to Miniize Maxiu Tardiness Philippe Baptiste and Baruch Schieber IBM T.J. Watson Research Center P.O. Box 218, Yorktown Heights,

More information

A Simple Regression Problem

A Simple Regression Problem A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

Learnability and Stability in the General Learning Setting

Learnability and Stability in the General Learning Setting Learnability and Stability in the General Learning Setting Shai Shalev-Shwartz TTI-Chicago shai@tti-c.org Ohad Shair The Hebrew University ohadsh@cs.huji.ac.il Nathan Srebro TTI-Chicago nati@uchicago.edu

More information

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul

More information

The degree of a typical vertex in generalized random intersection graph models

The degree of a typical vertex in generalized random intersection graph models Discrete Matheatics 306 006 15 165 www.elsevier.co/locate/disc The degree of a typical vertex in generalized rando intersection graph odels Jerzy Jaworski a, Michał Karoński a, Dudley Stark b a Departent

More information

Research Article On the Isolated Vertices and Connectivity in Random Intersection Graphs

Research Article On the Isolated Vertices and Connectivity in Random Intersection Graphs International Cobinatorics Volue 2011, Article ID 872703, 9 pages doi:10.1155/2011/872703 Research Article On the Isolated Vertices and Connectivity in Rando Intersection Graphs Yilun Shang Institute for

More information

On Constant Power Water-filling

On Constant Power Water-filling On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

1 Identical Parallel Machines

1 Identical Parallel Machines FB3: Matheatik/Inforatik Dr. Syaantak Das Winter 2017/18 Optiizing under Uncertainty Lecture Notes 3: Scheduling to Miniize Makespan In any standard scheduling proble, we are given a set of jobs J = {j

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Notes for EE227C (Spring 2018): Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee227c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee227c@berkeley.edu October

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This article appeared in a ournal published by Elsevier. The attached copy is furnished to the author for internal non-coercial research and education use, including for instruction at the authors institution

More information

Lecture 21. Interior Point Methods Setup and Algorithm

Lecture 21. Interior Point Methods Setup and Algorithm Lecture 21 Interior Point Methods In 1984, Kararkar introduced a new weakly polynoial tie algorith for solving LPs [Kar84a], [Kar84b]. His algorith was theoretically faster than the ellipsoid ethod and

More information

3.3 Variational Characterization of Singular Values

3.3 Variational Characterization of Singular Values 3.3. Variational Characterization of Singular Values 61 3.3 Variational Characterization of Singular Values Since the singular values are square roots of the eigenvalues of the Heritian atrices A A and

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

The Weierstrass Approximation Theorem

The Weierstrass Approximation Theorem 36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined

More information

Iterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel

Iterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel 1 Iterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel Rai Cohen, Graduate Student eber, IEEE, and Yuval Cassuto, Senior eber, IEEE arxiv:1510.05311v2 [cs.it] 24 ay 2016 Abstract In

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography Tight Bounds for axial Identifiability of Failure Nodes in Boolean Network Toography Nicola Galesi Sapienza Università di Roa nicola.galesi@uniroa1.it Fariba Ranjbar Sapienza Università di Roa fariba.ranjbar@uniroa1.it

More information

arxiv: v1 [cs.ds] 29 Jan 2012

arxiv: v1 [cs.ds] 29 Jan 2012 A parallel approxiation algorith for ixed packing covering seidefinite progras arxiv:1201.6090v1 [cs.ds] 29 Jan 2012 Rahul Jain National U. Singapore January 28, 2012 Abstract Penghui Yao National U. Singapore

More information

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and

More information

Improved Guarantees for Agnostic Learning of Disjunctions

Improved Guarantees for Agnostic Learning of Disjunctions Iproved Guarantees for Agnostic Learning of Disjunctions Pranjal Awasthi Carnegie Mellon University pawasthi@cs.cu.edu Avri Blu Carnegie Mellon University avri@cs.cu.edu Or Sheffet Carnegie Mellon University

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40 On Poset Merging Peter Chen Guoli Ding Steve Seiden Abstract We consider the follow poset erging proble: Let X and Y be two subsets of a partially ordered set S. Given coplete inforation about the ordering

More information

STOPPING SIMULATED PATHS EARLY

STOPPING SIMULATED PATHS EARLY Proceedings of the 2 Winter Siulation Conference B.A.Peters,J.S.Sith,D.J.Medeiros,andM.W.Rohrer,eds. STOPPING SIMULATED PATHS EARLY Paul Glasseran Graduate School of Business Colubia University New Yor,

More information

Distance Optimal Target Assignment in Robotic Networks under Communication and Sensing Constraints

Distance Optimal Target Assignment in Robotic Networks under Communication and Sensing Constraints Distance Optial Target Assignent in Robotic Networks under Counication and Sensing Constraints Jingjin Yu CSAIL @ MIT/MechE @ BU Soon-Jo Chung Petros G. Voulgaris AE @ University of Illinois Supported

More information

The Euler-Maclaurin Formula and Sums of Powers

The Euler-Maclaurin Formula and Sums of Powers DRAFT VOL 79, NO 1, FEBRUARY 26 1 The Euler-Maclaurin Forula and Sus of Powers Michael Z Spivey University of Puget Sound Tacoa, WA 98416 spivey@upsedu Matheaticians have long been intrigued by the su

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

Tight Information-Theoretic Lower Bounds for Welfare Maximization in Combinatorial Auctions

Tight Information-Theoretic Lower Bounds for Welfare Maximization in Combinatorial Auctions Tight Inforation-Theoretic Lower Bounds for Welfare Maxiization in Cobinatorial Auctions Vahab Mirrokni Jan Vondrák Theory Group, Microsoft Dept of Matheatics Research Princeton University Redond, WA 9805

More information

In this chapter, we consider several graph-theoretic and probabilistic models

In this chapter, we consider several graph-theoretic and probabilistic models THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Notes for EE7C (Spring 018: Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee7c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee7c@berkeley.edu October 15,

More information

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,

More information

Necessity of low effective dimension

Necessity of low effective dimension Necessity of low effective diension Art B. Owen Stanford University October 2002, Orig: July 2002 Abstract Practitioners have long noticed that quasi-monte Carlo ethods work very well on functions that

More information

Computational and Statistical Learning Theory

Computational and Statistical Learning Theory Coputational and Statistical Learning Theory TTIC 31120 Prof. Nati Srebro Lecture 2: PAC Learning and VC Theory I Fro Adversarial Online to Statistical Three reasons to ove fro worst-case deterinistic

More information

When Short Runs Beat Long Runs

When Short Runs Beat Long Runs When Short Runs Beat Long Runs Sean Luke George Mason University http://www.cs.gu.edu/ sean/ Abstract What will yield the best results: doing one run n generations long or doing runs n/ generations long

More information

Stochastic Subgradient Methods

Stochastic Subgradient Methods Stochastic Subgradient Methods Lingjie Weng Yutian Chen Bren School of Inforation and Coputer Science University of California, Irvine {wengl, yutianc}@ics.uci.edu Abstract Stochastic subgradient ethods

More information

The Methods of Solution for Constrained Nonlinear Programming

The Methods of Solution for Constrained Nonlinear Programming Research Inventy: International Journal Of Engineering And Science Vol.4, Issue 3(March 2014), PP 01-06 Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.co The Methods of Solution for Constrained

More information

Lower Bounds for Quantized Matrix Completion

Lower Bounds for Quantized Matrix Completion Lower Bounds for Quantized Matrix Copletion Mary Wootters and Yaniv Plan Departent of Matheatics University of Michigan Ann Arbor, MI Eail: wootters, yplan}@uich.edu Mark A. Davenport School of Elec. &

More information

OBJECTIVES INTRODUCTION

OBJECTIVES INTRODUCTION M7 Chapter 3 Section 1 OBJECTIVES Suarize data using easures of central tendency, such as the ean, edian, ode, and idrange. Describe data using the easures of variation, such as the range, variance, and

More information

Boosting with log-loss

Boosting with log-loss Boosting with log-loss Marco Cusuano-Towner Septeber 2, 202 The proble Suppose we have data exaples {x i, y i ) i =... } for a two-class proble with y i {, }. Let F x) be the predictor function with the

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

Keywords: Estimator, Bias, Mean-squared error, normality, generalized Pareto distribution

Keywords: Estimator, Bias, Mean-squared error, normality, generalized Pareto distribution Testing approxiate norality of an estiator using the estiated MSE and bias with an application to the shape paraeter of the generalized Pareto distribution J. Martin van Zyl Abstract In this work the norality

More information

Randomized Accuracy-Aware Program Transformations For Efficient Approximate Computations

Randomized Accuracy-Aware Program Transformations For Efficient Approximate Computations Randoized Accuracy-Aware Progra Transforations For Efficient Approxiate Coputations Zeyuan Allen Zhu Sasa Misailovic Jonathan A. Kelner Martin Rinard MIT CSAIL zeyuan@csail.it.edu isailo@it.edu kelner@it.edu

More information

Homework 3 Solutions CSE 101 Summer 2017

Homework 3 Solutions CSE 101 Summer 2017 Hoework 3 Solutions CSE 0 Suer 207. Scheduling algoriths The following n = 2 jobs with given processing ties have to be scheduled on = 3 parallel and identical processors with the objective of iniizing

More information

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13 CSE55: Randoied Algoriths and obabilistic Analysis May 6, Lecture Lecturer: Anna Karlin Scribe: Noah Siegel, Jonathan Shi Rando walks and Markov chains This lecture discusses Markov chains, which capture

More information

Note on generating all subsets of a finite set with disjoint unions

Note on generating all subsets of a finite set with disjoint unions Note on generating all subsets of a finite set with disjoint unions David Ellis e-ail: dce27@ca.ac.uk Subitted: Dec 2, 2008; Accepted: May 12, 2009; Published: May 20, 2009 Matheatics Subject Classification:

More information

Bootstrapping Dependent Data

Bootstrapping Dependent Data Bootstrapping Dependent Data One of the key issues confronting bootstrap resapling approxiations is how to deal with dependent data. Consider a sequence fx t g n t= of dependent rando variables. Clearly

More information

Efficient Filter Banks And Interpolators

Efficient Filter Banks And Interpolators Efficient Filter Banks And Interpolators A. G. DEMPSTER AND N. P. MURPHY Departent of Electronic Systes University of Westinster 115 New Cavendish St, London W1M 8JS United Kingdo Abstract: - Graphical

More information

Faster and Simpler Algorithms for Multicommodity Flow and other. Fractional Packing Problems. Abstract

Faster and Simpler Algorithms for Multicommodity Flow and other. Fractional Packing Problems. Abstract Faster and Sipler Algoriths for Multicoodity Flow and other Fractional Packing Probles Naveen Garg Jochen Koneann y Abstract This paper considers the proble of designing fast, approxiate, cobinatorial

More information

Fairness via priority scheduling

Fairness via priority scheduling Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation

More information

Combining Classifiers

Combining Classifiers Cobining Classifiers Generic ethods of generating and cobining ultiple classifiers Bagging Boosting References: Duda, Hart & Stork, pg 475-480. Hastie, Tibsharini, Friedan, pg 246-256 and Chapter 10. http://www.boosting.org/

More information

Upper bound on false alarm rate for landmine detection and classification using syntactic pattern recognition

Upper bound on false alarm rate for landmine detection and classification using syntactic pattern recognition Upper bound on false alar rate for landine detection and classification using syntactic pattern recognition Ahed O. Nasif, Brian L. Mark, Kenneth J. Hintz, and Nathalia Peixoto Dept. of Electrical and

More information

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer

More information

Interactive Markov Models of Evolutionary Algorithms

Interactive Markov Models of Evolutionary Algorithms Cleveland State University EngagedScholarship@CSU Electrical Engineering & Coputer Science Faculty Publications Electrical Engineering & Coputer Science Departent 2015 Interactive Markov Models of Evolutionary

More information

Judicious partitions and related problems

Judicious partitions and related problems Judicious partitions and related probles Alex Scott Abstract Many classical partitioning probles in cobinatorics ask for a single quantity to be axiized or iniized over a set of partitions of a cobinatorial

More information

Using EM To Estimate A Probablity Density With A Mixture Of Gaussians

Using EM To Estimate A Probablity Density With A Mixture Of Gaussians Using EM To Estiate A Probablity Density With A Mixture Of Gaussians Aaron A. D Souza adsouza@usc.edu Introduction The proble we are trying to address in this note is siple. Given a set of data points

More information

arxiv: v1 [math.na] 10 Oct 2016

arxiv: v1 [math.na] 10 Oct 2016 GREEDY GAUSS-NEWTON ALGORITHM FOR FINDING SPARSE SOLUTIONS TO NONLINEAR UNDERDETERMINED SYSTEMS OF EQUATIONS MÅRTEN GULLIKSSON AND ANNA OLEYNIK arxiv:6.395v [ath.na] Oct 26 Abstract. We consider the proble

More information

Probability Distributions

Probability Distributions Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples

More information

Distributed Subgradient Methods for Multi-agent Optimization

Distributed Subgradient Methods for Multi-agent Optimization 1 Distributed Subgradient Methods for Multi-agent Optiization Angelia Nedić and Asuan Ozdaglar October 29, 2007 Abstract We study a distributed coputation odel for optiizing a su of convex objective functions

More information

Principles of Optimal Control Spring 2008

Principles of Optimal Control Spring 2008 MIT OpenCourseWare http://ocw.it.edu 16.323 Principles of Optial Control Spring 2008 For inforation about citing these aterials or our Ters of Use, visit: http://ocw.it.edu/ters. 16.323 Lecture 10 Singular

More information

New Slack-Monotonic Schedulability Analysis of Real-Time Tasks on Multiprocessors

New Slack-Monotonic Schedulability Analysis of Real-Time Tasks on Multiprocessors New Slack-Monotonic Schedulability Analysis of Real-Tie Tasks on Multiprocessors Risat Mahud Pathan and Jan Jonsson Chalers University of Technology SE-41 96, Göteborg, Sweden {risat, janjo}@chalers.se

More information

Bayes Decision Rule and Naïve Bayes Classifier

Bayes Decision Rule and Naïve Bayes Classifier Bayes Decision Rule and Naïve Bayes Classifier Le Song Machine Learning I CSE 6740, Fall 2013 Gaussian Mixture odel A density odel p(x) ay be ulti-odal: odel it as a ixture of uni-odal distributions (e.g.

More information

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate The Siplex Method is Strongly Polynoial for the Markov Decision Proble with a Fixed Discount Rate Yinyu Ye April 20, 2010 Abstract In this note we prove that the classic siplex ethod with the ost-negativereduced-cost

More information

Supplementary to Learning Discriminative Bayesian Networks from High-dimensional Continuous Neuroimaging Data

Supplementary to Learning Discriminative Bayesian Networks from High-dimensional Continuous Neuroimaging Data Suppleentary to Learning Discriinative Bayesian Networks fro High-diensional Continuous Neuroiaging Data Luping Zhou, Lei Wang, Lingqiao Liu, Philip Ogunbona, and Dinggang Shen Proposition. Given a sparse

More information

time time δ jobs jobs

time time δ jobs jobs Approxiating Total Flow Tie on Parallel Machines Stefano Leonardi Danny Raz y Abstract We consider the proble of optiizing the total ow tie of a strea of jobs that are released over tie in a ultiprocessor

More information

Mixed Robust/Average Submodular Partitioning

Mixed Robust/Average Submodular Partitioning Mixed Robust/Average Subodular Partitioning Kai Wei 1 Rishabh Iyer 1 Shengjie Wang 2 Wenruo Bai 1 Jeff Biles 1 1 Departent of Electrical Engineering, University of Washington 2 Departent of Coputer Science,

More information

New Bounds for Learning Intervals with Implications for Semi-Supervised Learning

New Bounds for Learning Intervals with Implications for Semi-Supervised Learning JMLR: Workshop and Conference Proceedings vol (1) 1 15 New Bounds for Learning Intervals with Iplications for Sei-Supervised Learning David P. Helbold dph@soe.ucsc.edu Departent of Coputer Science, University

More information

Multi-Dimensional Hegselmann-Krause Dynamics

Multi-Dimensional Hegselmann-Krause Dynamics Multi-Diensional Hegselann-Krause Dynaics A. Nedić Industrial and Enterprise Systes Engineering Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu B. Touri Coordinated Science Laboratory

More information

Curious Bounds for Floor Function Sums

Curious Bounds for Floor Function Sums 1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International

More information

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES

More information

A Markov Framework for the Simple Genetic Algorithm

A Markov Framework for the Simple Genetic Algorithm A arkov Fraework for the Siple Genetic Algorith Thoas E. Davis*, Jose C. Principe Electrical Engineering Departent University of Florida, Gainesville, FL 326 *WL/NGS Eglin AFB, FL32542 Abstract This paper

More information

Supplementary Material for Fast and Provable Algorithms for Spectrally Sparse Signal Reconstruction via Low-Rank Hankel Matrix Completion

Supplementary Material for Fast and Provable Algorithms for Spectrally Sparse Signal Reconstruction via Low-Rank Hankel Matrix Completion Suppleentary Material for Fast and Provable Algoriths for Spectrally Sparse Signal Reconstruction via Low-Ran Hanel Matrix Copletion Jian-Feng Cai Tianing Wang Ke Wei March 1, 017 Abstract We establish

More information

Fixed-to-Variable Length Distribution Matching

Fixed-to-Variable Length Distribution Matching Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de

More information

Computational and Statistical Learning Theory

Computational and Statistical Learning Theory Coputational and Statistical Learning Theory Proble sets 5 and 6 Due: Noveber th Please send your solutions to learning-subissions@ttic.edu Notations/Definitions Recall the definition of saple based Radeacher

More information

FLOWSHOP SCHEDULES WITH SEQUENCE DEPENDENT SETUP TIMES

FLOWSHOP SCHEDULES WITH SEQUENCE DEPENDENT SETUP TIMES Journal of the Operations Research Society of Japan Vo!. 29, No. 3, Septeber 1986 1986 The Operations Research Society of Japan FLOWSHOP SCHEDULES WITH SEQUENCE DEPENDENT SETUP TIMES Jatinder N. D. Gupta

More information

Research Article Rapidly-Converging Series Representations of a Mutual-Information Integral

Research Article Rapidly-Converging Series Representations of a Mutual-Information Integral International Scholarly Research Network ISRN Counications and Networking Volue 11, Article ID 5465, 6 pages doi:1.54/11/5465 Research Article Rapidly-Converging Series Representations of a Mutual-Inforation

More information

On the Existence of Pure Nash Equilibria in Weighted Congestion Games

On the Existence of Pure Nash Equilibria in Weighted Congestion Games MATHEMATICS OF OPERATIONS RESEARCH Vol. 37, No. 3, August 2012, pp. 419 436 ISSN 0364-765X (print) ISSN 1526-5471 (online) http://dx.doi.org/10.1287/oor.1120.0543 2012 INFORMS On the Existence of Pure

More information

Acyclic Colorings of Directed Graphs

Acyclic Colorings of Directed Graphs Acyclic Colorings of Directed Graphs Noah Golowich Septeber 9, 014 arxiv:1409.7535v1 [ath.co] 6 Sep 014 Abstract The acyclic chroatic nuber of a directed graph D, denoted χ A (D), is the iniu positive

More information

Longest Processing Time rule for identical parallel machines revisited

Longest Processing Time rule for identical parallel machines revisited Longest Processing Tie rule for identical parallel achines revisited Federico Della Croce a,b,, Rosario Scataacchia a arxiv:1801.05489v1 [cs.ds] 16 Jan 2018 a Dipartiento di Ingegneria Gestionale e della

More information

Scheduling Contract Algorithms on Multiple Processors

Scheduling Contract Algorithms on Multiple Processors Fro: AAAI Technical Report FS-0-04. Copilation copyright 200, AAAI (www.aaai.org). All rights reserved. Scheduling Contract Algoriths on Multiple Processors Daniel S. Bernstein, Theodore. Perkins, Shloo

More information

Consistent Multiclass Algorithms for Complex Performance Measures. Supplementary Material

Consistent Multiclass Algorithms for Complex Performance Measures. Supplementary Material Consistent Multiclass Algoriths for Coplex Perforance Measures Suppleentary Material Notations. Let λ be the base easure over n given by the unifor rando variable (say U over n. Hence, for all easurable

More information

3.8 Three Types of Convergence

3.8 Three Types of Convergence 3.8 Three Types of Convergence 3.8 Three Types of Convergence 93 Suppose that we are given a sequence functions {f k } k N on a set X and another function f on X. What does it ean for f k to converge to

More information

INDEPENDENT SETS IN HYPERGRAPHS

INDEPENDENT SETS IN HYPERGRAPHS INDEPENDENT SETS IN HYPERGRAPHS Abstract. Many iportant theores and conjectures in cobinatorics, such as the theore of Szeerédi on arithetic progressions and the Erdős-Stone Theore in extreal graph theory,

More information

Improved multiprocessor global schedulability analysis

Improved multiprocessor global schedulability analysis Iproved ultiprocessor global schedulability analysis Sanjoy Baruah The University of North Carolina at Chapel Hill Vincenzo Bonifaci Max-Planck Institut für Inforatik Sebastian Stiller Technische Universität

More information

Testing Properties of Collections of Distributions

Testing Properties of Collections of Distributions Testing Properties of Collections of Distributions Reut Levi Dana Ron Ronitt Rubinfeld April 9, 0 Abstract We propose a fraework for studying property testing of collections of distributions, where the

More information

Sampling How Big a Sample?

Sampling How Big a Sample? C. G. G. Aitken, 1 Ph.D. Sapling How Big a Saple? REFERENCE: Aitken CGG. Sapling how big a saple? J Forensic Sci 1999;44(4):750 760. ABSTRACT: It is thought that, in a consignent of discrete units, a certain

More information

1 Proof of learning bounds

1 Proof of learning bounds COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #4 Scribe: Akshay Mittal February 13, 2013 1 Proof of learning bounds For intuition of the following theore, suppose there exists a

More information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information Cite as: Straub D. (2014). Value of inforation analysis with structural reliability ethods. Structural Safety, 49: 75-86. Value of Inforation Analysis with Structural Reliability Methods Daniel Straub

More information

IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 60, NO. 2, FEBRUARY ETSP stands for the Euclidean traveling salesman problem.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 60, NO. 2, FEBRUARY ETSP stands for the Euclidean traveling salesman problem. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 60, NO., FEBRUARY 015 37 Target Assignent in Robotic Networks: Distance Optiality Guarantees and Hierarchical Strategies Jingjin Yu, Meber, IEEE, Soon-Jo Chung,

More information