Sublinear Algorithms for Big Data
|
|
- August Wright
- 5 years ago
- Views:
Transcription
1 Sublinear Algorithms for Big Data Qin Zhang 1-1
2 2-1 Part 2: Sublinear in Communication
3 Sublinear in communication The model x 1 = x 2 = x 3 = x k = Applicaitons They want to jointly compute f (x 1, x 2,..., x k ) Goal: minimize total bits of communication 3-1 etc.
4 A natrual approach The model x k = x 1 = x 2 = They want to jointly compute f (x 1, x 2,..., x k ) Goal: minimize total bits of communication The natural approach Coordinator x = C S 1 S 2 S 3 S k Each S i computes a skech of its input sk(s i ) and send it to C, and then C computes f (x 1,..., x k ) based on sk(s 1 ),..., sk(s k ) 4-1 The slides from next page are borrowed from Andrew McGregor
5 I. Connectivity II. k-connectivity III. Min-Cut
6 I. Connectivity II. k-connectivity III. Min-Cut Theorem: Testing Connectivity a) Dynamic Graph Stream: O(n polylog n) space. b) Simultaneous Messages: O(polylog n) length.
7 Ingredient 1: Basic Algorithm
8 Ingredient 1: Basic Algorithm Algorithm (Spanning Forest):
9 Ingredient 1: Basic Algorithm Algorithm (Spanning Forest): 1. For each node: pick incident edge
10 Ingredient 1: Basic Algorithm Algorithm (Spanning Forest): 1. For each node: pick incident edge
11 Ingredient 1: Basic Algorithm Algorithm (Spanning Forest): 1. For each node: pick incident edge
12 Ingredient 1: Basic Algorithm Algorithm (Spanning Forest): 1. For each node: pick incident edge
13 Ingredient 1: Basic Algorithm Algorithm (Spanning Forest): 1. For each node: pick incident edge 2.For each connected comp: pick incident edge
14 Ingredient 1: Basic Algorithm Algorithm (Spanning Forest): 1. For each node: pick incident edge 2.For each connected comp: pick incident edge
15 Ingredient 1: Basic Algorithm Algorithm (Spanning Forest): 1. For each node: pick incident edge 2.For each connected comp: pick incident edge
16 Ingredient 1: Basic Algorithm Algorithm (Spanning Forest): 1. For each node: pick incident edge 2.For each connected comp: pick incident edge 3.Repeat until no edges between connected comp.
17 Ingredient 1: Basic Algorithm Algorithm (Spanning Forest): 1. For each node: pick incident edge 2.For each connected comp: pick incident edge 3.Repeat until no edges between connected comp. Lemma: After O(log n) rounds selected edges include spanning forest.
18 Ingredient 2: Sketching Neighborhoods
19 Ingredient 2: Sketching Neighborhoods For node i, let a i be vector indexed by node pairs. Non-zero entries: a i [i,j]=1 if j>i and a i [i,j]=-1 if j<i. {1,2} {1,3} {1,4} {1,5} {2,3} {2,4} {2,5} {3,4} {3,5} {4,5} a 1 = ( ) a 2 = ( )
20 Ingredient 2: Sketching Neighborhoods For node i, let a i be vector indexed by node pairs. Non-zero entries: a i [i,j]=1 if j>i and a i [i,j]=-1 if j<i. {1,2} {1,3} {1,4} {1,5} {2,3} {2,4} {2,5} {3,4} {3,5} {4,5} a 1 = ( ) a 2 = ( )
21 Ingredient 2: Sketching Neighborhoods For node i, let a i be vector indexed by node pairs. Non-zero entries: a i [i,j]=1 if j>i and a i [i,j]=-1 if j<i. {1,2} {1,3} {1,4} {1,5} {2,3} {2,4} {2,5} {3,4} {3,5} {4,5} a 1 = ( ) a 2 = ( ) a 1 +a 2 = ( )
22 Ingredient 2: Sketching Neighborhoods For node i, let a i be vector indexed by node pairs. Non-zero entries: a i [i,j]=1 if j>i and a i [i,j]=-1 if j<i. {1,2} {1,3} {1,4} {1,5} {2,3} {2,4} {2,5} {3,4} {3,5} {4,5} a 1 = ( ) a 2 = ( ) a 1 +a 2 = ( ) Lemma: For any subset of nodes S V, support ( i S a i ) = E(S,V \S)
23 Ingredient 2: Sketching Neighborhoods For node i, let a i be vector indexed by node pairs. Non-zero entries: a i [i,j]=1 if j>i and a i [i,j]=-1 if j<i. {1,2} {1,3} {1,4} {1,5} {2,3} {2,4} {2,5} {3,4} {3,5} {4,5} a 1 = ( ) a 2 = ( ) a 1 +a 2 = ( ) Lemma: For any subset of nodes S V, support ( i S a i ) = E(S,V \S) Lemma: random M: N k with k=o(polylog N) such that for any a N, with high probability Ma e support(a)
24 Recipe: Sketch & Compute on Sketches
25 Recipe: Sketch & Compute on Sketches Sketch: Each player sends Ma j
26 Recipe: Sketch & Compute on Sketches Sketch: Each player sends Ma j Central Player Runs Algorithm in Sketch Space:
27 Recipe: Sketch & Compute on Sketches Sketch: Each player sends Ma j Central Player Runs Algorithm in Sketch Space: Use Ma j to get incident edge on each node j
28 Recipe: Sketch & Compute on Sketches Sketch: Each player sends Ma j Central Player Runs Algorithm in Sketch Space: Use Ma j to get incident edge on each node j For i=2 to log n: To get incident edge on component S V use:
29 Recipe: Sketch & Compute on Sketches Sketch: Each player sends Ma j Central Player Runs Algorithm in Sketch Space: Use Ma j to get incident edge on each node j For i=2 to log n: To get incident edge on component S V use: j S Ma j = M( j S a j )
30 Recipe: Sketch & Compute on Sketches Sketch: Each player sends Ma j Central Player Runs Algorithm in Sketch Space: Use Ma j to get incident edge on each node j For i=2 to log n: To get incident edge on component S V use: a j ) e support( j S a j ) = E(S,V \S) j S Ma j = M( j S
31 Recipe: Sketch & Compute on Sketches Sketch: Each player sends Ma j Central Player Runs Algorithm in Sketch Space: Use Ma j to get incident edge on each node j For i=2 to log n: To get incident edge on component S V use: a j ) e support( j S a j ) = E(S,V \S) j S Ma j = M( j S Detail: Actually each player sends log n indept sketches M 1 a j, M 2 a j,... and central player uses M i a j when emulating i th iteration of the algorithm.
32 I. Connectivity II. k-connectivity III. Min-Cut
33 I. Connectivity II. k-connectivity III. Min-Cut Theorem: Checking every cut has size k a) Dynamic Graph Stream: O(n k polylog n) space. b) Simultaneous Messages: O(k polylog n) length.
34 Ingredient 1: Basic Algorithm
35 Ingredient 1: Basic Algorithm Algorithm (k-connectivity):
36 Ingredient 1: Basic Algorithm Algorithm (k-connectivity): 1. Let F 1 be spanning forest of G(V,E)
37 Ingredient 1: Basic Algorithm Algorithm (k-connectivity): 1. Let F 1 be spanning forest of G(V,E) 2.For i=2 to k: 2.1. Let F i be spanning forest of G(V,E-F F i-1 )
38 Ingredient 1: Basic Algorithm Algorithm (k-connectivity): 1. Let F 1 be spanning forest of G(V,E) 2.For i=2 to k: 2.1. Let F i be spanning forest of G(V,E-F F i-1 ) Lemma: G(V,F F k ) is k-connected iff G(V,E) is.
39 Ingredient 2: Connectivity Sketches
40 Ingredient 2: Connectivity Sketches Sketch: Simultaneously construct k independent connectivity sketches {M 1 G, M 2 G,... M k G}.
41 Ingredient 2: Connectivity Sketches Sketch: Simultaneously construct k independent connectivity sketches {M 1 G, M 2 G,... M k G}. Run Algorithm in Sketch Space: Use M 1 G to find a spanning forest F 1 of G
42 Ingredient 2: Connectivity Sketches Sketch: Simultaneously construct k independent connectivity sketches {M 1 G, M 2 G,... M k G}. Run Algorithm in Sketch Space: Use M 1 G to find a spanning forest F 1 of G Use M 2 G-M 2 F 1 =M 2 (G-F 1 ) to find F 2
43 Ingredient 2: Connectivity Sketches Sketch: Simultaneously construct k independent connectivity sketches {M 1 G, M 2 G,... M k G}. Run Algorithm in Sketch Space: Use M 1 G to find a spanning forest F 1 of G Use M 2 G-M 2 F 1 =M 2 (G-F 1 ) to find F 2 Use M 3 G-M 3 F 1 -M 3 F 2 =M 3 (G-F 1 -F 2 ) to find F 3
44 Ingredient 2: Connectivity Sketches Sketch: Simultaneously construct k independent connectivity sketches {M 1 G, M 2 G,... M k G}. Run Algorithm in Sketch Space: Use M 1 G to find a spanning forest F 1 of G Use M 2 G-M 2 F 1 =M 2 (G-F 1 ) to find F 2 Use M 3 G-M 3 F 1 -M 3 F 2 =M 3 (G-F 1 -F 2 ) to find F 3 etc.
45 I. Connectivity II. k-connectivity III. Min-Cut
46 I. Connectivity II. k-connectivity III. Min-Cut Theorem: (1+%)-approximating minimum cut a) Dynamic Graph Stream: O(% -2 n polylog n) space. b) Simultaneous Messages: O(% -2 polylog n) length.
47 Ingredient 1: Subsampling
48 Ingredient 1: Subsampling Lemma (Karger): Define subgraph G i by sampling edges w/p 2 -i. Then Min-Cut(G) = (1±ǫ) 2 i Min-Cut(G i ) if i < logp
49 Ingredient 1: Subsampling Lemma (Karger): Define subgraph G i by sampling edges w/p 2 -i. Then Min-Cut(G) = (1±ǫ) 2 i Min-Cut(G i ) if i < logp where p = 6ǫ 2 logn/min-cut(g)
50 Ingredient 1: Subsampling Lemma (Karger): Define subgraph G i by sampling edges w/p 2 -i. Then Min-Cut(G) = (1±ǫ) 2 i Min-Cut(G i ) if i < logp where p = 6ǫ 2 logn/min-cut(g) G=G 0
51 Ingredient 1: Subsampling Lemma (Karger): Define subgraph G i by sampling edges w/p 2 -i. Then Min-Cut(G) = (1±ǫ) 2 i Min-Cut(G i ) if i < logp where p = 6ǫ 2 logn/min-cut(g) G=G 0 G 1
52 Ingredient 1: Subsampling Lemma (Karger): Define subgraph G i by sampling edges w/p 2 -i. Then Min-Cut(G) = (1±ǫ) 2 i Min-Cut(G i ) if i < logp where p = 6ǫ 2 logn/min-cut(g) G=G 0 G 1 G 2
53 Ingredient 1: Subsampling Lemma (Karger): Define subgraph Gi by sampling edges w/p 2-i. Then Min-Cut(G ) = (1 ± ǫ) 2i Min-Cut(Gi ) if i < log p where p = 6ǫ 2 log n/min-cut(g) G=G0 G1 G2 G3
54 Ingredient 1: Subsampling Lemma (Karger): Define subgraph Gi by sampling edges w/p 2-i. Then Min-Cut(G ) = (1 ± ǫ) 2i Min-Cut(Gi ) if i < log p where p = 6ǫ 2 log n/min-cut(g) G=G0 G1 G2 G3 Suffices to find Min-Cut(Gi) for some i<-log p*.
55 Ingredient 2: k-connectivity
56 Ingredient 2: k-connectivity k-connectivity: Given G i returns subgraph H i with Min-Cut(G i ) = Min-Cut(H i ) if Min-Cut(G i ) < k
57 Ingredient 2: k-connectivity k-connectivity: Given G i returns subgraph H i with Min-Cut(G i ) = Min-Cut(H i ) if Min-Cut(G i ) < k Lemma: For k = 12% -2 log n, with high probability Min-Cut(G i ) < k for i = logp
58 Ingredient 2: k-connectivity k-connectivity: Given G i returns subgraph H i with Min-Cut(G i ) = Min-Cut(H i ) if Min-Cut(G i ) < k Lemma: For k = 12% -2 log n, with high probability Min-Cut(G i ) < k for i = logp since expectation of Min-Cut(G i ) is < 6% -2 log n.
59 Ingredient 2: k-connectivity k-connectivity: Given G i returns subgraph H i with Min-Cut(G i ) = Min-Cut(H i ) if Min-Cut(G i ) < k Lemma: For k = 12% -2 log n, with high probability Min-Cut(G i ) < k for i = logp since expectation of Min-Cut(G i ) is < 6% -2 log n. Putting it together: Construct H i for all i. Return 2 i Min-Cut(H i ) for smallest i with Min-Cut(H i ) < k.
60 Algorithm for Min-Cut 1. For i = {1,..., 2 log n}, let h i {0, 1} be a uniform hash function. 2. For i = {1,..., 2 log n}, (a) Let G i be the subgraph of G containing edges e such that Π j i h j (e) = 1. (b) Let H i k-connected(g i ) for k = O(ɛ 2 log n). 3. Return 2 j Min-Cut(H j ), where j = min{i : Min-Cut(H i ) < k} 1-1
61 Example: Checking Bipartiteness
62 Example: Checking Bipartiteness Idea: Given G, define G where a node v becomes v 1 and v 2 and edge (u,v) becomes (u 1,v 2 ) and (u 2,v 1 ).
63 Example: Checking Bipartiteness Idea: Given G, define G where a node v becomes v 1 and v 2 and edge (u,v) becomes (u 1,v 2 ) and (u 2,v 1 ).
64 Example: Checking Bipartiteness Idea: Given G, define G where a node v becomes v 1 and v 2 and edge (u,v) becomes (u 1,v 2 ) and (u 2,v 1 ). Lemma: G is bipartite iff number of connected components doubles. Can sketch G implicitly.
65 Example: Checking Bipartiteness Idea: Given G, define G where a node v becomes v 1 and v 2 and edge (u,v) becomes (u 1,v 2 ) and (u 2,v 1 ). Lemma: G is bipartite iff number of connected components doubles. Can sketch G implicitly.
66 Example: Checking Bipartiteness Idea: Given G, define G where a node v becomes v 1 and v 2 and edge (u,v) becomes (u 1,v 2 ) and (u 2,v 1 ). Lemma: G is bipartite iff number of connected components doubles. Can sketch G implicitly. Thm: Õ(n)-dimensional sketch for bipartiteness.
67 Example: Minimum Spanning Tree
68 Example: Minimum Spanning Tree Idea: Let n i be number of connected components if we ignore edges with weight (1+ ) i, then: w(mst) i ɛ(1 + ɛ) i n i (1 + ɛ)w(mst)
69 Example: Minimum Spanning Tree Idea: Let n i be number of connected components if we ignore edges with weight (1+ ) i, then: w(mst) i ɛ(1 + ɛ) i n i (1 + ɛ)w(mst) Thm: Can (1+ ) approximate MST in one-pass dynamic semi-streaming model.
70 Algorithm for Sparsification λ e (G): size of the minimum cut for each edge e = (u, v) in G 1. For i = {1,..., 2 log n}, let h i {0, 1} be a uniform hash function. 2. For i = {1,..., 2 log n}, (a) Let G i be the subgraph of G containing edges e such that Π j i h j (e) = 1. (b) Let H i k-connected(g i ) for k = O(ɛ 2 log 2 n). 3. For each edge e = (u, v), find j = min{i : λ e (H i ) < k}. If e H j, add e to the sparsifier with weight 2 j. Azuma s inequality A sequence of random variables X 1, X 2,... is called a martingale is for all i 1, E[X i+1 X i ] = X i. If X i+1 X i c i almost surely for all i, then 2-1 Pr[ X n X 1 t] < 2e t 2 2 n 1 i=1 c2 i.
Notes on MapReduce Algorithms
Notes on MapReduce Algorithms Barna Saha 1 Finding Minimum Spanning Tree of a Dense Graph in MapReduce We are given a graph G = (V, E) on V = N vertices and E = m N 1+c edges for some constant c > 0. Our
More informationLinear Sketches A Useful Tool in Streaming and Compressive Sensing
Linear Sketches A Useful Tool in Streaming and Compressive Sensing Qin Zhang 1-1 Linear sketch Random linear projection M : R n R k that preserves properties of any v R n with high prob. where k n. M =
More informationCMPSCI611: The Matroid Theorem Lecture 5
CMPSCI611: The Matroid Theorem Lecture 5 We first review our definitions: A subset system is a set E together with a set of subsets of E, called I, such that I is closed under inclusion. This means that
More informationCMSC 858F: Algorithmic Lower Bounds: Fun with Hardness Proofs Fall 2014 Introduction to Streaming Algorithms
CMSC 858F: Algorithmic Lower Bounds: Fun with Hardness Proofs Fall 2014 Introduction to Streaming Algorithms Instructor: Mohammad T. Hajiaghayi Scribe: Huijing Gong November 11, 2014 1 Overview In the
More informationLecture 10. Sublinear Time Algorithms (contd) CSC2420 Allan Borodin & Nisarg Shah 1
Lecture 10 Sublinear Time Algorithms (contd) CSC2420 Allan Borodin & Nisarg Shah 1 Recap Sublinear time algorithms Deterministic + exact: binary search Deterministic + inexact: estimating diameter in a
More informationB669 Sublinear Algorithms for Big Data
B669 Sublinear Algorithms for Big Data Qin Zhang 1-1 2-1 Part 1: Sublinear in Space The model and challenge The data stream model (Alon, Matias and Szegedy 1996) a n a 2 a 1 RAM CPU Why hard? Cannot store
More informationThe space complexity of approximating the frequency moments
The space complexity of approximating the frequency moments Felix Biermeier November 24, 2015 1 Overview Introduction Approximations of frequency moments lower bounds 2 Frequency moments Problem Estimate
More informationSublinear Algorithms Lecture 3. Sofya Raskhodnikova Penn State University
Sublinear Algorithms Lecture 3 Sofya Raskhodnikova Penn State University 1 Graph Properties Testing if a Graph is Connected [Goldreich Ron] Input: a graph G = (V, E) on n vertices in adjacency lists representation
More informationLecture 4. 1 Estimating the number of connected components and minimum spanning tree
CS 59000 CTT Current Topics in Theoretical CS Aug 30, 2012 Lecturer: Elena Grigorescu Lecture 4 Scribe: Pinar Yanardag Delul 1 Estimating the number of connected components and minimum spanning tree In
More informationSpectral Sparsification in Dynamic Graph Streams
Spectral Sparsification in Dynamic Graph Streams Kook Jin Ahn 1, Sudipto Guha 1, and Andrew McGregor 2 1 University of Pennsylvania {kookjin,sudipto}@seas.upenn.edu 2 University of Massachusetts Amherst
More informationDistributed Statistical Estimation of Matrix Products with Applications
Distributed Statistical Estimation of Matrix Products with Applications David Woodruff CMU Qin Zhang IUB PODS 2018 June, 2018 1-1 The Distributed Computation Model p-norms, heavy-hitters,... A {0, 1} m
More informationDistributed Distance-Bounded Network Design Through Distributed Convex Programming
Distributed Distance-Bounded Network Design Through Distributed Convex Programming OPODIS 2017 Michael Dinitz, Yasamin Nazari Johns Hopkins University December 18, 2017 Distance Bounded Network Design
More informationAn Introduction to Matroids & Greedy in Approximation Algorithms
An Introduction to Matroids & Greedy in Approximation Algorithms (Juliàn Mestre, ESA 2006) CoReLab Monday seminar presentation: Evangelos Bampas 1/21 Subset systems CoReLab Monday seminar presentation:
More informationScribes: Po-Hsuan Wei, William Kuzmaul Editor: Kevin Wu Date: October 18, 2016
CS 267 Lecture 7 Graph Spanners Scribes: Po-Hsuan Wei, William Kuzmaul Editor: Kevin Wu Date: October 18, 2016 1 Graph Spanners Our goal is to compress information about distances in a graph by looking
More informationComputing the Entropy of a Stream
Computing the Entropy of a Stream To appear in SODA 2007 Graham Cormode graham@research.att.com Amit Chakrabarti Dartmouth College Andrew McGregor U. Penn / UCSD Outline Introduction Entropy Upper Bound
More informationRecall: Matchings. Examples. K n,m, K n, Petersen graph, Q k ; graphs without perfect matching
Recall: Matchings A matching is a set of (non-loop) edges with no shared endpoints. The vertices incident to an edge of a matching M are saturated by M, the others are unsaturated. A perfect matching of
More informationGraph & Geometry Problems in Data Streams
Graph & Geometry Problems in Data Streams 2009 Barbados Workshop on Computational Complexity Andrew McGregor Introduction Models: Graph Streams: Stream of edges E = {e 1, e 2,..., e m } describe a graph
More informationData Streams & Communication Complexity
Data Streams & Communication Complexity Lecture 1: Simple Stream Statistics in Small Space Andrew McGregor, UMass Amherst 1/25 Data Stream Model Stream: m elements from universe of size n, e.g., x 1, x
More informationCSC2420 Fall 2012: Algorithm Design, Analysis and Theory Lecture 9
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Lecture 9 Allan Borodin March 13, 2016 1 / 33 Lecture 9 Announcements 1 I have the assignments graded by Lalla. 2 I have now posted five questions
More informationScheduling on Unrelated Parallel Machines. Approximation Algorithms, V. V. Vazirani Book Chapter 17
Scheduling on Unrelated Parallel Machines Approximation Algorithms, V. V. Vazirani Book Chapter 17 Nicolas Karakatsanis, 2008 Description of the problem Problem 17.1 (Scheduling on unrelated parallel machines)
More informationAnalyzing Massive Graphs in the Semi-streaming Model
University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations 1-1-2013 Analyzing Massive Graphs in the Semi-streaming Model Kook Jin Ahn University of Pennsylvania, kookjin@seas.upenn.edu
More informationImproved Algorithms for Distributed Entropy Monitoring
Improved Algorithms for Distributed Entropy Monitoring Jiecao Chen Indiana University Bloomington jiecchen@umail.iu.edu Qin Zhang Indiana University Bloomington qzhangcs@indiana.edu Abstract Modern data
More informationMa/CS 6b Class 25: Error Correcting Codes 2
Ma/CS 6b Class 25: Error Correcting Codes 2 By Adam Sheffer Recall: Codes V n the set of binary sequences of length n. For example, V 3 = 000,001,010,011,100,101,110,111. Codes of length n are subsets
More informationLecture 3 Sept. 4, 2014
CS 395T: Sublinear Algorithms Fall 2014 Prof. Eric Price Lecture 3 Sept. 4, 2014 Scribe: Zhao Song In today s lecture, we will discuss the following problems: 1. Distinct elements 2. Turnstile model 3.
More information15.1 Matching, Components, and Edge cover (Collaborate with Xin Yu)
15.1 Matching, Components, and Edge cover (Collaborate with Xin Yu) First show l = c by proving l c and c l. For a maximum matching M in G, let V be the set of vertices covered by M. Since any vertex in
More information1 Approximate Quantiles and Summaries
CS 598CSC: Algorithms for Big Data Lecture date: Sept 25, 2014 Instructor: Chandra Chekuri Scribe: Chandra Chekuri Suppose we have a stream a 1, a 2,..., a n of objects from an ordered universe. For simplicity
More information5 Flows and cuts in digraphs
5 Flows and cuts in digraphs Recall that a digraph or network is a pair G = (V, E) where V is a set and E is a multiset of ordered pairs of elements of V, which we refer to as arcs. Note that two vertices
More informationLower Bound Techniques for Multiparty Communication Complexity
Lower Bound Techniques for Multiparty Communication Complexity Qin Zhang Indiana University Bloomington Based on works with Jeff Phillips, Elad Verbin and David Woodruff 1-1 The multiparty number-in-hand
More informationLecture 3. 1 Polynomial-time algorithms for the maximum flow problem
ORIE 633 Network Flows August 30, 2007 Lecturer: David P. Williamson Lecture 3 Scribe: Gema Plaza-Martínez 1 Polynomial-time algorithms for the maximum flow problem 1.1 Introduction Let s turn now to considering
More informationCS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs. Instructor: Shaddin Dughmi
CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs Instructor: Shaddin Dughmi Outline 1 Introduction 2 Shortest Path 3 Algorithms for Single-Source
More informationLecture 6: Expander Codes
CS369E: Expanders May 2 & 9, 2005 Lecturer: Prahladh Harsha Lecture 6: Expander Codes Scribe: Hovav Shacham In today s lecture, we will discuss the application of expander graphs to error-correcting codes.
More informationDiscrete Optimization 2010 Lecture 2 Matroids & Shortest Paths
Matroids Shortest Paths Discrete Optimization 2010 Lecture 2 Matroids & Shortest Paths Marc Uetz University of Twente m.uetz@utwente.nl Lecture 2: sheet 1 / 25 Marc Uetz Discrete Optimization Matroids
More informationTopics in Approximation Algorithms Solution for Homework 3
Topics in Approximation Algorithms Solution for Homework 3 Problem 1 We show that any solution {U t } can be modified to satisfy U τ L τ as follows. Suppose U τ L τ, so there is a vertex v U τ but v L
More informationarxiv: v1 [cs.dc] 4 Oct 2018
Distributed Reconfiguration of Maximal Independent Sets Keren Censor-Hillel 1 and Mikael Rabie 2 1 Department of Computer Science, Technion, Israel, ckeren@cs.technion.ac.il 2 Aalto University, Helsinki,
More informationGraph Sparsification I : Effective Resistance Sampling
Graph Sparsification I : Effective Resistance Sampling Nikhil Srivastava Microsoft Research India Simons Institute, August 26 2014 Graphs G G=(V,E,w) undirected V = n w: E R + Sparsification Approximate
More informationChapter 7 Network Flow Problems, I
Chapter 7 Network Flow Problems, I Network flow problems are the most frequently solved linear programming problems. They include as special cases, the assignment, transportation, maximum flow, and shortest
More informationCommunication Complexity
Communication Complexity Jaikumar Radhakrishnan School of Technology and Computer Science Tata Institute of Fundamental Research Mumbai 31 May 2012 J 31 May 2012 1 / 13 Plan 1 Examples, the model, the
More informationarxiv: v1 [cs.dc] 22 May 2017
Symmetry Breaking in the Congest Model: Timeand Message-Efficient Algorithms for Ruling Sets Shreyas Pai, Gopal Pandurangan 2, Sriram V. Pemmaraju, Talal Riaz, and Peter Robinson 3 arxiv:705.0786v [cs.dc]
More informationGraph Sparsifiers. Smaller graph that (approximately) preserves the values of some set of graph parameters. Graph Sparsification
Graph Sparsifiers Smaller graph that (approximately) preserves the values of some set of graph parameters Graph Sparsifiers Spanners Emulators Small stretch spanning trees Vertex sparsifiers Spectral sparsifiers
More informationMinimal Spanning Tree From a Minimum Dominating Set
Minimal Spanning Tree From a Minimum Dominating Set M. YAMUNA VIT University School of advanced sciences Vellore, Tamilnadu INDIA myamuna@vit.ac.in K. KARTHIKA VIT University School of advanced sciences
More informationCS 6820 Fall 2014 Lectures, October 3-20, 2014
Analysis of Algorithms Linear Programming Notes CS 6820 Fall 2014 Lectures, October 3-20, 2014 1 Linear programming The linear programming (LP) problem is the following optimization problem. We are given
More informationSeparating Hierarchical and General Hub Labelings
Separating Hierarchical and General Hub Labelings Andrew V. Goldberg 1 Ilya Razenshteyn 2 Ruslan Savchenko 3 1 Microsoft Research Silicon Valley 2 CSAIL, MIT 3 Moscow State University June 23, 2013 Overview
More informationProject in Computational Game Theory: Communities in Social Networks
Project in Computational Game Theory: Communities in Social Networks Eldad Rubinstein November 11, 2012 1 Presentation of the Original Paper 1.1 Introduction In this section I present the article [1].
More informationDistributed primal-dual approximation algorithms for network design problems
Distributed primal-dual approximation algorithms for network design problems Zeev Nutov The Open University of Israel nutov@openu.ac.il Amir Sadeh The Open University of Israel amirsadeh@yahoo.com Abstract
More informationApproximating matching size from random streams
Approximating matching size from random streams Michael Kapralov Sanjeev Khanna Madhu Sudan August 22, 2014 Abstract We present a streaming algorithm that makes one pass over the edges of an unweighted
More informationLinear Programming. Scheduling problems
Linear Programming Scheduling problems Linear programming (LP) ( )., 1, for 0 min 1 1 1 1 1 11 1 1 n i x b x a x a b x a x a x c x c x z i m n mn m n n n n! = + + + + + + = Extreme points x ={x 1,,x n
More informationPCPs and Inapproximability Gap-producing and Gap-Preserving Reductions. My T. Thai
PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions My T. Thai 1 1 Hardness of Approximation Consider a maximization problem Π such as MAX-E3SAT. To show that it is NP-hard to approximation
More informationLecture 4: An FPTAS for Knapsack, and K-Center
Comp 260: Advanced Algorithms Tufts University, Spring 2016 Prof. Lenore Cowen Scribe: Eric Bailey Lecture 4: An FPTAS for Knapsack, and K-Center 1 Introduction Definition 1.0.1. The Knapsack problem (restated)
More informationCombinatorial Optimization
Combinatorial Optimization 2017-2018 1 Maximum matching on bipartite graphs Given a graph G = (V, E), find a maximum cardinal matching. 1.1 Direct algorithms Theorem 1.1 (Petersen, 1891) A matching M is
More informationTesting that distributions are close
Tugkan Batu, Lance Fortnow, Ronitt Rubinfeld, Warren D. Smith, Patrick White May 26, 2010 Anat Ganor Introduction Goal Given two distributions over an n element set, we wish to check whether these distributions
More information6.842 Randomness and Computation March 3, Lecture 8
6.84 Randomness and Computation March 3, 04 Lecture 8 Lecturer: Ronitt Rubinfeld Scribe: Daniel Grier Useful Linear Algebra Let v = (v, v,..., v n ) be a non-zero n-dimensional row vector and P an n n
More informationLeveraging Big Data: Lecture 13
Leveraging Big Data: Lecture 13 http://www.cohenwang.com/edith/bigdataclass2013 Instructors: Edith Cohen Amos Fiat Haim Kaplan Tova Milo What are Linear Sketches? Linear Transformations of the input vector
More informationDeclaring Independence via the Sketching of Sketches. Until August Hire Me!
Declaring Independence via the Sketching of Sketches Piotr Indyk Andrew McGregor Massachusetts Institute of Technology University of California, San Diego Until August 08 -- Hire Me! The Problem The Problem
More informationCS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs. Instructor: Shaddin Dughmi
CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs Instructor: Shaddin Dughmi Outline 1 Introduction 2 Shortest Path 3 Algorithms for Single-Source Shortest
More informationLinear Secret-Sharing Schemes for Forbidden Graph Access Structures
Linear Secret-Sharing Schemes for Forbidden Graph Access Structures Amos Beimel 1, Oriol Farràs 2, Yuval Mintz 1, and Naty Peter 1 1 Ben Gurion University of the Negev, Be er Sheva, Israel 2 Universitat
More informationA Lower Bound for the Distributed Lovász Local Lemma
A Lower Bound for the Distributed Lovász Local Lemma Sebastian Brandt, Orr Fischer, Juho Hirvonen, Barbara Keller, Tuomo Lempiäinen, Joel Rybicki, Jukka Suomela, Jara Uitto Aalto University, Comerge AG,
More informationAlgorithms Design & Analysis. Approximation Algorithm
Algorithms Design & Analysis Approximation Algorithm Recap External memory model Merge sort Distribution sort 2 Today s Topics Hard problem Approximation algorithms Metric traveling salesman problem A
More information1 Estimating Frequency Moments in Streams
CS 598CSC: Algorithms for Big Data Lecture date: August 28, 2014 Instructor: Chandra Chekuri Scribe: Chandra Chekuri 1 Estimating Frequency Moments in Streams A significant fraction of streaming literature
More informationDecomposition of random graphs into complete bipartite graphs
Decomposition of random graphs into complete bipartite graphs Fan Chung Xing Peng Abstract We consider the problem of partitioning the edge set of a graph G into the minimum number τg) of edge-disjoint
More informationMinimum Spanning Trees
Lecture 6 Minimum Spanning Trees In this lecture, we study another classic graph problem from the distributed point of view: minimum spanning tree construction. Definition 6.1 (Minimum Spanning Tree (MST)).
More informationArthur-Merlin Streaming Complexity
Weizmann Institute of Science Joint work with Ran Raz Data Streams The data stream model is an abstraction commonly used for algorithms that process network traffic using sublinear space. A data stream
More informationCSE 190, Great ideas in algorithms: Pairwise independent hash functions
CSE 190, Great ideas in algorithms: Pairwise independent hash functions 1 Hash functions The goal of hash functions is to map elements from a large domain to a small one. Typically, to obtain the required
More informationTheory of Computer Science to Msc Students, Spring Lecture 2
Theory of Computer Science to Msc Students, Spring 2007 Lecture 2 Lecturer: Dorit Aharonov Scribe: Bar Shalem and Amitai Gilad Revised: Shahar Dobzinski, March 2007 1 BPP and NP The theory of computer
More informationLower Bounds for Quantile Estimation in Random-Order and Multi-Pass Streaming
Lower Bounds for Quantile Estimation in Random-Order and Multi-Pass Streaming Sudipto Guha 1 and Andrew McGregor 2 1 University of Pennsylvania sudipto@cis.upenn.edu 2 University of California, San Diego
More informationAverage-case Analysis for Combinatorial Problems,
Average-case Analysis for Combinatorial Problems, with s and Stochastic Spanning Trees Mathematical Sciences, Carnegie Mellon University February 2, 2006 Outline Introduction 1 Introduction Combinatorial
More informationACO Comprehensive Exam October 14 and 15, 2013
1. Computability, Complexity and Algorithms (a) Let G be the complete graph on n vertices, and let c : V (G) V (G) [0, ) be a symmetric cost function. Consider the following closest point heuristic for
More informationCS151 Complexity Theory. Lecture 13 May 15, 2017
CS151 Complexity Theory Lecture 13 May 15, 2017 Relationship to other classes To compare to classes of decision problems, usually consider P #P which is a decision class easy: NP, conp P #P easy: P #P
More informationRandomness-Optimal Oblivious Sampling
Randomness-Optimal Oblivious Sampling David Zuckerman December 12, 1997 Abstract We present the first efficient oblivious sampler that uses an optimal number of random bits, up to an arbitrary constant
More informationGraph-theoretic Problems
Graph-theoretic Problems Parallel algorithms for fundamental graph-theoretic problems: We already used a parallelization of dynamic programming to solve the all-pairs-shortest-path problem. Here we are
More informationGeometric Optimization Problems over Sliding Windows
Geometric Optimization Problems over Sliding Windows Timothy M. Chan and Bashir S. Sadjad School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada {tmchan,bssadjad}@uwaterloo.ca
More informationHierarchies. 1. Lovasz-Schrijver (LS), LS+ 2. Sherali Adams 3. Lasserre 4. Mixed Hierarchy (recently used) Idea: P = conv(subset S of 0,1 n )
Hierarchies Today 1. Some more familiarity with Hierarchies 2. Examples of some basic upper and lower bounds 3. Survey of recent results (possible material for future talks) Hierarchies 1. Lovasz-Schrijver
More informationDiscrete Wiskunde II. Lecture 5: Shortest Paths & Spanning Trees
, 2009 Lecture 5: Shortest Paths & Spanning Trees University of Twente m.uetz@utwente.nl wwwhome.math.utwente.nl/~uetzm/dw/ Shortest Path Problem "#$%&'%()*%"()$#+,&- Given directed "#$%&'()*+,%+('-*.#/'01234564'.*,'7+"-%/8',&'5"4'84%#3
More informationAlgorithms for Querying Noisy Distributed/Streaming Datasets
Algorithms for Querying Noisy Distributed/Streaming Datasets Qin Zhang Indiana University Bloomington Sublinear Algo Workshop @ JHU Jan 9, 2016 1-1 The big data models The streaming model (Alon, Matias
More informationStreaming and communication complexity of Hamming distance
Streaming and communication complexity of Hamming distance Tatiana Starikovskaya IRIF, Université Paris-Diderot (Joint work with Raphaël Clifford, ICALP 16) Approximate pattern matching Problem Pattern
More informationSolving the Induced Subgraph problem in the randomized multiparty simultaneous messages model
Solving the Induced Subgraph problem in the randomized multiparty simultaneous messages model J. Kari 1, M. Matamala 2, I. Rapaport 2, and V. Salo 2 1 Department of Mathematics and Statistics, University
More informationLecture 5: Probabilistic tools and Applications II
T-79.7003: Graphs and Networks Fall 2013 Lecture 5: Probabilistic tools and Applications II Lecturer: Charalampos E. Tsourakakis Oct. 11, 2013 5.1 Overview In the first part of today s lecture we will
More informationStanford University CS254: Computational Complexity Handout 8 Luca Trevisan 4/21/2010
Stanford University CS254: Computational Complexity Handout 8 Luca Trevisan 4/2/200 Counting Problems Today we describe counting problems and the class #P that they define, and we show that every counting
More informationApproximation Algorithms and Hardness of Approximation. IPM, Jan Mohammad R. Salavatipour Department of Computing Science University of Alberta
Approximation Algorithms and Hardness of Approximation IPM, Jan 2006 Mohammad R. Salavatipour Department of Computing Science University of Alberta 1 Introduction For NP-hard optimization problems, we
More informationStreaming Graph Computations with a Helpful Advisor. Justin Thaler Graham Cormode and Michael Mitzenmacher
Streaming Graph Computations with a Helpful Advisor Justin Thaler Graham Cormode and Michael Mitzenmacher Thanks to Andrew McGregor A few slides borrowed from IITK Workshop on Algorithms for Processing
More informationA bad example for the iterative rounding method for mincost k-connected spanning subgraphs
A bad example for the iterative rounding method for mincost k-connected spanning subgraphs Ashkan Aazami a, Joseph Cheriyan b,, Bundit Laekhanukit c a Dept. of Comb. & Opt., U. Waterloo, Waterloo ON Canada
More informationOn the communication and streaming complexity of maximum bipartite matching
On the communication and streaming complexity of maximum bipartite matching Ashish Goel Michael Kapralov Sanjeev Khanna November 27, 2 Abstract Consider the following communication problem. Alice holds
More informationSome notes on streaming algorithms continued
U.C. Berkeley CS170: Algorithms Handout LN-11-9 Christos Papadimitriou & Luca Trevisan November 9, 016 Some notes on streaming algorithms continued Today we complete our quick review of streaming algorithms.
More informationLinear sketching for Functions over Boolean Hypercube
Linear sketching for Functions over Boolean Hypercube Grigory Yaroslavtsev (Indiana University, Bloomington) http://grigory.us with Sampath Kannan (U. Pennsylvania), Elchanan Mossel (MIT) and Swagato Sanyal
More informationSolving the MWT. Recall the ILP for the MWT. We can obtain a solution to the MWT problem by solving the following ILP:
Solving the MWT Recall the ILP for the MWT. We can obtain a solution to the MWT problem by solving the following ILP: max subject to e i E ω i x i e i C E x i {0, 1} x i C E 1 for all critical mixed cycles
More informationMA015: Graph Algorithms
MA015 3. Minimum cuts 1 MA015: Graph Algorithms 3. Minimum cuts (in undirected graphs) Jan Obdržálek obdrzalek@fi.muni.cz Faculty of Informatics, Masaryk University, Brno All pairs flows/cuts MA015 3.
More informationDominating Set. Chapter 26
Chapter 26 Dominating Set In this chapter we present another randomized algorithm that demonstrates the power of randomization to break symmetries. We study the problem of finding a small dominating set
More informationDominating Set. Chapter Sequential Greedy Algorithm 294 CHAPTER 26. DOMINATING SET
294 CHAPTER 26. DOMINATING SET 26.1 Sequential Greedy Algorithm Chapter 26 Dominating Set Intuitively, to end up with a small dominating set S, nodes in S need to cover as many neighbors as possible. It
More informationOptimal Tree-decomposition Balancing and Reachability on Low Treewidth Graphs
Optimal Tree-decomposition Balancing and Reachability on Low Treewidth Graphs Krishnendu Chatterjee Rasmus Ibsen-Jensen Andreas Pavlogiannis IST Austria Abstract. We consider graphs with n nodes together
More informationSpectral Graph Theory and You: Matrix Tree Theorem and Centrality Metrics
Spectral Graph Theory and You: and Centrality Metrics Jonathan Gootenberg March 11, 2013 1 / 19 Outline of Topics 1 Motivation Basics of Spectral Graph Theory Understanding the characteristic polynomial
More informationQuantum algorithms based on span programs
Quantum algorithms based on span programs Ben Reichardt IQC, U Waterloo [arxiv:0904.2759] Model: Complexity measure: Quantum algorithms Black-box query complexity Span programs Witness size [KW 93] [RŠ
More information/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Matroids and Greedy Algorithms Date: 10/31/16
60.433/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Matroids and Greedy Algorithms Date: 0/3/6 6. Introduction We talked a lot the last lecture about greedy algorithms. While both Prim
More informationGeometric Steiner Trees
Geometric Steiner Trees From the book: Optimal Interconnection Trees in the Plane By Marcus Brazil and Martin Zachariasen Part 3: Computational Complexity and the Steiner Tree Problem Marcus Brazil 2015
More informationAn Improved Approximation Algorithm for Requirement Cut
An Improved Approximation Algorithm for Requirement Cut Anupam Gupta Viswanath Nagarajan R. Ravi Abstract This note presents improved approximation guarantees for the requirement cut problem: given an
More information2 Notation and Preliminaries
On Asymmetric TSP: Transformation to Symmetric TSP and Performance Bound Ratnesh Kumar Haomin Li epartment of Electrical Engineering University of Kentucky Lexington, KY 40506-0046 Abstract We show that
More informationGeometric Constraints II
Geometric Constraints II Realizability, Rigidity and Related theorems. Embeddability of Metric Spaces Section 1 Given the matrix D d i,j 1 i,j n corresponding to a metric space, give conditions under which
More informationRigidity of Graphs and Frameworks
Rigidity of Graphs and Frameworks Rigid Frameworks The Rigidity Matrix and the Rigidity Matroid Infinitesimally Rigid Frameworks Rigid Graphs Rigidity in R d, d = 1,2 Global Rigidity in R d, d = 1,2 1
More informationStreaming Lower Bounds for Approximating MAX-CUT
Streaming Lower Bounds for Approximating MAX-CUT Michael Kapralov Sanjeev Khanna Madhu Sudan Abstract We consider the problem of estimating the value of max cut in a graph in the streaming model of computation.
More informationTree-width and planar minors
Tree-width and planar minors Alexander Leaf and Paul Seymour 1 Princeton University, Princeton, NJ 08544 May 22, 2012; revised March 18, 2014 1 Supported by ONR grant N00014-10-1-0680 and NSF grant DMS-0901075.
More informationAntimagic Properties of Graphs with Large Maximum Degree
Antimagic Properties of Graphs with Large Maximum Degree Zelealem B. Yilma Department of Mathematical Sciences Carnegie Mellon University Pittsburgh, PA 1513 E-mail: zyilma@andrew.cmu.edu July 6, 011 Abstract
More informationConstant Arboricity Spectral Sparsifiers
Constant Arboricity Spectral Sparsifiers arxiv:1808.0566v1 [cs.ds] 16 Aug 018 Timothy Chu oogle timchu@google.com Jakub W. Pachocki Carnegie Mellon University pachocki@cs.cmu.edu August 0, 018 Abstract
More information