On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation

Size: px
Start display at page:

Download "On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation"

Transcription

1 journal of coplexity 6, (2000) doi:0.006jco , available online at on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation Mehran Mesbahi Departent of Aerospace Engineering and Mechanics, University of Minnesota, Minneapolis, Minnesota and George P. Papavassilopoulos 2 Departent of Electrical Engineering-Systes, University of Southern California, Los Angeles, California Received January 20, 999 We consider the proble of approxiating the axiu of the su of Lipschitz continuous functions. The values of each function are assued to reside at a different eory eleent. A single processing eleent is designated to approxiate the value of the axiu of the su of these functions by adopting a certain protocol. Under certain assuptions on the class of perissible protocols, we obtain the iniu nuber of real-valued essages that has to be transferred between the processing eleent and the eory eleents in order to find the desired approxiation of this axiu. In particular, we exploit the optiality of the nonadaptive protocols for the Lipschitzian optiization proble, studied in the context of inforation-based coplexity, to prove our ain result Acadeic Press Key Words: Lipschitzian optiization; counication coplexity; coordinated odel of coputation.. INTRODUCTION Five people are each given a nuber between and 00. A questioner coes along and wants to figure out the su of these five nubers by To who correspondence should be addressed. E-ail: esbahiae.un.edu. 2 E-ail: yorgosbode.usc.edu X Copyright 2000 by Acadeic Press All rights of reproduction in any for reserved.

2 460 MESBAHI AND PAPAVASSILOPOULOS asking each person questions of the type: ``Is your nuber greater than or equal to x?,'' for soe integer x. In return, the questioner expects to receive a ``yes'' or a ``no'' response fro the participant. The questioner has been told by an inforer that the su of the nubers held by the participants does not exceed 00. Suppose that the questioner asks the first person whether the nuber held by hi or her is greater than or equal to 75 and receives in return a ``yes'' answer. Knowing that the total su is not greater than or equal to 00, it would not be wise for the questioner to ask the second person ``Is your nuber greater than or equal to 75?'' since the reply is definitely a ``no.'' In fact, the questioner can use the previous responses to forulate the question for the next person in soe intelligent anner. In a sense, the questioner can adapt the next question by incorporating the answers for the previous questions in its forulation. It is also conceivable that the questioner first figures out the exact nuber that each person has, without considering other people's nubers, and then sus the up. In this case, the total nuber of questions that the questioner has to ask would just be five ties the nuber of questions needed to figure out one person's nuber. In fact one ight suspect that the questioner cannot really do better than this, in ters of the iniizing the total nuber of questions asked, at least in the worst case. In this paper we consider a siilar proble. There are function storage devices, or eory eleents, storing the values of the functions f,..., f, and each function is known to be in the class of Lipschitz continuous functions with odulus k; the class of such functions will be denoted by F k. There is a processing eleent which is designated to approxiate the value of z :=ax x j= f j(x) by asking each eory eleent about the value of the function residing in that eory eleent, at a given point. We are interested to know, under the above restrictions, the iniu nuber of questions that the processing eleent has to ask the eory eleents, in order to be able to approxiate the value of z within an accuracy 0<=<, for all possible f j # F k ( j=,..., ). Although in this case, the processing eleent cannot find z by figuring out the axiu of each function f j ( j=,..., ) separately, our result indicates that in ters of the total nuber of questions needed to be asked fro the eory eleents, the processing eleent cannot do any better than this, at least in the worst case. The iniu nuber of questions needed to approxiate the axiu of the su of functions in F k as described above, shall be referred to as the counication coplexity of the k-lipschitzian optiization for the coordinated odel of coputation. The proble of deterining the counication coplexity is iportant in several settings. First, is the area of parallel and distributed coputation (Bertsekas and Tsitsiklis, 989; Hwang, 994). In this setting, one can

3 LIPSCHITZIAN OPTIMIZATION 46 consider the processors as having partial inforation regarding the coputational task at a given tie, and hence they counicate aong theselves in order to solve the proble in a distributed anner. It is believed that the aount of counication needed to coplete the coputation in the distributed anner is one of the ain factors that deterine the efficiency of the parallelis eployed (Gentlean, 978; Saad 986). The counication requireents becoe very iportant in the context of very large integrated circuits (VLSI) (Aho et al., 983; Ullan, 984). In particular, it is known that the nuber of bits that is needed to be exchanged between the different parts of the chip is related to the product of the area of the chip and the coputation tie (Ullan, 984). The issue of counication coplexity is also of relevance in the setting of distributed data acquisition and control. In this case, one can consider the processing eleent as the controller which has access to the state of the environent through two or ore sensors. The sensors, due to their liited coputational power can only send functionals of the state of the environent upon receiving a correspondence fro the controller. If the counication aong the controller and the sensors is costly (for exaple due to the congestion of the network), the issue of counication coplexity becoes iportant. In this paper, we will show that for the Lipschitzian optiization proble, the ethodology developed in the context of inforation-based coplexity can be extended to the coordinated odel of coputation. This will be done ainly by utilizing the results pertaining to the optiality of the nonadaptive protocols for the case where there is a single pair of processing and eory eleents. The organization of the paper is as follows. We first provide a very brief survey of the works that have been done in the area of counication coplexity. In Section 2, we provide the iniu aount of notation and preliinaries which enables us to state, ore forally, the proble and the ain result discussed in the paper. Section 3 is devoted to the proof of the ain result... Related Works The study of counication coplexity was initiated by Abelson (980) where functions of the for f: R _R n R, f # C 2 (the class of twice continuously differentiable functions) were studied. In this setting, x # R and y # R n are known by different processors, and each processor can transit functions of their data which are also assued to be in C 2. The counication coplexity is defined to be the iniu nuber of essages that has to be exchanged between the processors in order to exactly evaluate f(x, y). It should be noted that functions considered by Abelson (980) have a very special structure; naely, it is assued that there exists a counication

4 462 MESBAHI AND PAPAVASSILOPOULOS protocol which can be eployed by the processors in order to obtain the exact value of f(x, y). The work that has been done in the spirit of Abelson (980) includes that of Luo and Tsitsiklis (99). Another strea of work on the counication coplexity was initiated by the work of Yao (979). This line of work is concerned with obtaining the counication coplexity of evaluating a Boolean function f(x, y), where f: X_Y [0, ], and X and Y are finite sets. It is assued that x # X and y # Y are known by two different processors. The counication coplexity is then defined to be the iniu nuber of bits that has to be exchanged between the processors in order to exactly evaluate f(x, y), for all possible values of x # X and y # Y. In this setting, X and Y have a siple structure and the counication coplexity, in essence, is an indication of the behavior of f on the lattice X_Y. We refer the reader to the survey of Orlitsky and El Gaal (988) for a suary of this approach and any possible extensions. More closely related to the approach of the present paper is the work done in the area of inforation-based coplexity (Traub et al., 988; Neirovsky and Yudin, 983), and in particular the work of Sukharev (992). This line of work is concerned with the efficiency of algoriths for probles defined on the infinite-diensional spaces, such as the function integration proble, approxiation, and optiization. In this context, the processing eleent can obtain the values of the function (a eber of an infinite-diensional space) through an oracle. In general, for these probles only approxiate solutions can be obtained. Therefore there is a presence of the paraeter = in all the coplexity results. It turns out that in any situations, the cost of the oracle calls doinates the cost of the entire algorith. One is thus led to consider the counication coplexity, i.e., the iniu nuber of oracle calls needed by the algorith in order to be able to approxiate the solution (the iniizer, the value of the integral, etc.) within an error =. The work of Sukharev (992) is concerned with the sae issue, but his approach relies ore heavily on the iniax odels and various notions of adaptive algoriths. In fact in the introduction of Sukharev (992) it is stated that the ain feature of the work is that ``the process of coputation has been regarded as a controlled process and the algorith as a control strategy.'' Consequently, the optial algoriths are obtained by eploying ethods of operations research, gae theory, and syste analysis. 2. PRELIMINARIES AND THE MAIN RESULT In this section, we provide certain notions which enable us to state the proble considered in the paper ore forally. We then state the ain result.

5 LIPSCHITZIAN OPTIMIZATION 463 FIG.. The coordinated odel of coputation. We consider a odel of coputation, referred to as the coordinated odel of coputation, where a single processing eleent (PE) is connected to eory eleents (MEs) via dedicated channels. This odel is shown in Fig.. Each eory eleent ME j has access to the value of the Lipschitz continuous function f j ( j=,..., ), with Lipschitz odulus k, at an arbitrary point of its doain. Let us denote by F k the class of Lipschitz continuous functions with constant k, defined on the p-diensional unit cube [0, ] p. The value of f j at the point x will be denoted by x( f j ), j=,...,. ThePE is allowed to specify x to each ME in an arbitrary anner and receive in return the value x( f j ) with infinite precision. The operation of specifying x by the PE and receiving the value x( f j ) fro the ME j is counted as one counication operation. The objective of the PE is to approxiate : x #[0,] p j= z := ax f j (x) (2.) within an accuracy 0<=<. Let us denote the total inforation gathered by the PE after n such inforation gathering operations by I n ; i.e., I n contains the values of different f j 's at various points of the doain [0, ] p. The PE then applies a functional ; to I n and coes up with an estiate of z (2.). We shall refer to ; as the terinal operation. The process of gathering the inforation I n, and applying the terinal operation ;, will be referred to as the counication protocol. Under the aforeentioned restrictions on the counication protocol, let us define the counication coplexity of the k-lipschitzian optiization for the coordinated odel of coputation (with eory eleents) as 2 (=, k) :=[in n: ; (I n )&z =, \f # F k ]. (2.2)

6 464 MESBAHI AND PAPAVASSILOPOULOS The counication coplexity 2 (=, k) is the iniu nuber of questionanswer sessions that the PE needs to conduct in order to coe up with an 0<=< approxiation of ax [0, ] p j= f j. The PE coes up with this approxiation by applying ; to the inforation gathered during the n operations of the for x( f j ). Moreover, the approxiation should be valid for all possible f j # F k ( j=,..., ). The ain result of the paper can now be stated as follows. Theore. For the k-lipschitzian optiization and for 0<=<, 2 (=, k)=2 (=, k). (2.3) In the rest of the paper, we shall present the proof of Theore. First however, we need soe ore preliinaries. 2.. More Preliinaries Consider the PEME's configuration shown in Fig.. We assue that f j :[0,] p R, f j # F k, and that ME j has access to the values of f j at any point x #[0,] p, which will be denoted by x( f j ) (j=,..., ). As it is custoary in (eleentary) functional analysis, we think of x both as a point in [0, ] p and as a functional on F k, where F k := [f:[0,] p R, f(x)&f( y) k &x& y&, \x, y #[0,] p ], (2.4) and &}& denotes the infinity (supreu) nor. Each of the channels shown in Fig., between the PE and the MEs, can carry a real nuber, x( f j ), in response to the x subitted by the PE to the ME j. The point subitted to the ME j at tie i will be denoted by x i ( f j ). Let I n =(x,...,, x ( f k ),..., ( f kn )), where [k,..., k n ][,..., ] n. The PE can stop the inforation gathering process at tie n and apply the terinal operation ; to I n, in order to approxiate z (2.). The basic question considered in the present work is the inial value of n, as a function of 0<=<, such that for all possible choices of f j # F k ( j=,..., ), ; (I n )&z =. In order for the PE to coe up with the point x i to be subitted to soe ME at tie i, it eploys the previously gathered inforation by using soe strategy. Let us denote by x~ i the strategy eployed by the PE at tie i to coe up with the new point x i that is to be subitted to soe ME. The (n+) tuple :~ n :=(x~,..., x~ n, ; ) will be called an nth degree (deterinistic) protocol for approxiating z (2.). The protocol :~ n can in fact be described by the following sequence of appings and functionals,

7 LIPSCHITZIAN OPTIMIZATION 465 x~ #x : F k R; x #[0,] p, x~ 2 :[0,] p _R [0, ] p (which yields x 2 ); x 2 : F k R, n& n& b x~ n :[0,] p _}}}_[0,] p _R_}}}_R[0, ] p (which yields ); n : F k R, ; :[0,] p _}}}_[0,] p _R_}}}_RR. Note that in general, the PE uses all the previous points chosen, and all the corresponding function values at those points, to coe up with the new point. If the new point to be subitted to the ME j is independent of the previous questions, for all j=,..., and for all tie instances i, then we call the protocol (strongly) nonadaptive. In this case, x~ i #x i : F k R, for all i. For the nonadaptive protocols, since the point x i subitted to the ME j solely depends on F k, it follows that the sae point should also be chosen for all j ( j=,..., ) and that the nuber of points specified for all MEs should be equal. Without loss of generality, for the nonadaptive case, we shall assue that the points are subitted to the MEs by the PE in the round-robin anner; i.e., the MEs are indexed fro through, and the points are subitted to the MEs starting fro ME through ME, and then back to ME, and so on. For the nonadaptive protocols, let l denote the nuber of points specified to each one of the MEs; n=l. The judicious choice of the terinal operation in the nonadaptive case would be n ; (I n )= ax k=0,..., l& : j= x k+ j ( f j ). (2.5) For our purpose, the role played by the nonadaptive protocols is of central iportance; the results pertaining to the nonadaptive protocols are easily extendible fro = to the case where >, as will be shown in the next section. Let A n and A n denote the class of nth degree adaptive and nonadaptive protocols, respectively. Then for a specific set of f,..., f # F k, residing at ME j ( j=,..., ), the error associated with using the protocol :~ n to approxiate z (2.) is defined to be e(:~ n, k, f,..., f ):= z&; (I n ). (2.6)

8 466 MESBAHI AND PAPAVASSILOPOULOS The least guaranteed error for the class of nth degree adaptive protocols for the k-lipschitzian optiization will then be E adaptive (n, k) := inf :~ n # A n and for the nonadaptive case it will be sup e(:~ n, k, f,..., f ) (2.7) f,..., f # F k E non-adaptive (n, k) := inf sup e(:~ n, k, f,..., f ). (2.8) :~ n # A n f,..., f # F k Although E adaptive (n, k) (n, k) by definition (since A n A shall nevertheless use the following notation: n ), we E (n, k) :=in[ (n, k), E adaptive (n, k)]. (2.9) Clearly the only interesting scenario would be when E (n, k)= (n, k), which is the case if and only if (n, k)=e adaptive (n, k). We now define siilar definitions for the counication coplexity of the k-lipschitzian optiization. In particular, let us define the following: and, 2 adaptive (=, k):=in[n: E adaptive (n, k)=], (2.0) 2 nonadaptive (=, k):=in[n: (n, k)=], (2.) 2 (=, k):=in[n: E (n, k)=]. (2.2) Our approach for proving Theore is along the proofs of the following two propositions. Proposition 2. Proposition 3. 2 nonadaptive (=, k)=2 (=, k). (2.3) 2 nonadaptive (=, k)=2 (=, k). (2.4)

9 LIPSCHITZIAN OPTIMIZATION 467 Theore will then follow by cobining the stateents of Propositions 2and3. 3. THE PROOF OF THE MAIN RESULT In this section, we present the proofs of Propositions 2 and 3. The stateent of Theore then follows iediately fro the results of these two propositions. Proposition 2 deals with the proble of extending the result pertaining to the counication coplexity for = to the case of >. When =, the coordinated odel of coputation shown in Fig. reduces to the oracle-type achine considered in the context of inforation-based coplexity. The following result of Sukharev (992) plays a central role in our analysis. We reind the reader that we are dealing only with the Lipschitzian optiization proble. Theore 4 (Sukharev (992, Theore.2, p. 25)). (n, k)=e (n, k)= k 2 wn p x. For all k>0, An obvious iplication of Theore 4 is that for all >, and for fixed k>0, (n, k)=e (n, k)=e (n, k). As a corollary to Theore 4 we also obtain Corollary 5. For all k>0, 2 nonadaptive (=, k)=2 (=, k)= \ 2=+ k p. We now present the proof of Proposition 2. Proof (Proposition 2). As it was pointed out in Introduction, for the nonadaptive protocols we shall fix the operation ;, as defined in (2.5). In this case, the points subitted to each ME j ( j=,..., ) by the PE depend solely on the functional class F k. If we use the optial nonadaptive protocol for the single ME case on all the MEs and use the terinal operation (2.5), we obtain a nonadaptive protocol for the ME case and thus,

10 468 MESBAHI AND PAPAVASSILOPOULOS (n, k)= (l, k) (l, k) = (l, k), since this protocol is now exactly an lth degree protocol for the single ME case as applied to a function in F k. Consequently, 2 nonadaptive (=, k)2 nonadaptive \ =, k + =2nonadaptive (=, k). Consider now a situation where the functions residing in the MEs are all identical and, oreover, where the PE is aware of this fact when subitting the questions to the MEs. The best achievable error bound in this case would be (l, k), indicating that this scenario is exactly the sae as the one where the PE is counicating with one ME, with the knowledge that the function residing in that ME is a eber of F, k. Thereby, inf sup e(:~ n, k, f,..., f )= inf sup e(:~ l, k, f ) :~ n # A n f = f 2 =}}}=f # F k :~ l # A l f # F k which translates to Thus, = (l, k) (n, k), (l, k) (n, k). 2 nonadaptive \ =, k + =2nonadaptive (=, k)2 nonadaptive (=, k). K Using Corollary 5, we also conclude that 2 nonadaptive (=, k)=2 (=, k). We now present the proof of Proposition 3. Proposition 3 states that for the k-lipschitzian optiization on the coordinated odel of coputation, the PE cannot do any better than using an optial nonadaptive protocol (in ters of reducing the aount of counication needed in the worst case).

11 LIPSCHITZIAN OPTIMIZATION 469 Proof (Proposition 3). It suffices to show that for all n, (n, k)=e adaptive (n, k). The proof is essentially a straightforward generalization of the proof of Sukharev for the single eory case. We present the proof in three steps. First, soe notations are introduced. Consider a nonadaptive protocol with the fixed terinal operation defined as in (2.5). Then the protocol is erely specified by the points x i subitted to each PE. In particular, define :=(x,..., ) and write (n, k)=inf sup e(, k, f,..., f ), f,..., f # F k where e(, k, f,..., f ) is the error of the approxiation when the terinal operation is fixed (siilarly we shall use the notation e(x~ n, k, f,..., f ) for the adaptive case). Define the set and F(, f,..., f n ):=[( f $,..., f $ ) x i ( f $ j )=x i ( f j ); i= j od ] e F (, f,..., f )= : ( f $,..., f $ )#F(, f,..., f n ) The three steps of the proof are as follows: e(, k, f $,..., f $ ).. There exist functions f j ( j j) such that e F (, f,..., f ) e F (, f,..., f ), for all f j # F k. 2. Provided that () holds, e F (, f,..., f ) has a generalized saddle point, that is, inf sup e F (, f,..., f )= sup f,..., f f,..., f inf e F (, f,..., f ). 3. Provided that (2) holds, the stateent of the Proposition is then proved. We provide the proof for each part.. Fix and let l=n. Forf $ j # F k ( j) define, f j := \ : j f $ j & ax k=0,..., l& : x k+ j ( f j ), j= ++

12 470 MESBAHI AND PAPAVASSILOPOULOS where f + =ax( f, 0). Note that for each j, f j # F k, since if g # F k,then ax(g, 0)#F k, and g # F k. Now, Thereby, and consequently, x i ( f j)=0, in, i= j od. e(, k, f $,..., f $ )=e(, k, f,..., f )e F (,0,...,0), for all f $ j # F k ( j). 2. In general one has, e F (, f $,..., f $ )e F (,0,...,0) sup f,..., f inf e F (, f,..., f )inf sup e F (, f,..., f ). f,..., f To show that the inequality also holds in the reverse direction, we observe that, sup f,..., f inf e F (, f,..., f )inf e F (, f,..., f ) inf sup e F (, f,..., f ). f,..., f 3. We now show that in view of () and (2) above, (n, k)e adaptive (n, k). By the definition of e F (, f,..., f ), one has (n, k)=inf sup e F (, f,..., f ). f,..., f For any $>0, there exists f $ j ( j) such that inf e F (, f $,..., f $ )=inf inf sup e F (, f,..., f )&$ f,..., f sup e(, k, f,..., f )&$, f,..., f

13 LIPSCHITZIAN OPTIMIZATION 47 which iplies that for all, e F (, f $,..., f $ )inf sup e(, k, f,..., f )&$ f,..., f For any fixed adaptive protocol :~ n =(x~ n, ; ), let $ be the realization of the strategy x~ n for the particular functions f $ j ( jn). Then, sup e$(x~ n, k, f,..., f )e F (, f $,..., f $ ) $ f,..., f inf Since :~ n =(x~ n, ; )and$>0 were arbitrary, sup e F (, f,..., f )&$. f,..., f Hence, inf sup e(:~ n, k, f,..., f )inf :~ n f,..., f sup e(, k, f,..., f ). f,..., f (n, k)e adaptive (n, k). K Having proved Propositions 2 and 3, we now copare the equations (2.3) and (2.4) and obtain, 2 (=, k)=2 (=, k), which is the stateent of Theore. As a corollary of Theore, we also obtain an expression for the counication coplexity of the k-lipschitzian optiization for the coordinated odel of coputation. Corollary 6. For 0<=<, p 2 (=, k)= 2=+ \k. (3.5) Proof. Since E (n, k)=k2 wn p x by Theore 4, 2 (=, k)=w(k2=) p X. The stateent of the corollary now follows using Theore. K

14 472 MESBAHI AND PAPAVASSILOPOULOS 4. CONCLUSION We have addressed the proble of deterining the counication coplexity of Lipschitzian optiization for the coordinated odel of coputation. The ain concept that has been exploited in this direction is the optiality of a nonadaptive protocol aong the class of all perissible protocols. This result can be viewed as a generalization of the result of Sukharev for the oracle-type achines considered traditionally in the context of inforationbased coplexity. There are several directions along which this work can be continued. For exaple, it would be of interest to consider the counication coplexity for ore general distributed configurations, such as the case where ore than one processing eleent is present. ACKNOWLEDGMENTS The research of G. P. Papavassilopoulos has been supported in part by the National Science Foundation Grant CCR The authors thank the referee for the correction to the original proof of Proposition 2. REFERENCES. H. Abelson, Lower bounds on inforation transfer in distributed coputation, J. Assoc. Coput. Mach. 27 (980), A. V. Aho, J. D. Ullan, and M. Yannakakis, On notion of inforation transfer in VLSI circuits, in ``Proceedings of 5th STOC,'' pp. 3339, D. P. Bertsekas and J. N. Tsitsiklis, ``Parallel and Distributed Coputation,'' Prentice Hall, New York, W. M. Gentlean, Soe coplexity results for atrix coputations on parallel achines, J. Assoc. Coput. Mach. 25 (978), K. Hwang, ``Advanced Coputer Architecture,'' McGrawHill, New York, Z. Luo and J. N. Tsitsiklis, On the counication coplexity of solving a polynoial equation, SIAM J. Coput. 20 (99), A. S. Neirovsky and D. B. Yudin, ``Proble Coplexity and Method Efficiency in Optiization,'' Wiley, New York, A. Orlitsky and A. El Gaal, Counication coplexity, in ``Coplexity in Inforation Theory'' (Y. S. Abu-Mostafa, Ed.), pp. 206, Springer-Verlag, BerlinNew York, Y. Saad, Counication coplexity of Gaussian eliination algorith on ultiprocessors, Linear Algebra Appl. 77 (986), A. G. Sukharev, ``Miniax Models in the Theory of Nuerical Methods,'' Kluwer Press, DordrechtNorwell, MA, 992.

15 LIPSCHITZIAN OPTIMIZATION 473. J. F. Traub, G. W. Wasilkowski, and H. Wazniakowski, ``Inforation-Based Coplexity,'' Acadeic Press, San Diego, J. N. Tsitsiklis and Z. Q. Luo, Counication coplexity of convex optiization, J. Coplexity 3 (987), J. Ullan, ``Coputational Aspects of VLSI,'' Coputer Science Press, Rockville, MD, A. C. Yao, Soe coplexity questions related to distributed coputing, in ``Proceedings of th STOC,'' pp , 979.

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and

More information

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

The Methods of Solution for Constrained Nonlinear Programming

The Methods of Solution for Constrained Nonlinear Programming Research Inventy: International Journal Of Engineering And Science Vol.4, Issue 3(March 2014), PP 01-06 Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.co The Methods of Solution for Constrained

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

A Simple Regression Problem

A Simple Regression Problem A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where

More information

Distributed Subgradient Methods for Multi-agent Optimization

Distributed Subgradient Methods for Multi-agent Optimization 1 Distributed Subgradient Methods for Multi-agent Optiization Angelia Nedić and Asuan Ozdaglar October 29, 2007 Abstract We study a distributed coputation odel for optiizing a su of convex objective functions

More information

Understanding Machine Learning Solution Manual

Understanding Machine Learning Solution Manual Understanding Machine Learning Solution Manual Written by Alon Gonen Edited by Dana Rubinstein Noveber 17, 2014 2 Gentle Start 1. Given S = ((x i, y i )), define the ultivariate polynoial p S (x) = i []:y

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

CS Lecture 13. More Maximum Likelihood

CS Lecture 13. More Maximum Likelihood CS 6347 Lecture 13 More Maxiu Likelihood Recap Last tie: Introduction to axiu likelihood estiation MLE for Bayesian networks Optial CPTs correspond to epirical counts Today: MLE for CRFs 2 Maxiu Likelihood

More information

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

Fixed-to-Variable Length Distribution Matching

Fixed-to-Variable Length Distribution Matching Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

Convex Programming for Scheduling Unrelated Parallel Machines

Convex Programming for Scheduling Unrelated Parallel Machines Convex Prograing for Scheduling Unrelated Parallel Machines Yossi Azar Air Epstein Abstract We consider the classical proble of scheduling parallel unrelated achines. Each job is to be processed by exactly

More information

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness A Note on Scheduling Tall/Sall Multiprocessor Tasks with Unit Processing Tie to Miniize Maxiu Tardiness Philippe Baptiste and Baruch Schieber IBM T.J. Watson Research Center P.O. Box 218, Yorktown Heights,

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

Chaotic Coupled Map Lattices

Chaotic Coupled Map Lattices Chaotic Coupled Map Lattices Author: Dustin Keys Advisors: Dr. Robert Indik, Dr. Kevin Lin 1 Introduction When a syste of chaotic aps is coupled in a way that allows the to share inforation about each

More information

Kernel Methods and Support Vector Machines

Kernel Methods and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley ENSIAG 2 / osig 1 Second Seester 2012/2013 Lesson 20 2 ay 2013 Kernel ethods and Support Vector achines Contents Kernel Functions...2 Quadratic

More information

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography Tight Bounds for axial Identifiability of Failure Nodes in Boolean Network Toography Nicola Galesi Sapienza Università di Roa nicola.galesi@uniroa1.it Fariba Ranjbar Sapienza Università di Roa fariba.ranjbar@uniroa1.it

More information

The Weierstrass Approximation Theorem

The Weierstrass Approximation Theorem 36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined

More information

Graphical Models in Local, Asymmetric Multi-Agent Markov Decision Processes

Graphical Models in Local, Asymmetric Multi-Agent Markov Decision Processes Graphical Models in Local, Asyetric Multi-Agent Markov Decision Processes Ditri Dolgov and Edund Durfee Departent of Electrical Engineering and Coputer Science University of Michigan Ann Arbor, MI 48109

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40 On Poset Merging Peter Chen Guoli Ding Steve Seiden Abstract We consider the follow poset erging proble: Let X and Y be two subsets of a partially ordered set S. Given coplete inforation about the ordering

More information

Computational and Statistical Learning Theory

Computational and Statistical Learning Theory Coputational and Statistical Learning Theory Proble sets 5 and 6 Due: Noveber th Please send your solutions to learning-subissions@ttic.edu Notations/Definitions Recall the definition of saple based Radeacher

More information

3.8 Three Types of Convergence

3.8 Three Types of Convergence 3.8 Three Types of Convergence 3.8 Three Types of Convergence 93 Suppose that we are given a sequence functions {f k } k N on a set X and another function f on X. What does it ean for f k to converge to

More information

Complexity reduction in low-delay Farrowstructure-based. filters utilizing linear-phase subfilters

Complexity reduction in low-delay Farrowstructure-based. filters utilizing linear-phase subfilters Coplexity reduction in low-delay Farrowstructure-based variable fractional delay FIR filters utilizing linear-phase subfilters Air Eghbali and Håkan Johansson Linköping University Post Print N.B.: When

More information

Hybrid System Identification: An SDP Approach

Hybrid System Identification: An SDP Approach 49th IEEE Conference on Decision and Control Deceber 15-17, 2010 Hilton Atlanta Hotel, Atlanta, GA, USA Hybrid Syste Identification: An SDP Approach C Feng, C M Lagoa, N Ozay and M Sznaier Abstract The

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

Fairness via priority scheduling

Fairness via priority scheduling Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation

More information

arxiv: v1 [cs.ds] 17 Mar 2016

arxiv: v1 [cs.ds] 17 Mar 2016 Tight Bounds for Single-Pass Streaing Coplexity of the Set Cover Proble Sepehr Assadi Sanjeev Khanna Yang Li Abstract arxiv:1603.05715v1 [cs.ds] 17 Mar 2016 We resolve the space coplexity of single-pass

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths

More information

A Bernstein-Markov Theorem for Normed Spaces

A Bernstein-Markov Theorem for Normed Spaces A Bernstein-Markov Theore for Nored Spaces Lawrence A. Harris Departent of Matheatics, University of Kentucky Lexington, Kentucky 40506-0027 Abstract Let X and Y be real nored linear spaces and let φ :

More information

time time δ jobs jobs

time time δ jobs jobs Approxiating Total Flow Tie on Parallel Machines Stefano Leonardi Danny Raz y Abstract We consider the proble of optiizing the total ow tie of a strea of jobs that are released over tie in a ultiprocessor

More information

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words)

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words) 1 A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine (1900 words) Contact: Jerry Farlow Dept of Matheatics Univeristy of Maine Orono, ME 04469 Tel (07) 866-3540 Eail: farlow@ath.uaine.edu

More information

Worst-case performance of critical path type algorithms

Worst-case performance of critical path type algorithms Intl. Trans. in Op. Res. 7 (2000) 383±399 www.elsevier.co/locate/ors Worst-case perforance of critical path type algoriths G. Singh, Y. Zinder* University of Technology, P.O. Box 123, Broadway, NSW 2007,

More information

1 Identical Parallel Machines

1 Identical Parallel Machines FB3: Matheatik/Inforatik Dr. Syaantak Das Winter 2017/18 Optiizing under Uncertainty Lecture Notes 3: Scheduling to Miniize Makespan In any standard scheduling proble, we are given a set of jobs J = {j

More information

On the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs

On the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs On the Inapproxiability of Vertex Cover on k-partite k-unifor Hypergraphs Venkatesan Guruswai and Rishi Saket Coputer Science Departent Carnegie Mellon University Pittsburgh, PA 1513. Abstract. Coputing

More information

Asynchronous Gossip Algorithms for Stochastic Optimization

Asynchronous Gossip Algorithms for Stochastic Optimization Asynchronous Gossip Algoriths for Stochastic Optiization S. Sundhar Ra ECE Dept. University of Illinois Urbana, IL 680 ssrini@illinois.edu A. Nedić IESE Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest

More information

OPTIMIZATION in multi-agent networks has attracted

OPTIMIZATION in multi-agent networks has attracted Distributed constrained optiization and consensus in uncertain networks via proxial iniization Kostas Margellos, Alessandro Falsone, Sione Garatti and Maria Prandini arxiv:603.039v3 [ath.oc] 3 May 07 Abstract

More information

On Conditions for Linearity of Optimal Estimation

On Conditions for Linearity of Optimal Estimation On Conditions for Linearity of Optial Estiation Erah Akyol, Kuar Viswanatha and Kenneth Rose {eakyol, kuar, rose}@ece.ucsb.edu Departent of Electrical and Coputer Engineering University of California at

More information

Lost-Sales Problems with Stochastic Lead Times: Convexity Results for Base-Stock Policies

Lost-Sales Problems with Stochastic Lead Times: Convexity Results for Base-Stock Policies OPERATIONS RESEARCH Vol. 52, No. 5, Septeber October 2004, pp. 795 803 issn 0030-364X eissn 1526-5463 04 5205 0795 infors doi 10.1287/opre.1040.0130 2004 INFORMS TECHNICAL NOTE Lost-Sales Probles with

More information

Homework 3 Solutions CSE 101 Summer 2017

Homework 3 Solutions CSE 101 Summer 2017 Hoework 3 Solutions CSE 0 Suer 207. Scheduling algoriths The following n = 2 jobs with given processing ties have to be scheduled on = 3 parallel and identical processors with the objective of iniizing

More information

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp

More information

About the definition of parameters and regimes of active two-port networks with variable loads on the basis of projective geometry

About the definition of parameters and regimes of active two-port networks with variable loads on the basis of projective geometry About the definition of paraeters and regies of active two-port networks with variable loads on the basis of projective geoetry PENN ALEXANDR nstitute of Electronic Engineering and Nanotechnologies "D

More information

MULTIPLAYER ROCK-PAPER-SCISSORS

MULTIPLAYER ROCK-PAPER-SCISSORS MULTIPLAYER ROCK-PAPER-SCISSORS CHARLOTTE ATEN Contents 1. Introduction 1 2. RPS Magas 3 3. Ites as a Function of Players and Vice Versa 5 4. Algebraic Properties of RPS Magas 6 References 6 1. Introduction

More information

Envelope frequency Response Function Analysis of Mechanical Structures with Uncertain Modal Damping Characteristics

Envelope frequency Response Function Analysis of Mechanical Structures with Uncertain Modal Damping Characteristics Copyright c 2007 Tech Science Press CMES, vol.22, no.2, pp.129-149, 2007 Envelope frequency Response Function Analysis of Mechanical Structures with Uncertain Modal Daping Characteristics D. Moens 1, M.

More information

Probability Distributions

Probability Distributions Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples

More information

Testing Properties of Collections of Distributions

Testing Properties of Collections of Distributions Testing Properties of Collections of Distributions Reut Levi Dana Ron Ronitt Rubinfeld April 9, 0 Abstract We propose a fraework for studying property testing of collections of distributions, where the

More information

Curious Bounds for Floor Function Sums

Curious Bounds for Floor Function Sums 1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International

More information

Estimating Entropy and Entropy Norm on Data Streams

Estimating Entropy and Entropy Norm on Data Streams Estiating Entropy and Entropy Nor on Data Streas Ait Chakrabarti 1, Khanh Do Ba 1, and S. Muthukrishnan 2 1 Departent of Coputer Science, Dartouth College, Hanover, NH 03755, USA 2 Departent of Coputer

More information

Supplementary to Learning Discriminative Bayesian Networks from High-dimensional Continuous Neuroimaging Data

Supplementary to Learning Discriminative Bayesian Networks from High-dimensional Continuous Neuroimaging Data Suppleentary to Learning Discriinative Bayesian Networks fro High-diensional Continuous Neuroiaging Data Luping Zhou, Lei Wang, Lingqiao Liu, Philip Ogunbona, and Dinggang Shen Proposition. Given a sparse

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

An incremental mirror descent subgradient algorithm with random sweeping and proximal step

An incremental mirror descent subgradient algorithm with random sweeping and proximal step An increental irror descent subgradient algorith with rando sweeping and proxial step Radu Ioan Boţ Axel Böh Septeber 7, 07 Abstract We investigate the convergence properties of increental irror descent

More information

Multi-Dimensional Hegselmann-Krause Dynamics

Multi-Dimensional Hegselmann-Krause Dynamics Multi-Diensional Hegselann-Krause Dynaics A. Nedić Industrial and Enterprise Systes Engineering Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu B. Touri Coordinated Science Laboratory

More information

On Constant Power Water-filling

On Constant Power Water-filling On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives

More information

The Transactional Nature of Quantum Information

The Transactional Nature of Quantum Information The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.

More information

SPECTRUM sensing is a core concept of cognitive radio

SPECTRUM sensing is a core concept of cognitive radio World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile

More information

An incremental mirror descent subgradient algorithm with random sweeping and proximal step

An incremental mirror descent subgradient algorithm with random sweeping and proximal step An increental irror descent subgradient algorith with rando sweeping and proxial step Radu Ioan Boţ Axel Böh April 6, 08 Abstract We investigate the convergence properties of increental irror descent type

More information

FPTAS for optimizing polynomials over the mixed-integer points of polytopes in fixed dimension

FPTAS for optimizing polynomials over the mixed-integer points of polytopes in fixed dimension Matheatical Prograing anuscript No. (will be inserted by the editor) Jesús A. De Loera Rayond Heecke Matthias Köppe Robert Weisantel FPTAS for optiizing polynoials over the ixed-integer points of polytopes

More information

Lower Bounds for Quantized Matrix Completion

Lower Bounds for Quantized Matrix Completion Lower Bounds for Quantized Matrix Copletion Mary Wootters and Yaniv Plan Departent of Matheatics University of Michigan Ann Arbor, MI Eail: wootters, yplan}@uich.edu Mark A. Davenport School of Elec. &

More information

A Note on Online Scheduling for Jobs with Arbitrary Release Times

A Note on Online Scheduling for Jobs with Arbitrary Release Times A Note on Online Scheduling for Jobs with Arbitrary Release Ties Jihuan Ding, and Guochuan Zhang College of Operations Research and Manageent Science, Qufu Noral University, Rizhao 7686, China dingjihuan@hotail.co

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

A Generalized Permanent Estimator and its Application in Computing Multi- Homogeneous Bézout Number

A Generalized Permanent Estimator and its Application in Computing Multi- Homogeneous Bézout Number Research Journal of Applied Sciences, Engineering and Technology 4(23): 5206-52, 202 ISSN: 2040-7467 Maxwell Scientific Organization, 202 Subitted: April 25, 202 Accepted: May 3, 202 Published: Deceber

More information

Research Article On the Isolated Vertices and Connectivity in Random Intersection Graphs

Research Article On the Isolated Vertices and Connectivity in Random Intersection Graphs International Cobinatorics Volue 2011, Article ID 872703, 9 pages doi:10.1155/2011/872703 Research Article On the Isolated Vertices and Connectivity in Rando Intersection Graphs Yilun Shang Institute for

More information

IN modern society that various systems have become more

IN modern society that various systems have become more Developent of Reliability Function in -Coponent Standby Redundant Syste with Priority Based on Maxiu Entropy Principle Ryosuke Hirata, Ikuo Arizono, Ryosuke Toohiro, Satoshi Oigawa, and Yasuhiko Takeoto

More information

Interactive Markov Models of Evolutionary Algorithms

Interactive Markov Models of Evolutionary Algorithms Cleveland State University EngagedScholarship@CSU Electrical Engineering & Coputer Science Faculty Publications Electrical Engineering & Coputer Science Departent 2015 Interactive Markov Models of Evolutionary

More information

RANDOM GRADIENT EXTRAPOLATION FOR DISTRIBUTED AND STOCHASTIC OPTIMIZATION

RANDOM GRADIENT EXTRAPOLATION FOR DISTRIBUTED AND STOCHASTIC OPTIMIZATION RANDOM GRADIENT EXTRAPOLATION FOR DISTRIBUTED AND STOCHASTIC OPTIMIZATION GUANGHUI LAN AND YI ZHOU Abstract. In this paper, we consider a class of finite-su convex optiization probles defined over a distributed

More information

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna

More information

STOPPING SIMULATED PATHS EARLY

STOPPING SIMULATED PATHS EARLY Proceedings of the 2 Winter Siulation Conference B.A.Peters,J.S.Sith,D.J.Medeiros,andM.W.Rohrer,eds. STOPPING SIMULATED PATHS EARLY Paul Glasseran Graduate School of Business Colubia University New Yor,

More information

Study on Markov Alternative Renewal Reward. Process for VLSI Cell Partitioning

Study on Markov Alternative Renewal Reward. Process for VLSI Cell Partitioning Int. Journal of Math. Analysis, Vol. 7, 2013, no. 40, 1949-1960 HIKARI Ltd, www.-hikari.co http://dx.doi.org/10.12988/ia.2013.36142 Study on Markov Alternative Renewal Reward Process for VLSI Cell Partitioning

More information

COS 424: Interacting with Data. Written Exercises

COS 424: Interacting with Data. Written Exercises COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This article appeared in a ournal published by Elsevier. The attached copy is furnished to the author for internal non-coercial research and education use, including for instruction at the authors institution

More information

UNIVERSITY OF TRENTO ON THE USE OF SVM FOR ELECTROMAGNETIC SUBSURFACE SENSING. A. Boni, M. Conci, A. Massa, and S. Piffer.

UNIVERSITY OF TRENTO ON THE USE OF SVM FOR ELECTROMAGNETIC SUBSURFACE SENSING. A. Boni, M. Conci, A. Massa, and S. Piffer. UIVRSITY OF TRTO DIPARTITO DI IGGRIA SCIZA DLL IFORAZIO 3823 Povo Trento (Italy) Via Soarive 4 http://www.disi.unitn.it O TH US OF SV FOR LCTROAGTIC SUBSURFAC SSIG A. Boni. Conci A. assa and S. Piffer

More information

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

Tight Complexity Bounds for Optimizing Composite Objectives

Tight Complexity Bounds for Optimizing Composite Objectives Tight Coplexity Bounds for Optiizing Coposite Objectives Blake Woodworth Toyota Technological Institute at Chicago Chicago, IL, 60637 blake@ttic.edu Nathan Srebro Toyota Technological Institute at Chicago

More information

Bipartite subgraphs and the smallest eigenvalue

Bipartite subgraphs and the smallest eigenvalue Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.

More information

A Theoretical Analysis of a Warm Start Technique

A Theoretical Analysis of a Warm Start Technique A Theoretical Analysis of a War Start Technique Martin A. Zinkevich Yahoo! Labs 701 First Avenue Sunnyvale, CA Abstract Batch gradient descent looks at every data point for every step, which is wasteful

More information

Recovering Data from Underdetermined Quadratic Measurements (CS 229a Project: Final Writeup)

Recovering Data from Underdetermined Quadratic Measurements (CS 229a Project: Final Writeup) Recovering Data fro Underdeterined Quadratic Measureents (CS 229a Project: Final Writeup) Mahdi Soltanolkotabi Deceber 16, 2011 1 Introduction Data that arises fro engineering applications often contains

More information

Topic 5a Introduction to Curve Fitting & Linear Regression

Topic 5a Introduction to Curve Fitting & Linear Regression /7/08 Course Instructor Dr. Rayond C. Rup Oice: A 337 Phone: (95) 747 6958 E ail: rcrup@utep.edu opic 5a Introduction to Curve Fitting & Linear Regression EE 4386/530 Coputational ethods in EE Outline

More information

Linear recurrences and asymptotic behavior of exponential sums of symmetric boolean functions

Linear recurrences and asymptotic behavior of exponential sums of symmetric boolean functions Linear recurrences and asyptotic behavior of exponential sus of syetric boolean functions Francis N. Castro Departent of Matheatics University of Puerto Rico, San Juan, PR 00931 francis.castro@upr.edu

More information

Boosting with log-loss

Boosting with log-loss Boosting with log-loss Marco Cusuano-Towner Septeber 2, 202 The proble Suppose we have data exaples {x i, y i ) i =... } for a two-class proble with y i {, }. Let F x) be the predictor function with the

More information

Stochastic Subgradient Methods

Stochastic Subgradient Methods Stochastic Subgradient Methods Lingjie Weng Yutian Chen Bren School of Inforation and Coputer Science University of California, Irvine {wengl, yutianc}@ics.uci.edu Abstract Stochastic subgradient ethods

More information

Konrad-Zuse-Zentrum für Informationstechnik Berlin Heilbronner Str. 10, D Berlin - Wilmersdorf

Konrad-Zuse-Zentrum für Informationstechnik Berlin Heilbronner Str. 10, D Berlin - Wilmersdorf Konrad-Zuse-Zentru für Inforationstechnik Berlin Heilbronner Str. 10, D-10711 Berlin - Wilersdorf Folkar A. Borneann On the Convergence of Cascadic Iterations for Elliptic Probles SC 94-8 (Marz 1994) 1

More information

Saddle Points in Random Matrices: Analysis of Knuth Search Algorithms

Saddle Points in Random Matrices: Analysis of Knuth Search Algorithms Saddle Points in Rando Matrices: Analysis of Knuth Search Algoriths Micha Hofri Philippe Jacquet Dept. of Coputer Science INRIA, Doaine de Voluceau - Rice University Rocquencourt - B.P. 05 Houston TX 77005

More information

a a a a a a a m a b a b

a a a a a a a m a b a b Algebra / Trig Final Exa Study Guide (Fall Seester) Moncada/Dunphy Inforation About the Final Exa The final exa is cuulative, covering Appendix A (A.1-A.5) and Chapter 1. All probles will be ultiple choice

More information

RESTARTED FULL ORTHOGONALIZATION METHOD FOR SHIFTED LINEAR SYSTEMS

RESTARTED FULL ORTHOGONALIZATION METHOD FOR SHIFTED LINEAR SYSTEMS BIT Nuerical Matheatics 43: 459 466, 2003. 2003 Kluwer Acadeic Publishers. Printed in The Netherlands 459 RESTARTED FULL ORTHOGONALIZATION METHOD FOR SHIFTED LINEAR SYSTEMS V. SIMONCINI Dipartiento di

More information

On the Existence of Pure Nash Equilibria in Weighted Congestion Games

On the Existence of Pure Nash Equilibria in Weighted Congestion Games MATHEMATICS OF OPERATIONS RESEARCH Vol. 37, No. 3, August 2012, pp. 419 436 ISSN 0364-765X (print) ISSN 1526-5471 (online) http://dx.doi.org/10.1287/oor.1120.0543 2012 INFORMS On the Existence of Pure

More information

Birthday Paradox Calculations and Approximation

Birthday Paradox Calculations and Approximation Birthday Paradox Calculations and Approxiation Joshua E. Hill InfoGard Laboratories -March- v. Birthday Proble In the birthday proble, we have a group of n randoly selected people. If we assue that birthdays

More information

Optimal Jamming Over Additive Noise: Vector Source-Channel Case

Optimal Jamming Over Additive Noise: Vector Source-Channel Case Fifty-first Annual Allerton Conference Allerton House, UIUC, Illinois, USA October 2-3, 2013 Optial Jaing Over Additive Noise: Vector Source-Channel Case Erah Akyol and Kenneth Rose Abstract This paper

More information

New Slack-Monotonic Schedulability Analysis of Real-Time Tasks on Multiprocessors

New Slack-Monotonic Schedulability Analysis of Real-Time Tasks on Multiprocessors New Slack-Monotonic Schedulability Analysis of Real-Tie Tasks on Multiprocessors Risat Mahud Pathan and Jan Jonsson Chalers University of Technology SE-41 96, Göteborg, Sweden {risat, janjo}@chalers.se

More information

arxiv: v1 [cs.ds] 3 Feb 2014

arxiv: v1 [cs.ds] 3 Feb 2014 arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/

More information

THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT

THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT PETER BORWEIN AND KWOK-KWONG STEPHEN CHOI Abstract. Let n be any integer and ( n ) X F n : a i z i : a i, ± i be the set of all polynoials of height and

More information

Approximation in Stochastic Scheduling: The Power of LP-Based Priority Policies

Approximation in Stochastic Scheduling: The Power of LP-Based Priority Policies Approxiation in Stochastic Scheduling: The Power of -Based Priority Policies Rolf Möhring, Andreas Schulz, Marc Uetz Setting (A P p stoch, r E( w and (B P p stoch E( w We will assue that the processing

More information

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate The Siplex Method is Strongly Polynoial for the Markov Decision Proble with a Fixed Discount Rate Yinyu Ye April 20, 2010 Abstract In this note we prove that the classic siplex ethod with the ost-negativereduced-cost

More information

An Algorithm for Posynomial Geometric Programming, Based on Generalized Linear Programming

An Algorithm for Posynomial Geometric Programming, Based on Generalized Linear Programming An Algorith for Posynoial Geoetric Prograing, Based on Generalized Linear Prograing Jayant Rajgopal Departent of Industrial Engineering University of Pittsburgh, Pittsburgh, PA 526 Dennis L. Bricer Departent

More information