On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation
|
|
- Albert Roberts
- 5 years ago
- Views:
Transcription
1 journal of coplexity 6, (2000) doi:0.006jco , available online at on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation Mehran Mesbahi Departent of Aerospace Engineering and Mechanics, University of Minnesota, Minneapolis, Minnesota and George P. Papavassilopoulos 2 Departent of Electrical Engineering-Systes, University of Southern California, Los Angeles, California Received January 20, 999 We consider the proble of approxiating the axiu of the su of Lipschitz continuous functions. The values of each function are assued to reside at a different eory eleent. A single processing eleent is designated to approxiate the value of the axiu of the su of these functions by adopting a certain protocol. Under certain assuptions on the class of perissible protocols, we obtain the iniu nuber of real-valued essages that has to be transferred between the processing eleent and the eory eleents in order to find the desired approxiation of this axiu. In particular, we exploit the optiality of the nonadaptive protocols for the Lipschitzian optiization proble, studied in the context of inforation-based coplexity, to prove our ain result Acadeic Press Key Words: Lipschitzian optiization; counication coplexity; coordinated odel of coputation.. INTRODUCTION Five people are each given a nuber between and 00. A questioner coes along and wants to figure out the su of these five nubers by To who correspondence should be addressed. E-ail: esbahiae.un.edu. 2 E-ail: yorgosbode.usc.edu X Copyright 2000 by Acadeic Press All rights of reproduction in any for reserved.
2 460 MESBAHI AND PAPAVASSILOPOULOS asking each person questions of the type: ``Is your nuber greater than or equal to x?,'' for soe integer x. In return, the questioner expects to receive a ``yes'' or a ``no'' response fro the participant. The questioner has been told by an inforer that the su of the nubers held by the participants does not exceed 00. Suppose that the questioner asks the first person whether the nuber held by hi or her is greater than or equal to 75 and receives in return a ``yes'' answer. Knowing that the total su is not greater than or equal to 00, it would not be wise for the questioner to ask the second person ``Is your nuber greater than or equal to 75?'' since the reply is definitely a ``no.'' In fact, the questioner can use the previous responses to forulate the question for the next person in soe intelligent anner. In a sense, the questioner can adapt the next question by incorporating the answers for the previous questions in its forulation. It is also conceivable that the questioner first figures out the exact nuber that each person has, without considering other people's nubers, and then sus the up. In this case, the total nuber of questions that the questioner has to ask would just be five ties the nuber of questions needed to figure out one person's nuber. In fact one ight suspect that the questioner cannot really do better than this, in ters of the iniizing the total nuber of questions asked, at least in the worst case. In this paper we consider a siilar proble. There are function storage devices, or eory eleents, storing the values of the functions f,..., f, and each function is known to be in the class of Lipschitz continuous functions with odulus k; the class of such functions will be denoted by F k. There is a processing eleent which is designated to approxiate the value of z :=ax x j= f j(x) by asking each eory eleent about the value of the function residing in that eory eleent, at a given point. We are interested to know, under the above restrictions, the iniu nuber of questions that the processing eleent has to ask the eory eleents, in order to be able to approxiate the value of z within an accuracy 0<=<, for all possible f j # F k ( j=,..., ). Although in this case, the processing eleent cannot find z by figuring out the axiu of each function f j ( j=,..., ) separately, our result indicates that in ters of the total nuber of questions needed to be asked fro the eory eleents, the processing eleent cannot do any better than this, at least in the worst case. The iniu nuber of questions needed to approxiate the axiu of the su of functions in F k as described above, shall be referred to as the counication coplexity of the k-lipschitzian optiization for the coordinated odel of coputation. The proble of deterining the counication coplexity is iportant in several settings. First, is the area of parallel and distributed coputation (Bertsekas and Tsitsiklis, 989; Hwang, 994). In this setting, one can
3 LIPSCHITZIAN OPTIMIZATION 46 consider the processors as having partial inforation regarding the coputational task at a given tie, and hence they counicate aong theselves in order to solve the proble in a distributed anner. It is believed that the aount of counication needed to coplete the coputation in the distributed anner is one of the ain factors that deterine the efficiency of the parallelis eployed (Gentlean, 978; Saad 986). The counication requireents becoe very iportant in the context of very large integrated circuits (VLSI) (Aho et al., 983; Ullan, 984). In particular, it is known that the nuber of bits that is needed to be exchanged between the different parts of the chip is related to the product of the area of the chip and the coputation tie (Ullan, 984). The issue of counication coplexity is also of relevance in the setting of distributed data acquisition and control. In this case, one can consider the processing eleent as the controller which has access to the state of the environent through two or ore sensors. The sensors, due to their liited coputational power can only send functionals of the state of the environent upon receiving a correspondence fro the controller. If the counication aong the controller and the sensors is costly (for exaple due to the congestion of the network), the issue of counication coplexity becoes iportant. In this paper, we will show that for the Lipschitzian optiization proble, the ethodology developed in the context of inforation-based coplexity can be extended to the coordinated odel of coputation. This will be done ainly by utilizing the results pertaining to the optiality of the nonadaptive protocols for the case where there is a single pair of processing and eory eleents. The organization of the paper is as follows. We first provide a very brief survey of the works that have been done in the area of counication coplexity. In Section 2, we provide the iniu aount of notation and preliinaries which enables us to state, ore forally, the proble and the ain result discussed in the paper. Section 3 is devoted to the proof of the ain result... Related Works The study of counication coplexity was initiated by Abelson (980) where functions of the for f: R _R n R, f # C 2 (the class of twice continuously differentiable functions) were studied. In this setting, x # R and y # R n are known by different processors, and each processor can transit functions of their data which are also assued to be in C 2. The counication coplexity is defined to be the iniu nuber of essages that has to be exchanged between the processors in order to exactly evaluate f(x, y). It should be noted that functions considered by Abelson (980) have a very special structure; naely, it is assued that there exists a counication
4 462 MESBAHI AND PAPAVASSILOPOULOS protocol which can be eployed by the processors in order to obtain the exact value of f(x, y). The work that has been done in the spirit of Abelson (980) includes that of Luo and Tsitsiklis (99). Another strea of work on the counication coplexity was initiated by the work of Yao (979). This line of work is concerned with obtaining the counication coplexity of evaluating a Boolean function f(x, y), where f: X_Y [0, ], and X and Y are finite sets. It is assued that x # X and y # Y are known by two different processors. The counication coplexity is then defined to be the iniu nuber of bits that has to be exchanged between the processors in order to exactly evaluate f(x, y), for all possible values of x # X and y # Y. In this setting, X and Y have a siple structure and the counication coplexity, in essence, is an indication of the behavior of f on the lattice X_Y. We refer the reader to the survey of Orlitsky and El Gaal (988) for a suary of this approach and any possible extensions. More closely related to the approach of the present paper is the work done in the area of inforation-based coplexity (Traub et al., 988; Neirovsky and Yudin, 983), and in particular the work of Sukharev (992). This line of work is concerned with the efficiency of algoriths for probles defined on the infinite-diensional spaces, such as the function integration proble, approxiation, and optiization. In this context, the processing eleent can obtain the values of the function (a eber of an infinite-diensional space) through an oracle. In general, for these probles only approxiate solutions can be obtained. Therefore there is a presence of the paraeter = in all the coplexity results. It turns out that in any situations, the cost of the oracle calls doinates the cost of the entire algorith. One is thus led to consider the counication coplexity, i.e., the iniu nuber of oracle calls needed by the algorith in order to be able to approxiate the solution (the iniizer, the value of the integral, etc.) within an error =. The work of Sukharev (992) is concerned with the sae issue, but his approach relies ore heavily on the iniax odels and various notions of adaptive algoriths. In fact in the introduction of Sukharev (992) it is stated that the ain feature of the work is that ``the process of coputation has been regarded as a controlled process and the algorith as a control strategy.'' Consequently, the optial algoriths are obtained by eploying ethods of operations research, gae theory, and syste analysis. 2. PRELIMINARIES AND THE MAIN RESULT In this section, we provide certain notions which enable us to state the proble considered in the paper ore forally. We then state the ain result.
5 LIPSCHITZIAN OPTIMIZATION 463 FIG.. The coordinated odel of coputation. We consider a odel of coputation, referred to as the coordinated odel of coputation, where a single processing eleent (PE) is connected to eory eleents (MEs) via dedicated channels. This odel is shown in Fig.. Each eory eleent ME j has access to the value of the Lipschitz continuous function f j ( j=,..., ), with Lipschitz odulus k, at an arbitrary point of its doain. Let us denote by F k the class of Lipschitz continuous functions with constant k, defined on the p-diensional unit cube [0, ] p. The value of f j at the point x will be denoted by x( f j ), j=,...,. ThePE is allowed to specify x to each ME in an arbitrary anner and receive in return the value x( f j ) with infinite precision. The operation of specifying x by the PE and receiving the value x( f j ) fro the ME j is counted as one counication operation. The objective of the PE is to approxiate : x #[0,] p j= z := ax f j (x) (2.) within an accuracy 0<=<. Let us denote the total inforation gathered by the PE after n such inforation gathering operations by I n ; i.e., I n contains the values of different f j 's at various points of the doain [0, ] p. The PE then applies a functional ; to I n and coes up with an estiate of z (2.). We shall refer to ; as the terinal operation. The process of gathering the inforation I n, and applying the terinal operation ;, will be referred to as the counication protocol. Under the aforeentioned restrictions on the counication protocol, let us define the counication coplexity of the k-lipschitzian optiization for the coordinated odel of coputation (with eory eleents) as 2 (=, k) :=[in n: ; (I n )&z =, \f # F k ]. (2.2)
6 464 MESBAHI AND PAPAVASSILOPOULOS The counication coplexity 2 (=, k) is the iniu nuber of questionanswer sessions that the PE needs to conduct in order to coe up with an 0<=< approxiation of ax [0, ] p j= f j. The PE coes up with this approxiation by applying ; to the inforation gathered during the n operations of the for x( f j ). Moreover, the approxiation should be valid for all possible f j # F k ( j=,..., ). The ain result of the paper can now be stated as follows. Theore. For the k-lipschitzian optiization and for 0<=<, 2 (=, k)=2 (=, k). (2.3) In the rest of the paper, we shall present the proof of Theore. First however, we need soe ore preliinaries. 2.. More Preliinaries Consider the PEME's configuration shown in Fig.. We assue that f j :[0,] p R, f j # F k, and that ME j has access to the values of f j at any point x #[0,] p, which will be denoted by x( f j ) (j=,..., ). As it is custoary in (eleentary) functional analysis, we think of x both as a point in [0, ] p and as a functional on F k, where F k := [f:[0,] p R, f(x)&f( y) k &x& y&, \x, y #[0,] p ], (2.4) and &}& denotes the infinity (supreu) nor. Each of the channels shown in Fig., between the PE and the MEs, can carry a real nuber, x( f j ), in response to the x subitted by the PE to the ME j. The point subitted to the ME j at tie i will be denoted by x i ( f j ). Let I n =(x,...,, x ( f k ),..., ( f kn )), where [k,..., k n ][,..., ] n. The PE can stop the inforation gathering process at tie n and apply the terinal operation ; to I n, in order to approxiate z (2.). The basic question considered in the present work is the inial value of n, as a function of 0<=<, such that for all possible choices of f j # F k ( j=,..., ), ; (I n )&z =. In order for the PE to coe up with the point x i to be subitted to soe ME at tie i, it eploys the previously gathered inforation by using soe strategy. Let us denote by x~ i the strategy eployed by the PE at tie i to coe up with the new point x i that is to be subitted to soe ME. The (n+) tuple :~ n :=(x~,..., x~ n, ; ) will be called an nth degree (deterinistic) protocol for approxiating z (2.). The protocol :~ n can in fact be described by the following sequence of appings and functionals,
7 LIPSCHITZIAN OPTIMIZATION 465 x~ #x : F k R; x #[0,] p, x~ 2 :[0,] p _R [0, ] p (which yields x 2 ); x 2 : F k R, n& n& b x~ n :[0,] p _}}}_[0,] p _R_}}}_R[0, ] p (which yields ); n : F k R, ; :[0,] p _}}}_[0,] p _R_}}}_RR. Note that in general, the PE uses all the previous points chosen, and all the corresponding function values at those points, to coe up with the new point. If the new point to be subitted to the ME j is independent of the previous questions, for all j=,..., and for all tie instances i, then we call the protocol (strongly) nonadaptive. In this case, x~ i #x i : F k R, for all i. For the nonadaptive protocols, since the point x i subitted to the ME j solely depends on F k, it follows that the sae point should also be chosen for all j ( j=,..., ) and that the nuber of points specified for all MEs should be equal. Without loss of generality, for the nonadaptive case, we shall assue that the points are subitted to the MEs by the PE in the round-robin anner; i.e., the MEs are indexed fro through, and the points are subitted to the MEs starting fro ME through ME, and then back to ME, and so on. For the nonadaptive protocols, let l denote the nuber of points specified to each one of the MEs; n=l. The judicious choice of the terinal operation in the nonadaptive case would be n ; (I n )= ax k=0,..., l& : j= x k+ j ( f j ). (2.5) For our purpose, the role played by the nonadaptive protocols is of central iportance; the results pertaining to the nonadaptive protocols are easily extendible fro = to the case where >, as will be shown in the next section. Let A n and A n denote the class of nth degree adaptive and nonadaptive protocols, respectively. Then for a specific set of f,..., f # F k, residing at ME j ( j=,..., ), the error associated with using the protocol :~ n to approxiate z (2.) is defined to be e(:~ n, k, f,..., f ):= z&; (I n ). (2.6)
8 466 MESBAHI AND PAPAVASSILOPOULOS The least guaranteed error for the class of nth degree adaptive protocols for the k-lipschitzian optiization will then be E adaptive (n, k) := inf :~ n # A n and for the nonadaptive case it will be sup e(:~ n, k, f,..., f ) (2.7) f,..., f # F k E non-adaptive (n, k) := inf sup e(:~ n, k, f,..., f ). (2.8) :~ n # A n f,..., f # F k Although E adaptive (n, k) (n, k) by definition (since A n A shall nevertheless use the following notation: n ), we E (n, k) :=in[ (n, k), E adaptive (n, k)]. (2.9) Clearly the only interesting scenario would be when E (n, k)= (n, k), which is the case if and only if (n, k)=e adaptive (n, k). We now define siilar definitions for the counication coplexity of the k-lipschitzian optiization. In particular, let us define the following: and, 2 adaptive (=, k):=in[n: E adaptive (n, k)=], (2.0) 2 nonadaptive (=, k):=in[n: (n, k)=], (2.) 2 (=, k):=in[n: E (n, k)=]. (2.2) Our approach for proving Theore is along the proofs of the following two propositions. Proposition 2. Proposition 3. 2 nonadaptive (=, k)=2 (=, k). (2.3) 2 nonadaptive (=, k)=2 (=, k). (2.4)
9 LIPSCHITZIAN OPTIMIZATION 467 Theore will then follow by cobining the stateents of Propositions 2and3. 3. THE PROOF OF THE MAIN RESULT In this section, we present the proofs of Propositions 2 and 3. The stateent of Theore then follows iediately fro the results of these two propositions. Proposition 2 deals with the proble of extending the result pertaining to the counication coplexity for = to the case of >. When =, the coordinated odel of coputation shown in Fig. reduces to the oracle-type achine considered in the context of inforation-based coplexity. The following result of Sukharev (992) plays a central role in our analysis. We reind the reader that we are dealing only with the Lipschitzian optiization proble. Theore 4 (Sukharev (992, Theore.2, p. 25)). (n, k)=e (n, k)= k 2 wn p x. For all k>0, An obvious iplication of Theore 4 is that for all >, and for fixed k>0, (n, k)=e (n, k)=e (n, k). As a corollary to Theore 4 we also obtain Corollary 5. For all k>0, 2 nonadaptive (=, k)=2 (=, k)= \ 2=+ k p. We now present the proof of Proposition 2. Proof (Proposition 2). As it was pointed out in Introduction, for the nonadaptive protocols we shall fix the operation ;, as defined in (2.5). In this case, the points subitted to each ME j ( j=,..., ) by the PE depend solely on the functional class F k. If we use the optial nonadaptive protocol for the single ME case on all the MEs and use the terinal operation (2.5), we obtain a nonadaptive protocol for the ME case and thus,
10 468 MESBAHI AND PAPAVASSILOPOULOS (n, k)= (l, k) (l, k) = (l, k), since this protocol is now exactly an lth degree protocol for the single ME case as applied to a function in F k. Consequently, 2 nonadaptive (=, k)2 nonadaptive \ =, k + =2nonadaptive (=, k). Consider now a situation where the functions residing in the MEs are all identical and, oreover, where the PE is aware of this fact when subitting the questions to the MEs. The best achievable error bound in this case would be (l, k), indicating that this scenario is exactly the sae as the one where the PE is counicating with one ME, with the knowledge that the function residing in that ME is a eber of F, k. Thereby, inf sup e(:~ n, k, f,..., f )= inf sup e(:~ l, k, f ) :~ n # A n f = f 2 =}}}=f # F k :~ l # A l f # F k which translates to Thus, = (l, k) (n, k), (l, k) (n, k). 2 nonadaptive \ =, k + =2nonadaptive (=, k)2 nonadaptive (=, k). K Using Corollary 5, we also conclude that 2 nonadaptive (=, k)=2 (=, k). We now present the proof of Proposition 3. Proposition 3 states that for the k-lipschitzian optiization on the coordinated odel of coputation, the PE cannot do any better than using an optial nonadaptive protocol (in ters of reducing the aount of counication needed in the worst case).
11 LIPSCHITZIAN OPTIMIZATION 469 Proof (Proposition 3). It suffices to show that for all n, (n, k)=e adaptive (n, k). The proof is essentially a straightforward generalization of the proof of Sukharev for the single eory case. We present the proof in three steps. First, soe notations are introduced. Consider a nonadaptive protocol with the fixed terinal operation defined as in (2.5). Then the protocol is erely specified by the points x i subitted to each PE. In particular, define :=(x,..., ) and write (n, k)=inf sup e(, k, f,..., f ), f,..., f # F k where e(, k, f,..., f ) is the error of the approxiation when the terinal operation is fixed (siilarly we shall use the notation e(x~ n, k, f,..., f ) for the adaptive case). Define the set and F(, f,..., f n ):=[( f $,..., f $ ) x i ( f $ j )=x i ( f j ); i= j od ] e F (, f,..., f )= : ( f $,..., f $ )#F(, f,..., f n ) The three steps of the proof are as follows: e(, k, f $,..., f $ ).. There exist functions f j ( j j) such that e F (, f,..., f ) e F (, f,..., f ), for all f j # F k. 2. Provided that () holds, e F (, f,..., f ) has a generalized saddle point, that is, inf sup e F (, f,..., f )= sup f,..., f f,..., f inf e F (, f,..., f ). 3. Provided that (2) holds, the stateent of the Proposition is then proved. We provide the proof for each part.. Fix and let l=n. Forf $ j # F k ( j) define, f j := \ : j f $ j & ax k=0,..., l& : x k+ j ( f j ), j= ++
12 470 MESBAHI AND PAPAVASSILOPOULOS where f + =ax( f, 0). Note that for each j, f j # F k, since if g # F k,then ax(g, 0)#F k, and g # F k. Now, Thereby, and consequently, x i ( f j)=0, in, i= j od. e(, k, f $,..., f $ )=e(, k, f,..., f )e F (,0,...,0), for all f $ j # F k ( j). 2. In general one has, e F (, f $,..., f $ )e F (,0,...,0) sup f,..., f inf e F (, f,..., f )inf sup e F (, f,..., f ). f,..., f To show that the inequality also holds in the reverse direction, we observe that, sup f,..., f inf e F (, f,..., f )inf e F (, f,..., f ) inf sup e F (, f,..., f ). f,..., f 3. We now show that in view of () and (2) above, (n, k)e adaptive (n, k). By the definition of e F (, f,..., f ), one has (n, k)=inf sup e F (, f,..., f ). f,..., f For any $>0, there exists f $ j ( j) such that inf e F (, f $,..., f $ )=inf inf sup e F (, f,..., f )&$ f,..., f sup e(, k, f,..., f )&$, f,..., f
13 LIPSCHITZIAN OPTIMIZATION 47 which iplies that for all, e F (, f $,..., f $ )inf sup e(, k, f,..., f )&$ f,..., f For any fixed adaptive protocol :~ n =(x~ n, ; ), let $ be the realization of the strategy x~ n for the particular functions f $ j ( jn). Then, sup e$(x~ n, k, f,..., f )e F (, f $,..., f $ ) $ f,..., f inf Since :~ n =(x~ n, ; )and$>0 were arbitrary, sup e F (, f,..., f )&$. f,..., f Hence, inf sup e(:~ n, k, f,..., f )inf :~ n f,..., f sup e(, k, f,..., f ). f,..., f (n, k)e adaptive (n, k). K Having proved Propositions 2 and 3, we now copare the equations (2.3) and (2.4) and obtain, 2 (=, k)=2 (=, k), which is the stateent of Theore. As a corollary of Theore, we also obtain an expression for the counication coplexity of the k-lipschitzian optiization for the coordinated odel of coputation. Corollary 6. For 0<=<, p 2 (=, k)= 2=+ \k. (3.5) Proof. Since E (n, k)=k2 wn p x by Theore 4, 2 (=, k)=w(k2=) p X. The stateent of the corollary now follows using Theore. K
14 472 MESBAHI AND PAPAVASSILOPOULOS 4. CONCLUSION We have addressed the proble of deterining the counication coplexity of Lipschitzian optiization for the coordinated odel of coputation. The ain concept that has been exploited in this direction is the optiality of a nonadaptive protocol aong the class of all perissible protocols. This result can be viewed as a generalization of the result of Sukharev for the oracle-type achines considered traditionally in the context of inforationbased coplexity. There are several directions along which this work can be continued. For exaple, it would be of interest to consider the counication coplexity for ore general distributed configurations, such as the case where ore than one processing eleent is present. ACKNOWLEDGMENTS The research of G. P. Papavassilopoulos has been supported in part by the National Science Foundation Grant CCR The authors thank the referee for the correction to the original proof of Proposition 2. REFERENCES. H. Abelson, Lower bounds on inforation transfer in distributed coputation, J. Assoc. Coput. Mach. 27 (980), A. V. Aho, J. D. Ullan, and M. Yannakakis, On notion of inforation transfer in VLSI circuits, in ``Proceedings of 5th STOC,'' pp. 3339, D. P. Bertsekas and J. N. Tsitsiklis, ``Parallel and Distributed Coputation,'' Prentice Hall, New York, W. M. Gentlean, Soe coplexity results for atrix coputations on parallel achines, J. Assoc. Coput. Mach. 25 (978), K. Hwang, ``Advanced Coputer Architecture,'' McGrawHill, New York, Z. Luo and J. N. Tsitsiklis, On the counication coplexity of solving a polynoial equation, SIAM J. Coput. 20 (99), A. S. Neirovsky and D. B. Yudin, ``Proble Coplexity and Method Efficiency in Optiization,'' Wiley, New York, A. Orlitsky and A. El Gaal, Counication coplexity, in ``Coplexity in Inforation Theory'' (Y. S. Abu-Mostafa, Ed.), pp. 206, Springer-Verlag, BerlinNew York, Y. Saad, Counication coplexity of Gaussian eliination algorith on ultiprocessors, Linear Algebra Appl. 77 (986), A. G. Sukharev, ``Miniax Models in the Theory of Nuerical Methods,'' Kluwer Press, DordrechtNorwell, MA, 992.
15 LIPSCHITZIAN OPTIMIZATION 473. J. F. Traub, G. W. Wasilkowski, and H. Wazniakowski, ``Inforation-Based Coplexity,'' Acadeic Press, San Diego, J. N. Tsitsiklis and Z. Q. Luo, Counication coplexity of convex optiization, J. Coplexity 3 (987), J. Ullan, ``Coputational Aspects of VLSI,'' Coputer Science Press, Rockville, MD, A. C. Yao, Soe coplexity questions related to distributed coputing, in ``Proceedings of th STOC,'' pp , 979.
Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs
BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and
More informationList Scheduling and LPT Oliver Braun (09/05/2017)
List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)
More informationThe Methods of Solution for Constrained Nonlinear Programming
Research Inventy: International Journal Of Engineering And Science Vol.4, Issue 3(March 2014), PP 01-06 Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.co The Methods of Solution for Constrained
More informationA note on the multiplication of sparse matrices
Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani
More informationA Simple Regression Problem
A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where
More informationDistributed Subgradient Methods for Multi-agent Optimization
1 Distributed Subgradient Methods for Multi-agent Optiization Angelia Nedić and Asuan Ozdaglar October 29, 2007 Abstract We study a distributed coputation odel for optiizing a su of convex objective functions
More informationUnderstanding Machine Learning Solution Manual
Understanding Machine Learning Solution Manual Written by Alon Gonen Edited by Dana Rubinstein Noveber 17, 2014 2 Gentle Start 1. Given S = ((x i, y i )), define the ultivariate polynoial p S (x) = i []:y
More informationPolygonal Designs: Existence and Construction
Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G
More informationCS Lecture 13. More Maximum Likelihood
CS 6347 Lecture 13 More Maxiu Likelihood Recap Last tie: Introduction to axiu likelihood estiation MLE for Bayesian networks Optial CPTs correspond to epirical counts Today: MLE for CRFs 2 Maxiu Likelihood
More informationUniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval
Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,
More informationNon-Parametric Non-Line-of-Sight Identification 1
Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,
More informationFixed-to-Variable Length Distribution Matching
Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de
More informationModel Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon
Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential
More informationConvex Programming for Scheduling Unrelated Parallel Machines
Convex Prograing for Scheduling Unrelated Parallel Machines Yossi Azar Air Epstein Abstract We consider the classical proble of scheduling parallel unrelated achines. Each job is to be processed by exactly
More informationA Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness
A Note on Scheduling Tall/Sall Multiprocessor Tasks with Unit Processing Tie to Miniize Maxiu Tardiness Philippe Baptiste and Baruch Schieber IBM T.J. Watson Research Center P.O. Box 218, Yorktown Heights,
More information13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices
CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay
More informationChaotic Coupled Map Lattices
Chaotic Coupled Map Lattices Author: Dustin Keys Advisors: Dr. Robert Indik, Dr. Kevin Lin 1 Introduction When a syste of chaotic aps is coupled in a way that allows the to share inforation about each
More informationKernel Methods and Support Vector Machines
Intelligent Systes: Reasoning and Recognition Jaes L. Crowley ENSIAG 2 / osig 1 Second Seester 2012/2013 Lesson 20 2 ay 2013 Kernel ethods and Support Vector achines Contents Kernel Functions...2 Quadratic
More informationTight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography
Tight Bounds for axial Identifiability of Failure Nodes in Boolean Network Toography Nicola Galesi Sapienza Università di Roa nicola.galesi@uniroa1.it Fariba Ranjbar Sapienza Università di Roa fariba.ranjbar@uniroa1.it
More informationThe Weierstrass Approximation Theorem
36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined
More informationGraphical Models in Local, Asymmetric Multi-Agent Markov Decision Processes
Graphical Models in Local, Asyetric Multi-Agent Markov Decision Processes Ditri Dolgov and Edund Durfee Departent of Electrical Engineering and Coputer Science University of Michigan Ann Arbor, MI 48109
More informationThis model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.
CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when
More informationSupport Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization
Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering
More informationOn Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40
On Poset Merging Peter Chen Guoli Ding Steve Seiden Abstract We consider the follow poset erging proble: Let X and Y be two subsets of a partially ordered set S. Given coplete inforation about the ordering
More informationComputational and Statistical Learning Theory
Coputational and Statistical Learning Theory Proble sets 5 and 6 Due: Noveber th Please send your solutions to learning-subissions@ttic.edu Notations/Definitions Recall the definition of saple based Radeacher
More information3.8 Three Types of Convergence
3.8 Three Types of Convergence 3.8 Three Types of Convergence 93 Suppose that we are given a sequence functions {f k } k N on a set X and another function f on X. What does it ean for f k to converge to
More informationComplexity reduction in low-delay Farrowstructure-based. filters utilizing linear-phase subfilters
Coplexity reduction in low-delay Farrowstructure-based variable fractional delay FIR filters utilizing linear-phase subfilters Air Eghbali and Håkan Johansson Linköping University Post Print N.B.: When
More informationHybrid System Identification: An SDP Approach
49th IEEE Conference on Decision and Control Deceber 15-17, 2010 Hilton Atlanta Hotel, Atlanta, GA, USA Hybrid Syste Identification: An SDP Approach C Feng, C M Lagoa, N Ozay and M Sznaier Abstract The
More informationChapter 6 1-D Continuous Groups
Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:
More informationFairness via priority scheduling
Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation
More informationarxiv: v1 [cs.ds] 17 Mar 2016
Tight Bounds for Single-Pass Streaing Coplexity of the Set Cover Proble Sepehr Assadi Sanjeev Khanna Yang Li Abstract arxiv:1603.05715v1 [cs.ds] 17 Mar 2016 We resolve the space coplexity of single-pass
More informationQuantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search
Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths
More informationA Bernstein-Markov Theorem for Normed Spaces
A Bernstein-Markov Theore for Nored Spaces Lawrence A. Harris Departent of Matheatics, University of Kentucky Lexington, Kentucky 40506-0027 Abstract Let X and Y be real nored linear spaces and let φ :
More informationtime time δ jobs jobs
Approxiating Total Flow Tie on Parallel Machines Stefano Leonardi Danny Raz y Abstract We consider the proble of optiizing the total ow tie of a strea of jobs that are released over tie in a ultiprocessor
More informationA Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words)
1 A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine (1900 words) Contact: Jerry Farlow Dept of Matheatics Univeristy of Maine Orono, ME 04469 Tel (07) 866-3540 Eail: farlow@ath.uaine.edu
More informationWorst-case performance of critical path type algorithms
Intl. Trans. in Op. Res. 7 (2000) 383±399 www.elsevier.co/locate/ors Worst-case perforance of critical path type algoriths G. Singh, Y. Zinder* University of Technology, P.O. Box 123, Broadway, NSW 2007,
More information1 Identical Parallel Machines
FB3: Matheatik/Inforatik Dr. Syaantak Das Winter 2017/18 Optiizing under Uncertainty Lecture Notes 3: Scheduling to Miniize Makespan In any standard scheduling proble, we are given a set of jobs J = {j
More informationOn the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs
On the Inapproxiability of Vertex Cover on k-partite k-unifor Hypergraphs Venkatesan Guruswai and Rishi Saket Coputer Science Departent Carnegie Mellon University Pittsburgh, PA 1513. Abstract. Coputing
More informationAsynchronous Gossip Algorithms for Stochastic Optimization
Asynchronous Gossip Algoriths for Stochastic Optiization S. Sundhar Ra ECE Dept. University of Illinois Urbana, IL 680 ssrini@illinois.edu A. Nedić IESE Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu
More informationFeature Extraction Techniques
Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that
More informatione-companion ONLY AVAILABLE IN ELECTRONIC FORM
OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer
More informationA Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science
A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest
More informationOPTIMIZATION in multi-agent networks has attracted
Distributed constrained optiization and consensus in uncertain networks via proxial iniization Kostas Margellos, Alessandro Falsone, Sione Garatti and Maria Prandini arxiv:603.039v3 [ath.oc] 3 May 07 Abstract
More informationOn Conditions for Linearity of Optimal Estimation
On Conditions for Linearity of Optial Estiation Erah Akyol, Kuar Viswanatha and Kenneth Rose {eakyol, kuar, rose}@ece.ucsb.edu Departent of Electrical and Coputer Engineering University of California at
More informationLost-Sales Problems with Stochastic Lead Times: Convexity Results for Base-Stock Policies
OPERATIONS RESEARCH Vol. 52, No. 5, Septeber October 2004, pp. 795 803 issn 0030-364X eissn 1526-5463 04 5205 0795 infors doi 10.1287/opre.1040.0130 2004 INFORMS TECHNICAL NOTE Lost-Sales Probles with
More informationHomework 3 Solutions CSE 101 Summer 2017
Hoework 3 Solutions CSE 0 Suer 207. Scheduling algoriths The following n = 2 jobs with given processing ties have to be scheduled on = 3 parallel and identical processors with the objective of iniizing
More informationVulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links
Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp
More informationAbout the definition of parameters and regimes of active two-port networks with variable loads on the basis of projective geometry
About the definition of paraeters and regies of active two-port networks with variable loads on the basis of projective geoetry PENN ALEXANDR nstitute of Electronic Engineering and Nanotechnologies "D
More informationMULTIPLAYER ROCK-PAPER-SCISSORS
MULTIPLAYER ROCK-PAPER-SCISSORS CHARLOTTE ATEN Contents 1. Introduction 1 2. RPS Magas 3 3. Ites as a Function of Players and Vice Versa 5 4. Algebraic Properties of RPS Magas 6 References 6 1. Introduction
More informationEnvelope frequency Response Function Analysis of Mechanical Structures with Uncertain Modal Damping Characteristics
Copyright c 2007 Tech Science Press CMES, vol.22, no.2, pp.129-149, 2007 Envelope frequency Response Function Analysis of Mechanical Structures with Uncertain Modal Daping Characteristics D. Moens 1, M.
More informationProbability Distributions
Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples
More informationTesting Properties of Collections of Distributions
Testing Properties of Collections of Distributions Reut Levi Dana Ron Ronitt Rubinfeld April 9, 0 Abstract We propose a fraework for studying property testing of collections of distributions, where the
More informationCurious Bounds for Floor Function Sums
1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International
More informationEstimating Entropy and Entropy Norm on Data Streams
Estiating Entropy and Entropy Nor on Data Streas Ait Chakrabarti 1, Khanh Do Ba 1, and S. Muthukrishnan 2 1 Departent of Coputer Science, Dartouth College, Hanover, NH 03755, USA 2 Departent of Coputer
More informationSupplementary to Learning Discriminative Bayesian Networks from High-dimensional Continuous Neuroimaging Data
Suppleentary to Learning Discriinative Bayesian Networks fro High-diensional Continuous Neuroiaging Data Luping Zhou, Lei Wang, Lingqiao Liu, Philip Ogunbona, and Dinggang Shen Proposition. Given a sparse
More informationIntelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines
Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes
More informationAn incremental mirror descent subgradient algorithm with random sweeping and proximal step
An increental irror descent subgradient algorith with rando sweeping and proxial step Radu Ioan Boţ Axel Böh Septeber 7, 07 Abstract We investigate the convergence properties of increental irror descent
More informationMulti-Dimensional Hegselmann-Krause Dynamics
Multi-Diensional Hegselann-Krause Dynaics A. Nedić Industrial and Enterprise Systes Engineering Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu B. Touri Coordinated Science Laboratory
More informationOn Constant Power Water-filling
On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives
More informationThe Transactional Nature of Quantum Information
The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.
More informationSPECTRUM sensing is a core concept of cognitive radio
World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile
More informationAn incremental mirror descent subgradient algorithm with random sweeping and proximal step
An increental irror descent subgradient algorith with rando sweeping and proxial step Radu Ioan Boţ Axel Böh April 6, 08 Abstract We investigate the convergence properties of increental irror descent type
More informationFPTAS for optimizing polynomials over the mixed-integer points of polytopes in fixed dimension
Matheatical Prograing anuscript No. (will be inserted by the editor) Jesús A. De Loera Rayond Heecke Matthias Köppe Robert Weisantel FPTAS for optiizing polynoials over the ixed-integer points of polytopes
More informationLower Bounds for Quantized Matrix Completion
Lower Bounds for Quantized Matrix Copletion Mary Wootters and Yaniv Plan Departent of Matheatics University of Michigan Ann Arbor, MI Eail: wootters, yplan}@uich.edu Mark A. Davenport School of Elec. &
More informationA Note on Online Scheduling for Jobs with Arbitrary Release Times
A Note on Online Scheduling for Jobs with Arbitrary Release Ties Jihuan Ding, and Guochuan Zhang College of Operations Research and Manageent Science, Qufu Noral University, Rizhao 7686, China dingjihuan@hotail.co
More informationFast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials
Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter
More informationA Generalized Permanent Estimator and its Application in Computing Multi- Homogeneous Bézout Number
Research Journal of Applied Sciences, Engineering and Technology 4(23): 5206-52, 202 ISSN: 2040-7467 Maxwell Scientific Organization, 202 Subitted: April 25, 202 Accepted: May 3, 202 Published: Deceber
More informationResearch Article On the Isolated Vertices and Connectivity in Random Intersection Graphs
International Cobinatorics Volue 2011, Article ID 872703, 9 pages doi:10.1155/2011/872703 Research Article On the Isolated Vertices and Connectivity in Rando Intersection Graphs Yilun Shang Institute for
More informationIN modern society that various systems have become more
Developent of Reliability Function in -Coponent Standby Redundant Syste with Priority Based on Maxiu Entropy Principle Ryosuke Hirata, Ikuo Arizono, Ryosuke Toohiro, Satoshi Oigawa, and Yasuhiko Takeoto
More informationInteractive Markov Models of Evolutionary Algorithms
Cleveland State University EngagedScholarship@CSU Electrical Engineering & Coputer Science Faculty Publications Electrical Engineering & Coputer Science Departent 2015 Interactive Markov Models of Evolutionary
More informationRANDOM GRADIENT EXTRAPOLATION FOR DISTRIBUTED AND STOCHASTIC OPTIMIZATION
RANDOM GRADIENT EXTRAPOLATION FOR DISTRIBUTED AND STOCHASTIC OPTIMIZATION GUANGHUI LAN AND YI ZHOU Abstract. In this paper, we consider a class of finite-su convex optiization probles defined over a distributed
More informationExperimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis
City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna
More informationSTOPPING SIMULATED PATHS EARLY
Proceedings of the 2 Winter Siulation Conference B.A.Peters,J.S.Sith,D.J.Medeiros,andM.W.Rohrer,eds. STOPPING SIMULATED PATHS EARLY Paul Glasseran Graduate School of Business Colubia University New Yor,
More informationStudy on Markov Alternative Renewal Reward. Process for VLSI Cell Partitioning
Int. Journal of Math. Analysis, Vol. 7, 2013, no. 40, 1949-1960 HIKARI Ltd, www.-hikari.co http://dx.doi.org/10.12988/ia.2013.36142 Study on Markov Alternative Renewal Reward Process for VLSI Cell Partitioning
More informationCOS 424: Interacting with Data. Written Exercises
COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well
More informationThis article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and
This article appeared in a ournal published by Elsevier. The attached copy is furnished to the author for internal non-coercial research and education use, including for instruction at the authors institution
More informationUNIVERSITY OF TRENTO ON THE USE OF SVM FOR ELECTROMAGNETIC SUBSURFACE SENSING. A. Boni, M. Conci, A. Massa, and S. Piffer.
UIVRSITY OF TRTO DIPARTITO DI IGGRIA SCIZA DLL IFORAZIO 3823 Povo Trento (Italy) Via Soarive 4 http://www.disi.unitn.it O TH US OF SV FOR LCTROAGTIC SUBSURFAC SSIG A. Boni. Conci A. assa and S. Piffer
More informationA Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay
A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer
More informationRandomized Recovery for Boolean Compressed Sensing
Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch
More informationTight Complexity Bounds for Optimizing Composite Objectives
Tight Coplexity Bounds for Optiizing Coposite Objectives Blake Woodworth Toyota Technological Institute at Chicago Chicago, IL, 60637 blake@ttic.edu Nathan Srebro Toyota Technological Institute at Chicago
More informationBipartite subgraphs and the smallest eigenvalue
Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.
More informationA Theoretical Analysis of a Warm Start Technique
A Theoretical Analysis of a War Start Technique Martin A. Zinkevich Yahoo! Labs 701 First Avenue Sunnyvale, CA Abstract Batch gradient descent looks at every data point for every step, which is wasteful
More informationRecovering Data from Underdetermined Quadratic Measurements (CS 229a Project: Final Writeup)
Recovering Data fro Underdeterined Quadratic Measureents (CS 229a Project: Final Writeup) Mahdi Soltanolkotabi Deceber 16, 2011 1 Introduction Data that arises fro engineering applications often contains
More informationTopic 5a Introduction to Curve Fitting & Linear Regression
/7/08 Course Instructor Dr. Rayond C. Rup Oice: A 337 Phone: (95) 747 6958 E ail: rcrup@utep.edu opic 5a Introduction to Curve Fitting & Linear Regression EE 4386/530 Coputational ethods in EE Outline
More informationLinear recurrences and asymptotic behavior of exponential sums of symmetric boolean functions
Linear recurrences and asyptotic behavior of exponential sus of syetric boolean functions Francis N. Castro Departent of Matheatics University of Puerto Rico, San Juan, PR 00931 francis.castro@upr.edu
More informationBoosting with log-loss
Boosting with log-loss Marco Cusuano-Towner Septeber 2, 202 The proble Suppose we have data exaples {x i, y i ) i =... } for a two-class proble with y i {, }. Let F x) be the predictor function with the
More informationStochastic Subgradient Methods
Stochastic Subgradient Methods Lingjie Weng Yutian Chen Bren School of Inforation and Coputer Science University of California, Irvine {wengl, yutianc}@ics.uci.edu Abstract Stochastic subgradient ethods
More informationKonrad-Zuse-Zentrum für Informationstechnik Berlin Heilbronner Str. 10, D Berlin - Wilmersdorf
Konrad-Zuse-Zentru für Inforationstechnik Berlin Heilbronner Str. 10, D-10711 Berlin - Wilersdorf Folkar A. Borneann On the Convergence of Cascadic Iterations for Elliptic Probles SC 94-8 (Marz 1994) 1
More informationSaddle Points in Random Matrices: Analysis of Knuth Search Algorithms
Saddle Points in Rando Matrices: Analysis of Knuth Search Algoriths Micha Hofri Philippe Jacquet Dept. of Coputer Science INRIA, Doaine de Voluceau - Rice University Rocquencourt - B.P. 05 Houston TX 77005
More informationa a a a a a a m a b a b
Algebra / Trig Final Exa Study Guide (Fall Seester) Moncada/Dunphy Inforation About the Final Exa The final exa is cuulative, covering Appendix A (A.1-A.5) and Chapter 1. All probles will be ultiple choice
More informationRESTARTED FULL ORTHOGONALIZATION METHOD FOR SHIFTED LINEAR SYSTEMS
BIT Nuerical Matheatics 43: 459 466, 2003. 2003 Kluwer Acadeic Publishers. Printed in The Netherlands 459 RESTARTED FULL ORTHOGONALIZATION METHOD FOR SHIFTED LINEAR SYSTEMS V. SIMONCINI Dipartiento di
More informationOn the Existence of Pure Nash Equilibria in Weighted Congestion Games
MATHEMATICS OF OPERATIONS RESEARCH Vol. 37, No. 3, August 2012, pp. 419 436 ISSN 0364-765X (print) ISSN 1526-5471 (online) http://dx.doi.org/10.1287/oor.1120.0543 2012 INFORMS On the Existence of Pure
More informationBirthday Paradox Calculations and Approximation
Birthday Paradox Calculations and Approxiation Joshua E. Hill InfoGard Laboratories -March- v. Birthday Proble In the birthday proble, we have a group of n randoly selected people. If we assue that birthdays
More informationOptimal Jamming Over Additive Noise: Vector Source-Channel Case
Fifty-first Annual Allerton Conference Allerton House, UIUC, Illinois, USA October 2-3, 2013 Optial Jaing Over Additive Noise: Vector Source-Channel Case Erah Akyol and Kenneth Rose Abstract This paper
More informationNew Slack-Monotonic Schedulability Analysis of Real-Time Tasks on Multiprocessors
New Slack-Monotonic Schedulability Analysis of Real-Tie Tasks on Multiprocessors Risat Mahud Pathan and Jan Jonsson Chalers University of Technology SE-41 96, Göteborg, Sweden {risat, janjo}@chalers.se
More informationarxiv: v1 [cs.ds] 3 Feb 2014
arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/
More informationTHE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT
THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT PETER BORWEIN AND KWOK-KWONG STEPHEN CHOI Abstract. Let n be any integer and ( n ) X F n : a i z i : a i, ± i be the set of all polynoials of height and
More informationApproximation in Stochastic Scheduling: The Power of LP-Based Priority Policies
Approxiation in Stochastic Scheduling: The Power of -Based Priority Policies Rolf Möhring, Andreas Schulz, Marc Uetz Setting (A P p stoch, r E( w and (B P p stoch E( w We will assue that the processing
More informationThe Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate
The Siplex Method is Strongly Polynoial for the Markov Decision Proble with a Fixed Discount Rate Yinyu Ye April 20, 2010 Abstract In this note we prove that the classic siplex ethod with the ost-negativereduced-cost
More informationAn Algorithm for Posynomial Geometric Programming, Based on Generalized Linear Programming
An Algorith for Posynoial Geoetric Prograing, Based on Generalized Linear Prograing Jayant Rajgopal Departent of Industrial Engineering University of Pittsburgh, Pittsburgh, PA 526 Dennis L. Bricer Departent
More information