arxiv: v1 [cs.ds] 29 Jan 2012
|
|
- Constance French
- 5 years ago
- Views:
Transcription
1 A parallel approxiation algorith for ixed packing covering seidefinite progras arxiv: v1 [cs.ds] 29 Jan 2012 Rahul Jain National U. Singapore January 28, 2012 Abstract Penghui Yao National U. Singapore We present a parallel approxiation algorith for a class of ixed packing covering seidefinite progras which generalize on the class of positive seidefinite progras as considered by Jain Yao [6]. As a corollary we get a faster approxiation algorith for positive seidefinite progras with better dependence of the parallel running tie on the approxiation factor, as copared to that of Jain Yao [6]. Our algorith analysis is on siilar lines as that of Young [10] who considered analogous linear progras. 1 Introduction Fast parallel approxiation algoriths for seidefinite progras have been the focus of study of any recent works (e.g. [1, 2, 7, 5, 4, 3]) have resulted in any interesting applications including the well known QIP = PSPACE [3] result. In any of the previous works, the running tie of the algoriths had polylog dependence on the size of the input progra but in addition also had polynoial dependence of soe width paraeter (which varied for different algoriths). Soeties (for specific instances of input progras) the width paraeter could be as large as the size of the progra aking it an iportant bottleneck. Recently Jain Yao [6] presented a fast parallel approxiation algorith for an iportant subclass of seidefinite progras, called as positive seidefinite progras, their algorith had no dependence on any width paraeter. Their algorith was inspired by an algorith by Luby Nisan [8] for positive linear progras. In this work we consider a ore general ixed packing covering optiization proble. We first consider the following feasibility task Q1. Q1: Given n n positive seidefinite atrices P 1,..., P, P non-negative diagonal atrices C 1,..., C, C ε (0, 1), find an ε-approxiate feasible vector x 0 such that (while coparing atrices we let, represent the Löwner order), x i P i (1+ε)P x i C i C Centre for Quantu Technologies Departent of Coputer Science, National University of Singapore, Block S15, 3 Science Drive 2, Singapore Eail: rahul@cop.nus.edu.sg. Centre for Quantu Technologies Departent of Coputer Science, National University of Singapore, Block S15, 3 Science Drive 2, Singapore Eail: pyao@nus.edu.sg. 1
2 or show that the following is infeasible x i P i P x i C i C. We present an algorith for Q1 running in parallel tie polylog(n, ) 1 ε 4 log 1 ε. Using this stard binary search, a ultiplicative (1 ε) approxiate solution can be obtained for the following optiization task Q2 in parallel tie polylog(n, ) 1 ε 4 log 1 ε. Q2: Given n n positive seidefinite atrices P 1,..., P, P non-negative diagonal atrices C 1,..., C, C, axiize: subject to: γ x i P i P x i C i γc i [] : x i 0. The following special case of Q2 is referred to as a positive seidefinite progra. Q3: Given n n positive seidefinite atrices P 1,..., P, P non-negative scalars c 1,..., c, axiize: x i c i subject to: x i P i P i [] : x i 0. Our algorith for Q1 its analysis is on siilar lines as the algorith analysis of Young [10] who had considered analogous questions for linear progras. As a corollary we get an algorith for approxiating positive seidefinite progras (Q3) with better dependence of the parallel running tie on ε as copared to that of Jain Yao [6] ( arguably with sipler analysis). Very recently, in an independent work, Peng Tangwongsan [9] also presented a fast parallel algorith for positive seidefinite progras. Their work is also inspired by Young [10]. 2 Algorith analysis We ention without elaborating that using stard arguents the feasibility question Q1 can be easily transfored, in parallel tie polylog(n), to the special case when P C are identity atrices we consider this special case fro now on. Our algorith is presented in Figure 1. Idea of the algorith The algorith starts with an initial value for x such that x ip i 1. It akes increents to the vector x such that with each increent, the increase in x ip i is not ore than 2
3 (1+O(ε)) ties the increase in the iniu eigenvalue of x ic i. We argue that it is always possible to increent x in this anner if the input instance is feasible, hence the algorith outputs infeasible if it cannot find such an increent to x. The algorith stops when the iniu eigenvalue of x ic i has exceeded 1. Due to our condition on the increents, at the end of the algorith we also have x ip i (1+O(ε))1. We obtain hle on the largest sallest eigenvalues of concerned atrices via their soft versions, which are ore easily hled functions of those atrices (see definition in the next section). Input : n n positive seidefinite atrices P 1,..., P, non-negative diagonal atrices C 1,..., C, error paraeter ε (0, 1). Output : Eitherinfeasible, which eans there is no x such that (1 is the identity atrix), x i P i 1 x i C i 1. OR an x R such that 1. Set x j = 1 P j. xi P i (1+9ε)1 2. Set N = 1 ε ( x ip i + 2 ln n+ln ). xi C i While λ in ( x ic i ) < N (λ in represents iniu eigenvalue), do (a) Set local j (x) = Tr(exp( x ip i ) P j ) Tr(exp( x ic i ) C j ) global(x) = Tr exp( x ip i ) Tr(exp( x ic i )). (b) If g is not yet set or in j {local j (x)} > g(1+ ε), set g = global(x). (c) If in j {local j (x)} > global(x), returninfeasible. (d) For all j [], set C j = Π j C j Π j, where Π j is the projection onto the eigenspace of x ic i with eigenvalues at ost N. (e) Choose increent vector α 0 scalar δ > 0 such that (f) Set x = x+α. 4. Return x = x/n. j : α j = x j δ if local j (x) g(1+ ε), else α j = 0, ax{ α i P i, α i C i } = ε. Figure 1: Algorith 3
4 Correctness analysis We begin with the definitions of soft axiu iniu eigenvalues of a positive seidefinite atrix A. They are inspired by analogous definitions ade in Young [10] in the context of vectors. Definition 1. For positive seidefinite atrix A, define Iax(A) def = ln Tr exp(a), Iin(A) def = ln Tr exp( A). Note that Iax(A) A Iin(A) λ in (A), where λ in (A) is the iniu eigenvalue of A. We show the following lea in the appendix, which shows that if a sall increent is ade in the vector x, then changes in Iax( x ja j ) Iin( x j A j ) can be bounded appropriately. Lea 2. Let A 1,..., A be positive seidefinite atrices let x 0, α 0 be vectors in R. If α ia i ε 1, then Iax( Iin( (x j + α j )A j ) Iax( (x j + α j )A j ) Iin( x j A j ) x j A j ) (1+ ε) Tr(exp( x ia i )) (1 ε/2) Tr(exp( x ia i )) Lea 3. At step 3(e) of the algorith, for any j with α j > 0 we have, α j Tr(exp( α j Tr(exp( x i A i )A j ), x i A i )A j ). Tr(exp( x ip i ) P j ) Tr(exp( x ip i )) (1+ ε) Tr(exp( x ic i ) C j ) Tr(exp( x. ic i )) Proof. Consider any execution of step 3(e) of the algorith. Fix j such α j > 0. Note that, local j (x) global(x) = Tr(exp( x ip i ) P j ) Tr(exp( x ic i )) Tr(exp( x ip i )) Tr(exp( x ic i ) C j ). We will show that global(x) g throughout the algorith this will show the desired since that local j (x) (1+ ε)g (1+ε)global(x). At step 3(b) of the algorith, g can be equal to global(x). Since x never decreases during the algorith, at step 3(a), global(x) can only increase. At step 3(d), the odification of C j s only decreases Tr(exp( x ic i )) hence again global(x) can only increase. Lea 4. For each increent of x at step 3(f) of the algorith, Iax( (x j + α j )P j ) Iax( x j P j ) (1+ ε) 3 (Iin( (x j + α j )C j ) Iin( ). 4
5 Proof. Consider, Iax( (x j + α j )P j ) Iax( (1+ ε) Tr(exp( x ip i )) (1+ ε) 2 Tr(exp( x ic i )) ( (1+ε)2 Iin( 1 ε/2 This shows the desired. x j P j ) α j Tr(exp( α j Tr(exp( x i P i )P j ) (fro Lea 2) (x j + α j )C j ) Iin( x i C i )C j ) (fro Lea 3 step 3(e) of the algorith) ) (fro Lea 2). Lea 5. If the input instance P 1,..., P, C 1,..., C is feasible, that is there exists vector y R such that y i P i 1 y i C i 1, then always at step 3(c) of the algorith, in j {local j (x)} global(x). Hence the algorith will return soe x. If the algorith outputsinfeasible, then the input instance is not feasible. Proof. Consider soe execution of step 3(c) of the algorith. Let C 1,..., C be the current values of C 1,..., C. Note that if the input is feasible with vector y, then we will also have Tr(exp( x ip i )( y jp j )) Tr(exp( x ip i )) 1 Tr(exp( x ic i )( y jc j )) Tr(exp( x ic i )). Therefore there exists j [] such that Tr(exp( x ip i )P j ) Tr(exp( x ip i )) Tr(exp( x ic i )C j ) Tr(exp( x ic i )), hence local j (x) global(x). If the algorith outputs infeasible, then at that point in j {local j (x)} > global(x) hence fro the arguent above P 1,..., P, C 1,..., C is infeasible which in turn iplies that P 1,..., P, C 1,..., C is infeasible. Lea 6. If the algorith returns soe x, then xi P i (1+9ε)1 xi C i 1. Proof. Because of the condition of the while loop, it is clear that x i C i 1. For x R, define Φ(x) def = Iax( x j P j ) (1+ ε) 3 Iin(. 5
6 Note that the update of C j s at step 3(d) only increase Iin( x jc j ). Hence using Lea 4, we conclude that Φ(x) is non-decreasing during the algorith. At step 1 of the algorith, Φ(x) Iax( ln(n exp( x j P j ) = ln Tr(exp( x i P i )) x i P i )) ln(n exp( Hence just before the last increent, x i P i Iax( x j P j ) Φ(x)+(1+ ε) 3 Iin( x i P i )) = ln n+1. ln n+ 1+(1+ ε) 3 Iin( ln n+ 1+(1+ ε) 3 λ in ( ln n+ 1+(1+ ε) 3 N (1+8ε)N. In the last increent, because of the condition on step 3(e) of the algorith, x ip i increase by at ost ε. Hence x i P i (1+9ε)1. Running tie analysis Lea 7. Assue that the algorith does not return infeasible for soe input instance. The nuber of ties g is increased at step 3(b) of the algorith is O(N/ε). Proof. At the beginning of the algorith Tr(exp( x ic i )) n since each eigenvalue of exp( x ic i ) is at ost 1. Also Tr exp( x ip i ) 1. Hence g = global(x) = Tr exp( x ip i ) Tr(exp( x ic i )) 1 n 1 exp(n). At the end of the algorith λ in ( x ic i ) N+ε 2N. Hence Tr(exp( x i C i )) exp( x i C i ) = exp( λ in( x i C i )) exp( 2N). Also (using Lea 6) Tr(exp( x i P i )) n exp( x i P i ) n exp((1+9ε)n) exp(11n). Hence g global(x) exp(13n). Whenever g is updated at step 3(b) of the algorith, we have global(x) in{local j (x)} > (1+ε)g j just before the update global(x) = g just after the update. Thus g increases by at least (1+ε) ultiplicative factor. Hence the nuber of ties g increases is O(N/ε). 6
7 Lea 8. Assue that the algorith does not return infeasible for soe input instance. The nuber of iterations of the while loop in the algorith for a fixed value of g is O(N log(n)/ε). Proof. Fro Lea 6 step 3(d) of the algorith we have ax{ x ip i, x ic i } = O(N) throughout the algorith. On the other h we have ax{ δx ip i, δx ic i } = ε at step 3(e). Hence δ = Ω(ε/N) throughout the algorith. Let x j be increased in the last iteration of the while loop for a fixed value of g. Note that x j is initially 1/( Pj ) at the end x j is at ost 10N/ Pj (since, using Lea 6, xj P j x j P j 10N). Hence the algorith akes at ost O(log(N)/δ) = O(N log(n)/ε) increents for each x j. Note that local j (x) only increases throughout the algorith (easily seen for steps 3(d) 3(e) of the algorith). Hence since the last iteration of the while loop (for this fixed g) increases x j, it ust be that each iteration of the while loop increases x j. Hence, the nuber of iterations of the while loop (for this fixed g) is O(N log(n)/ε). We clai (without further justification) that each individual step in the algorith can be perfored in parallel tie polylog(n). Hence cobining the above leas using N = O( ln(n) ε ), we get Corollary 9. The parallel running tie of the algorith is upper bounded by polylog(n) 1 ε 4 log 1 ε. References [1] S. Arora, E. Hazan, S. Kale. Fast algoriths for approxiate seidefinite prograing using the ultiplicative weights update ethod. In Proceedings of the 46th Annual IEEE Syposiu on Foundations of Coputer Science, pages , [2] S. Arora S. Kale. A cobinatorial, prial-dual approach to seidefinite progras. In Proceedings of the Thirty-Ninth Annual ACM Syposiu on Theory of Coputing, pages , [3] R. Jain, Z. Ji, S. Upadhyay, J. Watrous. QIP = PSPACE. In Proceedings of the 42nd ACM syposiu on Theory of coputing, STOC 10, pages , New York, NY, USA, ACM. [4] R. Jain, S. Upadhyay, J. Watrous. Two-essage quantu interactive proofs are in PSPACE. In Proceedings of the 50th Annual IEEE Syposiu on Foundations of Coputer Science, FOCS 09, pages , Washington, DC, USA, IEEE Coputer Society. [5] R. Jain J. Watrous. Parallel approxiation of non-interactive zero-su quantu gaes. In Proceedings of the th Annual IEEE Conference on Coputational Coplexity, CCC 09, pages , Washington, DC, USA, IEEE Coputer Society. [6] R. Jain P. Yao. A parallel approxiation algorith for positive seidefinite prograing. In Proceedings of the 52nd Annual IEEE Syposiu on Foundations of Coputer Science, FOCS 11, Washington, DC, USA, IEEE Coputer Society. [7] S. Kale. Efficient algoriths using the ultiplicative weights update ethod. PhD thesis, Princeton University, [8] M. Luby N. Nisan. A parallel approxiation algorith for positive linear prograing. In Proceedings of the twenty-fifth annual ACM syposiu on Theory of coputing, STOC 93, pages , New York, NY, USA, ACM. [9] R. Peng K. Tangwongsan. Faster Sipler Width-Independent Parallel Algoriths for Positive Seidefinite Prograing. ArXiv e-prints : arxiv: , January
8 [10] N. E. Young. Sequential parallel algoriths for ixed packing covering. In Proceedings of the 42nd Annual IEEE Syposiu on Foundations of Coputer Science, FOCS 01, pages , A Deferred proofs Proof of Lea 2: We will use the following Golden-Thopson inequality. Fact 10. For Heritian atrices A, B : Tr(exp(A+B)) Tr exp(a) exp(b). We will also need the following fact. Fact 11. Let A be positive seidefinite with A ε 1. Then, Consider, Iax( exp(a) 1+(1+ε)A exp( A) 1 (1 ε/2)a. (x j + α j )A j ) Iax( x j A j ) ( Tr exp( ) = ln (x i + α i )A i ) Tr exp( x ia i ) ( Tr exp( x i A i ) exp( ln α ) ja j ) Tr exp( x (fro Fact 10) i A i ) ( Tr exp( x i A i )(1+(1+ε)( = ln α ) ja j )) Tr exp( x (fro Fact 11) ia i ) ( = ln 1+ (1+ε) Tr exp( x ia i )( α ) j A j ) Tr exp( x ia i ) (1+ ε) Tr exp( x ia i )( α ja j ) Tr exp( x ia i ) (since ln(1 + a) a for all real a) The desired bound on Iin( (x j+ α j )A j ) Iin( x j A j ) follows by analogous calculations. 8
Bipartite subgraphs and the smallest eigenvalue
Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.
More informationLecture 9 November 23, 2015
CSC244: Discrepancy Theory in Coputer Science Fall 25 Aleksandar Nikolov Lecture 9 Noveber 23, 25 Scribe: Nick Spooner Properties of γ 2 Recall that γ 2 (A) is defined for A R n as follows: γ 2 (A) = in{r(u)
More informationLecture 21. Interior Point Methods Setup and Algorithm
Lecture 21 Interior Point Methods In 1984, Kararkar introduced a new weakly polynoial tie algorith for solving LPs [Kar84a], [Kar84b]. His algorith was theoretically faster than the ellipsoid ethod and
More informationThe Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate
The Siplex Method is Strongly Polynoial for the Markov Decision Proble with a Fixed Discount Rate Yinyu Ye April 20, 2010 Abstract In this note we prove that the classic siplex ethod with the ost-negativereduced-cost
More informationA Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness
A Note on Scheduling Tall/Sall Multiprocessor Tasks with Unit Processing Tie to Miniize Maxiu Tardiness Philippe Baptiste and Baruch Schieber IBM T.J. Watson Research Center P.O. Box 218, Yorktown Heights,
More informationIntelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines
Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes
More informationQuantum Speed-ups for Semidefinite Programming
Quantu Speed-ups for Seidefinite Prograing FERNANDO G.S.L. BRANDÃO AND KRYSA M. SVORE 2 arxiv:609.05537v4 [quant-ph] 20 Apr 207 Institute of Quantu Inforation and Matter, California Institute of echnology,
More informationADVANCES ON THE BESSIS- MOUSSA-VILLANI TRACE CONJECTURE
ADVANCES ON THE BESSIS- MOUSSA-VILLANI TRACE CONJECTURE CHRISTOPHER J. HILLAR Abstract. A long-standing conjecture asserts that the polynoial p(t = Tr(A + tb ] has nonnegative coefficients whenever is
More informationarxiv: v1 [cs.ds] 3 Feb 2014
arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/
More informationQuantum Speed-ups for Semidefinite Programming
Quantu Speed-ups for Seidefinite Prograing FERNANDO G.S.L. BRANDÃO AND KRYSA M. SVORE 2 arxiv:609.05537v5 [quant-ph] 24 Sep 207 Institute of Quantu Inforation and Matter, California Institute of echnology,
More informationConvex Programming for Scheduling Unrelated Parallel Machines
Convex Prograing for Scheduling Unrelated Parallel Machines Yossi Azar Air Epstein Abstract We consider the classical proble of scheduling parallel unrelated achines. Each job is to be processed by exactly
More informationOn the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs
On the Inapproxiability of Vertex Cover on k-partite k-unifor Hypergraphs Venkatesan Guruswai and Rishi Saket Coputer Science Departent Carnegie Mellon University Pittsburgh, PA 1513. Abstract. Coputing
More informationList Scheduling and LPT Oliver Braun (09/05/2017)
List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)
More information13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices
CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay
More informationPhysics 215 Winter The Density Matrix
Physics 215 Winter 2018 The Density Matrix The quantu space of states is a Hilbert space H. Any state vector ψ H is a pure state. Since any linear cobination of eleents of H are also an eleent of H, it
More informationFeature Extraction Techniques
Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that
More informationA Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science
A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest
More informationOn Constant Power Water-filling
On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives
More informationAlgorithms for parallel processor scheduling with distinct due windows and unit-time jobs
BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and
More informationGenetic Quantum Algorithm and its Application to Combinatorial Optimization Problem
Genetic Quantu Algorith and its Application to Cobinatorial Optiization Proble Kuk-Hyun Han Dept. of Electrical Engineering, KAIST, 373-, Kusong-dong Yusong-gu Taejon, 305-70, Republic of Korea khhan@vivaldi.kaist.ac.kr
More informationCourse Notes for EE227C (Spring 2018): Convex Optimization and Approximation
Course Notes for EE7C (Spring 018: Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee7c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee7c@berkeley.edu October 15,
More informationSupport Vector Machines MIT Course Notes Cynthia Rudin
Support Vector Machines MIT 5.097 Course Notes Cynthia Rudin Credit: Ng, Hastie, Tibshirani, Friedan Thanks: Şeyda Ertekin Let s start with soe intuition about argins. The argin of an exaple x i = distance
More informationCh 12: Variations on Backpropagation
Ch 2: Variations on Backpropagation The basic backpropagation algorith is too slow for ost practical applications. It ay take days or weeks of coputer tie. We deonstrate why the backpropagation algorith
More informationCurious Bounds for Floor Function Sums
1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International
More informationPolygonal Designs: Existence and Construction
Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G
More informationHomework 3 Solutions CSE 101 Summer 2017
Hoework 3 Solutions CSE 0 Suer 207. Scheduling algoriths The following n = 2 jobs with given processing ties have to be scheduled on = 3 parallel and identical processors with the objective of iniizing
More informationDepartment of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China
6th International Conference on Machinery, Materials, Environent, Biotechnology and Coputer (MMEBC 06) Solving Multi-Sensor Multi-Target Assignent Proble Based on Copositive Cobat Efficiency and QPSO Algorith
More informationFaster and Simpler Algorithms for Multicommodity Flow and other. Fractional Packing Problems. Abstract
Faster and Sipler Algoriths for Multicoodity Flow and other Fractional Packing Probles Naveen Garg Jochen Koneann y Abstract This paper considers the proble of designing fast, approxiate, cobinatorial
More informationApproximation in Stochastic Scheduling: The Power of LP-Based Priority Policies
Approxiation in Stochastic Scheduling: The Power of -Based Priority Policies Rolf Möhring, Andreas Schulz, Marc Uetz Setting (A P p stoch, r E( w and (B P p stoch E( w We will assue that the processing
More informationModel Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon
Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential
More informationBlock designs and statistics
Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent
More informationOn Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40
On Poset Merging Peter Chen Guoli Ding Steve Seiden Abstract We consider the follow poset erging proble: Let X and Y be two subsets of a partially ordered set S. Given coplete inforation about the ordering
More informationBoosting with log-loss
Boosting with log-loss Marco Cusuano-Towner Septeber 2, 202 The proble Suppose we have data exaples {x i, y i ) i =... } for a two-class proble with y i {, }. Let F x) be the predictor function with the
More informationTopic 5a Introduction to Curve Fitting & Linear Regression
/7/08 Course Instructor Dr. Rayond C. Rup Oice: A 337 Phone: (95) 747 6958 E ail: rcrup@utep.edu opic 5a Introduction to Curve Fitting & Linear Regression EE 4386/530 Coputational ethods in EE Outline
More informationTight Information-Theoretic Lower Bounds for Welfare Maximization in Combinatorial Auctions
Tight Inforation-Theoretic Lower Bounds for Welfare Maxiization in Cobinatorial Auctions Vahab Mirrokni Jan Vondrák Theory Group, Microsoft Dept of Matheatics Research Princeton University Redond, WA 9805
More informatione-companion ONLY AVAILABLE IN ELECTRONIC FORM
OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer
More informationReed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product.
Coding Theory Massoud Malek Reed-Muller Codes An iportant class of linear block codes rich in algebraic and geoetric structure is the class of Reed-Muller codes, which includes the Extended Haing code.
More informationA note on the multiplication of sparse matrices
Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani
More informationSupport Vector Machines. Machine Learning Series Jerry Jeychandra Blohm Lab
Support Vector Machines Machine Learning Series Jerry Jeychandra Bloh Lab Outline Main goal: To understand how support vector achines (SVMs) perfor optial classification for labelled data sets, also a
More informationVulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links
Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp
More informationEMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS
EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS Jochen Till, Sebastian Engell, Sebastian Panek, and Olaf Stursberg Process Control Lab (CT-AST), University of Dortund,
More informationChaotic Coupled Map Lattices
Chaotic Coupled Map Lattices Author: Dustin Keys Advisors: Dr. Robert Indik, Dr. Kevin Lin 1 Introduction When a syste of chaotic aps is coupled in a way that allows the to share inforation about each
More informationThe Transactional Nature of Quantum Information
The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.
More informationLecture 20 November 7, 2013
CS 229r: Algoriths for Big Data Fall 2013 Prof. Jelani Nelson Lecture 20 Noveber 7, 2013 Scribe: Yun Willia Yu 1 Introduction Today we re going to go through the analysis of atrix copletion. First though,
More informationUniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval
Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,
More informationExact tensor completion with sum-of-squares
Proceedings of Machine Learning Research vol 65:1 54, 2017 30th Annual Conference on Learning Theory Exact tensor copletion with su-of-squares Aaron Potechin Institute for Advanced Study, Princeton David
More informationLecture 13 Eigenvalue Problems
Lecture 13 Eigenvalue Probles MIT 18.335J / 6.337J Introduction to Nuerical Methods Per-Olof Persson October 24, 2006 1 The Eigenvalue Decoposition Eigenvalue proble for atrix A: Ax = λx with eigenvalues
More informationSupport Vector Machines. Goals for the lecture
Support Vector Machines Mark Craven and David Page Coputer Sciences 760 Spring 2018 www.biostat.wisc.edu/~craven/cs760/ Soe of the slides in these lectures have been adapted/borrowed fro aterials developed
More informationKernel Methods and Support Vector Machines
Intelligent Systes: Reasoning and Recognition Jaes L. Crowley ENSIAG 2 / osig 1 Second Seester 2012/2013 Lesson 20 2 ay 2013 Kernel ethods and Support Vector achines Contents Kernel Functions...2 Quadratic
More informationChapter 6 1-D Continuous Groups
Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:
More informationDistributed Subgradient Methods for Multi-agent Optimization
1 Distributed Subgradient Methods for Multi-agent Optiization Angelia Nedić and Asuan Ozdaglar October 29, 2007 Abstract We study a distributed coputation odel for optiizing a su of convex objective functions
More informationarxiv: v1 [cs.ds] 17 Mar 2016
Tight Bounds for Single-Pass Streaing Coplexity of the Set Cover Proble Sepehr Assadi Sanjeev Khanna Yang Li Abstract arxiv:1603.05715v1 [cs.ds] 17 Mar 2016 We resolve the space coplexity of single-pass
More informationIntroduction to Discrete Optimization
Prof. Friedrich Eisenbrand Martin Nieeier Due Date: March 9 9 Discussions: March 9 Introduction to Discrete Optiization Spring 9 s Exercise Consider a school district with I neighborhoods J schools and
More informationComplex Quadratic Optimization and Semidefinite Programming
Coplex Quadratic Optiization and Seidefinite Prograing Shuzhong Zhang Yongwei Huang August 4 Abstract In this paper we study the approxiation algoriths for a class of discrete quadratic optiization probles
More informationA Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay
A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer
More informationA note on the realignment criterion
A note on the realignent criterion Chi-Kwong Li 1, Yiu-Tung Poon and Nung-Sing Sze 3 1 Departent of Matheatics, College of Willia & Mary, Williasburg, VA 3185, USA Departent of Matheatics, Iowa State University,
More informationŞtefan ŞTEFĂNESCU * is the minimum global value for the function h (x)
7Applying Nelder Mead s Optiization Algorith APPLYING NELDER MEAD S OPTIMIZATION ALGORITHM FOR MULTIPLE GLOBAL MINIMA Abstract Ştefan ŞTEFĂNESCU * The iterative deterinistic optiization ethod could not
More informationThe Simplex and Policy-Iteration Methods are Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate
The Siplex and Policy-Iteration Methods are Strongly Polynoial for the Markov Decision Proble with a Fixed Discount Rate Yinyu Ye Departent of Manageent Science and Engineering, Stanford University, Stanford,
More informationThis article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and
This article appeared in a ournal published by Elsevier. The attached copy is furnished to the author for internal non-coercial research and education use, including for instruction at the authors institution
More informationRandomized Recovery for Boolean Compressed Sensing
Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch
More informationPattern Recognition and Machine Learning. Artificial Neural networks
Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lessons 7 20 Dec 2017 Outline Artificial Neural networks Notation...2 Introduction...3 Key Equations... 3 Artificial
More informationEstimating Entropy and Entropy Norm on Data Streams
Estiating Entropy and Entropy Nor on Data Streas Ait Chakrabarti 1, Khanh Do Ba 1, and S. Muthukrishnan 2 1 Departent of Coputer Science, Dartouth College, Hanover, NH 03755, USA 2 Departent of Coputer
More informationCOS 424: Interacting with Data. Written Exercises
COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well
More informationThe Simplex and Policy-Iteration Methods are Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate
The Siplex and Policy-Iteration Methods are Strongly Polynoial for the Markov Decision Proble with a Fixed Discount Rate Yinyu Ye April 20, 2010; revised Noveber 30, 2010 Abstract We prove that the classic
More informationa a a a a a a m a b a b
Algebra / Trig Final Exa Study Guide (Fall Seester) Moncada/Dunphy Inforation About the Final Exa The final exa is cuulative, covering Appendix A (A.1-A.5) and Chapter 1. All probles will be ultiple choice
More informationCS Lecture 13. More Maximum Likelihood
CS 6347 Lecture 13 More Maxiu Likelihood Recap Last tie: Introduction to axiu likelihood estiation MLE for Bayesian networks Optial CPTs correspond to epirical counts Today: MLE for CRFs 2 Maxiu Likelihood
More information1 Bounding the Margin
COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #12 Scribe: Jian Min Si March 14, 2013 1 Bounding the Margin We are continuing the proof of a bound on the generalization error of AdaBoost
More informationLower Bounds for Quantized Matrix Completion
Lower Bounds for Quantized Matrix Copletion Mary Wootters and Yaniv Plan Departent of Matheatics University of Michigan Ann Arbor, MI Eail: wootters, yplan}@uich.edu Mark A. Davenport School of Elec. &
More informationBest Arm Identification: A Unified Approach to Fixed Budget and Fixed Confidence
Best Ar Identification: A Unified Approach to Fixed Budget and Fixed Confidence Victor Gabillon Mohaad Ghavazadeh Alessandro Lazaric INRIA Lille - Nord Europe, Tea SequeL {victor.gabillon,ohaad.ghavazadeh,alessandro.lazaric}@inria.fr
More informationASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical
IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul
More informationSupport Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization
Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering
More informationOn a few Iterative Methods for Solving Nonlinear Equations
On a few Iterative Methods for Solving Nonlinear Equations Gyurhan Nedzhibov Laboratory of Matheatical Modelling, Shuen University, Shuen 971, Bulgaria e-ail: gyurhan@shu-bg.net Abstract In this study
More informationNew Slack-Monotonic Schedulability Analysis of Real-Time Tasks on Multiprocessors
New Slack-Monotonic Schedulability Analysis of Real-Tie Tasks on Multiprocessors Risat Mahud Pathan and Jan Jonsson Chalers University of Technology SE-41 96, Göteborg, Sweden {risat, janjo}@chalers.se
More informationOn the Analysis of the Quantum-inspired Evolutionary Algorithm with a Single Individual
6 IEEE Congress on Evolutionary Coputation Sheraton Vancouver Wall Centre Hotel, Vancouver, BC, Canada July 16-1, 6 On the Analysis of the Quantu-inspired Evolutionary Algorith with a Single Individual
More informationOptimal quantum detectors for unambiguous detection of mixed states
PHYSICAL REVIEW A 69, 06318 (004) Optial quantu detectors for unabiguous detection of ixed states Yonina C. Eldar* Departent of Electrical Engineering, Technion Israel Institute of Technology, Haifa 3000,
More informationMathematical Model and Algorithm for the Task Allocation Problem of Robots in the Smart Warehouse
Aerican Journal of Operations Research, 205, 5, 493-502 Published Online Noveber 205 in SciRes. http://www.scirp.org/journal/ajor http://dx.doi.org/0.4236/ajor.205.56038 Matheatical Model and Algorith
More informationResearch Article On the Isolated Vertices and Connectivity in Random Intersection Graphs
International Cobinatorics Volue 2011, Article ID 872703, 9 pages doi:10.1155/2011/872703 Research Article On the Isolated Vertices and Connectivity in Rando Intersection Graphs Yilun Shang Institute for
More informationA Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words)
1 A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine (1900 words) Contact: Jerry Farlow Dept of Matheatics Univeristy of Maine Orono, ME 04469 Tel (07) 866-3540 Eail: farlow@ath.uaine.edu
More informationFast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials
Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter
More informationA Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair
Proceedings of the 6th SEAS International Conference on Siulation, Modelling and Optiization, Lisbon, Portugal, Septeber -4, 006 0 A Siplified Analytical Approach for Efficiency Evaluation of the eaving
More informationINNER CONSTRAINTS FOR A 3-D SURVEY NETWORK
eospatial Science INNER CONSRAINS FOR A 3-D SURVEY NEWORK hese notes follow closely the developent of inner constraint equations by Dr Willie an, Departent of Building, School of Design and Environent,
More informationGraphical Models in Local, Asymmetric Multi-Agent Markov Decision Processes
Graphical Models in Local, Asyetric Multi-Agent Markov Decision Processes Ditri Dolgov and Edund Durfee Departent of Electrical Engineering and Coputer Science University of Michigan Ann Arbor, MI 48109
More informationRecovering Data from Underdetermined Quadratic Measurements (CS 229a Project: Final Writeup)
Recovering Data fro Underdeterined Quadratic Measureents (CS 229a Project: Final Writeup) Mahdi Soltanolkotabi Deceber 16, 2011 1 Introduction Data that arises fro engineering applications often contains
More informationtime time δ jobs jobs
Approxiating Total Flow Tie on Parallel Machines Stefano Leonardi Danny Raz y Abstract We consider the proble of optiizing the total ow tie of a strea of jobs that are released over tie in a ultiprocessor
More informationESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics
ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS A Thesis Presented to The Faculty of the Departent of Matheatics San Jose State University In Partial Fulfillent of the Requireents
More informationFPTAS for optimizing polynomials over the mixed-integer points of polytopes in fixed dimension
Matheatical Prograing anuscript No. (will be inserted by the editor) Jesús A. De Loera Rayond Heecke Matthias Köppe Robert Weisantel FPTAS for optiizing polynoials over the ixed-integer points of polytopes
More informationKeywords: Estimator, Bias, Mean-squared error, normality, generalized Pareto distribution
Testing approxiate norality of an estiator using the estiated MSE and bias with an application to the shape paraeter of the generalized Pareto distribution J. Martin van Zyl Abstract In this work the norality
More informationOptimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks
1 Optial Resource Allocation in Multicast Device-to-Device Counications Underlaying LTE Networks Hadi Meshgi 1, Dongei Zhao 1 and Rong Zheng 2 1 Departent of Electrical and Coputer Engineering, McMaster
More informationSPECTRUM sensing is a core concept of cognitive radio
World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile
More informationConsistent Multiclass Algorithms for Complex Performance Measures. Supplementary Material
Consistent Multiclass Algoriths for Coplex Perforance Measures Suppleentary Material Notations. Let λ be the base easure over n given by the unifor rando variable (say U over n. Hence, for all easurable
More informationRESTARTED FULL ORTHOGONALIZATION METHOD FOR SHIFTED LINEAR SYSTEMS
BIT Nuerical Matheatics 43: 459 466, 2003. 2003 Kluwer Acadeic Publishers. Printed in The Netherlands 459 RESTARTED FULL ORTHOGONALIZATION METHOD FOR SHIFTED LINEAR SYSTEMS V. SIMONCINI Dipartiento di
More informationIntelligent Systems: Reasoning and Recognition. Artificial Neural Networks
Intelligent Systes: Reasoning and Recognition Jaes L. Crowley MOSIG M1 Winter Seester 2018 Lesson 7 1 March 2018 Outline Artificial Neural Networks Notation...2 Introduction...3 Key Equations... 3 Artificial
More informationRateless Codes for MIMO Channels
Rateless Codes for MIMO Channels Marya Modir Shanechi Dept EECS, MIT Cabridge, MA Eail: shanechi@itedu Uri Erez Tel Aviv University Raat Aviv, Israel Eail: uri@engtauacil Gregory W Wornell Dept EECS, MIT
More informationLow complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials
Inforation Processing Letters 107 008 11 15 www.elsevier.co/locate/ipl Low coplexity bit parallel ultiplier for GF generated by equally-spaced trinoials Haibin Shen a,, Yier Jin a,b a Institute of VLSI
More informationarxiv: v1 [math.na] 10 Oct 2016
GREEDY GAUSS-NEWTON ALGORITHM FOR FINDING SPARSE SOLUTIONS TO NONLINEAR UNDERDETERMINED SYSTEMS OF EQUATIONS MÅRTEN GULLIKSSON AND ANNA OLEYNIK arxiv:6.395v [ath.na] Oct 26 Abstract. We consider the proble
More informationImproved multiprocessor global schedulability analysis
Iproved ultiprocessor global schedulability analysis Sanjoy Baruah The University of North Carolina at Chapel Hill Vincenzo Bonifaci Max-Planck Institut für Inforatik Sebastian Stiller Technische Universität
More informationHandout 7. and Pr [M(x) = χ L (x) M(x) =? ] = 1.
Notes on Coplexity Theory Last updated: October, 2005 Jonathan Katz Handout 7 1 More on Randoized Coplexity Classes Reinder: so far we have seen RP,coRP, and BPP. We introduce two ore tie-bounded randoized
More informationFairness via priority scheduling
Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation
More informationA Theoretical Analysis of a Warm Start Technique
A Theoretical Analysis of a War Start Technique Martin A. Zinkevich Yahoo! Labs 701 First Avenue Sunnyvale, CA Abstract Batch gradient descent looks at every data point for every step, which is wasteful
More informationIterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel
1 Iterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel Rai Cohen, Graduate Student eber, IEEE, and Yuval Cassuto, Senior eber, IEEE arxiv:1510.05311v2 [cs.it] 24 ay 2016 Abstract In
More information