arxiv: v1 [cs.ds] 29 Jan 2012

Size: px
Start display at page:

Download "arxiv: v1 [cs.ds] 29 Jan 2012"

Transcription

1 A parallel approxiation algorith for ixed packing covering seidefinite progras arxiv: v1 [cs.ds] 29 Jan 2012 Rahul Jain National U. Singapore January 28, 2012 Abstract Penghui Yao National U. Singapore We present a parallel approxiation algorith for a class of ixed packing covering seidefinite progras which generalize on the class of positive seidefinite progras as considered by Jain Yao [6]. As a corollary we get a faster approxiation algorith for positive seidefinite progras with better dependence of the parallel running tie on the approxiation factor, as copared to that of Jain Yao [6]. Our algorith analysis is on siilar lines as that of Young [10] who considered analogous linear progras. 1 Introduction Fast parallel approxiation algoriths for seidefinite progras have been the focus of study of any recent works (e.g. [1, 2, 7, 5, 4, 3]) have resulted in any interesting applications including the well known QIP = PSPACE [3] result. In any of the previous works, the running tie of the algoriths had polylog dependence on the size of the input progra but in addition also had polynoial dependence of soe width paraeter (which varied for different algoriths). Soeties (for specific instances of input progras) the width paraeter could be as large as the size of the progra aking it an iportant bottleneck. Recently Jain Yao [6] presented a fast parallel approxiation algorith for an iportant subclass of seidefinite progras, called as positive seidefinite progras, their algorith had no dependence on any width paraeter. Their algorith was inspired by an algorith by Luby Nisan [8] for positive linear progras. In this work we consider a ore general ixed packing covering optiization proble. We first consider the following feasibility task Q1. Q1: Given n n positive seidefinite atrices P 1,..., P, P non-negative diagonal atrices C 1,..., C, C ε (0, 1), find an ε-approxiate feasible vector x 0 such that (while coparing atrices we let, represent the Löwner order), x i P i (1+ε)P x i C i C Centre for Quantu Technologies Departent of Coputer Science, National University of Singapore, Block S15, 3 Science Drive 2, Singapore Eail: rahul@cop.nus.edu.sg. Centre for Quantu Technologies Departent of Coputer Science, National University of Singapore, Block S15, 3 Science Drive 2, Singapore Eail: pyao@nus.edu.sg. 1

2 or show that the following is infeasible x i P i P x i C i C. We present an algorith for Q1 running in parallel tie polylog(n, ) 1 ε 4 log 1 ε. Using this stard binary search, a ultiplicative (1 ε) approxiate solution can be obtained for the following optiization task Q2 in parallel tie polylog(n, ) 1 ε 4 log 1 ε. Q2: Given n n positive seidefinite atrices P 1,..., P, P non-negative diagonal atrices C 1,..., C, C, axiize: subject to: γ x i P i P x i C i γc i [] : x i 0. The following special case of Q2 is referred to as a positive seidefinite progra. Q3: Given n n positive seidefinite atrices P 1,..., P, P non-negative scalars c 1,..., c, axiize: x i c i subject to: x i P i P i [] : x i 0. Our algorith for Q1 its analysis is on siilar lines as the algorith analysis of Young [10] who had considered analogous questions for linear progras. As a corollary we get an algorith for approxiating positive seidefinite progras (Q3) with better dependence of the parallel running tie on ε as copared to that of Jain Yao [6] ( arguably with sipler analysis). Very recently, in an independent work, Peng Tangwongsan [9] also presented a fast parallel algorith for positive seidefinite progras. Their work is also inspired by Young [10]. 2 Algorith analysis We ention without elaborating that using stard arguents the feasibility question Q1 can be easily transfored, in parallel tie polylog(n), to the special case when P C are identity atrices we consider this special case fro now on. Our algorith is presented in Figure 1. Idea of the algorith The algorith starts with an initial value for x such that x ip i 1. It akes increents to the vector x such that with each increent, the increase in x ip i is not ore than 2

3 (1+O(ε)) ties the increase in the iniu eigenvalue of x ic i. We argue that it is always possible to increent x in this anner if the input instance is feasible, hence the algorith outputs infeasible if it cannot find such an increent to x. The algorith stops when the iniu eigenvalue of x ic i has exceeded 1. Due to our condition on the increents, at the end of the algorith we also have x ip i (1+O(ε))1. We obtain hle on the largest sallest eigenvalues of concerned atrices via their soft versions, which are ore easily hled functions of those atrices (see definition in the next section). Input : n n positive seidefinite atrices P 1,..., P, non-negative diagonal atrices C 1,..., C, error paraeter ε (0, 1). Output : Eitherinfeasible, which eans there is no x such that (1 is the identity atrix), x i P i 1 x i C i 1. OR an x R such that 1. Set x j = 1 P j. xi P i (1+9ε)1 2. Set N = 1 ε ( x ip i + 2 ln n+ln ). xi C i While λ in ( x ic i ) < N (λ in represents iniu eigenvalue), do (a) Set local j (x) = Tr(exp( x ip i ) P j ) Tr(exp( x ic i ) C j ) global(x) = Tr exp( x ip i ) Tr(exp( x ic i )). (b) If g is not yet set or in j {local j (x)} > g(1+ ε), set g = global(x). (c) If in j {local j (x)} > global(x), returninfeasible. (d) For all j [], set C j = Π j C j Π j, where Π j is the projection onto the eigenspace of x ic i with eigenvalues at ost N. (e) Choose increent vector α 0 scalar δ > 0 such that (f) Set x = x+α. 4. Return x = x/n. j : α j = x j δ if local j (x) g(1+ ε), else α j = 0, ax{ α i P i, α i C i } = ε. Figure 1: Algorith 3

4 Correctness analysis We begin with the definitions of soft axiu iniu eigenvalues of a positive seidefinite atrix A. They are inspired by analogous definitions ade in Young [10] in the context of vectors. Definition 1. For positive seidefinite atrix A, define Iax(A) def = ln Tr exp(a), Iin(A) def = ln Tr exp( A). Note that Iax(A) A Iin(A) λ in (A), where λ in (A) is the iniu eigenvalue of A. We show the following lea in the appendix, which shows that if a sall increent is ade in the vector x, then changes in Iax( x ja j ) Iin( x j A j ) can be bounded appropriately. Lea 2. Let A 1,..., A be positive seidefinite atrices let x 0, α 0 be vectors in R. If α ia i ε 1, then Iax( Iin( (x j + α j )A j ) Iax( (x j + α j )A j ) Iin( x j A j ) x j A j ) (1+ ε) Tr(exp( x ia i )) (1 ε/2) Tr(exp( x ia i )) Lea 3. At step 3(e) of the algorith, for any j with α j > 0 we have, α j Tr(exp( α j Tr(exp( x i A i )A j ), x i A i )A j ). Tr(exp( x ip i ) P j ) Tr(exp( x ip i )) (1+ ε) Tr(exp( x ic i ) C j ) Tr(exp( x. ic i )) Proof. Consider any execution of step 3(e) of the algorith. Fix j such α j > 0. Note that, local j (x) global(x) = Tr(exp( x ip i ) P j ) Tr(exp( x ic i )) Tr(exp( x ip i )) Tr(exp( x ic i ) C j ). We will show that global(x) g throughout the algorith this will show the desired since that local j (x) (1+ ε)g (1+ε)global(x). At step 3(b) of the algorith, g can be equal to global(x). Since x never decreases during the algorith, at step 3(a), global(x) can only increase. At step 3(d), the odification of C j s only decreases Tr(exp( x ic i )) hence again global(x) can only increase. Lea 4. For each increent of x at step 3(f) of the algorith, Iax( (x j + α j )P j ) Iax( x j P j ) (1+ ε) 3 (Iin( (x j + α j )C j ) Iin( ). 4

5 Proof. Consider, Iax( (x j + α j )P j ) Iax( (1+ ε) Tr(exp( x ip i )) (1+ ε) 2 Tr(exp( x ic i )) ( (1+ε)2 Iin( 1 ε/2 This shows the desired. x j P j ) α j Tr(exp( α j Tr(exp( x i P i )P j ) (fro Lea 2) (x j + α j )C j ) Iin( x i C i )C j ) (fro Lea 3 step 3(e) of the algorith) ) (fro Lea 2). Lea 5. If the input instance P 1,..., P, C 1,..., C is feasible, that is there exists vector y R such that y i P i 1 y i C i 1, then always at step 3(c) of the algorith, in j {local j (x)} global(x). Hence the algorith will return soe x. If the algorith outputsinfeasible, then the input instance is not feasible. Proof. Consider soe execution of step 3(c) of the algorith. Let C 1,..., C be the current values of C 1,..., C. Note that if the input is feasible with vector y, then we will also have Tr(exp( x ip i )( y jp j )) Tr(exp( x ip i )) 1 Tr(exp( x ic i )( y jc j )) Tr(exp( x ic i )). Therefore there exists j [] such that Tr(exp( x ip i )P j ) Tr(exp( x ip i )) Tr(exp( x ic i )C j ) Tr(exp( x ic i )), hence local j (x) global(x). If the algorith outputs infeasible, then at that point in j {local j (x)} > global(x) hence fro the arguent above P 1,..., P, C 1,..., C is infeasible which in turn iplies that P 1,..., P, C 1,..., C is infeasible. Lea 6. If the algorith returns soe x, then xi P i (1+9ε)1 xi C i 1. Proof. Because of the condition of the while loop, it is clear that x i C i 1. For x R, define Φ(x) def = Iax( x j P j ) (1+ ε) 3 Iin(. 5

6 Note that the update of C j s at step 3(d) only increase Iin( x jc j ). Hence using Lea 4, we conclude that Φ(x) is non-decreasing during the algorith. At step 1 of the algorith, Φ(x) Iax( ln(n exp( x j P j ) = ln Tr(exp( x i P i )) x i P i )) ln(n exp( Hence just before the last increent, x i P i Iax( x j P j ) Φ(x)+(1+ ε) 3 Iin( x i P i )) = ln n+1. ln n+ 1+(1+ ε) 3 Iin( ln n+ 1+(1+ ε) 3 λ in ( ln n+ 1+(1+ ε) 3 N (1+8ε)N. In the last increent, because of the condition on step 3(e) of the algorith, x ip i increase by at ost ε. Hence x i P i (1+9ε)1. Running tie analysis Lea 7. Assue that the algorith does not return infeasible for soe input instance. The nuber of ties g is increased at step 3(b) of the algorith is O(N/ε). Proof. At the beginning of the algorith Tr(exp( x ic i )) n since each eigenvalue of exp( x ic i ) is at ost 1. Also Tr exp( x ip i ) 1. Hence g = global(x) = Tr exp( x ip i ) Tr(exp( x ic i )) 1 n 1 exp(n). At the end of the algorith λ in ( x ic i ) N+ε 2N. Hence Tr(exp( x i C i )) exp( x i C i ) = exp( λ in( x i C i )) exp( 2N). Also (using Lea 6) Tr(exp( x i P i )) n exp( x i P i ) n exp((1+9ε)n) exp(11n). Hence g global(x) exp(13n). Whenever g is updated at step 3(b) of the algorith, we have global(x) in{local j (x)} > (1+ε)g j just before the update global(x) = g just after the update. Thus g increases by at least (1+ε) ultiplicative factor. Hence the nuber of ties g increases is O(N/ε). 6

7 Lea 8. Assue that the algorith does not return infeasible for soe input instance. The nuber of iterations of the while loop in the algorith for a fixed value of g is O(N log(n)/ε). Proof. Fro Lea 6 step 3(d) of the algorith we have ax{ x ip i, x ic i } = O(N) throughout the algorith. On the other h we have ax{ δx ip i, δx ic i } = ε at step 3(e). Hence δ = Ω(ε/N) throughout the algorith. Let x j be increased in the last iteration of the while loop for a fixed value of g. Note that x j is initially 1/( Pj ) at the end x j is at ost 10N/ Pj (since, using Lea 6, xj P j x j P j 10N). Hence the algorith akes at ost O(log(N)/δ) = O(N log(n)/ε) increents for each x j. Note that local j (x) only increases throughout the algorith (easily seen for steps 3(d) 3(e) of the algorith). Hence since the last iteration of the while loop (for this fixed g) increases x j, it ust be that each iteration of the while loop increases x j. Hence, the nuber of iterations of the while loop (for this fixed g) is O(N log(n)/ε). We clai (without further justification) that each individual step in the algorith can be perfored in parallel tie polylog(n). Hence cobining the above leas using N = O( ln(n) ε ), we get Corollary 9. The parallel running tie of the algorith is upper bounded by polylog(n) 1 ε 4 log 1 ε. References [1] S. Arora, E. Hazan, S. Kale. Fast algoriths for approxiate seidefinite prograing using the ultiplicative weights update ethod. In Proceedings of the 46th Annual IEEE Syposiu on Foundations of Coputer Science, pages , [2] S. Arora S. Kale. A cobinatorial, prial-dual approach to seidefinite progras. In Proceedings of the Thirty-Ninth Annual ACM Syposiu on Theory of Coputing, pages , [3] R. Jain, Z. Ji, S. Upadhyay, J. Watrous. QIP = PSPACE. In Proceedings of the 42nd ACM syposiu on Theory of coputing, STOC 10, pages , New York, NY, USA, ACM. [4] R. Jain, S. Upadhyay, J. Watrous. Two-essage quantu interactive proofs are in PSPACE. In Proceedings of the 50th Annual IEEE Syposiu on Foundations of Coputer Science, FOCS 09, pages , Washington, DC, USA, IEEE Coputer Society. [5] R. Jain J. Watrous. Parallel approxiation of non-interactive zero-su quantu gaes. In Proceedings of the th Annual IEEE Conference on Coputational Coplexity, CCC 09, pages , Washington, DC, USA, IEEE Coputer Society. [6] R. Jain P. Yao. A parallel approxiation algorith for positive seidefinite prograing. In Proceedings of the 52nd Annual IEEE Syposiu on Foundations of Coputer Science, FOCS 11, Washington, DC, USA, IEEE Coputer Society. [7] S. Kale. Efficient algoriths using the ultiplicative weights update ethod. PhD thesis, Princeton University, [8] M. Luby N. Nisan. A parallel approxiation algorith for positive linear prograing. In Proceedings of the twenty-fifth annual ACM syposiu on Theory of coputing, STOC 93, pages , New York, NY, USA, ACM. [9] R. Peng K. Tangwongsan. Faster Sipler Width-Independent Parallel Algoriths for Positive Seidefinite Prograing. ArXiv e-prints : arxiv: , January

8 [10] N. E. Young. Sequential parallel algoriths for ixed packing covering. In Proceedings of the 42nd Annual IEEE Syposiu on Foundations of Coputer Science, FOCS 01, pages , A Deferred proofs Proof of Lea 2: We will use the following Golden-Thopson inequality. Fact 10. For Heritian atrices A, B : Tr(exp(A+B)) Tr exp(a) exp(b). We will also need the following fact. Fact 11. Let A be positive seidefinite with A ε 1. Then, Consider, Iax( exp(a) 1+(1+ε)A exp( A) 1 (1 ε/2)a. (x j + α j )A j ) Iax( x j A j ) ( Tr exp( ) = ln (x i + α i )A i ) Tr exp( x ia i ) ( Tr exp( x i A i ) exp( ln α ) ja j ) Tr exp( x (fro Fact 10) i A i ) ( Tr exp( x i A i )(1+(1+ε)( = ln α ) ja j )) Tr exp( x (fro Fact 11) ia i ) ( = ln 1+ (1+ε) Tr exp( x ia i )( α ) j A j ) Tr exp( x ia i ) (1+ ε) Tr exp( x ia i )( α ja j ) Tr exp( x ia i ) (since ln(1 + a) a for all real a) The desired bound on Iin( (x j+ α j )A j ) Iin( x j A j ) follows by analogous calculations. 8

Bipartite subgraphs and the smallest eigenvalue

Bipartite subgraphs and the smallest eigenvalue Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.

More information

Lecture 9 November 23, 2015

Lecture 9 November 23, 2015 CSC244: Discrepancy Theory in Coputer Science Fall 25 Aleksandar Nikolov Lecture 9 Noveber 23, 25 Scribe: Nick Spooner Properties of γ 2 Recall that γ 2 (A) is defined for A R n as follows: γ 2 (A) = in{r(u)

More information

Lecture 21. Interior Point Methods Setup and Algorithm

Lecture 21. Interior Point Methods Setup and Algorithm Lecture 21 Interior Point Methods In 1984, Kararkar introduced a new weakly polynoial tie algorith for solving LPs [Kar84a], [Kar84b]. His algorith was theoretically faster than the ellipsoid ethod and

More information

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate The Siplex Method is Strongly Polynoial for the Markov Decision Proble with a Fixed Discount Rate Yinyu Ye April 20, 2010 Abstract In this note we prove that the classic siplex ethod with the ost-negativereduced-cost

More information

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness A Note on Scheduling Tall/Sall Multiprocessor Tasks with Unit Processing Tie to Miniize Maxiu Tardiness Philippe Baptiste and Baruch Schieber IBM T.J. Watson Research Center P.O. Box 218, Yorktown Heights,

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

Quantum Speed-ups for Semidefinite Programming

Quantum Speed-ups for Semidefinite Programming Quantu Speed-ups for Seidefinite Prograing FERNANDO G.S.L. BRANDÃO AND KRYSA M. SVORE 2 arxiv:609.05537v4 [quant-ph] 20 Apr 207 Institute of Quantu Inforation and Matter, California Institute of echnology,

More information

ADVANCES ON THE BESSIS- MOUSSA-VILLANI TRACE CONJECTURE

ADVANCES ON THE BESSIS- MOUSSA-VILLANI TRACE CONJECTURE ADVANCES ON THE BESSIS- MOUSSA-VILLANI TRACE CONJECTURE CHRISTOPHER J. HILLAR Abstract. A long-standing conjecture asserts that the polynoial p(t = Tr(A + tb ] has nonnegative coefficients whenever is

More information

arxiv: v1 [cs.ds] 3 Feb 2014

arxiv: v1 [cs.ds] 3 Feb 2014 arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/

More information

Quantum Speed-ups for Semidefinite Programming

Quantum Speed-ups for Semidefinite Programming Quantu Speed-ups for Seidefinite Prograing FERNANDO G.S.L. BRANDÃO AND KRYSA M. SVORE 2 arxiv:609.05537v5 [quant-ph] 24 Sep 207 Institute of Quantu Inforation and Matter, California Institute of echnology,

More information

Convex Programming for Scheduling Unrelated Parallel Machines

Convex Programming for Scheduling Unrelated Parallel Machines Convex Prograing for Scheduling Unrelated Parallel Machines Yossi Azar Air Epstein Abstract We consider the classical proble of scheduling parallel unrelated achines. Each job is to be processed by exactly

More information

On the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs

On the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs On the Inapproxiability of Vertex Cover on k-partite k-unifor Hypergraphs Venkatesan Guruswai and Rishi Saket Coputer Science Departent Carnegie Mellon University Pittsburgh, PA 1513. Abstract. Coputing

More information

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

Physics 215 Winter The Density Matrix

Physics 215 Winter The Density Matrix Physics 215 Winter 2018 The Density Matrix The quantu space of states is a Hilbert space H. Any state vector ψ H is a pure state. Since any linear cobination of eleents of H are also an eleent of H, it

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest

More information

On Constant Power Water-filling

On Constant Power Water-filling On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives

More information

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and

More information

Genetic Quantum Algorithm and its Application to Combinatorial Optimization Problem

Genetic Quantum Algorithm and its Application to Combinatorial Optimization Problem Genetic Quantu Algorith and its Application to Cobinatorial Optiization Proble Kuk-Hyun Han Dept. of Electrical Engineering, KAIST, 373-, Kusong-dong Yusong-gu Taejon, 305-70, Republic of Korea khhan@vivaldi.kaist.ac.kr

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Notes for EE7C (Spring 018: Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee7c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee7c@berkeley.edu October 15,

More information

Support Vector Machines MIT Course Notes Cynthia Rudin

Support Vector Machines MIT Course Notes Cynthia Rudin Support Vector Machines MIT 5.097 Course Notes Cynthia Rudin Credit: Ng, Hastie, Tibshirani, Friedan Thanks: Şeyda Ertekin Let s start with soe intuition about argins. The argin of an exaple x i = distance

More information

Ch 12: Variations on Backpropagation

Ch 12: Variations on Backpropagation Ch 2: Variations on Backpropagation The basic backpropagation algorith is too slow for ost practical applications. It ay take days or weeks of coputer tie. We deonstrate why the backpropagation algorith

More information

Curious Bounds for Floor Function Sums

Curious Bounds for Floor Function Sums 1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

Homework 3 Solutions CSE 101 Summer 2017

Homework 3 Solutions CSE 101 Summer 2017 Hoework 3 Solutions CSE 0 Suer 207. Scheduling algoriths The following n = 2 jobs with given processing ties have to be scheduled on = 3 parallel and identical processors with the objective of iniizing

More information

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China 6th International Conference on Machinery, Materials, Environent, Biotechnology and Coputer (MMEBC 06) Solving Multi-Sensor Multi-Target Assignent Proble Based on Copositive Cobat Efficiency and QPSO Algorith

More information

Faster and Simpler Algorithms for Multicommodity Flow and other. Fractional Packing Problems. Abstract

Faster and Simpler Algorithms for Multicommodity Flow and other. Fractional Packing Problems. Abstract Faster and Sipler Algoriths for Multicoodity Flow and other Fractional Packing Probles Naveen Garg Jochen Koneann y Abstract This paper considers the proble of designing fast, approxiate, cobinatorial

More information

Approximation in Stochastic Scheduling: The Power of LP-Based Priority Policies

Approximation in Stochastic Scheduling: The Power of LP-Based Priority Policies Approxiation in Stochastic Scheduling: The Power of -Based Priority Policies Rolf Möhring, Andreas Schulz, Marc Uetz Setting (A P p stoch, r E( w and (B P p stoch E( w We will assue that the processing

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40 On Poset Merging Peter Chen Guoli Ding Steve Seiden Abstract We consider the follow poset erging proble: Let X and Y be two subsets of a partially ordered set S. Given coplete inforation about the ordering

More information

Boosting with log-loss

Boosting with log-loss Boosting with log-loss Marco Cusuano-Towner Septeber 2, 202 The proble Suppose we have data exaples {x i, y i ) i =... } for a two-class proble with y i {, }. Let F x) be the predictor function with the

More information

Topic 5a Introduction to Curve Fitting & Linear Regression

Topic 5a Introduction to Curve Fitting & Linear Regression /7/08 Course Instructor Dr. Rayond C. Rup Oice: A 337 Phone: (95) 747 6958 E ail: rcrup@utep.edu opic 5a Introduction to Curve Fitting & Linear Regression EE 4386/530 Coputational ethods in EE Outline

More information

Tight Information-Theoretic Lower Bounds for Welfare Maximization in Combinatorial Auctions

Tight Information-Theoretic Lower Bounds for Welfare Maximization in Combinatorial Auctions Tight Inforation-Theoretic Lower Bounds for Welfare Maxiization in Cobinatorial Auctions Vahab Mirrokni Jan Vondrák Theory Group, Microsoft Dept of Matheatics Research Princeton University Redond, WA 9805

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product.

Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product. Coding Theory Massoud Malek Reed-Muller Codes An iportant class of linear block codes rich in algebraic and geoetric structure is the class of Reed-Muller codes, which includes the Extended Haing code.

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

Support Vector Machines. Machine Learning Series Jerry Jeychandra Blohm Lab

Support Vector Machines. Machine Learning Series Jerry Jeychandra Blohm Lab Support Vector Machines Machine Learning Series Jerry Jeychandra Bloh Lab Outline Main goal: To understand how support vector achines (SVMs) perfor optial classification for labelled data sets, also a

More information

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp

More information

EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS

EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS Jochen Till, Sebastian Engell, Sebastian Panek, and Olaf Stursberg Process Control Lab (CT-AST), University of Dortund,

More information

Chaotic Coupled Map Lattices

Chaotic Coupled Map Lattices Chaotic Coupled Map Lattices Author: Dustin Keys Advisors: Dr. Robert Indik, Dr. Kevin Lin 1 Introduction When a syste of chaotic aps is coupled in a way that allows the to share inforation about each

More information

The Transactional Nature of Quantum Information

The Transactional Nature of Quantum Information The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.

More information

Lecture 20 November 7, 2013

Lecture 20 November 7, 2013 CS 229r: Algoriths for Big Data Fall 2013 Prof. Jelani Nelson Lecture 20 Noveber 7, 2013 Scribe: Yun Willia Yu 1 Introduction Today we re going to go through the analysis of atrix copletion. First though,

More information

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,

More information

Exact tensor completion with sum-of-squares

Exact tensor completion with sum-of-squares Proceedings of Machine Learning Research vol 65:1 54, 2017 30th Annual Conference on Learning Theory Exact tensor copletion with su-of-squares Aaron Potechin Institute for Advanced Study, Princeton David

More information

Lecture 13 Eigenvalue Problems

Lecture 13 Eigenvalue Problems Lecture 13 Eigenvalue Probles MIT 18.335J / 6.337J Introduction to Nuerical Methods Per-Olof Persson October 24, 2006 1 The Eigenvalue Decoposition Eigenvalue proble for atrix A: Ax = λx with eigenvalues

More information

Support Vector Machines. Goals for the lecture

Support Vector Machines. Goals for the lecture Support Vector Machines Mark Craven and David Page Coputer Sciences 760 Spring 2018 www.biostat.wisc.edu/~craven/cs760/ Soe of the slides in these lectures have been adapted/borrowed fro aterials developed

More information

Kernel Methods and Support Vector Machines

Kernel Methods and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley ENSIAG 2 / osig 1 Second Seester 2012/2013 Lesson 20 2 ay 2013 Kernel ethods and Support Vector achines Contents Kernel Functions...2 Quadratic

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

Distributed Subgradient Methods for Multi-agent Optimization

Distributed Subgradient Methods for Multi-agent Optimization 1 Distributed Subgradient Methods for Multi-agent Optiization Angelia Nedić and Asuan Ozdaglar October 29, 2007 Abstract We study a distributed coputation odel for optiizing a su of convex objective functions

More information

arxiv: v1 [cs.ds] 17 Mar 2016

arxiv: v1 [cs.ds] 17 Mar 2016 Tight Bounds for Single-Pass Streaing Coplexity of the Set Cover Proble Sepehr Assadi Sanjeev Khanna Yang Li Abstract arxiv:1603.05715v1 [cs.ds] 17 Mar 2016 We resolve the space coplexity of single-pass

More information

Introduction to Discrete Optimization

Introduction to Discrete Optimization Prof. Friedrich Eisenbrand Martin Nieeier Due Date: March 9 9 Discussions: March 9 Introduction to Discrete Optiization Spring 9 s Exercise Consider a school district with I neighborhoods J schools and

More information

Complex Quadratic Optimization and Semidefinite Programming

Complex Quadratic Optimization and Semidefinite Programming Coplex Quadratic Optiization and Seidefinite Prograing Shuzhong Zhang Yongwei Huang August 4 Abstract In this paper we study the approxiation algoriths for a class of discrete quadratic optiization probles

More information

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer

More information

A note on the realignment criterion

A note on the realignment criterion A note on the realignent criterion Chi-Kwong Li 1, Yiu-Tung Poon and Nung-Sing Sze 3 1 Departent of Matheatics, College of Willia & Mary, Williasburg, VA 3185, USA Departent of Matheatics, Iowa State University,

More information

Ştefan ŞTEFĂNESCU * is the minimum global value for the function h (x)

Ştefan ŞTEFĂNESCU * is the minimum global value for the function h (x) 7Applying Nelder Mead s Optiization Algorith APPLYING NELDER MEAD S OPTIMIZATION ALGORITHM FOR MULTIPLE GLOBAL MINIMA Abstract Ştefan ŞTEFĂNESCU * The iterative deterinistic optiization ethod could not

More information

The Simplex and Policy-Iteration Methods are Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate

The Simplex and Policy-Iteration Methods are Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate The Siplex and Policy-Iteration Methods are Strongly Polynoial for the Markov Decision Proble with a Fixed Discount Rate Yinyu Ye Departent of Manageent Science and Engineering, Stanford University, Stanford,

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This article appeared in a ournal published by Elsevier. The attached copy is furnished to the author for internal non-coercial research and education use, including for instruction at the authors institution

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lessons 7 20 Dec 2017 Outline Artificial Neural networks Notation...2 Introduction...3 Key Equations... 3 Artificial

More information

Estimating Entropy and Entropy Norm on Data Streams

Estimating Entropy and Entropy Norm on Data Streams Estiating Entropy and Entropy Nor on Data Streas Ait Chakrabarti 1, Khanh Do Ba 1, and S. Muthukrishnan 2 1 Departent of Coputer Science, Dartouth College, Hanover, NH 03755, USA 2 Departent of Coputer

More information

COS 424: Interacting with Data. Written Exercises

COS 424: Interacting with Data. Written Exercises COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well

More information

The Simplex and Policy-Iteration Methods are Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate

The Simplex and Policy-Iteration Methods are Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate The Siplex and Policy-Iteration Methods are Strongly Polynoial for the Markov Decision Proble with a Fixed Discount Rate Yinyu Ye April 20, 2010; revised Noveber 30, 2010 Abstract We prove that the classic

More information

a a a a a a a m a b a b

a a a a a a a m a b a b Algebra / Trig Final Exa Study Guide (Fall Seester) Moncada/Dunphy Inforation About the Final Exa The final exa is cuulative, covering Appendix A (A.1-A.5) and Chapter 1. All probles will be ultiple choice

More information

CS Lecture 13. More Maximum Likelihood

CS Lecture 13. More Maximum Likelihood CS 6347 Lecture 13 More Maxiu Likelihood Recap Last tie: Introduction to axiu likelihood estiation MLE for Bayesian networks Optial CPTs correspond to epirical counts Today: MLE for CRFs 2 Maxiu Likelihood

More information

1 Bounding the Margin

1 Bounding the Margin COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #12 Scribe: Jian Min Si March 14, 2013 1 Bounding the Margin We are continuing the proof of a bound on the generalization error of AdaBoost

More information

Lower Bounds for Quantized Matrix Completion

Lower Bounds for Quantized Matrix Completion Lower Bounds for Quantized Matrix Copletion Mary Wootters and Yaniv Plan Departent of Matheatics University of Michigan Ann Arbor, MI Eail: wootters, yplan}@uich.edu Mark A. Davenport School of Elec. &

More information

Best Arm Identification: A Unified Approach to Fixed Budget and Fixed Confidence

Best Arm Identification: A Unified Approach to Fixed Budget and Fixed Confidence Best Ar Identification: A Unified Approach to Fixed Budget and Fixed Confidence Victor Gabillon Mohaad Ghavazadeh Alessandro Lazaric INRIA Lille - Nord Europe, Tea SequeL {victor.gabillon,ohaad.ghavazadeh,alessandro.lazaric}@inria.fr

More information

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

On a few Iterative Methods for Solving Nonlinear Equations

On a few Iterative Methods for Solving Nonlinear Equations On a few Iterative Methods for Solving Nonlinear Equations Gyurhan Nedzhibov Laboratory of Matheatical Modelling, Shuen University, Shuen 971, Bulgaria e-ail: gyurhan@shu-bg.net Abstract In this study

More information

New Slack-Monotonic Schedulability Analysis of Real-Time Tasks on Multiprocessors

New Slack-Monotonic Schedulability Analysis of Real-Time Tasks on Multiprocessors New Slack-Monotonic Schedulability Analysis of Real-Tie Tasks on Multiprocessors Risat Mahud Pathan and Jan Jonsson Chalers University of Technology SE-41 96, Göteborg, Sweden {risat, janjo}@chalers.se

More information

On the Analysis of the Quantum-inspired Evolutionary Algorithm with a Single Individual

On the Analysis of the Quantum-inspired Evolutionary Algorithm with a Single Individual 6 IEEE Congress on Evolutionary Coputation Sheraton Vancouver Wall Centre Hotel, Vancouver, BC, Canada July 16-1, 6 On the Analysis of the Quantu-inspired Evolutionary Algorith with a Single Individual

More information

Optimal quantum detectors for unambiguous detection of mixed states

Optimal quantum detectors for unambiguous detection of mixed states PHYSICAL REVIEW A 69, 06318 (004) Optial quantu detectors for unabiguous detection of ixed states Yonina C. Eldar* Departent of Electrical Engineering, Technion Israel Institute of Technology, Haifa 3000,

More information

Mathematical Model and Algorithm for the Task Allocation Problem of Robots in the Smart Warehouse

Mathematical Model and Algorithm for the Task Allocation Problem of Robots in the Smart Warehouse Aerican Journal of Operations Research, 205, 5, 493-502 Published Online Noveber 205 in SciRes. http://www.scirp.org/journal/ajor http://dx.doi.org/0.4236/ajor.205.56038 Matheatical Model and Algorith

More information

Research Article On the Isolated Vertices and Connectivity in Random Intersection Graphs

Research Article On the Isolated Vertices and Connectivity in Random Intersection Graphs International Cobinatorics Volue 2011, Article ID 872703, 9 pages doi:10.1155/2011/872703 Research Article On the Isolated Vertices and Connectivity in Rando Intersection Graphs Yilun Shang Institute for

More information

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words)

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words) 1 A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine (1900 words) Contact: Jerry Farlow Dept of Matheatics Univeristy of Maine Orono, ME 04469 Tel (07) 866-3540 Eail: farlow@ath.uaine.edu

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair Proceedings of the 6th SEAS International Conference on Siulation, Modelling and Optiization, Lisbon, Portugal, Septeber -4, 006 0 A Siplified Analytical Approach for Efficiency Evaluation of the eaving

More information

INNER CONSTRAINTS FOR A 3-D SURVEY NETWORK

INNER CONSTRAINTS FOR A 3-D SURVEY NETWORK eospatial Science INNER CONSRAINS FOR A 3-D SURVEY NEWORK hese notes follow closely the developent of inner constraint equations by Dr Willie an, Departent of Building, School of Design and Environent,

More information

Graphical Models in Local, Asymmetric Multi-Agent Markov Decision Processes

Graphical Models in Local, Asymmetric Multi-Agent Markov Decision Processes Graphical Models in Local, Asyetric Multi-Agent Markov Decision Processes Ditri Dolgov and Edund Durfee Departent of Electrical Engineering and Coputer Science University of Michigan Ann Arbor, MI 48109

More information

Recovering Data from Underdetermined Quadratic Measurements (CS 229a Project: Final Writeup)

Recovering Data from Underdetermined Quadratic Measurements (CS 229a Project: Final Writeup) Recovering Data fro Underdeterined Quadratic Measureents (CS 229a Project: Final Writeup) Mahdi Soltanolkotabi Deceber 16, 2011 1 Introduction Data that arises fro engineering applications often contains

More information

time time δ jobs jobs

time time δ jobs jobs Approxiating Total Flow Tie on Parallel Machines Stefano Leonardi Danny Raz y Abstract We consider the proble of optiizing the total ow tie of a strea of jobs that are released over tie in a ultiprocessor

More information

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS A Thesis Presented to The Faculty of the Departent of Matheatics San Jose State University In Partial Fulfillent of the Requireents

More information

FPTAS for optimizing polynomials over the mixed-integer points of polytopes in fixed dimension

FPTAS for optimizing polynomials over the mixed-integer points of polytopes in fixed dimension Matheatical Prograing anuscript No. (will be inserted by the editor) Jesús A. De Loera Rayond Heecke Matthias Köppe Robert Weisantel FPTAS for optiizing polynoials over the ixed-integer points of polytopes

More information

Keywords: Estimator, Bias, Mean-squared error, normality, generalized Pareto distribution

Keywords: Estimator, Bias, Mean-squared error, normality, generalized Pareto distribution Testing approxiate norality of an estiator using the estiated MSE and bias with an application to the shape paraeter of the generalized Pareto distribution J. Martin van Zyl Abstract In this work the norality

More information

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks 1 Optial Resource Allocation in Multicast Device-to-Device Counications Underlaying LTE Networks Hadi Meshgi 1, Dongei Zhao 1 and Rong Zheng 2 1 Departent of Electrical and Coputer Engineering, McMaster

More information

SPECTRUM sensing is a core concept of cognitive radio

SPECTRUM sensing is a core concept of cognitive radio World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile

More information

Consistent Multiclass Algorithms for Complex Performance Measures. Supplementary Material

Consistent Multiclass Algorithms for Complex Performance Measures. Supplementary Material Consistent Multiclass Algoriths for Coplex Perforance Measures Suppleentary Material Notations. Let λ be the base easure over n given by the unifor rando variable (say U over n. Hence, for all easurable

More information

RESTARTED FULL ORTHOGONALIZATION METHOD FOR SHIFTED LINEAR SYSTEMS

RESTARTED FULL ORTHOGONALIZATION METHOD FOR SHIFTED LINEAR SYSTEMS BIT Nuerical Matheatics 43: 459 466, 2003. 2003 Kluwer Acadeic Publishers. Printed in The Netherlands 459 RESTARTED FULL ORTHOGONALIZATION METHOD FOR SHIFTED LINEAR SYSTEMS V. SIMONCINI Dipartiento di

More information

Intelligent Systems: Reasoning and Recognition. Artificial Neural Networks

Intelligent Systems: Reasoning and Recognition. Artificial Neural Networks Intelligent Systes: Reasoning and Recognition Jaes L. Crowley MOSIG M1 Winter Seester 2018 Lesson 7 1 March 2018 Outline Artificial Neural Networks Notation...2 Introduction...3 Key Equations... 3 Artificial

More information

Rateless Codes for MIMO Channels

Rateless Codes for MIMO Channels Rateless Codes for MIMO Channels Marya Modir Shanechi Dept EECS, MIT Cabridge, MA Eail: shanechi@itedu Uri Erez Tel Aviv University Raat Aviv, Israel Eail: uri@engtauacil Gregory W Wornell Dept EECS, MIT

More information

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials Inforation Processing Letters 107 008 11 15 www.elsevier.co/locate/ipl Low coplexity bit parallel ultiplier for GF generated by equally-spaced trinoials Haibin Shen a,, Yier Jin a,b a Institute of VLSI

More information

arxiv: v1 [math.na] 10 Oct 2016

arxiv: v1 [math.na] 10 Oct 2016 GREEDY GAUSS-NEWTON ALGORITHM FOR FINDING SPARSE SOLUTIONS TO NONLINEAR UNDERDETERMINED SYSTEMS OF EQUATIONS MÅRTEN GULLIKSSON AND ANNA OLEYNIK arxiv:6.395v [ath.na] Oct 26 Abstract. We consider the proble

More information

Improved multiprocessor global schedulability analysis

Improved multiprocessor global schedulability analysis Iproved ultiprocessor global schedulability analysis Sanjoy Baruah The University of North Carolina at Chapel Hill Vincenzo Bonifaci Max-Planck Institut für Inforatik Sebastian Stiller Technische Universität

More information

Handout 7. and Pr [M(x) = χ L (x) M(x) =? ] = 1.

Handout 7. and Pr [M(x) = χ L (x) M(x) =? ] = 1. Notes on Coplexity Theory Last updated: October, 2005 Jonathan Katz Handout 7 1 More on Randoized Coplexity Classes Reinder: so far we have seen RP,coRP, and BPP. We introduce two ore tie-bounded randoized

More information

Fairness via priority scheduling

Fairness via priority scheduling Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation

More information

A Theoretical Analysis of a Warm Start Technique

A Theoretical Analysis of a Warm Start Technique A Theoretical Analysis of a War Start Technique Martin A. Zinkevich Yahoo! Labs 701 First Avenue Sunnyvale, CA Abstract Batch gradient descent looks at every data point for every step, which is wasteful

More information

Iterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel

Iterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel 1 Iterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel Rai Cohen, Graduate Student eber, IEEE, and Yuval Cassuto, Senior eber, IEEE arxiv:1510.05311v2 [cs.it] 24 ay 2016 Abstract In

More information