Int. Statistical Inst.: Proc. 58th World Statistical Congress, 2011, Dublin (Session CPS014) p.4149
|
|
- Elwin Lawrence York
- 5 years ago
- Views:
Transcription
1 Int. Statistical Inst.: Proc. 58th orld Statistical Congress, 011, Dublin (Session CPS014) p.4149 Invariant heory for Hypothesis esting on Graphs Priebe, Carey Johns Hopkins University, Applied Mathematics Statistics 3400 North Charles Street Baltimore, Maryl , USA Rukhin, Andrey Naval Surface arfare Center, Sensor Fusion Department Frontage Road Dahlgren, Virginia 448, USA 1 Introduction Following the setting outlined in Priebe et al. 011 we aim to detect anomlies within attributed graphs. In particular, let V = {1,..., n} be the fixed set of vertices φ : ( V {0, 1,..., K} be an edge-attribution function. he graph on V is defined to be G = (V, E φ ) where (u, v) E φ φ(u, v) > 0. e say that the edge (u, v) has attribute c {1,..., K} if φ(u, v) = c. One can view the categorical edge attributes as some mode of the communication event between actors u v (e.g., a topic label derived from the content of the communication). he specific anomaly we aim to detect is the chatter alternative a small (unspecified) subset of vertices with altered communication behavior in an otherwise homogeneous setting. Our inference task is to determine whether or not a graph (V, E φ ) includes a subset of vertices M = {v 1, v,..., v m } whose edge-connectivity within the subset exhibits a different behaviour than that found among the remaining vertices in the graph. o this end we consider the problem of detecting chatter anomalies in a graph using hypothesis testing on a fusion of attributed graph invariants. In particular, the focus of this paper is analyzing comparing the inferential power of the linear attribute fusion of the attributed q-clique invariant q (G) = h ( ) u 1,..., u q ; c 1,..., c K, c 1,...,c K P (( q,k) 1,...,c K (u 1,...,u q ) ( V q) where the sum is over the collection of partitions P ( ( ( q, K) of q into K non-negative parts, = {w i } i P (( q,k) are the fusion weights, the summ h ( ) u 1,..., u q ; c 1,..., c K indicates the event that the vertices u 1,..., u q are elements of a q-clique with c r edges of color r. Specifically, we consider the cases q = which yields the size fusion q = 3 which yields the triangle fusion 3. Our rom graph model is motivated by the time series model found in Lee Priebe forthcoming: for each vertex v V we assign a latent variable X v = (X1 v,..., Xv d ) drawn independently of all other vertices from some d-dimensional distribution. he edge-attribution function will be a rom variable where the probability of an edge (u, v) having attribute c is defined to be a some predetermined function of the inner product of the latent variables. e assume that the edge attributes, conditioned on the latent variables, are independent. In this paper, we will assume that X v Dirichlet (λ v 0,..., λv K ) P {φ(u, v) = c} = Xc u Xc v
2 Int. Statistical Inst.: Proc. 58th orld Statistical Congress, 011, Dublin (Session CPS014) p.4150 for all (u, v) ( V all c {1,..., K}. his model choice is analogous to the first second approximations found in Lee Priebe forthcoming: if we write λ v = (λ v 0,..., λv K ) = (1 + rxv 0,..., 1 + rxv K ) for some fixed (x v 0,..., xv K ) in the unit simplex non-negative real r, then r yields the first approximation model (i.e., the independent edge model ). e mention that our approach herein differs from the second approximation in Lee Priebe forthcoming; their second approximation yields a inner product model with truncated Gaussian latent variables. Related work may be found in Bollobas et al. 007 Section 16.4 references therein. e also direct the interested reader to Priebe et al. 011 in which the authors study other linear attribute fusion invariants; in particular, the authors consider maxd (G) = max v scan (G) = max v K K u Nv u,x Nv I{φ(u, v) = c} I{φ(u, x) = c}, where Nv = {u (u, v) E} {v} is the closed neighborhood of vertex v in the graph. Finally, we add that we will restrict ourselves to simple undirected graphs. e will not consider hyper-graphs (hyper-edges consisting of more than two vertices), multi-graphs (more than one edge between any two vertices), self-loops (an edge from a vertex to itself), or weighted edges. Notation For each positive integer l we use the notation l = {1,..., l}. For each v V we assign a latent position vector X v = (X0 v,..., Xv K ) Dirichlet(λv ) for some fixed parameter vector λ v R K+1 +. e also assume that the latent positions are independent. Our null hypothesis assumes a version of homogeneity among the vertices; specifically, H 0 : X v = (X v 0,..., X v K) Dirichlet(λ) for all v V for some Dirichlet parameter vector λ = (λ 0,..., λ K ). Our alternative hypothesis incorporates the anomaly feature described in the preceding section as follows. Assume m = m(n) < n satisfies the m(n) following two conditions: lim n m(n) = lim n n = 0. Our alternative hypothesis is defined to be H 1 : X v (Y0 v =,..., Y K v ) iid Dir(η) i m, (X 0 v,..., Xv K ) iid Dir(λ) i n m. for some fixed Dirichlet parameter vector η = (η 0,..., η K ) the same λ = (λ 0,..., λ K ) from the null hypothesis. For convenience, we also define Λ = 0 c K λ c H = 0 c K η c. e define ε c = I {φ (u, v) = c} (u,v) ( V to be the size (i.e., number of -cliques) of attribute c in the graph. Similarly, for the number of triangles (i.e., 3-cliques) we write τ c, τ b,c, τ b,c,d to denote the number of 3-cliques with three c-colored edges, two b-colored one c-colored edge, one edge of each of three edge-colors b, c, d, respectively.
3 Int. Statistical Inst.: Proc. 58th orld Statistical Congress, 011, Dublin (Session CPS014) p.4151 Before proceeding, we highlight a relevant property of the mixed moments of the Dirichlet distribution (see Johnson Kotz 197): if r 1,..., r s are non-negative (X 1,..., X s ) Dirichlet(θ 1,..., θ s ) then s (1) E X r i = Γ ( s i=1 θ i) s j=1 Γ (θ j + r j ) ( s i=1 Γ (θ s i) Γ j=1 (θ j + r j )) i=1 where Γ denotes Euler s stard Gamma function. ith this property one can compute the exact moments of the Hajek projection of 3 under either hypothesis. e write ν (i) to denote the i-th moment of X c in the null latent vector ν (i,j) (b,c) to denote the joint (i, j)-moment of (X b, X c ). Similarly, we ll write µ (i) to denote the i-th moment of Y c in the anomalous latent vector µ (i,j) (b,c) to denote the joint (i, j)-moment of (Y b, Y c ). 3 Analysis e will appeal to Hajek s Projection method, detailed in Nowicki ierman 1988, in order to demonstrate the asymptotic normality of the fusion invariants in this article. his approach is outlined as follows: e define the projection of the fusion to be the centered sum of independent rom variables = v V E X v (n 1)E. For both the size triangle fusion we aim to show that E V ar ( ) = V ar ( ) + E V ar ( ) D N(0, 1). o this end, one appeals to Chebyshev s Inequality to show that V ar ( ) = o(v ar ( )) (see Nowicki ierman 1988 for the detailed argument). Specifically, if { } P V ar ( ) ɛ V ar ( ) ɛ V ar ( 0 ) for any positive ɛ, then V ar ( ) + E V ar ( ) D N(0, 1) by applying the Central Limit heorem to the normalized sum of independent rom variables in the second term of the left-h side. 3.1 he Attributed Size Fusion For each c K define ε c = I {φ (u, v) = c} (u,v) ( V to be the number of edges of color c in the graph. he linear attribute fusion with parameter = (w 1,..., w K ) is defined to be = K ε c.
4 Int. Statistical Inst.: Proc. 58th orld Statistical Congress, 011, Dublin (Session CPS014) p he Attributed Size Fusion under H 0 e present all relevant terms within the Hajek Projection of the attributed size fusion under the null hypothesis. he expectation of under the null is given by E 0 = ( n ) K. E 0 X a for any fixed a V is given by E 0 X a = (n 1) K e can now evaluate under the null: = a n E X a (n 1)E = (n 1) a n 1 c K X (a) c + X c (a) ( ) K n 1 ( ) n K.. he variance of this sum of independent identically distributed rom variables is V ar 0 ( ) = Θ ( n 3). ( As V ar 0 ) ( n (+1) E I {φ (u, v) > 0} = o(v ar 0 ( )) by the Cauchy-Schwarz Inequality (see Nowicki ierman 1988 for full details), we have the desired convergence to the stard normal distribution he Attributed Size Fusion under H 1 For the alternative we write the edge attribution function as Yc u Yc v u, v m, P {φ (u, v) = c} = Yc u Xc v u m, v n m, Xc u Xc v u, v n m. e perform a similar but more involved analysis to deduce the limiting distribution of the attribued size fusion of the graph under these conditions, yielding V ar 1 ( ) = Θ ( n 3) as desired. V ar 1 ( ) = Θ ( n = o(v ar 1 ( )) Asymptotic Power Analysis of the Attributed Size Fusion Returning to the context of hypothesis testing, assume we are interested in performing an α-level hypothesis test to determine whether or not the graph includes an anomalous set of m vertices whose underlying latent distribution differs from the the null component of the graph. e define β = { } lim n P 1 > c α where cα = c(α, n) is the α-level critical value of the test.
5 Int. Statistical Inst.: Proc. 58th orld Statistical Congress, 011, Dublin (Session CPS014) p.4153 Fix c K. he difference of the corresponding terms the hypotheses means can be written as ( )( ) E 1 ε c E 0 ε c = D 1 + D m n m ( ) ( ) ( = 1 1 µ (1) m ν(1) + µ (1) ) (here D i corresponds to the edge-count that includes edges with exactly i anomalous vertices). he reader can verify that V ar 1( ) V ar 0 ( ) 1. Moreover, given that the limiting distribution (under the null) is normal, we write c α = z α V ar0 ( ) + E 0 thus β = P { Z > z α lim n ( )} E1 E0 V ar0 ( ). Recall that V ar 0 ( ) = Θ(n 3 ); thus, if D 1 0 c (i.e. there is signal in the null-to-anomaly connectivity) then the limiting power β > α when m(n m) n 3 0 or, equivalently, when m = Ω( n) (similarly, if m = ω( n) then β 1). Furthermore, if c D 1 = 0 (i.e. there is no signal in the null-to-anomaly connectivity) the limiting power β > α when c D 0 m 0 (which is equivalent to m = Ω( 4 n 3 )). Moreover, if m = ω( 4 n 3 ) n 3 under these conditions then β 1. It follows that the optimal choice of weights (w 1,..., w K ) is the one which maximizes the expression ( ) E1 E0 lim n V ar0 ( ) in either of the two above-mentioned cases. 3. he Attributed Number of riangles Fusion e begin by writing τ = c K τ c + b c τ b,c + τ b,c,d. e denote the number-of-triangles fusion invariant to be = w b,c τ b,c + w b,c,d τ b,c,d. 3 c K τ c + b c Similar to what was done in the previous section, we obtain E 0 = ( ) n 3 c K ν ( 3 + b c w b,c 3ν ( (b) ν (1,1) (b,c) + w b,c,d 3ν (1,1) (b,c) ν(1,1) (b,d) ν(1,1) (c,d)
6 Int. Statistical Inst.: Proc. 58th orld Statistical Congress, 011, Dublin (Session CPS014) p.4154 ( ( ) ) n 1 V ar 0 ( ) = Θ n under the null ( 3 E 1 = Θ i=0 ( m i )( n m 3 i ( ( ) ) n 1 V ar 1 ( ) = Θ n ) ) ( under the alternative. Again, V ar 0 3 ) = o(v ar 0 ( ( )) V ar 1 3 ) = o(v ar 1 ( )). As in the case with the attributed size fusion, we are interested in performing an α-level hypothesis test. he terms within the difference in means can be expressed as E 1 E 0 = D (b,c) + D (b,c,d) D + c K b c ( 3 ( m i = Θ i=1 )( n m 3 i ) δ i (H, Λ) where δ i (H, Λ) is the mixed-moments difference when there are i anomalous vertices in a 3-clique. he reader can verify that V ar 1( ) V ar 0 ( ) 1. Since V ar 0 ( ) = Θ(n 5 ), we have that the limiting power β 3 > α when when m = Ω( i n i 1 ) the corresponding mixed-moments expression δ i (H, Λ) is non-zero. ) 4 Conclusion e have presented preliminary results for linear attribute fusion for clique sizes q = 3 in terms of inferential power when detecting the prescribed anomaly within our model. In general, the most powerful choice of q depends on m as a function of n on the Dirichlet parameter vectors λ η through the mixed moments. References B. Bollobas, S. Janson, O. Riordan. he phase transition in inhomogeneous rom graphs. Rom Structures Algorithm, 31:3 1, 007. N. Johnson S. Kotz. Distributions in Statistics: Continuous Multivariate Distributions. iley, New York, 197. N. Lee C. E. Priebe. A Latent Process Model for ime Series of Attributed Rom Graphs. Statistical Inference for Stochastic Processes, forthcoming. K. Nowicki J. ierman. Subgraph counts in rom graphs using incomplete u-statistics methods. Discrete Mathematics, 7:99 310, C. E. Priebe, N. Lee, Y. Park, M. ang. Attribute fusion in a latent process model for time series of graphs. he 011 IEEE orkshop on Statistical Signal Processing (SSP011), 011.
Statistical Inference on Random Graphs: Comparative Power Analyses via Monte Carlo
Statistical Inference on Random Graphs: Comparative Power Analyses via Monte Carlo Henry Pao 1, Glen A. Coppersmith 2, and Carey E. Priebe 1 Johns Hopkins University 1 Department of Applied Mathematics
More informationAttribute fusion in a latent process model for time series of graphs
1 Attribute fusion in a latent process model for time series of graphs Minh Tang, Youngser Park, Nam H. Lee, and Carey E. Priebe* Abstract Hypothesis testing on time series of attributed graphs has applications
More informationNotes 6 : First and second moment methods
Notes 6 : First and second moment methods Math 733-734: Theory of Probability Lecturer: Sebastien Roch References: [Roc, Sections 2.1-2.3]. Recall: THM 6.1 (Markov s inequality) Let X be a non-negative
More informationGraphs with Large Variance
Graphs with Large Variance Yair Caro Raphael Yuster Abstract For a graph G, let V ar(g) denote the variance of the degree sequence of G, let sq(g) denote the sum of the squares of the degrees of G, and
More informationVertex Nomination via Attributed Random Dot Product Graphs
Vertex Nomination via Attributed Random Dot Product Graphs Carey E. Priebe cep@jhu.edu Department of Applied Mathematics & Statistics Johns Hopkins University 58th Session of the International Statistical
More informationON DOMINATING THE CARTESIAN PRODUCT OF A GRAPH AND K 2. Bert L. Hartnell
Discussiones Mathematicae Graph Theory 24 (2004 ) 389 402 ON DOMINATING THE CARTESIAN PRODUCT OF A GRAPH AND K 2 Bert L. Hartnell Saint Mary s University Halifax, Nova Scotia, Canada B3H 3C3 e-mail: bert.hartnell@smu.ca
More informationA central limit theorem for an omnibus embedding of random dot product graphs
A central limit theorem for an omnibus embedding of random dot product graphs Keith Levin 1 with Avanti Athreya 2, Minh Tang 2, Vince Lyzinski 3 and Carey E. Priebe 2 1 University of Michigan, 2 Johns
More informationMore Empirical Process Theory
More Empirical Process heory 4.384 ime Series Analysis, Fall 2008 Recitation by Paul Schrimpf Supplementary to lectures given by Anna Mikusheva October 24, 2008 Recitation 8 More Empirical Process heory
More informationMulti-coloring and Mycielski s construction
Multi-coloring and Mycielski s construction Tim Meagher Fall 2010 Abstract We consider a number of related results taken from two papers one by W. Lin [1], and the other D. C. Fisher[2]. These articles
More informationStatistical Inference
Statistical Inference Classical and Bayesian Methods Class 6 AMS-UCSC Thu 26, 2012 Winter 2012. Session 1 (Class 6) AMS-132/206 Thu 26, 2012 1 / 15 Topics Topics We will talk about... 1 Hypothesis testing
More informationarxiv: v1 [stat.ml] 29 Jul 2012
arxiv:1207.6745v1 [stat.ml] 29 Jul 2012 Universally Consistent Latent Position Estimation and Vertex Classification for Random Dot Product Graphs Daniel L. Sussman, Minh Tang, Carey E. Priebe Johns Hopkins
More informationStein s Method for concentration inequalities
Number of Triangles in Erdős-Rényi random graph, UC Berkeley joint work with Sourav Chatterjee, UC Berkeley Cornell Probability Summer School July 7, 2009 Number of triangles in Erdős-Rényi random graph
More informationA reverse Sidorenko inequality Independent sets, colorings, and graph homomorphisms
A reverse Sidorenko inequality Independent sets, colorings, and graph homomorphisms Yufei Zhao (MIT) Joint work with Ashwin Sah (MIT) Mehtaab Sawhney (MIT) David Stoner (Harvard) Question Fix d. Which
More informationDefault Priors and Effcient Posterior Computation in Bayesian
Default Priors and Effcient Posterior Computation in Bayesian Factor Analysis January 16, 2010 Presented by Eric Wang, Duke University Background and Motivation A Brief Review of Parameter Expansion Literature
More informationDecomposing oriented graphs into transitive tournaments
Decomposing oriented graphs into transitive tournaments Raphael Yuster Department of Mathematics University of Haifa Haifa 39105, Israel Abstract For an oriented graph G with n vertices, let f(g) denote
More information1.3 Vertex Degrees. Vertex Degree for Undirected Graphs: Let G be an undirected. Vertex Degree for Digraphs: Let D be a digraph and y V (D).
1.3. VERTEX DEGREES 11 1.3 Vertex Degrees Vertex Degree for Undirected Graphs: Let G be an undirected graph and x V (G). The degree d G (x) of x in G: the number of edges incident with x, each loop counting
More informationMULTI-AGENT TRACKING OF A HIGH-DIMENSIONAL ACTIVE LEADER WITH SWITCHING TOPOLOGY
Jrl Syst Sci & Complexity (2009) 22: 722 731 MULTI-AGENT TRACKING OF A HIGH-DIMENSIONAL ACTIVE LEADER WITH SWITCHING TOPOLOGY Yiguang HONG Xiaoli WANG Received: 11 May 2009 / Revised: 16 June 2009 c 2009
More informationGARCH Models Estimation and Inference
GARCH Models Estimation and Inference Eduardo Rossi University of Pavia December 013 Rossi GARCH Financial Econometrics - 013 1 / 1 Likelihood function The procedure most often used in estimating θ 0 in
More informationarxiv: v1 [math.co] 29 Jul 2010
RADIO NUMBERS FOR GENERALIZED PRISM GRAPHS PAUL MARTINEZ, JUAN ORTIZ, MAGGY TOMOVA, AND CINDY WYELS arxiv:1007.5346v1 [math.co] 29 Jul 2010 Abstract. A radio labeling is an assignment c : V (G) N such
More informationSequential Procedure for Testing Hypothesis about Mean of Latent Gaussian Process
Applied Mathematical Sciences, Vol. 4, 2010, no. 62, 3083-3093 Sequential Procedure for Testing Hypothesis about Mean of Latent Gaussian Process Julia Bondarenko Helmut-Schmidt University Hamburg University
More information3. Branching Algorithms COMP6741: Parameterized and Exact Computation
3. Branching Algorithms COMP6741: Parameterized and Exact Computation Serge Gaspers 12 1 School of Computer Science and Engineering, UNSW Australia 2 Optimisation Resarch Group, NICTA Semester 2, 2015
More informationPreliminaries and Complexity Theory
Preliminaries and Complexity Theory Oleksandr Romanko CAS 746 - Advanced Topics in Combinatorial Optimization McMaster University, January 16, 2006 Introduction Book structure: 2 Part I Linear Algebra
More informationManifold Learning for Subsequent Inference
Manifold Learning for Subsequent Inference Carey E. Priebe Johns Hopkins University June 20, 2018 DARPA Fundamental Limits of Learning (FunLoL) Los Angeles, California http://arxiv.org/abs/1806.01401 Key
More informationThree-coloring triangle-free graphs on surfaces V. Coloring planar graphs with distant anomalies
Three-coloring triangle-free graphs on surfaces V. Coloring planar graphs with distant anomalies Zdeněk Dvořák Daniel Král Robin Thomas Abstract We settle a problem of Havel by showing that there exists
More informationBetter bounds for k-partitions of graphs
Better bounds for -partitions of graphs Baogang Xu School of Mathematics, Nanjing Normal University 1 Wenyuan Road, Yadong New District, Nanjing, 1006, China Email: baogxu@njnu.edu.cn Xingxing Yu School
More informationThe concentration of the chromatic number of random graphs
The concentration of the chromatic number of random graphs Noga Alon Michael Krivelevich Abstract We prove that for every constant δ > 0 the chromatic number of the random graph G(n, p) with p = n 1/2
More informationGARCH Models Estimation and Inference. Eduardo Rossi University of Pavia
GARCH Models Estimation and Inference Eduardo Rossi University of Pavia Likelihood function The procedure most often used in estimating θ 0 in ARCH models involves the maximization of a likelihood function
More informationA REMARK ON MINIMAL NODAL SOLUTIONS OF AN ELLIPTIC PROBLEM IN A BALL. Olaf Torné. 1. Introduction
Topological Methods in Nonlinear Analysis Journal of the Juliusz Schauder Center Volume 24, 2004, 199 207 A REMARK ON MINIMAL NODAL SOLUTIONS OF AN ELLIPTIC PROBLEM IN A BALL Olaf Torné (Submitted by Michel
More information3. Branching Algorithms
3. Branching Algorithms COMP6741: Parameterized and Exact Computation Serge Gaspers Semester 2, 2015 Contents 1 Introduction 1 2 Maximum Independent Set 3 2.1 Simple Analysis................................................
More informationMATH 829: Introduction to Data Mining and Analysis Graphical Models I
MATH 829: Introduction to Data Mining and Analysis Graphical Models I Dominique Guillot Departments of Mathematical Sciences University of Delaware May 2, 2016 1/12 Independence and conditional independence:
More informationRao s degree sequence conjecture
Rao s degree sequence conjecture Maria Chudnovsky 1 Columbia University, New York, NY 10027 Paul Seymour 2 Princeton University, Princeton, NJ 08544 July 31, 2009; revised December 10, 2013 1 Supported
More informationThe number of Euler tours of random directed graphs
The number of Euler tours of random directed graphs Páidí Creed School of Mathematical Sciences Queen Mary, University of London United Kingdom P.Creed@qmul.ac.uk Mary Cryan School of Informatics University
More informationStatistical Inference on Large Contingency Tables: Convergence, Testability, Stability. COMPSTAT 2010 Paris, August 23, 2010
Statistical Inference on Large Contingency Tables: Convergence, Testability, Stability Marianna Bolla Institute of Mathematics Budapest University of Technology and Economics marib@math.bme.hu COMPSTAT
More informationON KRONECKER PRODUCTS OF CHARACTERS OF THE SYMMETRIC GROUPS WITH FEW COMPONENTS
ON KRONECKER PRODUCTS OF CHARACTERS OF THE SYMMETRIC GROUPS WITH FEW COMPONENTS C. BESSENRODT AND S. VAN WILLIGENBURG Abstract. Confirming a conjecture made by Bessenrodt and Kleshchev in 1999, we classify
More information1. Stochastic Processes and Stationarity
Massachusetts Institute of Technology Department of Economics Time Series 14.384 Guido Kuersteiner Lecture Note 1 - Introduction This course provides the basic tools needed to analyze data that is observed
More informationNumerical Sequences and Series
Numerical Sequences and Series Written by Men-Gen Tsai email: b89902089@ntu.edu.tw. Prove that the convergence of {s n } implies convergence of { s n }. Is the converse true? Solution: Since {s n } is
More informationCS281A/Stat241A Lecture 19
CS281A/Stat241A Lecture 19 p. 1/4 CS281A/Stat241A Lecture 19 Junction Tree Algorithm Peter Bartlett CS281A/Stat241A Lecture 19 p. 2/4 Announcements My office hours: Tuesday Nov 3 (today), 1-2pm, in 723
More informationThe edge-density for K 2,t minors
The edge-density for K,t minors Maria Chudnovsky 1 Columbia University, New York, NY 1007 Bruce Reed McGill University, Montreal, QC Paul Seymour Princeton University, Princeton, NJ 08544 December 5 007;
More informationTwo-sample hypothesis testing for random dot product graphs
Two-sample hypothesis testing for random dot product graphs Minh Tang Department of Applied Mathematics and Statistics Johns Hopkins University JSM 2014 Joint work with Avanti Athreya, Vince Lyzinski,
More informationUndecidability of Linear Inequalities Between Graph Homomorphism Densities
Undecidability of Linear Inequalities Between Graph Homomorphism Densities Hamed Hatami joint work with Sergey Norin School of Computer Science McGill University December 4, 2013 Hamed Hatami (McGill University)
More informationGibbs Sampling in Linear Models #2
Gibbs Sampling in Linear Models #2 Econ 690 Purdue University Outline 1 Linear Regression Model with a Changepoint Example with Temperature Data 2 The Seemingly Unrelated Regressions Model 3 Gibbs sampling
More informationUndirected Graphical Models: Markov Random Fields
Undirected Graphical Models: Markov Random Fields 40-956 Advanced Topics in AI: Probabilistic Graphical Models Sharif University of Technology Soleymani Spring 2015 Markov Random Field Structure: undirected
More informationPeter J. Dukes. 22 August, 2012
22 August, 22 Graph decomposition Let G and H be graphs on m n vertices. A decompostion of G into copies of H is a collection {H i } of subgraphs of G such that each H i = H, and every edge of G belongs
More informationChoice Numbers of Multi-Bridge Graphs
Computer Science Journal of Moldova, vol.25, no.3(75), 2017 Julian Allagan Benkam Bobga Abstract Suppose ch(g) and χ(g) denote, respectively, the choice number and the chromatic number of a graph G = (V,E).
More informationSCALE INVARIANT FOURIER RESTRICTION TO A HYPERBOLIC SURFACE
SCALE INVARIANT FOURIER RESTRICTION TO A HYPERBOLIC SURFACE BETSY STOVALL Abstract. This result sharpens the bilinear to linear deduction of Lee and Vargas for extension estimates on the hyperbolic paraboloid
More informationLecture 4: Phase Transition in Random Graphs
Lecture 4: Phase Transition in Random Graphs Radu Balan February 21, 2017 Distributions Today we discuss about phase transition in random graphs. Recall on the Erdöd-Rényi class G n,p of random graphs,
More informationOn the method of typical bounded differences. Lutz Warnke. Georgia Tech
On the method of typical bounded differences Lutz Warnke Georgia Tech What is this talk about? Motivation Behaviour of a function of independent random variables ξ 1,..., ξ n : X = F (ξ 1,..., ξ n ) the
More informationInferences on a Normal Covariance Matrix and Generalized Variance with Monotone Missing Data
Journal of Multivariate Analysis 78, 6282 (2001) doi:10.1006jmva.2000.1939, available online at http:www.idealibrary.com on Inferences on a Normal Covariance Matrix and Generalized Variance with Monotone
More informationJuly 31, 2009 / Ben Kedem Symposium
ing The s ing The Department of Statistics North Carolina State University July 31, 2009 / Ben Kedem Symposium Outline ing The s 1 2 s 3 4 5 Ben Kedem ing The s Ben has made many contributions to time
More informationA graph contains a set of nodes (vertices) connected by links (edges or arcs)
BOLTZMANN MACHINES Generative Models Graphical Models A graph contains a set of nodes (vertices) connected by links (edges or arcs) In a probabilistic graphical model, each node represents a random variable,
More informationModeling with Itô Stochastic Differential Equations
Modeling with Itô Stochastic Differential Equations 2.4-2.6 E. Allen presentation by T. Perälä 27.0.2009 Postgraduate seminar on applied mathematics 2009 Outline Hilbert Space of Stochastic Processes (
More informationThe Fast Multipole Method and other Fast Summation Techniques
The Fast Multipole Method and other Fast Summation Techniques Gunnar Martinsson The University of Colorado at Boulder (The factor of 1/2π is suppressed.) Problem definition: Consider the task of evaluation
More informationAdvanced topics from statistics
Advanced topics from statistics Anders Ringgaard Kristensen Advanced Herd Management Slide 1 Outline Covariance and correlation Random vectors and multivariate distributions The multinomial distribution
More informationSolving Fuzzy PERT Using Gradual Real Numbers
Solving Fuzzy PERT Using Gradual Real Numbers Jérôme FORTIN a, Didier DUBOIS a, a IRIT/UPS 8 route de Narbonne, 3062, Toulouse, cedex 4, France, e-mail: {fortin, dubois}@irit.fr Abstract. From a set of
More informationREGULARITY LEMMAS FOR GRAPHS
REGULARITY LEMMAS FOR GRAPHS Abstract. Szemerédi s regularity lemma proved to be a fundamental result in modern graph theory. It had a number of important applications and is a widely used tool in extremal
More informationInduced subgraphs of graphs with large chromatic number. III. Long holes
Induced subgraphs of graphs with large chromatic number. III. Long holes Maria Chudnovsky 1 Princeton University, Princeton, NJ 08544, USA Alex Scott Mathematical Institute, University of Oxford, Oxford
More informationOn Pólya Urn Scheme with Infinitely Many Colors
On Pólya Urn Scheme with Infinitely Many Colors DEBLEENA THACKER Indian Statistical Institute, New Delhi Joint work with: ANTAR BANDYOPADHYAY, Indian Statistical Institute, New Delhi. Genaralization of
More informationThe typical structure of sparse K r+1 -free graphs
The typical structure of sparse K r+1 -free graphs Lutz Warnke University of Cambridge (joint work with József Balogh, Robert Morris, and Wojciech Samotij) H-free graphs / Turán s theorem Definition Let
More informationSTATISTICS ANCILLARY SYLLABUS. (W.E.F. the session ) Semester Paper Code Marks Credits Topic
STATISTICS ANCILLARY SYLLABUS (W.E.F. the session 2014-15) Semester Paper Code Marks Credits Topic 1 ST21012T 70 4 Descriptive Statistics 1 & Probability Theory 1 ST21012P 30 1 Practical- Using Minitab
More informationDiscriminant Analysis with High Dimensional. von Mises-Fisher distribution and
Athens Journal of Sciences December 2014 Discriminant Analysis with High Dimensional von Mises - Fisher Distributions By Mario Romanazzi This paper extends previous work in discriminant analysis with von
More informationTesting for Anomalous Periods in Time Series Data. Graham Elliott
Testing for Anomalous Periods in Time Series Data Graham Elliott 1 Introduction The Motivating Problem There are reasons to expect that for a time series model that an anomalous period might occur where
More informationCONSTRAINED PERCOLATION ON Z 2
CONSTRAINED PERCOLATION ON Z 2 ZHONGYANG LI Abstract. We study a constrained percolation process on Z 2, and prove the almost sure nonexistence of infinite clusters and contours for a large class of probability
More informationON THE NUMBER OF ALTERNATING PATHS IN BIPARTITE COMPLETE GRAPHS
ON THE NUMBER OF ALTERNATING PATHS IN BIPARTITE COMPLETE GRAPHS PATRICK BENNETT, ANDRZEJ DUDEK, ELLIOT LAFORGE December 1, 016 Abstract. Let C [r] m be a code such that any two words of C have Hamming
More informationCS Lecture 18. Topic Models and LDA
CS 6347 Lecture 18 Topic Models and LDA (some slides by David Blei) Generative vs. Discriminative Models Recall that, in Bayesian networks, there could be many different, but equivalent models of the same
More informationBALANCING GAUSSIAN VECTORS. 1. Introduction
BALANCING GAUSSIAN VECTORS KEVIN P. COSTELLO Abstract. Let x 1,... x n be independent normally distributed vectors on R d. We determine the distribution function of the minimum norm of the 2 n vectors
More informationThe expansion of random regular graphs
The expansion of random regular graphs David Ellis Introduction Our aim is now to show that for any d 3, almost all d-regular graphs on {1, 2,..., n} have edge-expansion ratio at least c d d (if nd is
More informationA simple branching process approach to the phase transition in G n,p
A simple branching process approach to the phase transition in G n,p Béla Bollobás Department of Pure Mathematics and Mathematical Statistics Wilberforce Road, Cambridge CB3 0WB, UK b.bollobas@dpmms.cam.ac.uk
More information1 Adjacency matrix and eigenvalues
CSC 5170: Theory of Computational Complexity Lecture 7 The Chinese University of Hong Kong 1 March 2010 Our objective of study today is the random walk algorithm for deciding if two vertices in an undirected
More informationIrredundant Families of Subcubes
Irredundant Families of Subcubes David Ellis January 2010 Abstract We consider the problem of finding the maximum possible size of a family of -dimensional subcubes of the n-cube {0, 1} n, none of which
More informationLecture 7 Introduction to Statistical Decision Theory
Lecture 7 Introduction to Statistical Decision Theory I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw December 20, 2016 1 / 55 I-Hsiang Wang IT Lecture 7
More informationSLOW NEIGHBORHOOD GROWTH ON THE HAMMING PLANE J.E. PAGUYO. Abstract
SLOW NEIGHBORHOOD GROWTH ON THE HAMMING PLANE J.E. PAGUYO Abstract We consider neighborhood growth dynamics on the Hamming plane. Each vertex on the Hamming plane is assigned an initial state, occupied
More informationLecture 2: Convergence of Random Variables
Lecture 2: Convergence of Random Variables Hyang-Won Lee Dept. of Internet & Multimedia Eng. Konkuk University Lecture 2 Introduction to Stochastic Processes, Fall 2013 1 / 9 Convergence of Random Variables
More informationMultivariate Data Fusion Based on Fixed- Geometry Confidence Sets
University of Pennsylvania ScholarlyCommons Technical Reports (CIS) Department of Computer & Information Science April 1992 Multivariate Data Fusion Based on Fixed- Geometry Confidence Sets Gerda Kamberova
More informationOn the number of cycles in a graph with restricted cycle lengths
On the number of cycles in a graph with restricted cycle lengths Dániel Gerbner, Balázs Keszegh, Cory Palmer, Balázs Patkós arxiv:1610.03476v1 [math.co] 11 Oct 2016 October 12, 2016 Abstract Let L be a
More informationFinding normalized and modularity cuts by spectral clustering. Ljubjana 2010, October
Finding normalized and modularity cuts by spectral clustering Marianna Bolla Institute of Mathematics Budapest University of Technology and Economics marib@math.bme.hu Ljubjana 2010, October Outline Find
More informationEdge-disjoint induced subgraphs with given minimum degree
Edge-disjoint induced subgraphs with given minimum degree Raphael Yuster Department of Mathematics University of Haifa Haifa 31905, Israel raphy@math.haifa.ac.il Submitted: Nov 9, 01; Accepted: Feb 5,
More informationGraph coloring, perfect graphs
Lecture 5 (05.04.2013) Graph coloring, perfect graphs Scribe: Tomasz Kociumaka Lecturer: Marcin Pilipczuk 1 Introduction to graph coloring Definition 1. Let G be a simple undirected graph and k a positive
More informationTournaments and colouring
Tournaments and colouring Eli Berger 1 Haifa University Haifa, Israel Jacob Fox 4 MIT Cambridge, MA, USA Krzysztof Choromanski 2 Columbia University New York, NY, USA Martin Loebl Charles University Prague,
More informationDA Freedman Notes on the MLE Fall 2003
DA Freedman Notes on the MLE Fall 2003 The object here is to provide a sketch of the theory of the MLE. Rigorous presentations can be found in the references cited below. Calculus. Let f be a smooth, scalar
More informationExact Inference I. Mark Peot. In this lecture we will look at issues associated with exact inference. = =
Exact Inference I Mark Peot In this lecture we will look at issues associated with exact inference 10 Queries The objective of probabilistic inference is to compute a joint distribution of a set of query
More informationPMR Learning as Inference
Outline PMR Learning as Inference Probabilistic Modelling and Reasoning Amos Storkey Modelling 2 The Exponential Family 3 Bayesian Sets School of Informatics, University of Edinburgh Amos Storkey PMR Learning
More informationRandom Graphs III. Y. Kohayakawa (São Paulo) Chorin, 4 August 2006
Y. Kohayakawa (São Paulo) Chorin, 4 August 2006 Outline 1 Outline of Lecture III 1. Subgraph containment with adversary: Existence of monoχ subgraphs in coloured random graphs; properties of the form G(n,
More informationA characterization of diameter-2-critical graphs with no antihole of length four
Cent. Eur. J. Math. 10(3) 2012 1125-1132 DOI: 10.2478/s11533-012-0022-x Central European Journal of Mathematics A characterization of diameter-2-critical graphs with no antihole of length four Research
More informationStatistical Inference on Constant Stress Accelerated Life Tests Under Generalized Gamma Lifetime Distributions
Int. Statistical Inst.: Proc. 58th World Statistical Congress, 2011, Dublin (Session CPS040) p.4828 Statistical Inference on Constant Stress Accelerated Life Tests Under Generalized Gamma Lifetime Distributions
More informationCourse Notes. Part IV. Probabilistic Combinatorics. Algorithms
Course Notes Part IV Probabilistic Combinatorics and Algorithms J. A. Verstraete Department of Mathematics University of California San Diego 9500 Gilman Drive La Jolla California 92037-0112 jacques@ucsd.edu
More informationBalanced bipartitions of graphs
2010.7 - Dedicated to Professor Feng Tian on the occasion of his 70th birthday Balanced bipartitions of graphs Baogang Xu School of Mathematical Science, Nanjing Normal University baogxu@njnu.edu.cn or
More informationCPSC 320 (Intermediate Algorithm Design and Analysis). Summer Instructor: Dr. Lior Malka Final Examination, July 24th, 2009
CPSC 320 (Intermediate Algorithm Design and Analysis). Summer 2009. Instructor: Dr. Lior Malka Final Examination, July 24th, 2009 Student ID: INSTRUCTIONS: There are 6 questions printed on pages 1 7. Exam
More informationA sequence of triangle-free pseudorandom graphs
A sequence of triangle-free pseudorandom graphs David Conlon Abstract A construction of Alon yields a sequence of highly pseudorandom triangle-free graphs with edge density significantly higher than one
More informationLecture 8: Information Theory and Statistics
Lecture 8: Information Theory and Statistics Part II: Hypothesis Testing and I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw December 23, 2015 1 / 50 I-Hsiang
More informationThe doubly negative matrix completion problem
The doubly negative matrix completion problem C Mendes Araújo, Juan R Torregrosa and Ana M Urbano CMAT - Centro de Matemática / Dpto de Matemática Aplicada Universidade do Minho / Universidad Politécnica
More informationA TEST OF FIT FOR THE GENERALIZED PARETO DISTRIBUTION BASED ON TRANSFORMS
A TEST OF FIT FOR THE GENERALIZED PARETO DISTRIBUTION BASED ON TRANSFORMS Dimitrios Konstantinides, Simos G. Meintanis Department of Statistics and Acturial Science, University of the Aegean, Karlovassi,
More informationLecture 7: February 6
CS271 Randomness & Computation Spring 2018 Instructor: Alistair Sinclair Lecture 7: February 6 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They
More informationIntroduction and Preliminaries
Chapter 1 Introduction and Preliminaries This chapter serves two purposes. The first purpose is to prepare the readers for the more systematic development in later chapters of methods of real analysis
More informationBulletin of the Iranian Mathematical Society
ISSN: 117-6X (Print) ISSN: 1735-8515 (Online) Bulletin of the Iranian Mathematical Society Vol. 4 (14), No. 6, pp. 1491 154. Title: The locating chromatic number of the join of graphs Author(s): A. Behtoei
More informationMAT 771 FUNCTIONAL ANALYSIS HOMEWORK 3. (1) Let V be the vector space of all bounded or unbounded sequences of complex numbers.
MAT 771 FUNCTIONAL ANALYSIS HOMEWORK 3 (1) Let V be the vector space of all bounded or unbounded sequences of complex numbers. (a) Define d : V V + {0} by d(x, y) = 1 ξ j η j 2 j 1 + ξ j η j. Show that
More informationReconstruction in the Generalized Stochastic Block Model
Reconstruction in the Generalized Stochastic Block Model Marc Lelarge 1 Laurent Massoulié 2 Jiaming Xu 3 1 INRIA-ENS 2 INRIA-Microsoft Research Joint Centre 3 University of Illinois, Urbana-Champaign GDR
More information1216 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 54, NO. 6, JUNE /$ IEEE
1216 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL 54, NO 6, JUNE 2009 Feedback Weighting Mechanisms for Improving Jacobian Estimates in the Adaptive Simultaneous Perturbation Algorithm James C Spall, Fellow,
More informationMassachusetts Institute of Technology Department of Electrical Engineering and Computer Science Algorithms For Inference Fall 2014
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.438 Algorithms For Inference Fall 2014 Problem Set 3 Issued: Thursday, September 25, 2014 Due: Thursday,
More informationRANDOM GRAPHS BY JOEL SPENCER. as n.
RANDOM GRAHS BY JOEL SENCER Notation 1. We say fn gn as n if fx gx as n. Notation 2. We say fn gn as n if fn gn 1 as n Notation 3. We say fn = ogn as n if fn gn 0 as n Notation 4. n k := nn 1n 2... n k
More informationLecture 28: April 26
CS271 Randomness & Computation Spring 2018 Instructor: Alistair Sinclair Lecture 28: April 26 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They
More information