The Inferential Complexity of Bayesian and Credal Networks

Size: px
Start display at page:

Download "The Inferential Complexity of Bayesian and Credal Networks"

Transcription

1 The Inferential Coplexity of Bayesian and Credal Networks Cassio Polpo de Capos,2 Fabio Gagliardi Cozan Universidade de São Paulo - Escola Politécnica 2 Pontifícia Universidade Católica de São Paulo cassio@pucsp.br, fgcozan@usp.br Abstract This paper presents new results on the coplexity of graph-theoretical odels that represent probabilities (Bayesian networks) and that represent interval and set valued probabilities (credal networks). We define a new class of networks with bounded width, and introduce a new decision proble for Bayesian networks, the axiin a posteriori. We present new links between the Bayesian and credal networks, and present new results both for Bayesian networks (ost probable explanation with observations, axiin a posteriori) and for credal networks (bounds on probabilities a posteriori, ost probable explanation with and without observations, axiu a posteriori). Introduction This paper builds a picture of inferential coplexity in graphtheoretical odels of uncertainty that goes significantly beyond existing results. We focus on Bayesian and credal networks the forer is a purely probabilistic odel, while the latter adits interval and set valued probabilities and generalizes several theories of uncertainty. There already is quite a solid understanding about the inferential coplexity of Bayesian networks; we add to this picture a new class of networks that strengthens existing results, and a new type of proble, axiin a posteriori (MAP), that can be of interest in gae-theoretic settings. Our ain contributions are related to credal networks, as little is known at this point concerning their inferential coplexity: we present new results concerning coputation of probability bounds, ost probable explanations (MPE) and axiu a posteriori (MAP). We show that, rather surprisingly, the MPE proble without observations in credal networks of bounded width is polynoial, while the MPE proble with observations and the MAP proble are Σ p 2-coplete for credal networks. We also strengthen the connection between Bayesian and credal networks by showing links between the coputation of probability bounds, the MAP and the MAP probles. Our results suggest that oving fro point to interval/set valued probabilities takes us one step up in ters of coplexity classes. Section 2 presents a few definitions and, ost iportantly, tries to justify our interest in credal networks. Section 3 describes the probles we are interested in. Section 4 contains our new results; in particular, Table offers a suary of our contributions. Section 5 concludes the paper and suggests future research. 2 Bayesian and Credal Networks A Bayesian network (or BN) represents a single joint probability density over a collection of rando variables. We assue throughout that variables are categorical; variables are uppercase and their assignents are lowercase. Definition A Bayesian network is a pair (G, P), where: G = (V G, E G ) is a directed acyclic graph, with V G a collection of vertices associated to rando variables X (a node per variable), and E G a collection of arcs; P is a collection of conditional probability densities p(x i pa(x i )) where pa(x i ) denotes the parents of X i in the graph (pa(x i ) ay be epty), respecting the relations of E G. In a BN every variable is independent of its nondescendants nonparents given its parents (Markov condition). This structure induces a joint probability density by the expression p(x,..., X n ) = i p(x i pa(x i )). Given a BN, E denotes the set of observed variables in the network (the evidence); e denotes the observed value of E. We consider the class of networks with bounded induced-width (or BIW); that is, networks where the subjacent graph (obtained reoving arc s directions) of G has axiu degree and induced-width bounded by log(f(s)). We define f(s) as a polynoial function in the size s of input (this size is evaluated over all inforation needed to specify the proble). We also consider the class of polytrees (or PT); that is, a BIW network where the subjacent graph of G has no cycles. Otherwise, a network is said ultiply-connected. Note that our definition of BIW networks is not, as usually done, based on fixed inducedwidth; rather, we allow the induced-width to vary with the network size. Credal networks generalize Bayesian networks by allowing each variable to be associated with sets of joint probability easures rather than single probability easures [Cano et al., 993; Cozan, 2000a]. Such graph-theoretical odels can be

2 viewed as Bayesian networks with relaxed nuerical paraeters; they can be used to study robustness of probabilistic odels, to investigate the behavior of groups of experts, or to represent incoplete or vague knowledge about probabilities. Sets of probability easures are sufficiently powerful to represent belief functions, possibility easures, qualitative probabilities, and probabilistic logic stateents, thus offering a general language that can convey any odels of interest in artificial intelligence [Walley, 996]. A set of probability distributions is called a credal set [Levi, 980]. A credal set for X is denoted by K(X). A conditional credal set is a set of conditional distributions, obtained applying Bayes rule to each distribution in a credal set of joint distributions [Walley, 99]. Given a credal set K(X), the lower probability and the upper probability of event A are defined respectively as P (A) = in p(x) K(X) P (A) and P (A) = ax p(x) K(X) P (A). We assue that, given a credal set, finding a lower/upper probability is a polynoial operation. Definition A credal network is a pair (G, K), where: G = (V G, E G ) is a directed acyclic graph, with V G a collection of vertices associated to rando variables X (a node per variable), and E G a collection of arcs; K is a collection of conditional credal sets K(X i pa(x i )), respecting the relations iplied by E G. We assue a Markov condition in credal networks: every variable is independent of its nondescendants nonparents given its parents. In this paper we adopt the concept of strong independence; that is, the joint credal set represented by a credal network is a set where each vertex factorizes as a Bayesian network [Cozan, 2000b]. Thus we can really view a credal network as a set of Bayesian networks, all with identical graphs. Credal networks can also be classified as polytree, bounded induced-width or ultiply-connected. 3 Reasoning In this section we present decision versions of the inferences we focus in this paper. Definition BN-Pr: given a Bayesian network (G, P), evidence E = e with E X, a query variable Q X \ E and its category q, and a rational nuber r, is P (q e) > r? Note the following distinction between MPE probles with or without evidence; the reason for this will be indicated later: Definition BN-MPE: given a Bayesian network (G, P), evidence E = e with E X and a rational nuber r, is there an instantiation x for X \ E such that P (x, e) > r? Definition BN-MPEe: given a Bayesian network (G, P), evidence E = e with E X and a rational nuber r, is there an instantiation x for X \ E such that P (x e) > r? Definition BN-MAP: given a Bayesian network (G, P), evidence E = e with E X, a set Q X \ E and a rational nuber r, is there an instantiation q for Q such that P (q e) > r? We introduce the axiin a posteriori proble, which ay be of interest in applications involving gae-theoretic behavior with axiizers and iniizers [Kakade et al., 200]: Definition BN-MAP: given a Bayesian network (G, P), soe evidence E = e with E X, the sets A X \ E and B X \ E, with A B = and a rational nuber r, is there an instantiation a for the A variables such that in b P (a, b e) > r? The corresponding probles in CN are now defined. Definition CN-Pr: given a credal network (G, K), evidence E = e with E X, a query variable Q X \ E and its category q and a rational nuber r, is P (q e) > r? In this definition we use upper queries, but lower queries ay be of interest too. We can show that both queries lead to identical coplexity results: Lea Evaluating arginal lower probabilities in CN is as hard as evaluating arginal upper probabilities. Proof Suppose we have a CN-Pr with arginal query Q = q. The calculation of P (q e) can be done by inserting a binary child Q to Q, where P (q Q) = if Q q and 0 otherwise. Now P (q e) = ax Q q P (Q e) = P (q e). We now define axiin versions of MPE and MAP in credal networks (we could alternatively define axiax versions for these probles, with possibly different coplexities). Definition CN-MAP: given a credal network (G, K), soe evidence E = e with E X, a set Q X \ E and a rational nuber r, is there an instantiation q for the Q variables such that P (q e) > r? CN-MPEe is obtained when CN-MAP has Q = X \ E. CN-MPE is CN-MPEe without evidence, that is, Q = X. We use abbreviations to refer to these probles (e.g. PT-CN-Pr is the belief updating proble in a polytree credal network). 4 Coplexity results Table suarizes relevant coplexity results. We start by explaining the origin of the results in this table (nubering atches the nubers in the table):. [Dechter, 996] describes algoriths with exponential tie coplexity on the induced-width of an eliination order; [Eyal, 200] shows how to obtain a constantfactor approxiation to optial order in polynoial tie for networks with bounded degree and bounded induced-width by log(f(s)). Note that the result here is sightly different fro the one in [Dechter, 996]; we refer to the actual induced width of the graph, not the induced width of an ordering. 2. [Roth, 996] shows coplexity of functional version, [Litan et al., 200] takes the decision version. 3. [Shiony, 994] shows (by reduction fro the vertex cover proble) that BN-MPE is NP-Coplete, while Theore 2 shows that BN-MPEe is PP-Coplete. We assue that the reader is failiar with notions of coplexity theory; for an introduction see [Papadiitriou, 994]. Polynoial tie eans polynoial tie in the size of input. A reduction eans a polynoial tie reduction; when a proble is solvable by another, there is a reduction fro the forer to the latter.

3 Proble Polytree Bounded induced-width Multiply-connected BN-Pr Polynoial () Polynoial () PP-Coplete (2) BN-MPE Polynoial () Polynoial () NP-Coplete (3) BN-MPEe Polynoial () Polynoial () PP-Coplete (3) BN-MAP NP-Coplete (4) NP-Coplete (4) NP PP -Coplete (5) BN-MAP Σ P 2-Coplete (6) Σ P 2-Coplete (6) NP PP -Hard (7) CN-Pr NP-Coplete (8) NP-Coplete (8) NP PP -Coplete (9) CN-MPE Polynoial (0) Polynoial (0) NP-Coplete () CN-MPEe CN-MAP Σ P 2-Coplete (2) Σ P 2-Coplete (2) Σ P 2-Coplete (2) Σ P 2-Coplete (2) Σ P 2-Hard and PP-Hard (3) NP PP -Hard (7) Table : Coplexity results; nubers in parenthesis indicate the ite that discusses the result. 4. [Park, 2002] reduces MAXSAT proble to BN-MAP in polytrees, a result that can be extended to BIW networks as both probles belong to NP (given the polynoial nature of BN-Pr in BIW networks). 5. [Park and Darwiche, 2004] by reduction fro E-MAJSAT. 6. Theore The coplexity of BN-MAP iplies it. 8. Theore [Cozan et al., 2004] by a reduction fro E-MAJSAT. 0. Theore 5.. Theore Theore BN-MPE and PT-CN-MPEe ensure it. In the context of Bayesian networks, the difference between MPE and MPEe ay see acadeic, because any ost probable explanation can be found with BN-MPE. However the sae is not true for credal networks, where one cannot find a ost probable explanation with evidence by siply running a version of MPE and note that CN-MPE and CN-MPEe do display non-trivial differences. In fact, these differences were our otivation for differentiating MPE fro MPEe. The following theore clarifies the difference between these probles for Bayesian networks. Theore 2 BN-MPEe is PP-Coplete. Proof Pertinence is obtained fro the fact that, after aking a PP query to find P (e) (this query is ade once), we can decide whether a given instantiation x has P (x e) > r in linear tie, by ultiplying the probabilities. To show hardness, we reduce the decision proble #3SAT( 2 n/2 ) to it, which is PP-Coplete [Bailey et al., 200] and can be stated as: Given a set of boolean variables X = {X,..., X n } and a 3CNF forula φ(x) with clauses {C,..., C }, is φ(x) satisfied by at least 2 n/2 of the instantiations of X? We construct a BN with binary nodes X,..., X n (x i and x i are the categories) and C,..., C (c i and c i ), where X i has no parents and unifor prior and C i has three parents (the variables contained in the clause) with probabilities respecting the truth table for the clause. Furtherore, we insert a duy binary node Y appearing non-negated in every clause (there will be 2 n instantiations with {Y = y} satisfying φ; this ensures that the forula is satisfiable). Now we solve the BN-MPEe proble with queries X,..., X n, Y and evidence C i = c i for all i (indicating that all C i are true). Then P (X, Y c,..., c ) is equal to = P (c,..., c X,..., X n, Y ) P (X,..., X n, Y ) P (c,..., c ) = = 2 n+ P (c,..., c X,..., X n, Y ) X,...,X n,y [ P (c,..., c X,..., X n, Y ) 2 n+ ] #sats if X,..., X n, Y satisfies φ and 0 otherwise, where #sats is the total nuber of satisfying instantiations. So, ax P (X, Y c,..., c ) iplies that forula φ(x) is satisfied by at least 2 n/2 of all X instantiations. 2 n +2 n/2 Note that if ax P (X, Y c,..., c ) = α and α >, 2 n +2 n/2 then P (X, Y c,..., c ) = α for all satisfying instantiations, which iplies that there are less than 2 n/2 instantiations of X satisfying φ(x). The hardness of PT-CN-Pr was stated by [da Rocha and Cozan, 2002], but the proof there was flawed, and the central arguent used zero probabilities and vertex-based description in an essential way. The following proof corrects these difficulties. Theore 3 PT-CN-Pr and BIW-CN-Pr are NP- Coplete. Proof Pertinence of BIW-CN-Pr (which ensures pertinence of PT-CN-Pr) is iediate, as choosing a vertex of each credal set we have a BIW-BN-Pr proble to solve, which is polynoial. To show hardness we reduce the MAX-3-SAT proble to PT-CN-Pr. It can be forulated as follows: Given a set of boolean variables {X,..., X n }, a 3CNF forula with clauses {C,..., C } and an integer 0 k, is there an assignent for the variables that satisfies at least k clauses? Initially we reove all clauses that have both x i and x i and decreent k for each eliination (because those clauses are already satisfied). For each variable X i we construct two nodes, naely X i and S i. The forer is binary, has no parents and represents the state of X i ; the probabilities P (X i = x i ) and P (X i = x i ) are in [ε, ε] (0 < ε < + is a sall constant). The latter ay assue + categories

4 S 0 X X2 X n X n S S 2 S n S n Figure : Polytree used in the network of Theore 3. (fro 0 to ), has S i and X i as parents and is defined by P (S i = c S i = c, x i ) = 0 if x i C c, or otherwise P (S i = c S i = c, x i ) = 0 if x i C c, or otherwise P (S i = c S i c, X i ) = 0 for X i {x i, x i }, for c 0. When S i = 0, we have: P (S i = 0 S i = c, X i ) = P (S i = c S i = c, X i ) P (S i = 0 S i = 0, X i ) = for X i {x i, x i }. The rules above guarantee coherency in probabilities; note that we include a duy node S 0 with P (S 0 = c) = + for all c. Now, consider P (S n = c) for c 0. Note that P (S n = c) = P (S 0 = c) i P (S i = c S i = c) because, for c 0, every tie {S i = c} and {S i c} appear together we are led to zero. Let A c,i be defined as follows: A c,i = P (S i = c S i = c, X i ) P (X i ). X i {x i,x i} We get P (S n = c) = + i {,...,n} A c,i. Note that A c,i ay assue three values: A c,i = if X i does not influence C c ; A c,i = ε if X i satisfies C c and A c,i = ε if X i does not satisfy C c. We ay conclude that if P (S n = c) α = ( ε) 2 ε, then soe X i satisfied C c. Furtherore, we know that if C c was not satisfied, then P (S n = c) = β = ( ε) 3. Note that α < β. To find out how any clauses were not satisfied, we have to su over all categories of S n, obtaining P (S n = 0) = c {,...,} P (S n = c) and thus P (S n = 0) iniizes this su. We define r h = [( + )( P (S n = 0)) hβ]/( h). and then calculate r 0, r,... until r h α or h =. We know that P (S n = 0) is the iniu su of all P (S n = c), for c 0. This su is coposed by two types of ters: those which are equal to β and those which are less than or equal to α. So what we are verifying with r h is whether there are ore than h ters of the su that are equal to β or not. The last thing should be noted is that ε < + ensures that if just one ter of the su equals to β, then the su is greater than α, that is, if the su is coposed by ters equal to ε 3 and just one equal to β, it ust su greater than α, because one clause was not satisfied. ε < + ensures that everywhere it is necessary (for any h). Thus the inference P (S n = 0) solves MAX-3-SAT proble. If r h > α for all 0 h, then no clause was satisfied. Otherwise h counts how any clauses were not satisfied. Because of the reduction fro MAX-3-SAT, we can state that there is no polynoial tie approxiation schee for PT-CN-Pr (or BIW-CN-Pr) unless P=NP. Reark The proof still holds if we substitute all ε by zero; the proof becoes sipler but depends on events of zero probability, which ay be inconvenient, as pointed out by [Zaffalon, 2003]. Note also that the proof can be rewritten using inequalities instead of vertices, because all credal sets are in binary nodes (pertinence and hardness still hold). It is known that CN-Pr is solvable by BN-MAP, by conducting a CCM transfor in a credal network [Cozan, 2000a]. The following lea presents the reverse connection between inferences in Bayesian and credal networks. Lea 4 BN-MAP is solvable by CN-Pr with joint queries without changing the topology of the network aong the three types defined. Proof Suppose X,..., X n are the MAP variables. Add a binary child X i to each X i with P (X i X i) [0, ] and the constraint X i P (x i X i) =. Now we have ax P (X,..., X n e) = P (x X,...,X n,..., x n e) After evaluating P (x,..., x n e), we just have to look at each X i node and set X i according to which of the P (x i X i) is equal to one (exactly one will be). It should be noted that joint queries are not ore difficult than single arginal queries: we have that CN-Pr with joint queries is still NP PP -Coplete and BIW-CN-Pr with joint queries is still NP-Coplete. Theore 5 PT-CN-MPE and BIW-CN-MPE are solvable in polynoial tie. Proof It is enough to realize that the inner in of the BIW-CN-MPE query ax x in P K(X) i P (x i pa(x i )) factorizes, as the network is locally specified (note that x i s are consistent with the observation e). The optiization becoes ax x i P (x i pa(x i )), which is equivalent to BIW-BN-MPE. Theore 6 CN-MPE is NP-Coplete. Proof Hardness is iediate, because BN-MPE is NP- Coplete and can be trivially transfored to a CN-MPE (we just have to use credal networks coposed by single probability densities). Pertinence is reached because, given an assignent x to the variables, the value of P (x) is given by i P (x i pa(x i )). This holds because each credal set K(x i pa(x i )) is locally specified. Theore 7 PT-CN-MPEe, BIW-CN-MPEe, PT-CN-MAP and BIW-CN-MAP are all Σ P 2-Coplete. Proof Pertinence of the is iediate as BIW-CN-MAP belongs to Σ P 2 (given the MAP variables, we get a BIW-CN-Pr to solve). To see hardness we reduce to PT-CN-MPEe a version of QSAT 2 that is Σ P 2-Coplete: Given a set of variables X,..., X n, an integer 0 < k n and a boolean 3CNF forula φ(x) over these variables, is it true that, for all instantiations to the first k variables, there is an instantiation of the reaining n k that satisfies φ(x)? Initially we construct a network siilar to that of Theore 3. The variables X,..., X k are defined the sae way as there. The variables X k+,..., X n becoe ternary,

5 assuing the categories x i, x i, o i. Their probabilities are: P (X i = o i ) = ε and P (X i = x i ), P (X i = x i ) belong to [0, ε], where 0 < ε < +2 is a sall constant. The probabilities of S i given its parents are the sae as there, except when i > k. In these cases we have P (S i = c S i = c, o i ) = 0, for c 0 (the case when c = 0 reains the sae, that is, equals to ). Furtherore, we add a duy node Q with S n as parent and P (q S n = c) = 0 for c 0 and otherwise. We will solve the PT-CN-MPEe proble ax P (X, S q), where S = {S 0,..., S n } and X = {X,..., X n }. Let X be {X,..., X k } and X + be {X k+,..., X n }; then P ( X, X +, S q ) = P (q S) P (S X) P (X ) P (X + ). P (q) First note that the given q forces S n = 0 to get a nonzero probability. Furtherore, for all instantiations x, x +, s of the variables, there is another instantiation with s = { is i = 0} that has its probability greater than the forer, that is, P (x, x +, s q) > P (x, x +, s q). This holds because the S i nodes are not credal and the conditional probabilities P (S i = 0 S i = 0) are equal to, for all i. Thus we know that the solution of the MPEe proble will be attained in an instantiation where all S i are set to 0. Besides that, we have that choosing the category o i for all X + variables lead us to greater probabilities than if we choose any other. That is, ax P ( X, X +, S q ) = ax P ( X, o, s q ), X,X +,S X where o denotes {X i = o i for i {k +,..., n}} and s denotes { i S i = 0}. If we choose a category different fro o i whenever possible, the axiu probability would not reach the sae value (in fact it will be zero, because P (X i o i ) [0, ε], and thus it ay assue value zero). P ( X, o, s q ) = + εn k P (X ) c 0 P (S n = c). When finding P (X, o, s q), the nuerator P (X ) will becoe ε k, because any solution that does not ake P (X ) = ε k will not be a iniu for P (X, o, s q) (reeber that ε < +2 ). This holds because just one X variable using the extree point ( ε) instead of ε is enough to ake P (X, o, s q) too large: + εn k ε k ( ε) > R + εn k ε k R where R and R are any possible values for the su c 0 P (S n = c) that appears in the denoinator (note that these sus are restricted in [0, + ] by the probabilities of the network). Suarizing, all S variables in the solution of MPEe are set to zero, all X + variables are set to o, and the instantiation chosen for X akes P (X ) = ε k, which iplies that if x i belongs to the instantiation of X, then P (x i ) = ε and P (x i ) = ε (the opposite case is analogous). This eans that the vertices of the credal sets of the X nodes are copletely fixed by the instantiation chosen. Thus the only credal sets that can float in the denoinator are the X + variables (S i variables are not credal and X are already fixed as indicated). So, processing the MPEe we have P ( X, o, s q ) = + εn ( ), in c 0 P (S n = c) where in c 0 P (S n = c) is evaluated over all possible vertices of the X + credal sets (we know that P (X i = o i ) is set to ε, but the probabilities P (X i = x i ) and P (X i = x i ) ay vary between 0 and ε). The forula φ(x) will be satisfied by X and X + if the su c 0 P (S n = c) is less than δ = + ( ε)2 ε( ε) n k (this is the axiu value that a satisfied φ(x) ay assue). All unsatisfied forulas lead to greater values. In fact the sallest value that a unsatisfied forula iplies in the su is greater than δ 2 = + ( ε)n k+3. Note that δ 2 > δ. If we query the PT-CN-MPEe proble ax P (X, S q) with r = ε n + δ and get a negative answer, then for all instantiations to X, there is an instantiation to X + that satisfy φ(x) (that is, the su is bounded by δ ). If the answer is positive, then there does exist an instantiation to X where no instantiation to X + can ake φ(x) satisfied. Theore 8 PT-BN-MAP and BIW-BN-MAP are Σ P 2- Coplete. Proof Pertinence of BIW-BN-MAP (which ensures pertinence of PT-BN-MAP) is trivial. Given a instantiation for the MAP variables, we need to solve a iniization over the Y variables, which is NP-Coplete (see it as a BIW-CN-Pr using Lea 4). Hardness of PT-BN-MAP (which ensures hardness of BIW-BN-MAP) is reached by a reduction fro another version of QSAT 2 that is Σ P 2-Coplete: Given a set of variables X,..., X n, an integer 0 < k n and a boolean 3DNF forula φ(x) over these variables, is there an instantiation to the first k variables such that, for all instantiations of the reaining n k, φ(x) is satisfied? We construct again a network following the ideas of Theore 3. It includes a binary node to each X i, without parents and with unifor prior. There are n nodes S i with parents S i and X i. They have + categories and are defined as follows (for c {,..., } and i {,..., n}): if x i clause c P (S i = c S i = c, x i ) = 0 if x i clause c 2 otherwise P (S i = c S i c, x i ) = 0. The conditional probabilities of S i given x i are defined analogously. The probabilities of P (S i = 0 S i, X i ) ensure that they su exactly, as done in Theore 3. Furtherore, P (S 0 ) has unifor prior and we insert an additional binary node Q with S n as parent, having P (q S n = c) = if c 0 and 0 otherwise. So, we have that P (X q) = 2 n P(q X) P(q) = (+)2 c 0 n (+) i A c,i ( 2) n = c 0 is equal to i A c,i

6 where A c,i = X i P (S i = c S i = c, X i ) P (X i ) for i {,..., n}. A c,i assues value zero only when the variable it represents denies the clause c. The nuerator of P (X q) sus how any clauses are satisfied by the instantiation of X variables. Let X = {X,..., X k } and X + = {X k+,..., X n }. We have in X + P (X, X + q) = 0 if, given the instantiation for the X variables, there is an assignent to X + variables that can deny φ(x). This way, questioning if PT-BN-MAP proble with MAP variables X and evidence q (which axiizes in X + P (X q)) has non-zero answer is enough to solve the QSAT 2 proble. Given this X instantiation, all X + will satisfy φ(x). 5 Conclusion We can suarize the contributions of this paper as follows. Concerning Bayesian networks, we have first introduced a ore general definition of bounded induced-width networks (deonstrating that any probles where inducedwidth actually grows with the network reain polynoial), and we have shown the difference between the BN-MPE and the BN-MPEe probles. More iportantly, we have introduced the MAP proble and presented its coplexity. A possible iproveent of our results would be to present a copleteness result for ultiply-connected networks. Our ost significant results pertain to credal networks, with direct iplications to odels that handle interval and set probabilities, belief functions, possibility easures, qualitative probabilities, and failies of probabilistic logic. We have clarified the so far unexplored coplexity of CN-MPE, CN-MPEe, and CN-MAP. The polynoial character of CN-MPE in soe cases is rather surprising. There are several interesting probles still to be explored. For exaple, binary networks (Bayesian and credal) could display lower coplexity than their non-binary counterparts in probles such as PT-BN-MAP, BIW-BN-MAP and BIW-CN-Pr. These probles belong to NP and are clearly related, but are there polynoial tie algoriths to solve the? We conjecture there are not, even as we note that there is a polynoial algorith to solve CN-Pr in binary polytrees [Fagiuoli and Zaffalon, 998]. Acknowledgents We thank Aritanan Gruber for indicating relevant coplexity results, Carlos Guestrin for pointing out a flaw in [da Rocha and Cozan, 2002], Thoas Lukasiewicz for initial thoughts on the coplexity of credal networks, and a reviewer for suggesting a short proof for Theore 5. This research received support fro HP Brazil R&D; the second author was partially supported by CNPq, Brazil. References [Bailey et al., 200] D. D. Bailey, V. Dalau, and P. G. Kolaitis. Phase transitions of PP-coplete satisfiability probles. In Int. Joint Conf. on Artificial Intelligence, pp , Seattle, Washington, 200. [Cano et al., 993] J. Cano, M. Delgado, and S. Moral. An axioatic fraework for propagating uncertainty in directed acyclic networks. Int. Journal of Approxiate Reasoning, 8: , 993. [Cozan et al., 2004] F. G. Cozan, C. P. de Capos, J. S. Ide, and J. C. F. da Rocha. Propositional and relational Bayesian networks associated with iprecise and qualitative probabilistic assessents. In XX Conf. on Uncertainty in Artificial Intelligence, pp. 04, Banff, AUAI Press. [Cozan, 2000a] F. G. Cozan. Credal networks. Artificial Intelligence, 20:99 233, [Cozan, 2000b] F. G. Cozan. Separation properties of sets of probabilities. In XVI Conf. on Uncertainty in Artificial Intelligence, pp. 07 5, San Francisco, Morgan Kaufann. [da Rocha and Cozan, 2002] J. C. F. da Rocha and F. G. Cozan. Inference with separately specified sets of probabilities in credal networks. In XVIII Conf. on Uncertainty in Artificial Intelligence, pp , San Francisco, Morgan Kaufann. [Dechter, 996] R. Dechter. Bucket eliination: A unifying fraework for probabilistic inference. In XII Conf. on Uncertainty in Artificial Intelligence, pp. 2 29, San Francisco, 996. Morgan Kaufann. [Eyal, 200] A. Eyal. Dividing and Conquering Logic. PhD thesis, Stanford University, 200. Graphical eco- [Kakade et al., 200] S. Kakade, and L. Ortiz. noics. COLT, [Fagiuoli and Zaffalon, 998] E. Fagiuoli and M. Zaffalon. 2U: An exact interval propagation algorith for polytrees with binary variables. Artificial Intelligence, 06():77 07, 998. [Levi, 980] I. Levi. The Enterprise of Knowledge. MIT Press, Cabridge, Massachusetts, 980. [Litan et al., 200] M. Litan, S. M. Majercik, and T. Pitassi. Stochastic boolean satisfiability. Journal of Autoated Reasoning, 27(3):25 296, 200. [Papadiitriou, 994] C. H. Papadiitriou. Coputational Coplexity. Addison-Wesley, San Diego, 994. [Park and Darwiche, 2004] J. D. Park and A. Darwiche. Coplexity results and approxiation strategies for MAP explanations. Journal of Artificial Intelligence Research, 2:0 33, [Park, 2002] J. D. Park. MAP coplexity results and approxiation ethods. In XVIII Conf. in Uncertainty in Artificial Intelligence, University of Alberta, Edonton, Alberta, Canada, Morgan Kaufann. [Pearl, 988] J. Pearl. Probabilistic Reasoning in Intelligent Systes: Networks of Plausible Inference. Morgan Kaufann, San Mateo, California, 988. [Roth, 996] D. Roth. On the hardness of approxiate reasoning. Artificial Intelligence, 82(-2): , 996. [Shiony, 994] S. E. Shiony. Finding MAPs for belief networks is NP-hard. Artificial Intelligence, 68(2):399 40, 994. [Walley, 99] P. Walley. Statistical Reasoning with Iprecise Probabilities. Chapan and Hall, London, 99. [Walley, 996] P. Walley. Measures of uncertainty in expert systes. Artificial Intelligence, 83: 58, 996. [Zaffalon, 2003] M. Zaffalon and E. Fagiuoli. Tree-based credal networks for classification. Reliable Coputing, 9(6): , 2003.

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

a a a a a a a m a b a b

a a a a a a a m a b a b Algebra / Trig Final Exa Study Guide (Fall Seester) Moncada/Dunphy Inforation About the Final Exa The final exa is cuulative, covering Appendix A (A.1-A.5) and Chapter 1. All probles will be ultiple choice

More information

Kernel Methods and Support Vector Machines

Kernel Methods and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley ENSIAG 2 / osig 1 Second Seester 2012/2013 Lesson 20 2 ay 2013 Kernel ethods and Support Vector achines Contents Kernel Functions...2 Quadratic

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

On the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs

On the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs On the Inapproxiability of Vertex Cover on k-partite k-unifor Hypergraphs Venkatesan Guruswai and Rishi Saket Coputer Science Departent Carnegie Mellon University Pittsburgh, PA 1513. Abstract. Coputing

More information

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate The Siplex Method is Strongly Polynoial for the Markov Decision Proble with a Fixed Discount Rate Yinyu Ye April 20, 2010 Abstract In this note we prove that the classic siplex ethod with the ost-negativereduced-cost

More information

Bipartite subgraphs and the smallest eigenvalue

Bipartite subgraphs and the smallest eigenvalue Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.

More information

Using EM To Estimate A Probablity Density With A Mixture Of Gaussians

Using EM To Estimate A Probablity Density With A Mixture Of Gaussians Using EM To Estiate A Probablity Density With A Mixture Of Gaussians Aaron A. D Souza adsouza@usc.edu Introduction The proble we are trying to address in this note is siple. Given a set of data points

More information

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis E0 370 tatistical Learning Theory Lecture 6 (Aug 30, 20) Margin Analysis Lecturer: hivani Agarwal cribe: Narasihan R Introduction In the last few lectures we have seen how to obtain high confidence bounds

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13 CSE55: Randoied Algoriths and obabilistic Analysis May 6, Lecture Lecturer: Anna Karlin Scribe: Noah Siegel, Jonathan Shi Rando walks and Markov chains This lecture discusses Markov chains, which capture

More information

In this chapter, we consider several graph-theoretic and probabilistic models

In this chapter, we consider several graph-theoretic and probabilistic models THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer

More information

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES

More information

arxiv: v1 [cs.ds] 3 Feb 2014

arxiv: v1 [cs.ds] 3 Feb 2014 arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/

More information

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,

More information

Curious Bounds for Floor Function Sums

Curious Bounds for Floor Function Sums 1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International

More information

Handout 7. and Pr [M(x) = χ L (x) M(x) =? ] = 1.

Handout 7. and Pr [M(x) = χ L (x) M(x) =? ] = 1. Notes on Coplexity Theory Last updated: October, 2005 Jonathan Katz Handout 7 1 More on Randoized Coplexity Classes Reinder: so far we have seen RP,coRP, and BPP. We introduce two ore tie-bounded randoized

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

A Simple Regression Problem

A Simple Regression Problem A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where

More information

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness A Note on Scheduling Tall/Sall Multiprocessor Tasks with Unit Processing Tie to Miniize Maxiu Tardiness Philippe Baptiste and Baruch Schieber IBM T.J. Watson Research Center P.O. Box 218, Yorktown Heights,

More information

1 Generalization bounds based on Rademacher complexity

1 Generalization bounds based on Rademacher complexity COS 5: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #0 Scribe: Suqi Liu March 07, 08 Last tie we started proving this very general result about how quickly the epirical average converges

More information

Fixed-to-Variable Length Distribution Matching

Fixed-to-Variable Length Distribution Matching Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de

More information

CS Lecture 13. More Maximum Likelihood

CS Lecture 13. More Maximum Likelihood CS 6347 Lecture 13 More Maxiu Likelihood Recap Last tie: Introduction to axiu likelihood estiation MLE for Bayesian networks Optial CPTs correspond to epirical counts Today: MLE for CRFs 2 Maxiu Likelihood

More information

Generalized Loopy 2U: A New Algorithm for Approximate Inference in Credal Networks

Generalized Loopy 2U: A New Algorithm for Approximate Inference in Credal Networks Generalized Loopy 2U: A New Algorithm for Approximate Inference in Credal Networks Alessandro Antonucci, Marco Zaffalon, Yi Sun, Cassio P. de Campos Istituto Dalle Molle di Studi sull Intelligenza Artificiale

More information

Graphical Models in Local, Asymmetric Multi-Agent Markov Decision Processes

Graphical Models in Local, Asymmetric Multi-Agent Markov Decision Processes Graphical Models in Local, Asyetric Multi-Agent Markov Decision Processes Ditri Dolgov and Edund Durfee Departent of Electrical Engineering and Coputer Science University of Michigan Ann Arbor, MI 48109

More information

Generalized Queries on Probabilistic Context-Free Grammars

Generalized Queries on Probabilistic Context-Free Grammars IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 20, NO. 1, JANUARY 1998 1 Generalized Queries on Probabilistic Context-Free Graars David V. Pynadath and Michael P. Wellan Abstract

More information

Acyclic Colorings of Directed Graphs

Acyclic Colorings of Directed Graphs Acyclic Colorings of Directed Graphs Noah Golowich Septeber 9, 014 arxiv:1409.7535v1 [ath.co] 6 Sep 014 Abstract The acyclic chroatic nuber of a directed graph D, denoted χ A (D), is the iniu positive

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

On the Complexity of Strong and Epistemic Credal Networks

On the Complexity of Strong and Epistemic Credal Networks On the Complexity of Strong and Epistemic Credal Networks Denis D. Mauá Cassio P. de Campos Alessio Benavoli Alessandro Antonucci Istituto Dalle Molle di Studi sull Intelligenza Artificiale (IDSIA), Manno-Lugano,

More information

Homework 3 Solutions CSE 101 Summer 2017

Homework 3 Solutions CSE 101 Summer 2017 Hoework 3 Solutions CSE 0 Suer 207. Scheduling algoriths The following n = 2 jobs with given processing ties have to be scheduled on = 3 parallel and identical processors with the objective of iniizing

More information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information Cite as: Straub D. (2014). Value of inforation analysis with structural reliability ethods. Structural Safety, 49: 75-86. Value of Inforation Analysis with Structural Reliability Methods Daniel Straub

More information

On the Use of A Priori Information for Sparse Signal Approximations

On the Use of A Priori Information for Sparse Signal Approximations ITS TECHNICAL REPORT NO. 3/4 On the Use of A Priori Inforation for Sparse Signal Approxiations Oscar Divorra Escoda, Lorenzo Granai and Pierre Vandergheynst Signal Processing Institute ITS) Ecole Polytechnique

More information

Support Vector Machines. Maximizing the Margin

Support Vector Machines. Maximizing the Margin Support Vector Machines Support vector achines (SVMs) learn a hypothesis: h(x) = b + Σ i= y i α i k(x, x i ) (x, y ),..., (x, y ) are the training exs., y i {, } b is the bias weight. α,..., α are the

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths

More information

ADVANCES ON THE BESSIS- MOUSSA-VILLANI TRACE CONJECTURE

ADVANCES ON THE BESSIS- MOUSSA-VILLANI TRACE CONJECTURE ADVANCES ON THE BESSIS- MOUSSA-VILLANI TRACE CONJECTURE CHRISTOPHER J. HILLAR Abstract. A long-standing conjecture asserts that the polynoial p(t = Tr(A + tb ] has nonnegative coefficients whenever is

More information

Probability Distributions

Probability Distributions Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Notes for EE7C (Spring 018: Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee7c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee7c@berkeley.edu October 15,

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair Proceedings of the 6th SEAS International Conference on Siulation, Modelling and Optiization, Lisbon, Portugal, Septeber -4, 006 0 A Siplified Analytical Approach for Efficiency Evaluation of the eaving

More information

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm Acta Polytechnica Hungarica Vol., No., 04 Sybolic Analysis as Universal Tool for Deriving Properties of Non-linear Algoriths Case study of EM Algorith Vladiir Mladenović, Miroslav Lutovac, Dana Porrat

More information

Bayesian Approach for Fatigue Life Prediction from Field Inspection

Bayesian Approach for Fatigue Life Prediction from Field Inspection Bayesian Approach for Fatigue Life Prediction fro Field Inspection Dawn An and Jooho Choi School of Aerospace & Mechanical Engineering, Korea Aerospace University, Goyang, Seoul, Korea Srira Pattabhiraan

More information

Approximation in Stochastic Scheduling: The Power of LP-Based Priority Policies

Approximation in Stochastic Scheduling: The Power of LP-Based Priority Policies Approxiation in Stochastic Scheduling: The Power of -Based Priority Policies Rolf Möhring, Andreas Schulz, Marc Uetz Setting (A P p stoch, r E( w and (B P p stoch E( w We will assue that the processing

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words)

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words) 1 A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine (1900 words) Contact: Jerry Farlow Dept of Matheatics Univeristy of Maine Orono, ME 04469 Tel (07) 866-3540 Eail: farlow@ath.uaine.edu

More information

Support Vector Machines MIT Course Notes Cynthia Rudin

Support Vector Machines MIT Course Notes Cynthia Rudin Support Vector Machines MIT 5.097 Course Notes Cynthia Rudin Credit: Ng, Hastie, Tibshirani, Friedan Thanks: Şeyda Ertekin Let s start with soe intuition about argins. The argin of an exaple x i = distance

More information

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40 On Poset Merging Peter Chen Guoli Ding Steve Seiden Abstract We consider the follow poset erging proble: Let X and Y be two subsets of a partially ordered set S. Given coplete inforation about the ordering

More information

Solutions of some selected problems of Homework 4

Solutions of some selected problems of Homework 4 Solutions of soe selected probles of Hoework 4 Sangchul Lee May 7, 2018 Proble 1 Let there be light A professor has two light bulbs in his garage. When both are burned out, they are replaced, and the next

More information

Generalized eigenfunctions and a Borel Theorem on the Sierpinski Gasket.

Generalized eigenfunctions and a Borel Theorem on the Sierpinski Gasket. Generalized eigenfunctions and a Borel Theore on the Sierpinski Gasket. Kasso A. Okoudjou, Luke G. Rogers, and Robert S. Strichartz May 26, 2006 1 Introduction There is a well developed theory (see [5,

More information

time time δ jobs jobs

time time δ jobs jobs Approxiating Total Flow Tie on Parallel Machines Stefano Leonardi Danny Raz y Abstract We consider the proble of optiizing the total ow tie of a strea of jobs that are released over tie in a ultiprocessor

More information

arxiv: v1 [cs.ds] 29 Jan 2012

arxiv: v1 [cs.ds] 29 Jan 2012 A parallel approxiation algorith for ixed packing covering seidefinite progras arxiv:1201.6090v1 [cs.ds] 29 Jan 2012 Rahul Jain National U. Singapore January 28, 2012 Abstract Penghui Yao National U. Singapore

More information

On Constant Power Water-filling

On Constant Power Water-filling On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives

More information

Learnability and Stability in the General Learning Setting

Learnability and Stability in the General Learning Setting Learnability and Stability in the General Learning Setting Shai Shalev-Shwartz TTI-Chicago shai@tti-c.org Ohad Shair The Hebrew University ohadsh@cs.huji.ac.il Nathan Srebro TTI-Chicago nati@uchicago.edu

More information

Research Article On the Isolated Vertices and Connectivity in Random Intersection Graphs

Research Article On the Isolated Vertices and Connectivity in Random Intersection Graphs International Cobinatorics Volue 2011, Article ID 872703, 9 pages doi:10.1155/2011/872703 Research Article On the Isolated Vertices and Connectivity in Rando Intersection Graphs Yilun Shang Institute for

More information

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation

More information

1 Proof of learning bounds

1 Proof of learning bounds COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #4 Scribe: Akshay Mittal February 13, 2013 1 Proof of learning bounds For intuition of the following theore, suppose there exists a

More information

The Weierstrass Approximation Theorem

The Weierstrass Approximation Theorem 36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined

More information

Optimal Jamming Over Additive Noise: Vector Source-Channel Case

Optimal Jamming Over Additive Noise: Vector Source-Channel Case Fifty-first Annual Allerton Conference Allerton House, UIUC, Illinois, USA October 2-3, 2013 Optial Jaing Over Additive Noise: Vector Source-Channel Case Erah Akyol and Kenneth Rose Abstract This paper

More information

3.8 Three Types of Convergence

3.8 Three Types of Convergence 3.8 Three Types of Convergence 3.8 Three Types of Convergence 93 Suppose that we are given a sequence functions {f k } k N on a set X and another function f on X. What does it ean for f k to converge to

More information

The Frequent Paucity of Trivial Strings

The Frequent Paucity of Trivial Strings The Frequent Paucity of Trivial Strings Jack H. Lutz Departent of Coputer Science Iowa State University Aes, IA 50011, USA lutz@cs.iastate.edu Abstract A 1976 theore of Chaitin can be used to show that

More information

Best Arm Identification: A Unified Approach to Fixed Budget and Fixed Confidence

Best Arm Identification: A Unified Approach to Fixed Budget and Fixed Confidence Best Ar Identification: A Unified Approach to Fixed Budget and Fixed Confidence Victor Gabillon Mohaad Ghavazadeh Alessandro Lazaric INRIA Lille - Nord Europe, Tea SequeL {victor.gabillon,ohaad.ghavazadeh,alessandro.lazaric}@inria.fr

More information

arxiv: v1 [math.nt] 14 Sep 2014

arxiv: v1 [math.nt] 14 Sep 2014 ROTATION REMAINDERS P. JAMESON GRABER, WASHINGTON AND LEE UNIVERSITY 08 arxiv:1409.411v1 [ath.nt] 14 Sep 014 Abstract. We study properties of an array of nubers, called the triangle, in which each row

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest

More information

IN modern society that various systems have become more

IN modern society that various systems have become more Developent of Reliability Function in -Coponent Standby Redundant Syste with Priority Based on Maxiu Entropy Principle Ryosuke Hirata, Ikuo Arizono, Ryosuke Toohiro, Satoshi Oigawa, and Yasuhiko Takeoto

More information

A Markov Framework for the Simple Genetic Algorithm

A Markov Framework for the Simple Genetic Algorithm A arkov Fraework for the Siple Genetic Algorith Thoas E. Davis*, Jose C. Principe Electrical Engineering Departent University of Florida, Gainesville, FL 326 *WL/NGS Eglin AFB, FL32542 Abstract This paper

More information

Lower Bounds for Quantized Matrix Completion

Lower Bounds for Quantized Matrix Completion Lower Bounds for Quantized Matrix Copletion Mary Wootters and Yaniv Plan Departent of Matheatics University of Michigan Ann Arbor, MI Eail: wootters, yplan}@uich.edu Mark A. Davenport School of Elec. &

More information

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna

More information

Hybrid System Identification: An SDP Approach

Hybrid System Identification: An SDP Approach 49th IEEE Conference on Decision and Control Deceber 15-17, 2010 Hilton Atlanta Hotel, Atlanta, GA, USA Hybrid Syste Identification: An SDP Approach C Feng, C M Lagoa, N Ozay and M Sznaier Abstract The

More information

Testing Properties of Collections of Distributions

Testing Properties of Collections of Distributions Testing Properties of Collections of Distributions Reut Levi Dana Ron Ronitt Rubinfeld April 9, 0 Abstract We propose a fraework for studying property testing of collections of distributions, where the

More information

Worst-case performance of critical path type algorithms

Worst-case performance of critical path type algorithms Intl. Trans. in Op. Res. 7 (2000) 383±399 www.elsevier.co/locate/ors Worst-case perforance of critical path type algoriths G. Singh, Y. Zinder* University of Technology, P.O. Box 123, Broadway, NSW 2007,

More information

Exact tensor completion with sum-of-squares

Exact tensor completion with sum-of-squares Proceedings of Machine Learning Research vol 65:1 54, 2017 30th Annual Conference on Learning Theory Exact tensor copletion with su-of-squares Aaron Potechin Institute for Advanced Study, Princeton David

More information

THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT

THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT PETER BORWEIN AND KWOK-KWONG STEPHEN CHOI Abstract. Let n be any integer and ( n ) X F n : a i z i : a i, ± i be the set of all polynoials of height and

More information

Convex Programming for Scheduling Unrelated Parallel Machines

Convex Programming for Scheduling Unrelated Parallel Machines Convex Prograing for Scheduling Unrelated Parallel Machines Yossi Azar Air Epstein Abstract We consider the classical proble of scheduling parallel unrelated achines. Each job is to be processed by exactly

More information

Computable Shell Decomposition Bounds

Computable Shell Decomposition Bounds Coputable Shell Decoposition Bounds John Langford TTI-Chicago jcl@cs.cu.edu David McAllester TTI-Chicago dac@autoreason.co Editor: Leslie Pack Kaelbling and David Cohn Abstract Haussler, Kearns, Seung

More information

Many-valued Horn Logic is Hard

Many-valued Horn Logic is Hard Many-valued Horn Logic is Hard Stefan Borgwardt 1, Marco Cerai 2, and Rafael Peñaloza 1,3 1 Theoretical Coputer Science, TU Dresden, Gerany 2 Departent of Coputer Science, Palacký University in Oloouc,

More information

The Methods of Solution for Constrained Nonlinear Programming

The Methods of Solution for Constrained Nonlinear Programming Research Inventy: International Journal Of Engineering And Science Vol.4, Issue 3(March 2014), PP 01-06 Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.co The Methods of Solution for Constrained

More information

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography Tight Bounds for axial Identifiability of Failure Nodes in Boolean Network Toography Nicola Galesi Sapienza Università di Roa nicola.galesi@uniroa1.it Fariba Ranjbar Sapienza Università di Roa fariba.ranjbar@uniroa1.it

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This article appeared in a ournal published by Elsevier. The attached copy is furnished to the author for internal non-coercial research and education use, including for instruction at the authors institution

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Notes for EE227C (Spring 2018): Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee227c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee227c@berkeley.edu October

More information

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks 1 Optial Resource Allocation in Multicast Device-to-Device Counications Underlaying LTE Networks Hadi Meshgi 1, Dongei Zhao 1 and Rong Zheng 2 1 Departent of Electrical and Coputer Engineering, McMaster

More information

Decision-Theoretic Specification of Credal Networks: A Unified Language for Uncertain Modeling with Sets of Bayesian Networks

Decision-Theoretic Specification of Credal Networks: A Unified Language for Uncertain Modeling with Sets of Bayesian Networks Decision-Theoretic Specification of Credal Networks: A Unified Language for Uncertain Modeling with Sets of Bayesian Networks Alessandro Antonucci Marco Zaffalon IDSIA, Istituto Dalle Molle di Studi sull

More information

FPTAS for optimizing polynomials over the mixed-integer points of polytopes in fixed dimension

FPTAS for optimizing polynomials over the mixed-integer points of polytopes in fixed dimension Matheatical Prograing anuscript No. (will be inserted by the editor) Jesús A. De Loera Rayond Heecke Matthias Köppe Robert Weisantel FPTAS for optiizing polynoials over the ixed-integer points of polytopes

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

The Simplex and Policy-Iteration Methods are Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate

The Simplex and Policy-Iteration Methods are Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate The Siplex and Policy-Iteration Methods are Strongly Polynoial for the Markov Decision Proble with a Fixed Discount Rate Yinyu Ye Departent of Manageent Science and Engineering, Stanford University, Stanford,

More information

OBJECTIVES INTRODUCTION

OBJECTIVES INTRODUCTION M7 Chapter 3 Section 1 OBJECTIVES Suarize data using easures of central tendency, such as the ean, edian, ode, and idrange. Describe data using the easures of variation, such as the range, variance, and

More information

Solutions 1. Introduction to Coding Theory - Spring 2010 Solutions 1. Exercise 1.1. See Examples 1.2 and 1.11 in the course notes.

Solutions 1. Introduction to Coding Theory - Spring 2010 Solutions 1. Exercise 1.1. See Examples 1.2 and 1.11 in the course notes. Solutions 1 Exercise 1.1. See Exaples 1.2 and 1.11 in the course notes. Exercise 1.2. Observe that the Haing distance of two vectors is the iniu nuber of bit flips required to transfor one into the other.

More information

Revealed Preference with Stochastic Demand Correspondence

Revealed Preference with Stochastic Demand Correspondence Revealed Preference with Stochastic Deand Correspondence Indraneel Dasgupta School of Econoics, University of Nottingha, Nottingha NG7 2RD, UK. E-ail: indraneel.dasgupta@nottingha.ac.uk Prasanta K. Pattanaik

More information

Estimating Entropy and Entropy Norm on Data Streams

Estimating Entropy and Entropy Norm on Data Streams Estiating Entropy and Entropy Nor on Data Streas Ait Chakrabarti 1, Khanh Do Ba 1, and S. Muthukrishnan 2 1 Departent of Coputer Science, Dartouth College, Hanover, NH 03755, USA 2 Departent of Coputer

More information

Tight Information-Theoretic Lower Bounds for Welfare Maximization in Combinatorial Auctions

Tight Information-Theoretic Lower Bounds for Welfare Maximization in Combinatorial Auctions Tight Inforation-Theoretic Lower Bounds for Welfare Maxiization in Cobinatorial Auctions Vahab Mirrokni Jan Vondrák Theory Group, Microsoft Dept of Matheatics Research Princeton University Redond, WA 9805

More information

Introduction to Discrete Optimization

Introduction to Discrete Optimization Prof. Friedrich Eisenbrand Martin Nieeier Due Date: March 9 9 Discussions: March 9 Introduction to Discrete Optiization Spring 9 s Exercise Consider a school district with I neighborhoods J schools and

More information

INDEPENDENT SETS IN HYPERGRAPHS

INDEPENDENT SETS IN HYPERGRAPHS INDEPENDENT SETS IN HYPERGRAPHS Abstract. Many iportant theores and conjectures in cobinatorics, such as the theore of Szeerédi on arithetic progressions and the Erdős-Stone Theore in extreal graph theory,

More information

Equilibria on the Day-Ahead Electricity Market

Equilibria on the Day-Ahead Electricity Market Equilibria on the Day-Ahead Electricity Market Margarida Carvalho INESC Porto, Portugal Faculdade de Ciências, Universidade do Porto, Portugal argarida.carvalho@dcc.fc.up.pt João Pedro Pedroso INESC Porto,

More information

Lecture 21. Interior Point Methods Setup and Algorithm

Lecture 21. Interior Point Methods Setup and Algorithm Lecture 21 Interior Point Methods In 1984, Kararkar introduced a new weakly polynoial tie algorith for solving LPs [Kar84a], [Kar84b]. His algorith was theoretically faster than the ellipsoid ethod and

More information

TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES

TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES S. E. Ahed, R. J. Tokins and A. I. Volodin Departent of Matheatics and Statistics University of Regina Regina,

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

1 Bounding the Margin

1 Bounding the Margin COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #12 Scribe: Jian Min Si March 14, 2013 1 Bounding the Margin We are continuing the proof of a bound on the generalization error of AdaBoost

More information