Listing the families of Sufficient Coalitions of criteria involved in Sorting procedures

Size: px
Start display at page:

Download "Listing the families of Sufficient Coalitions of criteria involved in Sorting procedures"

Transcription

1 Listing the families of Sufficient Coalitions of criteria involved in Sorting procedures Eda Ersek Uyanık 1, Olivier Sobrie 1,2, Vincent Mousseau 2, Marc Pirlot 1 (1) Université de Mons (2) École Centrale Paris DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot 1- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 1 / 30

2 Sorting methods à la Electre Tri Bouyssou et Marchant (2007a,b) have characterized the Non Compensatory Sorting models/methods (NCS) Basically, an object is assigned to a category if it is better than the lower limit profile of the category on a sufficiently strong subset of criteria while this is not the case when comparing the object to the upper limit profile of the category E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot 2- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 2 / 30

3 The non-compensatory sorting model The ingredients are : 2 categories (simplest case) : Good (G), Bad (B) objects to be sorted : X = i [n] X i with [n] = {1,..., n} i total preorder on X i limit profile b = (b 1,..., b n ) F = family of sufficient coalitions, which is a subset of 2 [n] up-closed by inclusion Assignment rule : For all x = (x 1,..., x n ) X x G iff {i [n] : x i i b i } F E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot 3- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 3 / 30

4 A particular case : MR-Sort Case in which F can be determined by weights and a threshold weights w i with w i 0 for i [n] and i [n] w i = 1 threshold λ R i.e. x B iff w i λ i [n]:x i i b i A F iff w i λ i A E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot 4- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 4 / 30

5 Examples Example 1. Conditions for successfull completion of examinations 4 subjects : French (F), English (E), Maths (µ), Physics (ϕ) at least 12/20 in each subject with at most one exception E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot 5- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 5 / 30

6 Examples Example 1. Conditions for successfull completion of examinations 4 subjects : French (F), English (E), Maths (µ), Physics (ϕ) at least 12/20 in each subject with at most one exception This assignment rule to the category G = passed can be represented in the MR-Sort model Weights : w i = 1/4 for i = 1,... 4 Threshold : λ = 3/4 mark 12 for at least 3 subjects, w i 3/4 λ i:x i 12 mark 12 for at most 2 subjects, w i 2/4 < λ i:x i 12 E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot 5- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 5 / 30

7 Examples Example 2. Conditions for successfull completion of examinations 4 subjects : French (F), English (E), Maths (µ), Physics (ϕ) at least one mark 12/20 in the literary subjects (F, E) and at least one mark 12/20 in the scientific subjects (µ, ϕ) Such an assignment rule cannot be represented by weights and a threshold E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot 6- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 6 / 30

8 Examples Example 2. Conditions for successfull completion of examinations 4 subjects : French (F), English (E), Maths (µ), Physics (ϕ) at least one mark 12/20 in the literary subjects (F, E) and at least one mark 12/20 in the scientific subjects (µ, ϕ) Such an assignment rule cannot be represented by weights and a threshold w 1 + w 3 λ w 1 + w 4 λ w 2 + w 3 λ w 2 + w 4 λ w 1 + w 2 < λ w 3 + w 4 < λ This system of inequalities has no solution : summing up the first 4 yields λ 1/2 while summing up the last 2 implies λ > 1/2. E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot 6- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 6 / 30

9 Examples This rule can be represented in the NCS model The sufficient coalitions are F = {{F, µ}, {E, µ}, {F, ϕ}, {E, ϕ},...}... stands for all coalitions containing one of the latter. E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot 7- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 7 / 30

10 Question To what extent is the NCS model more expressive than MR-Sort? Question : Which upper sets of 2 [n] can be represented by weights and threshold? E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot 8- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 8 / 30

11 Question To what extent is the NCS model more expressive than MR-Sort? Question : Which upper sets of 2 [n] can be represented by weights and threshold? Method : Use Linear programming to test this property E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot 8- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 8 / 30

12 Question To what extent is the NCS model more expressive than MR-Sort? Question : Which upper sets of 2 [n] can be represented by weights and threshold? Method : Use Linear programming to test this property In example 2, solve, e.g., the following : subject to min λ w 1 + w 3 λ w 1 + w 4 λ w 2 + w 3 λ w 2 + w 4 λ w 1 + w 2 λ + ɛ w 3 + w 4 λ + ɛ To formulate the constraints of the LP, we only need the minimal sufficient coalitions (MSC) and the maximal insufficient coalitions (MIC) E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot 8- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 8 / 30

13 Minimal sufficient coalitions The MSC form an antichain in 2 [n],. Antichain in 2 [n] : Set of subsets of [n] such that none of them is included in another There is a one-to-one correspondence between upper sets and antichains of 2 [n] Reformulation : For each antichain of 2 [n], test whether it can be represented by an MR-Sort rule E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot 9- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 9 / 30

14 Number of antichains of 2 [n] D(n), the sequence of Dedekind numbers, is A in the On-Line Encyclopedia of Integer Sequences D(1) = 3, D(2) = 6, D(3) = 20, D(4) = 168, D(5) = 7581, D(6) = , D(7) = , D(8) = D(9) is not known If testing whether an antichain is representable by weights and threshold requires 1 second CPU time, answering this question for n = 7 would require D(7) seconds, i.e years. E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot10- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 10 / 30

15 Same question in other contexts Boolean functions : D(n) is the number of monotone Boolean functions in n variables Cooperative games : D(n) 2 is the number of simple games Correspondences NCS model monotone Boolean function simple game sufficient coalitions true points winning coalitions MR-Sort threshold function weighted majority game threshold threshold quota E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot11- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 11 / 30

16 Same question in other contexts Question : Which antichains are representable by weights and threshold? E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot12- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 12 / 30

17 Same question in other contexts Question : Which antichains are representable by weights and threshold? Which monotone boolean functions are threshold functions? E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot12- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 12 / 30

18 Same question in other contexts Question : Which antichains are representable by weights and threshold? Which monotone boolean functions are threshold functions? Which simple games are weighted majority games? E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot12- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 12 / 30

19 Same question in other contexts Question : Which antichains are representable by weights and threshold? Which monotone boolean functions are threshold functions? Which simple games are weighted majority games? Many papers study this question in the different contexts For instance : characterization results such as the asummability property in the context of Boolean functions Study of subclasses of simple games, e.g. invariant-trade robust games Listing all weighted majority games up to n = 7 Do we need more? E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot12- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 12 / 30

20 Additional objectives study other classes in NCS list all antichains in order to be able to simulate the random choice of a NCS model E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot13- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 13 / 30

21 Representation of a NCS rule by a k-additive capacity Any upper set of sufficient coalitions can be represented by a capacity µ and a threshold λ The capacity of a coalition A is computed in terms of its interaction function m (Möbius transform) : µ(a) = S A m(s) = i A m i + i,j A, i j m ij + i,j,l A, i,j,l The capacity µ is k-additive if m(s) = 0 for all S > k m ijl +... Linear Programming permits to test whether a family of sufficient coalitions can be represented by a 2-additive, a 3-additive,..., capacity E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot14- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 14 / 30

22 Simulation Context : Assume we devised a method for learning a NCS model We want to test whether the method works A basic requirement is the following : if the learning set has been assigned by a NCS rule, the learning method should be able to retrieve this rule (approximately) E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot15- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 15 / 30

23 Simulation Context : Assume we devised a method for learning a NCS model We want to test whether the method works A basic requirement is the following : if the learning set has been assigned by a NCS rule, the learning method should be able to retrieve this rule (approximately) Procedure to test this requirement : select a NCS model at random generate objects that will constitute a learning set assign these objects using the NCS model test the learning method E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot15- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 15 / 30

24 Additional objectives study other classes in NCS : 1-additive, 2-additive, 3-additive,... list all antichains in order to be able to simulate the random choice of a NCS model We want to list all antichains and classify them up to n = 6 E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot16- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 16 / 30

25 Saving time : Equivalent families of MSC Example n = 4 These 3 families are equivalent (12)(34) (13)(24) (14)(23) E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot17- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 17 / 30

26 Saving time : Equivalent families of MSC Example n = 4 These 3 families are equivalent (12)(34) (13)(24) (14)(23) Only test one representative of each class of equivalent antichains The number of inequivalent antichains is R(n) The sequence R(n) is A in the OEIS. R(7) was recently computed (Stephen and Yusun 2014) E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot17- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 17 / 30

27 Number of inequivalent antichains n R(n) To answer the question for n = 7, R(7) seconds are needed i.e years The case n = 6 is within reach : 4.5 hours E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot18- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 18 / 30

28 Listing all inequivalent antichains We follow Stephen and Yusun (2014) Generate the different possible types of antichains Antichain type : (k 1,..., k n ) k i = number of a coalitions of size i in the antichain Examples : the type of {13, 14, 23, 24} is (0, 4, 0, 0) the type of {14, 123, 234} is (0, 1, 2, 0) E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot19- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 19 / 30

29 Number of coalitions in an antichain Sperner s theorem : The maximal size of an antichain of 2 [n] is ( ) n n/2 Hence n i=1 k i ( ) n n/2 For n = 3, k 1 + k 2 + k 3 3 For n = 4, k 1 + k 2 + k 3 + k 4 6 For each type, generate all possible antichains and discard the equivalent ones (but count them) E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot20- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 20 / 30

30 Case n = 3 Type Representative # equivalent (1,0,0) {1} 3 (2,0,0) {1, 2} 3 (3,0,0) {1, 2, 3} 1 (0,1,0) {12} 3 (1,1,0) {1, 23} 3 (0,2,0) {13, 23} 3 (0,3,0) {12, 13, 23} 1 (0,0,1) {123} 1 Total trivial cases : empty family (no sufficient coalition) and the family in which all coalitions are sufficient E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot21- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 21 / 30

31 Small savings The set of complementary coalitions forms an antichain For instance, for n = 4, the complementary coalitions of the antichain {12, 23, 134} constitute the antichain {34, 14, 2} When type (k 1, k 2,..., k n 1, 0) has been explored, no need to explore type (k n 1,..., k 2, k 1, 0) E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot22- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 22 / 30

32 Small savings The set of complementary coalitions forms an antichain For instance, for n = 4, the complementary coalitions of the antichain {12, 23, 134} constitute the antichain {34, 14, 2} When type (k 1, k 2,..., k n 1, 0) has been explored, no need to explore type (k n 1,..., k 2, k 1, 0) The antichains involving a singleton can be built using the antichains of 2 [n 1] (counting the equivalent ones is not straightforward) E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot22- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 22 / 30

33 Small savings The set of complementary coalitions forms an antichain For instance, for n = 4, the complementary coalitions of the antichain {12, 23, 134} constitute the antichain {34, 14, 2} When type (k 1, k 2,..., k n 1, 0) has been explored, no need to explore type (k n 1,..., k 2, k 1, 0) The antichains involving a singleton can be built using the antichains of 2 [n 1] (counting the equivalent ones is not straightforward) There is a one-to-one correspondence between families of type (0,..., 0, k i, 0,..., 0) and of type (0,..., 0, ( ) n i ki, 0,..., 0) for instance : {12} yields {13, 23} E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot22- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 22 / 30

34 List of inequivalent antichains for n = 4 Type Representative # eq. (0,0,0,0) {} 1 (0,0,0,1) {1234} 1 (0,0,1,0) {124} 4 (0,0,2,0) {234, 124} 6 (0,0,3,0) {134, 123, 124} 4 (0,0,4,0) {134, 123, 234, 124} 1 (0,1,0,0) {24} 6 (0,1,1,0) {14, 123} 12 (0,1,2,0) {24, 134, 123} 6 (0,2,0,0) {12, 23} 12 {23, 14} 3 (0,2,1,0) {24, 134, 23} 12 (0,3,0,0) {13, 12, 34} 12 {24, 12, 14} 4 {24, 34, 14} 4 E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot23- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 23 / 30

35 Case n = 4 (suite) Type Representative # eq. (0,3,1,0) {13, 34, 23, 124} 4 (0,4,0,0) {24, 12, 13, 34} 3 {24, 12, 14, 23} 12 (0,5,0,0) {24, 12, 14, 13, 34} 6 (0,6,0,0) {24, 12, 14, 34, 23, 13} 1 (1,0,0,0) {1} 4 (1,0,1,0) {234, 1} 4 (1,1,0,0) {14, 2} 12 (1,2,0,0) {13, 34, 2} 12 (1,3,0,0) {24, 34, 23, 1} 4 (2,0,0,0) {4, 3} 6 (2,1,0,0) {4, 23, 1} 6 (3,0,0,0) {4, 2, 1} 4 (4,0,0,0) {4, 2, 3, 1} 1 E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot24- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 24 / 30

36 Number of inequivalent families that cannot be represented by weights and threshold C 2 number and percentage of inequivalent families that can be represented by a 2-additive capacity and not by a 1-additive one C 3 number and percentage of inequivalent families that can be represented by a 3-additive capacity and not by a 2-additive one n R(n) C 2 C (00.00 %) 0 (00.00 %) (00.00 %) 0 (00.00 %) (00.00 %) 0 (00.00 %) (00.00 %) 0 (00.00 %) (10.00 %) 0 (00.00 %) (43.33 %) 0 (00.00 %) (93.19 %) 338 (02.07 %) E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot25- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 25 / 30

37 Number of families that cannot be represented by weights and threshold n D(n) C 2 C (00.00 %) 0 (00.00 %) (00.00 %) 0 (00.00 %) (00.00 %) 0 (00.00 %) (00.00 %) 0 (00.00 %) (10.71 %) 0 (00.00 %) (56.64 %) 0 (00.00 %) (96.88 %) (01.86 %) E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot26- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 26 / 30

38 Comments The expressivity gap between NCS and MR-Sort quickly grows with n A 2-additive capacity is enough up to n = 5 This work allows to sample NCS models in a representative way up to n = 6 E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot27- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 27 / 30

39 Simulation Problem : How to draw a NCS model uniformly at random? E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot28- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 28 / 30

40 Simulation Problem : How to draw a NCS model uniformly at random? Two possible answers : pick an antichain in the list of all inequivalent antichains (with equal probabilities) pick an antichain in the list of all inequivalent antichains (with probability proportional to the number of representatives) These answers are feasible up to n = 6 E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot28- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 28 / 30

41 Simulation Problem : How to draw a NCS model uniformly at random? Two possible answers : pick an antichain in the list of all inequivalent antichains (with equal probabilities) pick an antichain in the list of all inequivalent antichains (with probability proportional to the number of representatives) These answers are feasible up to n = 6 Remark : This is also an issue for drawing an MR-Sort model "uniformly at random" Families of sufficient coalitions representable by weights and thresholds have been enumerated at least up to n = 7 E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot28- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 28 / 30

42 Further questions in guise of a conclusion Have the classes of 2-additively, 3-additively,... representable antichains been studied in another context? Is there a more subtle way of sampling antichains in a representative manner, up to larger n? Is the expressivity gap between NCS and MR-Sort really so large? E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot29- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 29 / 30

43 Expressivity gap between NCS and MR-Sort Generate all Boolean vectors for n Assign them using a NCS rule that is not a MR-Sort rule Learn a MR-Sort model minimizing the number of wrong assignments E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot30- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 30 / 30

44 Expressivity gap between NCS and MR-Sort Generate all Boolean vectors for n Assign them using a NCS rule that is not a MR-Sort rule Learn a MR-Sort model minimizing the number of wrong assignments n D(n) % non-additive 0/1 loss min. max. avg % 1/16 1/16 1/ % 1/32 3/ / % 1/64 8/ /64 Up to n = 6, MR Sort seem able to yield a good approximation of NCS rules E. Ersek, O. Sobrie, V. Mousseau, M. Pirlot30- DA2PL Workshop November 20-21, 2014 Ecole Centrale Paris 30 / 30

Multiattribute preference models with reference points

Multiattribute preference models with reference points Multiattribute preference models with reference points Denis Bouyssou a,b, Thierry Marchant c a CNRS, LAMSADE, UMR 7243, F-75775 Paris Cedex 16, France b Université Paris Dauphine, F-75775 Paris Cedex

More information

Topic: Primal-Dual Algorithms Date: We finished our discussion of randomized rounding and began talking about LP Duality.

Topic: Primal-Dual Algorithms Date: We finished our discussion of randomized rounding and began talking about LP Duality. CS787: Advanced Algorithms Scribe: Amanda Burton, Leah Kluegel Lecturer: Shuchi Chawla Topic: Primal-Dual Algorithms Date: 10-17-07 14.1 Last Time We finished our discussion of randomized rounding and

More information

Reference-based Preferences Aggregation Procedures in Multicriteria Decision Making

Reference-based Preferences Aggregation Procedures in Multicriteria Decision Making Reference-based Preferences Aggregation Procedures in Multicriteria Decision Making Antoine Rolland Laboratoire ERIC - Université Lumière Lyon 2 5 avenue Pierre Mendes-France F-69676 BRON Cedex - FRANCE

More information

Analyzing the correspondence between non-strict and strict outranking relations

Analyzing the correspondence between non-strict and strict outranking relations Analyzing the correspondence between non-strict and strict outranking relations Denis Bouyssou Marc Pirlot CNRS Paris, France FPMs Mons, Belgium ROADEF, Toulouse, 2010 2 Introduction Outranking relations

More information

Lecture 11 October 7, 2013

Lecture 11 October 7, 2013 CS 4: Advanced Algorithms Fall 03 Prof. Jelani Nelson Lecture October 7, 03 Scribe: David Ding Overview In the last lecture we talked about set cover: Sets S,..., S m {,..., n}. S has cost c S. Goal: Cover

More information

MATH 521, WEEK 2: Rational and Real Numbers, Ordered Sets, Countable Sets

MATH 521, WEEK 2: Rational and Real Numbers, Ordered Sets, Countable Sets MATH 521, WEEK 2: Rational and Real Numbers, Ordered Sets, Countable Sets 1 Rational and Real Numbers Recall that a number is rational if it can be written in the form a/b where a, b Z and b 0, and a number

More information

Critical Reading of Optimization Methods for Logical Inference [1]

Critical Reading of Optimization Methods for Logical Inference [1] Critical Reading of Optimization Methods for Logical Inference [1] Undergraduate Research Internship Department of Management Sciences Fall 2007 Supervisor: Dr. Miguel Anjos UNIVERSITY OF WATERLOO Rajesh

More information

A note on the asymmetric part of an outranking relation

A note on the asymmetric part of an outranking relation A note on the asymmetric part of an outranking relation Denis Bouyssou 1 Marc Pirlot 2 19 March 2014 Abstract This note discusses the properties of the asymmetric part of an outranking relation à la ELECTRE.

More information

Lagrangean relaxation

Lagrangean relaxation Lagrangean relaxation Giovanni Righini Corso di Complementi di Ricerca Operativa Joseph Louis de la Grange (Torino 1736 - Paris 1813) Relaxations Given a problem P, such as: minimize z P (x) s.t. x X P

More information

CSE 21 Practice Exam for Midterm 2 Fall 2017

CSE 21 Practice Exam for Midterm 2 Fall 2017 CSE 1 Practice Exam for Midterm Fall 017 These practice problems should help prepare you for the second midterm, which is on monday, November 11 This is longer than the actual exam will be, but good practice

More information

Finding extremal voting games via integer linear programming

Finding extremal voting games via integer linear programming Finding extremal voting games via integer linear programming Sascha Kurz Business mathematics University of Bayreuth sascha.kurz@uni-bayreuth.de Euro 2012 Vilnius Finding extremal voting games via integer

More information

arxiv: v2 [cs.gt] 5 Jun 2012

arxiv: v2 [cs.gt] 5 Jun 2012 arxiv:1204.5213v2 [cs.gt] 5 Jun 2012 Solving Weighted Voting Game Design Problems Optimally: Representations, Synthesis, and Enumeration Bart de Keijzer Tomas B. Klos Yingqian Zhang Abstract We study the

More information

Introduction to Statistical Learning Theory

Introduction to Statistical Learning Theory Introduction to Statistical Learning Theory Definition Reminder: We are given m samples {(x i, y i )} m i=1 Dm and a hypothesis space H and we wish to return h H minimizing L D (h) = E[l(h(x), y)]. Problem

More information

8 Knapsack Problem 8.1 (Knapsack)

8 Knapsack Problem 8.1 (Knapsack) 8 Knapsack In Chapter 1 we mentioned that some NP-hard optimization problems allow approximability to any required degree. In this chapter, we will formalize this notion and will show that the knapsack

More information

An axiomatic approach to ELECTRE TRI 1

An axiomatic approach to ELECTRE TRI 1 An axiomatic approach to ELECTRE TRI 1 Denis Bouyssou 2 CNRS LAMSADE Thierry Marchant 3 Ghent University 22 April 2004 Prepared for the Brest Proceedings Revised following the comments by Thierry 1 This

More information

On the Chacteristic Numbers of Voting Games

On the Chacteristic Numbers of Voting Games On the Chacteristic Numbers of Voting Games MATHIEU MARTIN THEMA, Departments of Economics Université de Cergy Pontoise, 33 Boulevard du Port, 95011 Cergy Pontoise cedex, France. e-mail: mathieu.martin@eco.u-cergy.fr

More information

6.842 Randomness and Computation Lecture 5

6.842 Randomness and Computation Lecture 5 6.842 Randomness and Computation 2012-02-22 Lecture 5 Lecturer: Ronitt Rubinfeld Scribe: Michael Forbes 1 Overview Today we will define the notion of a pairwise independent hash function, and discuss its

More information

Solutions Final Exam May. 14, 2014

Solutions Final Exam May. 14, 2014 Solutions Final Exam May. 14, 2014 1. (a) (10 points) State the formal definition of a Cauchy sequence of real numbers. A sequence, {a n } n N, of real numbers, is Cauchy if and only if for every ɛ > 0,

More information

Discrete Mathematics for CS Spring 2005 Clancy/Wagner Notes 25. Minesweeper. Optimal play in Minesweeper

Discrete Mathematics for CS Spring 2005 Clancy/Wagner Notes 25. Minesweeper. Optimal play in Minesweeper CS 70 Discrete Mathematics for CS Spring 2005 Clancy/Wagner Notes 25 Minesweeper Our final application of probability is to Minesweeper. We begin by discussing how to play the game optimally; this is probably

More information

Multiagent Systems Motivation. Multiagent Systems Terminology Basics Shapley value Representation. 10.

Multiagent Systems Motivation. Multiagent Systems Terminology Basics Shapley value Representation. 10. Multiagent Systems July 2, 2014 10. Coalition Formation Multiagent Systems 10. Coalition Formation B. Nebel, C. Becker-Asano, S. Wöl Albert-Ludwigs-Universität Freiburg July 2, 2014 10.1 Motivation 10.2

More information

10.1 The Formal Model

10.1 The Formal Model 67577 Intro. to Machine Learning Fall semester, 2008/9 Lecture 10: The Formal (PAC) Learning Model Lecturer: Amnon Shashua Scribe: Amnon Shashua 1 We have see so far algorithms that explicitly estimate

More information

Hierarchical Simple Games: Weightedness and Structural Characterization

Hierarchical Simple Games: Weightedness and Structural Characterization Hierarchical Simple Games: Weightedness and Structural Characterization Tatiana Gvozdeva, Ali Hameed and Arkadii Slinko Department of Mathematics, The University of Auckland, Private Bag 92019, Auckland,

More information

2.1 Definition and graphical representation for games with up to three players

2.1 Definition and graphical representation for games with up to three players Lecture 2 The Core Let us assume that we have a TU game (N, v) and that we want to form the grand coalition. We model cooperation between all the agents in N and we focus on the sharing problem: how to

More information

- Well-characterized problems, min-max relations, approximate certificates. - LP problems in the standard form, primal and dual linear programs

- Well-characterized problems, min-max relations, approximate certificates. - LP problems in the standard form, primal and dual linear programs LP-Duality ( Approximation Algorithms by V. Vazirani, Chapter 12) - Well-characterized problems, min-max relations, approximate certificates - LP problems in the standard form, primal and dual linear programs

More information

Sums and products. Carl Pomerance, Dartmouth College Hanover, New Hampshire, USA

Sums and products. Carl Pomerance, Dartmouth College Hanover, New Hampshire, USA Sums and products Carl Pomerance, Dartmouth College Hanover, New Hampshire, USA International Number Theory Conference in Memory of Alf van der Poorten, AM 12 16 March, 2012 CARMA, the University of Newcastle

More information

A partial characterization of the core in Bertrand oligopoly TU-games with transferable technologies

A partial characterization of the core in Bertrand oligopoly TU-games with transferable technologies A partial characterization of the core in Bertrand oligopoly TU-games with transferable technologies Aymeric Lardon To cite this version: Aymeric Lardon. A partial characterization of the core in Bertrand

More information

Coarse-grain Model of the SNAP Scheduling Problem: Problem specification description and Pseudo-boolean encoding

Coarse-grain Model of the SNAP Scheduling Problem: Problem specification description and Pseudo-boolean encoding Coarse-grain Model of the SNAP Scheduling Problem: Problem specification description and Pseudo-boolean encoding Geoff Pike, Donghan Kim and Alejandro Bugacov July 11, 2003 1 1 Problem Specification The

More information

The possible and the necessary for multiple criteria group decision

The possible and the necessary for multiple criteria group decision The possible and the necessary for multiple criteria group decision Salvatore Greco 1, Vincent Mousseau 2 and Roman S lowiński 3 1 Faculty of Economics, University of Catania, Italy, salgreco@unict.it,

More information

A characterization of the 2-additive Choquet integral

A characterization of the 2-additive Choquet integral A characterization of the 2-additive Choquet integral Brice Mayag Thales R & T University of Paris I brice.mayag@thalesgroup.com Michel Grabisch University of Paris I Centre d Economie de la Sorbonne 106-112

More information

Math489/889 Stochastic Processes and Advanced Mathematical Finance Solutions for Homework 7

Math489/889 Stochastic Processes and Advanced Mathematical Finance Solutions for Homework 7 Math489/889 Stochastic Processes and Advanced Mathematical Finance Solutions for Homework 7 Steve Dunbar Due Mon, November 2, 2009. Time to review all of the information we have about coin-tossing fortunes

More information

Sums and products. Carl Pomerance, Dartmouth College Hanover, New Hampshire, USA. Providence College Math/CS Colloquium April 2, 2014

Sums and products. Carl Pomerance, Dartmouth College Hanover, New Hampshire, USA. Providence College Math/CS Colloquium April 2, 2014 Sums and products Carl Pomerance, Dartmouth College Hanover, New Hampshire, USA Providence College Math/CS Colloquium April 2, 2014 Let s begin with products. Take the N N multiplication table. It has

More information

Learning Decision Trees

Learning Decision Trees Learning Decision Trees CS194-10 Fall 2011 Lecture 8 CS194-10 Fall 2011 Lecture 8 1 Outline Decision tree models Tree construction Tree pruning Continuous input features CS194-10 Fall 2011 Lecture 8 2

More information

Maximum union-free subfamilies

Maximum union-free subfamilies Maximum union-free subfamilies Jacob Fox Choongbum Lee Benny Sudakov Abstract An old problem of Moser asks: how large of a union-free subfamily does every family of m sets have? A family of sets is called

More information

TEMPERATURE THEORY AND THE THERMOSTATIC STRATEGY

TEMPERATURE THEORY AND THE THERMOSTATIC STRATEGY TEMPERATURE THEORY AND THE THERMOSTATIC STRATEGY KAREN YE Abstract. In this paper, we differentiate between cold games, which are easier to analyze and play, and hot games, much more difficult in terms

More information

Lecture 20: LP Relaxation and Approximation Algorithms. 1 Introduction. 2 Vertex Cover problem. CSCI-B609: A Theorist s Toolkit, Fall 2016 Nov 8

Lecture 20: LP Relaxation and Approximation Algorithms. 1 Introduction. 2 Vertex Cover problem. CSCI-B609: A Theorist s Toolkit, Fall 2016 Nov 8 CSCI-B609: A Theorist s Toolkit, Fall 2016 Nov 8 Lecture 20: LP Relaxation and Approximation Algorithms Lecturer: Yuan Zhou Scribe: Syed Mahbub Hafiz 1 Introduction When variables of constraints of an

More information

F. T. HOWARD AND CURTIS COOPER

F. T. HOWARD AND CURTIS COOPER SOME IDENTITIES FOR r-fibonacci NUMBERS F. T. HOWARD AND CURTIS COOPER Abstract. Let r 1 be an integer. The r-generalized Fibonacci sequence {G n} is defined as 0, if 0 n < r 1; G n = 1, if n = r 1; G

More information

Enumeration Schemes for Words Avoiding Permutations

Enumeration Schemes for Words Avoiding Permutations Enumeration Schemes for Words Avoiding Permutations Lara Pudwell November 27, 2007 Abstract The enumeration of permutation classes has been accomplished with a variety of techniques. One wide-reaching

More information

Random sets. Distributions, capacities and their applications. Ilya Molchanov. University of Bern, Switzerland

Random sets. Distributions, capacities and their applications. Ilya Molchanov. University of Bern, Switzerland Random sets Distributions, capacities and their applications Ilya Molchanov University of Bern, Switzerland Molchanov Random sets - Lecture 1. Winter School Sandbjerg, Jan 2007 1 E = R d ) Definitions

More information

Lecture 6,7 (Sept 27 and 29, 2011 ): Bin Packing, MAX-SAT

Lecture 6,7 (Sept 27 and 29, 2011 ): Bin Packing, MAX-SAT ,7 CMPUT 675: Approximation Algorithms Fall 2011 Lecture 6,7 (Sept 27 and 29, 2011 ): Bin Pacing, MAX-SAT Lecturer: Mohammad R. Salavatipour Scribe: Weitian Tong 6.1 Bin Pacing Problem Recall the bin pacing

More information

G δ ideals of compact sets

G δ ideals of compact sets J. Eur. Math. Soc. 13, 853 882 c European Mathematical Society 2011 DOI 10.4171/JEMS/268 Sławomir Solecki G δ ideals of compact sets Received January 1, 2008 and in revised form January 2, 2009 Abstract.

More information

On Antichains in Product Posets

On Antichains in Product Posets On Antichains in Product Posets Sergei L. Bezrukov Department of Math and Computer Science University of Wisconsin - Superior Superior, WI 54880, USA sb@mcs.uwsuper.edu Ian T. Roberts School of Engineering

More information

Monotone Submodular Maximization over a Matroid

Monotone Submodular Maximization over a Matroid Monotone Submodular Maximization over a Matroid Yuval Filmus January 31, 2013 Abstract In this talk, we survey some recent results on monotone submodular maximization over a matroid. The survey does not

More information

Axioms for the Real Number System

Axioms for the Real Number System Axioms for the Real Number System Math 361 Fall 2003 Page 1 of 9 The Real Number System The real number system consists of four parts: 1. A set (R). We will call the elements of this set real numbers,

More information

Ordered categories and additive conjoint measurement on connected sets

Ordered categories and additive conjoint measurement on connected sets Ordered categories and additive conjoint measurement on connected sets D. Bouyssou a, T. Marchant b a CNRS - LAMSADE, Université Paris Dauphine, F-75775 Paris Cedex 16, France b Ghent University, Dunantlaan

More information

On the Generation of Circuits and Minimal Forbidden Sets

On the Generation of Circuits and Minimal Forbidden Sets Mathematical Programming manuscript No. (will be inserted by the editor) Frederik Stork Marc Uetz On the Generation of Circuits and Minimal Forbidden Sets January 31, 2004 Abstract We present several complexity

More information

COMPUTATIONAL LEARNING THEORY

COMPUTATIONAL LEARNING THEORY COMPUTATIONAL LEARNING THEORY XIAOXU LI Abstract. This paper starts with basic concepts of computational learning theory and moves on with examples in monomials and learning rays to the final discussion

More information

Math 564 Homework 1. Solutions.

Math 564 Homework 1. Solutions. Math 564 Homework 1. Solutions. Problem 1. Prove Proposition 0.2.2. A guide to this problem: start with the open set S = (a, b), for example. First assume that a >, and show that the number a has the properties

More information

Stephen Scott.

Stephen Scott. 1 / 35 (Adapted from Ethem Alpaydin and Tom Mitchell) sscott@cse.unl.edu In Homework 1, you are (supposedly) 1 Choosing a data set 2 Extracting a test set of size > 30 3 Building a tree on the training

More information

Secret Sharing. Qi Chen. December 14, 2015

Secret Sharing. Qi Chen. December 14, 2015 Secret Sharing Qi Chen December 14, 2015 What is secret sharing? A dealer: know the secret S and distribute the shares of S to each party A set of n parties P n {p 1,, p n }: each party owns a share Authorized

More information

ON THE THREE-ROWED CHOMP. Andries E. Brouwer Department of Mathematics, Technical University Eindhoven, P.O. Box 513, 5600MB Eindhoven, Netherlands

ON THE THREE-ROWED CHOMP. Andries E. Brouwer Department of Mathematics, Technical University Eindhoven, P.O. Box 513, 5600MB Eindhoven, Netherlands ON THE THREE-ROWED CHOMP Andries E. Brouwer Department of Mathematics, Technical University Eindhoven, P.O. Box 513, 5600MB Eindhoven, Netherlands Andries.Brouwer@cwi.nl Gábor Horváth Department of Algebra

More information

Dual fitting approximation for Set Cover, and Primal Dual approximation for Set Cover

Dual fitting approximation for Set Cover, and Primal Dual approximation for Set Cover duality 1 Dual fitting approximation for Set Cover, and Primal Dual approximation for Set Cover Guy Kortsarz duality 2 The set cover problem with uniform costs Input: A universe U and a collection of subsets

More information

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 6: Provable Approximation via Linear Programming

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 6: Provable Approximation via Linear Programming princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 6: Provable Approximation via Linear Programming Lecturer: Matt Weinberg Scribe: Sanjeev Arora One of the running themes in this course is

More information

The Probabilistic Method

The Probabilistic Method The Probabilistic Method In Graph Theory Ehssan Khanmohammadi Department of Mathematics The Pennsylvania State University February 25, 2010 What do we mean by the probabilistic method? Why use this method?

More information

CS 350 Algorithms and Complexity

CS 350 Algorithms and Complexity CS 350 Algorithms and Complexity Winter 2019 Lecture 15: Limitations of Algorithmic Power Introduction to complexity theory Andrew P. Black Department of Computer Science Portland State University Lower

More information

CS 350 Algorithms and Complexity

CS 350 Algorithms and Complexity 1 CS 350 Algorithms and Complexity Fall 2015 Lecture 15: Limitations of Algorithmic Power Introduction to complexity theory Andrew P. Black Department of Computer Science Portland State University Lower

More information

Lecture 2. MATH3220 Operations Research and Logistics Jan. 8, Pan Li The Chinese University of Hong Kong. Integer Programming Formulations

Lecture 2. MATH3220 Operations Research and Logistics Jan. 8, Pan Li The Chinese University of Hong Kong. Integer Programming Formulations Lecture 2 MATH3220 Operations Research and Logistics Jan. 8, 2015 Pan Li The Chinese University of Hong Kong 2.1 Agenda 1 2 3 2.2 : a linear program plus the additional constraints that some or all of

More information

Assignment 1: From the Definition of Convexity to Helley Theorem

Assignment 1: From the Definition of Convexity to Helley Theorem Assignment 1: From the Definition of Convexity to Helley Theorem Exercise 1 Mark in the following list the sets which are convex: 1. {x R 2 : x 1 + i 2 x 2 1, i = 1,..., 10} 2. {x R 2 : x 2 1 + 2ix 1x

More information

The core of voting games with externalities

The core of voting games with externalities Submitted to Games. Pages 1-8. OPEN ACCESS games ISSN 2073-4336 www.mdpi.com/journal/games Article The core of voting games with externalities LARDON Aymeric 1 1 University of Saint-Etienne, CNRS UMR 5824

More information

AN EXTENSION OF THE PROBABILITY LOGIC LP P 2. Tatjana Stojanović 1, Ana Kaplarević-Mališić 1 and Zoran Ognjanović 2

AN EXTENSION OF THE PROBABILITY LOGIC LP P 2. Tatjana Stojanović 1, Ana Kaplarević-Mališić 1 and Zoran Ognjanović 2 45 Kragujevac J. Math. 33 (2010) 45 62. AN EXTENSION OF THE PROBABILITY LOGIC LP P 2 Tatjana Stojanović 1, Ana Kaplarević-Mališić 1 and Zoran Ognjanović 2 1 University of Kragujevac, Faculty of Science,

More information

Heuristics for The Whitehead Minimization Problem

Heuristics for The Whitehead Minimization Problem Heuristics for The Whitehead Minimization Problem R.M. Haralick, A.D. Miasnikov and A.G. Myasnikov November 11, 2004 Abstract In this paper we discuss several heuristic strategies which allow one to solve

More information

Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems

Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems 2382 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL 59, NO 5, MAY 2011 Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems Holger Boche, Fellow, IEEE,

More information

CO759: Algorithmic Game Theory Spring 2015

CO759: Algorithmic Game Theory Spring 2015 CO759: Algorithmic Game Theory Spring 2015 Instructor: Chaitanya Swamy Assignment 1 Due: By Jun 25, 2015 You may use anything proved in class directly. I will maintain a FAQ about the assignment on the

More information

1 Primals and Duals: Zero Sum Games

1 Primals and Duals: Zero Sum Games CS 124 Section #11 Zero Sum Games; NP Completeness 4/15/17 1 Primals and Duals: Zero Sum Games We can represent various situations of conflict in life in terms of matrix games. For example, the game shown

More information

Phase Transitions and Satisfiability Threshold

Phase Transitions and Satisfiability Threshold Algorithms Seminar 2001 2002, F. Chyzak (ed.), INRIA, (200, pp. 167 172. Available online at the URL http://algo.inria.fr/seminars/. Phase Transitions and Satisfiability Threshold Olivier Dubois (a) and

More information

A LITTLE REAL ANALYSIS AND TOPOLOGY

A LITTLE REAL ANALYSIS AND TOPOLOGY A LITTLE REAL ANALYSIS AND TOPOLOGY 1. NOTATION Before we begin some notational definitions are useful. (1) Z = {, 3, 2, 1, 0, 1, 2, 3, }is the set of integers. (2) Q = { a b : aεz, bεz {0}} is the set

More information

UC Berkeley Department of Electrical Engineering and Computer Science. EE 126: Probablity and Random Processes. Problem Set 3: Solutions Fall 2007

UC Berkeley Department of Electrical Engineering and Computer Science. EE 126: Probablity and Random Processes. Problem Set 3: Solutions Fall 2007 UC Berkeley Department of Electrical Engineering and Computer Science EE 126: Probablity and Random Processes Problem Set 3: Solutions Fall 2007 Issued: Thursday, September 13, 2007 Due: Friday, September

More information

NP-Complete Problems. More reductions

NP-Complete Problems. More reductions NP-Complete Problems More reductions Definitions P: problems that can be solved in polynomial time (typically in n, size of input) on a deterministic Turing machine Any normal computer simulates a DTM

More information

Isomorphisms between pattern classes

Isomorphisms between pattern classes Journal of Combinatorics olume 0, Number 0, 1 8, 0000 Isomorphisms between pattern classes M. H. Albert, M. D. Atkinson and Anders Claesson Isomorphisms φ : A B between pattern classes are considered.

More information

A dyadic endomorphism which is Bernoulli but not standard

A dyadic endomorphism which is Bernoulli but not standard A dyadic endomorphism which is Bernoulli but not standard Christopher Hoffman Daniel Rudolph November 4, 2005 Abstract Any measure preserving endomorphism generates both a decreasing sequence of σ-algebras

More information

ILP Formulations for the Lazy Bureaucrat Problem

ILP Formulations for the Lazy Bureaucrat Problem the the PSL, Université Paris-Dauphine, 75775 Paris Cedex 16, France, CNRS, LAMSADE UMR 7243 Department of Statistics and Operations Research, University of Vienna, Vienna, Austria EURO 2015, 12-15 July,

More information

Provable Approximation via Linear Programming

Provable Approximation via Linear Programming Chapter 7 Provable Approximation via Linear Programming One of the running themes in this course is the notion of approximate solutions. Of course, this notion is tossed around a lot in applied work: whenever

More information

Knowledge Discovery in Data: Overview. Naïve Bayesian Classification. .. Spring 2009 CSC 466: Knowledge Discovery from Data Alexander Dekhtyar..

Knowledge Discovery in Data: Overview. Naïve Bayesian Classification. .. Spring 2009 CSC 466: Knowledge Discovery from Data Alexander Dekhtyar.. Spring 2009 CSC 466: Knowledge Discovery from Data Alexander Dekhtyar Knowledge Discovery in Data: Naïve Bayes Overview Naïve Bayes methodology refers to a probabilistic approach to information discovery

More information

Lecture 13 March 7, 2017

Lecture 13 March 7, 2017 CS 224: Advanced Algorithms Spring 2017 Prof. Jelani Nelson Lecture 13 March 7, 2017 Scribe: Hongyao Ma Today PTAS/FPTAS/FPRAS examples PTAS: knapsack FPTAS: knapsack FPRAS: DNF counting Approximation

More information

Expander Construction in VNC 1

Expander Construction in VNC 1 Expander Construction in VNC 1 Sam Buss joint work with Valentine Kabanets, Antonina Kolokolova & Michal Koucký Prague Workshop on Bounded Arithmetic November 2-3, 2017 Talk outline I. Combinatorial construction

More information

Misère canonical forms of partizan games

Misère canonical forms of partizan games Games of No Chance 4 MSRI Publications Volume 63, 2015 Misère canonical forms of partizan games AARON N. SIEGEL We show that partizan games admit canonical forms in misère play. The proof is a synthesis

More information

Lecture 5: The Principle of Deferred Decisions. Chernoff Bounds

Lecture 5: The Principle of Deferred Decisions. Chernoff Bounds Randomized Algorithms Lecture 5: The Principle of Deferred Decisions. Chernoff Bounds Sotiris Nikoletseas Associate Professor CEID - ETY Course 2013-2014 Sotiris Nikoletseas, Associate Professor Randomized

More information

Convex Optimization and Support Vector Machine

Convex Optimization and Support Vector Machine Convex Optimization and Support Vector Machine Problem 0. Consider a two-class classification problem. The training data is L n = {(x 1, t 1 ),..., (x n, t n )}, where each t i { 1, 1} and x i R p. We

More information

CS229T/STATS231: Statistical Learning Theory. Lecturer: Tengyu Ma Lecture 11 Scribe: Jongho Kim, Jamie Kang October 29th, 2018

CS229T/STATS231: Statistical Learning Theory. Lecturer: Tengyu Ma Lecture 11 Scribe: Jongho Kim, Jamie Kang October 29th, 2018 CS229T/STATS231: Statistical Learning Theory Lecturer: Tengyu Ma Lecture 11 Scribe: Jongho Kim, Jamie Kang October 29th, 2018 1 Overview This lecture mainly covers Recall the statistical theory of GANs

More information

CS Communication Complexity: Applications and New Directions

CS Communication Complexity: Applications and New Directions CS 2429 - Communication Complexity: Applications and New Directions Lecturer: Toniann Pitassi 1 Introduction In this course we will define the basic two-party model of communication, as introduced in the

More information

Notes for Lecture 2. Statement of the PCP Theorem and Constraint Satisfaction

Notes for Lecture 2. Statement of the PCP Theorem and Constraint Satisfaction U.C. Berkeley Handout N2 CS294: PCP and Hardness of Approximation January 23, 2006 Professor Luca Trevisan Scribe: Luca Trevisan Notes for Lecture 2 These notes are based on my survey paper [5]. L.T. Statement

More information

An Optimization-Based Heuristic for the Split Delivery Vehicle Routing Problem

An Optimization-Based Heuristic for the Split Delivery Vehicle Routing Problem An Optimization-Based Heuristic for the Split Delivery Vehicle Routing Problem Claudia Archetti (1) Martin W.P. Savelsbergh (2) M. Grazia Speranza (1) (1) University of Brescia, Department of Quantitative

More information

AN ORDINAL SOLUTION TO BARGAINING PROBLEMS WITH MANY PLAYERS

AN ORDINAL SOLUTION TO BARGAINING PROBLEMS WITH MANY PLAYERS AN ORDINAL SOLUTION TO BARGAINING PROBLEMS WITH MANY PLAYERS ZVI SAFRA AND DOV SAMET Abstract. Shapley proved the existence of an ordinal, symmetric and efficient solution for three-player bargaining problems.

More information

Partition of Integers into Distinct Summands with Upper Bounds. Partition of Integers into Even Summands. An Example

Partition of Integers into Distinct Summands with Upper Bounds. Partition of Integers into Even Summands. An Example Partition of Integers into Even Summands We ask for the number of partitions of m Z + into positive even integers The desired number is the coefficient of x m in + x + x 4 + ) + x 4 + x 8 + ) + x 6 + x

More information

Sums and products. Carl Pomerance, Dartmouth College Hanover, New Hampshire, USA. Dartmouth Mathematics Society May 16, 2012

Sums and products. Carl Pomerance, Dartmouth College Hanover, New Hampshire, USA. Dartmouth Mathematics Society May 16, 2012 Sums and products Carl Pomerance, Dartmouth College Hanover, New Hampshire, USA Dartmouth Mathematics Society May 16, 2012 Based on joint work with P. Kurlberg, J. C. Lagarias, & A. Schinzel Let s begin

More information

Nonlinear Optimization: The art of modeling

Nonlinear Optimization: The art of modeling Nonlinear Optimization: The art of modeling INSEAD, Spring 2006 Jean-Philippe Vert Ecole des Mines de Paris Jean-Philippe.Vert@mines.org Nonlinear optimization c 2003-2006 Jean-Philippe Vert, (Jean-Philippe.Vert@mines.org)

More information

Modeling Uncertainty in Linear Programs: Stochastic and Robust Linear Programming

Modeling Uncertainty in Linear Programs: Stochastic and Robust Linear Programming Modeling Uncertainty in Linear Programs: Stochastic and Robust Programming DGA PhD Student - PhD Thesis EDF-INRIA 10 November 2011 and motivations In real life, Linear Programs are uncertain for several

More information

A BOREL SOLUTION TO THE HORN-TARSKI PROBLEM. MSC 2000: 03E05, 03E20, 06A10 Keywords: Chain Conditions, Boolean Algebras.

A BOREL SOLUTION TO THE HORN-TARSKI PROBLEM. MSC 2000: 03E05, 03E20, 06A10 Keywords: Chain Conditions, Boolean Algebras. A BOREL SOLUTION TO THE HORN-TARSKI PROBLEM STEVO TODORCEVIC Abstract. We describe a Borel poset satisfying the σ-finite chain condition but failing to satisfy the σ-bounded chain condition. MSC 2000:

More information

Revenue Maximization in a Cloud Federation

Revenue Maximization in a Cloud Federation Revenue Maximization in a Cloud Federation Makhlouf Hadji and Djamal Zeghlache September 14th, 2015 IRT SystemX/ Telecom SudParis Makhlouf Hadji Outline of the presentation 01 Introduction 02 03 04 05

More information

Lecture 1: An introduction to probability theory

Lecture 1: An introduction to probability theory Econ 514: Probability and Statistics Lecture 1: An introduction to probability theory Random Experiments Random experiment: Experiment/phenomenon/action/mechanism with outcome that is not (fully) predictable.

More information

The Core can be accessed in a Bounded Number of Steps

The Core can be accessed in a Bounded Number of Steps The Core can be accessed in a Bounded Number of Steps by László Á. KÓCZY Econometrics Center for Economic Studies Discussions Paper Series (DPS) 02.18 http://www.econ.kuleuven.be/ces/discussionpapers/default.htm

More information

Destination Math California Intervention

Destination Math California Intervention Destination Math California Intervention correlated to the California Intervention 4 7 s McDougal Littell Riverdeep STANDARDS MAPS for a Mathematics Intervention Program (Grades 4-7) The standards maps

More information

A proof of a partition conjecture of Bateman and Erdős

A proof of a partition conjecture of Bateman and Erdős proof of a partition conjecture of Bateman and Erdős Jason P. Bell Department of Mathematics University of California, San Diego La Jolla C, 92093-0112. US jbell@math.ucsd.edu 1 Proposed Running Head:

More information

arxiv:cs/ v1 [cs.it] 15 Sep 2005

arxiv:cs/ v1 [cs.it] 15 Sep 2005 On Hats and other Covers (Extended Summary) arxiv:cs/0509045v1 [cs.it] 15 Sep 2005 Hendrik W. Lenstra Gadiel Seroussi Abstract. We study a game puzzle that has enjoyed recent popularity among mathematicians,

More information

Ahlswede Khachatrian Theorems: Weighted, Infinite, and Hamming

Ahlswede Khachatrian Theorems: Weighted, Infinite, and Hamming Ahlswede Khachatrian Theorems: Weighted, Infinite, and Hamming Yuval Filmus April 4, 2017 Abstract The seminal complete intersection theorem of Ahlswede and Khachatrian gives the maximum cardinality of

More information

Tutorial on Groups of finite Morley rank

Tutorial on Groups of finite Morley rank Tutorial on Groups of finite Morley rank adeloro@math.rutgers.edu Manchester, 14-18 July 2008 First tutorial Groups of finite Morley rank first arose in a very model-theoretic context, the study of ℵ 1

More information

Discrete Optimization

Discrete Optimization Prof. Friedrich Eisenbrand Martin Niemeier Due Date: April 15, 2010 Discussions: March 25, April 01 Discrete Optimization Spring 2010 s 3 You can hand in written solutions for up to two of the exercises

More information

Tutorial on Axiomatic Set Theory. Javier R. Movellan

Tutorial on Axiomatic Set Theory. Javier R. Movellan Tutorial on Axiomatic Set Theory Javier R. Movellan Intuitively we think of sets as collections of elements. The crucial part of this intuitive concept is that we are willing to treat sets as entities

More information

Mathematical Olympiad for Girls

Mathematical Olympiad for Girls UKMT UKMT UKMT United Kingdom Mathematics Trust Mathematical Olympiad for Girls Organised by the United Kingdom Mathematics Trust These are polished solutions and do not illustrate the process of failed

More information

Exact Bounds on Sample Variance of Interval Data

Exact Bounds on Sample Variance of Interval Data University of Texas at El Paso DigitalCommons@UTEP Departmental Technical Reports (CS) Department of Computer Science 3-1-2002 Exact Bounds on Sample Variance of Interval Data Scott Ferson Lev Ginzburg

More information

Measures and Measure Spaces

Measures and Measure Spaces Chapter 2 Measures and Measure Spaces In summarizing the flaws of the Riemann integral we can focus on two main points: 1) Many nice functions are not Riemann integrable. 2) The Riemann integral does not

More information