Ranking and selection problem with 1,016,127 systems. requiring 95% probability of correct selection. solved in less than 40 minutes
|
|
- Molly Richards
- 5 years ago
- Views:
Transcription
1 Ranking and selection problem with 1,016,127 systems requiring 95% probability of correct selection solved in less than 40 minutes with 600 parallel cores
2 with near-linear scaling.. Wallclock time (sec) 10 4 Perfect scaling Actual performance Number of cores
3 and High utilization of computing budget
4 Ranking and Selection in a High Performance Computing Environment Eric Cao Ni Susan R. Hunter Shane G. Henderson School of Operations Research and Information Engineering, Cornell University School of Industrial Engineering, Purdue University Supported by NSF grant CMMI and Extreme Science and Engineering Discovery Environment (XSEDE), NSF grant OCI Winter Simulation Conference Washington, DC, December 9, 2013
5 1 Introduction 2 Considerations for parallel procedures 3 The Algorithm 4 Summary Introduction Considerations for parallel procedures The Algorithm Summary 1/26
6 1 Introduction 2 Considerations for parallel procedures 3 The Algorithm 4 Summary Introduction Considerations for parallel procedures The Algorithm Summary 2/26
7 Parallelism in simulation Two main research areas related to exploiting parallelism in discrete-event simulation Many processors on a single replication (Fujimoto, 2000) Many processors on independent replications (Heidelberger, 1988; Glynn and Heidelberger, 1990, 1991) Introduction Considerations for parallel procedures The Algorithm Summary 3/26
8 Ranking and Selection (R&S) max i S y(i) = E[Y (i; ξ)] Optimize a function through a stochastic simulation Function evaluated with error Feasible region is finite: K = S <. No assumption on topology of S. Want to find the best system i S with a certain degree of statistical confidence: P[select system j : g(j) g(i) δ, i S] 1 α Introduction Considerations for parallel procedures The Algorithm Summary 4/26
9 Parallelism in simulation optimization Many existing simulation optimization (in particular, R&S) algorithms are sequential in nature (Paulson, 1964; Fabian, 1974; Kim and Nelson, 2001, 2006; Hong, 2006). Past studies on parallel ranking and selection procedures include Chen (2005) and Luo and Hong (2011). Luo et al. (2013) proved an asymptotically valid parallel ranking and selection procedure. We propose a parallel algorithm for R&S that is Valid (maintains a required probability of correct selection) Efficient (speeds up as more cores are employed) Introduction Considerations for parallel procedures The Algorithm Summary 5/26
10 Assumptions on simulation output Y ijk : the output of the kth replication of simulating System i on core j, where 1 i S, 1 j W, k = 1, 2,... T ijk : the (random) completion time The cores produce i.i.d. replicates of (Y i, T i ) for each i S. Y i is marginally normally distributed with finite mean µ i and finite (and possibly unknown) variance σ 2 i. E[T i ] < for all i S. {Y i : 1 i S } can be correlated: possible to use Common Random Numbers (CRN). Introduction Considerations for parallel procedures The Algorithm Summary 6/26
11 The computing environment (1) A pre-specified, fixed number of cores are always available and do not fail or suddenly become unavailable; (2) The cores are identical and capable of message-passing. (3) Communication between cores is nearly instantaneous; (4) Messages join a queue for processing by the receiving core and are never lost. We implemented our algorithm in C/C++ using Message Passing Interface (MPI), tested on Extreme Science and Engineering Discovery Environment (XSEDE) s Lonestar cluster. Introduction Considerations for parallel procedures The Algorithm Summary 7/26
12 A simple master-worker framework One core is designated the master and the others are workers The master core monitors the progress of the algorithm and distributes work to workers Worker cores produce simulation replications according to the master s instruction. Each worker only exchanges information with the master Source: Hadoop Illuminated, M Kerzner and S Maniyam Introduction Considerations for parallel procedures The Algorithm Summary 8/26
13 1 Introduction 2 Considerations for parallel procedures 3 The Algorithm 4 Summary Introduction Considerations for parallel procedures The Algorithm Summary 9/26
14 Naive parallellism does not work Example: 1 system, 2 workers. Worker j produces i.i.d. replications ((Y j1, T j1 ), (Y j2, T j2 ),...) Y j is (marginally) { Normal(0, 1). 1 if Yjk < 0, T jk = 2 if Y jk 0. Let (Y 1, T 1 ) be the outcome of the first replication completed. P(Y 11 < 0, Y 21 < 0) }{{} Y 1 <0,T 1 =1 = P(Y 11 0, Y 21 < 0) }{{} Y 1 <0,T 1 =1 Y 1 is NOT normal, and E[Y 1 ] 0! = P(Y 11 < 0, Y 21 0) }{{} Y 1 <0,T 1 =1 = P(Y 11 0, Y 21 0) = 1/4. }{{} Y 1 0,T 1 =2 Introduction Considerations for parallel procedures The Algorithm Summary 9/26
15 Naive parallellism does not work In general, the set of replications that have completed by a fixed time may not be i.i.d. with the correct distribution (Heidelberger, 1988; Glynn and Heidelberger, 1990, 1991). Solution: Use estimators based on a fixed number of replications in a random completion time, in a pre-determined order. Introduction Considerations for parallel procedures The Algorithm Summary 10/26
16 Naive parallellism does not work T 1 T 2 T 3 Figure 1: An illustration of the simulation results collected on Master. Notice that at T 2, a valid estimator uses only the output from replication 1. Introduction Considerations for parallel procedures The Algorithm Summary 11/26
17 Screening can be expensive In sequential R&S procedures, screening is often pairwise and periodic: Each system is compared with all other surviving system after one (or a few) additional replication. This may prove problematic in a parallel setting: With multiple workers, the generation of replications are much faster. In contrast, screening may become too much work for any single core. Introduction Considerations for parallel procedures The Algorithm Summary 12/26
18 Don t screen all pairs Systems Systems Within-core screening Best of master core Figure 2: Screening on the Master Solution 1: Distribute screening among workers. Solution 2: Perform a subset of pairwise screens. Introduction Considerations for parallel procedures The Algorithm Summary 13/26
19 Don t screen all pairs Systems Systems Core 1 10 Systems Systems Core 2 Core 3 40 Within-core screening Best of master core 40 Core 4 Within-core screening Between-core screening Best of each core Core 5 Figure 3: Screening on the Master Figure 4: Solution 1: Distribute screening to workers. Solution 2: Perform a subset of pairwise screens. Screening on the Workers Introduction Considerations for parallel procedures The Algorithm Summary 14/26
20 Don t screen all pairs Solution 2: Perform a subset of pairwise screens. Proposition 1 The statistical guarantee is preserved if some pairs are dropped from screening, if such guarantee is based on the Bonferroni argument P(ICS) K 1 i=1 P(A ik ) where A ik is the event that some inferior system i incorrectly eliminates the best system K. Thus, each worker may only screen among the systems assigned to it, plus against other worker s best systems. Introduction Considerations for parallel procedures The Algorithm Summary 15/26
21 Screening can be expensive Solution 3: Do not screen on every replication Proposition 2 Screening on a pre-determined subsequence of replications does not decrease the probability of correct selection. Proof follows directly from Jennison et al. (1980, 1982). The subsequences have to be pre-determined to avoid the bias implied by random completion time: between each pair of systems (i 1, i 2 ), screen at replications (bn 1, bn 2 ), for b = 1, 2,... and possibly unequal n 1, n 2. The step count b does not need to be equal among all pairs: screening can be made asynchronous. Introduction Considerations for parallel procedures The Algorithm Summary 16/26
22 Handling random number generation Random numbers generated across the workers should be independent. The workers generate identical random numbers if no specific instruction is given! Solution: Use the RngStream MCG generator with streams and substreams, proposed in L Ecuyer et al. (2002), in the master-worker framework: At initialization, the master generates one stream Z j for each worker j. When worker j simulates system i, it uses a fixed amount of random numbers under the ith substream, Z ji. Introduction Considerations for parallel procedures The Algorithm Summary 17/26
23 1 Introduction 2 Considerations for parallel procedures 3 The Algorithm 4 Summary Introduction Considerations for parallel procedures The Algorithm Summary 18/26
24 A three-stage parallel R&S algorithm Stage 0: We simulate all systems to estimate simulation completion times. Stage 1: (If variances need to be estimated) Independently of Stage 0, systems are simulated by workers to obtain variance estimates. Stage 2: Remaining systems are simulated and screened until one system remains. Introduction Considerations for parallel procedures The Algorithm Summary 18/26
25 Don t screen all pairs Systems Systems Core 1 10 Systems Systems Core 2 Core 3 40 Within-core screening Best of master core 40 Core 4 Within-core screening Between-core screening Best of each core Core 5 Figure 5: Screening on the Master Figure 6: Screening on the Workers Introduction Considerations for parallel procedures The Algorithm Summary 19/26
26 A three-stage parallel R&S algorithm Strategy 1: Dedicate both simulation and screening of each system to a worker Figure 7: Utilization of workers using Strategy 1 Introduction Considerations for parallel procedures The Algorithm Summary 20/26
27 A three-stage parallel R&S algorithm Strategy 2: Only screening is partitioned and dedicated to a worker Figure 8: Utilization of workers using Strategy 2 Introduction Considerations for parallel procedures The Algorithm Summary 21/26
28 Numerical example Our parallel algorithm is applied to a throughput-maximization problem (SimOpt.org) for which Luo et al. (2013) solved a version with 3,249 systems. We solve the problem with 1,016,127 systems in consideration. Introduction Considerations for parallel procedures The Algorithm Summary 22/26
29 Performance on 1,016,127 systems Wallclock time (sec) 10 4 Perfect scaling Actual performance Number of cores Introduction Considerations for parallel procedures The Algorithm Summary 23/26
30 1 Introduction 2 Considerations for parallel procedures 3 The Algorithm 4 Summary Introduction Considerations for parallel procedures The Algorithm Summary 24/26
31 Summary We proposed a R&S procedure in a high-performance parallel computing environment which is capable of solving large-scale R&S problems. The statistical guarantee is maintained through Screening on subsequences Carefully managing random number generation Parallelizing both simulation and screening leads to decent speed-up Introduction Considerations for parallel procedures The Algorithm Summary 24/26
32 What s next? Consider other computing architectures Eliminate the master i.e. bottleneck Cloud platform where cores are less reliable High switching cost Compare with parallel versions of two-stage procedures Test on different problems Introduction Considerations for parallel procedures The Algorithm Summary 25/26
33 Thank you! Questions? 26/26
34 References I E. Jack Chen. Using parallel and distributed computing to increase the capability of selection procedures. In Proceedings of the 37th Conference on Winter Simulation, WSC 05, pages Winter Simulation Conference, ISBN URL V. Fabian. Note on anderson s sequential procedures with triangular boundary. Annals of Statistics, 2(1): , R. M. Fujimoto. Parallel and Distributed Simulation Systems. Wiley, New York, P. W. Glynn and P. Heidelberger. Bias properties of budget constrained simulations. Operations Research, 38: , References 1/5
35 References II P. W. Glynn and P. Heidelberger. Analysis of parallel replicated simulations under a completion time constraint. ACM Transactions on Modeling and Computer Simulation, 1 (1):3 23, P. Heidelberger. Discrete event simulations and parallel processing: statistical properties. Siam J. Stat. Comput., 9 (6): , L. Jeff Hong. Fully sequential indifference-zone selection procedures with variance-dependent sampling. Naval Research Logistics (NRL), 53(5): , C. Jennison, I.M. Johnstone, and B.W. Turnbull. Asymptotically optimal procedures for sequential adaptive selection of the best of several normal means. Technical Report 463, School of Operations Research and Industrial Engineering, Cornell University, Ithaca NY, References 2/5
36 References III C. Jennison, I.M. Johnstone, and B.W. Turnbull. Asymptotically optimal procedures for sequential adaptive selection of the best of several normal means. In S.S. Gupta and J.O. Berger, editors, Statistical Decision Theory and Related Topics III, vol. 2., pages Academic Press, New York, New York, S.-H. Kim and B. L. Nelson. Selecting the best system. In S. G. Henderson and B. L. Nelson, editors, Simulation, Handbooks in Operations Research and Management Science, pages Elsevier, Amsterdam, Seong-Hee Kim and Barry L. Nelson. A fully sequential procedure for indifference-zone selection in simulation. ACM Transactions on Modeling and Computer Simulation (TOMACS), 11(3): , References 3/5
37 References IV P. L Ecuyer, R. Simard, E. J. Chen, and W. D. Kelton. An objected-oriented random-number package with many long streams and substreams. Operations Research, 50(6): , Jun Luo and L. Jeff Hong. Large-scale ranking and selection using cloud computing. In Proceedings of the Winter Simulation Conference, WSC 11, pages Winter Simulation Conference, URL Jun Luo, Jeff L. Hong, Barry L. Nelson, and Yang Wu. Fully sequential procedures for large-scale ranking-and-selection problems in parallel computing environments. Submitted, References 4/5
38 References V E. Paulson. A sequential procedure for selecting the population with the largest mean from k normal populations. Annals of Mathematical Statistics, 35(1): , References 5/5
A Comparison of Two Parallel Ranking and Selection Procedures
A Comparison of Two Parallel Ranking and Selection Procedures Eric C. Ni Shane G. Henderson School of Operations Research and Information Engineering, Cornell University Susan R. Hunter School of Industrial
More informationRANKING AND SELECTION IN A HIGH PERFORMANCE COMPUTING ENVIRONMENT. Eric C. Ni Susan R. Hunter Shane G. Henderson
Proceedings of the 2013 Winter Simulation Conference R. Pasupathy, S.-H. Kim, A. Tolk, R. Hill, and M. E. Kuhl, eds. RANKING AND SELECTION IN A HIGH PERFORMANCE COMPUTING ENVIRONMENT Eric C. Ni Susan R.
More informationEfficient Ranking and Selection in Parallel Computing Environments
Submitted to Operations Research manuscript (Please, provide the manuscript number!) Authors are encouraged to submit new papers to INFORMS journals by means of a style file template, which includes the
More informationPackage rstream. R topics documented: June 21, Version Date Title Streams of Random Numbers
Version 1.3.5 Date 2017-06-21 Title Streams of Random Numbers Package rstream June 21, 2017 Author Maintainer Depends R (>= 2.0.0) Imports methods, stats Unified object oriented interface for multiple
More informationLecture: Simulation. of Manufacturing Systems. Sivakumar AI. Simulation. SMA6304 M2 ---Factory Planning and scheduling. Simulation - A Predictive Tool
SMA6304 M2 ---Factory Planning and scheduling Lecture Discrete Event of Manufacturing Systems Simulation Sivakumar AI Lecture: 12 copyright 2002 Sivakumar 1 Simulation Simulation - A Predictive Tool Next
More informationBayesian Sequential Sampling Policies and Sufficient Conditions for Convergence to a Global Optimum
Bayesian Sequential Sampling Policies and Sufficient Conditions for Convergence to a Global Optimum Peter Frazier Warren Powell 2 Operations Research & Information Engineering, Cornell University 2 Operations
More informationGeneral Factorial Models
In Chapter 8 in Oehlert STAT:5201 Week 9 - Lecture 2 1 / 34 It is possible to have many factors in a factorial experiment. In DDD we saw an example of a 3-factor study with ball size, height, and surface
More informationGeneral Factorial Models
In Chapter 8 in Oehlert STAT:5201 Week 9 - Lecture 1 1 / 31 It is possible to have many factors in a factorial experiment. We saw some three-way factorials earlier in the DDD book (HW 1 with 3 factors:
More informationRandomized rounding of semidefinite programs and primal-dual method for integer linear programming. Reza Moosavi Dr. Saeedeh Parsaeefard Dec.
Randomized rounding of semidefinite programs and primal-dual method for integer linear programming Dr. Saeedeh Parsaeefard 1 2 3 4 Semidefinite Programming () 1 Integer Programming integer programming
More informationA New Statistical Procedure for Validation of Simulation and Stochastic Models
Syracuse University SURFACE Electrical Engineering and Computer Science L.C. Smith College of Engineering and Computer Science 11-18-2010 A New Statistical Procedure for Validation of Simulation and Stochastic
More informationA HYBRID METHOD FOR SIMULATION FACTOR SCREENING. Hua Shen Hong Wan
Proceedings of the 2006 Winter Simulation Conference L. F. Perrone, F. P. Wieland, J. Liu, B. G. Lawson, D. M. Nicol, and R. M. Fujimoto, eds. A HYBRID METHOD FOR SIMULATION FACTOR SCREENING Hua Shen Hong
More informationSELECTION OF THE BEST WITH STOCHASTIC CONSTRAINTS. Engineering 3211 Providence Drive Black Engineering 3004
Proceedings of the 2009 Winter Simulation Conference M. D. Rossetti, R. R. Hill, B. Johansson, A. Dunkin and R. G. Ingalls, eds. SELECTION OF THE BEST WITH STOCHASTIC CONSTRAINTS Alireza Kabirian Sigurdur
More informationCONFIDENCE INTERVALS FROM A SINGLE SIMULATION USING THE DELTA METHOD 1
CONFIDENCE INTERVALS FROM A SINGLE SIMULATION USING THE DELTA METHOD Christoph Roser Masaru Nakano Toyota Central Research and Development Laboratories Nagakute, Aichi, 480-9, JAPAN croser@robotics.tytlabs.co.jp
More informationA simple OMNeT++ queuing experiment using different random number generators
A simple OMNeT++ queuing experiment using different random number generators Bernhard Hechenleitner and Karl Entacher December 5, 2002 Abstract We apply a simple queuing-experiment using parallel streams
More informationSimultaneous Perturbation Stochastic Approximation Algorithm Combined with Neural Network and Fuzzy Simulation
.--- Simultaneous Perturbation Stochastic Approximation Algorithm Combined with Neural Networ and Fuzzy Simulation Abstract - - - - Keywords: Many optimization problems contain fuzzy information. Possibility
More informationSimulation ranking and selection procedures and applications in network reliability design
University of Iowa Iowa Research Online Theses and Dissertations Spring 2011 Simulation ranking and selection procedures and applications in network reliability design Andrew Paul Kiekhaefer University
More informationInteger and Combinatorial Optimization: Clustering Problems
Integer and Combinatorial Optimization: Clustering Problems John E. Mitchell Department of Mathematical Sciences RPI, Troy, NY 12180 USA February 2019 Mitchell Clustering Problems 1 / 14 Clustering Clustering
More informationGroup Secret Key Generation Algorithms
Group Secret Key Generation Algorithms Chunxuan Ye and Alex Reznik InterDigital Communications Corporation King of Prussia, PA 9406 Email: {Chunxuan.Ye, Alex.Reznik}@interdigital.com arxiv:cs/07024v [cs.it]
More informationNEW MODEL OF FRAMEWORK FOR TASK SCHEDULING BASED ON MOBILE AGENTS
NEW MODEL OF FRAMEWORK FOR TASK SCHEDULING BASED ON MOBILE AGENTS 1 YOUNES HAJOUI, 2 MOHAMED YOUSSFI, 3 OMAR BOUATTANE, 4 ELHOCEIN ILLOUSSAMEN Laboratory SSDIA ENSET Mohammedia, University Hassan II of
More informationSimulation Calibration with Correlated Knowledge-Gradients
Simulation Calibration with Correlated Knowledge-Gradients Peter Frazier Warren Powell Hugo Simão Operations Research & Information Engineering, Cornell University Operations Research & Financial Engineering,
More informationOn the Maximum Throughput of A Single Chain Wireless Multi-Hop Path
On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path Guoqiang Mao, Lixiang Xiong, and Xiaoyuan Ta School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia
More informationAvailable online at ScienceDirect. Procedia Computer Science 89 (2016 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 89 (2016 ) 341 348 Twelfth International Multi-Conference on Information Processing-2016 (IMCIP-2016) Parallel Approach
More informationWhen does a digraph admit a doubly stochastic adjacency matrix?
When does a digraph admit a doubly stochastic adjacency matrix? Bahman Gharesifard and Jorge Cortés Abstract Digraphs with doubly stochastic adjacency matrices play an essential role in a variety of cooperative
More informationProceedings of the 2016 Winter Simulation Conference T. M. K. Roeder, P. I. Frazier, R. Szechtman, E. Zhou, T. Huschka, and S. E. Chick, eds.
Proceedings of the 2016 Winter Simulation Conference T. M. K. Roeder, P. I. Frazier, R. Szechtman, E. Zhou, T. Huschka, and S. E. Chick, eds. A QUANTILE-BASED NESTED PARTITION ALGORITHM FOR BLACK-BOX FUNCTIONS
More information1 Introduction and Results
On the Structure of Graphs with Large Minimum Bisection Cristina G. Fernandes 1,, Tina Janne Schmidt,, and Anusch Taraz, 1 Instituto de Matemática e Estatística, Universidade de São Paulo, Brazil, cris@ime.usp.br
More informationHAMILTON CYCLES IN RANDOM LIFTS OF COMPLETE GRAPHS
HAMILTON CYCLES IN RANDOM LIFTS OF COMPLETE GRAPHS TOMASZ LUCZAK, LUKASZ WITKOWSKI, AND MARCIN WITKOWSKI Abstract. We study asymptotic properties of random lifts a model of random graph introduced by Amit
More informationDirectional Sensor Control for Maximizing Information Gain
Directional Sensor Control for Maximizing Information Gain Shankarachary Ragi a, Hans D. Mittelmann b, and Edwin K. P. Chong a a Department of Electrical and Computer Engineering, Colorado State University,
More informationParallel Auction Algorithm for Linear Assignment Problem
Parallel Auction Algorithm for Linear Assignment Problem Xin Jin 1 Introduction The (linear) assignment problem is one of classic combinatorial optimization problems, first appearing in the studies on
More informationMissing Data Analysis for the Employee Dataset
Missing Data Analysis for the Employee Dataset 67% of the observations have missing values! Modeling Setup Random Variables: Y i =(Y i1,...,y ip ) 0 =(Y i,obs, Y i,miss ) 0 R i =(R i1,...,r ip ) 0 ( 1
More informationStatistics 202: Data Mining. c Jonathan Taylor. Outliers Based in part on slides from textbook, slides of Susan Holmes.
Outliers Based in part on slides from textbook, slides of Susan Holmes December 2, 2012 1 / 1 Concepts What is an outlier? The set of data points that are considerably different than the remainder of the
More informationMetaheuristic Optimization with Evolver, Genocop and OptQuest
Metaheuristic Optimization with Evolver, Genocop and OptQuest MANUEL LAGUNA Graduate School of Business Administration University of Colorado, Boulder, CO 80309-0419 Manuel.Laguna@Colorado.EDU Last revision:
More informationEVALUATION OF METHODS USED TO DETECT WARM-UP PERIOD IN STEADY STATE SIMULATION. Prasad S. Mahajan Ricki G. Ingalls
Proceedings of the 2004 Winter Simulation Conference R.G. Ingalls, M. D. Rossetti, J. S. Smith, and B. A. Peters, eds. EVALUATION OF METHODS USED TO DETECT WARM-UP PERIOD IN STEADY STATE SIMULATION Prasad
More informationResearch Interests Optimization:
Mitchell: Research interests 1 Research Interests Optimization: looking for the best solution from among a number of candidates. Prototypical optimization problem: min f(x) subject to g(x) 0 x X IR n Here,
More informationA Non-Iterative Approach to Frequency Estimation of a Complex Exponential in Noise by Interpolation of Fourier Coefficients
A on-iterative Approach to Frequency Estimation of a Complex Exponential in oise by Interpolation of Fourier Coefficients Shahab Faiz Minhas* School of Electrical and Electronics Engineering University
More informationTransactum Business Process Manager with High-Performance Elastic Scaling. November 2011 Ivan Klianev
Transactum Business Process Manager with High-Performance Elastic Scaling November 2011 Ivan Klianev Transactum BPM serves three primary objectives: To make it possible for developers unfamiliar with distributed
More informationSemantic Website Clustering
Semantic Website Clustering I-Hsuan Yang, Yu-tsun Huang, Yen-Ling Huang 1. Abstract We propose a new approach to cluster the web pages. Utilizing an iterative reinforced algorithm, the model extracts semantic
More informationc 2003 Society for Industrial and Applied Mathematics
SIAM J. COMPUT. Vol. 32, No. 2, pp. 538 547 c 2003 Society for Industrial and Applied Mathematics COMPUTING THE MEDIAN WITH UNCERTAINTY TOMÁS FEDER, RAJEEV MOTWANI, RINA PANIGRAHY, CHRIS OLSTON, AND JENNIFER
More informationSeeing Around Corners: Fast Orthogonal Connector Routing
Seeing round Corners: Fast Orthogonal Connector Routing Kim Marriott 1, Peter J. Stuckey 2, and Michael Wybrow 1 1 Caulfield School of Information Technology, Monash University, Caulfield, Victoria 3145,
More informationLecture 11: Clustering and the Spectral Partitioning Algorithm A note on randomized algorithm, Unbiased estimates
CSE 51: Design and Analysis of Algorithms I Spring 016 Lecture 11: Clustering and the Spectral Partitioning Algorithm Lecturer: Shayan Oveis Gharan May nd Scribe: Yueqi Sheng Disclaimer: These notes have
More informationSimulation Calibration with Correlated Knowledge-Gradients
Simulation Calibration with Correlated Knowledge-Gradients Peter Frazier Warren Powell Hugo Simão Operations Research & Information Engineering, Cornell University Operations Research & Financial Engineering,
More informationBichromatic Line Segment Intersection Counting in O(n log n) Time
Bichromatic Line Segment Intersection Counting in O(n log n) Time Timothy M. Chan Bryan T. Wilkinson Abstract We give an algorithm for bichromatic line segment intersection counting that runs in O(n log
More informationThe strong chromatic number of a graph
The strong chromatic number of a graph Noga Alon Abstract It is shown that there is an absolute constant c with the following property: For any two graphs G 1 = (V, E 1 ) and G 2 = (V, E 2 ) on the same
More informationBig Data Methods. Chapter 5: Machine learning. Big Data Methods, Chapter 5, Slide 1
Big Data Methods Chapter 5: Machine learning Big Data Methods, Chapter 5, Slide 1 5.1 Introduction to machine learning What is machine learning? Concerned with the study and development of algorithms that
More informationA PARAMETRIC SIMPLEX METHOD FOR OPTIMIZING A LINEAR FUNCTION OVER THE EFFICIENT SET OF A BICRITERIA LINEAR PROBLEM. 1.
ACTA MATHEMATICA VIETNAMICA Volume 21, Number 1, 1996, pp. 59 67 59 A PARAMETRIC SIMPLEX METHOD FOR OPTIMIZING A LINEAR FUNCTION OVER THE EFFICIENT SET OF A BICRITERIA LINEAR PROBLEM NGUYEN DINH DAN AND
More information1 (eagle_eye) and Naeem Latif
1 CS614 today quiz solved by my campus group these are just for idea if any wrong than we don t responsible for it Question # 1 of 10 ( Start time: 07:08:29 PM ) Total Marks: 1 As opposed to the outcome
More informationCluster Analysis. Mu-Chun Su. Department of Computer Science and Information Engineering National Central University 2003/3/11 1
Cluster Analysis Mu-Chun Su Department of Computer Science and Information Engineering National Central University 2003/3/11 1 Introduction Cluster analysis is the formal study of algorithms and methods
More informationADAPTATION OF THE UOBYQA ALGORITHM FOR NOISY FUNCTIONS
Proceedings of the 2006 Winter Simulation Conference L. F. Perrone, F. P. Wieland, J. Liu, B. G. Lawson, D. M. Nicol, and R. M. Fujimoto, eds. ADAPTATION OF THE UOBYQA ALGORITHM FOR NOISY FUNCTIONS Geng
More informationComputational and Statistical Tradeoffs in VoI-Driven Learning
ARO ARO MURI MURI on on Value-centered Theory for for Adaptive Learning, Inference, Tracking, and and Exploitation Computational and Statistical Tradefs in VoI-Driven Learning Co-PI Michael Jordan University
More informationLecture 9: Support Vector Machines
Lecture 9: Support Vector Machines William Webber (william@williamwebber.com) COMP90042, 2014, Semester 1, Lecture 8 What we ll learn in this lecture Support Vector Machines (SVMs) a highly robust and
More informationA Survey on Postive and Unlabelled Learning
A Survey on Postive and Unlabelled Learning Gang Li Computer & Information Sciences University of Delaware ligang@udel.edu Abstract In this paper we survey the main algorithms used in positive and unlabeled
More informationA SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION
A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS Kyoungjin Park Alper Yilmaz Photogrammetric and Computer Vision Lab Ohio State University park.764@osu.edu yilmaz.15@osu.edu ABSTRACT Depending
More informationThe Dynamic Hungarian Algorithm for the Assignment Problem with Changing Costs
The Dynamic Hungarian Algorithm for the Assignment Problem with Changing Costs G. Ayorkor Mills-Tettey Anthony Stentz M. Bernardine Dias CMU-RI-TR-07-7 July 007 Robotics Institute Carnegie Mellon University
More informationInterval Algorithms for Coin Flipping
IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.2, February 2010 55 Interval Algorithms for Coin Flipping Sung-il Pae, Hongik University, Seoul, Korea Summary We discuss
More informationMissing Data Analysis for the Employee Dataset
Missing Data Analysis for the Employee Dataset 67% of the observations have missing values! Modeling Setup For our analysis goals we would like to do: Y X N (X, 2 I) and then interpret the coefficients
More informationLATIN SQUARES AND THEIR APPLICATION TO THE FEASIBLE SET FOR ASSIGNMENT PROBLEMS
LATIN SQUARES AND THEIR APPLICATION TO THE FEASIBLE SET FOR ASSIGNMENT PROBLEMS TIMOTHY L. VIS Abstract. A significant problem in finite optimization is the assignment problem. In essence, the assignment
More informationImplementation of a High-Performance Distributed Web Crawler and Big Data Applications with Husky
Implementation of a High-Performance Distributed Web Crawler and Big Data Applications with Husky The Chinese University of Hong Kong Abstract Husky is a distributed computing system, achieving outstanding
More informationALTHOUGH the Maximum Likelihood (ML) multiuser
1 Branch-and-Bound-Based Fast Optimal Algorithm for Multiuser Detection in Synchronous CDMA J. Luo, K. Pattipati, P. Willett, L. Brunel Abstract A fast optimal algorithm based on the branch and bound (BBD)
More informationA noninformative Bayesian approach to small area estimation
A noninformative Bayesian approach to small area estimation Glen Meeden School of Statistics University of Minnesota Minneapolis, MN 55455 glen@stat.umn.edu September 2001 Revised May 2002 Research supported
More informationBipolar Fuzzy Line Graph of a Bipolar Fuzzy Hypergraph
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, No 1 Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0002 Bipolar Fuzzy Line Graph of a
More informationGeometry. Geometric Graphs with Few Disjoint Edges. G. Tóth 1,2 and P. Valtr 2,3. 1. Introduction
Discrete Comput Geom 22:633 642 (1999) Discrete & Computational Geometry 1999 Springer-Verlag New York Inc. Geometric Graphs with Few Disjoint Edges G. Tóth 1,2 and P. Valtr 2,3 1 Courant Institute, New
More informationAN APPROACH FOR LOAD BALANCING FOR SIMULATION IN HETEROGENEOUS DISTRIBUTED SYSTEMS USING SIMULATION DATA MINING
AN APPROACH FOR LOAD BALANCING FOR SIMULATION IN HETEROGENEOUS DISTRIBUTED SYSTEMS USING SIMULATION DATA MINING Irina Bernst, Patrick Bouillon, Jörg Frochte *, Christof Kaufmann Dept. of Electrical Engineering
More informationOn a Cardinality-Constrained Transportation Problem With Market Choice
On a Cardinality-Constrained Transportation Problem With Market Choice Matthias Walter a, Pelin Damcı-Kurt b, Santanu S. Dey c,, Simge Küçükyavuz b a Institut für Mathematische Optimierung, Otto-von-Guericke-Universität
More informationOPTIMAL LINK CAPACITY ASSIGNMENTS IN TELEPROCESSING AND CENTRALIZED COMPUTER NETWORKS *
OPTIMAL LINK CAPACITY ASSIGNMENTS IN TELEPROCESSING AND CENTRALIZED COMPUTER NETWORKS * IZHAK RUBIN UCLA Los Angeles, California Summary. We consider a centralized network model representing a teleprocessing
More informationSome new results on circle graphs. Guillermo Durán 1
Some new results on circle graphs Guillermo Durán 1 Departamento de Ingeniería Industrial, Facultad de Ciencias Físicas y Matemáticas, Universidad de Chile, Santiago, Chile gduran@dii.uchile.cl Departamento
More informationTOWARDS NEW ESTIMATING INCREMENTAL DIMENSIONAL ALGORITHM (EIDA)
TOWARDS NEW ESTIMATING INCREMENTAL DIMENSIONAL ALGORITHM (EIDA) 1 S. ADAEKALAVAN, 2 DR. C. CHANDRASEKAR 1 Assistant Professor, Department of Information Technology, J.J. College of Arts and Science, Pudukkottai,
More informationCoalition formation in multi-agent systems an evolutionary approach
Proceedings of the International Multiconference on Computer Science and Information Technology pp. 30 ISBN 978-83-6080-4-9 ISSN 896-7094 Coalition formation in multi-agent systems an evolutionary approach
More informationCooperation between Data Modeling and Simulation Modeling for Performance Analysis of Hadoop
Cooperation between Data ing and Simulation ing for Performance Analysis of Hadoop Byeong Soo Kim and Tag Gon Kim Department of Electrical Engineering Korea Advanced Institute of Science and Technology
More informationLow Latency via Redundancy
Low Latency via Redundancy Ashish Vulimiri, Philip Brighten Godfrey, Radhika Mittal, Justine Sherry, Sylvia Ratnasamy, Scott Shenker Presenter: Meng Wang 2 Low Latency Is Important Injecting just 400 milliseconds
More informationREDUCING GRAPH COLORING TO CLIQUE SEARCH
Asia Pacific Journal of Mathematics, Vol. 3, No. 1 (2016), 64-85 ISSN 2357-2205 REDUCING GRAPH COLORING TO CLIQUE SEARCH SÁNDOR SZABÓ AND BOGDÁN ZAVÁLNIJ Institute of Mathematics and Informatics, University
More informationImportance-Scanning Worm Using Vulnerable-Host Distribution
Importance-Scanning Worm Using Vulnerable-Host Distribution Zesheng Chen and Chuanyi Ji School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, Georgia 333 Email: {zchen,
More informationAnalysis of Replication Control Protocols
Analysis of Replication Control Protocols Darrell D. E. Long University of California, Santa Cruz darrell@cis.ucsc.edu June 22, 2003 Abstract In recent years many replication control protocols have been
More informationFair Multi-Resource Allocation with External Resource for Mobile Edge Computing
Fair Multi-Resource Allocation with External Resource for Mobile Edge Computing Erfan Meskar and Ben Liang Department of Electrical and Computer Engineering, University of Toronto emeskar, liang@ece.utoronto.ca
More informationAn Effective Upperbound on Treewidth Using Partial Fill-in of Separators
An Effective Upperbound on Treewidth Using Partial Fill-in of Separators Boi Faltings Martin Charles Golumbic June 28, 2009 Abstract Partitioning a graph using graph separators, and particularly clique
More informationA modified and fast Perceptron learning rule and its use for Tag Recommendations in Social Bookmarking Systems
A modified and fast Perceptron learning rule and its use for Tag Recommendations in Social Bookmarking Systems Anestis Gkanogiannis and Theodore Kalamboukis Department of Informatics Athens University
More informationOn Approximating Minimum Vertex Cover for Graphs with Perfect Matching
On Approximating Minimum Vertex Cover for Graphs with Perfect Matching Jianer Chen and Iyad A. Kanj Abstract It has been a challenging open problem whether there is a polynomial time approximation algorithm
More informationAn R Package flare for High Dimensional Linear Regression and Precision Matrix Estimation
An R Package flare for High Dimensional Linear Regression and Precision Matrix Estimation Xingguo Li Tuo Zhao Xiaoming Yuan Han Liu Abstract This paper describes an R package named flare, which implements
More informationSecretary Problems and Incentives via Linear Programming
Secretary Problems and Incentives via Linear Programming Niv Buchbinder Microsoft Research, New England and Kamal Jain Microsoft Research, Redmond and Mohit Singh Microsoft Research, New England In the
More informationA matching of maximum cardinality is called a maximum matching. ANn s/2
SIAM J. COMPUT. Vol. 2, No. 4, December 1973 Abstract. ANn s/2 ALGORITHM FOR MAXIMUM MATCHINGS IN BIPARTITE GRAPHS* JOHN E. HOPCROFT" AND RICHARD M. KARP The present paper shows how to construct a maximum
More informationA Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection (Kohavi, 1995)
A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection (Kohavi, 1995) Department of Information, Operations and Management Sciences Stern School of Business, NYU padamopo@stern.nyu.edu
More informationA Random Number Based Method for Monte Carlo Integration
A Random Number Based Method for Monte Carlo Integration J Wang and G Harrell Department Math and CS, Valdosta State University, Valdosta, Georgia, USA Abstract - A new method is proposed for Monte Carlo
More informationApprenticeship Learning for Reinforcement Learning. with application to RC helicopter flight Ritwik Anand, Nick Haliday, Audrey Huang
Apprenticeship Learning for Reinforcement Learning with application to RC helicopter flight Ritwik Anand, Nick Haliday, Audrey Huang Table of Contents Introduction Theory Autonomous helicopter control
More informationThe Bootstrap and Jackknife
The Bootstrap and Jackknife Summer 2017 Summer Institutes 249 Bootstrap & Jackknife Motivation In scientific research Interest often focuses upon the estimation of some unknown parameter, θ. The parameter
More informationA Counterexample to the Dominating Set Conjecture
A Counterexample to the Dominating Set Conjecture Antoine Deza Gabriel Indik November 28, 2005 Abstract The metric polytope met n is the polyhedron associated with all semimetrics on n nodes and defined
More informationStreamIt on Fleet. Amir Kamil Computer Science Division, University of California, Berkeley UCB-AK06.
StreamIt on Fleet Amir Kamil Computer Science Division, University of California, Berkeley kamil@cs.berkeley.edu UCB-AK06 July 16, 2008 1 Introduction StreamIt [1] is a high-level programming language
More informationLEAST COST ROUTING ALGORITHM WITH THE STATE SPACE RELAXATION IN A CENTRALIZED NETWORK
VOL., NO., JUNE 08 ISSN 896608 00608 Asian Research Publishing Network (ARPN). All rights reserved. LEAST COST ROUTING ALGORITHM WITH THE STATE SPACE RELAXATION IN A CENTRALIZED NETWORK Y. J. Lee Department
More informationPractical Test Architecture Optimization for System-on-a-Chip under Floorplanning Constraints
Practical Test Architecture Optimization for System-on-a-Chip under Floorplanning Constraints Makoto Sugihara, Kazuaki Murakami and Yusuke Matsunaga Institute of Systems & Information Technologies/KYUSHU
More informationCS242: Probabilistic Graphical Models Lecture 3: Factor Graphs & Variable Elimination
CS242: Probabilistic Graphical Models Lecture 3: Factor Graphs & Variable Elimination Instructor: Erik Sudderth Brown University Computer Science September 11, 2014 Some figures and materials courtesy
More informationIntroduction to Mathematical Programming IE406. Lecture 16. Dr. Ted Ralphs
Introduction to Mathematical Programming IE406 Lecture 16 Dr. Ted Ralphs IE406 Lecture 16 1 Reading for This Lecture Bertsimas 7.1-7.3 IE406 Lecture 16 2 Network Flow Problems Networks are used to model
More informationStatistical Matching using Fractional Imputation
Statistical Matching using Fractional Imputation Jae-Kwang Kim 1 Iowa State University 1 Joint work with Emily Berg and Taesung Park 1 Introduction 2 Classical Approaches 3 Proposed method 4 Application:
More informationA New Binary Vote Assignment on Grid Algorithm to Manage Replication in Distributed Database Environment
2011 International Conference on Computer Communication and Management Proc.of CSIT vol.5 (2011) (2011) IACSIT Press, Singapore A New Binary Vote Assignment on Grid Algorithm to Manage Replication in Distributed
More informationSequential Screening: A Bayesian Dynamic Programming Analysis
Sequential Screening: A Bayesian Dynamic Programming Analysis Peter I. Frazier (Cornell), Bruno Jedynak (JHU), Li Chen (JHU) Operations Research & Information Engineering, Cornell University Applied Mathematics,
More informationCME323 Report: Distributed Multi-Armed Bandits
CME323 Report: Distributed Multi-Armed Bandits Milind Rao milind@stanford.edu 1 Introduction Consider the multi-armed bandit (MAB) problem. In this sequential optimization problem, a player gets to pull
More informationSTATISTICAL CALIBRATION: A BETTER APPROACH TO INTEGRATING SIMULATION AND TESTING IN GROUND VEHICLE SYSTEMS.
2016 NDIA GROUND VEHICLE SYSTEMS ENGINEERING and TECHNOLOGY SYMPOSIUM Modeling & Simulation, Testing and Validation (MSTV) Technical Session August 2-4, 2016 - Novi, Michigan STATISTICAL CALIBRATION: A
More informationApproximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks
Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks Ambreen Shahnaz and Thomas Erlebach Department of Computer Science University of Leicester University Road, Leicester LE1
More informationModeling and Analysis of Random Walk Search Algorithms in P2P Networks
Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Nabhendra Bisnik and Alhussein Abouzeid Electrical, Computer and Systems Engineering Department Rensselaer Polytechnic Institute Troy,
More informationMultivariate probability distributions
Multivariate probability distributions September, 07 STAT 0 Class Slide Outline of Topics Background Discrete bivariate distribution 3 Continuous bivariate distribution STAT 0 Class Slide Multivariate
More informationStat 321: Transposable Data Clustering
Stat 321: Transposable Data Clustering Art B. Owen Stanford Statistics Art B. Owen (Stanford Statistics) Clustering 1 / 27 Clustering Given n objects with d attributes, place them (the objects) into groups.
More informationPrivacy in Statistical Databases
Privacy in Statistical Databases CSE 598D/STAT 598B Fall 2007 Lecture 2, 9/13/2007 Aleksandra Slavkovic Office hours: MW 3:30-4:30 Office: Thomas 412 Phone: x3-4918 Adam Smith Office hours: Mondays 3-5pm
More informationCUT VERTICES IN ZERO-DIVISOR GRAPHS OF FINITE COMMUTATIVE RINGS
CUT VERTICES IN ZERO-DIVISOR GRAPHS OF FINITE COMMUTATIVE RINGS M. AXTELL, N. BAETH, AND J. STICKLES Abstract. A cut vertex of a connected graph is a vertex whose removal would result in a graph having
More informationThe Bounded Edge Coloring Problem and Offline Crossbar Scheduling
The Bounded Edge Coloring Problem and Offline Crossbar Scheduling Jonathan Turner WUCSE-05-07 Abstract This paper introduces a variant of the classical edge coloring problem in graphs that can be applied
More information