The BKZ algorithm. Joop van de Pol

Size: px
Start display at page:

Download "The BKZ algorithm. Joop van de Pol"

Transcription

1 The BKZ algorithm Department of Computer Science, University f Bristol, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB United Kingdom. May 9th, 2014 The BKZ algorithm Slide 1

2 utline Lattices Basis Reduction LLL BKZ Enumeration BKZ 2.0 pen questions The BKZ algorithm Slide 2

3 Lattices b 2 b 1 Lattices are represented by a basis. The BKZ algorithm Slide 3

4 Lattices Lattices are represented by a basis. This basis is not unique. The BKZ algorithm Slide 3

5 Lattices Lattices are represented by a basis. This basis is not unique. Many bases span the same lattice. Some are better than others. The BKZ algorithm Slide 3

6 Lattices Lattice problems are about finding short and close vectors. The BKZ algorithm Slide 3

7 Lattices Lattice problems are about finding short and close vectors. The BKZ algorithm Slide 3

8 Lattices Lattice problems are about finding short and close vectors. In practice it suffices to find short and orthogonal basis vectors. The BKZ algorithm Slide 3

9 Gram-Schmidt Iterative process to orthonormalize a set of vectors b 1,..., b d : b 1 := b 1 b i i 1 := b i µ ij b j, where µ ij = b i, b j b for all 1 j < i d. j 2 j=1 Result: vectors b 1,..., b d that are pairwise orthogonal. They span the same space as b 1,..., b d. The BKZ algorithm Slide 4

10 Gram-Schmidt Iterative process to orthonormalize a set of vectors b 1,..., b d : b 1 := b 1 b i i 1 := b i µ ij b j, where µ ij = b i, b j b for all 1 j < i d. j 2 j=1 Result: vectors b 1,..., b d that are pairwise orthogonal. They span the same space as b 1,..., b d. In lattices: only integral combinations are allowed, b 1,..., b d span the same lattice! will not The BKZ algorithm Slide 4

11 Gram-Schmidt b 2 b 1 The BKZ algorithm Slide 5

12 Gram-Schmidt b 2 b 1 = b 1 Forget that we are in a lattice. The BKZ algorithm Slide 5

13 Gram-Schmidt b 2 b 1 = b 1 b 2 Projecting b 2 gives b 2. The BKZ algorithm Slide 5

14 Gram-Schmidt b 2 b 1 = b 1 b 2 b 2 is not a lattice vector. The BKZ algorithm Slide 5

15 Gram-Schmidt b 2 b 1 = b 1 b 2 But there is a lattice vector within 1 2 b 1 from b 2 : b 2 := b 2 µ 2,1 b 1. The BKZ algorithm Slide 5

16 Gram-Schmidt b 2 b 1 = b 1 b 2 b 2 It is always possible to choose a basis close to the Gram Schmidt vectors. This basis is called size-reduced. The BKZ algorithm Slide 5

17 LLL (1982) First polynomial-time basis reduction algorithm. Ideas: Always take the basis closest to Gram-Schmidt. The BKZ algorithm Slide 6

18 LLL (1982) First polynomial-time basis reduction algorithm. Ideas: Always take the basis closest to Gram-Schmidt. Improve Gram-Schmidt vectors by changing their order. The BKZ algorithm Slide 6

19 LLL (1982) First polynomial-time basis reduction algorithm. Ideas: Always take the basis closest to Gram-Schmidt. Improve Gram-Schmidt vectors by changing their order. Being greedy when ordering basis vectors is bad for the complexity. b 1,..., b i, b i+1,..., b d b 1,..., b i, b i+1,..., b d The BKZ algorithm Slide 6

20 LLL (1982) First polynomial-time basis reduction algorithm. Ideas: Always take the basis closest to Gram-Schmidt. Improve Gram-Schmidt vectors by changing their order. Being greedy when ordering basis vectors is bad for the complexity. b 1,..., b i, b i+1,..., b d b 1,..., b i, b i+1,..., b d What happens when b i and b i+1 are swapped? nly b i and b i+1 change. New b i becomes b i+1 + µ i+1,ib i. The BKZ algorithm Slide 6

21 LLL (1982) First polynomial-time basis reduction algorithm. Ideas: Always take the basis closest to Gram-Schmidt. Improve Gram-Schmidt vectors by changing their order. Being greedy when ordering basis vectors is bad for the complexity. b 1,..., b i, b i+1,..., b d b 1,..., b i, b i+1,..., b d What happens when b i and b i+1 are swapped? nly b i and b i+1 change. New b i becomes b i+1 + µ i+1,ib i. Swap when b i+1 + µ i+1,ib i 2 < δ b i 2, for δ (1/4, 1). The BKZ algorithm Slide 6

22 BKZ (1987, 1994) Trade-off between basis quality and time. b 1,..., b i, b i+1,..., b i+β 1,..., b d b 1,..., b i, b i+1,..., b i+β 1,..., b d The BKZ algorithm Slide 7

23 BKZ (1987, 1994) Trade-off between basis quality and time. b 1,..., b i, b i+1,..., b i+β 1,..., b d b 1,..., b i, b i+1,..., b i+β 1,..., b d Compute b new, a combination of vectors b i, b i+1,..., b i+β 1 such that it becomes the shortest possible i th Gram-Schmidt vector. The BKZ algorithm Slide 7

24 BKZ (1987, 1994) Trade-off between basis quality and time. b 1,..., b i, b i+1,..., b i+β 1,..., b d b 1,..., b i, b i+1,..., b i+β 1,..., b d Compute b new, a combination of vectors b i, b i+1,..., b i+β 1 such that it becomes the shortest possible i th Gram-Schmidt vector. If b new 2 < δ b i 2, insert b new into the basis: b 1,..., b i 1, b new, b i,..., b d The BKZ algorithm Slide 7

25 BKZ (1987, 1994) Trade-off between basis quality and time. b 1,..., b i, b i+1,..., b i+β 1,..., b d b 1,..., b i, b i+1,..., b i+β 1,..., b d Compute b new, a combination of vectors b i, b i+1,..., b i+β 1 such that it becomes the shortest possible i th Gram-Schmidt vector. If b new 2 < δ b i 2, insert b new into the basis: b 1,..., b i 1, b new, b i,..., b d Now LLL is used to remove the linear dependency created by the extra vector. BKZ moves cyclically through the basis indices i. The BKZ algorithm Slide 7

26 BKZ (1987, 1994) Trade-off between basis quality and time. b 1,..., b i, b i+1,..., b i+β 1,..., b d b 1,..., b i, b i+1,..., b i+β 1,..., b d Compute b new, a combination of vectors b i, b i+1,..., b i+β 1 such that it becomes the shortest possible i th Gram-Schmidt vector. If b new 2 < δ b i 2, insert b new into the basis: b 1,..., b i 1, b new, b i,..., b d Now LLL is used to remove the linear dependency created by the extra vector. BKZ moves cyclically through the basis indices i. Note: we do not have a good bound on the time complexity of BKZ. The BKZ algorithm Slide 7

27 BKZ (1987, 1994) Compute b new, a combination of vectors b i, b i+1,..., b i+β 1 such that it becomes the shortest possible i th Gram-Schmidt vector. The BKZ algorithm Slide 8

28 BKZ (1987, 1994) Compute b new, a combination of vectors b i, b i+1,..., b i+β 1 such that it becomes the shortest possible i th Gram-Schmidt vector. This is equivalent to solving SVP (!) in a (projected) lattice of dimension β. BKZ uses an SVP-oracle for lower dimensions to find this vector b new. The BKZ algorithm Slide 8

29 BKZ (1987, 1994) Compute b new, a combination of vectors b i, b i+1,..., b i+β 1 such that it becomes the shortest possible i th Gram-Schmidt vector. This is equivalent to solving SVP (!) in a (projected) lattice of dimension β. BKZ uses an SVP-oracle for lower dimensions to find this vector b new. In practice enumeration is used: enumerate all lattice points within a certain radius around the origin. The BKZ algorithm Slide 8

30 Enumeration b 2 b 1 The BKZ algorithm Slide 9

31 Enumeration b 2 b 1 1) Choose a bound. The BKZ algorithm Slide 9

32 Enumeration b 2 b 1 = b 1 b 2 2) Do the Gram-Schmidt. The BKZ algorithm Slide 9

33 Enumeration b 2 b 1 = b 1 b 2 3) Project whole lattice. The BKZ algorithm Slide 9

34 Enumeration b 2 b 1 = b 1 b 2 Lattice vector within bound its projection within bound. The BKZ algorithm Slide 9

35 Enumeration b 2 b 1 = b 1 b 2 4) Enumerate all vectors in projected lattice within bound. The BKZ algorithm Slide 9

36 Enumeration b 2 b 1 = b 1 b 2 5) For each vector in projected lattice, enumerate all lattice vectors. The BKZ algorithm Slide 9

37 Enumeration b 2 b 1 = b 1 b 2 5) For each vector in projected lattice, enumerate all lattice vectors. The BKZ algorithm Slide 9

38 Enumeration b 2 b 1 = b 1 b 2 6) Pick the shortest vector. The BKZ algorithm Slide 9

39 Enumeration as a tree b 1 = b 1 b 2 Enumeration is like a tree search. The BKZ algorithm Slide 10

40 Enumeration as a tree b 1 = b 1 b 2 Enumeration is like a tree search. Each level corresponds to a projected lattice. The BKZ algorithm Slide 10

41 Enumeration as a tree b 1 = b 1 b 2 Enumeration is like a tree search. Each level corresponds to a projected lattice. The leaves correspond to lattice vectors. The BKZ algorithm Slide 10

42 Extreme pruning b 1 = b 1 b 2 Branches near the edge yield fewer leaves. The BKZ algorithm Slide 11

43 Extreme pruning b 1 = b 1 b 2 Branches near the edge yield fewer leaves. Pruning decreases the size of the tree. The BKZ algorithm Slide 11

44 Extreme pruning b 1 = b 1 b 2 Branches near the edge yield fewer leaves. Pruning decreases the size of the tree. It might also remove the solutions. The BKZ algorithm Slide 11

45 Extreme pruning b 1 = b 1 b 2 Extreme pruning: probability p of finding the solution, but more than p 1 times faster. The BKZ algorithm Slide 11

46 Extreme pruning b 1 = b 1 b 2 Extreme pruning: probability p of finding the solution, but more than p 1 times faster. This gives a speed-up of 2 d/2. The BKZ algorithm Slide 11

47 BKZ 2.0 Extreme pruning requires a good bound on the length of the shortest vector. For small β the Gaussian Heuristic does not hold. The BKZ algorithm Slide 12

48 BKZ 2.0 Extreme pruning requires a good bound on the length of the shortest vector. For small β the Gaussian Heuristic does not hold. For β > 40, the projected lattices behave like random lattices. The Gaussian Heuristic gives us a good bound. The BKZ algorithm Slide 12

49 BKZ 2.0 Extreme pruning requires a good bound on the length of the shortest vector. For small β the Gaussian Heuristic does not hold. For β > 40, the projected lattices behave like random lattices. The Gaussian Heuristic gives us a good bound. Chen and Nguyen proposed BKZ 2.0 with the following improvements over the original: Better enumeration bound Extreme pruning Aborting BKZ after a fixed number of rounds Better preprocessing of the blocks The BKZ algorithm Slide 12

50 pen questions Regarding BKZ (2.0): Many heuristics. What can we prove? Destroys local structure for global improvement. Can this be done better? What about structured (ideal) lattices? Can we speed it up using a quantum computer? In general: Are there better classical algorithms? What about quantum algorithms? The BKZ algorithm Slide 13

51 Questions? The BKZ algorithm Slide 14

Predicting Lattice reduction

Predicting Lattice reduction Predicting Lattice reduction Nicolas Gama, Phong Nguyen Ecole Normale Supérieure,CNRS,INRIA, France. April 14, 2008 Nicolas Gama, Phong Nguyen (Ecole Normale Supérieure,CNRS,INRIA, Predicting Lattice reduction

More information

CAD Algorithms. Categorizing Algorithms

CAD Algorithms. Categorizing Algorithms CAD Algorithms Categorizing Algorithms Mohammad Tehranipoor ECE Department 2 September 2008 1 Categorizing Algorithms Greedy Algorithms Prim s Algorithm (Minimum Spanning Tree) A subgraph that is a tree

More information

FPLLL: structure and data types

FPLLL: structure and data types FPLLL: structure and data types Shi Bai FAU, Florida. FPLLL Days 3 @ CWI Amsterdam. 1 / 18 Executable programs and libraries Following from Martin s talk, make leads to executable programs: fplll: main

More information

Random Sampling Revisited: Lattice Enumeration with Discrete Pruning

Random Sampling Revisited: Lattice Enumeration with Discrete Pruning Random Sampling Revisited: Lattice Enumeration with Discrete Pruning Yoshinori Aono Phong Nguyễn Summary Motivation Lattices, Enumeration and Pruning Enumeration with Discrete Pruning Motivation Context

More information

FPLLL: a lattice reduction library

FPLLL: a lattice reduction library FPLLL: a lattice reduction library Shi Bai FPLLL development team Workshop HEAT, 2016 1 / 13 FPLLL: overview What is FPLLL? An implementation of Floating-Point LLL (and BKZ) reduction algorithms. A C++

More information

Clustering. Unsupervised Learning

Clustering. Unsupervised Learning Clustering. Unsupervised Learning Maria-Florina Balcan 11/05/2018 Clustering, Informal Goals Goal: Automatically partition unlabeled data into groups of similar datapoints. Question: When and why would

More information

Clustering in R d. Clustering. Widely-used clustering methods. The k-means optimization problem CSE 250B

Clustering in R d. Clustering. Widely-used clustering methods. The k-means optimization problem CSE 250B Clustering in R d Clustering CSE 250B Two common uses of clustering: Vector quantization Find a finite set of representatives that provides good coverage of a complex, possibly infinite, high-dimensional

More information

Local Algorithms for Sparse Spanning Graphs

Local Algorithms for Sparse Spanning Graphs Local Algorithms for Sparse Spanning Graphs Reut Levi Dana Ron Ronitt Rubinfeld Intro slides based on a talk given by Reut Levi Minimum Spanning Graph (Spanning Tree) Local Access to a Minimum Spanning

More information

CS 580: Algorithm Design and Analysis. Jeremiah Blocki Purdue University Spring 2018

CS 580: Algorithm Design and Analysis. Jeremiah Blocki Purdue University Spring 2018 CS 580: Algorithm Design and Analysis Jeremiah Blocki Purdue University Spring 2018 Chapter 11 Approximation Algorithms Slides by Kevin Wayne. Copyright @ 2005 Pearson-Addison Wesley. All rights reserved.

More information

SLS Methods: An Overview

SLS Methods: An Overview HEURSTC OPTMZATON SLS Methods: An Overview adapted from slides for SLS:FA, Chapter 2 Outline 1. Constructive Heuristics (Revisited) 2. terative mprovement (Revisited) 3. Simple SLS Methods 4. Hybrid SLS

More information

Informed search. Soleymani. CE417: Introduction to Artificial Intelligence Sharif University of Technology Spring 2016

Informed search. Soleymani. CE417: Introduction to Artificial Intelligence Sharif University of Technology Spring 2016 Informed search CE417: Introduction to Artificial Intelligence Sharif University of Technology Spring 2016 Soleymani Artificial Intelligence: A Modern Approach, Chapter 3 Outline Best-first search Greedy

More information

Informed Search A* Algorithm

Informed Search A* Algorithm Informed Search A* Algorithm CE417: Introduction to Artificial Intelligence Sharif University of Technology Spring 2018 Soleymani Artificial Intelligence: A Modern Approach, Chapter 3 Most slides have

More information

CSE 417 Branch & Bound (pt 4) Branch & Bound

CSE 417 Branch & Bound (pt 4) Branch & Bound CSE 417 Branch & Bound (pt 4) Branch & Bound Reminders > HW8 due today > HW9 will be posted tomorrow start early program will be slow, so debugging will be slow... Review of previous lectures > Complexity

More information

CS60003 Algorithm Design and Analysis, Autumn

CS60003 Algorithm Design and Analysis, Autumn CS60003 Algorithm Design and Analysis, Autumn 2009 10 Mid-Semester Test Maximum marks: 45 September 20, 2009 Total time: 2 hours Roll no: Name: [ Write your answers in the question paper itself. Be brief

More information

Parallel Computing in Combinatorial Optimization

Parallel Computing in Combinatorial Optimization Parallel Computing in Combinatorial Optimization Bernard Gendron Université de Montréal gendron@iro.umontreal.ca Course Outline Objective: provide an overview of the current research on the design of parallel

More information

Theorem 2.9: nearest addition algorithm

Theorem 2.9: nearest addition algorithm There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used

More information

11. APPROXIMATION ALGORITHMS

11. APPROXIMATION ALGORITHMS 11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: vertex cover LP rounding: vertex cover generalized load balancing knapsack problem Lecture slides by Kevin Wayne Copyright 2005

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms Given an NP-hard problem, what should be done? Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one of three desired features. Solve problem to optimality.

More information

Crash-Starting the Simplex Method

Crash-Starting the Simplex Method Crash-Starting the Simplex Method Ivet Galabova Julian Hall School of Mathematics, University of Edinburgh Optimization Methods and Software December 2017 Ivet Galabova, Julian Hall Crash-Starting Simplex

More information

Outline. CS38 Introduction to Algorithms. Approximation Algorithms. Optimization Problems. Set Cover. Set cover 5/29/2014. coping with intractibility

Outline. CS38 Introduction to Algorithms. Approximation Algorithms. Optimization Problems. Set Cover. Set cover 5/29/2014. coping with intractibility Outline CS38 Introduction to Algorithms Lecture 18 May 29, 2014 coping with intractibility approximation algorithms set cover TSP center selection randomness in algorithms May 29, 2014 CS38 Lecture 18

More information

NP Completeness. Andreas Klappenecker [partially based on slides by Jennifer Welch]

NP Completeness. Andreas Klappenecker [partially based on slides by Jennifer Welch] NP Completeness Andreas Klappenecker [partially based on slides by Jennifer Welch] Dealing with NP-Complete Problems Dealing with NP-Completeness Suppose the problem you need to solve is NP-complete. What

More information

COMP Analysis of Algorithms & Data Structures

COMP Analysis of Algorithms & Data Structures COMP 3170 - Analysis of Algorithms & Data Structures Shahin Kamali Approximation Algorithms CLRS 35.1-35.5 University of Manitoba COMP 3170 - Analysis of Algorithms & Data Structures 1 / 30 Approaching

More information

Numerical Robustness. The implementation of adaptive filtering algorithms on a digital computer, which inevitably operates using finite word-lengths,

Numerical Robustness. The implementation of adaptive filtering algorithms on a digital computer, which inevitably operates using finite word-lengths, 1. Introduction Adaptive filtering techniques are used in a wide range of applications, including echo cancellation, adaptive equalization, adaptive noise cancellation, and adaptive beamforming. These

More information

1. Sorting (assuming sorting into ascending order) a) BUBBLE SORT

1. Sorting (assuming sorting into ascending order) a) BUBBLE SORT DECISION 1 Revision Notes 1. Sorting (assuming sorting into ascending order) a) BUBBLE SORT Make sure you show comparisons clearly and label each pass First Pass 8 4 3 6 1 4 8 3 6 1 4 3 8 6 1 4 3 6 8 1

More information

Informed Search Methods

Informed Search Methods Informed Search Methods How can we improve searching strategy by using intelligence? Map example: Heuristic: Expand those nodes closest in as the crow flies distance to goal 8-puzzle: Heuristic: Expand

More information

Informed search algorithms. Chapter 3 (Based on Slides by Stuart Russell, Dan Klein, Richard Korf, Subbarao Kambhampati, and UW-AI faculty)

Informed search algorithms. Chapter 3 (Based on Slides by Stuart Russell, Dan Klein, Richard Korf, Subbarao Kambhampati, and UW-AI faculty) Informed search algorithms Chapter 3 (Based on Slides by Stuart Russell, Dan Klein, Richard Korf, Subbarao Kambhampati, and UW-AI faculty) Intuition, like the rays of the sun, acts only in an inflexibly

More information

Data Replication in the Quality Space

Data Replication in the Quality Space Data Replication in the Quality Space Yicheng Tu April 1, 2008 At Commnet USF Roadmap Introduction Static data replication Dynamic data replication Experimental (simulation) results Summary Data Replication

More information

Search: Advanced Topics and Conclusion

Search: Advanced Topics and Conclusion Search: Advanced Topics and Conclusion CPSC 322 Lecture 8 January 20, 2006 Textbook 2.6 Search: Advanced Topics and Conclusion CPSC 322 Lecture 8, Slide 1 Lecture Overview Recap Branch & Bound A Tricks

More information

Discussion. What problems stretch the limits of computation? Compare 4 Algorithms. What is Brilliance? 11/11/11

Discussion. What problems stretch the limits of computation? Compare 4 Algorithms. What is Brilliance? 11/11/11 11/11/11 UNIVERSITY of WISCONSIN-MADISON Computer Sciences Department CS 0: Introduction to Computation Discussion Professor Andrea Arpaci-Dusseau Is there an inherent difference between What problems

More information

Clustering. Unsupervised Learning

Clustering. Unsupervised Learning Clustering. Unsupervised Learning Maria-Florina Balcan 04/06/2015 Reading: Chapter 14.3: Hastie, Tibshirani, Friedman. Additional resources: Center Based Clustering: A Foundational Perspective. Awasthi,

More information

Giovanni De Micheli. Integrated Systems Centre EPF Lausanne

Giovanni De Micheli. Integrated Systems Centre EPF Lausanne Two-level Logic Synthesis and Optimization Giovanni De Micheli Integrated Systems Centre EPF Lausanne This presentation can be used for non-commercial purposes as long as this note and the copyright footers

More information

Wireless Sensor Networks 22nd Lecture

Wireless Sensor Networks 22nd Lecture Wireless Sensor Networks 22nd Lecture 24.01.2007 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Options for topology control Topology control Control node activity deliberately turn on/off

More information

Search: Advanced Topics and Conclusion

Search: Advanced Topics and Conclusion Search: Advanced Topics and Conclusion CPSC 322 Lecture 8 January 24, 2007 Textbook 2.6 Search: Advanced Topics and Conclusion CPSC 322 Lecture 8, Slide 1 Lecture Overview 1 Recap 2 Branch & Bound 3 A

More information

Informed search algorithms. Chapter 4

Informed search algorithms. Chapter 4 Informed search algorithms Chapter 4 Material Chapter 4 Section 1 - Exclude memory-bounded heuristic search 3 Outline Best-first search Greedy best-first search A * search Heuristics Local search algorithms

More information

A and Branch-and-Bound Search

A and Branch-and-Bound Search A and Branch-and-Bound Search CPSC 322 Lecture 7 January 17, 2006 Textbook 2.5 A and Branch-and-Bound Search CPSC 322 Lecture 7, Slide 1 Lecture Overview Recap A Search Optimality of A Optimal Efficiency

More information

Artificial Intelligence

Artificial Intelligence Artificial Intelligence Informed Search and Exploration Chapter 4 (4.1 4.2) A General Search algorithm: Chapter 3: Search Strategies Task : Find a sequence of actions leading from the initial state to

More information

CHAPTER 3 A TIME-DEPENDENT k-shortest PATH ALGORITHM FOR ATIS APPLICATIONS

CHAPTER 3 A TIME-DEPENDENT k-shortest PATH ALGORITHM FOR ATIS APPLICATIONS CHAPTER 3 A TIME-DEPENDENT k-shortest PATH ALGORITHM FOR ATIS APPLICATIONS 3.1. Extension of a Static k-sp Algorithm to the Time-Dependent Case Kaufman and Smith [1993] showed that under the consistency

More information

COMP 355 Advanced Algorithms Approximation Algorithms: VC and TSP Chapter 11 (KT) Section (CLRS)

COMP 355 Advanced Algorithms Approximation Algorithms: VC and TSP Chapter 11 (KT) Section (CLRS) COMP 355 Advanced Algorithms Approximation Algorithms: VC and TSP Chapter 11 (KT) Section 35.1-35.2(CLRS) 1 Coping with NP-Completeness Brute-force search: This is usually only a viable option for small

More information

Lecture 9: (Semi-)bandits and experts with linear costs (part I)

Lecture 9: (Semi-)bandits and experts with linear costs (part I) CMSC 858G: Bandits, Experts and Games 11/03/16 Lecture 9: (Semi-)bandits and experts with linear costs (part I) Instructor: Alex Slivkins Scribed by: Amr Sharaf In this lecture, we will study bandit problems

More information

INTRODUCTION TO HEURISTIC SEARCH

INTRODUCTION TO HEURISTIC SEARCH INTRODUCTION TO HEURISTIC SEARCH What is heuristic search? Given a problem in which we must make a series of decisions, determine the sequence of decisions which provably optimizes some criterion. What

More information

MVE165/MMG630, Applied Optimization Lecture 8 Integer linear programming algorithms. Ann-Brith Strömberg

MVE165/MMG630, Applied Optimization Lecture 8 Integer linear programming algorithms. Ann-Brith Strömberg MVE165/MMG630, Integer linear programming algorithms Ann-Brith Strömberg 2009 04 15 Methods for ILP: Overview (Ch. 14.1) Enumeration Implicit enumeration: Branch and bound Relaxations Decomposition methods:

More information

Heuristic Search and Advanced Methods

Heuristic Search and Advanced Methods Heuristic Search and Advanced Methods Computer Science cpsc322, Lecture 3 (Textbook Chpt 3.6 3.7) May, 15, 2012 CPSC 322, Lecture 3 Slide 1 Course Announcements Posted on WebCT Assignment1 (due on Thurs!)

More information

Module 6 NP-Complete Problems and Heuristics

Module 6 NP-Complete Problems and Heuristics Module 6 NP-Complete Problems and Heuristics Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu P, NP-Problems Class

More information

Solving the Euclidean Steiner Tree Problem in n-space

Solving the Euclidean Steiner Tree Problem in n-space Solving the Euclidean Steiner Tree Problem in n-space Marcia Fampa (UFRJ), Jon Lee (U. Michigan), and Wendel Melo (UFRJ) January 2015 Marcia Fampa, Jon Lee, Wendel Melo Solving the Euclidean Steiner Tree

More information

Informed search algorithms

Informed search algorithms Artificial Intelligence Topic 4 Informed search algorithms Best-first search Greedy search A search Admissible heuristics Memory-bounded search IDA SMA Reading: Russell and Norvig, Chapter 4, Sections

More information

Branch-price-and-cut for vehicle routing. Guy Desaulniers

Branch-price-and-cut for vehicle routing. Guy Desaulniers Guy Desaulniers Professor, Polytechnique Montréal, Canada Director, GERAD, Canada VeRoLog PhD School 2018 Cagliari, Italy, June 2, 2018 Outline 1 VRPTW definition 2 Mathematical formulations Arc-flow formulation

More information

Λέων-Χαράλαμπος Σταματάρης

Λέων-Χαράλαμπος Σταματάρης Λέων-Χαράλαμπος Σταματάρης INTRODUCTION Two classical problems of information dissemination in computer networks: The broadcasting problem: Distributing a particular message from a distinguished source

More information

Introduction to Approximation Algorithms

Introduction to Approximation Algorithms Introduction to Approximation Algorithms Dr. Gautam K. Das Departmet of Mathematics Indian Institute of Technology Guwahati, India gkd@iitg.ernet.in February 19, 2016 Outline of the lecture Background

More information

Clustering. Unsupervised Learning

Clustering. Unsupervised Learning Clustering. Unsupervised Learning Maria-Florina Balcan 03/02/2016 Clustering, Informal Goals Goal: Automatically partition unlabeled data into groups of similar datapoints. Question: When and why would

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

Approximation Algorithms for Clustering Uncertain Data

Approximation Algorithms for Clustering Uncertain Data Approximation Algorithms for Clustering Uncertain Data Graham Cormode AT&T Labs - Research graham@research.att.com Andrew McGregor UCSD / MSR / UMass Amherst andrewm@ucsd.edu Introduction Many applications

More information

Constructive and destructive algorithms

Constructive and destructive algorithms Constructive and destructive algorithms Heuristic algorithms Giovanni Righini University of Milan Department of Computer Science (Crema) Constructive algorithms In combinatorial optimization problems every

More information

A GPU Implementation of a Jacobi Method for Lattice Basis Reduction

A GPU Implementation of a Jacobi Method for Lattice Basis Reduction A GPU Implementation of a Jacobi Method for Lattice Basis Reduction Filip Jeremic and Sanzheng Qiao Department of Computing and Software McMaster University Hamilton, Ontario, Canada June 25, 2013 Abstract

More information

Direct Routing: Algorithms and Complexity

Direct Routing: Algorithms and Complexity Direct Routing: Algorithms and Complexity Costas Busch, RPI Malik Magdon-Ismail, RPI Marios Mavronicolas, Univ. Cyprus Paul Spirakis, Univ. Patras 1 Outline 1. Direct Routing. 2. Direct Routing is Hard.

More information

The Size Robust Multiple Knapsack Problem

The Size Robust Multiple Knapsack Problem MASTER THESIS ICA-3251535 The Size Robust Multiple Knapsack Problem Branch and Price for the Separate and Combined Recovery Decomposition Model Author: D.D. Tönissen, Supervisors: dr. ir. J.M. van den

More information

3 Euler Tours, Hamilton Cycles, and Their Applications

3 Euler Tours, Hamilton Cycles, and Their Applications 3 Euler Tours, Hamilton Cycles, and Their Applications 3.1 Euler Tours and Applications 3.1.1 Euler tours Carefully review the definition of (closed) walks, trails, and paths from Section 1... Definition

More information

Module 6 P, NP, NP-Complete Problems and Approximation Algorithms

Module 6 P, NP, NP-Complete Problems and Approximation Algorithms Module 6 P, NP, NP-Complete Problems and Approximation Algorithms Dr. Natarajan Meghanathan Associate Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu

More information

Informed search algorithms. (Based on slides by Oren Etzioni, Stuart Russell)

Informed search algorithms. (Based on slides by Oren Etzioni, Stuart Russell) Informed search algorithms (Based on slides by Oren Etzioni, Stuart Russell) The problem # Unique board configurations in search space 8-puzzle 9! = 362880 15-puzzle 16! = 20922789888000 10 13 24-puzzle

More information

Slides on Approximation algorithms, part 2: Basic approximation algorithms

Slides on Approximation algorithms, part 2: Basic approximation algorithms Approximation slides Slides on Approximation algorithms, part : Basic approximation algorithms Guy Kortsarz Approximation slides Finding a lower bound; the TSP example The optimum TSP cycle P is an edge

More information

Algorithm Design and Analysis

Algorithm Design and Analysis Algorithm Design and Analysis LECTURE 29 Approximation Algorithms Load Balancing Weighted Vertex Cover Reminder: Fill out SRTEs online Don t forget to click submit Sofya Raskhodnikova 12/7/2016 Approximation

More information

A.I.: Informed Search Algorithms. Chapter III: Part Deux

A.I.: Informed Search Algorithms. Chapter III: Part Deux A.I.: Informed Search Algorithms Chapter III: Part Deux Best-first search Greedy best-first search A * search Heuristics Outline Overview Informed Search: uses problem-specific knowledge. General approach:

More information

Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key

Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key Christine van Vredendaal Eindhoven, University of Technology c.v.vredendaal@tue.nl Twelfth Algorithmic Number Theory Symposium University

More information

Examples of P vs NP: More Problems

Examples of P vs NP: More Problems Examples of P vs NP: More Problems COMP1600 / COMP6260 Dirk Pattinson Australian National University Semester 2, 2017 Catch Up / Drop in Lab When Fridays, 15.00-17.00 Where N335, CSIT Building (bldg 108)

More information

Informed Search Algorithms

Informed Search Algorithms Informed Search Algorithms CITS3001 Algorithms, Agents and Artificial Intelligence Tim French School of Computer Science and Software Engineering The University of Western Australia 2017, Semester 2 Introduction

More information

FPLLL. fpylll. Martin R. Albrecht 2017/07/06

FPLLL. fpylll. Martin R. Albrecht 2017/07/06 FPLLL fpylll Martin R. Albrecht 2017/07/06 Outline How Implementation What Contributing FPYLLL fpylll is a Python (2 and 3) library for performing lattice reduction on lattices over the Integers It is

More information

Some graph theory applications. communications networks

Some graph theory applications. communications networks Some graph theory applications to communications networks Keith Briggs Keith.Briggs@bt.com http://keithbriggs.info Computational Systems Biology Group, Sheffield - 2006 Nov 02 1100 graph problems Sheffield

More information

Constraint Satisfaction Problems

Constraint Satisfaction Problems Constraint Satisfaction Problems Search and Lookahead Bernhard Nebel, Julien Hué, and Stefan Wölfl Albert-Ludwigs-Universität Freiburg June 4/6, 2012 Nebel, Hué and Wölfl (Universität Freiburg) Constraint

More information

Towards more efficient infection and fire fighting

Towards more efficient infection and fire fighting Towards more efficient infection and fire fighting Peter Floderus Andrzej Lingas Mia Persson The Centre for Mathematical Sciences, Lund University, 00 Lund, Sweden. Email: pflo@maths.lth.se Department

More information

Applications. Foreground / background segmentation Finding skin-colored regions. Finding the moving objects. Intelligent scissors

Applications. Foreground / background segmentation Finding skin-colored regions. Finding the moving objects. Intelligent scissors Segmentation I Goal Separate image into coherent regions Berkeley segmentation database: http://www.eecs.berkeley.edu/research/projects/cs/vision/grouping/segbench/ Slide by L. Lazebnik Applications Intelligent

More information

11. APPROXIMATION ALGORITHMS

11. APPROXIMATION ALGORITHMS Coping with NP-completeness 11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: weighted vertex cover LP rounding: weighted vertex cover generalized load balancing knapsack problem

More information

Generalized Weapon Target Assignment Problem

Generalized Weapon Target Assignment Problem Superior Products Through Innovation Generalized Weapon Target Assignment Problem J. Rosenberger, P. Hwang, R. Pallerla, UTA A. Yucel, R. Wilson, E. Brungardt, LM Aero presented at 10 th ICCRTS, McLean,

More information

A Low Complexity ZF-Based Lattice Reduction Detection Using Curtailment Parameter in MIMO Systems

A Low Complexity ZF-Based Lattice Reduction Detection Using Curtailment Parameter in MIMO Systems A Low Complexity ZF-Based Lattice Reduction Detection Using Curtailment Parameter in MIMO Systems Daisuke Mitsunaga, Thae Thae Yu Khine and Hua-An Zhao Department of Computer Science and Electrical Engineering,

More information

Informed search algorithms. (Based on slides by Oren Etzioni, Stuart Russell)

Informed search algorithms. (Based on slides by Oren Etzioni, Stuart Russell) Informed search algorithms (Based on slides by Oren Etzioni, Stuart Russell) Outline Greedy best-first search A * search Heuristics Local search algorithms Hill-climbing search Simulated annealing search

More information

1 Unweighted Set Cover

1 Unweighted Set Cover Comp 60: Advanced Algorithms Tufts University, Spring 018 Prof. Lenore Cowen Scribe: Yuelin Liu Lecture 7: Approximation Algorithms: Set Cover and Max Cut 1 Unweighted Set Cover 1.1 Formulations There

More information

4 INFORMED SEARCH AND EXPLORATION. 4.1 Heuristic Search Strategies

4 INFORMED SEARCH AND EXPLORATION. 4.1 Heuristic Search Strategies 55 4 INFORMED SEARCH AND EXPLORATION We now consider informed search that uses problem-specific knowledge beyond the definition of the problem itself This information helps to find solutions more efficiently

More information

THE LEAFAGE OF A CHORDAL GRAPH

THE LEAFAGE OF A CHORDAL GRAPH Discussiones Mathematicae Graph Theory 18 (1998 ) 23 48 THE LEAFAGE OF A CHORDAL GRAPH In-Jen Lin National Ocean University, Taipei, Taiwan Terry A. McKee 1 Wright State University, Dayton, OH 45435-0001,

More information

An Introduction to Dual Ascent Heuristics

An Introduction to Dual Ascent Heuristics An Introduction to Dual Ascent Heuristics Introduction A substantial proportion of Combinatorial Optimisation Problems (COPs) are essentially pure or mixed integer linear programming. COPs are in general

More information

Example: Bioinformatics. Soft Constraint Processing. From Optimal CSP to Soft CSP. Overview. From Optimal CSP to Soft CSP.

Example: Bioinformatics. Soft Constraint Processing. From Optimal CSP to Soft CSP. Overview. From Optimal CSP to Soft CSP. Example: Bioinformatics Soft Constraint Processing 16.412J/6.834J Cognitive Robotics Martin Sachenbacher (Using material from Thomas Schiex) RNA is single-strand molecule, composed of A,U,G,C Function

More information

Clustering. Introduction to Data Science University of Colorado Boulder SLIDES ADAPTED FROM LAUREN HANNAH

Clustering. Introduction to Data Science University of Colorado Boulder SLIDES ADAPTED FROM LAUREN HANNAH Clustering Introduction to Data Science University of Colorado Boulder SLIDES ADAPTED FROM LAUREN HANNAH Introduction to Data Science Boulder Clustering 1 of 9 Clustering Lab Review of k-means Work through

More information

Math 381 Discrete Mathematical Modeling

Math 381 Discrete Mathematical Modeling Math 381 Discrete Mathematical Modeling Sean Griffin Today: -Equipment Replacement Problem -Min Spanning Tree Problem -Clustering Friday s Plan Intro to LPSolve software Download before class (link on

More information

Optimal Crane Scheduling

Optimal Crane Scheduling Optimal Crane Scheduling IonuŃ Aron Iiro Harjunkoski John Hooker Latife Genç Kaya March 2007 1 Problem Schedule 2 cranes to transfer material between locations in a manufacturing plant. For example, copper

More information

11. APPROXIMATION ALGORITHMS

11. APPROXIMATION ALGORITHMS 11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: vertex cover LP rounding: vertex cover generalized load balancing knapsack problem Lecture slides by Kevin Wayne Copyright 2005

More information

Job-shop scheduling with limited capacity buffers

Job-shop scheduling with limited capacity buffers Job-shop scheduling with limited capacity buffers Peter Brucker, Silvia Heitmann University of Osnabrück, Department of Mathematics/Informatics Albrechtstr. 28, D-49069 Osnabrück, Germany {peter,sheitman}@mathematik.uni-osnabrueck.de

More information

Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures Oded Regev (Tel Aviv University and CNRS, ENS-Paris)

Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures Oded Regev (Tel Aviv University and CNRS, ENS-Paris) Winter School on Lattice-Based Cryptography and Applications Bar-Ilan University, Israel 20/2/2012 Learning a Parallelepiped: Bar-Ilan University Dept. of Computer Science Cryptanalysis of GGH and NTRU

More information

Learning Objectives. c D. Poole and A. Mackworth 2010 Artificial Intelligence, Lecture 3.5, Page 1

Learning Objectives. c D. Poole and A. Mackworth 2010 Artificial Intelligence, Lecture 3.5, Page 1 Learning Objectives At the end of the class you should be able to: justify why depth-bounded search is useful demonstrate how iterative-deepening works for a particular problem demonstrate how depth-first

More information

Copyright 2000, Kevin Wayne 1

Copyright 2000, Kevin Wayne 1 Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple

More information

Heuristic Optimisation

Heuristic Optimisation Heuristic Optimisation Part 3: Classification of algorithms. Exhaustive search Sándor Zoltán Németh http://web.mat.bham.ac.uk/s.z.nemeth s.nemeth@bham.ac.uk University of Birmingham S Z Németh (s.nemeth@bham.ac.uk)

More information

Integer and Combinatorial Optimization

Integer and Combinatorial Optimization Integer and Combinatorial Optimization GEORGE NEMHAUSER School of Industrial and Systems Engineering Georgia Institute of Technology Atlanta, Georgia LAURENCE WOLSEY Center for Operations Research and

More information

TELCOM2125: Network Science and Analysis

TELCOM2125: Network Science and Analysis School of Information Sciences University of Pittsburgh TELCOM2125: Network Science and Analysis Konstantinos Pelechrinis Spring 2015 2 Part 4: Dividing Networks into Clusters The problem l Graph partitioning

More information

Informed (Heuristic) Search. Idea: be smart about what paths to try.

Informed (Heuristic) Search. Idea: be smart about what paths to try. Informed (Heuristic) Search Idea: be smart about what paths to try. 1 Blind Search vs. Informed Search What s the difference? How do we formally specify this? A node is selected for expansion based on

More information

Lecture 2 The k-means clustering problem

Lecture 2 The k-means clustering problem CSE 29: Unsupervised learning Spring 2008 Lecture 2 The -means clustering problem 2. The -means cost function Last time we saw the -center problem, in which the input is a set S of data points and the

More information

Boosting Simple Model Selection Cross Validation Regularization. October 3 rd, 2007 Carlos Guestrin [Schapire, 1989]

Boosting Simple Model Selection Cross Validation Regularization. October 3 rd, 2007 Carlos Guestrin [Schapire, 1989] Boosting Simple Model Selection Cross Validation Regularization Machine Learning 10701/15781 Carlos Guestrin Carnegie Mellon University October 3 rd, 2007 1 Boosting [Schapire, 1989] Idea: given a weak

More information

CS-171, Intro to A.I. Mid-term Exam Fall Quarter, 2013

CS-171, Intro to A.I. Mid-term Exam Fall Quarter, 2013 CS-171, Intro to A.I. Mid-term Exam Fall Quarter, 2013 YOUR NAME AND ID NUMBER: YOUR ID: ID TO RIGHT: ROW: NO. FROM RIGHT: The exam will begin on the next page. Please, do not turn the page until told.

More information

CSE 5243 INTRO. TO DATA MINING

CSE 5243 INTRO. TO DATA MINING CSE 5243 INTRO. TO DATA MINING Cluster Analysis: Basic Concepts and Methods Huan Sun, CSE@The Ohio State University Slides adapted from UIUC CS412, Fall 2017, by Prof. Jiawei Han 2 Chapter 10. Cluster

More information

Informed search algorithms. Chapter 4

Informed search algorithms. Chapter 4 Informed search algorithms Chapter 4 Outline Best-first search Greedy best-first search A * search Heuristics Memory Bounded A* Search Best-first search Idea: use an evaluation function f(n) for each node

More information

Modularity CMSC 858L

Modularity CMSC 858L Modularity CMSC 858L Module-detection for Function Prediction Biological networks generally modular (Hartwell+, 1999) We can try to find the modules within a network. Once we find modules, we can look

More information

Polytopes Course Notes

Polytopes Course Notes Polytopes Course Notes Carl W. Lee Department of Mathematics University of Kentucky Lexington, KY 40506 lee@ms.uky.edu Fall 2013 i Contents 1 Polytopes 1 1.1 Convex Combinations and V-Polytopes.....................

More information

Selected Topics in Column Generation

Selected Topics in Column Generation Selected Topics in Column Generation February 1, 2007 Choosing a solver for the Master Solve in the dual space(kelly s method) by applying a cutting plane algorithm In the bundle method(lemarechal), a

More information

Chapter 5 Graph Algorithms Algorithm Theory WS 2012/13 Fabian Kuhn

Chapter 5 Graph Algorithms Algorithm Theory WS 2012/13 Fabian Kuhn Chapter 5 Graph Algorithms Algorithm Theory WS 2012/13 Fabian Kuhn Graphs Extremely important concept in computer science Graph, : node (or vertex) set : edge set Simple graph: no self loops, no multiple

More information

Incremental Query Optimization

Incremental Query Optimization Incremental Query Optimization Vipul Venkataraman Dr. S. Sudarshan Computer Science and Engineering Indian Institute of Technology Bombay Outline Introduction Volcano Cascades Incremental Optimization

More information