The BKZ algorithm. Joop van de Pol
|
|
- Pearl Miles
- 5 years ago
- Views:
Transcription
1 The BKZ algorithm Department of Computer Science, University f Bristol, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB United Kingdom. May 9th, 2014 The BKZ algorithm Slide 1
2 utline Lattices Basis Reduction LLL BKZ Enumeration BKZ 2.0 pen questions The BKZ algorithm Slide 2
3 Lattices b 2 b 1 Lattices are represented by a basis. The BKZ algorithm Slide 3
4 Lattices Lattices are represented by a basis. This basis is not unique. The BKZ algorithm Slide 3
5 Lattices Lattices are represented by a basis. This basis is not unique. Many bases span the same lattice. Some are better than others. The BKZ algorithm Slide 3
6 Lattices Lattice problems are about finding short and close vectors. The BKZ algorithm Slide 3
7 Lattices Lattice problems are about finding short and close vectors. The BKZ algorithm Slide 3
8 Lattices Lattice problems are about finding short and close vectors. In practice it suffices to find short and orthogonal basis vectors. The BKZ algorithm Slide 3
9 Gram-Schmidt Iterative process to orthonormalize a set of vectors b 1,..., b d : b 1 := b 1 b i i 1 := b i µ ij b j, where µ ij = b i, b j b for all 1 j < i d. j 2 j=1 Result: vectors b 1,..., b d that are pairwise orthogonal. They span the same space as b 1,..., b d. The BKZ algorithm Slide 4
10 Gram-Schmidt Iterative process to orthonormalize a set of vectors b 1,..., b d : b 1 := b 1 b i i 1 := b i µ ij b j, where µ ij = b i, b j b for all 1 j < i d. j 2 j=1 Result: vectors b 1,..., b d that are pairwise orthogonal. They span the same space as b 1,..., b d. In lattices: only integral combinations are allowed, b 1,..., b d span the same lattice! will not The BKZ algorithm Slide 4
11 Gram-Schmidt b 2 b 1 The BKZ algorithm Slide 5
12 Gram-Schmidt b 2 b 1 = b 1 Forget that we are in a lattice. The BKZ algorithm Slide 5
13 Gram-Schmidt b 2 b 1 = b 1 b 2 Projecting b 2 gives b 2. The BKZ algorithm Slide 5
14 Gram-Schmidt b 2 b 1 = b 1 b 2 b 2 is not a lattice vector. The BKZ algorithm Slide 5
15 Gram-Schmidt b 2 b 1 = b 1 b 2 But there is a lattice vector within 1 2 b 1 from b 2 : b 2 := b 2 µ 2,1 b 1. The BKZ algorithm Slide 5
16 Gram-Schmidt b 2 b 1 = b 1 b 2 b 2 It is always possible to choose a basis close to the Gram Schmidt vectors. This basis is called size-reduced. The BKZ algorithm Slide 5
17 LLL (1982) First polynomial-time basis reduction algorithm. Ideas: Always take the basis closest to Gram-Schmidt. The BKZ algorithm Slide 6
18 LLL (1982) First polynomial-time basis reduction algorithm. Ideas: Always take the basis closest to Gram-Schmidt. Improve Gram-Schmidt vectors by changing their order. The BKZ algorithm Slide 6
19 LLL (1982) First polynomial-time basis reduction algorithm. Ideas: Always take the basis closest to Gram-Schmidt. Improve Gram-Schmidt vectors by changing their order. Being greedy when ordering basis vectors is bad for the complexity. b 1,..., b i, b i+1,..., b d b 1,..., b i, b i+1,..., b d The BKZ algorithm Slide 6
20 LLL (1982) First polynomial-time basis reduction algorithm. Ideas: Always take the basis closest to Gram-Schmidt. Improve Gram-Schmidt vectors by changing their order. Being greedy when ordering basis vectors is bad for the complexity. b 1,..., b i, b i+1,..., b d b 1,..., b i, b i+1,..., b d What happens when b i and b i+1 are swapped? nly b i and b i+1 change. New b i becomes b i+1 + µ i+1,ib i. The BKZ algorithm Slide 6
21 LLL (1982) First polynomial-time basis reduction algorithm. Ideas: Always take the basis closest to Gram-Schmidt. Improve Gram-Schmidt vectors by changing their order. Being greedy when ordering basis vectors is bad for the complexity. b 1,..., b i, b i+1,..., b d b 1,..., b i, b i+1,..., b d What happens when b i and b i+1 are swapped? nly b i and b i+1 change. New b i becomes b i+1 + µ i+1,ib i. Swap when b i+1 + µ i+1,ib i 2 < δ b i 2, for δ (1/4, 1). The BKZ algorithm Slide 6
22 BKZ (1987, 1994) Trade-off between basis quality and time. b 1,..., b i, b i+1,..., b i+β 1,..., b d b 1,..., b i, b i+1,..., b i+β 1,..., b d The BKZ algorithm Slide 7
23 BKZ (1987, 1994) Trade-off between basis quality and time. b 1,..., b i, b i+1,..., b i+β 1,..., b d b 1,..., b i, b i+1,..., b i+β 1,..., b d Compute b new, a combination of vectors b i, b i+1,..., b i+β 1 such that it becomes the shortest possible i th Gram-Schmidt vector. The BKZ algorithm Slide 7
24 BKZ (1987, 1994) Trade-off between basis quality and time. b 1,..., b i, b i+1,..., b i+β 1,..., b d b 1,..., b i, b i+1,..., b i+β 1,..., b d Compute b new, a combination of vectors b i, b i+1,..., b i+β 1 such that it becomes the shortest possible i th Gram-Schmidt vector. If b new 2 < δ b i 2, insert b new into the basis: b 1,..., b i 1, b new, b i,..., b d The BKZ algorithm Slide 7
25 BKZ (1987, 1994) Trade-off between basis quality and time. b 1,..., b i, b i+1,..., b i+β 1,..., b d b 1,..., b i, b i+1,..., b i+β 1,..., b d Compute b new, a combination of vectors b i, b i+1,..., b i+β 1 such that it becomes the shortest possible i th Gram-Schmidt vector. If b new 2 < δ b i 2, insert b new into the basis: b 1,..., b i 1, b new, b i,..., b d Now LLL is used to remove the linear dependency created by the extra vector. BKZ moves cyclically through the basis indices i. The BKZ algorithm Slide 7
26 BKZ (1987, 1994) Trade-off between basis quality and time. b 1,..., b i, b i+1,..., b i+β 1,..., b d b 1,..., b i, b i+1,..., b i+β 1,..., b d Compute b new, a combination of vectors b i, b i+1,..., b i+β 1 such that it becomes the shortest possible i th Gram-Schmidt vector. If b new 2 < δ b i 2, insert b new into the basis: b 1,..., b i 1, b new, b i,..., b d Now LLL is used to remove the linear dependency created by the extra vector. BKZ moves cyclically through the basis indices i. Note: we do not have a good bound on the time complexity of BKZ. The BKZ algorithm Slide 7
27 BKZ (1987, 1994) Compute b new, a combination of vectors b i, b i+1,..., b i+β 1 such that it becomes the shortest possible i th Gram-Schmidt vector. The BKZ algorithm Slide 8
28 BKZ (1987, 1994) Compute b new, a combination of vectors b i, b i+1,..., b i+β 1 such that it becomes the shortest possible i th Gram-Schmidt vector. This is equivalent to solving SVP (!) in a (projected) lattice of dimension β. BKZ uses an SVP-oracle for lower dimensions to find this vector b new. The BKZ algorithm Slide 8
29 BKZ (1987, 1994) Compute b new, a combination of vectors b i, b i+1,..., b i+β 1 such that it becomes the shortest possible i th Gram-Schmidt vector. This is equivalent to solving SVP (!) in a (projected) lattice of dimension β. BKZ uses an SVP-oracle for lower dimensions to find this vector b new. In practice enumeration is used: enumerate all lattice points within a certain radius around the origin. The BKZ algorithm Slide 8
30 Enumeration b 2 b 1 The BKZ algorithm Slide 9
31 Enumeration b 2 b 1 1) Choose a bound. The BKZ algorithm Slide 9
32 Enumeration b 2 b 1 = b 1 b 2 2) Do the Gram-Schmidt. The BKZ algorithm Slide 9
33 Enumeration b 2 b 1 = b 1 b 2 3) Project whole lattice. The BKZ algorithm Slide 9
34 Enumeration b 2 b 1 = b 1 b 2 Lattice vector within bound its projection within bound. The BKZ algorithm Slide 9
35 Enumeration b 2 b 1 = b 1 b 2 4) Enumerate all vectors in projected lattice within bound. The BKZ algorithm Slide 9
36 Enumeration b 2 b 1 = b 1 b 2 5) For each vector in projected lattice, enumerate all lattice vectors. The BKZ algorithm Slide 9
37 Enumeration b 2 b 1 = b 1 b 2 5) For each vector in projected lattice, enumerate all lattice vectors. The BKZ algorithm Slide 9
38 Enumeration b 2 b 1 = b 1 b 2 6) Pick the shortest vector. The BKZ algorithm Slide 9
39 Enumeration as a tree b 1 = b 1 b 2 Enumeration is like a tree search. The BKZ algorithm Slide 10
40 Enumeration as a tree b 1 = b 1 b 2 Enumeration is like a tree search. Each level corresponds to a projected lattice. The BKZ algorithm Slide 10
41 Enumeration as a tree b 1 = b 1 b 2 Enumeration is like a tree search. Each level corresponds to a projected lattice. The leaves correspond to lattice vectors. The BKZ algorithm Slide 10
42 Extreme pruning b 1 = b 1 b 2 Branches near the edge yield fewer leaves. The BKZ algorithm Slide 11
43 Extreme pruning b 1 = b 1 b 2 Branches near the edge yield fewer leaves. Pruning decreases the size of the tree. The BKZ algorithm Slide 11
44 Extreme pruning b 1 = b 1 b 2 Branches near the edge yield fewer leaves. Pruning decreases the size of the tree. It might also remove the solutions. The BKZ algorithm Slide 11
45 Extreme pruning b 1 = b 1 b 2 Extreme pruning: probability p of finding the solution, but more than p 1 times faster. The BKZ algorithm Slide 11
46 Extreme pruning b 1 = b 1 b 2 Extreme pruning: probability p of finding the solution, but more than p 1 times faster. This gives a speed-up of 2 d/2. The BKZ algorithm Slide 11
47 BKZ 2.0 Extreme pruning requires a good bound on the length of the shortest vector. For small β the Gaussian Heuristic does not hold. The BKZ algorithm Slide 12
48 BKZ 2.0 Extreme pruning requires a good bound on the length of the shortest vector. For small β the Gaussian Heuristic does not hold. For β > 40, the projected lattices behave like random lattices. The Gaussian Heuristic gives us a good bound. The BKZ algorithm Slide 12
49 BKZ 2.0 Extreme pruning requires a good bound on the length of the shortest vector. For small β the Gaussian Heuristic does not hold. For β > 40, the projected lattices behave like random lattices. The Gaussian Heuristic gives us a good bound. Chen and Nguyen proposed BKZ 2.0 with the following improvements over the original: Better enumeration bound Extreme pruning Aborting BKZ after a fixed number of rounds Better preprocessing of the blocks The BKZ algorithm Slide 12
50 pen questions Regarding BKZ (2.0): Many heuristics. What can we prove? Destroys local structure for global improvement. Can this be done better? What about structured (ideal) lattices? Can we speed it up using a quantum computer? In general: Are there better classical algorithms? What about quantum algorithms? The BKZ algorithm Slide 13
51 Questions? The BKZ algorithm Slide 14
Predicting Lattice reduction
Predicting Lattice reduction Nicolas Gama, Phong Nguyen Ecole Normale Supérieure,CNRS,INRIA, France. April 14, 2008 Nicolas Gama, Phong Nguyen (Ecole Normale Supérieure,CNRS,INRIA, Predicting Lattice reduction
More informationCAD Algorithms. Categorizing Algorithms
CAD Algorithms Categorizing Algorithms Mohammad Tehranipoor ECE Department 2 September 2008 1 Categorizing Algorithms Greedy Algorithms Prim s Algorithm (Minimum Spanning Tree) A subgraph that is a tree
More informationFPLLL: structure and data types
FPLLL: structure and data types Shi Bai FAU, Florida. FPLLL Days 3 @ CWI Amsterdam. 1 / 18 Executable programs and libraries Following from Martin s talk, make leads to executable programs: fplll: main
More informationRandom Sampling Revisited: Lattice Enumeration with Discrete Pruning
Random Sampling Revisited: Lattice Enumeration with Discrete Pruning Yoshinori Aono Phong Nguyễn Summary Motivation Lattices, Enumeration and Pruning Enumeration with Discrete Pruning Motivation Context
More informationFPLLL: a lattice reduction library
FPLLL: a lattice reduction library Shi Bai FPLLL development team Workshop HEAT, 2016 1 / 13 FPLLL: overview What is FPLLL? An implementation of Floating-Point LLL (and BKZ) reduction algorithms. A C++
More informationClustering. Unsupervised Learning
Clustering. Unsupervised Learning Maria-Florina Balcan 11/05/2018 Clustering, Informal Goals Goal: Automatically partition unlabeled data into groups of similar datapoints. Question: When and why would
More informationClustering in R d. Clustering. Widely-used clustering methods. The k-means optimization problem CSE 250B
Clustering in R d Clustering CSE 250B Two common uses of clustering: Vector quantization Find a finite set of representatives that provides good coverage of a complex, possibly infinite, high-dimensional
More informationLocal Algorithms for Sparse Spanning Graphs
Local Algorithms for Sparse Spanning Graphs Reut Levi Dana Ron Ronitt Rubinfeld Intro slides based on a talk given by Reut Levi Minimum Spanning Graph (Spanning Tree) Local Access to a Minimum Spanning
More informationCS 580: Algorithm Design and Analysis. Jeremiah Blocki Purdue University Spring 2018
CS 580: Algorithm Design and Analysis Jeremiah Blocki Purdue University Spring 2018 Chapter 11 Approximation Algorithms Slides by Kevin Wayne. Copyright @ 2005 Pearson-Addison Wesley. All rights reserved.
More informationSLS Methods: An Overview
HEURSTC OPTMZATON SLS Methods: An Overview adapted from slides for SLS:FA, Chapter 2 Outline 1. Constructive Heuristics (Revisited) 2. terative mprovement (Revisited) 3. Simple SLS Methods 4. Hybrid SLS
More informationInformed search. Soleymani. CE417: Introduction to Artificial Intelligence Sharif University of Technology Spring 2016
Informed search CE417: Introduction to Artificial Intelligence Sharif University of Technology Spring 2016 Soleymani Artificial Intelligence: A Modern Approach, Chapter 3 Outline Best-first search Greedy
More informationInformed Search A* Algorithm
Informed Search A* Algorithm CE417: Introduction to Artificial Intelligence Sharif University of Technology Spring 2018 Soleymani Artificial Intelligence: A Modern Approach, Chapter 3 Most slides have
More informationCSE 417 Branch & Bound (pt 4) Branch & Bound
CSE 417 Branch & Bound (pt 4) Branch & Bound Reminders > HW8 due today > HW9 will be posted tomorrow start early program will be slow, so debugging will be slow... Review of previous lectures > Complexity
More informationCS60003 Algorithm Design and Analysis, Autumn
CS60003 Algorithm Design and Analysis, Autumn 2009 10 Mid-Semester Test Maximum marks: 45 September 20, 2009 Total time: 2 hours Roll no: Name: [ Write your answers in the question paper itself. Be brief
More informationParallel Computing in Combinatorial Optimization
Parallel Computing in Combinatorial Optimization Bernard Gendron Université de Montréal gendron@iro.umontreal.ca Course Outline Objective: provide an overview of the current research on the design of parallel
More informationTheorem 2.9: nearest addition algorithm
There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used
More information11. APPROXIMATION ALGORITHMS
11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: vertex cover LP rounding: vertex cover generalized load balancing knapsack problem Lecture slides by Kevin Wayne Copyright 2005
More informationApproximation Algorithms
Approximation Algorithms Given an NP-hard problem, what should be done? Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one of three desired features. Solve problem to optimality.
More informationCrash-Starting the Simplex Method
Crash-Starting the Simplex Method Ivet Galabova Julian Hall School of Mathematics, University of Edinburgh Optimization Methods and Software December 2017 Ivet Galabova, Julian Hall Crash-Starting Simplex
More informationOutline. CS38 Introduction to Algorithms. Approximation Algorithms. Optimization Problems. Set Cover. Set cover 5/29/2014. coping with intractibility
Outline CS38 Introduction to Algorithms Lecture 18 May 29, 2014 coping with intractibility approximation algorithms set cover TSP center selection randomness in algorithms May 29, 2014 CS38 Lecture 18
More informationNP Completeness. Andreas Klappenecker [partially based on slides by Jennifer Welch]
NP Completeness Andreas Klappenecker [partially based on slides by Jennifer Welch] Dealing with NP-Complete Problems Dealing with NP-Completeness Suppose the problem you need to solve is NP-complete. What
More informationCOMP Analysis of Algorithms & Data Structures
COMP 3170 - Analysis of Algorithms & Data Structures Shahin Kamali Approximation Algorithms CLRS 35.1-35.5 University of Manitoba COMP 3170 - Analysis of Algorithms & Data Structures 1 / 30 Approaching
More informationNumerical Robustness. The implementation of adaptive filtering algorithms on a digital computer, which inevitably operates using finite word-lengths,
1. Introduction Adaptive filtering techniques are used in a wide range of applications, including echo cancellation, adaptive equalization, adaptive noise cancellation, and adaptive beamforming. These
More information1. Sorting (assuming sorting into ascending order) a) BUBBLE SORT
DECISION 1 Revision Notes 1. Sorting (assuming sorting into ascending order) a) BUBBLE SORT Make sure you show comparisons clearly and label each pass First Pass 8 4 3 6 1 4 8 3 6 1 4 3 8 6 1 4 3 6 8 1
More informationInformed Search Methods
Informed Search Methods How can we improve searching strategy by using intelligence? Map example: Heuristic: Expand those nodes closest in as the crow flies distance to goal 8-puzzle: Heuristic: Expand
More informationInformed search algorithms. Chapter 3 (Based on Slides by Stuart Russell, Dan Klein, Richard Korf, Subbarao Kambhampati, and UW-AI faculty)
Informed search algorithms Chapter 3 (Based on Slides by Stuart Russell, Dan Klein, Richard Korf, Subbarao Kambhampati, and UW-AI faculty) Intuition, like the rays of the sun, acts only in an inflexibly
More informationData Replication in the Quality Space
Data Replication in the Quality Space Yicheng Tu April 1, 2008 At Commnet USF Roadmap Introduction Static data replication Dynamic data replication Experimental (simulation) results Summary Data Replication
More informationSearch: Advanced Topics and Conclusion
Search: Advanced Topics and Conclusion CPSC 322 Lecture 8 January 20, 2006 Textbook 2.6 Search: Advanced Topics and Conclusion CPSC 322 Lecture 8, Slide 1 Lecture Overview Recap Branch & Bound A Tricks
More informationDiscussion. What problems stretch the limits of computation? Compare 4 Algorithms. What is Brilliance? 11/11/11
11/11/11 UNIVERSITY of WISCONSIN-MADISON Computer Sciences Department CS 0: Introduction to Computation Discussion Professor Andrea Arpaci-Dusseau Is there an inherent difference between What problems
More informationClustering. Unsupervised Learning
Clustering. Unsupervised Learning Maria-Florina Balcan 04/06/2015 Reading: Chapter 14.3: Hastie, Tibshirani, Friedman. Additional resources: Center Based Clustering: A Foundational Perspective. Awasthi,
More informationGiovanni De Micheli. Integrated Systems Centre EPF Lausanne
Two-level Logic Synthesis and Optimization Giovanni De Micheli Integrated Systems Centre EPF Lausanne This presentation can be used for non-commercial purposes as long as this note and the copyright footers
More informationWireless Sensor Networks 22nd Lecture
Wireless Sensor Networks 22nd Lecture 24.01.2007 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Options for topology control Topology control Control node activity deliberately turn on/off
More informationSearch: Advanced Topics and Conclusion
Search: Advanced Topics and Conclusion CPSC 322 Lecture 8 January 24, 2007 Textbook 2.6 Search: Advanced Topics and Conclusion CPSC 322 Lecture 8, Slide 1 Lecture Overview 1 Recap 2 Branch & Bound 3 A
More informationInformed search algorithms. Chapter 4
Informed search algorithms Chapter 4 Material Chapter 4 Section 1 - Exclude memory-bounded heuristic search 3 Outline Best-first search Greedy best-first search A * search Heuristics Local search algorithms
More informationA and Branch-and-Bound Search
A and Branch-and-Bound Search CPSC 322 Lecture 7 January 17, 2006 Textbook 2.5 A and Branch-and-Bound Search CPSC 322 Lecture 7, Slide 1 Lecture Overview Recap A Search Optimality of A Optimal Efficiency
More informationArtificial Intelligence
Artificial Intelligence Informed Search and Exploration Chapter 4 (4.1 4.2) A General Search algorithm: Chapter 3: Search Strategies Task : Find a sequence of actions leading from the initial state to
More informationCHAPTER 3 A TIME-DEPENDENT k-shortest PATH ALGORITHM FOR ATIS APPLICATIONS
CHAPTER 3 A TIME-DEPENDENT k-shortest PATH ALGORITHM FOR ATIS APPLICATIONS 3.1. Extension of a Static k-sp Algorithm to the Time-Dependent Case Kaufman and Smith [1993] showed that under the consistency
More informationCOMP 355 Advanced Algorithms Approximation Algorithms: VC and TSP Chapter 11 (KT) Section (CLRS)
COMP 355 Advanced Algorithms Approximation Algorithms: VC and TSP Chapter 11 (KT) Section 35.1-35.2(CLRS) 1 Coping with NP-Completeness Brute-force search: This is usually only a viable option for small
More informationLecture 9: (Semi-)bandits and experts with linear costs (part I)
CMSC 858G: Bandits, Experts and Games 11/03/16 Lecture 9: (Semi-)bandits and experts with linear costs (part I) Instructor: Alex Slivkins Scribed by: Amr Sharaf In this lecture, we will study bandit problems
More informationINTRODUCTION TO HEURISTIC SEARCH
INTRODUCTION TO HEURISTIC SEARCH What is heuristic search? Given a problem in which we must make a series of decisions, determine the sequence of decisions which provably optimizes some criterion. What
More informationMVE165/MMG630, Applied Optimization Lecture 8 Integer linear programming algorithms. Ann-Brith Strömberg
MVE165/MMG630, Integer linear programming algorithms Ann-Brith Strömberg 2009 04 15 Methods for ILP: Overview (Ch. 14.1) Enumeration Implicit enumeration: Branch and bound Relaxations Decomposition methods:
More informationHeuristic Search and Advanced Methods
Heuristic Search and Advanced Methods Computer Science cpsc322, Lecture 3 (Textbook Chpt 3.6 3.7) May, 15, 2012 CPSC 322, Lecture 3 Slide 1 Course Announcements Posted on WebCT Assignment1 (due on Thurs!)
More informationModule 6 NP-Complete Problems and Heuristics
Module 6 NP-Complete Problems and Heuristics Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu P, NP-Problems Class
More informationSolving the Euclidean Steiner Tree Problem in n-space
Solving the Euclidean Steiner Tree Problem in n-space Marcia Fampa (UFRJ), Jon Lee (U. Michigan), and Wendel Melo (UFRJ) January 2015 Marcia Fampa, Jon Lee, Wendel Melo Solving the Euclidean Steiner Tree
More informationInformed search algorithms
Artificial Intelligence Topic 4 Informed search algorithms Best-first search Greedy search A search Admissible heuristics Memory-bounded search IDA SMA Reading: Russell and Norvig, Chapter 4, Sections
More informationBranch-price-and-cut for vehicle routing. Guy Desaulniers
Guy Desaulniers Professor, Polytechnique Montréal, Canada Director, GERAD, Canada VeRoLog PhD School 2018 Cagliari, Italy, June 2, 2018 Outline 1 VRPTW definition 2 Mathematical formulations Arc-flow formulation
More informationΛέων-Χαράλαμπος Σταματάρης
Λέων-Χαράλαμπος Σταματάρης INTRODUCTION Two classical problems of information dissemination in computer networks: The broadcasting problem: Distributing a particular message from a distinguished source
More informationIntroduction to Approximation Algorithms
Introduction to Approximation Algorithms Dr. Gautam K. Das Departmet of Mathematics Indian Institute of Technology Guwahati, India gkd@iitg.ernet.in February 19, 2016 Outline of the lecture Background
More informationClustering. Unsupervised Learning
Clustering. Unsupervised Learning Maria-Florina Balcan 03/02/2016 Clustering, Informal Goals Goal: Automatically partition unlabeled data into groups of similar datapoints. Question: When and why would
More information3 No-Wait Job Shops with Variable Processing Times
3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select
More informationApproximation Algorithms for Clustering Uncertain Data
Approximation Algorithms for Clustering Uncertain Data Graham Cormode AT&T Labs - Research graham@research.att.com Andrew McGregor UCSD / MSR / UMass Amherst andrewm@ucsd.edu Introduction Many applications
More informationConstructive and destructive algorithms
Constructive and destructive algorithms Heuristic algorithms Giovanni Righini University of Milan Department of Computer Science (Crema) Constructive algorithms In combinatorial optimization problems every
More informationA GPU Implementation of a Jacobi Method for Lattice Basis Reduction
A GPU Implementation of a Jacobi Method for Lattice Basis Reduction Filip Jeremic and Sanzheng Qiao Department of Computing and Software McMaster University Hamilton, Ontario, Canada June 25, 2013 Abstract
More informationDirect Routing: Algorithms and Complexity
Direct Routing: Algorithms and Complexity Costas Busch, RPI Malik Magdon-Ismail, RPI Marios Mavronicolas, Univ. Cyprus Paul Spirakis, Univ. Patras 1 Outline 1. Direct Routing. 2. Direct Routing is Hard.
More informationThe Size Robust Multiple Knapsack Problem
MASTER THESIS ICA-3251535 The Size Robust Multiple Knapsack Problem Branch and Price for the Separate and Combined Recovery Decomposition Model Author: D.D. Tönissen, Supervisors: dr. ir. J.M. van den
More information3 Euler Tours, Hamilton Cycles, and Their Applications
3 Euler Tours, Hamilton Cycles, and Their Applications 3.1 Euler Tours and Applications 3.1.1 Euler tours Carefully review the definition of (closed) walks, trails, and paths from Section 1... Definition
More informationModule 6 P, NP, NP-Complete Problems and Approximation Algorithms
Module 6 P, NP, NP-Complete Problems and Approximation Algorithms Dr. Natarajan Meghanathan Associate Professor of Computer Science Jackson State University Jackson, MS 39217 E-mail: natarajan.meghanathan@jsums.edu
More informationInformed search algorithms. (Based on slides by Oren Etzioni, Stuart Russell)
Informed search algorithms (Based on slides by Oren Etzioni, Stuart Russell) The problem # Unique board configurations in search space 8-puzzle 9! = 362880 15-puzzle 16! = 20922789888000 10 13 24-puzzle
More informationSlides on Approximation algorithms, part 2: Basic approximation algorithms
Approximation slides Slides on Approximation algorithms, part : Basic approximation algorithms Guy Kortsarz Approximation slides Finding a lower bound; the TSP example The optimum TSP cycle P is an edge
More informationAlgorithm Design and Analysis
Algorithm Design and Analysis LECTURE 29 Approximation Algorithms Load Balancing Weighted Vertex Cover Reminder: Fill out SRTEs online Don t forget to click submit Sofya Raskhodnikova 12/7/2016 Approximation
More informationA.I.: Informed Search Algorithms. Chapter III: Part Deux
A.I.: Informed Search Algorithms Chapter III: Part Deux Best-first search Greedy best-first search A * search Heuristics Outline Overview Informed Search: uses problem-specific knowledge. General approach:
More informationReduced Memory Meet-in-the-Middle Attack against the NTRU Private Key
Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key Christine van Vredendaal Eindhoven, University of Technology c.v.vredendaal@tue.nl Twelfth Algorithmic Number Theory Symposium University
More informationExamples of P vs NP: More Problems
Examples of P vs NP: More Problems COMP1600 / COMP6260 Dirk Pattinson Australian National University Semester 2, 2017 Catch Up / Drop in Lab When Fridays, 15.00-17.00 Where N335, CSIT Building (bldg 108)
More informationInformed Search Algorithms
Informed Search Algorithms CITS3001 Algorithms, Agents and Artificial Intelligence Tim French School of Computer Science and Software Engineering The University of Western Australia 2017, Semester 2 Introduction
More informationFPLLL. fpylll. Martin R. Albrecht 2017/07/06
FPLLL fpylll Martin R. Albrecht 2017/07/06 Outline How Implementation What Contributing FPYLLL fpylll is a Python (2 and 3) library for performing lattice reduction on lattices over the Integers It is
More informationSome graph theory applications. communications networks
Some graph theory applications to communications networks Keith Briggs Keith.Briggs@bt.com http://keithbriggs.info Computational Systems Biology Group, Sheffield - 2006 Nov 02 1100 graph problems Sheffield
More informationConstraint Satisfaction Problems
Constraint Satisfaction Problems Search and Lookahead Bernhard Nebel, Julien Hué, and Stefan Wölfl Albert-Ludwigs-Universität Freiburg June 4/6, 2012 Nebel, Hué and Wölfl (Universität Freiburg) Constraint
More informationTowards more efficient infection and fire fighting
Towards more efficient infection and fire fighting Peter Floderus Andrzej Lingas Mia Persson The Centre for Mathematical Sciences, Lund University, 00 Lund, Sweden. Email: pflo@maths.lth.se Department
More informationApplications. Foreground / background segmentation Finding skin-colored regions. Finding the moving objects. Intelligent scissors
Segmentation I Goal Separate image into coherent regions Berkeley segmentation database: http://www.eecs.berkeley.edu/research/projects/cs/vision/grouping/segbench/ Slide by L. Lazebnik Applications Intelligent
More information11. APPROXIMATION ALGORITHMS
Coping with NP-completeness 11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: weighted vertex cover LP rounding: weighted vertex cover generalized load balancing knapsack problem
More informationGeneralized Weapon Target Assignment Problem
Superior Products Through Innovation Generalized Weapon Target Assignment Problem J. Rosenberger, P. Hwang, R. Pallerla, UTA A. Yucel, R. Wilson, E. Brungardt, LM Aero presented at 10 th ICCRTS, McLean,
More informationA Low Complexity ZF-Based Lattice Reduction Detection Using Curtailment Parameter in MIMO Systems
A Low Complexity ZF-Based Lattice Reduction Detection Using Curtailment Parameter in MIMO Systems Daisuke Mitsunaga, Thae Thae Yu Khine and Hua-An Zhao Department of Computer Science and Electrical Engineering,
More informationInformed search algorithms. (Based on slides by Oren Etzioni, Stuart Russell)
Informed search algorithms (Based on slides by Oren Etzioni, Stuart Russell) Outline Greedy best-first search A * search Heuristics Local search algorithms Hill-climbing search Simulated annealing search
More information1 Unweighted Set Cover
Comp 60: Advanced Algorithms Tufts University, Spring 018 Prof. Lenore Cowen Scribe: Yuelin Liu Lecture 7: Approximation Algorithms: Set Cover and Max Cut 1 Unweighted Set Cover 1.1 Formulations There
More information4 INFORMED SEARCH AND EXPLORATION. 4.1 Heuristic Search Strategies
55 4 INFORMED SEARCH AND EXPLORATION We now consider informed search that uses problem-specific knowledge beyond the definition of the problem itself This information helps to find solutions more efficiently
More informationTHE LEAFAGE OF A CHORDAL GRAPH
Discussiones Mathematicae Graph Theory 18 (1998 ) 23 48 THE LEAFAGE OF A CHORDAL GRAPH In-Jen Lin National Ocean University, Taipei, Taiwan Terry A. McKee 1 Wright State University, Dayton, OH 45435-0001,
More informationAn Introduction to Dual Ascent Heuristics
An Introduction to Dual Ascent Heuristics Introduction A substantial proportion of Combinatorial Optimisation Problems (COPs) are essentially pure or mixed integer linear programming. COPs are in general
More informationExample: Bioinformatics. Soft Constraint Processing. From Optimal CSP to Soft CSP. Overview. From Optimal CSP to Soft CSP.
Example: Bioinformatics Soft Constraint Processing 16.412J/6.834J Cognitive Robotics Martin Sachenbacher (Using material from Thomas Schiex) RNA is single-strand molecule, composed of A,U,G,C Function
More informationClustering. Introduction to Data Science University of Colorado Boulder SLIDES ADAPTED FROM LAUREN HANNAH
Clustering Introduction to Data Science University of Colorado Boulder SLIDES ADAPTED FROM LAUREN HANNAH Introduction to Data Science Boulder Clustering 1 of 9 Clustering Lab Review of k-means Work through
More informationMath 381 Discrete Mathematical Modeling
Math 381 Discrete Mathematical Modeling Sean Griffin Today: -Equipment Replacement Problem -Min Spanning Tree Problem -Clustering Friday s Plan Intro to LPSolve software Download before class (link on
More informationOptimal Crane Scheduling
Optimal Crane Scheduling IonuŃ Aron Iiro Harjunkoski John Hooker Latife Genç Kaya March 2007 1 Problem Schedule 2 cranes to transfer material between locations in a manufacturing plant. For example, copper
More information11. APPROXIMATION ALGORITHMS
11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: vertex cover LP rounding: vertex cover generalized load balancing knapsack problem Lecture slides by Kevin Wayne Copyright 2005
More informationJob-shop scheduling with limited capacity buffers
Job-shop scheduling with limited capacity buffers Peter Brucker, Silvia Heitmann University of Osnabrück, Department of Mathematics/Informatics Albrechtstr. 28, D-49069 Osnabrück, Germany {peter,sheitman}@mathematik.uni-osnabrueck.de
More informationLearning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures Oded Regev (Tel Aviv University and CNRS, ENS-Paris)
Winter School on Lattice-Based Cryptography and Applications Bar-Ilan University, Israel 20/2/2012 Learning a Parallelepiped: Bar-Ilan University Dept. of Computer Science Cryptanalysis of GGH and NTRU
More informationLearning Objectives. c D. Poole and A. Mackworth 2010 Artificial Intelligence, Lecture 3.5, Page 1
Learning Objectives At the end of the class you should be able to: justify why depth-bounded search is useful demonstrate how iterative-deepening works for a particular problem demonstrate how depth-first
More informationCopyright 2000, Kevin Wayne 1
Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple
More informationHeuristic Optimisation
Heuristic Optimisation Part 3: Classification of algorithms. Exhaustive search Sándor Zoltán Németh http://web.mat.bham.ac.uk/s.z.nemeth s.nemeth@bham.ac.uk University of Birmingham S Z Németh (s.nemeth@bham.ac.uk)
More informationInteger and Combinatorial Optimization
Integer and Combinatorial Optimization GEORGE NEMHAUSER School of Industrial and Systems Engineering Georgia Institute of Technology Atlanta, Georgia LAURENCE WOLSEY Center for Operations Research and
More informationTELCOM2125: Network Science and Analysis
School of Information Sciences University of Pittsburgh TELCOM2125: Network Science and Analysis Konstantinos Pelechrinis Spring 2015 2 Part 4: Dividing Networks into Clusters The problem l Graph partitioning
More informationInformed (Heuristic) Search. Idea: be smart about what paths to try.
Informed (Heuristic) Search Idea: be smart about what paths to try. 1 Blind Search vs. Informed Search What s the difference? How do we formally specify this? A node is selected for expansion based on
More informationLecture 2 The k-means clustering problem
CSE 29: Unsupervised learning Spring 2008 Lecture 2 The -means clustering problem 2. The -means cost function Last time we saw the -center problem, in which the input is a set S of data points and the
More informationBoosting Simple Model Selection Cross Validation Regularization. October 3 rd, 2007 Carlos Guestrin [Schapire, 1989]
Boosting Simple Model Selection Cross Validation Regularization Machine Learning 10701/15781 Carlos Guestrin Carnegie Mellon University October 3 rd, 2007 1 Boosting [Schapire, 1989] Idea: given a weak
More informationCS-171, Intro to A.I. Mid-term Exam Fall Quarter, 2013
CS-171, Intro to A.I. Mid-term Exam Fall Quarter, 2013 YOUR NAME AND ID NUMBER: YOUR ID: ID TO RIGHT: ROW: NO. FROM RIGHT: The exam will begin on the next page. Please, do not turn the page until told.
More informationCSE 5243 INTRO. TO DATA MINING
CSE 5243 INTRO. TO DATA MINING Cluster Analysis: Basic Concepts and Methods Huan Sun, CSE@The Ohio State University Slides adapted from UIUC CS412, Fall 2017, by Prof. Jiawei Han 2 Chapter 10. Cluster
More informationInformed search algorithms. Chapter 4
Informed search algorithms Chapter 4 Outline Best-first search Greedy best-first search A * search Heuristics Memory Bounded A* Search Best-first search Idea: use an evaluation function f(n) for each node
More informationModularity CMSC 858L
Modularity CMSC 858L Module-detection for Function Prediction Biological networks generally modular (Hartwell+, 1999) We can try to find the modules within a network. Once we find modules, we can look
More informationPolytopes Course Notes
Polytopes Course Notes Carl W. Lee Department of Mathematics University of Kentucky Lexington, KY 40506 lee@ms.uky.edu Fall 2013 i Contents 1 Polytopes 1 1.1 Convex Combinations and V-Polytopes.....................
More informationSelected Topics in Column Generation
Selected Topics in Column Generation February 1, 2007 Choosing a solver for the Master Solve in the dual space(kelly s method) by applying a cutting plane algorithm In the bundle method(lemarechal), a
More informationChapter 5 Graph Algorithms Algorithm Theory WS 2012/13 Fabian Kuhn
Chapter 5 Graph Algorithms Algorithm Theory WS 2012/13 Fabian Kuhn Graphs Extremely important concept in computer science Graph, : node (or vertex) set : edge set Simple graph: no self loops, no multiple
More informationIncremental Query Optimization
Incremental Query Optimization Vipul Venkataraman Dr. S. Sudarshan Computer Science and Engineering Indian Institute of Technology Bombay Outline Introduction Volcano Cascades Incremental Optimization
More information