# Formal Model. Figure 1: The target concept T is a subset of the concept S = [0, 1]. The search agent needs to search S for a point in T.

Save this PDF as:

Size: px
Start display at page:

Download "Formal Model. Figure 1: The target concept T is a subset of the concept S = [0, 1]. The search agent needs to search S for a point in T."

## Transcription

2 0 Concept S Concept S2 Concept S3 = T Concept S Figure 2: This figure illustrates the use of a sequence of nested concepts. Intuitively, the agent initially searches concept S for a point that lies in concept S. Next, the agent searches in the neighborhood of the discovered point in S for a point that lies in S 2, and then searches in the neighborhood of the discovered point in S 2 for a point that lies in S 3 which is the target concept T. be a parameter denoted. This scenario is illustrated in Figure 2 which shows a sequence of nested concepts. Intuitively, the agent initially searches concept S for a point that lies in concept S. Next, the agent searches in the neighborhood of the discovered point in S for a point that lies in S 2, and then searches in the neighborhood of the discovered point in S 2 for a point that lies in S 3 which is the target concept T. Definition 2 (Shaped search problem). Let C be a concept class. A shaped search problem is defined by the tuple (S, T,, S,..., S k ) such that S, T, S,..., S k C, R <, T = S k S k... S S, µ(s ) = µ(s), µ(s i+ ) = µ(s i ) for all i =,..., k 2. k is such that µ(s k ) /R µ(s k ); i.e., k = log R. The sequence (S,..., S k ) is called a shaping sequence. An agent in a shaped search problem setting is given a representation of S and has access to the membership oracles O,..., O k of S,..., S k, respectively. However, if the agent makes a query to O i, it can no longer make a query to any O j such that j < i. In other words, the oracles O i are presented to the agent in k iterations, with the agent making (zero or more) queries only to oracle O i at iteration i. The agent has to find a point in T by making queries to the oracles. In this context, the regret is defined as the total number of queries made to all oracles until a point in T is found. Note that an agent solving the shaped search problem cannot have a regret larger than what its regret would be on the original search problem; the agent can always choose to ignore the shaping sequence and only use the last membership oracle O k for S k = T. Because a shaping sequence provides extra information about the location of T (through the membership oracles O,..., O k ), an agent with access to a shaping sequence can potentially achieve a smaller regret than would otherwise be the case. For certain classes of search problems, for example, it might be possible to approximately determine S i using oracle O i. If S i is approximately located, then S i+ could be approximately located (via queries to O i+ ) by searching only inside the approximation of S i rather than inside S. As S i has a smaller measure than S, this search may require a relatively small number of queries. This process can be used iteratively from i = to i = k to find a point inside S k = T. In the next section we show that it is indeed possible to reduce an agent s regret using this method when S and T are intervals on a straight line. The regret accumulated by the agent during the search also depends on the value of. Very small (close to 0) values are detrimental because the agent will need to search a relatively large region for a point lying in a much smaller region [e.g., µ(s ) will be a small fraction of µ(s)], meaning that the agent will need to search for a needle in a haystack. Large values of (close to ) may seem detrimental (because the teacher will take a long time to converge to T ), but are actually not as we discuss below. Note that our approach is related to a technique from the mathematical optimization literature known as quasiconvex optimization (Boyd & Vandenberghe, 2004). A weaker version of the shaped search problem in which the concepts are convex and all the oracles are available to the agent simultaneously can be viewed as an instance of a quasi-convex optimization problem. However, in our approach, the oracles are not available simultaneously but, rather, are available as a temporal sequence. This is because behavioral shaping almost always proceeds in a temporal fashion (typically, rewards are initially provided to coarse approximations to the target behavior, and then only finer approximations are rewarded at later stages of training). Finding a Point in an Interval To keep our discussion relatively simple, this section focuses on the case where concepts are intervals on the real line. Before analyzing the effectiveness of using a shaping sequence in this circumstance, we consider learning in the absence of such a sequence. Consider a search problem (S, T ) such that S = [0, ] R is a closed interval of length, and T S is an interval of size /R. The search agent has access to O, which is the membership oracle of T. Consider the following simple deterministic algorithm to find a point inside T. The algorithm starts with the leftmost point in S, and query points 0, /R, 2/R, 3/R,..., (as a matter of terminology, we say that the algorithm makes jumps of size /R in S ). As T is a contiguous, closed interval of 877

3 size /R, the algorithm is guaranteed to hit one point inside T. As T has size /R, there will be at most O(R) queries. Therefore the regret will be at most O(R). The previous algorithm assumed that R is known. Next, we show that even without this information, it is possible to solve the problem with O(R) regret. To do this, the agent first sets ˆµ(T ), its estimate of the length of T, to and makes queries at points 0 and. If it hits a point in T, it stops; otherwise it halves the value of ˆµ(T ) to /2, and queries points 0, /2, and. The algorithm keeps halving ˆµ(T ), and keeps making jumps of size ˆµ(T ) in S, until it hits a point inside T. In general, if the agent estimates ˆµ(T ) =, it queries 2 k less than 2 k+ points. Importantly, there is a nonnegative integer k 0 such that /R 2 k When k 0 the agent guesses ˆµ(T ) =, it is guaranteed to hit 2 k 0 + a point in T. The total number of queries to O will be k0+2 = 2 k0+3 2 which is less than 8R. Therefore, there is an algorithm to solve the search problem with regret O(R) even if the agent does not know the value of R and, thus, does not know the size of T. Throughout the rest of the paper, we assume that the agent knows the value of R and knows that the size of T is /R. We now show that no deterministic algorithm can find a point in T with less than R regret. Suppose a deterministic algorithm has a regret r < R. Without loss of generality, assume that all the r queries to the oracle are distinct. These r distinct points will induce r + intervals in S. The average size of the interval will be r+. Therefore, at least one interval will be of size at least r+. As r < R, at least one interval will be of size at least /R which means that there is at least one way in which T can be placed such that the agent will not be able to query any point inside T if it makes less than R queries. Using a similar argument, it can be shown that any randomized algorithm will accumulate Ω(R) regret. This gives us the following proposition: Proposition. If the concept class C is the set of closed intervals then there is an algorithm that can solve the search problem (S, T ) with O(R) regret where S = and T = /R. Further, any (randomized) algorithm that solves the search problem will have Ω(R) regret. We now turn our attention to the case where a shaping sequence is available. In summary, we show that when any shaping sequence S,..., S k is available such that the S i are closed intervals, it is possible to find a point in T with a regret which is logarithmic in R. Suppose a shaping sequence S,..., S k of nested intervals is available. We present two algorithms which make use of this sequence to find a point in T. Algorithm solves the problem with O( log R) regret for R <. Although this regret is logarithmic in R for a fixed, it goes beyond the O(R) regret when approaches. Algorithm 2 fixes this problem and achieves a regret of O(log 2 R) for > /2. We start with Algorithm. At the first iteration, the algorithm s goal is to find a point inside S. The algorithm does not know where S lies, but it knows that S is of size, so it makes jumps of size in S and is guaranteed to hit a point inside S. At the first iteration, the algorithm makes at most queries to oracle O. At the i th iteration (where i > ), the algorithm s goal is to find a point in S i. The algorithm has a point p which lies in S i (from the previous iteration). The interval S i of size i can contain points lying on either side of p but, because S i S i, its left (right) edge can lie at most i to the left (right) of p. The algorithm makes jumps of size i to the left and right of p, and hits a point in S i. Therefore, at each iteration, at most 2 queries are made. As there are log R iterations, the total regret is 2 log R = O( log R). For a fixed value of, this is an exponential improvement over the case when a shaping sequence is not available. However, when is close to, this regret exceeds O(R) (as discussed below, Algorithm 2 solves the problem for large by skipping oracles). This gives us the following theorem: Theorem. If the concept class C is the set of closed intervals then there is an algorithm that can solve the shaped search problem (S, T,, S,..., S k ) for any shaping sequence S,..., S k with O( log R) regret where S = and T = /R. Algorithm An algorithm to solve the shaped search problem (S, T,, S,..., S k ) such that T, S, S,..., S k R using the sequence of oracles O,..., O k. Require: /R <, S = [0, ], membership oracles O,..., O k of the sets S,..., S k.. p 0 2. for i = to k do 3. if i= then 4. query O with points 0,, p first point at which O outputs. 6. else 7. Query oracle O i with points p i,..., p 2 i, p i, p, p + i, p + 2 i,..., p + i 8. p first point at which O i outputs. 9. end if 0. end for. return p An interesting aspect of our analysis is that it reveals a number of issues regarding the shrinking rate parameter. First, the above algorithm assumes that is known. Importantly, it can be shown that even if is unknown, it is still possible to solve the shaped search 878

4 problem with O( log R) regret. The method to do so is very similar to the one described above which solved the search problem (S, T ) when R was unknown (and, thus, will not be described here). Second, there exists an optimal value for that minimizes log R. This value is = /e. This result is obtained by differentiating log R with respect to, setting the derivative to zero, and solving for. Lastly, there is a trade-off involving the value of. If = R, then k = and the shaping sequence is nonexistent (i.e., S = T ) meaning that the regret becomes O(R). If is close to one, then k is large and the shaping sequence is very long. In this case, the regret increases rapidly to infinity as approaches. Consequently, Algorithm is not optimal because, when is large, the agent could simply ignore the shaping sequence and make queries only to the final oracle O k which will lead to O(R) regret. Fortunately, it is possible to do better than this. When is large, the agent can choose to make queries only to oracles O s, O 2s,..., O k where s is the first integer such that s < /2 (for simplicity, we assume that k is a multiple of s). In other words, the strategy of a new algorithm, denoted Algorithm 2, is to use sets of the shaping sequence that are successively shrinking by a factor of about /2, and ignore other elements of the shaping sequence. In this way, is effectively reduced to /2 for the agent, and the regret reduces to O(log 2 R). We next prove a lower bound on regret, and show that Algorithm 2 achieves this lower bound. That is, we show that no algorithm can do better than Algorithm 2 (up to a constant factor). Theorem 2. If the concept class C is the set of closed intervals then there is a deterministic algorithm that can solve the shaped search problem (S, T,, S,..., S k ) with O( log R) regret for < /2 and with O(log 2 R) regret for /2 for any shaping sequence S,..., S k where S = and T = /R. Further, there is no algorithm, deterministic or otherwise, that can solve the shaped search problem (with S i being closed intervals) with smaller regret (up to a constant factor). Proof. First we show an information-theoretic lower bound on regret which is independent of. For a given R, we can place R intervals of size /R next to each other inside an interval of size. To encode the identity of a particular interval, we need log 2 R bits. As the oracles are providing one bit of information at each query, any algorithm that successfully solves the problem must make Ω(log 2 R) total queries to the oracles. We now show that Algorithm 2 hits this bound when > 2, meaning that the bound is tight for > 2. When > 2, the algorithm sets s = (without loss of generality, assume that s = /2) and calls log 2 Algorithm with the oracles O s, O 2s,..., O k. Therefore the algorithm is solving the shaped search problem (S, T, /2, S s, S 2s,..., S k ) using Algorithm, which solves the search problem with O(log 2 R) regret. When R < 2, the bound on regret depends on. Note that Algorithm 2 calls Algorithm when < 2, meaning that the total regret is O( log R). We show that this is also a lower bound when < 2. In Algorithm, suppose that at each iteration i, the location of the interval S i is fully revealed if the algorithm makes more than queries. We show that even with this extra information, the total regret to find a point in the interval T is still O( log R). At iteration i, the interval S i of size i must lie within the interval S i of size i. For each i, we are supposing that the algorithm knows S i exactly, as it was revealed at the end of the previous iteration. Without loss of generality, we assume the agent queries only inside S i at iteration i. If the algorithm queries t points, it induces t + intervals on S i. The average interval size of these intervals will be i. This means that there t+ will be at least one interval which will be at least the average size. If t < < i, then t+ > i. In other words, there is at least one interval which will be of size at least i. As S i might lie anywhere in S i, the alleged algorithm is not guaranteed to be able to find S i if S i lies in this interval of size at least i. Consequently, any correct search algorithm will have to make at least = O( ) queries at each iteration and, thus, the total regret is bounded from below by Ω( log R). A similar argument holds for randomized algorithms. Algorithm 2 An optimal algorithm to solve the shaped search problem (S, T,, S,..., S k ) such that T, S, S,..., S k R using the sequence of oracles O,..., O k. Require: /R <, S = [0, ], membership oracles O,..., O k of the sets S,..., S k.. if 2, call Algorithm and return p, otherwise continue. 2. s = log 2 3. call Algorithm with = /2 and membership oracles O s, O 2s,..., O k and return p. Convexity is Important In Theorem 2 we showed that if the concept class is the set of closed intervals, it is possible to solve the shaped search problem with smaller regret than required to solve the original search problem. In this section, we show that if the members of the concept class are a union of two closed intervals, then there are shaped search problems such that, for a fixed, it is not possible to find a 879

5 point in T with less than O(R) regret for certain shaping sequences. Consider the following example with = /2. Suppose each set S i in the shaping sequence consists of two segments. The first segment is the target interval T, and it remains fixed throughout all sets in the shaping sequence. The second segment shrinks at a rate such that successive sets in the sequence maintain a size ratio of /2. In the last iteration, this second segment vanishes. More formally, let S = [0, ] and = /2. The shaping sequence S,..., S k is the sequence of sets S i = T Q i, i =,..., k, where Q i = [0, /2 i /R], T = [l, l + /R], and /2 l /R. In this case, even if the teacher fully reveals the location of the segment Q i to the agent at each iteration, the agent still needs to locate the set T, which can lie anywhere in a region of size /2. Hence, to find a point in T, O(R) queries are needed. We have just shown that there are shaping sequences which do not exponentially reduce an agent s regret if the concept class is the set of unions of two closed intervals. Although this example assumes a fixed value of, similar results can be shown for arbitrary values of when the concept class consists of more complicated non-convex concepts. For example, if the concept class is the set of unions of three closed intervals, an exponential reduction in regret is not possible for any value of. We conjecture that convexity is an important requirement for shaped search. That is, we conjecture that when an agent seeks to discover a concept through a shaped search procedure, it will only be able to achieve a small regret when the concept is convex. In fact, all our additional results regarding shaped search in multidimensions are for concept classes consisting of convex bodies (Chhabra, Jacobs, & Stefankovic, 2007). Summary Shaping is a commonly used procedure for teaching complicated tasks to people, animals, and robots. Both behavioral experiments and computer simulations have demonstrated that learners trained via shaping achieve significant improvements in learning speeds. In this paper, we mathematically formalized a model of shaping, and studied it in the context of search problems. To keep our discussion simple, we focused on the one dimensional case where concepts are intervals on the real line. When a shaping sequence is available, the search problem can be solved with exponentially less regret than would otherwise be possible. We also showed that there do not exist algorithms which can solve the search problem using a smaller number of queries. Our analysis revealed a number of interesting issues regarding the shrinking rate parameter. Lastly, we conjectured that it is important that concepts are convex for shaping sequences to be useful. We showed that when the concept class is the set of unions of two intervals, there are shaping sequences which do not reduce regret. The results presented here form the foundation for additional results reported in a longer article (Chhabra, Jacobs, and Stefankovic, 2007). In this article, we study the cases where concepts are rectangles, ellipsoids, or general convex bodies in high dimensions. In multidimensions, new methods are required to create efficient search algorithms. Acknowledgments This work was supported by AFOSR research grant FA References Anthony, M. & Biggs, N. (992). Computational Learning Theory. Cambridge, UK: Cambridge University Press. Boyd, S. & Vandenberghe, L. (2004). Convex Optimization. Cambridge, UK: Cambridge University Press. Chhabra, M., Jacobs, R. A., & Stefankovic, D. (2007). Behavioral shaping for geometric concepts. Journal of Machine Learning Research, in press. Doob, J. L. (994). Measure Theory. New York: Springer- Verlag. Dorigo, M. & Colombetti, M. (994). Robot shaping: Developing autonomous agents through learning. Artificial Intelligence Archive, 7, Kearns, M. J. & Vazirani U. V. (994). An Introduction to Computational Learning Theory. Cambridge, MA: MIT Press. Ng, A., Harada, D., & Russell, S.(999). Policy invariance under reward transformations: Theory and application to reward shaping. In I. Bratko (Ed.), Proceedings of the 6th International Conference on Machine Learning. San Francisco: Morgan Kaufmann. Randlov J. (2000). Shaping in reinforcement learning by changing the physics of the problem. In P. Langley (Ed.), Proceedings of the 7th International Conference on Machine Learning. San Francisco, CA: Morgan Kaufmann. Skinner, B. F. (938). The Behavior of Organisms. New York: Appleton-Century-Crofts. Sutton, R. S. & Barto, A. G. (998). Reinforcement Learning: An Introduction. Cambridge, MA: MIT Press. 880

### MA651 Topology. Lecture 4. Topological spaces 2

MA651 Topology. Lecture 4. Topological spaces 2 This text is based on the following books: Linear Algebra and Analysis by Marc Zamansky Topology by James Dugundgji Fundamental concepts of topology by Peter

### The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

### 3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

### Convex Optimization CMU-10725

Convex Optimization CMU-10725 Ellipsoid Methods Barnabás Póczos & Ryan Tibshirani Outline Linear programs Simplex algorithm Running time: Polynomial or Exponential? Cutting planes & Ellipsoid methods for

### CS60003 Algorithm Design and Analysis, Autumn

CS60003 Algorithm Design and Analysis, Autumn 2009 10 Mid-Semester Test Maximum marks: 45 September 20, 2009 Total time: 2 hours Roll no: Name: [ Write your answers in the question paper itself. Be brief

### On the Max Coloring Problem

On the Max Coloring Problem Leah Epstein Asaf Levin May 22, 2010 Abstract We consider max coloring on hereditary graph classes. The problem is defined as follows. Given a graph G = (V, E) and positive

### Computational Geometry

Windowing queries Windowing Windowing queries Zoom in; re-center and zoom in; select by outlining Windowing Windowing queries Windowing Windowing queries Given a set of n axis-parallel line segments, preprocess

### One-Point Geometric Crossover

One-Point Geometric Crossover Alberto Moraglio School of Computing and Center for Reasoning, University of Kent, Canterbury, UK A.Moraglio@kent.ac.uk Abstract. Uniform crossover for binary strings has

### Topology and Topological Spaces

Topology and Topological Spaces Mathematical spaces such as vector spaces, normed vector spaces (Banach spaces), and metric spaces are generalizations of ideas that are familiar in R or in R n. For example,

### Computing intersections in a set of line segments: the Bentley-Ottmann algorithm

Computing intersections in a set of line segments: the Bentley-Ottmann algorithm Michiel Smid October 14, 2003 1 Introduction In these notes, we introduce a powerful technique for solving geometric problems.

### NP-Hardness. We start by defining types of problem, and then move on to defining the polynomial-time reductions.

CS 787: Advanced Algorithms NP-Hardness Instructor: Dieter van Melkebeek We review the concept of polynomial-time reductions, define various classes of problems including NP-complete, and show that 3-SAT

### Lecture 3: Art Gallery Problems and Polygon Triangulation

EECS 396/496: Computational Geometry Fall 2017 Lecture 3: Art Gallery Problems and Polygon Triangulation Lecturer: Huck Bennett In this lecture, we study the problem of guarding an art gallery (specified

### 1 The range query problem

CS268: Geometric Algorithms Handout #12 Design and Analysis Original Handout #12 Stanford University Thursday, 19 May 1994 Original Lecture #12: Thursday, May 19, 1994 Topics: Range Searching with Partition

### Fundamental mathematical techniques reviewed: Mathematical induction Recursion. Typically taught in courses such as Calculus and Discrete Mathematics.

Fundamental mathematical techniques reviewed: Mathematical induction Recursion Typically taught in courses such as Calculus and Discrete Mathematics. Techniques introduced: Divide-and-Conquer Algorithms

### Morphological Image Processing

Morphological Image Processing Morphology Identification, analysis, and description of the structure of the smallest unit of words Theory and technique for the analysis and processing of geometric structures

### Module 1 Lecture Notes 2. Optimization Problem and Model Formulation

Optimization Methods: Introduction and Basic concepts 1 Module 1 Lecture Notes 2 Optimization Problem and Model Formulation Introduction In the previous lecture we studied the evolution of optimization

### Points covered an odd number of times by translates

Points covered an odd number of times by translates Rom Pinchasi August 5, 0 Abstract Let T be a fixed triangle and consider an odd number of translated copies of T in the plane. We show that the set of

### A Fast Algorithm for Optimal Alignment between Similar Ordered Trees

Fundamenta Informaticae 56 (2003) 105 120 105 IOS Press A Fast Algorithm for Optimal Alignment between Similar Ordered Trees Jesper Jansson Department of Computer Science Lund University, Box 118 SE-221

### Online Facility Location

Online Facility Location Adam Meyerson Abstract We consider the online variant of facility location, in which demand points arrive one at a time and we must maintain a set of facilities to service these

### Discrete Optimization. Lecture Notes 2

Discrete Optimization. Lecture Notes 2 Disjunctive Constraints Defining variables and formulating linear constraints can be straightforward or more sophisticated, depending on the problem structure. The

### COURSE: NUMERICAL ANALYSIS. LESSON: Methods for Solving Non-Linear Equations

COURSE: NUMERICAL ANALYSIS LESSON: Methods for Solving Non-Linear Equations Lesson Developer: RAJNI ARORA COLLEGE/DEPARTMENT: Department of Mathematics, University of Delhi Page No. 1 Contents 1. LEARNING

### Visibility: Finding the Staircase Kernel in Orthogonal Polygons

Visibility: Finding the Staircase Kernel in Orthogonal Polygons 8 Visibility: Finding the Staircase Kernel in Orthogonal Polygons Tzvetalin S. Vassilev, Nipissing University, Canada Stefan Pape, Nipissing

### ON SWELL COLORED COMPLETE GRAPHS

Acta Math. Univ. Comenianae Vol. LXIII, (1994), pp. 303 308 303 ON SWELL COLORED COMPLETE GRAPHS C. WARD and S. SZABÓ Abstract. An edge-colored graph is said to be swell-colored if each triangle contains

### Lecture 5: The Halting Problem. Michael Beeson

Lecture 5: The Halting Problem Michael Beeson Historical situation in 1930 The diagonal method appears to offer a way to extend just about any definition of computable. It appeared in the 1920s that it

### Complexity Results on Graphs with Few Cliques

Discrete Mathematics and Theoretical Computer Science DMTCS vol. 9, 2007, 127 136 Complexity Results on Graphs with Few Cliques Bill Rosgen 1 and Lorna Stewart 2 1 Institute for Quantum Computing and School

### On the Complexity of the Policy Improvement Algorithm. for Markov Decision Processes

On the Complexity of the Policy Improvement Algorithm for Markov Decision Processes Mary Melekopoglou Anne Condon Computer Sciences Department University of Wisconsin - Madison 0 West Dayton Street Madison,

### Directed Graph for Finite-State Machine

Directed Graph for Finite-State Machine Tito D. Kesumo Siregar (13511018) 1 Program Studi Teknik Informatika Sekolah Teknik Elektro dan Informatika Institut Teknologi Bandung, Jl. Ganesha 10 Bandung 40132,

### Maximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube

Maximal Monochromatic Geodesics in an Antipodal Coloring of Hypercube Kavish Gandhi April 4, 2015 Abstract A geodesic in the hypercube is the shortest possible path between two vertices. Leader and Long

### The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email mikel,spalex,bruck @caltech.edu Abstract In the multicast network

### Some Applications of Graph Bandwidth to Constraint Satisfaction Problems

Some Applications of Graph Bandwidth to Constraint Satisfaction Problems Ramin Zabih Computer Science Department Stanford University Stanford, California 94305 Abstract Bandwidth is a fundamental concept

### Computational Geometry

Windowing queries Windowing Windowing queries Zoom in; re-center and zoom in; select by outlining Windowing Windowing queries Windowing Windowing queries Given a set of n axis-parallel line segments, preprocess

### arxiv: v1 [cs.cc] 2 Sep 2017

Complexity of Domination in Triangulated Plane Graphs Dömötör Pálvölgyi September 5, 2017 arxiv:1709.00596v1 [cs.cc] 2 Sep 2017 Abstract We prove that for a triangulated plane graph it is NP-complete to

### Achievable Rate Regions for Network Coding

Achievable Rate Regions for Network oding Randall Dougherty enter for ommunications Research 4320 Westerra ourt San Diego, A 92121-1969 Email: rdough@ccrwest.org hris Freiling Department of Mathematics

### This lecture: Convex optimization Convex sets Convex functions Convex optimization problems Why convex optimization? Why so early in the course?

Lec4 Page 1 Lec4p1, ORF363/COS323 This lecture: Convex optimization Convex sets Convex functions Convex optimization problems Why convex optimization? Why so early in the course? Instructor: Amir Ali Ahmadi

### Report on Cache-Oblivious Priority Queue and Graph Algorithm Applications[1]

Report on Cache-Oblivious Priority Queue and Graph Algorithm Applications[1] Marc André Tanner May 30, 2014 Abstract This report contains two main sections: In section 1 the cache-oblivious computational

### On the undecidability of the tiling problem. Jarkko Kari. Mathematics Department, University of Turku, Finland

On the undecidability of the tiling problem Jarkko Kari Mathematics Department, University of Turku, Finland Consider the following decision problem, the tiling problem: Given a finite set of tiles (say,

### Fractals: Self-Similarity and Fractal Dimension Math 198, Spring 2013

Fractals: Self-Similarity and Fractal Dimension Math 198, Spring 2013 Background Fractal geometry is one of the most important developments in mathematics in the second half of the 20th century. Fractals

### Preferred directions for resolving the non-uniqueness of Delaunay triangulations

Preferred directions for resolving the non-uniqueness of Delaunay triangulations Christopher Dyken and Michael S. Floater Abstract: This note proposes a simple rule to determine a unique triangulation

### A New Method to Index and Query Sets

A New Method to Index and Query Sets Jorg Hoffmann and Jana Koehler Institute for Computer Science Albert Ludwigs University Am Flughafen 17 79110 Freiburg, Germany hoffmann koehler@informatik.uni-freiburg.de

### Hierarchy of graph matchbox manifolds

Hierarchy of graph matchbox manifolds Olga Lukina University of Leicester, UK July 2th, 2012 Olga Lukina (University of Leicester, UK) Graph matchbox manifolds July 2th, 2012 1 / 31 Introduction I will

### Key Concepts: Economic Computation, Part II

Key Concepts: Economic Computation, Part II Brent Hickman Fall, 2009 The purpose of the second section of these notes is to give you some further practice with numerical computation in MATLAB, and also

### The Online Connected Facility Location Problem

The Online Connected Facility Location Problem Mário César San Felice 1, David P. Willamson 2, and Orlando Lee 1 1 Unicamp, Institute of Computing, Campinas SP 13083-852, Brazil felice@ic.unicamp.br, lee@ic.unicamp.br

### A GENTLE INTRODUCTION TO THE BASIC CONCEPTS OF SHAPE SPACE AND SHAPE STATISTICS

A GENTLE INTRODUCTION TO THE BASIC CONCEPTS OF SHAPE SPACE AND SHAPE STATISTICS HEMANT D. TAGARE. Introduction. Shape is a prominent visual feature in many images. Unfortunately, the mathematical theory

### The Fibonacci hypercube

AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 40 (2008), Pages 187 196 The Fibonacci hypercube Fred J. Rispoli Department of Mathematics and Computer Science Dowling College, Oakdale, NY 11769 U.S.A. Steven

### Rigidity, connectivity and graph decompositions

First Prev Next Last Rigidity, connectivity and graph decompositions Brigitte Servatius Herman Servatius Worcester Polytechnic Institute Page 1 of 100 First Prev Next Last Page 2 of 100 We say that a framework

### Approximating Square Roots

Math 560 Fall 04 Approximating Square Roots Dallas Foster University of Utah u0809485 December 04 The history of approximating square roots is one of the oldest examples of numerical approximations found.

### Some Open Problems in Graph Theory and Computational Geometry

Some Open Problems in Graph Theory and Computational Geometry David Eppstein Univ. of California, Irvine Dept. of Information and Computer Science ICS 269, January 25, 2002 Two Models of Algorithms Research

### DESIGN AND ANALYSIS OF ALGORITHMS. Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES

DESIGN AND ANALYSIS OF ALGORITHMS Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES http://milanvachhani.blogspot.in USE OF LOOPS As we break down algorithm into sub-algorithms, sooner or later we shall

### Reducing the Number of Test Cases for Performance Evaluation of Components

Reducing the Number of Test Cases for Performance Evaluation of Components João W. Cangussu Kendra Cooper Eric Wong Department of Computer Science University of Texas at Dallas Richardson-TX 75-, USA cangussu,kcooper,ewong

### Partitioning Orthogonal Polygons by Extension of All Edges Incident to Reflex Vertices: lower and upper bounds on the number of pieces

Partitioning Orthogonal Polygons by Extension of All Edges Incident to Reflex Vertices: lower and upper bounds on the number of pieces António Leslie Bajuelos 1, Ana Paula Tomás and Fábio Marques 3 1 Dept.

### Pacific Journal of Mathematics

Pacific Journal of Mathematics SIMPLIFYING TRIANGULATIONS OF S 3 Aleksandar Mijatović Volume 208 No. 2 February 2003 PACIFIC JOURNAL OF MATHEMATICS Vol. 208, No. 2, 2003 SIMPLIFYING TRIANGULATIONS OF S

### The Geometry of Carpentry and Joinery

The Geometry of Carpentry and Joinery Pat Morin and Jason Morrison School of Computer Science, Carleton University, 115 Colonel By Drive Ottawa, Ontario, CANADA K1S 5B6 Abstract In this paper we propose

### Approximation Algorithms for Geometric Intersection Graphs

Approximation Algorithms for Geometric Intersection Graphs Subhas C. Nandy (nandysc@isical.ac.in) Advanced Computing and Microelectronics Unit Indian Statistical Institute Kolkata 700108, India. Outline

### Lectures 4+5: The (In)Security of Encrypted Search

Lectures 4+5: The (In)Security of Encrypted Search Contents 1 Overview 1 2 Data Structures 2 3 Syntax 3 4 Security 4 4.1 Formalizing Leaky Primitives.......................... 5 1 Overview In the first

### Reals 1. Floating-point numbers and their properties. Pitfalls of numeric computation. Horner's method. Bisection. Newton's method.

Reals 1 13 Reals Floating-point numbers and their properties. Pitfalls of numeric computation. Horner's method. Bisection. Newton's method. 13.1 Floating-point numbers Real numbers, those declared to be

### The Structure of Bull-Free Perfect Graphs

The Structure of Bull-Free Perfect Graphs Maria Chudnovsky and Irena Penev Columbia University, New York, NY 10027 USA May 18, 2012 Abstract The bull is a graph consisting of a triangle and two vertex-disjoint

### VARIANCE REDUCTION TECHNIQUES IN MONTE CARLO SIMULATIONS K. Ming Leung

POLYTECHNIC UNIVERSITY Department of Computer and Information Science VARIANCE REDUCTION TECHNIQUES IN MONTE CARLO SIMULATIONS K. Ming Leung Abstract: Techniques for reducing the variance in Monte Carlo

### Enumerating Pseudo-Intents in a Partial Order

Enumerating Pseudo-Intents in a Partial Order Alexandre Bazin and Jean-Gabriel Ganascia Université Pierre et Marie Curie, Laboratoire d Informatique de Paris 6 Paris, France Alexandre.Bazin@lip6.fr Jean-Gabriel@Ganascia.name

### Superconcentrators of depth 2 and 3; odd levels help (rarely)

Superconcentrators of depth 2 and 3; odd levels help (rarely) Noga Alon Bellcore, Morristown, NJ, 07960, USA and Department of Mathematics Raymond and Beverly Sackler Faculty of Exact Sciences Tel Aviv

### A Connectionist Learning Control Architecture for Navigation

A Connectionist Learning Control Architecture for Navigation Jonathan R. Bachrach Department of Computer and Information Science University of Massachusetts Amherst, MA 01003 Abstract A novel learning

### Load Balancing for Problems with Good Bisectors, and Applications in Finite Element Simulations

Load Balancing for Problems with Good Bisectors, and Applications in Finite Element Simulations Stefan Bischof, Ralf Ebner, and Thomas Erlebach Institut für Informatik Technische Universität München D-80290

### Applied Lagrange Duality for Constrained Optimization

Applied Lagrange Duality for Constrained Optimization Robert M. Freund February 10, 2004 c 2004 Massachusetts Institute of Technology. 1 1 Overview The Practical Importance of Duality Review of Convexity

### Time and Space Lower Bounds for Implementations Using k-cas

Time and Space Lower Bounds for Implementations Using k-cas Hagit Attiya Danny Hendler September 12, 2006 Abstract This paper presents lower bounds on the time- and space-complexity of implementations

### Parameterized Complexity of Independence and Domination on Geometric Graphs

Parameterized Complexity of Independence and Domination on Geometric Graphs Dániel Marx Institut für Informatik, Humboldt-Universität zu Berlin, Unter den Linden 6, 10099 Berlin, Germany. dmarx@informatik.hu-berlin.de

### COMP Online Algorithms. Online Bin Packing. Shahin Kamali. Lecture 20 - Nov. 16th, 2017 University of Manitoba

COMP 7720 - Online Algorithms Online Bin Packing Shahin Kamali Lecture 20 - Nov. 16th, 2017 University of Manitoba COMP 7720 - Online Algorithms Online Bin Packing 1 / 24 Review & Plan COMP 7720 - Online

### Conjectures concerning the geometry of 2-point Centroidal Voronoi Tessellations

Conjectures concerning the geometry of 2-point Centroidal Voronoi Tessellations Emma Twersky May 2017 Abstract This paper is an exploration into centroidal Voronoi tessellations, or CVTs. A centroidal

### Lecture 2 The k-means clustering problem

CSE 29: Unsupervised learning Spring 2008 Lecture 2 The -means clustering problem 2. The -means cost function Last time we saw the -center problem, in which the input is a set S of data points and the

### Forbidden Minors for a Pursuit Game on Graphs

Forbidden Minors for a Pursuit Game on Graphs A Senior Project submitted to The Division of Science, Mathematics, and Computing of Bard College by Abhinanda Bhattacharyya Annandale-on-Hudson, New York

### Outline. Best-first search

Outline Best-first search Greedy best-first search A* search Heuristics Local search algorithms Hill-climbing search Beam search Simulated annealing search Genetic algorithms Constraint Satisfaction Problems

### Topology - I. Michael Shulman WOMP 2004

Topology - I Michael Shulman WOMP 2004 1 Topological Spaces There are many different ways to define a topological space; the most common one is as follows: Definition 1.1 A topological space (often just

### TRANSITIVE GRAPHS UNIQUELY DETERMINED BY THEIR LOCAL STRUCTURE

TRANSITIVE GRAPHS UNIQUELY DETERMINED BY THEIR LOCAL STRUCTURE JOSHUA FRISCH AND OMER TAMUZ Abstract. We give an example of an infinite, vertex transitive graph that has the following property: it is the

### On 2-Subcolourings of Chordal Graphs

On 2-Subcolourings of Chordal Graphs Juraj Stacho School of Computing Science, Simon Fraser University 8888 University Drive, Burnaby, B.C., Canada V5A 1S6 jstacho@cs.sfu.ca Abstract. A 2-subcolouring

### Sorting and Selection

Sorting and Selection Introduction Divide and Conquer Merge-Sort Quick-Sort Radix-Sort Bucket-Sort 10-1 Introduction Assuming we have a sequence S storing a list of keyelement entries. The key of the element

### FACES OF CONVEX SETS

FACES OF CONVEX SETS VERA ROSHCHINA Abstract. We remind the basic definitions of faces of convex sets and their basic properties. For more details see the classic references [1, 2] and [4] for polytopes.

### Weighted Geodetic Convex Sets in A Graph

IOSR Journal of Mathematics (IOSR-JM) e-issn: 2278-5728, p-issn: 2319-765X. PP 12-17 www.iosrjournals.org Weighted Geodetic Convex Sets in A Graph Jill K. Mathew 1 Department of Mathematics Mar Ivanios

### Two Image-Template Operations for Binary Image Processing. Hongchi Shi. Department of Computer Engineering and Computer Science

Two Image-Template Operations for Binary Image Processing Hongchi Shi Department of Computer Engineering and Computer Science Engineering Building West, Room 331 University of Missouri - Columbia Columbia,

### CSE373: Data Structures and Algorithms Lecture 4: Asymptotic Analysis. Aaron Bauer Winter 2014

CSE373: Data Structures and Algorithms Lecture 4: Asymptotic Analysis Aaron Bauer Winter 2014 Previously, on CSE 373 We want to analyze algorithms for efficiency (in time and space) And do so generally

### Projective geometry and the extended Euclidean plane

Chapter 2 Projective geometry and the extended Euclidean plane Math 4520, Fall 2017 As we can see from Hilbert s treatment, a completely worked out axiom system for geometry in the plane is quite complicated.

### SYNTHESIS OF PLANAR MECHANISMS FOR PICK AND PLACE TASKS WITH GUIDING LOCATIONS

Proceedings of the ASME 2013 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference IDETC/CIE 2013 August 4-7, 2013, Portland, Oregon, USA DETC2013-12021

### Worst-case Ethernet Network Latency for Shaped Sources

Worst-case Ethernet Network Latency for Shaped Sources Max Azarov, SMSC 7th October 2005 Contents For 802.3 ResE study group 1 Worst-case latency theorem 1 1.1 Assumptions.............................

### 6. Lecture notes on matroid intersection

Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans May 2, 2017 6. Lecture notes on matroid intersection One nice feature about matroids is that a simple greedy algorithm

### Geometric Red-Blue Set Cover for Unit Squares and Related Problems

Geometric Red-Blue Set Cover for Unit Squares and Related Problems Timothy M. Chan Nan Hu Abstract We study a geometric version of the Red-Blue Set Cover problem originally proposed by Carr, Doddi, Konjevod,

### On Planar Intersection Graphs with Forbidden Subgraphs

On Planar Intersection Graphs with Forbidden Subgraphs János Pach Micha Sharir June 13, 2006 Abstract Let C be a family of n compact connected sets in the plane, whose intersection graph G(C) has no complete

### Logical Decision Rules: Teaching C4.5 to Speak Prolog

Logical Decision Rules: Teaching C4.5 to Speak Prolog Kamran Karimi and Howard J. Hamilton Department of Computer Science University of Regina Regina, Saskatchewan Canada S4S 0A2 {karimi,hamilton}@cs.uregina.ca

### Efficient Case Based Feature Construction

Efficient Case Based Feature Construction Ingo Mierswa and Michael Wurst Artificial Intelligence Unit,Department of Computer Science, University of Dortmund, Germany {mierswa, wurst}@ls8.cs.uni-dortmund.de

### On Multi-Stack Boundary Labeling Problems

On Multi-Stack Boundary Labeling Problems MICHAEL A. BEKOS 1, MICHAEL KAUFMANN 2, KATERINA POTIKA 1, ANTONIOS SYMVONIS 1 1 National Technical University of Athens School of Applied Mathematical & Physical

### 9.5 Equivalence Relations

9.5 Equivalence Relations You know from your early study of fractions that each fraction has many equivalent forms. For example, 2, 2 4, 3 6, 2, 3 6, 5 30,... are all different ways to represent the same

### Data Partitioning. Figure 1-31: Communication Topologies. Regular Partitions

Data In single-program multiple-data (SPMD) parallel programs, global data is partitioned, with a portion of the data assigned to each processing node. Issues relevant to choosing a partitioning strategy

### Open and Closed Sets

Open and Closed Sets Definition: A subset S of a metric space (X, d) is open if it contains an open ball about each of its points i.e., if x S : ɛ > 0 : B(x, ɛ) S. (1) Theorem: (O1) and X are open sets.

### Multi-Cluster Interleaving on Paths and Cycles

Multi-Cluster Interleaving on Paths and Cycles Anxiao (Andrew) Jiang, Member, IEEE, Jehoshua Bruck, Fellow, IEEE Abstract Interleaving codewords is an important method not only for combatting burst-errors,

### Shape fitting and non convex data analysis

Shape fitting and non convex data analysis Petra Surynková, Zbyněk Šír Faculty of Mathematics and Physics, Charles University in Prague Sokolovská 83, 186 7 Praha 8, Czech Republic email: petra.surynkova@mff.cuni.cz,

### Discrete Mathematics

Discrete Mathematics 310 (2010) 2769 2775 Contents lists available at ScienceDirect Discrete Mathematics journal homepage: www.elsevier.com/locate/disc Optimal acyclic edge colouring of grid like graphs

### (67686) Mathematical Foundations of AI July 30, Lecture 11

(67686) Mathematical Foundations of AI July 30, 2008 Lecturer: Ariel D. Procaccia Lecture 11 Scribe: Michael Zuckerman and Na ama Zohary 1 Cooperative Games N = {1,...,n} is the set of players (agents).

### UNIT 1 ANALYSIS OF ALGORITHMS

UNIT 1 ANALYSIS OF ALGORITHMS Analysis of Algorithms Structure Page Nos. 1.0 Introduction 7 1.1 Objectives 7 1.2 Mathematical Background 8 1.3 Process of Analysis 12 1.4 Calculation of Storage Complexity

### SIMILARITY MEASURES FOR MULTI-VALUED ATTRIBUTES FOR DATABASE CLUSTERING

SIMILARITY MEASURES FOR MULTI-VALUED ATTRIBUTES FOR DATABASE CLUSTERING TAE-WAN RYU AND CHRISTOPH F. EICK Department of Computer Science, University of Houston, Houston, Texas 77204-3475 {twryu, ceick}@cs.uh.edu

### Online Coloring Known Graphs

Online Coloring Known Graphs Magnús M. Halldórsson Science Institute University of Iceland IS-107 Reykjavik, Iceland mmh@hi.is, www.hi.is/ mmh. Submitted: September 13, 1999; Accepted: February 24, 2000.

### Geometric Unique Set Cover on Unit Disks and Unit Squares

CCCG 2016, Vancouver, British Columbia, August 3 5, 2016 Geometric Unique Set Cover on Unit Disks and Unit Squares Saeed Mehrabi Abstract We study the Unique Set Cover problem on unit disks and unit squares.

### Simplified clustering algorithms for RFID networks

Simplified clustering algorithms for FID networks Vinay Deolalikar, Malena Mesarina, John ecker, Salil Pradhan HP Laboratories Palo Alto HPL-2005-163 September 16, 2005* clustering, FID, sensors The problem