Randomized algorithms: Two examples and Yao s Minimax Principle

Size: px
Start display at page:

Download "Randomized algorithms: Two examples and Yao s Minimax Principle"

Transcription

1 Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum Satisfiability: Given a set of clauses, set each of the variables to True or False such as to maximize the number of clauses that become True, i.e. of which at least one of the literals is true. There is a trivial reduction from Satisfiability to Maximum Satisfiability, roving NP-hardness of MAX-SAT. In this course I assume everyone to have basic knowledge on comlexity theory (P, NP, and NP-Comleteness (NPhardness)). Those who need can make themselves u-to-date by reading e.g. the first few chaters of Garey and Johnson s Comuters and Intractability: a guide to the theory of NP-Comleteness or any other basic theoretical comuter science book on algorithms. Consider the following extremely simle randomised algorithm (RA) for MAX- SAT: Set each of the variables indeendently to True with robability 1/2. Theorem 0.1. RA gives a solution with an exected number of True clauses greater than or eual to 1/2 times the otimal number of True clauses. Proof. Suose we have a Boolean exression (instance of MAX-SAT) with m clauses. For i = 1,..., m let Z i = 1 denote the event that clause C i is True, and Z i = 0 otherwise. If C i contains k literals then the robability that none of them is True is 2 k, by indeendence of the random True-False assignment. Thus, P r{z i = 1} = 1 2 k 1/2. Hence, E[Z i ] 1/2. This holds for all i. The exected number of True clauses is E[ m i=1 Z i]. Using the useful linearity roerty of exectations gives m m E[ Z i ] = E[Z i ] 1 2 m. i=1 i=1 Since m is clearly an uer bound on the otimal number of True clauses, this roves the theorem. The examle shows the ower of randomisation. It is a simle algorithm that erforms reasonably well. It also reveals the interretation of a randomised algorithm as a robability distribution over the class of deterministic algorithms: in this case, denoting by n the number of variables, it gives robability 2 n to each of the 2 n deterministic algorithms that blindly set variables to True or 1

2 False and robability 0 to any other algorithm. Notice that for these blind algorithms it is easy to construct a Boolean exression on n variables of which none of the clauses will be True. Randomisation avoids the bad erformance of the deterministic algorithms that receive a ositive robability of being chosen. The MAX-SAT examle was concerned with aroximation. What if we would be interested in the exact answer: what is the robability that RA roduces an otimal solution. With resect to this uestion RA erforms very badly: if there are c otimal solutions then RA will roduce any of them with robability c2 n. We will find out that we cannot exect an efficient randomised algorithm to erform essentially better for MAX-SAT. Minimum Cut in a grah A cut in a grah is a set of edges whose removal slits the grah into two or more comonents. We are interested in the minimum cardinality cut. We know the roblem is well solved through solving a maximum flow roblem on it. But let us study a much simler randomised algorithm. RA: Select from the grah G = (V, E) uniformly at random an edge and contract it. Contracting an edge means identifying its two end vertices. If the two vertices incident to an edge have a common neighbour then contraction of it creates arallel edges. We kee the arallel (multile) edges. We reeat the rocedure iteratively to the newly created grah. At each ste the number of vertices of the grah is reduced by 1. We continue until only two vertices are left. Notice the a cut in the grah after one contraction is also a cut in the grah before the contraction. Hence, the multile edges between the two vertices remaining at the end of the algorithm corresond to a cut in the original grah. We study the robability that this simle randomised algorithm finds a minimum cut. Let C be an otimal cut and let it have size k. Notice that C will not be found if any of its edges is contracted (selected) by the algorithm. So we should study the robability that none of the k edges of C are contracted by RA. First consider the first iteration of RA. First observation: each edge of E is selected with robability 1/ E. Second observation: None of the vertices has degree < k, otherwise such a vertex would induce a cut of size smaller than k and therefore C could not be otimal. Therefore, E nk/2. Hence, Therefore, P r{c does not survive 1st ste} P r{c survives 1st ste} 1 2 n. k nk/2 = 2 n. 2

3 Now consider the second iteration: P r{c survives 2nd ste} = P r{c survives 2nd ste C survived 1st ste}p r{c survives 1st ste}+ P r{c survives 2nd ste C has not survived 1st ste}p r{c does not survive 1st ste} = (1) P r{c survives 2nd ste C survived 1st ste}p r{c survives 1st ste} Again we will bound the robability that C does not survive the 2nd ste given that it has survived the 1st ste. We have now n 1 vertices and, by the same argument as before, each of these has degree at least k, whence the number of edges is at least (n 1)k/2. Thus, P r{c does not survive 2nd ste C survived 1st ste and therefore, k (n 1)k/2 = 2 n 1 P r{c survives 2nd ste C survived 1st ste} 1 2 n 1. Inserting into (1) yields P r{c survives 2nd ste} (1 2 n 1 )(1 2 n ). Similarly, by induction we can rove that P r{c survives h th ste} Π h i=1(1 2 n (i 1) ) and in articular, after n 2 stes a grah on 2 vertices survives: P r{c survives} = Π n 2 i=1 (1 2 n i + 1 ) = n i 1 Πn 2 i=1 n i + 1 = 2 n(n 1) > 2 n 2. Thus, the algorithm gives an error in declaring that the cut found is a min cut with robability at most 1 2 n 2. Reeating the algorithm n 2 /2 times brings the robability of not finding a min cut down to (1 2 n 2 )n2 /2 = 1 e. This can even be decreased further to any arbitrarily small robability ɛ by a number of reetitions of the algorithm which is olynomial both in n and in 1/ɛ. The algorithm is an examle of a Monte Carlo algorithm. These are algorithms with a so-called one-sided robability of failure. If the algorithm were to answer the uestion if in a grah a cut of size at most k exists, then if the algorithm oututs a yes-answer, then it is certainly correct, since it will have found a cut 3

4 of size at most k. But if it oututs a no-answer then it could be that it failed to find a min cut. Thus a no-answer may not be correct. Related to such Monte Carlo algorithms is the definition of a randomised comlexity class, the class RP. For this class we introduce the elementary comuter oeration of a fair coin-fli. Euivalently we may assume that it takes one oeration to draw an element from a set of size olynomially bounded in the size of the inut. RP is the class of decision roblems Π for which a randomised algorithm A exists that runs in olynomial time (deterministically), such that for any instance π of Π the following holds: a) If π has a yes-answer P r{a(π) gives yes answer} 1/2; b) If π has a no-answer P r{a(π) gives no answer} = 1. In this definition A(π) is the outcome of alying A to π. Clearly P RP NP. The last one follows from the fact that for a yes-answer instance of a roblem in NP, a single certificate exists on which an algorithm verifies in olynomial time the yes-answer. Since for roblem in RP there exist for each yes-answer a robability at least 1/2 of obtaining a yes-answer by a olynomial time algorithm, then at least one running (realisation) of the randomised algorithm must lead to a yes-answer. In the definition the robability 1/2 is chosen arbitrarily. As we mentioned with the min cut algorithm reeating the algorithm several times can bring the robability of failure down to any arbitrarily small constant as long as the robability of failure of a single run is bounded by 1/oly( π ), the recirocal of a number that is bounded by a olynomial function of the inut size. Many oen uestions remain with resect to this class in the sirit of the NP=P? uestion. One of them is RP NP co-np? For other related uestions and some more related comlexity classes based on randomised algorithms I refer to the last art of Chater 1 of the book. Our conclusion for the Min Cut roblem based on the analysis of the simle randomised algorithm is that the roblem is in RP. This is no news, since we already knew it belonged to P. Yao s Minimax Princile We will exlore a game theory aroach to the erformance analysis of randomised algorithms which will lead to a articularly useful tool for establishing lower bounds on the erformance of randomised algorithms. 4

5 To start, think of the world-wide known roblem Paer-Scissors-Stone. Call the two layers R (for the row-layer) and C (for the column-layer). We define the ay-off matrix M of the game by letting M ij denote the amount that C ays to R if R lays strategy i and C lays strategy j. Thus in Paer-Scissors-Stone the ay-off matrix becomes: Paer Scissors Stone Paer Scissors Stone Clearly R likes to maximise what C needs to ay to her: he seeks V R = max min M ij, i j whereas C seeks to minimize what she needs to ay to R: V C = min j max M ij. i In Paer-Scissors-Stone V R = 1 and V C = 1. This game is said to have no solution. The main aroach to get around this roblem is introducing randomisation. In game theory deterministic strategies are called ure strategies and randomised strategies are called mixed strategies. A mixed strategy for R is a vector of robabilities i with which R lays strategy i, i = 1,..., m, corresonding to the rows of M. Similarly, = ( 1,..., n ) defines a randomised strategy for C, corresonding to the columns of M. The ay-off becomes now a random variable with exected value T M. Again R tries to maximise its exected ay-off and C tries to minimise its exected ayments: W R = max min T M; W C = min max T M. Von Neumann showed that for any two-erson zero-sum game W R = W C. (In a zero-sum game the money remains among the layers.) Nowadays we can show this easily by strong LP-duality. Let us consider max min T M more closely. Once layer R chooses her strategy, then layer C will choose such as to minimise T M, which is written out n j=1 (T M j ) j, where we use M j to denote the j-th column of M. But given, T M j is a fixed number, say a j. Clearly, minimising j a j j subject to j 0 and j j = 1 is solved by selecting min j a j and setting the corresonding coordinate of to 1 and all the others to 0. Thus, given the best 5

6 strategy for C is a deterministic strategy which we reresent by the unit-vector e j having 1 at coordinate j and 0 s elsewhere: max Similarly we can argue that min min max T M = max min T Me j. j T M = min Van Neumann now imlies Loomis Theorem: max min j T Me j = min max e T i M. i max e T i M. i As a result min j T Me j max i e T i M for every air of strategies,. Yao discovered the usefulness of these game theoretical results for studying the erformance of randomised algorithms. Think of solving a roblem as a twoerson zero-sum game in which C is the layer who lays (chooses) an algorithm and R is the layer who lays an instance of the roblem. The ay-off matrix can be any erformance measure we are interested in, such as the ratio between the solution value obtained by the algorithm layed by C and the otimal value on an instance layed by R. Or it could be the running time of an algorithm layed by C on an instance layed by R. Define A as the class of all ossible (deterministic) algorithms that C could choose from (for instance all olynomial time algorithms) and I as the class of all ossible instances of the roblem that R could choose from. Let M(I, A) be the desired erformance measure of algorithm A when alied to instance I. A randomised strategy I for R is nothing more than selecting a random roblem instance. Therefore E[M(I, A)] is the exected erformance measure of algorithm A on random instance I. Analysis of this exectation is known in the literature under the name robabilistic analysis of algorithms. On the other hand a random strategy A for C is nothing more than a randomised algorithm. Therefore E[M(I, A )] is the exected erformance measure of randomised algorithm A on instance I. And max I I E[M(I, A )] is the worst-case exected erformance measure of randomised algorithm A. Remembering the corollary of Loomis Theorem we have min E[M(I, A)] max E[M(I, A )]. A A I I In words: the exected erformance of the best deterministic algorithm on any random instance I is a lower bound on the worst-case exected erformance of any randomised algorithm. This is what is called Yao s Minimax Princile. 6

7 Thus to get a lower bound on the worst-case erformance of any randomised algorithm it suffices to secify a random instance of the roblem and analyse what any deterministic algorithm can achieve on this instance. Of course, better bounds are obtained by choosing more clever random instances. In fact, we know that there must be a random instance on which the best deterministic algorithm will give exactly the best attainable worst-case erformance of any randomised algorithm, but it may not always be easy to detect that random instance. Material During the first lecture I treated from [MR] Section 1.1 and arts of 1.5. Section and

1 Introduction to Game Theory

1 Introduction to Game Theory 15-451/651: Design & Analysis of Algorithms October 12, 2015 Lecture #12: Game Theory last changed: October 9, 2015 In today s lecture, we ll talk about game theory and some of its connections to comuter

More information

Directed File Transfer Scheduling

Directed File Transfer Scheduling Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was

More information

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu

More information

Introduction to Parallel Algorithms

Introduction to Parallel Algorithms CS 1762 Fall, 2011 1 Introduction to Parallel Algorithms Introduction to Parallel Algorithms ECE 1762 Algorithms and Data Structures Fall Semester, 2011 1 Preliminaries Since the early 1990s, there has

More information

I ACCEPT NO RESPONSIBILITY FOR ERRORS ON THIS SHEET. I assume that E = (V ).

I ACCEPT NO RESPONSIBILITY FOR ERRORS ON THIS SHEET. I assume that E = (V ). 1 I ACCEPT NO RESPONSIBILITY FOR ERRORS ON THIS SHEET. I assume that E = (V ). Data structures Sorting Binary heas are imlemented using a hea-ordered balanced binary tree. Binomial heas use a collection

More information

Lecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model.

Lecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model. U.C. Berkeley CS273: Parallel and Distributed Theory Lecture 18 Professor Satish Rao Lecturer: Satish Rao Last revised Scribe so far: Satish Rao (following revious lecture notes quite closely. Lecture

More information

A Brief Introduction to Truth-Table Logic. Kent Slinker Pima Community College

A Brief Introduction to Truth-Table Logic. Kent Slinker Pima Community College ` A Brief Introduction to ruth-able Logic Kent Slinker Pima Community College Earlier in this class, we learned that all arguments are either valid or invalid. Additionally, we learned that certain valid

More information

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.)

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.) Advanced Algorithms Fall 2015 Lecture 3: Geometric Algorithms(Convex sets, Divide & Conuer Algo.) Faculty: K.R. Chowdhary : Professor of CS Disclaimer: These notes have not been subjected to the usual

More information

REAL NUMBERS. 1.1 Introduction

REAL NUMBERS. 1.1 Introduction REAL NUMBERS 1 REAL NUMBERS 1 1.1 Introduction In Class IX, you began your exloration of the world of real numbers and encountered irrational numbers. We continue our discussion on real numbers in this

More information

Randomized Selection on the Hypercube 1

Randomized Selection on the Hypercube 1 Randomized Selection on the Hyercube 1 Sanguthevar Rajasekaran Det. of Com. and Info. Science and Engg. University of Florida Gainesville, FL 32611 ABSTRACT In this aer we resent randomized algorithms

More information

split split (a) (b) split split (c) (d)

split split (a) (b) split split (c) (d) International Journal of Foundations of Comuter Science c World Scientic Publishing Comany ON COST-OPTIMAL MERGE OF TWO INTRANSITIVE SORTED SEQUENCES JIE WU Deartment of Comuter Science and Engineering

More information

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions

More information

CS2 Algorithms and Data Structures Note 8

CS2 Algorithms and Data Structures Note 8 CS2 Algorithms and Data Structures Note 8 Heasort and Quicksort We will see two more sorting algorithms in this lecture. The first, heasort, is very nice theoretically. It sorts an array with n items in

More information

Truth Trees. Truth Tree Fundamentals

Truth Trees. Truth Tree Fundamentals Truth Trees 1 True Tree Fundamentals 2 Testing Grous of Statements for Consistency 3 Testing Arguments in Proositional Logic 4 Proving Invalidity in Predicate Logic Answers to Selected Exercises Truth

More information

Graph Cut Matching In Computer Vision

Graph Cut Matching In Computer Vision Grah Cut Matching In Comuter Vision Toby Collins (s0455374@sms.ed.ac.uk) February 2004 Introduction Many of the roblems that arise in early vision can be naturally exressed in terms of energy minimization.

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18 601.433/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18 22.1 Introduction We spent the last two lectures proving that for certain problems, we can

More information

Theoretical Analysis of Graphcut Textures

Theoretical Analysis of Graphcut Textures Theoretical Analysis o Grahcut Textures Xuejie Qin Yee-Hong Yang {xu yang}@cs.ualberta.ca Deartment o omuting Science University o Alberta Abstract Since the aer was ublished in SIGGRAPH 2003 the grahcut

More information

The concept of set is a very basic one. It is simple; yet, it suffices as the basis on which all abstract notions in mathematics can be built.

The concept of set is a very basic one. It is simple; yet, it suffices as the basis on which all abstract notions in mathematics can be built. Chater 1 Sets and functions Section 1.1 Sets The concet of set is a very basic one. It is simle; yet, it suffices as the basis on which all abstract notions in mathematics can be built. A set is determined

More information

Lecture 8: Orthogonal Range Searching

Lecture 8: Orthogonal Range Searching CPS234 Comutational Geometry Setember 22nd, 2005 Lecture 8: Orthogonal Range Searching Lecturer: Pankaj K. Agarwal Scribe: Mason F. Matthews 8.1 Range Searching The general roblem of range searching is

More information

Source Coding and express these numbers in a binary system using M log

Source Coding and express these numbers in a binary system using M log Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is

More information

CS2 Algorithms and Data Structures Note 8

CS2 Algorithms and Data Structures Note 8 CS2 Algorithms and Data Structures Note 8 Heasort and Quicksort We will see two more sorting algorithms in this lecture. The first, heasort, is very nice theoretically. It sorts an array with n items in

More information

Trigonometric Functions

Trigonometric Functions Similar Right-Angled Triangles Trigonometric Functions We lan to introduce trigonometric functions as certain ratios determined by similar right-angled triangles. By de nition, two given geometric gures

More information

Probabilistic Visual Cryptography Schemes

Probabilistic Visual Cryptography Schemes The Comuter Journal Advance Access ublished December, 25 The Author 25. Published by Oxford University Press on behalf of The British Comuter Society. All rights reserved. For Permissions, lease email:

More information

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

1.5 Case Study. dynamic connectivity quick find quick union improvements applications

1.5 Case Study. dynamic connectivity quick find quick union improvements applications . Case Study dynamic connectivity quick find quick union imrovements alications Subtext of today s lecture (and this course) Stes to develoing a usable algorithm. Model the roblem. Find an algorithm to

More information

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical

More information

STRONG / WEAK EDGE VERTEX MIXED DOMINATION NUMBER OF A GRAPH

STRONG / WEAK EDGE VERTEX MIXED DOMINATION NUMBER OF A GRAPH IJMS, Vol. 11, No. 3-4, (July-December 2012),. 433-444 Serials Publications ISSN: 0972-754X STRONG / WEAK EDGE VERTEX MIXED DOMINATION NUMBER OF A GRAPH R. S. Bhat, S. S. Kamath & Surekha R. Bhat Abstract:

More information

Computing the Convex Hull of. W. Hochstattler, S. Kromberg, C. Moll

Computing the Convex Hull of. W. Hochstattler, S. Kromberg, C. Moll Reort No. 94.60 A new Linear Time Algorithm for Comuting the Convex Hull of a Simle Polygon in the Plane by W. Hochstattler, S. Kromberg, C. Moll 994 W. Hochstattler, S. Kromberg, C. Moll Universitat zu

More information

CMSC 425: Lecture 16 Motion Planning: Basic Concepts

CMSC 425: Lecture 16 Motion Planning: Basic Concepts : Lecture 16 Motion lanning: Basic Concets eading: Today s material comes from various sources, including AI Game rogramming Wisdom 2 by S. abin and lanning Algorithms by S. M. LaValle (Chats. 4 and 5).

More information

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics structure arises in many alications of geometry. The dual structure, called a Delaunay triangulation also has many interesting roerties. Figure 3: Voronoi diagram and Delaunay triangulation. Search: Geometric

More information

Intersection Graph on Non-Split Majority Dominating Graph

Intersection Graph on Non-Split Majority Dominating Graph Malaya J. Mat. S()(015) 476 480 Intersection Grah on Non-Slit Majority Dominating Grah J. Joseline Manora a and S. Veeramanikandan b, a,b PG and Research Deartment of Mathematics, T.B.M.L College, Porayar,

More information

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION Yugoslav Journal of Oerations Research (00), umber, 5- A BICRITERIO STEIER TREE PROBLEM O GRAPH Mirko VUJO[EVI], Milan STAOJEVI] Laboratory for Oerational Research, Faculty of Organizational Sciences University

More information

6.856 Randomized Algorithms

6.856 Randomized Algorithms 6.856 Randomized Algorithms David Karger Handout #4, September 21, 2002 Homework 1 Solutions Problem 1 MR 1.8. (a) The min-cut algorithm given in class works because at each step it is very unlikely (probability

More information

Chapter 8: Adaptive Networks

Chapter 8: Adaptive Networks Chater : Adative Networks Introduction (.1) Architecture (.2) Backroagation for Feedforward Networks (.3) Jyh-Shing Roger Jang et al., Neuro-Fuzzy and Soft Comuting: A Comutational Aroach to Learning and

More information

We will then introduce the DT, discuss some of its fundamental properties and show how to compute a DT directly from a given set of points.

We will then introduce the DT, discuss some of its fundamental properties and show how to compute a DT directly from a given set of points. Voronoi Diagram and Delaunay Triangulation 1 Introduction The Voronoi Diagram (VD, for short) is a ubiquitious structure that aears in a variety of discilines - biology, geograhy, ecology, crystallograhy,

More information

Equality-Based Translation Validator for LLVM

Equality-Based Translation Validator for LLVM Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented

More information

A Simplied NP-complete MAXSAT Problem. Abstract. It is shown that the MAX2SAT problem is NP-complete even if every variable

A Simplied NP-complete MAXSAT Problem. Abstract. It is shown that the MAX2SAT problem is NP-complete even if every variable A Simplied NP-complete MAXSAT Problem Venkatesh Raman 1, B. Ravikumar 2 and S. Srinivasa Rao 1 1 The Institute of Mathematical Sciences, C. I. T. Campus, Chennai 600 113. India 2 Department of Computer

More information

arxiv: v1 [math.gt] 1 May 2018

arxiv: v1 [math.gt] 1 May 2018 CIRCUIT PRESENTATION AND LATTICE STICK NUMBER WITH EXACTLY 4 z-sticks HYOUNGJUN KIM AND SUNGJONG NO arxiv:805.0023v [math.gt] May 208 Abstract. The lattice stick number s L(L) of a link L is defined to

More information

Distributed Estimation from Relative Measurements in Sensor Networks

Distributed Estimation from Relative Measurements in Sensor Networks Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.

More information

Cross products. p 2 p. p p1 p2. p 1. Line segments The convex combination of two distinct points p1 ( x1, such that for some real number with 0 1,

Cross products. p 2 p. p p1 p2. p 1. Line segments The convex combination of two distinct points p1 ( x1, such that for some real number with 0 1, CHAPTER 33 Comutational Geometry Is the branch of comuter science that studies algorithms for solving geometric roblems. Has alications in many fields, including comuter grahics robotics, VLSI design comuter

More information

Submission. Verifying Properties Using Sequential ATPG

Submission. Verifying Properties Using Sequential ATPG Verifying Proerties Using Sequential ATPG Jacob A. Abraham and Vivekananda M. Vedula Comuter Engineering Research Center The University of Texas at Austin Austin, TX 78712 jaa, vivek @cerc.utexas.edu Daniel

More information

Constrained Empty-Rectangle Delaunay Graphs

Constrained Empty-Rectangle Delaunay Graphs CCCG 2015, Kingston, Ontario, August 10 12, 2015 Constrained Emty-Rectangle Delaunay Grahs Prosenjit Bose Jean-Lou De Carufel André van Renssen Abstract Given an arbitrary convex shae C, a set P of oints

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

COMP Parallel Computing. BSP (1) Bulk-Synchronous Processing Model

COMP Parallel Computing. BSP (1) Bulk-Synchronous Processing Model COMP 6 - Parallel Comuting Lecture 6 November, 8 Bulk-Synchronous essing Model Models of arallel comutation Shared-memory model Imlicit communication algorithm design and analysis relatively simle but

More information

Notes for Lecture 24

Notes for Lecture 24 U.C. Berkeley CS170: Intro to CS Theory Handout N24 Professor Luca Trevisan December 4, 2001 Notes for Lecture 24 1 Some NP-complete Numerical Problems 1.1 Subset Sum The Subset Sum problem is defined

More information

TD C. Space filling designs in R

TD C. Space filling designs in R TD C Sace filling designs in R 8/05/0 Tyical engineering ractice : One-At-a-Time (OAT design X P P3 P X Main remarks : OAT brings some information, but otentially wrong Eloration is oor : on monotonicity?

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

Improving Trust Estimates in Planning Domains with Rare Failure Events

Improving Trust Estimates in Planning Domains with Rare Failure Events Imroving Trust Estimates in Planning Domains with Rare Failure Events Colin M. Potts and Kurt D. Krebsbach Det. of Mathematics and Comuter Science Lawrence University Aleton, Wisconsin 54911 USA {colin.m.otts,

More information

Efficient Selection and Sorting Schemes for Processing Large Distributed Files in de Bruijn Networks and Hypercubes

Efficient Selection and Sorting Schemes for Processing Large Distributed Files in de Bruijn Networks and Hypercubes Efficient Selection and Sorting Schemes for Processing Large Distributed Files in de Bruijn Networks and Hyercubes DavidS.L.Wei Deartment of Comuter and Information Sciences Fordham University New York,

More information

CASCH - a Scheduling Algorithm for "High Level"-Synthesis

CASCH - a Scheduling Algorithm for High Level-Synthesis CASCH a Scheduling Algorithm for "High Level"Synthesis P. Gutberlet H. Krämer W. Rosenstiel Comuter Science Research Center at the University of Karlsruhe (FZI) HaidundNeuStr. 1014, 7500 Karlsruhe, F.R.G.

More information

Chapter 7b - Point Estimation and Sampling Distributions

Chapter 7b - Point Estimation and Sampling Distributions Chater 7b - Point Estimation and Samling Distributions Chater 7 (b) Point Estimation and Samling Distributions Point estimation is a form of statistical inference. In oint estimation we use the data from

More information

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture

More information

Exercises Computational Complexity

Exercises Computational Complexity Exercises Computational Complexity March 22, 2017 Exercises marked with a are more difficult. 1 Chapter 7, P and NP Exercise 1. Suppose some pancakes are stacked on a surface such that no two pancakes

More information

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment

More information

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/18/14

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/18/14 600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/18/14 23.1 Introduction We spent last week proving that for certain problems,

More information

The degree constrained k-cardinality minimum spanning tree problem: a lexisearch

The degree constrained k-cardinality minimum spanning tree problem: a lexisearch Decision Science Letters 7 (2018) 301 310 Contents lists available at GrowingScience Decision Science Letters homeage: www.growingscience.com/dsl The degree constrained k-cardinality minimum sanning tree

More information

1 Introduction. 1. Prove the problem lies in the class NP. 2. Find an NP-complete problem that reduces to it.

1 Introduction. 1. Prove the problem lies in the class NP. 2. Find an NP-complete problem that reduces to it. 1 Introduction There are hundreds of NP-complete problems. For a recent selection see http://www. csc.liv.ac.uk/ ped/teachadmin/comp202/annotated_np.html Also, see the book M. R. Garey and D. S. Johnson.

More information

Near-Optimal Routing Lookups with Bounded Worst Case Performance

Near-Optimal Routing Lookups with Bounded Worst Case Performance Near-Otimal Routing Lookus with Bounded Worst Case Performance Pankaj Guta Balaji Prabhakar Stehen Boyd Deartments of Electrical Engineering and Comuter Science Stanford University CA 9430 ankaj@stanfordedu

More information

Taut ideal triangulations of 3-manifolds

Taut ideal triangulations of 3-manifolds Abstract Taut ideal triangulations of 3-manifolds Marc Lackenby Mathematical Institute, Oxford University, 24-29 St Giles, Oxford OX1 3LB, UK Email: lackenby@maths.ox.ac.uk A taut ideal triangulation of

More information

Applying the fuzzy preference relation to the software selection

Applying the fuzzy preference relation to the software selection Proceedings of the 007 WSEAS International Conference on Comuter Engineering and Alications, Gold Coast, Australia, January 17-19, 007 83 Alying the fuzzy reference relation to the software selection TIEN-CHIN

More information

Parallel Construction of Multidimensional Binary Search Trees. Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka

Parallel Construction of Multidimensional Binary Search Trees. Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka Parallel Construction of Multidimensional Binary Search Trees Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka School of CIS and School of CISE Northeast Parallel Architectures Center Syracuse

More information

Using Standard AADL for COMPASS

Using Standard AADL for COMPASS Using Standard AADL for COMPASS (noll@cs.rwth-aachen.de) AADL Standards Meeting Aachen, Germany; July 5 8, 06 Overview Introduction SLIM Language Udates COMPASS Develoment Roadma Fault Injections Parametric

More information

10. Parallel Methods for Data Sorting

10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting... 1 10.1. Parallelizing Princiles... 10.. Scaling Parallel Comutations... 10.3. Bubble Sort...3 10.3.1. Sequential Algorithm...3

More information

CMSC 754 Computational Geometry 1

CMSC 754 Computational Geometry 1 CMSC 754 Comutational Geometry 1 David M. Mount Deartment of Comuter Science University of Maryland Fall 2002 1 Coyright, David M. Mount, 2002, Det. of Comuter Science, University of Maryland, College

More information

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method ITB J. Eng. Sci. Vol. 39 B, No. 1, 007, 1-19 1 Leak Detection Modeling and Simulation for Oil Pieline with Artificial Intelligence Method Pudjo Sukarno 1, Kuntjoro Adji Sidarto, Amoranto Trisnobudi 3,

More information

An Efficient Video Program Delivery algorithm in Tree Networks*

An Efficient Video Program Delivery algorithm in Tree Networks* 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,

More information

Extracting Optimal Paths from Roadmaps for Motion Planning

Extracting Optimal Paths from Roadmaps for Motion Planning Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu

More information

1 Linear programming relaxation

1 Linear programming relaxation Cornell University, Fall 2010 CS 6820: Algorithms Lecture notes: Primal-dual min-cost bipartite matching August 27 30 1 Linear programming relaxation Recall that in the bipartite minimum-cost perfect matching

More information

Multicommodity Network Flow - Methods and Applications

Multicommodity Network Flow - Methods and Applications Multicommodity Network Flow - Methods and Alications Joe Lindström Linköing University joeli89@student.liu.se Abstract This survey describes the Multicommodity Network Flow roblem, a network flow roblem

More information

Extremal Graph Theory: Turán s Theorem

Extremal Graph Theory: Turán s Theorem Bridgewater State University Virtual Commons - Bridgewater State University Honors Program Theses and Projects Undergraduate Honors Program 5-9-07 Extremal Graph Theory: Turán s Theorem Vincent Vascimini

More information

Convex Hulls. Helen Cameron. Helen Cameron Convex Hulls 1/101

Convex Hulls. Helen Cameron. Helen Cameron Convex Hulls 1/101 Convex Hulls Helen Cameron Helen Cameron Convex Hulls 1/101 What Is a Convex Hull? Starting Point: Points in 2D y x Helen Cameron Convex Hulls 3/101 Convex Hull: Informally Imagine that the x, y-lane is

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical

More information

COT5405: GEOMETRIC ALGORITHMS

COT5405: GEOMETRIC ALGORITHMS COT5405: GEOMETRIC ALGORITHMS Objects: Points in, Segments, Lines, Circles, Triangles Polygons, Polyhedra R n Alications Vision, Grahics, Visualizations, Databases, Data mining, Networks, GIS Scientific

More information

Curve Reconstruction

Curve Reconstruction Curve Reconstruction Ernst Althaus Tamal Dey Stefan Näher Edgar Ramos Ernst Althaus and Kurt Mehlhorn: Traveling Salesman-Based Curve Reconstruction in Polynomial Time, SIAM Journal on Comuting, 3, 27

More information

AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS

AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS Philie LACOMME, Christian PRINS, Wahiba RAMDANE-CHERIF Université de Technologie de Troyes, Laboratoire d Otimisation des Systèmes Industriels (LOSI)

More information

GEOMETRIC CONSTRAINT SOLVING IN < 2 AND < 3. Department of Computer Sciences, Purdue University. and PAMELA J. VERMEER

GEOMETRIC CONSTRAINT SOLVING IN < 2 AND < 3. Department of Computer Sciences, Purdue University. and PAMELA J. VERMEER GEOMETRIC CONSTRAINT SOLVING IN < AND < 3 CHRISTOPH M. HOFFMANN Deartment of Comuter Sciences, Purdue University West Lafayette, Indiana 47907-1398, USA and PAMELA J. VERMEER Deartment of Comuter Sciences,

More information

RTL Fast Convolution using the Mersenne Number Transform

RTL Fast Convolution using the Mersenne Number Transform RTL Fast Convolution using the Mersenne Number Transform Oscar N. Bria and Horacio A. Villagarcía o.bria@ieee.org CeTAD - - Argentina Abstract VHDL is a versatile high level language for the secification

More information

CS649 Sensor Networks IP Track Lecture 6: Graphical Models

CS649 Sensor Networks IP Track Lecture 6: Graphical Models CS649 Sensor Networks IP Track Lecture 6: Grahical Models I-Jeng Wang htt://hinrg.cs.jhu.edu/wsn06/ Sring 2006 CS 649 1 Sring 2006 CS 649 2 Grahical Models Grahical Model: grahical reresentation of joint

More information

NP Completeness. Andreas Klappenecker [partially based on slides by Jennifer Welch]

NP Completeness. Andreas Klappenecker [partially based on slides by Jennifer Welch] NP Completeness Andreas Klappenecker [partially based on slides by Jennifer Welch] Overview We already know the following examples of NPC problems: SAT 3SAT We are going to show that the following are

More information

Lecture 1: An Introduction to Online Algorithms

Lecture 1: An Introduction to Online Algorithms Algoritmos e Incerteza (PUC-Rio INF979, 017.1) Lecture 1: An Introduction to Online Algorithms Mar 1, 017 Lecturer: Marco Molinaro Scribe: Joao Pedro T. Brandao Online algorithms differ from traditional

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

Chapter 7, Part B Sampling and Sampling Distributions

Chapter 7, Part B Sampling and Sampling Distributions Slides Preared by JOHN S. LOUCKS St. Edward s University Slide 1 Chater 7, Part B Samling and Samling Distributions Samling Distribution of Proerties of Point Estimators Other Samling Methods Slide 2 Samling

More information

A Concise Workbook for College Algebra

A Concise Workbook for College Algebra City University of New York (CUNY) CUNY Academic Works Oen Educational Resources Queensborough Community College Summer 6--08 A Concise Workbook for College Algebra Fei Ye Queensborough Community College

More information

Curve Reconstruction taken from [1]

Curve Reconstruction taken from [1] Notes by Tamal K. Dey, OSU 47 Curve Reconstruction taken from [1] The simlest class of manifolds that ose nontrivial reconstruction roblems are curves in the lane. We will describe two algorithms for curve

More information

In this lecture we discuss the complexity of approximation problems, and show how to prove they are NP-hard.

In this lecture we discuss the complexity of approximation problems, and show how to prove they are NP-hard. In this lecture we discuss the complexity of approximation problems, and show how to prove they are NP-hard. 1 We will show how one can prove such results and then apply this technique to some approximation

More information

Using Rational Numbers and Parallel Computing to Efficiently Avoid Round-off Errors on Map Simplification

Using Rational Numbers and Parallel Computing to Efficiently Avoid Round-off Errors on Map Simplification Using Rational Numbers and Parallel Comuting to Efficiently Avoid Round-off Errors on Ma Simlification Maurício G. Grui 1, Salles V. G. de Magalhães 1,2, Marcus V. A. Andrade 1, W. Randolh Franklin 2,

More information

A Symmetric FHE Scheme Based on Linear Algebra

A Symmetric FHE Scheme Based on Linear Algebra A Symmetric FHE Scheme Based on Linear Algebra Iti Sharma University College of Engineering, Comuter Science Deartment. itisharma.uce@gmail.com Abstract FHE is considered to be Holy Grail of cloud comuting.

More information

Face Recognition Using Legendre Moments

Face Recognition Using Legendre Moments Face Recognition Using Legendre Moments Dr.S.Annadurai 1 A.Saradha Professor & Head of CSE & IT Research scholar in CSE Government College of Technology, Government College of Technology, Coimbatore, Tamilnadu,

More information

Hardware-Accelerated Formal Verification

Hardware-Accelerated Formal Verification Hardare-Accelerated Formal Verification Hiroaki Yoshida, Satoshi Morishita 3 Masahiro Fujita,. VLSI Design and Education Center (VDEC), University of Tokyo. CREST, Jaan Science and Technology Agency 3.

More information

The Resolution Algorithm

The Resolution Algorithm The Resolution Algorithm Introduction In this lecture we introduce the Resolution algorithm for solving instances of the NP-complete CNF- SAT decision problem. Although the algorithm does not run in polynomial

More information

Improving Parallel-Disk Buffer Management using Randomized Writeback æ

Improving Parallel-Disk Buffer Management using Randomized Writeback æ Aears in Proceedings of ICPP 98 1 Imroving Parallel-Disk Buffer Management using Randomized Writeback æ Mahesh Kallahalla Peter J Varman Detartment of Electrical and Comuter Engineering Rice University

More information

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,

More information

Non-Strict Independence-Based Program Parallelization Using Sharing and Freeness Information

Non-Strict Independence-Based Program Parallelization Using Sharing and Freeness Information Non-Strict Indeendence-Based Program Parallelization Using Sharing and Freeness Information Daniel Cabeza Gras 1 and Manuel V. Hermenegildo 1,2 Abstract The current ubiuity of multi-core rocessors has

More information

Towards the Proof of the PCP Theorem

Towards the Proof of the PCP Theorem CS640 Computational Complexity Towards the Proof of the PCP Theorem Instructor: Manindra Agrawal Scribe: Ramprasad Saptharishi Last class we saw completed our discussion on expander graphs. We shall now

More information

Vertex Cover Approximations

Vertex Cover Approximations CS124 Lecture 20 Heuristics can be useful in practice, but sometimes we would like to have guarantees. Approximation algorithms give guarantees. It is worth keeping in mind that sometimes approximation

More information

The complement of PATH is in NL

The complement of PATH is in NL 340 The complement of PATH is in NL Let c be the number of nodes in graph G that are reachable from s We assume that c is provided as an input to M Given G, s, t, and c the machine M operates as follows:

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Distrib. Comut. 71 (2011) 288 301 Contents lists available at ScienceDirect J. Parallel Distrib. Comut. journal homeage: www.elsevier.com/locate/jdc Quality of security adatation in arallel

More information

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15 600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15 25.1 Introduction Today we re going to spend some time discussing game

More information