Pareto Optimal Solutions for Smoothed Analysts

Size: px
Start display at page:

Download "Pareto Optimal Solutions for Smoothed Analysts"

Transcription

1 Pareto Optimal Solutions for Smoothed Analysts Ankur Moitra, IAS joint work with Ryan O Donnell, CMU September 26, 2011 Ankur Moitra (IAS) Pareto September 26, 2011

2 values weights v1 w v i w i v i+1 w i v n w n W

3 values weights v1 w v i w i v i+1 w i v n w n W

4 values weights v1 w v i w i v i+1 w i v n w n W value W weight

5 values weights v w v i w i v i+1 w i v n w n W value W weight

6 values weights v w v i w i v i+1 w i v n w n W value W weight

7 values weights v w v i w i v i+1 w i v n w n W Not Pareto Optimal value W weight

8 values weights v w v i w i v i+1 w i v n w n W Pareto Optimal! value W weight

9 values weights v w v i w i v i+1 w i v n w n W value W weight

10 values weights v w v i w i v i+1 w i v n w n W value PO(i) W weight

11 values weights v w v i w i v i+1 w i v n w n W value W weight

12 values weights v1... w... 1 v i w i v i+1 w i v n w n W w i+1 v i+1 value W weight

13 values weights v1... w... 1 v i w i v i+1 w i v n w n W value W weight

14 values weights v1... w... 1 v i w i v i+1 w i v n w n W value W weight

15 values weights v1... w... 1 v i w i v i+1 w i v n w n W value W weight

16 values weights v1... w... 1 v i w i v i+1 w i v n w n W value W weight

17 values weights v1... w... 1 v i w i v i+1 w i v n w n W value W weight

18 values weights v1... w... 1 v i w i v i+1 w i v n w n W value W weight

19 values weights v w v i w i v i+1 w i v n w n W value PO(i+1) W weight

20 Dynamic Programming with Lists (Nemhauser, Ullmann):

21 Dynamic Programming with Lists (Nemhauser, Ullmann): PO(i + 1) can be computed from PO(i)...

22 Dynamic Programming with Lists (Nemhauser, Ullmann): PO(i + 1) can be computed from PO(i) in linear (in PO(i) ) time

23 Dynamic Programming with Lists (Nemhauser, Ullmann): PO(i + 1) can be computed from PO(i) in linear (in PO(i) ) time an optimal solution can be computed from PO(n)

24 Dynamic Programming with Lists (Nemhauser, Ullmann): PO(i + 1) can be computed from PO(i) in linear (in PO(i) ) time an optimal solution can be computed from PO(n) Bottleneck in many algorithms: enumerate the set of Pareto optimal solutions

25 Results of Beier and Vöcking (STOC 2003, STOC 2004) Smoothed Analysis of Pareto Curves:

26 Results of Beier and Vöcking (STOC 2003, STOC 2004) Smoothed Analysis of Pareto Curves: Polynomial bound on PO(i) s (in two dimensions) in the framework of Smoothed Analysis (Spielman, Teng)

27 Results of Beier and Vöcking (STOC 2003, STOC 2004) Smoothed Analysis of Pareto Curves: Polynomial bound on PO(i) s (in two dimensions) in the framework of Smoothed Analysis (Spielman, Teng) Knapsack has polynomial smoothed complexity:

28 Results of Beier and Vöcking (STOC 2003, STOC 2004) Smoothed Analysis of Pareto Curves: Polynomial bound on PO(i) s (in two dimensions) in the framework of Smoothed Analysis (Spielman, Teng) Knapsack has polynomial smoothed complexity: first NP-hard problem that is (smoothed) easy

29 Results of Beier and Vöcking (STOC 2003, STOC 2004) Smoothed Analysis of Pareto Curves: Polynomial bound on PO(i) s (in two dimensions) in the framework of Smoothed Analysis (Spielman, Teng) Knapsack has polynomial smoothed complexity: first NP-hard problem that is (smoothed) easy generalizes long line of results on random instances

30 Capturing Tradeoffs

31 Capturing Tradeoffs Question What if the precise objective function (of a decision maker) is unknown?

32 Capturing Tradeoffs Question What if the precise objective function (of a decision maker) is unknown? e.g. travel planning: prefer lower fare, shorter trip, fewer transfers

33 Capturing Tradeoffs Question What if the precise objective function (of a decision maker) is unknown? e.g. travel planning: prefer lower fare, shorter trip, fewer transfers Question Can we algorithmically help a decision maker?

34 Capturing Tradeoffs Question What if the precise objective function (of a decision maker) is unknown? e.g. travel planning: prefer lower fare, shorter trip, fewer transfers Question Can we algorithmically help a decision maker? Pareto curves capture tradeoffs among competing objectives

35 Proposition Only useful approach if Pareto curves are small

36 Proposition Only useful approach if Pareto curves are small Confirmed empirically e.g. Müller-Hannemann, Weihe: German train system

37 Proposition Only useful approach if Pareto curves are small Confirmed empirically e.g. Müller-Hannemann, Weihe: German train system Question Why should we expect Pareto curves to be small?

38 Proposition Only useful approach if Pareto curves are small Confirmed empirically e.g. Müller-Hannemann, Weihe: German train system Question Why should we expect Pareto curves to be small? Caveat: Smoothed Analysis is not a complete explanation

39 The Model Adversary chooses:

40 The Model Adversary chooses: Z {0, 1} n (e.g. spanning trees, Hamiltonian cycles)

41 The Model Adversary chooses: Z {0, 1} n (e.g. spanning trees, Hamiltonian cycles) an adversarial objective function OBJ 1 : Z R +

42 The Model Adversary chooses: Z {0, 1} n (e.g. spanning trees, Hamiltonian cycles) an adversarial objective function OBJ 1 : Z R + d 1 linear objective functions OBJ i ( x) = [w1, i w2, i...wn] i x

43 The Model Adversary chooses: Z {0, 1} n (e.g. spanning trees, Hamiltonian cycles) an adversarial objective function OBJ 1 : Z R + d 1 linear objective functions OBJ i ( x) = [w i 1, w i 2,...w i n] x... each w i j is a random variable on [ 1, +1] density is bounded by φ

44 History Let PO be the set of Pareto optimal solutions...

45 History Let PO be the set of Pareto optimal solutions... [Beier, Vöcking STOC 2003] (d = 2), E[ PO ] = O(n 5 φ)

46 History Let PO be the set of Pareto optimal solutions... [Beier, Vöcking STOC 2003] (d = 2), E[ PO ] = O(n 5 φ) [Beier, Vöcking STOC 2004] (d = 2), E[ PO ] = O(n 4 φ)

47 History Let PO be the set of Pareto optimal solutions... [Beier, Vöcking STOC 2003] (d = 2), E[ PO ] = O(n 5 φ) [Beier, Vöcking STOC 2004] (d = 2), E[ PO ] = O(n 4 φ) [Beier, Röglin, Vöcking IPCO 2007] (d = 2), E[ PO ] = O(n 2 φ) (tight)

48 History Let PO be the set of Pareto optimal solutions... [Beier, Vöcking STOC 2003] (d = 2), E[ PO ] = O(n 5 φ) [Beier, Vöcking STOC 2004] (d = 2), E[ PO ] = O(n 4 φ) [Beier, Röglin, Vöcking IPCO 2007] (d = 2), E[ PO ] = O(n 2 φ) (tight) [Röglin, Teng, FOCS 2009] E[ PO ] = O((n φ) f (d) )... where f (d) = 2 d 1 (d + 1)!

49 History Let PO be the set of Pareto optimal solutions... [Beier, Vöcking STOC 2003] (d = 2), E[ PO ] = O(n 5 φ) [Beier, Vöcking STOC 2004] (d = 2), E[ PO ] = O(n 4 φ) [Beier, Röglin, Vöcking IPCO 2007] (d = 2), E[ PO ] = O(n 2 φ) (tight) [Röglin, Teng, FOCS 2009] E[ PO ] = O((n φ) f (d) )... where f (d) = 2 d 1 (d + 1)! [Dughmi, Roughgarden, FOCS 2010] any FPTAS can be transformed to a truthful in expectation FPTAS

50 Our Results Theorem E[ PO ] 2 (4φd) d(d 1)/2 n 2d 2

51 Our Results Theorem E[ PO ] 2 (4φd) d(d 1)/2 n 2d 2...answers a conjecture of Teng

52 Our Results Theorem E[ PO ] 2 (4φd) d(d 1)/2 n 2d 2...answers a conjecture of Teng [Bently et al, JACM 1978]: 2 n points sampled from a d-dimensional Gaussian, E[ PO ] = Θ(n d 1 ) square factor difference necessary for d = 2

53 On Smoothed Analysis

54 On Smoothed Analysis Bounds are notoriously pessimistic (e.g. Simplex)

55 On Smoothed Analysis Bounds are notoriously pessimistic (e.g. Simplex) Method of Analysis:

56 On Smoothed Analysis Bounds are notoriously pessimistic (e.g. Simplex) Method of Analysis: Define a bad event...that you can blame if your algorithm runs slowly

57 On Smoothed Analysis Bounds are notoriously pessimistic (e.g. Simplex) Method of Analysis: Define a bad event...that you can blame if your algorithm runs slowly Prove this event is rare

58 On Smoothed Analysis Bounds are notoriously pessimistic (e.g. Simplex) Method of Analysis: Define a bad event...that you can blame if your algorithm runs slowly Prove this event is rare Proposition Randomness is your friend!

59 Our Approach

60 Our Approach Goal Define bad events using as little randomness as possible

61 Our Approach Goal Define bad events using as little randomness as possible... conserve randomness, save for analysis

62 Our Approach Goal Define bad events using as little randomness as possible... conserve randomness, save for analysis Challenge Events become convoluted (to say the least!)

63 Our Approach Goal Define bad events using as little randomness as possible... conserve randomness, save for analysis Challenge Events become convoluted (to say the least!) We give an algorithm to define these events

64 An Alternative Condition OBJ 2 time OBJ1

65 An Alternative Condition OBJ 2 time OBJ1

66 An Alternative Condition OBJ 2 time OBJ1

67 An Alternative Condition OBJ 2 time OBJ1

68 An Alternative Condition OBJ 2 time OBJ 1

69 An Alternative Condition OBJ 2 time OBJ 1

70 An Alternative Condition OBJ 2 time OBJ 1

71 Method of Proof Goal Count the (expected) number of Pareto optimal solutions

72 Method of Proof Goal Count the (expected) number of Pareto optimal solutions Define a complete family of events... for each Pareto optimal solution at least one (unique) event occurs

73 Method of Proof Goal Count the (expected) number of Pareto optimal solutions Define a complete family of events... for each Pareto optimal solution at least one (unique) event occurs Then bound the expected number of events

74 Method of Proof Goal Count the (expected) number of Pareto optimal solutions Define a complete family of events... for each Pareto optimal solution at least one (unique) event occurs Then bound the expected number of events The key is in the definition

75 The Common Case (Beier, Röglin, Vöcking) OBJ 2 x time OBJ1

76 The Common Case (Beier, Röglin, Vöcking) OBJ 2 y x time OBJ 1

77 The Common Case (Beier, Röglin, Vöcking) OBJ 2 y EMPTY x time OBJ1

78 The Common Case (Beier, Röglin, Vöcking) OBJ 2 y EMPTY i x time OBJ1

79 The Common Case (Beier, Röglin, Vöcking) OBJ 2 y y i = 0 EMPTY i x x i = 1 time OBJ1

80 The Common Case (Beier, Röglin, Vöcking) OBJ 2 y y i = 0 EMPTY i EMPTY x x i = 1 time OBJ1

81 Complete Family of Events Let I = (a, b) be an interval of [ n, +n] of width ɛ

82 Complete Family of Events Let I = (a, b) be an interval of [ n, +n] of width ɛ Let E be the event that there is an x PO:

83 Complete Family of Events Let I = (a, b) be an interval of [ n, +n] of width ɛ Let E be the event that there is an x PO: OBJ 2 ( x) I

84 Complete Family of Events Let I = (a, b) be an interval of [ n, +n] of width ɛ Let E be the event that there is an x PO: OBJ 2 ( x) I y have the smallest OBJ 1 ( y) among all points for which OBJ 2 ( y) > b

85 Complete Family of Events Let I = (a, b) be an interval of [ n, +n] of width ɛ Let E be the event that there is an x PO: OBJ 2 ( x) I y have the smallest OBJ 1 ( y) among all points for which OBJ 2 ( y) > b y i = 0, x i = 1

86 Complete Family of Events Let I = (a, b) be an interval of [ n, +n] of width ɛ Let E be the event that there is an x PO: OBJ 2 ( x) I y have the smallest OBJ 1 ( y) among all points for which OBJ 2 ( y) > b y i = 0, x i = 1 Claim Pr[E] ɛφ

87 Analysis OBJ1: arbitrary OBJ 2 : [??,??,...??...?? ] x E OBJ 2 Z time OBJ1

88 Analysis OBJ1: arbitrary OBJ 2 : [??,??,...??...?? ] x E OBJ 2 Z I time OBJ1

89 Analysis OBJ 2 OBJ1: arbitrary OBJ [ w,, ] E 2: 1 w 2?? w n x index i Z I time OBJ1

90 Analysis OBJ 2 OBJ1: arbitrary OBJ [ w,, ] E 2: 1 w 2?? w n x index i Z I x z time OBJ1

91 Analysis OBJ 2 I OBJ1: arbitrary OBJ [ w,, ] E 2: 1 w 2?? w n x index i x = 1 i Z x = 0 i Z i Z i x z time OBJ1

92 Analysis OBJ 2 I y OBJ1: arbitrary OBJ [ w,, ] E 2: 1 w 2?? w n x index i x = 1 i Z x = 0 i Z i Z i x z time OBJ1

93 Analysis OBJ 2 I y OBJ1: arbitrary OBJ [ w,, ] E 2: 1 w 2?? w n x index i x = 1 i Z x = 0 i Z i Z i x z T OBJ (x)>obj (y) 1 1 time OBJ1

94 Analysis OBJ 2 I y OBJ1: arbitrary OBJ [ w,, ] E 2: 1 w 2?? w n x index i x z x = 1 i Z x = 0 i Z i Z i T OBJ (x)>obj (y) 1 1 time OBJ1

95 Analysis OBJ 2 I y OBJ1: arbitrary OBJ [ w,, ] E 2: 1 w 2?? w n x index i x same on index i z x = 1 i Z x = 0 i Z i Z i T OBJ (x)>obj (y) 1 1 time OBJ1

96 Analysis OBJ 2 I y OBJ1: arbitrary OBJ [ w,, ] E 2: 1 w 2?? w n x index i x = 1 i Z x = 0 i Z i Z i x z T OBJ (x)>obj (y) 1 1 time OBJ1

97 Analysis OBJ 2 I y OBJ1: arbitrary OBJ [ w,, ] E 2: 1 w 2?? w n x index i x z x = 1 i Z T i Z x = 0 i Z i OBJ (x)>obj (y) 1 1 time OBJ1

98 Analysis OBJ 2 I y OBJ1: arbitrary OBJ [ w,, ] E 2: 1 w 2?? w n x index i x = 1 i x and y = 0 i z x = 1 i Z Z i Z i T x = 0 i OBJ (x)>obj (y) 1 1 time OBJ1

99 A Re-interpretation

100 A Re-interpretation Implicitly defined a Transcription Algorithm:

101 A Re-interpretation Implicitly defined a Transcription Algorithm: Question Given a Pareto optimal solution x, which event should we blame?

102 A Re-interpretation Implicitly defined a Transcription Algorithm: Question Given a Pareto optimal solution x, which event should we blame? Blame event E: interval I, index i, x i and y i

103 A Re-interpretation Implicitly defined a Transcription Algorithm: Question Given a Pareto optimal solution x, which event should we blame? Blame event E: interval I, index i, x i and y i Transcription Algorithm Input: values of r.v.s (and Pareto optimal x) Output: interval I, index i, x i and y i

104 A Re-interpretation Suppose output is event E: interval I, index i, x i and y i

105 A Re-interpretation Suppose output is event E: interval I, index i, x i and y i Question Which solution x caused this event to occur?

106 A Re-interpretation Suppose output is event E: interval I, index i, x i and y i Question Which solution x caused this event to occur? We do not need to know w i to determine the identity of x!

107 A Re-interpretation Suppose output is event E: interval I, index i, x i and y i Question Which solution x caused this event to occur? We do not need to know w i to determine the identity of x! Reverse Algorithm Find y

108 A Re-interpretation Suppose output is event E: interval I, index i, x i and y i Question Which solution x caused this event to occur? We do not need to know w i to determine the identity of x! Reverse Algorithm Find y Then find x

109 A Re-interpretation Reverse Algorithm: Find x (without looking at w i )

110 A Re-interpretation Reverse Algorithm: Find x (without looking at w i ) Question Does x fall into the interval I?

111 A Re-interpretation Reverse Algorithm: Find x (without looking at w i ) Question Does x fall into the interval I? Hidden random variable w i must fall into some small range

112 A Re-interpretation Reverse Algorithm: Find x (without looking at w i ) Question Does x fall into the interval I? Hidden random variable w i must fall into some small range Proposition We can deduce a missing input to Transcription Algorithm, from just some of the inputs and outputs

113 A Re-interpretation Reverse Algorithm: Find x (without looking at w i ) Question Does x fall into the interval I? Hidden random variable w i must fall into some small range Proposition We can deduce a missing input to Transcription Algorithm, from just some of the inputs and outputs Hence each output is unlikely

114 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear, Z Output: (, ), OBJ2

115 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear, Z Output: (, ), OBJ2

116 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear ), Z Output: (,, OBJ2

117 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear, Z Output: (, ), OBJ2

118 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear x, Z Output: (, ), x OBJ 2

119 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ3 : linear x y, Z Output: (, ) y, x OBJ 2

120 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ3 : linear x y, Z Output: (, ) y, x OBJ 2

121 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ3 : linear x y index i, Z Output: (i, ) y, x OBJ 2

122 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear x y index i, Z Output: (i, ) y index i 0, x 1 OBJ 2

123 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear x y index i, Z Output: (i, ) y index i 0, x 1 OBJ 2

124 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear x y index i, Z Output: (i, ) y index i 0, x 1 OBJ 2

125 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear x y index i x i = 0, Z i Z x i = 1 Z i Output: (i, ), y x index i 0 1 OBJ 2

126 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear x y index i x i = 0, Z i Z x i = 1 Z i Output: (i, ) y index i 0 1, x time OBJ 2

127 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear z x y index i x i = 0, Z i Z x i = 1 Z i Output: (i, ), y x index i 0 1 time OBJ 2

128 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear z x y index i x i = 0, Z i Z x i = 1 Z i Output: (i, ), y z x index i time OBJ 2

129 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear z x y index i x i = 0, Z i Z x i = 1 Z i Output: (i, ), y z x index i OBJ 2

130 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear z index j x y index i x i = 0, Z i Z x i = 1 Z i Output: (i, ), y z x index i OBJ 2

131 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear z index j x y index i Z x = 0 i x = 1 i Output: (i,j) index i index j y 0 1, Z i Z i z , x OBJ 2

132 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear z index j x y index i Z x = 0 i x = 1 i Output: (i,j) index i index j y 0 1, Z i Z i z , x OBJ 2

133 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear z index j x y index i Z x = 0 i x = 1 i Output: (i,j) index i index j y 0 1, Z i Z i z , x OBJ 2

134 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial x = 0 OBJ 2, OBJ3 : linear Z z y index j x index i index i index j i Z i x = 1 Z Output: (i,j), i i y z x,, OBJ 2

135 Future Directions?

136 Future Directions? Open Question Are there additional applications of randomness conservation in Smoothed Analysis?

137 Future Directions? Open Question Are there additional applications of randomness conservation in Smoothed Analysis? e.g. simplex algorithm

138 Future Directions? Open Question Are there additional applications of randomness conservation in Smoothed Analysis? e.g. simplex algorithm Open Question Are there perturbation models that make sense for non-linear objectives?

139 Future Directions? Open Question Are there additional applications of randomness conservation in Smoothed Analysis? e.g. simplex algorithm Open Question Are there perturbation models that make sense for non-linear objectives? e.g. submodular functions

140 Questions?

141 Thanks!

Pearls of Algorithms

Pearls of Algorithms Part 3: Randomized Algorithms and Probabilistic Analysis Prof. Dr. Institut für Informatik Winter 2013/14 Efficient Algorithms When is an algorithm considered efficient? Efficient Algorithms When is an

More information

Outline. Main Questions. What is the k-means method? What can we do when worst case analysis is too pessimistic?

Outline. Main Questions. What is the k-means method? What can we do when worst case analysis is too pessimistic? Outline Main Questions 1 Data Clustering What is the k-means method? 2 Smoothed Analysis What can we do when worst case analysis is too pessimistic? 3 Smoothed Analysis of k-means Method What is the smoothed

More information

CS675: Convex and Combinatorial Optimization Spring 2018 The Simplex Algorithm. Instructor: Shaddin Dughmi

CS675: Convex and Combinatorial Optimization Spring 2018 The Simplex Algorithm. Instructor: Shaddin Dughmi CS675: Convex and Combinatorial Optimization Spring 2018 The Simplex Algorithm Instructor: Shaddin Dughmi Algorithms for Convex Optimization We will look at 2 algorithms in detail: Simplex and Ellipsoid.

More information

COMP Analysis of Algorithms & Data Structures

COMP Analysis of Algorithms & Data Structures COMP 3170 - Analysis of Algorithms & Data Structures Shahin Kamali Approximation Algorithms CLRS 35.1-35.5 University of Manitoba COMP 3170 - Analysis of Algorithms & Data Structures 1 / 30 Approaching

More information

NP-Hardness. We start by defining types of problem, and then move on to defining the polynomial-time reductions.

NP-Hardness. We start by defining types of problem, and then move on to defining the polynomial-time reductions. CS 787: Advanced Algorithms NP-Hardness Instructor: Dieter van Melkebeek We review the concept of polynomial-time reductions, define various classes of problems including NP-complete, and show that 3-SAT

More information

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin September 20, 2012 1 / 1 Lecture 2 We continue where we left off last lecture, namely we are considering a PTAS for the the knapsack

More information

Theorem 2.9: nearest addition algorithm

Theorem 2.9: nearest addition algorithm There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used

More information

Smoothed Analysis of the Minimum-Mean Cycle Canceling Algorithm and the Network Simplex Algorithm

Smoothed Analysis of the Minimum-Mean Cycle Canceling Algorithm and the Network Simplex Algorithm Smoothed Analysis of the Minimum-Mean Cycle Canceling Algorithm and the Network Simplex Algorithm Kamiel Cornelissen and Bodo Manthey University of Twente, Enschede, The Netherlands k.cornelissen@utwente.nl,

More information

Online Stochastic Matching CMSC 858F: Algorithmic Game Theory Fall 2010

Online Stochastic Matching CMSC 858F: Algorithmic Game Theory Fall 2010 Online Stochastic Matching CMSC 858F: Algorithmic Game Theory Fall 2010 Barna Saha, Vahid Liaghat Abstract This summary is mostly based on the work of Saberi et al. [1] on online stochastic matching problem

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms Given an NP-hard problem, what should be done? Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one of three desired features. Solve problem to optimality.

More information

Lecture 15: The subspace topology, Closed sets

Lecture 15: The subspace topology, Closed sets Lecture 15: The subspace topology, Closed sets 1 The Subspace Topology Definition 1.1. Let (X, T) be a topological space with topology T. subset of X, the collection If Y is a T Y = {Y U U T} is a topology

More information

Lecture 8: The Traveling Salesman Problem

Lecture 8: The Traveling Salesman Problem Lecture 8: The Traveling Salesman Problem Let G = (V, E) be an undirected graph. A Hamiltonian cycle of G is a cycle that visits every vertex v V exactly once. Instead of Hamiltonian cycle, we sometimes

More information

Hardness of Approximation for the TSP. Michael Lampis LAMSADE Université Paris Dauphine

Hardness of Approximation for the TSP. Michael Lampis LAMSADE Université Paris Dauphine Hardness of Approximation for the TSP Michael Lampis LAMSADE Université Paris Dauphine Sep 2, 2015 Overview Hardness of Approximation What is it? How to do it? (Easy) Examples The PCP Theorem What is it?

More information

Introduction to Approximation Algorithms

Introduction to Approximation Algorithms Introduction to Approximation Algorithms Dr. Gautam K. Das Departmet of Mathematics Indian Institute of Technology Guwahati, India gkd@iitg.ernet.in February 19, 2016 Outline of the lecture Background

More information

Lecture notes on the simplex method September We will present an algorithm to solve linear programs of the form. maximize.

Lecture notes on the simplex method September We will present an algorithm to solve linear programs of the form. maximize. Cornell University, Fall 2017 CS 6820: Algorithms Lecture notes on the simplex method September 2017 1 The Simplex Method We will present an algorithm to solve linear programs of the form maximize subject

More information

Given a graph, find an embedding s.t. greedy routing works

Given a graph, find an embedding s.t. greedy routing works Given a graph, find an embedding s.t. greedy routing works Greedy embedding of a graph 99 Greedy embedding Given a graph G, find an embedding of the vertices in R d, s.t. for each pair of nodes s, t, there

More information

APPROXIMATION ALGORITHMS FOR GEOMETRIC PROBLEMS

APPROXIMATION ALGORITHMS FOR GEOMETRIC PROBLEMS APPROXIMATION ALGORITHMS FOR GEOMETRIC PROBLEMS Subhas C. Nandy (nandysc@isical.ac.in) Advanced Computing and Microelectronics Unit Indian Statistical Institute Kolkata 70010, India. Organization Introduction

More information

Monotone Paths in Geometric Triangulations

Monotone Paths in Geometric Triangulations Monotone Paths in Geometric Triangulations Adrian Dumitrescu Ritankar Mandal Csaba D. Tóth November 19, 2017 Abstract (I) We prove that the (maximum) number of monotone paths in a geometric triangulation

More information

CS 580: Algorithm Design and Analysis. Jeremiah Blocki Purdue University Spring 2018

CS 580: Algorithm Design and Analysis. Jeremiah Blocki Purdue University Spring 2018 CS 580: Algorithm Design and Analysis Jeremiah Blocki Purdue University Spring 2018 Chapter 11 Approximation Algorithms Slides by Kevin Wayne. Copyright @ 2005 Pearson-Addison Wesley. All rights reserved.

More information

CMPSCI611: Approximating SET-COVER Lecture 21

CMPSCI611: Approximating SET-COVER Lecture 21 CMPSCI611: Approximating SET-COVER Lecture 21 Today we look at two more examples of approximation algorithms for NP-hard optimization problems. The first, for the SET-COVER problem, has an approximation

More information

Integral Geometry and the Polynomial Hirsch Conjecture

Integral Geometry and the Polynomial Hirsch Conjecture Integral Geometry and the Polynomial Hirsch Conjecture Jonathan Kelner, MIT Partially based on joint work with Daniel Spielman Introduction n A lot of recent work on Polynomial Hirsch Conjecture has focused

More information

Lecture 16 October 23, 2014

Lecture 16 October 23, 2014 CS 224: Advanced Algorithms Fall 2014 Prof. Jelani Nelson Lecture 16 October 23, 2014 Scribe: Colin Lu 1 Overview In the last lecture we explored the simplex algorithm for solving linear programs. While

More information

Treewidth and graph minors

Treewidth and graph minors Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under

More information

CS270 Combinatorial Algorithms & Data Structures Spring Lecture 19:

CS270 Combinatorial Algorithms & Data Structures Spring Lecture 19: CS270 Combinatorial Algorithms & Data Structures Spring 2003 Lecture 19: 4.1.03 Lecturer: Satish Rao Scribes: Kevin Lacker and Bill Kramer Disclaimer: These notes have not been subjected to the usual scrutiny

More information

6.854 Advanced Algorithms. Scribes: Jay Kumar Sundararajan. Duality

6.854 Advanced Algorithms. Scribes: Jay Kumar Sundararajan. Duality 6.854 Advanced Algorithms Scribes: Jay Kumar Sundararajan Lecturer: David Karger Duality This lecture covers weak and strong duality, and also explains the rules for finding the dual of a linear program,

More information

Reference Sheet for CO142.2 Discrete Mathematics II

Reference Sheet for CO142.2 Discrete Mathematics II Reference Sheet for CO14. Discrete Mathematics II Spring 017 1 Graphs Defintions 1. Graph: set of N nodes and A arcs such that each a A is associated with an unordered pair of nodes.. Simple graph: no

More information

Iterative Methods in Combinatorial Optimization. R. Ravi Carnegie Bosch Professor Tepper School of Business Carnegie Mellon University

Iterative Methods in Combinatorial Optimization. R. Ravi Carnegie Bosch Professor Tepper School of Business Carnegie Mellon University Iterative Methods in Combinatorial Optimization R. Ravi Carnegie Bosch Professor Tepper School of Business Carnegie Mellon University ravi@cmu.edu Combinatorial Optimization Easy Problems : polynomial

More information

Comp Online Algorithms

Comp Online Algorithms Comp 7720 - Online Algorithms Notes 4: Bin Packing Shahin Kamalli University of Manitoba - Fall 208 December, 208 Introduction Bin packing is one of the fundamental problems in theory of computer science.

More information

Recitation 4: Elimination algorithm, reconstituted graph, triangulation

Recitation 4: Elimination algorithm, reconstituted graph, triangulation Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.438 Algorithms For Inference Fall 2014 Recitation 4: Elimination algorithm, reconstituted graph, triangulation

More information

Polynomial Time Approximation Schemes for the Euclidean Traveling Salesman Problem

Polynomial Time Approximation Schemes for the Euclidean Traveling Salesman Problem PROJECT FOR CS388G: ALGORITHMS: TECHNIQUES/THEORY (FALL 2015) Polynomial Time Approximation Schemes for the Euclidean Traveling Salesman Problem Shanshan Wu Vatsal Shah October 20, 2015 Abstract In this

More information

10. EXTENDING TRACTABILITY

10. EXTENDING TRACTABILITY 0. EXTENDING TRACTABILITY finding small vertex covers solving NP-hard problems on trees circular arc coverings vertex cover in bipartite graphs Lecture slides by Kevin Wayne Copyright 005 Pearson-Addison

More information

The Simplex Algorithm

The Simplex Algorithm The Simplex Algorithm Uri Feige November 2011 1 The simplex algorithm The simplex algorithm was designed by Danzig in 1947. This write-up presents the main ideas involved. It is a slight update (mostly

More information

8 Matroid Intersection

8 Matroid Intersection 8 Matroid Intersection 8.1 Definition and examples 8.2 Matroid Intersection Algorithm 8.1 Definitions Given two matroids M 1 = (X, I 1 ) and M 2 = (X, I 2 ) on the same set X, their intersection is M 1

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms Subhash Suri November 27, 2017 1 Bin Packing Algorithms A classical problem, with long and interesting history. One of the early problems shown to be intractable. Lends to simple

More information

Algorithm Design and Analysis

Algorithm Design and Analysis Algorithm Design and Analysis LECTURE 29 Approximation Algorithms Load Balancing Weighted Vertex Cover Reminder: Fill out SRTEs online Don t forget to click submit Sofya Raskhodnikova 12/7/2016 Approximation

More information

Discrete Optimization. Lecture Notes 2

Discrete Optimization. Lecture Notes 2 Discrete Optimization. Lecture Notes 2 Disjunctive Constraints Defining variables and formulating linear constraints can be straightforward or more sophisticated, depending on the problem structure. The

More information

Examples of P vs NP: More Problems

Examples of P vs NP: More Problems Examples of P vs NP: More Problems COMP1600 / COMP6260 Dirk Pattinson Australian National University Semester 2, 2017 Catch Up / Drop in Lab When Fridays, 15.00-17.00 Where N335, CSIT Building (bldg 108)

More information

Minimum-Cost Flow Network

Minimum-Cost Flow Network Minimum-Cost Flow Network Smoothed flow network: G = (V,E) balance values: b : V Z costs: c : E R capacities: u : E N 2 1/2 3/1-1 1/3 3/2 3/1 1 3/1 1/2-2 cost/capacity 2/ 17 Smoothed 2 1 1/2 3/1 1 1 11/3

More information

Improved Approximations for Graph-TSP in Regular Graphs

Improved Approximations for Graph-TSP in Regular Graphs Improved Approximations for Graph-TSP in Regular Graphs R Ravi Carnegie Mellon University Joint work with Uriel Feige (Weizmann), Jeremy Karp (CMU) and Mohit Singh (MSR) 1 Graph TSP Given a connected unweighted

More information

1 The Traveling Salesperson Problem (TSP)

1 The Traveling Salesperson Problem (TSP) CS 598CSC: Approximation Algorithms Lecture date: January 23, 2009 Instructor: Chandra Chekuri Scribe: Sungjin Im In the previous lecture, we had a quick overview of several basic aspects of approximation

More information

CS 598CSC: Approximation Algorithms Lecture date: March 2, 2011 Instructor: Chandra Chekuri

CS 598CSC: Approximation Algorithms Lecture date: March 2, 2011 Instructor: Chandra Chekuri CS 598CSC: Approximation Algorithms Lecture date: March, 011 Instructor: Chandra Chekuri Scribe: CC Local search is a powerful and widely used heuristic method (with various extensions). In this lecture

More information

Independent dominating sets in graphs of girth five via the semi-random method

Independent dominating sets in graphs of girth five via the semi-random method Independent dominating sets in graphs of girth five via the semi-random method Ararat Harutyunyan (Oxford), Paul Horn (Harvard), Jacques Verstraete (UCSD) March 12, 2014 Introduction: The semi-random method

More information

1 Better Approximation of the Traveling Salesman

1 Better Approximation of the Traveling Salesman Stanford University CS261: Optimization Handout 4 Luca Trevisan January 13, 2011 Lecture 4 In which we describe a 1.5-approximate algorithm for the Metric TSP, we introduce the Set Cover problem, observe

More information

K-Anonymity. Definitions. How do you publicly release a database without compromising individual privacy?

K-Anonymity. Definitions. How do you publicly release a database without compromising individual privacy? K-Anonymity How do you publicly release a database without compromising individual privacy? The Wrong Approach: REU Summer 2007 Advisors: Ryan Williams and Manuel Blum Just leave out any unique identifiers

More information

SAT-CNF Is N P-complete

SAT-CNF Is N P-complete SAT-CNF Is N P-complete Rod Howell Kansas State University November 9, 2000 The purpose of this paper is to give a detailed presentation of an N P- completeness proof using the definition of N P given

More information

Approximation Algorithms

Approximation Algorithms 15-251: Great Ideas in Theoretical Computer Science Spring 2019, Lecture 14 March 5, 2019 Approximation Algorithms 1 2 SAT 3SAT Clique Hamiltonian- Cycle given a Boolean formula F, is it satisfiable? same,

More information

Fundamental mathematical techniques reviewed: Mathematical induction Recursion. Typically taught in courses such as Calculus and Discrete Mathematics.

Fundamental mathematical techniques reviewed: Mathematical induction Recursion. Typically taught in courses such as Calculus and Discrete Mathematics. Fundamental mathematical techniques reviewed: Mathematical induction Recursion Typically taught in courses such as Calculus and Discrete Mathematics. Techniques introduced: Divide-and-Conquer Algorithms

More information

Combinatorics MAP363 Sheet 1. Mark: /10. Name. Number. Hand in by 19th February. date marked: / /2007

Combinatorics MAP363 Sheet 1. Mark: /10. Name. Number. Hand in by 19th February. date marked: / /2007 Turn over Combinatorics MAP6 Sheet Hand in by 9th February Name Number Year Mark: /0 date marked: / /200 Please attach your working, with this sheet at the front. Guidance on notation: graphs may have

More information

ON SWELL COLORED COMPLETE GRAPHS

ON SWELL COLORED COMPLETE GRAPHS Acta Math. Univ. Comenianae Vol. LXIII, (1994), pp. 303 308 303 ON SWELL COLORED COMPLETE GRAPHS C. WARD and S. SZABÓ Abstract. An edge-colored graph is said to be swell-colored if each triangle contains

More information

Coverage Approximation Algorithms

Coverage Approximation Algorithms DATA MINING LECTURE 12 Coverage Approximation Algorithms Example Promotion campaign on a social network We have a social network as a graph. People are more likely to buy a product if they have a friend

More information

Integer Programming Theory

Integer Programming Theory Integer Programming Theory Laura Galli October 24, 2016 In the following we assume all functions are linear, hence we often drop the term linear. In discrete optimization, we seek to find a solution x

More information

Lecture 4: examples of topological spaces, coarser and finer topologies, bases and closed sets

Lecture 4: examples of topological spaces, coarser and finer topologies, bases and closed sets Lecture 4: examples of topological spaces, coarser and finer topologies, bases and closed sets Saul Glasman 14 September 2016 Let s give the definition of an open subset of R. Definition 1. Let U R. We

More information

A PAC Approach to ApplicationSpecific Algorithm Selection. Rishi Gupta Tim Roughgarden Simons, Nov 16, 2016

A PAC Approach to ApplicationSpecific Algorithm Selection. Rishi Gupta Tim Roughgarden Simons, Nov 16, 2016 A PAC Approach to ApplicationSpecific Algorithm Selection Rishi Gupta Tim Roughgarden Simons, Nov 16, 2016 Motivation and Set-up Problem Algorithms Alg 1: Greedy algorithm Alg 2: Linear programming Alg

More information

CSC 373: Algorithm Design and Analysis Lecture 4

CSC 373: Algorithm Design and Analysis Lecture 4 CSC 373: Algorithm Design and Analysis Lecture 4 Allan Borodin January 14, 2013 1 / 16 Lecture 4: Outline (for this lecture and next lecture) Some concluding comments on optimality of EST Greedy Interval

More information

On Covering a Graph Optimally with Induced Subgraphs

On Covering a Graph Optimally with Induced Subgraphs On Covering a Graph Optimally with Induced Subgraphs Shripad Thite April 1, 006 Abstract We consider the problem of covering a graph with a given number of induced subgraphs so that the maximum number

More information

Answers to specimen paper questions. Most of the answers below go into rather more detail than is really needed. Please let me know of any mistakes.

Answers to specimen paper questions. Most of the answers below go into rather more detail than is really needed. Please let me know of any mistakes. Answers to specimen paper questions Most of the answers below go into rather more detail than is really needed. Please let me know of any mistakes. Question 1. (a) The degree of a vertex x is the number

More information

Fixed-Parameter Algorithms, IA166

Fixed-Parameter Algorithms, IA166 Fixed-Parameter Algorithms, IA166 Sebastian Ordyniak Faculty of Informatics Masaryk University Brno Spring Semester 2013 Introduction Outline 1 Introduction Algorithms on Locally Bounded Treewidth Layer

More information

1 Introduction. 1. Prove the problem lies in the class NP. 2. Find an NP-complete problem that reduces to it.

1 Introduction. 1. Prove the problem lies in the class NP. 2. Find an NP-complete problem that reduces to it. 1 Introduction There are hundreds of NP-complete problems. For a recent selection see http://www. csc.liv.ac.uk/ ped/teachadmin/comp202/annotated_np.html Also, see the book M. R. Garey and D. S. Johnson.

More information

CMPSCI 311: Introduction to Algorithms Practice Final Exam

CMPSCI 311: Introduction to Algorithms Practice Final Exam CMPSCI 311: Introduction to Algorithms Practice Final Exam Name: ID: Instructions: Answer the questions directly on the exam pages. Show all your work for each question. Providing more detail including

More information

A Truthful (1-ɛ)-Optimal Mechanism for On-demand Cloud Resource Provisioning

A Truthful (1-ɛ)-Optimal Mechanism for On-demand Cloud Resource Provisioning A Truthful (1-ɛ)-Optimal Mechanism for On-demand Cloud Resource Provisioning Xiaoxi Zhang, Chuan Wu, Zongpeng Li, Francis C.M. Lau Department of Computer Science, The University of Hong Kong, Email: {xxzhang2,cwu,fcmlau}@cs.hku.hk

More information

Adjacent: Two distinct vertices u, v are adjacent if there is an edge with ends u, v. In this case we let uv denote such an edge.

Adjacent: Two distinct vertices u, v are adjacent if there is an edge with ends u, v. In this case we let uv denote such an edge. 1 Graph Basics What is a graph? Graph: a graph G consists of a set of vertices, denoted V (G), a set of edges, denoted E(G), and a relation called incidence so that each edge is incident with either one

More information

Coloring 3-Colorable Graphs

Coloring 3-Colorable Graphs Coloring -Colorable Graphs Charles Jin April, 015 1 Introduction Graph coloring in general is an etremely easy-to-understand yet powerful tool. It has wide-ranging applications from register allocation

More information

Interleaving Schemes on Circulant Graphs with Two Offsets

Interleaving Schemes on Circulant Graphs with Two Offsets Interleaving Schemes on Circulant raphs with Two Offsets Aleksandrs Slivkins Department of Computer Science Cornell University Ithaca, NY 14853 slivkins@cs.cornell.edu Jehoshua Bruck Department of Electrical

More information

Lecture 14: Linear Programming II

Lecture 14: Linear Programming II A Theorist s Toolkit (CMU 18-859T, Fall 013) Lecture 14: Linear Programming II October 3, 013 Lecturer: Ryan O Donnell Scribe: Stylianos Despotakis 1 Introduction At a big conference in Wisconsin in 1948

More information

UML CS Algorithms Qualifying Exam Fall, 2003 ALGORITHMS QUALIFYING EXAM

UML CS Algorithms Qualifying Exam Fall, 2003 ALGORITHMS QUALIFYING EXAM NAME: This exam is open: - books - notes and closed: - neighbors - calculators ALGORITHMS QUALIFYING EXAM The upper bound on exam time is 3 hours. Please put all your work on the exam paper. (Partial credit

More information

Improved Approximations for Graph-TSP in Regular Graphs

Improved Approximations for Graph-TSP in Regular Graphs Improved Approximations for Graph-TSP in Regular Graphs R Ravi Carnegie Mellon University Joint work with Uriel Feige (Weizmann), Satoru Iwata (U Tokyo), Jeremy Karp (CMU), Alantha Newman (G-SCOP) and

More information

NP and computational intractability. Kleinberg and Tardos, chapter 8

NP and computational intractability. Kleinberg and Tardos, chapter 8 NP and computational intractability Kleinberg and Tardos, chapter 8 1 Major Transition So far we have studied certain algorithmic patterns Greedy, Divide and conquer, Dynamic programming to develop efficient

More information

Lecture : Topological Space

Lecture : Topological Space Example of Lecture : Dr. Department of Mathematics Lovely Professional University Punjab, India October 18, 2014 Outline Example of 1 2 3 Example of 4 5 6 Example of I Topological spaces and continuous

More information

CS364A: Algorithmic Game Theory Lecture #19: Pure Nash Equilibria and PLS-Completeness

CS364A: Algorithmic Game Theory Lecture #19: Pure Nash Equilibria and PLS-Completeness CS364A: Algorithmic Game Theory Lecture #19: Pure Nash Equilibria and PLS-Completeness Tim Roughgarden December 2, 2013 1 The Big Picture We now have an impressive list of tractability results polynomial-time

More information

How Hard Is Inference for Structured Prediction?

How Hard Is Inference for Structured Prediction? How Hard Is Inference for Structured Prediction? Tim Roughgarden (Stanford University) joint work with Amir Globerson (Tel Aviv), David Sontag (NYU), and Cafer Yildirum (NYU) 1 Structured Prediction structured

More information

= f (a, b) + (hf x + kf y ) (a,b) +

= f (a, b) + (hf x + kf y ) (a,b) + Chapter 14 Multiple Integrals 1 Double Integrals, Iterated Integrals, Cross-sections 2 Double Integrals over more general regions, Definition, Evaluation of Double Integrals, Properties of Double Integrals

More information

Department of Computer Applications. MCA 312: Design and Analysis of Algorithms. [Part I : Medium Answer Type Questions] UNIT I

Department of Computer Applications. MCA 312: Design and Analysis of Algorithms. [Part I : Medium Answer Type Questions] UNIT I MCA 312: Design and Analysis of Algorithms [Part I : Medium Answer Type Questions] UNIT I 1) What is an Algorithm? What is the need to study Algorithms? 2) Define: a) Time Efficiency b) Space Efficiency

More information

11. APPROXIMATION ALGORITHMS

11. APPROXIMATION ALGORITHMS 11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: vertex cover LP rounding: vertex cover generalized load balancing knapsack problem Lecture slides by Kevin Wayne Copyright 2005

More information

Bounds on graphs with high girth and high chromatic number

Bounds on graphs with high girth and high chromatic number Bounds on graphs with high girth and high chromatic number joint work with Daniel Bath and Zequn Li INTEGERS 2013: The Erdős Centennial Conference October 26, 2013 Some Definitions Graph Theory Chromatic

More information

Exact adaptive parallel algorithms for data depth problems. Vera Rosta Department of Mathematics and Statistics McGill University, Montreal

Exact adaptive parallel algorithms for data depth problems. Vera Rosta Department of Mathematics and Statistics McGill University, Montreal Exact adaptive parallel algorithms for data depth problems Vera Rosta Department of Mathematics and Statistics McGill University, Montreal joint work with Komei Fukuda School of Computer Science McGill

More information

MATH 1A MIDTERM 1 (8 AM VERSION) SOLUTION. (Last edited October 18, 2013 at 5:06pm.) lim

MATH 1A MIDTERM 1 (8 AM VERSION) SOLUTION. (Last edited October 18, 2013 at 5:06pm.) lim MATH A MIDTERM (8 AM VERSION) SOLUTION (Last edited October 8, 03 at 5:06pm.) Problem. (i) State the Squeeze Theorem. (ii) Prove the Squeeze Theorem. (iii) Using a carefully justified application of the

More information

1 Variations of the Traveling Salesman Problem

1 Variations of the Traveling Salesman Problem Stanford University CS26: Optimization Handout 3 Luca Trevisan January, 20 Lecture 3 In which we prove the equivalence of three versions of the Traveling Salesman Problem, we provide a 2-approximate algorithm,

More information

Lecture 5: Running Time Evaluation

Lecture 5: Running Time Evaluation Lecture 5: Running Time Evaluation Worst-case and average-case performance Georgy Gimel farb COMPSCI 220 Algorithms and Data Structures 1 / 13 1 Time complexity 2 Time growth 3 Worst-case 4 Average-case

More information

Theoretical Properties of Two ACO Approaches for the Traveling Salesman Problem

Theoretical Properties of Two ACO Approaches for the Traveling Salesman Problem Theoretical Properties of Two ACO Approaches for the Traveling Salesman Problem Timo Kötzing 1, Frank Neumann 1, Heiko Röglin, Carsten Witt 3 1 Algorithms and Complexity, Max-Planck-Institut für Informatik,

More information

Lecture 9: (Semi-)bandits and experts with linear costs (part I)

Lecture 9: (Semi-)bandits and experts with linear costs (part I) CMSC 858G: Bandits, Experts and Games 11/03/16 Lecture 9: (Semi-)bandits and experts with linear costs (part I) Instructor: Alex Slivkins Scribed by: Amr Sharaf In this lecture, we will study bandit problems

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

1 Elementary number theory

1 Elementary number theory Math 215 - Introduction to Advanced Mathematics Spring 2019 1 Elementary number theory We assume the existence of the natural numbers and the integers N = {1, 2, 3,...} Z = {..., 3, 2, 1, 0, 1, 2, 3,...},

More information

1 Undirected Vertex Geography UVG

1 Undirected Vertex Geography UVG Geography Start with a chip sitting on a vertex v of a graph or digraph G. A move consists of moving the chip to a neighbouring vertex. In edge geography, moving the chip from x to y deletes the edge (x,

More information

Lecture Online Algorithms and the k-server problem June 14, 2011

Lecture Online Algorithms and the k-server problem June 14, 2011 Approximation Algorithms Workshop June 13-17, 2011, Princeton Lecture Online Algorithms and the k-server problem June 14, 2011 Joseph (Seffi) Naor Scribe: Mohammad Moharrami 1 Overview In this lecture,

More information

TOPOLOGY, DR. BLOCK, FALL 2015, NOTES, PART 3.

TOPOLOGY, DR. BLOCK, FALL 2015, NOTES, PART 3. TOPOLOGY, DR. BLOCK, FALL 2015, NOTES, PART 3. 301. Definition. Let m be a positive integer, and let X be a set. An m-tuple of elements of X is a function x : {1,..., m} X. We sometimes use x i instead

More information

The Prospects for Sub-Exponential Time

The Prospects for Sub-Exponential Time The Prospects for Sub-Exponential Time Thomas E. O'Neil Computer Science Department University of North Dakota Grand Forks, ND 58202-9015 oneil@cs.und.edu Abstract This paper provides a survey of some

More information

Size of a problem instance: Bigger instances take

Size of a problem instance: Bigger instances take 2.1 Integer Programming and Combinatorial Optimization Slide set 2: Computational Complexity Katta G. Murty Lecture slides Aim: To study efficiency of various algo. for solving problems, and to classify

More information

Lecture 1. 2 Motivation: Fast. Reliable. Cheap. Choose two.

Lecture 1. 2 Motivation: Fast. Reliable. Cheap. Choose two. Approximation Algorithms and Hardness of Approximation February 19, 2013 Lecture 1 Lecturer: Ola Svensson Scribes: Alantha Newman 1 Class Information 4 credits Lecturers: Ola Svensson (ola.svensson@epfl.ch)

More information

Lecture 12 March 4th

Lecture 12 March 4th Math 239: Discrete Mathematics for the Life Sciences Spring 2008 Lecture 12 March 4th Lecturer: Lior Pachter Scribe/ Editor: Wenjing Zheng/ Shaowei Lin 12.1 Alignment Polytopes Recall that the alignment

More information

11. APPROXIMATION ALGORITHMS

11. APPROXIMATION ALGORITHMS Coping with NP-completeness 11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: weighted vertex cover LP rounding: weighted vertex cover generalized load balancing knapsack problem

More information

The Satisfiability Problem [HMU06,Chp.10b] Satisfiability (SAT) Problem Cook s Theorem: An NP-Complete Problem Restricted SAT: CSAT, k-sat, 3SAT

The Satisfiability Problem [HMU06,Chp.10b] Satisfiability (SAT) Problem Cook s Theorem: An NP-Complete Problem Restricted SAT: CSAT, k-sat, 3SAT The Satisfiability Problem [HMU06,Chp.10b] Satisfiability (SAT) Problem Cook s Theorem: An NP-Complete Problem Restricted SAT: CSAT, k-sat, 3SAT 1 Satisfiability (SAT) Problem 2 Boolean Expressions Boolean,

More information

Algorithmic complexity of two defence budget problems

Algorithmic complexity of two defence budget problems 21st International Congress on Modelling and Simulation, Gold Coast, Australia, 29 Nov to 4 Dec 2015 www.mssanz.org.au/modsim2015 Algorithmic complexity of two defence budget problems R. Taylor a a Defence

More information

MAS 341: GRAPH THEORY 2016 EXAM SOLUTIONS

MAS 341: GRAPH THEORY 2016 EXAM SOLUTIONS MAS 341: GRAPH THEORY 2016 EXAM SOLUTIONS 1. Question 1 Part i. There are many Hamiltonian cycles; e.g., ABLKJEDFIHGC. We now show that if we remove vertex D, the result G \ {D} is not hamiltonian. Note

More information

11.1 Facility Location

11.1 Facility Location CS787: Advanced Algorithms Scribe: Amanda Burton, Leah Kluegel Lecturer: Shuchi Chawla Topic: Facility Location ctd., Linear Programming Date: October 8, 2007 Today we conclude the discussion of local

More information

/ Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang

/ Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang 600.469 / 600.669 Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang 9.1 Linear Programming Suppose we are trying to approximate a minimization

More information

arxiv: v2 [cs.cc] 29 Mar 2010

arxiv: v2 [cs.cc] 29 Mar 2010 On a variant of Monotone NAE-3SAT and the Triangle-Free Cut problem. arxiv:1003.3704v2 [cs.cc] 29 Mar 2010 Peiyush Jain, Microsoft Corporation. June 28, 2018 Abstract In this paper we define a restricted

More information

Vertex Cover Approximations

Vertex Cover Approximations CS124 Lecture 20 Heuristics can be useful in practice, but sometimes we would like to have guarantees. Approximation algorithms give guarantees. It is worth keeping in mind that sometimes approximation

More information

Topological properties of convex sets

Topological properties of convex sets Division of the Humanities and Social Sciences Ec 181 KC Border Convex Analysis and Economic Theory Winter 2018 Topic 5: Topological properties of convex sets 5.1 Interior and closure of convex sets Let

More information

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings On the Relationships between Zero Forcing Numbers and Certain Graph Coverings Fatemeh Alinaghipour Taklimi, Shaun Fallat 1,, Karen Meagher 2 Department of Mathematics and Statistics, University of Regina,

More information

Chapter 9 Graph Algorithms

Chapter 9 Graph Algorithms Chapter 9 Graph Algorithms 2 Introduction graph theory useful in practice represent many real-life problems can be slow if not careful with data structures 3 Definitions an undirected graph G = (V, E)

More information