Pareto Optimal Solutions for Smoothed Analysts
|
|
- Ariel Britney Mason
- 6 years ago
- Views:
Transcription
1 Pareto Optimal Solutions for Smoothed Analysts Ankur Moitra, IAS joint work with Ryan O Donnell, CMU September 26, 2011 Ankur Moitra (IAS) Pareto September 26, 2011
2 values weights v1 w v i w i v i+1 w i v n w n W
3 values weights v1 w v i w i v i+1 w i v n w n W
4 values weights v1 w v i w i v i+1 w i v n w n W value W weight
5 values weights v w v i w i v i+1 w i v n w n W value W weight
6 values weights v w v i w i v i+1 w i v n w n W value W weight
7 values weights v w v i w i v i+1 w i v n w n W Not Pareto Optimal value W weight
8 values weights v w v i w i v i+1 w i v n w n W Pareto Optimal! value W weight
9 values weights v w v i w i v i+1 w i v n w n W value W weight
10 values weights v w v i w i v i+1 w i v n w n W value PO(i) W weight
11 values weights v w v i w i v i+1 w i v n w n W value W weight
12 values weights v1... w... 1 v i w i v i+1 w i v n w n W w i+1 v i+1 value W weight
13 values weights v1... w... 1 v i w i v i+1 w i v n w n W value W weight
14 values weights v1... w... 1 v i w i v i+1 w i v n w n W value W weight
15 values weights v1... w... 1 v i w i v i+1 w i v n w n W value W weight
16 values weights v1... w... 1 v i w i v i+1 w i v n w n W value W weight
17 values weights v1... w... 1 v i w i v i+1 w i v n w n W value W weight
18 values weights v1... w... 1 v i w i v i+1 w i v n w n W value W weight
19 values weights v w v i w i v i+1 w i v n w n W value PO(i+1) W weight
20 Dynamic Programming with Lists (Nemhauser, Ullmann):
21 Dynamic Programming with Lists (Nemhauser, Ullmann): PO(i + 1) can be computed from PO(i)...
22 Dynamic Programming with Lists (Nemhauser, Ullmann): PO(i + 1) can be computed from PO(i) in linear (in PO(i) ) time
23 Dynamic Programming with Lists (Nemhauser, Ullmann): PO(i + 1) can be computed from PO(i) in linear (in PO(i) ) time an optimal solution can be computed from PO(n)
24 Dynamic Programming with Lists (Nemhauser, Ullmann): PO(i + 1) can be computed from PO(i) in linear (in PO(i) ) time an optimal solution can be computed from PO(n) Bottleneck in many algorithms: enumerate the set of Pareto optimal solutions
25 Results of Beier and Vöcking (STOC 2003, STOC 2004) Smoothed Analysis of Pareto Curves:
26 Results of Beier and Vöcking (STOC 2003, STOC 2004) Smoothed Analysis of Pareto Curves: Polynomial bound on PO(i) s (in two dimensions) in the framework of Smoothed Analysis (Spielman, Teng)
27 Results of Beier and Vöcking (STOC 2003, STOC 2004) Smoothed Analysis of Pareto Curves: Polynomial bound on PO(i) s (in two dimensions) in the framework of Smoothed Analysis (Spielman, Teng) Knapsack has polynomial smoothed complexity:
28 Results of Beier and Vöcking (STOC 2003, STOC 2004) Smoothed Analysis of Pareto Curves: Polynomial bound on PO(i) s (in two dimensions) in the framework of Smoothed Analysis (Spielman, Teng) Knapsack has polynomial smoothed complexity: first NP-hard problem that is (smoothed) easy
29 Results of Beier and Vöcking (STOC 2003, STOC 2004) Smoothed Analysis of Pareto Curves: Polynomial bound on PO(i) s (in two dimensions) in the framework of Smoothed Analysis (Spielman, Teng) Knapsack has polynomial smoothed complexity: first NP-hard problem that is (smoothed) easy generalizes long line of results on random instances
30 Capturing Tradeoffs
31 Capturing Tradeoffs Question What if the precise objective function (of a decision maker) is unknown?
32 Capturing Tradeoffs Question What if the precise objective function (of a decision maker) is unknown? e.g. travel planning: prefer lower fare, shorter trip, fewer transfers
33 Capturing Tradeoffs Question What if the precise objective function (of a decision maker) is unknown? e.g. travel planning: prefer lower fare, shorter trip, fewer transfers Question Can we algorithmically help a decision maker?
34 Capturing Tradeoffs Question What if the precise objective function (of a decision maker) is unknown? e.g. travel planning: prefer lower fare, shorter trip, fewer transfers Question Can we algorithmically help a decision maker? Pareto curves capture tradeoffs among competing objectives
35 Proposition Only useful approach if Pareto curves are small
36 Proposition Only useful approach if Pareto curves are small Confirmed empirically e.g. Müller-Hannemann, Weihe: German train system
37 Proposition Only useful approach if Pareto curves are small Confirmed empirically e.g. Müller-Hannemann, Weihe: German train system Question Why should we expect Pareto curves to be small?
38 Proposition Only useful approach if Pareto curves are small Confirmed empirically e.g. Müller-Hannemann, Weihe: German train system Question Why should we expect Pareto curves to be small? Caveat: Smoothed Analysis is not a complete explanation
39 The Model Adversary chooses:
40 The Model Adversary chooses: Z {0, 1} n (e.g. spanning trees, Hamiltonian cycles)
41 The Model Adversary chooses: Z {0, 1} n (e.g. spanning trees, Hamiltonian cycles) an adversarial objective function OBJ 1 : Z R +
42 The Model Adversary chooses: Z {0, 1} n (e.g. spanning trees, Hamiltonian cycles) an adversarial objective function OBJ 1 : Z R + d 1 linear objective functions OBJ i ( x) = [w1, i w2, i...wn] i x
43 The Model Adversary chooses: Z {0, 1} n (e.g. spanning trees, Hamiltonian cycles) an adversarial objective function OBJ 1 : Z R + d 1 linear objective functions OBJ i ( x) = [w i 1, w i 2,...w i n] x... each w i j is a random variable on [ 1, +1] density is bounded by φ
44 History Let PO be the set of Pareto optimal solutions...
45 History Let PO be the set of Pareto optimal solutions... [Beier, Vöcking STOC 2003] (d = 2), E[ PO ] = O(n 5 φ)
46 History Let PO be the set of Pareto optimal solutions... [Beier, Vöcking STOC 2003] (d = 2), E[ PO ] = O(n 5 φ) [Beier, Vöcking STOC 2004] (d = 2), E[ PO ] = O(n 4 φ)
47 History Let PO be the set of Pareto optimal solutions... [Beier, Vöcking STOC 2003] (d = 2), E[ PO ] = O(n 5 φ) [Beier, Vöcking STOC 2004] (d = 2), E[ PO ] = O(n 4 φ) [Beier, Röglin, Vöcking IPCO 2007] (d = 2), E[ PO ] = O(n 2 φ) (tight)
48 History Let PO be the set of Pareto optimal solutions... [Beier, Vöcking STOC 2003] (d = 2), E[ PO ] = O(n 5 φ) [Beier, Vöcking STOC 2004] (d = 2), E[ PO ] = O(n 4 φ) [Beier, Röglin, Vöcking IPCO 2007] (d = 2), E[ PO ] = O(n 2 φ) (tight) [Röglin, Teng, FOCS 2009] E[ PO ] = O((n φ) f (d) )... where f (d) = 2 d 1 (d + 1)!
49 History Let PO be the set of Pareto optimal solutions... [Beier, Vöcking STOC 2003] (d = 2), E[ PO ] = O(n 5 φ) [Beier, Vöcking STOC 2004] (d = 2), E[ PO ] = O(n 4 φ) [Beier, Röglin, Vöcking IPCO 2007] (d = 2), E[ PO ] = O(n 2 φ) (tight) [Röglin, Teng, FOCS 2009] E[ PO ] = O((n φ) f (d) )... where f (d) = 2 d 1 (d + 1)! [Dughmi, Roughgarden, FOCS 2010] any FPTAS can be transformed to a truthful in expectation FPTAS
50 Our Results Theorem E[ PO ] 2 (4φd) d(d 1)/2 n 2d 2
51 Our Results Theorem E[ PO ] 2 (4φd) d(d 1)/2 n 2d 2...answers a conjecture of Teng
52 Our Results Theorem E[ PO ] 2 (4φd) d(d 1)/2 n 2d 2...answers a conjecture of Teng [Bently et al, JACM 1978]: 2 n points sampled from a d-dimensional Gaussian, E[ PO ] = Θ(n d 1 ) square factor difference necessary for d = 2
53 On Smoothed Analysis
54 On Smoothed Analysis Bounds are notoriously pessimistic (e.g. Simplex)
55 On Smoothed Analysis Bounds are notoriously pessimistic (e.g. Simplex) Method of Analysis:
56 On Smoothed Analysis Bounds are notoriously pessimistic (e.g. Simplex) Method of Analysis: Define a bad event...that you can blame if your algorithm runs slowly
57 On Smoothed Analysis Bounds are notoriously pessimistic (e.g. Simplex) Method of Analysis: Define a bad event...that you can blame if your algorithm runs slowly Prove this event is rare
58 On Smoothed Analysis Bounds are notoriously pessimistic (e.g. Simplex) Method of Analysis: Define a bad event...that you can blame if your algorithm runs slowly Prove this event is rare Proposition Randomness is your friend!
59 Our Approach
60 Our Approach Goal Define bad events using as little randomness as possible
61 Our Approach Goal Define bad events using as little randomness as possible... conserve randomness, save for analysis
62 Our Approach Goal Define bad events using as little randomness as possible... conserve randomness, save for analysis Challenge Events become convoluted (to say the least!)
63 Our Approach Goal Define bad events using as little randomness as possible... conserve randomness, save for analysis Challenge Events become convoluted (to say the least!) We give an algorithm to define these events
64 An Alternative Condition OBJ 2 time OBJ1
65 An Alternative Condition OBJ 2 time OBJ1
66 An Alternative Condition OBJ 2 time OBJ1
67 An Alternative Condition OBJ 2 time OBJ1
68 An Alternative Condition OBJ 2 time OBJ 1
69 An Alternative Condition OBJ 2 time OBJ 1
70 An Alternative Condition OBJ 2 time OBJ 1
71 Method of Proof Goal Count the (expected) number of Pareto optimal solutions
72 Method of Proof Goal Count the (expected) number of Pareto optimal solutions Define a complete family of events... for each Pareto optimal solution at least one (unique) event occurs
73 Method of Proof Goal Count the (expected) number of Pareto optimal solutions Define a complete family of events... for each Pareto optimal solution at least one (unique) event occurs Then bound the expected number of events
74 Method of Proof Goal Count the (expected) number of Pareto optimal solutions Define a complete family of events... for each Pareto optimal solution at least one (unique) event occurs Then bound the expected number of events The key is in the definition
75 The Common Case (Beier, Röglin, Vöcking) OBJ 2 x time OBJ1
76 The Common Case (Beier, Röglin, Vöcking) OBJ 2 y x time OBJ 1
77 The Common Case (Beier, Röglin, Vöcking) OBJ 2 y EMPTY x time OBJ1
78 The Common Case (Beier, Röglin, Vöcking) OBJ 2 y EMPTY i x time OBJ1
79 The Common Case (Beier, Röglin, Vöcking) OBJ 2 y y i = 0 EMPTY i x x i = 1 time OBJ1
80 The Common Case (Beier, Röglin, Vöcking) OBJ 2 y y i = 0 EMPTY i EMPTY x x i = 1 time OBJ1
81 Complete Family of Events Let I = (a, b) be an interval of [ n, +n] of width ɛ
82 Complete Family of Events Let I = (a, b) be an interval of [ n, +n] of width ɛ Let E be the event that there is an x PO:
83 Complete Family of Events Let I = (a, b) be an interval of [ n, +n] of width ɛ Let E be the event that there is an x PO: OBJ 2 ( x) I
84 Complete Family of Events Let I = (a, b) be an interval of [ n, +n] of width ɛ Let E be the event that there is an x PO: OBJ 2 ( x) I y have the smallest OBJ 1 ( y) among all points for which OBJ 2 ( y) > b
85 Complete Family of Events Let I = (a, b) be an interval of [ n, +n] of width ɛ Let E be the event that there is an x PO: OBJ 2 ( x) I y have the smallest OBJ 1 ( y) among all points for which OBJ 2 ( y) > b y i = 0, x i = 1
86 Complete Family of Events Let I = (a, b) be an interval of [ n, +n] of width ɛ Let E be the event that there is an x PO: OBJ 2 ( x) I y have the smallest OBJ 1 ( y) among all points for which OBJ 2 ( y) > b y i = 0, x i = 1 Claim Pr[E] ɛφ
87 Analysis OBJ1: arbitrary OBJ 2 : [??,??,...??...?? ] x E OBJ 2 Z time OBJ1
88 Analysis OBJ1: arbitrary OBJ 2 : [??,??,...??...?? ] x E OBJ 2 Z I time OBJ1
89 Analysis OBJ 2 OBJ1: arbitrary OBJ [ w,, ] E 2: 1 w 2?? w n x index i Z I time OBJ1
90 Analysis OBJ 2 OBJ1: arbitrary OBJ [ w,, ] E 2: 1 w 2?? w n x index i Z I x z time OBJ1
91 Analysis OBJ 2 I OBJ1: arbitrary OBJ [ w,, ] E 2: 1 w 2?? w n x index i x = 1 i Z x = 0 i Z i Z i x z time OBJ1
92 Analysis OBJ 2 I y OBJ1: arbitrary OBJ [ w,, ] E 2: 1 w 2?? w n x index i x = 1 i Z x = 0 i Z i Z i x z time OBJ1
93 Analysis OBJ 2 I y OBJ1: arbitrary OBJ [ w,, ] E 2: 1 w 2?? w n x index i x = 1 i Z x = 0 i Z i Z i x z T OBJ (x)>obj (y) 1 1 time OBJ1
94 Analysis OBJ 2 I y OBJ1: arbitrary OBJ [ w,, ] E 2: 1 w 2?? w n x index i x z x = 1 i Z x = 0 i Z i Z i T OBJ (x)>obj (y) 1 1 time OBJ1
95 Analysis OBJ 2 I y OBJ1: arbitrary OBJ [ w,, ] E 2: 1 w 2?? w n x index i x same on index i z x = 1 i Z x = 0 i Z i Z i T OBJ (x)>obj (y) 1 1 time OBJ1
96 Analysis OBJ 2 I y OBJ1: arbitrary OBJ [ w,, ] E 2: 1 w 2?? w n x index i x = 1 i Z x = 0 i Z i Z i x z T OBJ (x)>obj (y) 1 1 time OBJ1
97 Analysis OBJ 2 I y OBJ1: arbitrary OBJ [ w,, ] E 2: 1 w 2?? w n x index i x z x = 1 i Z T i Z x = 0 i Z i OBJ (x)>obj (y) 1 1 time OBJ1
98 Analysis OBJ 2 I y OBJ1: arbitrary OBJ [ w,, ] E 2: 1 w 2?? w n x index i x = 1 i x and y = 0 i z x = 1 i Z Z i Z i T x = 0 i OBJ (x)>obj (y) 1 1 time OBJ1
99 A Re-interpretation
100 A Re-interpretation Implicitly defined a Transcription Algorithm:
101 A Re-interpretation Implicitly defined a Transcription Algorithm: Question Given a Pareto optimal solution x, which event should we blame?
102 A Re-interpretation Implicitly defined a Transcription Algorithm: Question Given a Pareto optimal solution x, which event should we blame? Blame event E: interval I, index i, x i and y i
103 A Re-interpretation Implicitly defined a Transcription Algorithm: Question Given a Pareto optimal solution x, which event should we blame? Blame event E: interval I, index i, x i and y i Transcription Algorithm Input: values of r.v.s (and Pareto optimal x) Output: interval I, index i, x i and y i
104 A Re-interpretation Suppose output is event E: interval I, index i, x i and y i
105 A Re-interpretation Suppose output is event E: interval I, index i, x i and y i Question Which solution x caused this event to occur?
106 A Re-interpretation Suppose output is event E: interval I, index i, x i and y i Question Which solution x caused this event to occur? We do not need to know w i to determine the identity of x!
107 A Re-interpretation Suppose output is event E: interval I, index i, x i and y i Question Which solution x caused this event to occur? We do not need to know w i to determine the identity of x! Reverse Algorithm Find y
108 A Re-interpretation Suppose output is event E: interval I, index i, x i and y i Question Which solution x caused this event to occur? We do not need to know w i to determine the identity of x! Reverse Algorithm Find y Then find x
109 A Re-interpretation Reverse Algorithm: Find x (without looking at w i )
110 A Re-interpretation Reverse Algorithm: Find x (without looking at w i ) Question Does x fall into the interval I?
111 A Re-interpretation Reverse Algorithm: Find x (without looking at w i ) Question Does x fall into the interval I? Hidden random variable w i must fall into some small range
112 A Re-interpretation Reverse Algorithm: Find x (without looking at w i ) Question Does x fall into the interval I? Hidden random variable w i must fall into some small range Proposition We can deduce a missing input to Transcription Algorithm, from just some of the inputs and outputs
113 A Re-interpretation Reverse Algorithm: Find x (without looking at w i ) Question Does x fall into the interval I? Hidden random variable w i must fall into some small range Proposition We can deduce a missing input to Transcription Algorithm, from just some of the inputs and outputs Hence each output is unlikely
114 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear, Z Output: (, ), OBJ2
115 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear, Z Output: (, ), OBJ2
116 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear ), Z Output: (,, OBJ2
117 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear, Z Output: (, ), OBJ2
118 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear x, Z Output: (, ), x OBJ 2
119 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ3 : linear x y, Z Output: (, ) y, x OBJ 2
120 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ3 : linear x y, Z Output: (, ) y, x OBJ 2
121 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ3 : linear x y index i, Z Output: (i, ) y, x OBJ 2
122 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear x y index i, Z Output: (i, ) y index i 0, x 1 OBJ 2
123 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear x y index i, Z Output: (i, ) y index i 0, x 1 OBJ 2
124 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear x y index i, Z Output: (i, ) y index i 0, x 1 OBJ 2
125 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear x y index i x i = 0, Z i Z x i = 1 Z i Output: (i, ), y x index i 0 1 OBJ 2
126 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear x y index i x i = 0, Z i Z x i = 1 Z i Output: (i, ) y index i 0 1, x time OBJ 2
127 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear z x y index i x i = 0, Z i Z x i = 1 Z i Output: (i, ), y x index i 0 1 time OBJ 2
128 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear z x y index i x i = 0, Z i Z x i = 1 Z i Output: (i, ), y z x index i time OBJ 2
129 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear z x y index i x i = 0, Z i Z x i = 1 Z i Output: (i, ), y z x index i OBJ 2
130 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear z index j x y index i x i = 0, Z i Z x i = 1 Z i Output: (i, ), y z x index i OBJ 2
131 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear z index j x y index i Z x = 0 i x = 1 i Output: (i,j) index i index j y 0 1, Z i Z i z , x OBJ 2
132 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear z index j x y index i Z x = 0 i x = 1 i Output: (i,j) index i index j y 0 1, Z i Z i z , x OBJ 2
133 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial OBJ 2, OBJ 3 : linear z index j x y index i Z x = 0 i x = 1 i Output: (i,j) index i index j y 0 1, Z i Z i z , x OBJ 2
134 Transcription for d = 3 OBJ 3 OBJ 1 : adversarial x = 0 OBJ 2, OBJ3 : linear Z z y index j x index i index i index j i Z i x = 1 Z Output: (i,j), i i y z x,, OBJ 2
135 Future Directions?
136 Future Directions? Open Question Are there additional applications of randomness conservation in Smoothed Analysis?
137 Future Directions? Open Question Are there additional applications of randomness conservation in Smoothed Analysis? e.g. simplex algorithm
138 Future Directions? Open Question Are there additional applications of randomness conservation in Smoothed Analysis? e.g. simplex algorithm Open Question Are there perturbation models that make sense for non-linear objectives?
139 Future Directions? Open Question Are there additional applications of randomness conservation in Smoothed Analysis? e.g. simplex algorithm Open Question Are there perturbation models that make sense for non-linear objectives? e.g. submodular functions
140 Questions?
141 Thanks!
Pearls of Algorithms
Part 3: Randomized Algorithms and Probabilistic Analysis Prof. Dr. Institut für Informatik Winter 2013/14 Efficient Algorithms When is an algorithm considered efficient? Efficient Algorithms When is an
More informationOutline. Main Questions. What is the k-means method? What can we do when worst case analysis is too pessimistic?
Outline Main Questions 1 Data Clustering What is the k-means method? 2 Smoothed Analysis What can we do when worst case analysis is too pessimistic? 3 Smoothed Analysis of k-means Method What is the smoothed
More informationCS675: Convex and Combinatorial Optimization Spring 2018 The Simplex Algorithm. Instructor: Shaddin Dughmi
CS675: Convex and Combinatorial Optimization Spring 2018 The Simplex Algorithm Instructor: Shaddin Dughmi Algorithms for Convex Optimization We will look at 2 algorithms in detail: Simplex and Ellipsoid.
More informationCOMP Analysis of Algorithms & Data Structures
COMP 3170 - Analysis of Algorithms & Data Structures Shahin Kamali Approximation Algorithms CLRS 35.1-35.5 University of Manitoba COMP 3170 - Analysis of Algorithms & Data Structures 1 / 30 Approaching
More informationNP-Hardness. We start by defining types of problem, and then move on to defining the polynomial-time reductions.
CS 787: Advanced Algorithms NP-Hardness Instructor: Dieter van Melkebeek We review the concept of polynomial-time reductions, define various classes of problems including NP-complete, and show that 3-SAT
More informationCSC2420 Fall 2012: Algorithm Design, Analysis and Theory
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin September 20, 2012 1 / 1 Lecture 2 We continue where we left off last lecture, namely we are considering a PTAS for the the knapsack
More informationTheorem 2.9: nearest addition algorithm
There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used
More informationSmoothed Analysis of the Minimum-Mean Cycle Canceling Algorithm and the Network Simplex Algorithm
Smoothed Analysis of the Minimum-Mean Cycle Canceling Algorithm and the Network Simplex Algorithm Kamiel Cornelissen and Bodo Manthey University of Twente, Enschede, The Netherlands k.cornelissen@utwente.nl,
More informationOnline Stochastic Matching CMSC 858F: Algorithmic Game Theory Fall 2010
Online Stochastic Matching CMSC 858F: Algorithmic Game Theory Fall 2010 Barna Saha, Vahid Liaghat Abstract This summary is mostly based on the work of Saberi et al. [1] on online stochastic matching problem
More informationApproximation Algorithms
Approximation Algorithms Given an NP-hard problem, what should be done? Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one of three desired features. Solve problem to optimality.
More informationLecture 15: The subspace topology, Closed sets
Lecture 15: The subspace topology, Closed sets 1 The Subspace Topology Definition 1.1. Let (X, T) be a topological space with topology T. subset of X, the collection If Y is a T Y = {Y U U T} is a topology
More informationLecture 8: The Traveling Salesman Problem
Lecture 8: The Traveling Salesman Problem Let G = (V, E) be an undirected graph. A Hamiltonian cycle of G is a cycle that visits every vertex v V exactly once. Instead of Hamiltonian cycle, we sometimes
More informationHardness of Approximation for the TSP. Michael Lampis LAMSADE Université Paris Dauphine
Hardness of Approximation for the TSP Michael Lampis LAMSADE Université Paris Dauphine Sep 2, 2015 Overview Hardness of Approximation What is it? How to do it? (Easy) Examples The PCP Theorem What is it?
More informationIntroduction to Approximation Algorithms
Introduction to Approximation Algorithms Dr. Gautam K. Das Departmet of Mathematics Indian Institute of Technology Guwahati, India gkd@iitg.ernet.in February 19, 2016 Outline of the lecture Background
More informationLecture notes on the simplex method September We will present an algorithm to solve linear programs of the form. maximize.
Cornell University, Fall 2017 CS 6820: Algorithms Lecture notes on the simplex method September 2017 1 The Simplex Method We will present an algorithm to solve linear programs of the form maximize subject
More informationGiven a graph, find an embedding s.t. greedy routing works
Given a graph, find an embedding s.t. greedy routing works Greedy embedding of a graph 99 Greedy embedding Given a graph G, find an embedding of the vertices in R d, s.t. for each pair of nodes s, t, there
More informationAPPROXIMATION ALGORITHMS FOR GEOMETRIC PROBLEMS
APPROXIMATION ALGORITHMS FOR GEOMETRIC PROBLEMS Subhas C. Nandy (nandysc@isical.ac.in) Advanced Computing and Microelectronics Unit Indian Statistical Institute Kolkata 70010, India. Organization Introduction
More informationMonotone Paths in Geometric Triangulations
Monotone Paths in Geometric Triangulations Adrian Dumitrescu Ritankar Mandal Csaba D. Tóth November 19, 2017 Abstract (I) We prove that the (maximum) number of monotone paths in a geometric triangulation
More informationCS 580: Algorithm Design and Analysis. Jeremiah Blocki Purdue University Spring 2018
CS 580: Algorithm Design and Analysis Jeremiah Blocki Purdue University Spring 2018 Chapter 11 Approximation Algorithms Slides by Kevin Wayne. Copyright @ 2005 Pearson-Addison Wesley. All rights reserved.
More informationCMPSCI611: Approximating SET-COVER Lecture 21
CMPSCI611: Approximating SET-COVER Lecture 21 Today we look at two more examples of approximation algorithms for NP-hard optimization problems. The first, for the SET-COVER problem, has an approximation
More informationIntegral Geometry and the Polynomial Hirsch Conjecture
Integral Geometry and the Polynomial Hirsch Conjecture Jonathan Kelner, MIT Partially based on joint work with Daniel Spielman Introduction n A lot of recent work on Polynomial Hirsch Conjecture has focused
More informationLecture 16 October 23, 2014
CS 224: Advanced Algorithms Fall 2014 Prof. Jelani Nelson Lecture 16 October 23, 2014 Scribe: Colin Lu 1 Overview In the last lecture we explored the simplex algorithm for solving linear programs. While
More informationTreewidth and graph minors
Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under
More informationCS270 Combinatorial Algorithms & Data Structures Spring Lecture 19:
CS270 Combinatorial Algorithms & Data Structures Spring 2003 Lecture 19: 4.1.03 Lecturer: Satish Rao Scribes: Kevin Lacker and Bill Kramer Disclaimer: These notes have not been subjected to the usual scrutiny
More information6.854 Advanced Algorithms. Scribes: Jay Kumar Sundararajan. Duality
6.854 Advanced Algorithms Scribes: Jay Kumar Sundararajan Lecturer: David Karger Duality This lecture covers weak and strong duality, and also explains the rules for finding the dual of a linear program,
More informationReference Sheet for CO142.2 Discrete Mathematics II
Reference Sheet for CO14. Discrete Mathematics II Spring 017 1 Graphs Defintions 1. Graph: set of N nodes and A arcs such that each a A is associated with an unordered pair of nodes.. Simple graph: no
More informationIterative Methods in Combinatorial Optimization. R. Ravi Carnegie Bosch Professor Tepper School of Business Carnegie Mellon University
Iterative Methods in Combinatorial Optimization R. Ravi Carnegie Bosch Professor Tepper School of Business Carnegie Mellon University ravi@cmu.edu Combinatorial Optimization Easy Problems : polynomial
More informationComp Online Algorithms
Comp 7720 - Online Algorithms Notes 4: Bin Packing Shahin Kamalli University of Manitoba - Fall 208 December, 208 Introduction Bin packing is one of the fundamental problems in theory of computer science.
More informationRecitation 4: Elimination algorithm, reconstituted graph, triangulation
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.438 Algorithms For Inference Fall 2014 Recitation 4: Elimination algorithm, reconstituted graph, triangulation
More informationPolynomial Time Approximation Schemes for the Euclidean Traveling Salesman Problem
PROJECT FOR CS388G: ALGORITHMS: TECHNIQUES/THEORY (FALL 2015) Polynomial Time Approximation Schemes for the Euclidean Traveling Salesman Problem Shanshan Wu Vatsal Shah October 20, 2015 Abstract In this
More information10. EXTENDING TRACTABILITY
0. EXTENDING TRACTABILITY finding small vertex covers solving NP-hard problems on trees circular arc coverings vertex cover in bipartite graphs Lecture slides by Kevin Wayne Copyright 005 Pearson-Addison
More informationThe Simplex Algorithm
The Simplex Algorithm Uri Feige November 2011 1 The simplex algorithm The simplex algorithm was designed by Danzig in 1947. This write-up presents the main ideas involved. It is a slight update (mostly
More information8 Matroid Intersection
8 Matroid Intersection 8.1 Definition and examples 8.2 Matroid Intersection Algorithm 8.1 Definitions Given two matroids M 1 = (X, I 1 ) and M 2 = (X, I 2 ) on the same set X, their intersection is M 1
More informationApproximation Algorithms
Approximation Algorithms Subhash Suri November 27, 2017 1 Bin Packing Algorithms A classical problem, with long and interesting history. One of the early problems shown to be intractable. Lends to simple
More informationAlgorithm Design and Analysis
Algorithm Design and Analysis LECTURE 29 Approximation Algorithms Load Balancing Weighted Vertex Cover Reminder: Fill out SRTEs online Don t forget to click submit Sofya Raskhodnikova 12/7/2016 Approximation
More informationDiscrete Optimization. Lecture Notes 2
Discrete Optimization. Lecture Notes 2 Disjunctive Constraints Defining variables and formulating linear constraints can be straightforward or more sophisticated, depending on the problem structure. The
More informationExamples of P vs NP: More Problems
Examples of P vs NP: More Problems COMP1600 / COMP6260 Dirk Pattinson Australian National University Semester 2, 2017 Catch Up / Drop in Lab When Fridays, 15.00-17.00 Where N335, CSIT Building (bldg 108)
More informationMinimum-Cost Flow Network
Minimum-Cost Flow Network Smoothed flow network: G = (V,E) balance values: b : V Z costs: c : E R capacities: u : E N 2 1/2 3/1-1 1/3 3/2 3/1 1 3/1 1/2-2 cost/capacity 2/ 17 Smoothed 2 1 1/2 3/1 1 1 11/3
More informationImproved Approximations for Graph-TSP in Regular Graphs
Improved Approximations for Graph-TSP in Regular Graphs R Ravi Carnegie Mellon University Joint work with Uriel Feige (Weizmann), Jeremy Karp (CMU) and Mohit Singh (MSR) 1 Graph TSP Given a connected unweighted
More information1 The Traveling Salesperson Problem (TSP)
CS 598CSC: Approximation Algorithms Lecture date: January 23, 2009 Instructor: Chandra Chekuri Scribe: Sungjin Im In the previous lecture, we had a quick overview of several basic aspects of approximation
More informationCS 598CSC: Approximation Algorithms Lecture date: March 2, 2011 Instructor: Chandra Chekuri
CS 598CSC: Approximation Algorithms Lecture date: March, 011 Instructor: Chandra Chekuri Scribe: CC Local search is a powerful and widely used heuristic method (with various extensions). In this lecture
More informationIndependent dominating sets in graphs of girth five via the semi-random method
Independent dominating sets in graphs of girth five via the semi-random method Ararat Harutyunyan (Oxford), Paul Horn (Harvard), Jacques Verstraete (UCSD) March 12, 2014 Introduction: The semi-random method
More information1 Better Approximation of the Traveling Salesman
Stanford University CS261: Optimization Handout 4 Luca Trevisan January 13, 2011 Lecture 4 In which we describe a 1.5-approximate algorithm for the Metric TSP, we introduce the Set Cover problem, observe
More informationK-Anonymity. Definitions. How do you publicly release a database without compromising individual privacy?
K-Anonymity How do you publicly release a database without compromising individual privacy? The Wrong Approach: REU Summer 2007 Advisors: Ryan Williams and Manuel Blum Just leave out any unique identifiers
More informationSAT-CNF Is N P-complete
SAT-CNF Is N P-complete Rod Howell Kansas State University November 9, 2000 The purpose of this paper is to give a detailed presentation of an N P- completeness proof using the definition of N P given
More informationApproximation Algorithms
15-251: Great Ideas in Theoretical Computer Science Spring 2019, Lecture 14 March 5, 2019 Approximation Algorithms 1 2 SAT 3SAT Clique Hamiltonian- Cycle given a Boolean formula F, is it satisfiable? same,
More informationFundamental mathematical techniques reviewed: Mathematical induction Recursion. Typically taught in courses such as Calculus and Discrete Mathematics.
Fundamental mathematical techniques reviewed: Mathematical induction Recursion Typically taught in courses such as Calculus and Discrete Mathematics. Techniques introduced: Divide-and-Conquer Algorithms
More informationCombinatorics MAP363 Sheet 1. Mark: /10. Name. Number. Hand in by 19th February. date marked: / /2007
Turn over Combinatorics MAP6 Sheet Hand in by 9th February Name Number Year Mark: /0 date marked: / /200 Please attach your working, with this sheet at the front. Guidance on notation: graphs may have
More informationON SWELL COLORED COMPLETE GRAPHS
Acta Math. Univ. Comenianae Vol. LXIII, (1994), pp. 303 308 303 ON SWELL COLORED COMPLETE GRAPHS C. WARD and S. SZABÓ Abstract. An edge-colored graph is said to be swell-colored if each triangle contains
More informationCoverage Approximation Algorithms
DATA MINING LECTURE 12 Coverage Approximation Algorithms Example Promotion campaign on a social network We have a social network as a graph. People are more likely to buy a product if they have a friend
More informationInteger Programming Theory
Integer Programming Theory Laura Galli October 24, 2016 In the following we assume all functions are linear, hence we often drop the term linear. In discrete optimization, we seek to find a solution x
More informationLecture 4: examples of topological spaces, coarser and finer topologies, bases and closed sets
Lecture 4: examples of topological spaces, coarser and finer topologies, bases and closed sets Saul Glasman 14 September 2016 Let s give the definition of an open subset of R. Definition 1. Let U R. We
More informationA PAC Approach to ApplicationSpecific Algorithm Selection. Rishi Gupta Tim Roughgarden Simons, Nov 16, 2016
A PAC Approach to ApplicationSpecific Algorithm Selection Rishi Gupta Tim Roughgarden Simons, Nov 16, 2016 Motivation and Set-up Problem Algorithms Alg 1: Greedy algorithm Alg 2: Linear programming Alg
More informationCSC 373: Algorithm Design and Analysis Lecture 4
CSC 373: Algorithm Design and Analysis Lecture 4 Allan Borodin January 14, 2013 1 / 16 Lecture 4: Outline (for this lecture and next lecture) Some concluding comments on optimality of EST Greedy Interval
More informationOn Covering a Graph Optimally with Induced Subgraphs
On Covering a Graph Optimally with Induced Subgraphs Shripad Thite April 1, 006 Abstract We consider the problem of covering a graph with a given number of induced subgraphs so that the maximum number
More informationAnswers to specimen paper questions. Most of the answers below go into rather more detail than is really needed. Please let me know of any mistakes.
Answers to specimen paper questions Most of the answers below go into rather more detail than is really needed. Please let me know of any mistakes. Question 1. (a) The degree of a vertex x is the number
More informationFixed-Parameter Algorithms, IA166
Fixed-Parameter Algorithms, IA166 Sebastian Ordyniak Faculty of Informatics Masaryk University Brno Spring Semester 2013 Introduction Outline 1 Introduction Algorithms on Locally Bounded Treewidth Layer
More information1 Introduction. 1. Prove the problem lies in the class NP. 2. Find an NP-complete problem that reduces to it.
1 Introduction There are hundreds of NP-complete problems. For a recent selection see http://www. csc.liv.ac.uk/ ped/teachadmin/comp202/annotated_np.html Also, see the book M. R. Garey and D. S. Johnson.
More informationCMPSCI 311: Introduction to Algorithms Practice Final Exam
CMPSCI 311: Introduction to Algorithms Practice Final Exam Name: ID: Instructions: Answer the questions directly on the exam pages. Show all your work for each question. Providing more detail including
More informationA Truthful (1-ɛ)-Optimal Mechanism for On-demand Cloud Resource Provisioning
A Truthful (1-ɛ)-Optimal Mechanism for On-demand Cloud Resource Provisioning Xiaoxi Zhang, Chuan Wu, Zongpeng Li, Francis C.M. Lau Department of Computer Science, The University of Hong Kong, Email: {xxzhang2,cwu,fcmlau}@cs.hku.hk
More informationAdjacent: Two distinct vertices u, v are adjacent if there is an edge with ends u, v. In this case we let uv denote such an edge.
1 Graph Basics What is a graph? Graph: a graph G consists of a set of vertices, denoted V (G), a set of edges, denoted E(G), and a relation called incidence so that each edge is incident with either one
More informationColoring 3-Colorable Graphs
Coloring -Colorable Graphs Charles Jin April, 015 1 Introduction Graph coloring in general is an etremely easy-to-understand yet powerful tool. It has wide-ranging applications from register allocation
More informationInterleaving Schemes on Circulant Graphs with Two Offsets
Interleaving Schemes on Circulant raphs with Two Offsets Aleksandrs Slivkins Department of Computer Science Cornell University Ithaca, NY 14853 slivkins@cs.cornell.edu Jehoshua Bruck Department of Electrical
More informationLecture 14: Linear Programming II
A Theorist s Toolkit (CMU 18-859T, Fall 013) Lecture 14: Linear Programming II October 3, 013 Lecturer: Ryan O Donnell Scribe: Stylianos Despotakis 1 Introduction At a big conference in Wisconsin in 1948
More informationUML CS Algorithms Qualifying Exam Fall, 2003 ALGORITHMS QUALIFYING EXAM
NAME: This exam is open: - books - notes and closed: - neighbors - calculators ALGORITHMS QUALIFYING EXAM The upper bound on exam time is 3 hours. Please put all your work on the exam paper. (Partial credit
More informationImproved Approximations for Graph-TSP in Regular Graphs
Improved Approximations for Graph-TSP in Regular Graphs R Ravi Carnegie Mellon University Joint work with Uriel Feige (Weizmann), Satoru Iwata (U Tokyo), Jeremy Karp (CMU), Alantha Newman (G-SCOP) and
More informationNP and computational intractability. Kleinberg and Tardos, chapter 8
NP and computational intractability Kleinberg and Tardos, chapter 8 1 Major Transition So far we have studied certain algorithmic patterns Greedy, Divide and conquer, Dynamic programming to develop efficient
More informationLecture : Topological Space
Example of Lecture : Dr. Department of Mathematics Lovely Professional University Punjab, India October 18, 2014 Outline Example of 1 2 3 Example of 4 5 6 Example of I Topological spaces and continuous
More informationCS364A: Algorithmic Game Theory Lecture #19: Pure Nash Equilibria and PLS-Completeness
CS364A: Algorithmic Game Theory Lecture #19: Pure Nash Equilibria and PLS-Completeness Tim Roughgarden December 2, 2013 1 The Big Picture We now have an impressive list of tractability results polynomial-time
More informationHow Hard Is Inference for Structured Prediction?
How Hard Is Inference for Structured Prediction? Tim Roughgarden (Stanford University) joint work with Amir Globerson (Tel Aviv), David Sontag (NYU), and Cafer Yildirum (NYU) 1 Structured Prediction structured
More information= f (a, b) + (hf x + kf y ) (a,b) +
Chapter 14 Multiple Integrals 1 Double Integrals, Iterated Integrals, Cross-sections 2 Double Integrals over more general regions, Definition, Evaluation of Double Integrals, Properties of Double Integrals
More informationDepartment of Computer Applications. MCA 312: Design and Analysis of Algorithms. [Part I : Medium Answer Type Questions] UNIT I
MCA 312: Design and Analysis of Algorithms [Part I : Medium Answer Type Questions] UNIT I 1) What is an Algorithm? What is the need to study Algorithms? 2) Define: a) Time Efficiency b) Space Efficiency
More information11. APPROXIMATION ALGORITHMS
11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: vertex cover LP rounding: vertex cover generalized load balancing knapsack problem Lecture slides by Kevin Wayne Copyright 2005
More informationBounds on graphs with high girth and high chromatic number
Bounds on graphs with high girth and high chromatic number joint work with Daniel Bath and Zequn Li INTEGERS 2013: The Erdős Centennial Conference October 26, 2013 Some Definitions Graph Theory Chromatic
More informationExact adaptive parallel algorithms for data depth problems. Vera Rosta Department of Mathematics and Statistics McGill University, Montreal
Exact adaptive parallel algorithms for data depth problems Vera Rosta Department of Mathematics and Statistics McGill University, Montreal joint work with Komei Fukuda School of Computer Science McGill
More informationMATH 1A MIDTERM 1 (8 AM VERSION) SOLUTION. (Last edited October 18, 2013 at 5:06pm.) lim
MATH A MIDTERM (8 AM VERSION) SOLUTION (Last edited October 8, 03 at 5:06pm.) Problem. (i) State the Squeeze Theorem. (ii) Prove the Squeeze Theorem. (iii) Using a carefully justified application of the
More information1 Variations of the Traveling Salesman Problem
Stanford University CS26: Optimization Handout 3 Luca Trevisan January, 20 Lecture 3 In which we prove the equivalence of three versions of the Traveling Salesman Problem, we provide a 2-approximate algorithm,
More informationLecture 5: Running Time Evaluation
Lecture 5: Running Time Evaluation Worst-case and average-case performance Georgy Gimel farb COMPSCI 220 Algorithms and Data Structures 1 / 13 1 Time complexity 2 Time growth 3 Worst-case 4 Average-case
More informationTheoretical Properties of Two ACO Approaches for the Traveling Salesman Problem
Theoretical Properties of Two ACO Approaches for the Traveling Salesman Problem Timo Kötzing 1, Frank Neumann 1, Heiko Röglin, Carsten Witt 3 1 Algorithms and Complexity, Max-Planck-Institut für Informatik,
More informationLecture 9: (Semi-)bandits and experts with linear costs (part I)
CMSC 858G: Bandits, Experts and Games 11/03/16 Lecture 9: (Semi-)bandits and experts with linear costs (part I) Instructor: Alex Slivkins Scribed by: Amr Sharaf In this lecture, we will study bandit problems
More information3 No-Wait Job Shops with Variable Processing Times
3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select
More information1 Elementary number theory
Math 215 - Introduction to Advanced Mathematics Spring 2019 1 Elementary number theory We assume the existence of the natural numbers and the integers N = {1, 2, 3,...} Z = {..., 3, 2, 1, 0, 1, 2, 3,...},
More information1 Undirected Vertex Geography UVG
Geography Start with a chip sitting on a vertex v of a graph or digraph G. A move consists of moving the chip to a neighbouring vertex. In edge geography, moving the chip from x to y deletes the edge (x,
More informationLecture Online Algorithms and the k-server problem June 14, 2011
Approximation Algorithms Workshop June 13-17, 2011, Princeton Lecture Online Algorithms and the k-server problem June 14, 2011 Joseph (Seffi) Naor Scribe: Mohammad Moharrami 1 Overview In this lecture,
More informationTOPOLOGY, DR. BLOCK, FALL 2015, NOTES, PART 3.
TOPOLOGY, DR. BLOCK, FALL 2015, NOTES, PART 3. 301. Definition. Let m be a positive integer, and let X be a set. An m-tuple of elements of X is a function x : {1,..., m} X. We sometimes use x i instead
More informationThe Prospects for Sub-Exponential Time
The Prospects for Sub-Exponential Time Thomas E. O'Neil Computer Science Department University of North Dakota Grand Forks, ND 58202-9015 oneil@cs.und.edu Abstract This paper provides a survey of some
More informationSize of a problem instance: Bigger instances take
2.1 Integer Programming and Combinatorial Optimization Slide set 2: Computational Complexity Katta G. Murty Lecture slides Aim: To study efficiency of various algo. for solving problems, and to classify
More informationLecture 1. 2 Motivation: Fast. Reliable. Cheap. Choose two.
Approximation Algorithms and Hardness of Approximation February 19, 2013 Lecture 1 Lecturer: Ola Svensson Scribes: Alantha Newman 1 Class Information 4 credits Lecturers: Ola Svensson (ola.svensson@epfl.ch)
More informationLecture 12 March 4th
Math 239: Discrete Mathematics for the Life Sciences Spring 2008 Lecture 12 March 4th Lecturer: Lior Pachter Scribe/ Editor: Wenjing Zheng/ Shaowei Lin 12.1 Alignment Polytopes Recall that the alignment
More information11. APPROXIMATION ALGORITHMS
Coping with NP-completeness 11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: weighted vertex cover LP rounding: weighted vertex cover generalized load balancing knapsack problem
More informationThe Satisfiability Problem [HMU06,Chp.10b] Satisfiability (SAT) Problem Cook s Theorem: An NP-Complete Problem Restricted SAT: CSAT, k-sat, 3SAT
The Satisfiability Problem [HMU06,Chp.10b] Satisfiability (SAT) Problem Cook s Theorem: An NP-Complete Problem Restricted SAT: CSAT, k-sat, 3SAT 1 Satisfiability (SAT) Problem 2 Boolean Expressions Boolean,
More informationAlgorithmic complexity of two defence budget problems
21st International Congress on Modelling and Simulation, Gold Coast, Australia, 29 Nov to 4 Dec 2015 www.mssanz.org.au/modsim2015 Algorithmic complexity of two defence budget problems R. Taylor a a Defence
More informationMAS 341: GRAPH THEORY 2016 EXAM SOLUTIONS
MAS 341: GRAPH THEORY 2016 EXAM SOLUTIONS 1. Question 1 Part i. There are many Hamiltonian cycles; e.g., ABLKJEDFIHGC. We now show that if we remove vertex D, the result G \ {D} is not hamiltonian. Note
More information11.1 Facility Location
CS787: Advanced Algorithms Scribe: Amanda Burton, Leah Kluegel Lecturer: Shuchi Chawla Topic: Facility Location ctd., Linear Programming Date: October 8, 2007 Today we conclude the discussion of local
More information/ Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang
600.469 / 600.669 Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang 9.1 Linear Programming Suppose we are trying to approximate a minimization
More informationarxiv: v2 [cs.cc] 29 Mar 2010
On a variant of Monotone NAE-3SAT and the Triangle-Free Cut problem. arxiv:1003.3704v2 [cs.cc] 29 Mar 2010 Peiyush Jain, Microsoft Corporation. June 28, 2018 Abstract In this paper we define a restricted
More informationVertex Cover Approximations
CS124 Lecture 20 Heuristics can be useful in practice, but sometimes we would like to have guarantees. Approximation algorithms give guarantees. It is worth keeping in mind that sometimes approximation
More informationTopological properties of convex sets
Division of the Humanities and Social Sciences Ec 181 KC Border Convex Analysis and Economic Theory Winter 2018 Topic 5: Topological properties of convex sets 5.1 Interior and closure of convex sets Let
More informationOn the Relationships between Zero Forcing Numbers and Certain Graph Coverings
On the Relationships between Zero Forcing Numbers and Certain Graph Coverings Fatemeh Alinaghipour Taklimi, Shaun Fallat 1,, Karen Meagher 2 Department of Mathematics and Statistics, University of Regina,
More informationChapter 9 Graph Algorithms
Chapter 9 Graph Algorithms 2 Introduction graph theory useful in practice represent many real-life problems can be slow if not careful with data structures 3 Definitions an undirected graph G = (V, E)
More information