Learning convex bodies is hard
|
|
- Gary Barrett
- 5 years ago
- Views:
Transcription
1 Learning convex boies is har Navin Goyal Microsoft Research Inia Luis Raemacher Georgia Tech Abstract We show that learning a convex boy in R, given ranom samples from the boy, requires 2 Ω /ɛ) samples By learning a convex boy we mean fining a set having at most ɛ relative symmetric ifference with the input boy To prove the lower boun we construct a har to learn family of convex boies Our construction of this family is very simple an base on error correcting coes 1 Introuction We consier the following problem: Given uniformly ranom points from a convex boy in R, we woul like to approximately learn the boy with as few samples as possible In this question, an throughout this paper, we are intereste in the number of samples but not in the computational requirements for constructing such an approximation Our main result will show that this nees about 2 Ω ) samples This problem is a special case of the statistical problem of inferring information about a probability istribution from samples For example, one can approximate the centroi of the boy with a sample of size roughly linear in On the other han, a sample of size polynomial in is not enough to approximate the volume of a convex boy within a constant factor [3], an see Section 5 here for a iscussion) Note that known approximation algorithms for the volume eg, [2]) o not work in this setting as they nee a membership oracle an ranom points from various carefully chosen subsets of the input boy Our problem also relates to work in learning theory eg, [12, 8]), where one is given samples generate accoring to say) the Gaussian istribution an each sample is labele positive or negative epening on whether it belongs to the boy Asie from ifferent istributions, another ifference between the learning setting of [8] an ours is that in ours one gets only positive examples Klivans et al [8] give an algorithm an a nearly matching lower boun for learning convex boies with labele samples chosen accoring to Supporte by ARC ThinkTank Supporte by ARC ThinkTank an NSF the Gaussian istribution Their algorithm takes time 2Õ ) an they also show a lower boun of 2 Ω ) Note that our lower boun is not just a simplification of theirs: Neither lower boun seems to imply the other in a simple way The problem of learning convex sets from uniformly ranom samples from them was raise by Frieze et al [4] They gave a polynomial time algorithm for learning parallelopipes Another somewhat relate irection is the work on the learnability of iscrete istributions by Kearns et al [7] We remark that in the traitional istribution-inepenent PAClearning setting, it is not possible to learn convex boies efficiently because their VC-imension is infinite Our lower boun result like that of [8]) also allows for membership oracle queries Note that it is known that estimating the volume of convex boies requires an exponential number of membership queries if the algorithm is eterministic [1], which implies that learning boies requires an exponential number of membership queries because if an algorithm can learn the boy then it can also estimate its volume To formally efine the notion of learning we nee to specify a istance, ) between boies A natural choice in our setting is to consier the total variation istance of the uniform istribution on each boy see Section 2) We will use the term ranom oracle of a convex boy K for a black box that when querie outputs a uniformly ranom point from K Theorem 1 There exists a istribution D on the set of convex boies in R satisfying the following: Let ALG be a ranomize algorithm that, given a ranom convex boy K accoring to D, makes at most q total queries to ranom an membership oracles of K an outputs a set C such that, for 8/ ɛ 1/8, PrC, K) ɛ) 1/2 where the probability is over K, the ranom sample an any ranomization by ALG Then q 2 Ω /ɛ) Remarkably, the lower boun of Klivans et al [8] is numerically essentially ientical to ours 2 Ω ) for ɛ constant) Constructions similar to theirs are possible for our particular scenario [5] We believe that our argument is consierably simpler, an elementary compare to that of [8] Furthermore, our construction of the har to learn family
2 is explicit Our construction makes use of error correcting coes To our knowlege, this connection with error correcting coes is new in such contexts an may fin further applications See Section 5 for some further comparison An informal outline of the proof The iea of the proof is to fin a large family of convex boies in R n satisfying two conflicting goals: 1) Any two boies in the family are almost isjoint; 2) an yet they look alike in the sense that a small sample of ranom points from any such boy is insufficient for etermining which one it is because there are many boies in the family consistent with the sample Since any two boies are almost isjoint, even approximating a boy woul allow one to etermine it exactly This will imply that it is also har to approximate We first construct a family of boies that although not almost isjoint, have sufficiently large symmetric ifference We will then be able to construct a family with almost isjoint boies by taking proucts of boies in the first family The first family is quite natural it is escribe formally in Sec 31) Consier the cross polytope O n in R n generalization of the octaheron to n imensions: convex hull of the vectors {±e i : i [n]}, where e i is the unit vector in R n with the ith coorinate 1 an the rest 0) A peak attache to a facet F of O n is a pyrami that has F as its base an has its other vertex outsie O n on the normal to F going through its centroi If the height of the peak is sufficiently small then attaching peaks to any subset of the 2 n facets will result in a convex polytope We will show later that we can choose the height so that the volume of all the 2 n peaks is Ω1/n) fraction of the volume of O n We call this family of boies P [We remark that our construction of cross-polytopes with peaks has resemblance to a construction in [10] with ifferent parameters, but there oes not seem to be any connection between the problem stuie there an the problem we are intereste in] Intuitively, a ranom point in a boy from this family tells one that if the point is in one of the peaks then that peak is present, otherwise one learns nothing Therefore if the number of queries is at most a polynomial in n, then one learns nothing about most of the peaks an so the algorithm cannot tell which boy it got But these boies o not have large symmetric ifference can be as small as a O1/n2 n )) fraction of the cross polytope if the two boies iffer in just one peak) but we can pick a subfamily of them having pairwise symmetric ifference at least Ω1/n) by picking a large ranom subfamily We will o it slightly ifferently which will be more convenient for the proof: Boies in P have one-to-one corresponence with binary strings of length 2 n : each facet correspons to a coorinate of the string which takes value 1 if that facet has a peak attache, else it has value 0 To ensure that any two boies in our family iffer in many peaks it suffices to ensure that their corresponing strings have large Hamming istance Large sets of such strings are of course furnishe by goo error correcting coes From this family we can obtain another family of almost isjoint boies by taking proucts, while preserving the property that polynomially many ranom samples o not tell the boies apart This prouct trick also known as tensoring) has been use many times before, in particular for amplifying harness, but we are not aware of its use in a setting similar to ours Our construction of the prouct family also resembles the operation of concatenation in coing theory Acknowlegments We are grateful to Aam Kalai an Santosh Vempala for useful iscussions 2 Preliminaries Let K, L R n be boune an measurable We efine a istance istk, L) as the total variation istance between the uniform istributions in K an L, that is, istk, L) = { K\L K L\K L if K L if L > K We will use to enote the volume of sets A R n, an also to enote the carinality of finite sets A; which one is meant in a particular case will be clear from the context Let 1 enote the vector 1,, 1) log enotes logarithm with base 2 We will nee some basic efinitions an facts from coing theory; see, eg, [11] For a finite alphabet Σ, an wor length n, a coe C is a subset of Σ n For any two coewors x, y C, istance istx, y) between them is efine by istx, y) := {i [n] : x i y i } The relative minimum istance for coe C is min x,y C,x y istx, y)/n For Σ = {0, 1}, the weight of a coewor x is {i [n] : x i 0} Define V q n, r) := r n i=0 i) q 1) i The following is well-known an easy to prove: Theorem 2 Gilbert Varshamov) For alphabet size q, coe length n, an minimum istance, there exists a coe of size at least q n /V q n, 1) When the alphabet is Σ = {0, 1}, we efine the complement c of a coewor c C as c i := 1 c i 3 A har to learn family of convex boies The construction procees in two steps In the first step we construct a large subfamily of P such that the relative pairwise symmetric ifference between the boies is Ω1/n) This symmetric ifference is however not sufficiently large for our lower boun The secon step of the construction amplifies the symmetric ifference by consiering proucts of the boies from the first family 31 The inner family: Cross-polytope with peaks We first construct a family with slightly weaker properties The family consists of what we call cross polytope with peaks The n-imensional cross polytope O n is the convex hull of the 2n points {±e i, i [n]} Let F be a facet of O n, an let c F be the center of F The peak associate to F is the convex hull of F an the point αc F, where α > 1 is a positive scalar efine as follows: α is picke as large as possible so that the union of the cross polytope an all 2 n peaks is a convex boy A cross polytope with peaks will then be the union of the cross polytope an any subfamily of the 2 n possible peaks The set of all 2 2n boies of this type will be enote P By fixing of an orering of the facets of
3 the cross polytope, there is a one-to-one corresponence between the cross polytope with peaks an 0 1 vectors with 2 n coorinates Let P enote the cross polytope with all 2 n peaks We will initially choose α as large as possible so that the following conition necessary for convexity of P but not clearly sufficient is satisfie: for every pair of ajacent facets F, G of O n, the vertex of each peak is in the following halfspace: the halfspace containing O n an whose bounary is the hyperplane orthogonal to the vector connecting the origin to the) center of F G, an containing F G A straightforwar computation shows that α = n/n 1) for this conition This implies by another easy computation that the volume of all the peaks is O n /n 1) We will now show that this weaker conition on α is actually sufficient for the convexity of P an any cross polytope with peaks Proposition 3 Every set in P is convex Proof Let Q be the intersection of all halfspaces of the form {x R n : a x 1} where a R n is a vector having entries in { 1, 0, 1} an exactly one zero entry Equivalently, the bounary of each such halfspace is a hyperplane orthogonal to the center of some n 2)-imensional face of O n an containing that face In the rest of the proof we will show that P = Q, which gives the convexity of P This equality implies that a cross polytope with only some peaks is also convex: any such boy can be obtaine from P by intersecting P with the hafspaces inuce by the facets of O n associate to the missing peaks, an it is easy to see from the efinition of the peaks that each such intersection removes exactly one peak It is clear that P Q For the other inclusion, let x Q By symmetry we can assume x 0 If x i 1, then x O n P If x i > 1, we will show that x is in the peak of the positive orthant We woul like to write x as a convex combination of e 1,, e n an the extra vertex of the peak, v = 1/n 1) Let µ = n 1) x i ) 1) > 0 We want a vector λ = λ 1,, λ n ) such that x is a convex combination of the vertices of the peak: x = µv + λ i e i = µv + λ, that is, λ = x x i It satisfies µ + λ i = 1 an λ i = x i + 1 x i, an this is non-negative: By efinition of Q we have for all j [n] xi 1 + x j This shows that x belongs to the peak in the positive orthant For notational convenience we let N := 2 n Recall that we ientify boies in P with binary strings in {0, 1} N Let C {0, 1} N be a coe with relative minimum istance at least 1/4 To simplify computations involving istance ist between boies, it will be convenient to have the property that all coewors in C have weight N/2 We can ensure this easily as follows Let C {0, 1} N/2 be a coe with relative minimum istance at least 1/4, then set C := {c, c) : c C} Clearly C = C By Theorem 2 we can choose C such that C 2 c1n, for a positive constant c 1 We fix C to be such a coe, ie a coe with relative minimum istance at least 1/4, size 2 c1n, an all coewors with weight N/2 We efine the family P C as the family consisting of boies in P corresponing to coewors in C As all coewors in C have the same weight, we have that all boies in P C have the same volume Recall that the volume of each peak O is n 2 n n 1) Therefore for istinct P, Q P C the volume of the symmetric ifference of P an Q is at least O n 4n 1) 32 The outer family: The prouct construction Let C be a coe with coewors of length k an minimum istance at least k/2 on the alphabet P C That is, coewors in C can be represente as B 1,, B k ), where B i P C for i = 1,, k The prouct family PC C corresponing to coe C, has C boies in R kn, one for each coewor The boy for coewor B 1,, B k ) C is simply B 1 B k Clearly PC C = C Using Theorem 2 we can choose C such that C q k /V q k, k/2) Now note that k/2 V q k, k/2) = i=0 k/2 k )q 1) i q 1) k/2 i < 2 k q 1) k/2 < 4q) k/2 i=0 ) k i Therefore q k /V q k, k/2) > q k /4q) k/2 = q/4) k/2 Setting q = 2 c1n, we get C > 2 c1n 2)k/2 > 2 c2kn, for constant c 2 > 0, assuming N is sufficiently large We just showe: Lemma 4 P C C > 2c2k2n The following lemma shows that the boies in PC C are almost pairwise isjoint Lemma 5 For istinct A, B P C C ista, B) = 1 Proof We constructe PC C same volume This implies ista, B) = 1 we have > 1 e k/16n) so that all boies in it have the Let A = A 1 A k an B = B 1 B k Then = A 1 B 1 A k B k A 1 A k Since the minimum relative istance in C is at least 1/4 an the weight of each coewor is N/2, we have that for
4 A i B i the number of peaks in A i B i is at most 2 n 3/8 Hence A i B i 1 + 3/8n 1)) A i 1 + 1/2n 1)) Since the minimum istance of C is at least k/2, we have A i B i for at least k/2 values of i in [k] Therefore we get ) k/ /8n 1)) 1 + 1/2n 1)) 1 1 ) k/2 < e k/16n) 8n 4 Proof of the lower boun Proof of Theorem 1 We will make use of the family PC C that we constructe in the previous section Recall that the boies in this family live in R, for := kn For this proof we will think of as fixe an we will choose n appropriately for the lower boun proof By a straightforwar but teious argument it is enough to prove the theorem assuming that is a power of 2 We will use Yao s principle see, eg, [9]) To this en, we will first show that the interaction between an algorithm an the oracles can be assume to be iscrete, which in turn will imply that effectively there is only a finite number of eterministic algorithms that make at most q queries The iscretization of the oracles also serves a secon purpose: that we can see eterministic algorithms as finite ecision trees an use counting arguments to show a lower boun on the query complexity Fix a boy K from PC C Suppose that a ranomize algorithm has access to the following iscretizations of the oracles: A iscrete ranom oracle that generates a ranom point X = X 1,, X k ) from K = i K i an, for each i [k] outputs whether X i lies in the corresponing cross-polytope or in which peak it lies A iscrete membership oracle that when given a sequence of inices of peaks I = i 1,, i k ) outputs, for each i [k], whether peak i is present in K i Claim: A ranomize algorithm with access to iscrete versions of the oracles can simulate a ranomize algorithm with access to continuous oracles with the same number of queries Proof of claim: We will show it for boies in P, ie cross polytopes with peaks; the generalization of this argument to prouct boies in PC C is straightforwar Let A an B be the algorithm with access to the continuous an iscrete oracles respectively Algorithm B acts as A, except when A invokes an oracle, where B will o as follows: When A makes a query p to the continuous membership oracle, B will query the peak that contains p we can assume that p lies in a peak, as otherwise the query provie no new information) Now suppose that A makes a query to the continuous ranom oracle an gets a point p Then B makes a query to the iscrete ranom oracle B then generates a uniformly ranom point p in the region that it got from the oracle Clearly p has the same istribution as p, namely uniform istribution on the boy If we see eterministic algorithms as ecision trees, it is clear that there are only a finite number of eterministic algorithms that make at most q queries to the iscrete oracles of K Thus, by Yao s principle, for any istribution D on inputs, the probability of error of any ranomize algorithm against D is at least the probability of error of the best eterministic algorithm against D Our har input istribution D is the uniform istribution over PC C Now, in the ecision tree associate to a eterministic algorithm, each noe associate to a membership query has two chilren either the query point is in the boy or not), while a noe associate to a ranom sample has at most 2 n + 1) k chilren the ranom sample can lie in one of the 2 n peaks or in O n, for each factor in the prouct boy) Thus, if the algorithm makes at most q queries in total, then the ecision tree has at most 2 n + 1) kq leaves These leaves inuce a partition of the family of inputs PC C By Lemma 5, the istance between any pair of boies is at least 1 e k/16n = 1 e /16n2, where n is chosen so that the output of the algorithm can be within ɛ of at most one boy in each part of the partition That is, 2ɛ < 1 e k/16n, which implies that we shoul take n < 4 ln 1 As = kn is a power of 2, we can satisfy the previous inequality an the integrality constraints of k an n by using our assumption that 8/ ɛ 1/8 an letting n be a power of 2 such that 2 ln 1 n < 4 ln 1 By Lemma 4, the total number of boies is P C C 2 c2k2n This implies that the probability of error is at least 1 2n + 1) kq P C C 1 2n + 1)kq 2 c2k2n If we want this error to be less than a given δ, then for some c 3, c 4 > 0 we nee ) log1 δ) q c 3 + 2n kn n ) log1 δ) c log 1 2ɛ 2 log 1 log1 δ) c 3 + ɛ 2 For δ = 1/2 an ɛ 1/4 this implies q 2 Ω /ɛ) log 1 )
5 5 Discussion Informally, our construction of P C C can be thought of as coes in R, namely sets in R that are far from each other; the ifficulty in the construction of such coes comes from the requirements of convexity an that the istributions of polynomially many ranom samples look alike By using slightly more involve arguments we can hanle ɛ arbitrarily close to 1 an prove a similar lower boun It is not clear if such a lower boun is possible for other learning settings that have been stuie in the past, eg labele samples from Gaussian istribution Unlike that setting, we o not know a matching upper boun for learning convex boies in our moel Our construction of the har family is more explicit than that of [8]: The har family they construct is obtaine by a probabilistic argument; our construction can be mae explicit by using goo error correcting coes We mention here a somewhat surprising corollary of our result, without etaile proof or precise numerical constants Informally, it shows instability of the reconstruction of a convex boy as a function of the volume of its intersection with halfspaces, relative to its volume It is an exercise to see that knowlege of K H / K for every halfspace H uniquely etermines K Moreover, given c for some fixe constant c > 0) ranom samples from a convex boy K R, with high probability we can estimate K H / K for all halfspaces H within aitive error of O1/ c ), where c is a positive constant epening on c This can be prove using stanar arguments about ɛ-approximations an the fact that the VC-imension of halfspaces in R is + 1 We say that two convex boies K an L are α-halfspacefar if there is a halfspace H such that K H / K L H / L > α Thus if we choose some t < c an K an L are 1/ t -halfspace-far, then we can etect this using c ranom points, with high probability Now, we claim that there is a pair of boies in PC C that is not far For otherwise, all pairs woul be far an we woul be able to istinguish every boy in PC C from every other boy in PC C with a sample of size c, an thus learn it But as we have prove, this is impossible So we can conclue that there are two boies in PC C that are not 1/t -halfspace-far, ie they are 1/ t - halfspace-close This gives: Corollary 6 For any constant t > 0 an sufficiently large there exist two convex boies K, L R such that K, L are 1/ t -halfspace-close: for every halfspace H K H K but istk, L) > 1/8 L H L 1 t, An earlier version of this manuscript mentione the problem of whether the volume of a convex boy in R can be estimate from poly) uniformly ranom samples Very recently, Ronen Elan [3] has answere this in the negative His result provies a probabilistic construction of a family of convex boies such that the volume a ranom boy from this family is har to estimate from ranom samples His result oes not supersee ours in the sense that our lower boun of 2 Ω ) is stronger, an perhaps optimal, an our construction of the har family is explicit It is known that if the convex boy is a polytope with poly) facets, then it can be learne with poly) uniformly ranom samples [6] in an information-theoretical sense However, whether this can be one efficiently remains open: Problem Can one learn polytopes with poly) facets from poly) uniformly ranom over the polytope) samples in poly) time? References [1] I Bárány an Z Fürei Computing the volume is ifficult Discrete & Computational Geometry, 2: , 1987 [2] M E Dyer, A M Frieze, an R Kannan A ranom polynomial time algorithm for approximating the volume of convex boies J ACM, 381):1 17, 1991 [3] R Elan A polynomial number of ranom points oes not etermine the volume of a convex boy Manuscript, 2009 [4] A M Frieze, M Jerrum, an R Kannan Learning linear transformations In FOCS, pages , 1996 [5] A Kalai Personal communication 2006 [6] A Kalai an S Vempala Personal communication 2007 [7] M J Kearns, Y Mansour, D Ron, R Rubinfel, R E Schapire, an L Sellie On the learnability of iscrete istributions In STOC, pages , 1994 [8] A Klivans, R O Donnell, an R Serveio Learning geometric concepts via gaussian surface area In FOCS, 2008 [9] R Motwani an P Raghavan Ranomize Algorithms Cambrige University Press, 1995 [10] L Raemacher an S Vempala Testing geometric convexity In FSTTCS, pages , 2004 [11] J van Lint Introuction to Coing Theory Springer, thir eition, 1998 [12] S Vempala The Ranom Projection Metho American Mathematical Society, DIMACS, 2004
arxiv: v1 [math.co] 15 Dec 2017
Rectilinear Crossings in Complete Balance -Partite -Uniform Hypergraphs Rahul Gangopahyay Saswata Shannigrahi arxiv:171.05539v1 [math.co] 15 Dec 017 December 18, 017 Abstract In this paper, we stuy the
More information1 Surprises in high dimensions
1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic
More informationCharacterizing Decoding Robustness under Parametric Channel Uncertainty
Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric
More information2-connected graphs with small 2-connected dominating sets
2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A
More informationOptimal Oblivious Path Selection on the Mesh
Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract
More informationThe Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract
The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie
More informationBIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES
BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html
More informationAnalysis of half-space range search using the k-d search skip list. Here we analyse the expected time for half-space
Analysis of half-space range search using the k- search skip list Mario A. Lopez Brafor G. Nickerson y 1 Abstract We analyse the average cost of half-space range reporting for the k- search skip list.
More informationLoop Scheduling and Partitions for Hiding Memory Latencies
Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:
More informationThroughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem
Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple
More informationLecture 1 September 4, 2013
CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the
More informationSecure Network Coding for Distributed Secret Sharing with Low Communication Cost
Secure Network Coing for Distribute Secret Sharing with Low Communication Cost Nihar B. Shah, K. V. Rashmi an Kannan Ramchanran, Fellow, IEEE Abstract Shamir s (n,k) threshol secret sharing is an important
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science
More informationResearch Article Inviscid Uniform Shear Flow past a Smooth Concave Body
International Engineering Mathematics Volume 04, Article ID 46593, 7 pages http://x.oi.org/0.55/04/46593 Research Article Invisci Uniform Shear Flow past a Smooth Concave Boy Abullah Mura Department of
More informationPolygon Simplification by Minimizing Convex Corners
Polygon Simplification by Minimizing Convex Corners Yeganeh Bahoo 1, Stephane Durocher 1, J. Mark Keil 2, Saee Mehrabi 3, Sahar Mehrpour 1, an Debajyoti Monal 1 1 Department of Computer Science, University
More informationHere are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.
Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus
More informationA Classification of 3R Orthogonal Manipulators by the Topology of their Workspace
A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.
More informationLecture 2 - Introduction to Polytopes
Lecture 2 - Introduction to Polytopes Optimization and Approximation - ENS M1 Nicolas Bousquet 1 Reminder of Linear Algebra definitions Let x 1,..., x m be points in R n and λ 1,..., λ m be real numbers.
More informationLecture 5: Duality Theory
Lecture 5: Duality Theory Rajat Mittal IIT Kanpur The objective of this lecture note will be to learn duality theory of linear programming. We are planning to answer following questions. What are hyperplane
More informationCrossing Families. Abstract
Crossing Families Boris Aronov 1, Paul Erdős 2, Wayne Goddard 3, Daniel J. Kleitman 3, Michael Klugerman 3, János Pach 2,4, Leonard J. Schulman 3 Abstract Given a set of points in the plane, a crossing
More informationLarge Monochromatic Components in Two-colored Grids
Large Monochromatic Components in Two-colore Gris Jiří Matoušek 1 Aleš Přívětivý 2 Department of Applie Mathematics 1,2 an Institute of Theoretical Computer Science (ITI) 1 Charles University Malostranské
More informationKinematic Analysis of a Family of 3R Manipulators
Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,
More informationFigure 1: 2D arm. Figure 2: 2D arm with labelled angles
2D Kinematics Consier a robotic arm. We can sen it commans like, move that joint so it bens at an angle θ. Once we ve set each joint, that s all well an goo. More interesting, though, is the question of
More informationIntensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2
This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar
More informationEXACT SIMULATION OF A BOOLEAN MODEL
Original Research Paper oi:10.5566/ias.v32.p101-105 EXACT SIMULATION OF A BOOLEAN MODEL CHRISTIAN LANTUÉJOULB MinesParisTech 35 rue Saint-Honoré 77305 Fontainebleau France e-mail: christian.lantuejoul@mines-paristech.fr
More informationAlmost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control
Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract
More informationPERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING
PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING PAMELA RUSSELL ADVISOR: PAUL CULL OREGON STATE UNIVERSITY ABSTRACT. Birchall an Teor prove that
More informationOn the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems
On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,
More informationExact Algorithms Lecture 7: FPT Hardness and the ETH
Exact Algorithms Lecture 7: FPT Hardness and the ETH February 12, 2016 Lecturer: Michael Lampis 1 Reminder: FPT algorithms Definition 1. A parameterized problem is a function from (χ, k) {0, 1} N to {0,
More informationCS 435, 2018 Lecture 2, Date: 1 March 2018 Instructor: Nisheeth Vishnoi. Convex Programming and Efficiency
CS 435, 2018 Lecture 2, Date: 1 March 2018 Instructor: Nisheeth Vishnoi Convex Programming and Efficiency In this lecture, we formalize convex programming problem, discuss what it means to solve it efficiently
More informationDesign of Policy-Aware Differentially Private Algorithms
Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft
More informationNon-homogeneous Generalization in Privacy Preserving Data Publishing
Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h
More informationMonotone Paths in Geometric Triangulations
Monotone Paths in Geometric Triangulations Adrian Dumitrescu Ritankar Mandal Csaba D. Tóth November 19, 2017 Abstract (I) We prove that the (maximum) number of monotone paths in a geometric triangulation
More informationBlind Data Classification using Hyper-Dimensional Convex Polytopes
Blin Data Classification using Hyper-Dimensional Convex Polytopes Brent T. McBrie an Gilbert L. Peterson Department of Electrical an Computer Engineering Air Force Institute of Technology 9 Hobson Way
More informationSkyline Community Search in Multi-valued Networks
Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h
More informationMAXIMAL PLANAR SUBGRAPHS OF FIXED GIRTH IN RANDOM GRAPHS
MAXIMAL PLANAR SUBGRAPHS OF FIXED GIRTH IN RANDOM GRAPHS MANUEL FERNÁNDEZ, NICHOLAS SIEGER, AND MICHAEL TAIT Abstract. In 99, Bollobás and Frieze showed that the threshold for G n,p to contain a spanning
More informationSURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH
SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway
More informationPOLYHEDRAL GEOMETRY. Convex functions and sets. Mathematical Programming Niels Lauritzen Recall that a subset C R n is convex if
POLYHEDRAL GEOMETRY Mathematical Programming Niels Lauritzen 7.9.2007 Convex functions and sets Recall that a subset C R n is convex if {λx + (1 λ)y 0 λ 1} C for every x, y C and 0 λ 1. A function f :
More informationMultilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis
Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT
More informationWeek 5. Convex Optimization
Week 5. Convex Optimization Lecturer: Prof. Santosh Vempala Scribe: Xin Wang, Zihao Li Feb. 9 and, 206 Week 5. Convex Optimization. The convex optimization formulation A general optimization problem is
More informationShift-map Image Registration
Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.
More informationTight Wavelet Frame Decomposition and Its Application in Image Processing
ITB J. Sci. Vol. 40 A, No., 008, 151-165 151 Tight Wavelet Frame Decomposition an Its Application in Image Processing Mahmu Yunus 1, & Henra Gunawan 1 1 Analysis an Geometry Group, FMIPA ITB, Banung Department
More information6 Gradient Descent. 6.1 Functions
6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output
More informationarxiv: v1 [cs.cc] 30 Jun 2017
On the Complexity of Polytopes in LI( Komei Fuuda May Szedlá July, 018 arxiv:170610114v1 [cscc] 30 Jun 017 Abstract In this paper we consider polytopes given by systems of n inequalities in d variables,
More informationSolutions to Tutorial 1 (Week 8)
The University of Syney School of Mathematics an Statistics Solutions to Tutorial 1 (Week 8) MATH2069/2969: Discrete Mathematics an Graph Theory Semester 1, 2018 1. In each part, etermine whether the two
More informationLinear Programming in Small Dimensions
Linear Programming in Small Dimensions Lekcija 7 sergio.cabello@fmf.uni-lj.si FMF Univerza v Ljubljani Edited from slides by Antoine Vigneron Outline linear programming, motivation and definition one dimensional
More informationOn the number of distinct directions of planes determined by n points in R 3
On the number of distinct directions of planes determined by n points in R 3 Rom Pinchasi August 27, 2007 Abstract We show that any set of n points in R 3, that is not contained in a plane, determines
More informationParticle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base
More informationModifying ROC Curves to Incorporate Predicted Probabilities
Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,
More informationCS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing
CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which
More informationCPSC 536N: Randomized Algorithms Term 2. Lecture 10
CPSC 536N: Randomized Algorithms 011-1 Term Prof. Nick Harvey Lecture 10 University of British Columbia In the first lecture we discussed the Max Cut problem, which is NP-complete, and we presented a very
More informationFigure 1: Schematic of an SEM [source: ]
EECI Course: -9 May 1 by R. Sanfelice Hybri Control Systems Eelco van Horssen E.P.v.Horssen@tue.nl Project: Scanning Electron Microscopy Introuction In Scanning Electron Microscopy (SEM) a (bunle) beam
More informationOnline Appendix to: Generalizing Database Forensics
Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that
More information12.1 Formulation of General Perfect Matching
CSC5160: Combinatorial Optimization and Approximation Algorithms Topic: Perfect Matching Polytope Date: 22/02/2008 Lecturer: Lap Chi Lau Scribe: Yuk Hei Chan, Ling Ding and Xiaobing Wu In this lecture,
More informationCluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters
Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets
More informationUsing Vector and Raster-Based Techniques in Categorical Map Generalization
Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department
More informationA Stochastic Process on the Hypercube with Applications to Peer to Peer Networks
A Stochastic Process on the Hypercube with Applications to Peer to Peer Networs [Extene Abstract] Micah Aler Department of Computer Science, University of Massachusetts, Amherst, MA 0003 460, USA micah@cs.umass.eu
More informationOverlap Interval Partition Join
Overlap Interval Partition Join Anton Dignös Department of Computer Science University of Zürich, Switzerlan aignoes@ifi.uzh.ch Michael H. Böhlen Department of Computer Science University of Zürich, Switzerlan
More information3 No-Wait Job Shops with Variable Processing Times
3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select
More informationarxiv: v1 [math.co] 18 Dec 2018
S-HYPERSIMPLICES, PULLING TRIANGULATIONS, AND MONOTONE PATHS SEBASTIAN MANECKE, RAMAN SANYAL, AND JEONGHOON SO arxiv:1812.07491v1 [math.co] 18 Dec 2018 Abstract. An S-hypersimplex for S {0, 1,..., } is
More informationarxiv: v2 [math.co] 13 Aug 2013
Orthogonality and minimality in the homology of locally finite graphs Reinhard Diestel Julian Pott arxiv:1307.0728v2 [math.co] 13 Aug 2013 August 14, 2013 Abstract Given a finite set E, a subset D E (viewed
More informationMath 5593 Linear Programming Lecture Notes
Math 5593 Linear Programming Lecture Notes Unit II: Theory & Foundations (Convex Analysis) University of Colorado Denver, Fall 2013 Topics 1 Convex Sets 1 1.1 Basic Properties (Luenberger-Ye Appendix B.1).........................
More informationSurvey of Techniques for Node Differential Privacy
Survey of Techniques for Noe Differential Privacy Sofya Raskhonikova Penn State University, on sabbatical at BU for 2013-2014 privacy year, also visiting Harvar 1 Publishing information about graphs Many
More informationRestricted-Orientation Convexity in Higher-Dimensional Spaces
Restricted-Orientation Convexity in Higher-Dimensional Spaces ABSTRACT Eugene Fink Derick Wood University of Waterloo, Waterloo, Ont, Canada N2L3G1 {efink, dwood}@violetwaterlooedu A restricted-oriented
More informationMulti-camera tracking algorithm study based on information fusion
International Conference on Avance Electronic Science an Technolog (AEST 016) Multi-camera tracking algorithm stu base on information fusion a Guoqiang Wang, Shangfu Li an Xue Wen School of Electronic
More informationLecture 2 September 3
EE 381V: Large Scale Optimization Fall 2012 Lecture 2 September 3 Lecturer: Caramanis & Sanghavi Scribe: Hongbo Si, Qiaoyang Ye 2.1 Overview of the last Lecture The focus of the last lecture was to give
More informationarxiv: v2 [math.co] 5 Jun 2018
Some useful lemmas on the ege Szege inex arxiv:1805.06578v [math.co] 5 Jun 018 Shengjie He 1 1. Department of Mathematics, Beijing Jiaotong University, Beijing, 100044, China Abstract The ege Szege inex
More informationA shortest path algorithm in multimodal networks: a case study with time varying costs
A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via
More informationAdjacency Matrix Based Full-Text Indexing Models
1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,
More informationLecture 7: Asymmetric K-Center
Advanced Approximation Algorithms (CMU 18-854B, Spring 008) Lecture 7: Asymmetric K-Center February 5, 007 Lecturer: Anupam Gupta Scribe: Jeremiah Blocki In this lecture, we will consider the K-center
More informationLecture 5: Properties of convex sets
Lecture 5: Properties of convex sets Rajat Mittal IIT Kanpur This week we will see properties of convex sets. These properties make convex sets special and are the reason why convex optimization problems
More informationDivide-and-Conquer Algorithms
Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:
More informationLecture 1. 1 Notation
Lecture 1 (The material on mathematical logic is covered in the textbook starting with Chapter 5; however, for the first few lectures, I will be providing some required background topics and will not be
More informationExercises of PIV. incomplete draft, version 0.0. October 2009
Exercises of PIV incomplete raft, version 0.0 October 2009 1 Images Images are signals efine in 2D or 3D omains. They can be vector value (e.g., color images), real (monocromatic images), complex or binary
More informationClassical Mechanics Examples (Lagrange Multipliers)
Classical Mechanics Examples (Lagrange Multipliers) Dipan Kumar Ghosh Physics Department, Inian Institute of Technology Bombay Powai, Mumbai 400076 September 3, 015 1 Introuction We have seen that the
More informationClassifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means
Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu
More informationBases of topologies. 1 Motivation
Bases of topologies 1 Motivation In the previous section we saw some examples of topologies. We described each of them by explicitly specifying all of the open sets in each one. This is not be a feasible
More informationMore Raster Line Issues. Bresenham Circles. Once More: 8-Pt Symmetry. Only 1 Octant Needed. Spring 2013 CS5600
Spring 03 Lecture Set 3 Bresenham Circles Intro to Computer Graphics From Rich Riesenfel Spring 03 More Raster Line Issues Fat lines with multiple pixel with Symmetric lines n point geometry how shoul
More informationPreamble. Singly linked lists. Collaboration policy and academic integrity. Getting help
CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure
More informationMatching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.
18.433 Combinatorial Optimization Matching Algorithms September 9,14,16 Lecturer: Santosh Vempala Given a graph G = (V, E), a matching M is a set of edges with the property that no two of the edges have
More informationTHE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE
БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:
More informationPolitehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques
Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose
More informationIndexing the Edges A simple and yet efficient approach to high-dimensional indexing
Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science
More informationLecture and notes by: Nate Chenette, Brent Myers, Hari Prasad November 8, Property Testing
Property Testing 1 Introduction Broadly, property testing is the study of the following class of problems: Given the ability to perform (local) queries concerning a particular object (e.g., a function,
More informationAlgebraic transformations of Gauss hypergeometric functions
Algebraic transformations of Gauss hypergeometric functions Raimunas Viūnas Faculty of Mathematics, Kobe University Abstract This article gives a classification scheme of algebraic transformations of Gauss
More informationOpen Access Adaptive Image Enhancement Algorithm with Complex Background
Sen Orers for Reprints to reprints@benthamscience.ae 594 The Open Cybernetics & Systemics Journal, 205, 9, 594-600 Open Access Aaptive Image Enhancement Algorithm with Complex Bacgroun Zhang Pai * epartment
More informationNew Constructions of Non-Adaptive and Error-Tolerance Pooling Designs
New Constructions of Non-Adaptive and Error-Tolerance Pooling Designs Hung Q Ngo Ding-Zhu Du Abstract We propose two new classes of non-adaptive pooling designs The first one is guaranteed to be -error-detecting
More informationSuperconcentrators of depth 2 and 3; odd levels help (rarely)
Superconcentrators of depth 2 and 3; odd levels help (rarely) Noga Alon Bellcore, Morristown, NJ, 07960, USA and Department of Mathematics Raymond and Beverly Sackler Faculty of Exact Sciences Tel Aviv
More informationAbstract. A graph G is perfect if for every induced subgraph H of G, the chromatic number of H is equal to the size of the largest clique of H.
Abstract We discuss a class of graphs called perfect graphs. After defining them and getting intuition with a few simple examples (and one less simple example), we present a proof of the Weak Perfect Graph
More informationCS675: Convex and Combinatorial Optimization Spring 2018 Consequences of the Ellipsoid Algorithm. Instructor: Shaddin Dughmi
CS675: Convex and Combinatorial Optimization Spring 2018 Consequences of the Ellipsoid Algorithm Instructor: Shaddin Dughmi Outline 1 Recapping the Ellipsoid Method 2 Complexity of Convex Optimization
More informationDivision of the Humanities and Social Sciences. Convex Analysis and Economic Theory Winter Separation theorems
Division of the Humanities and Social Sciences Ec 181 KC Border Convex Analysis and Economic Theory Winter 2018 Topic 8: Separation theorems 8.1 Hyperplanes and half spaces Recall that a hyperplane in
More informationAdditional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication
Aitional Divie an Conquer Algorithms Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Divie an Conquer Closest Pair Let s revisit the closest pair problem. Last
More informationAd-Hoc Networks Beyond Unit Disk Graphs
A-Hoc Networks Beyon Unit Disk Graphs Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 8092 Zurich, Switzerlan {kuhn, wattenhofer, zollinger}@inf.ethz.ch ABSTRACT
More informationShift-map Image Registration
Shift-map Image Registration Linus Svärm Petter Stranmark Centre for Mathematical Sciences, Lun University {linus,petter}@maths.lth.se Abstract Shift-map image processing is a new framework base on energy
More informationRobust Camera Calibration for an Autonomous Underwater Vehicle
obust Camera Calibration for an Autonomous Unerwater Vehicle Matthew Bryant, Davi Wettergreen *, Samer Aballah, Alexaner Zelinsky obotic Systems Laboratory Department of Engineering, FEIT Department of
More informationLearning Polynomial Functions. by Feature Construction
I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate
More informationAnalytical approximation of transient joint queue-length distributions of a finite capacity queueing network
Analytical approximation of transient joint queue-length istributions of a finite capacity queueing network Gunnar Flötterö Carolina Osorio March 29, 2013 Problem statements This work contributes to the
More informationLecture 3: Linear Classification
Lecture 3: Linear Classification Roger Grosse 1 Introduction Last week, we saw an example of a learning task called regression. There, the goal was to predict a scalar-valued target from a set of features.
More informationCS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics
CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,
More information