389 results
Search Results
2. Towards an optimal contention resolution scheme for matchings: Towards an optimal contention resolution scheme...
- Author
-
Nuti, Pranav and Vondrák, Jan
- Published
- 2025
- Full Text
- View/download PDF
3. PPSZ for General k-SAT and CSP—Making Hertli’s Analysis Simpler and 3-SAT Faster.
- Author
-
Scheder, Dominik and Steinberger, John
- Abstract
The currently fastest known algorithm for k-SAT is PPSZ, named after its inventors (Paturi et al. in J ACM 52(3):337-364, 2005. ). Analyzing its running time is much easier for input formulas with a unique satisfying assignment. In this paper, we achieve three goals. First, we simplify the analysis of Hertli (in 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science-FOCS 2011, Los Alamitos, 2011) for input formulas with multiple satisfying assignments. Second, we show a “lifting result”: if you improve PPSZ for k-CNF formulas with a unique satisfying assignment, you will immediately get a (weaker) improvement for general k-CNF formulas. In combination this with results by Hansen et al. (in Charikar and Cohen (ed) Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, 2019) and Scheder (in 62nd IEEE Annual Symposium on Foundations of Computer Science, 2021), who all prove improved time bounds for Unique-k-SAT, this gives improved bounds for general k-SAT. We also generalize our results to the domain of Constraint Satisfaction Problems, i.e., satisfiability with more than two truth values. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. Parallel Quantum Rapidly-Exploring Random Trees
- Author
-
Lathrop, Paul, Boardman, Beth, and Martínez, Sonia
- Subjects
Quantum Physics ,Electrical Engineering and Systems Science - Systems and Control ,68W20 - Abstract
In this paper, we present the Parallel Quantum Rapidly-Exploring Random Tree (Pq-RRT) algorithm, a parallel version of the Quantum Rapidly-Exploring Random Trees (q-RRT) algorithm. Parallel Quantum RRT is a parallel quantum algorithm formulation of a sampling-based motion planner that uses Quantum Amplitude Amplification to search databases of reachable states for addition to a tree. In this work we investigate how parallel quantum devices can more efficiently search a database, as the quantum measurement process involves the collapse of the superposition to a base state, erasing probability information and therefore the ability to efficiently find multiple solutions. Pq-RRT uses a manager/parallel-quantum-workers formulation, inspired by traditional parallel motion planning, to perform simultaneous quantum searches of a feasible state database. We present results regarding likelihoods of multiple parallel units finding any and all solutions contained with a shared database, with and without reachability errors, allowing efficiency predictions to be made. We offer simulations in dense obstacle environments showing efficiency, density/heatmap, and speed comparisons for Pq-RRT against q-RRT, classical RRT, and classical parallel RRT. We then present Quantum Database Annealing, a database construction strategy for Pq-RRT and q-RRT that uses a temperature construct to define database creation over time for balancing exploration and exploitation., Comment: 14 pages, 15 figures
- Published
- 2023
5. A survey on the cold start latency approaches in serverless computing: an optimization-based perspective
- Author
-
Ghorbian, Mohsen and Ghobaei-Arani, Mostafa
- Published
- 2024
- Full Text
- View/download PDF
6. Almost-Sure Convergence of Iterates and Multipliers in Stochastic Sequential Quadratic Optimization
- Author
-
Curtis, Frank E., Jiang, Xin, and Wang, Qi
- Published
- 2025
- Full Text
- View/download PDF
7. Tracking tensor ring decompositions of streaming tensors
- Author
-
Yu, Yajie and Li, Hanyu
- Published
- 2025
- Full Text
- View/download PDF
8. On greedy multi-step inertial randomized Kaczmarz method for solving linear systems
- Author
-
Su, Yansheng, Han, Deren, Zeng, Yun, and Xie, Jiaxin
- Published
- 2024
- Full Text
- View/download PDF
9. A Randomized Block Krylov Method for Tensor Train Approximation
- Author
-
Yu, Gaohang, Feng, Jinhong, Chen, Zhongming, Cai, Xiaohao, and Qi, Liqun
- Subjects
Mathematics - Numerical Analysis ,68W20 - Abstract
Tensor train decomposition is a powerful tool for dealing with high-dimensional, large-scale tensor data, which is not suffering from the curse of dimensionality. To accelerate the calculation of the auxiliary unfolding matrix, some randomized algorithms have been proposed; however, they are not suitable for noisy data. The randomized block Krylov method is capable of dealing with heavy-tailed noisy data in the low-rank approximation of matrices. In this paper, we present a randomized algorithm for low-rank tensor train approximation of large-scale tensors based on randomized block Krylov subspace iteration and provide theoretical guarantees. Numerical experiments on synthetic and real-world tensor data demonstrate the effectiveness of the proposed algorithm., Comment: 23 pages, 15 figures
- Published
- 2023
10. Investigation of Bare-bones Algorithms from Quantum Perspective: A Quantum Dynamical Global Optimizer
- Author
-
Wang, Peng, Xin, Gang, and Wang, Fang
- Subjects
Computer Science - Neural and Evolutionary Computing ,68W20 ,I.0 - Abstract
Recent decades, the emergence of numerous novel algorithms makes it a gimmick to propose an intelligent optimization system based on metaphor, and hinders researchers from exploring the essence of search behavior in algorithms. However, it is difficult to directly discuss the search behavior of an intelligent optimization algorithm, since there are so many kinds of intelligent schemes. To address this problem, an intelligent optimization system is regarded as a simulated physical optimization system in this paper. The dynamic search behavior of such a simplified physical optimization system are investigated with quantum theory. To achieve this goal, the Schroedinger equation is employed as the dynamics equation of the optimization algorithm, which is used to describe dynamic search behaviours in the evolution process with quantum theory. Moreover, to explore the basic behaviour of the optimization system, the optimization problem is assumed to be decomposed and approximated. Correspondingly, the basic search behaviour is derived, which constitutes the basic iterative process of a simple optimization system. The basic iterative process is compared with some classical bare-bones schemes to verify the similarity of search behavior under different metaphors. The search strategies of these bare bones algorithms are analyzed through experiments., Comment: The paper may provide a new quantum perspective for studying a bare-bones intelligence algorithms
- Published
- 2021
11. Ensemble Kalman inversion for image guided guide wire navigation in vascular systems.
- Author
-
Hanu, Matei, Hesser, Jürgen, Kanschat, Guido, Moviglia, Javier, Schillings, Claudia, and Stallkamp, Jan
- Subjects
PARAMETER estimation ,CARDIOVASCULAR system ,ALGORITHMS ,NAVIGATION - Abstract
This paper addresses the challenging task of guide wire navigation in cardiovascular interventions, focusing on the parameter estimation of a guide wire system using Ensemble Kalman Inversion (EKI) with a subsampling technique. The EKI uses an ensemble of particles to estimate the unknown quantities. However, since the data misfit has to be computed for each particle in each iteration, the EKI may become computationally infeasible in the case of high-dimensional data, e.g. high-resolution images. This issue can been addressed by randomised algorithms that utilize only a random subset of the data in each iteration. We introduce and analyse a subsampling technique for the EKI, which is based on a continuous-time representation of stochastic gradient methods and apply it to on the parameter estimation of our guide wire system. Numerical experiments with real data from a simplified test setting demonstrate the potential of the method. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. Efficient randomized block Kaczmarz method for linear feasibility: Efficient randomized block Kaczmarz method for linear...
- Author
-
Niu, Yu-Qi and Zheng, Bing
- Published
- 2025
- Full Text
- View/download PDF
13. Sketch-based multiplicative updating algorithms for symmetric nonnegative tensor factorizations with applications to face image clustering
- Author
-
Che, Maolin, Wei, Yimin, and Yan, Hong
- Published
- 2024
- Full Text
- View/download PDF
14. Oblivious subspace embeddings for compressed Tucker decompositions
- Author
-
Pietrosanu, Matthew, Jiang, Bei, and Kong, Linglong
- Subjects
Statistics - Machine Learning ,Statistics - Computation ,Statistics - Methodology ,68W20 ,G.3 - Abstract
Emphasis in the tensor literature on random embeddings (tools for low-distortion dimension reduction) for the canonical polyadic (CP) tensor decomposition has left analogous results for the more expressive Tucker decomposition comparatively lacking. This work establishes general Johnson-Lindenstrauss (JL) type guarantees for the estimation of Tucker decompositions when an oblivious random embedding is applied along each mode. When these embeddings are drawn from a JL-optimal family, the decomposition can be estimated within $\varepsilon$ relative error under restrictions on the embedding dimension that are in line with recent CP results. We implement a higher-order orthogonal iteration (HOOI) decomposition algorithm with random embeddings to demonstrate the practical benefits of this approach and its potential to improve the accessibility of otherwise prohibitive tensor analyses. On moderately large face image and fMRI neuroimaging datasets, empirical results show that substantial dimension reduction is possible with minimal increase in reconstruction error relative to traditional HOOI ($\leq$5% larger error, 50%-60% lower computation time for large models with 50% dimension reduction along each mode). Especially for large tensors, our method outperforms traditional higher-order singular value decomposition (HOSVD) and recently proposed TensorSketch methods.
- Published
- 2024
15. A Robust Randomized Indicator Method for Accurate Symmetric Eigenvalue Detection.
- Author
-
Chen, Zhongyuan, Sun, Jiguang, and Xia, Jianlin
- Abstract
We propose a robust randomized indicator method for the reliable detection of eigenvalue existence within an interval for symmetric matrices A. An indicator tells the eigenvalue existence based on some statistical norm estimators for a spectral projector. Previous work on eigenvalue indicators relies on a threshold which is empirically chosen, thus often resulting in under or over detection. In this paper, we use rigorous statistical analysis to guide the design of a robust indicator. Multiple randomized estimators for a contour integral operator in terms of A are analyzed. In particular, when A has eigenvalues inside a given interval, we show that the failure probability (for the estimators to return very small estimates) is extremely low. This enables to design a robust rejection indicator based on the control of the failure probability. We also give a prototype framework to illustrate how the indicator method may be applied numerically for eigenvalue detection and may potentially serve as a new way to design randomized symmetric eigenvalue solvers. Unlike previous indicator methods that only detect eigenvalue existence, the framework also provides a way to find eigenvectors with little extra cost by reusing computations from indicator evaluations. Extensive numerical tests show the reliability of the eigenvalue detection in multiple aspects. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Randomized Methods for Computing Optimal Transport Without Regularization and Their Convergence Analysis.
- Author
-
Xie, Yue, Wang, Zhongjian, and Zhang, Zhiwen
- Abstract
The optimal transport (OT) problem can be reduced to a linear programming (LP) problem through discretization. In this paper, we introduced the random block coordinate descent (RBCD) methods to directly solve this LP problem. Our approach involves restricting the potentially large-scale optimization problem to small LP subproblems constructed via randomly chosen working sets. By using a random Gauss-Southwell-q rule to select these working sets, we equip the vanilla version of ( RBCD 0 ) with almost sure convergence and a linear convergence rate to solve general standard LP problems. To further improve the efficiency of the ( RBCD 0 ) method, we explore the special structure of constraints in the OT problems and leverage the theory of linear systems to propose several approaches for refining the random working set selection and accelerating the vanilla method. Inexact versions of the RBCD methods are also discussed. Our preliminary numerical experiments demonstrate that the accelerated random block coordinate descent (ARBCD) method compares well with other solvers including stabilized Sinkhorn’s algorithm when seeking solutions with relatively high accuracy, and offers the advantage of saving memory. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. Security of IoT Device: Perspective Forensic/Anti-Forensic Issues on Invalid Area of NAND Flash Memory
- Author
-
Ahn, Na Young and Lee, Dong Hoon
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Hardware Architecture ,68W20 - Abstract
NAND flash memory-based IoT device can potentially still leave behind original personal data in an invalid area even if the data has been deleted. In this paper, we raise the forensic issue of original data remaining in unmanaged blocks caused by NAND flash memory and introduce methods for secure deletion of such data in the invalid area. We also propose a verification technique for secure deletion that is performed based on cell count information, which refers to the difference in bits between personal data and data stored in the block. The pass/fail of the verification technique according to the cell count information is determined in consideration of error correction capabilities. With the forensic issue of de-identification being a vital theme in the big data industry, the threat of serious privacy breaches coupled with our proposal to prevent these attacks will prove to be critical technological necessities in the future., Comment: IEEE Access, early published by July 14, 2022
- Published
- 2022
- Full Text
- View/download PDF
18. A memetic procedure for global multi-objective optimization.
- Author
-
Lapucci, Matteo, Mansueto, Pierluigi, and Schoen, Fabio
- Abstract
In this paper we consider multi-objective optimization problems over a box. Several computational approaches to solve these problems have been proposed in the literature, that broadly fall into two main classes: evolutionary methods, which are usually very good at exploring the feasible region and retrieving good solutions even in the nonconvex case, and descent methods, which excel in efficiently approximating good quality solutions. In this paper, first we confirm, through numerical experiments, the advantages and disadvantages of these approaches. Then we propose a new method which combines the good features of both. The resulting algorithm, which we call Non-dominated Sorting Memetic Algorithm, besides enjoying interesting theoretical properties, excels in all of the numerical tests we performed on several, widely employed, test functions. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
19. The equilibria of independent distributions on unbalanced game trees
- Author
-
Tanaka, Kazuyuki, Peng, Ning Ning, Peng, Weiguang, and Li, Wenjuan
- Published
- 2024
- Full Text
- View/download PDF
20. Improved FPT Algorithms for Deletion to Forest-Like Structures.
- Author
-
Gowda, Kishen N., Lonkar, Aditya, Panolan, Fahad, Patel, Vraj, and Saurabh, Saket
- Subjects
ALGORITHMS ,INDEPENDENT sets ,INTEGERS ,UNDIRECTED graphs - Abstract
The Feedback Vertex Set problem is undoubtedly one of the most well-studied problems in Parameterized Complexity. In this problem, given an undirected graph G and a non-negative integer k, the objective is to test whether there exists a subset S ⊆ V (G) of size at most k such that G - S is a forest. After a long line of improvement, recently, Li and Nederlof [TALG, 2022] designed a randomized algorithm for the problem running in time O ⋆ (2. 7 k) ∗ . In the Parameterized Complexity literature, several problems around Feedback Vertex Set have been studied. Some of these include Independent Feedback Vertex Set (where the set S should be an independent set in G), Almost Forest Deletion and Pseudoforest Deletion. In Pseudoforest Deletion, each connected component in G - S has at most one cycle in it. However, in Almost Forest Deletion, the input is a graph G and non-negative integers k , ℓ ∈ N , and the objective is to test whether there exists a vertex subset S of size at most k, such that G - S is ℓ edges away from a forest. In this paper, using the methodology of Li and Nederlof [TALG, 2022], we obtain the current fastest algorithms for all these problems. In particular we obtain the following randomized algorithms. Independent Feedback Vertex Set can be solved in time O ⋆ (2. 7 k) . Pseudo Forest Deletion can be solved in time O ⋆ (2. 85 k) . Almost Forest Deletion can be solved in time O ⋆ (min { 2. 85 k · 8. 54 ℓ , 2. 7 k · 36. 61 ℓ , 3 k · 1. 78 ℓ }) . [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
21. New Algorithms for Maximum Disjoint Paths Based on Tree-Likeness
- Author
-
Fleszar, Krzysztof, Mnich, Matthias, Spoerhase, Joachim, QE Operations research, and RS: GSBE Theme Data-Driven Decision-Making
- Subjects
90C27 ,FOS: Computer and information sciences ,Vertex deletion ,FLOW ,0211 other engineering and technologies ,02 engineering and technology ,Disjoint sets ,68Q17 ,01 natural sciences ,Upper and lower bounds ,05C05 ,05C85 ,Data Structures and Algorithms (cs.DS) ,05C40 ,Feedback vertex set ,Mathematics ,90B18 ,90C39 ,021103 operations research ,Full Length Paper ,68Q87 ,Approximation algorithm ,68W40 ,90B10 ,Binary logarithm ,90C35 ,Graph ,68W05 ,010201 computation theory & mathematics ,Randomized rounding ,90C05 ,90C49 ,68-02 ,General Mathematics ,68R10 ,68-06 ,0102 computer and information sciences ,90C46 ,Combinatorics ,Computer Science - Data Structures and Algorithms ,THEOREM ,49L20 ,Disjoint paths ,0101 mathematics ,05C21 ,000 Computer science, knowledge, general works ,010102 general mathematics ,INTEGER ,68Q25 ,90C10 ,68W20 ,68W25 ,90C59 ,05C38 ,Fixed-parameter algorithm ,Computer Science ,Software - Abstract
We study the classical \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathsf {NP}}$$\end{document}NP-hard problems of finding maximum-size subsets from given sets of k terminal pairs that can be routed via edge-disjoint paths (MaxEDP) or node-disjoint paths (MaxNDP) in a given graph. The approximability of MaxEDP/MaxNDP is currently not well understood; the best known lower bound is \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${2^{\varOmega (\sqrt{\log n})}}$$\end{document}2Ω(logn), assuming \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathsf {NP}\not \subseteq \mathsf {DTIME}(n^{\mathcal {O}(\log n)})}$$\end{document}NP⊈DTIME(nO(logn)). This constitutes a significant gap to the best known approximation upper bound of \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathcal {O}(\sqrt{n})}$$\end{document}O(n) due to Chekuri et al. (Theory Comput 2:137–146, 2006), and closing this gap is currently one of the big open problems in approximation algorithms. In their seminal paper, Raghavan and Thompson (Combinatorica 7(4):365–374, 1987) introduce the technique of randomized rounding for LPs; their technique gives an \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathcal {O}(1)}$$\end{document}O(1)-approximation when edges (or nodes) may be used by \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathcal {O}\left( \log n/\log \log n\right) }$$\end{document}Ologn/loglogn paths. In this paper, we strengthen the fundamental results above. We provide new bounds formulated in terms of the feedback vertex set number r of a graph, which measures its vertex deletion distance to a forest. In particular, we obtain the following results:For MaxEDP, we give an \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathcal {O}(\sqrt{r} \log ({k}r))}$$\end{document}O(rlog(kr))-approximation algorithm. Up to a logarithmic factor, our result strengthens the best known ratio \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathcal {O}(\sqrt{n})}$$\end{document}O(n) due to Chekuri et al., as \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${r\le n}$$\end{document}r≤n.Further, we show how to route \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\varOmega ({\text {OPT}}^{*})}$$\end{document}Ω(OPT∗) pairs with congestion bounded by \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathcal {O}(\log (kr)/\log \log (kr))}$$\end{document}O(log(kr)/loglog(kr)), strengthening the bound obtained by the classic approach of Raghavan and Thompson.For MaxNDP, we give an algorithm that gives the optimal answer in time \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${(k+r)^{\mathcal {O}(r)}\cdot n}$$\end{document}(k+r)O(r)·n. This is a substantial improvement on the run time of \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${2^kr^{\mathcal {O}(r)}\cdot n}$$\end{document}2krO(r)·n, which can be obtained via an algorithm by Scheffler. We complement these positive results by proving that MaxEDP is \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathsf {NP}}$$\end{document}NP-hard even for \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${r=1}$$\end{document}r=1, and MaxNDP is \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathsf {W}[1]}$$\end{document}W[1]-hard when r is the parameter. This shows that neither problem is fixed-parameter tractable in r unless \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\mathsf {FPT}= \mathsf {W}[1]}$$\end{document}FPT=W[1] and that our approximability results are relevant even for very small constant values of r.
- Published
- 2016
- Full Text
- View/download PDF
22. Binary Random Projections with Controllable Sparsity Patterns
- Author
-
Li, Wenye and Zhang, Shuzhong
- Subjects
Computer Science - Machine Learning ,Computer Science - Information Retrieval ,Statistics - Machine Learning ,68W20 - Abstract
Random projection is often used to project higher-dimensional vectors onto a lower-dimensional space, while approximately preserving their pairwise distances. It has emerged as a powerful tool in various data processing tasks and has attracted considerable research interest. Partly motivated by the recent discoveries in neuroscience, in this paper we study the problem of random projection using binary matrices with controllable sparsity patterns. Specifically, we proposed two sparse binary projection models that work on general data vectors. Compared with the conventional random projection models with dense projection matrices, our proposed models enjoy significant computational advantages due to their sparsity structure, as well as improved accuracies in empirical evaluations., Comment: 19 pages, 15 figures
- Published
- 2020
23. A Randomized Algorithm for Single-Source Shortest Path on Undirected Real-Weighted Graphs
- Author
-
Duan, Ran, Mao, Jiayi, Shu, Xinkai, and Yin, Longhui
- Subjects
Computer Science - Data Structures and Algorithms ,68W20 ,F.2.2 - Abstract
In undirected graphs with real non-negative weights, we give a new randomized algorithm for the single-source shortest path (SSSP) problem with running time $O(m\sqrt{\log n \cdot \log\log n})$ in the comparison-addition model. This is the first algorithm to break the $O(m+n\log n)$ time bound for real-weighted sparse graphs by Dijkstra's algorithm with Fibonacci heaps. Previous undirected non-negative SSSP algorithms give time bound of $O(m\alpha(m,n)+\min\{n\log n, n\log\log r\})$ in comparison-addition model, where $\alpha$ is the inverse-Ackermann function and $r$ is the ratio of the maximum-to-minimum edge weight [Pettie & Ramachandran 2005], and linear time for integer edge weights in RAM model [Thorup 1999]. Note that there is a proposed complexity lower bound of $\Omega(m+\min\{n\log n, n\log\log r\})$ for hierarchy-based algorithms for undirected real-weighted SSSP [Pettie & Ramachandran 2005], but our algorithm does not obey the properties required for that lower bound. As a non-hierarchy-based approach, our algorithm shows great advantage with much simpler structure, and is much easier to implement., Comment: 17 pages
- Published
- 2023
24. On the randomized multiple row-action methods for solving linear least-squares problems
- Author
-
Zuo, Qian, Wu, Nian-Ci, Liu, Chengzhi, and Wang, Yatian
- Published
- 2024
- Full Text
- View/download PDF
25. Survey of a class of iterative row-action methods: The Kaczmarz method
- Author
-
A. Ferreira, Inês, A. Acebrón, Juan, and Monteiro, José
- Published
- 2024
- Full Text
- View/download PDF
26. Dynamic graph connectivity with improved worst case update time and sublinear space
- Author
-
Gibb, David, Kapron, Bruce, King, Valerie, and Thorn, Nolan
- Subjects
Computer Science - Data Structures and Algorithms ,68W20 ,E.1 - Abstract
This paper considers fully dynamic graph algorithms with both faster worst case update time and sublinear space. The fully dynamic graph connectivity problem is the following: given a graph on a fixed set of n nodes, process an online sequence of edge insertions, edge deletions, and queries of the form "Is there a path between nodes a and b?" In 2013, the first data structure was presented with worst case time per operation which was polylogarithmic in n. In this paper, we shave off a factor of log n from that time, to O(log^4 n) per update. For sequences which are polynomial in length, our algorithm answers queries in O(log n/\log\log n) time correctly with high probability and using O(n \log^2 n) words (of size log n). This matches the amount of space used by the most space-efficient graph connectivity streaming algorithm. We also show that 2-edge connectivity can be maintained using O(n log^2 n) words with an amortized update time of O(log^6 n).
- Published
- 2015
27. Clustering large 3D volumes: A sampling-based approach
- Author
-
Lang, Thomas
- Subjects
Computer Science - Computer Vision and Pattern Recognition ,Computer Science - Information Retrieval ,68W20 ,I.5.3 ,H.3.3 - Abstract
In many applications of X-ray computed tomography, an unsupervised segmentation of the reconstructed 3D volumes forms an important step in the image processing chain for further investigation of the digitized object. Therefore, the goal is to train a clustering algorithm on the volume, which produces a voxelwise classification by assigning a cluster index to each voxel. However, clustering methods, e.g., K-Means, typically have an asymptotic polynomial runtime with respect to the dataset size, and thus, these techniques are rarely applicable to large volumes. In this work, we introduce a novel clustering technique based on random sampling, which allows for the voxelwise classification of arbitrarily large volumes. The presented method conducts efficient linear passes over the data to extract a representative random sample of a fixed size on which the classifier can be trained. Then, a final linear pass performs the segmentation and assigns a cluster index to each individual voxel. Quantitative and qualitative evaluations show that excellent results can be achieved even with a very small sample size. Consequently, the unsupervised segmentation by means of clustering becomes feasible for arbitrarily large volumes., Comment: 12 pages, 8 figures
- Published
- 2023
28. Engineering a Preprocessor for Symmetry Detection
- Author
-
Anders, Markus, Schweitzer, Pascal, and Stieß, Julian
- Subjects
Computer Science - Data Structures and Algorithms ,68W20 ,G.2.2 - Abstract
State-of-the-art solvers for symmetry detection in combinatorial objects are becoming increasingly sophisticated software libraries. Most of the solvers were initially designed with inputs from combinatorics in mind (nauty, bliss, Traces, dejavu). They excel at dealing with a complicated core of the input. Others focus on practical instances that exhibit sparsity. They excel at dealing with comparatively easy but extremely large substructures of the input (saucy). In practice, these differences manifest in significantly diverging performances on different types of graph classes. We engineer a preprocessor for symmetry detection. The result is a tool designed to shrink sparse, large substructures of the input graph. On most of the practical instances, the overall running time improves significantly for many of the state-of-the-art solvers. At the same time, our benchmarks show that the additional overhead is negligible. Overall we obtain single algorithms with competitive performance across all benchmark graphs. As such the preprocessor bridges the disparity between solvers that focus on combinatorial graphs and large practical graphs. In fact, on most of the practical instances the combined setup significantly outperforms previous state-of-the-art.
- Published
- 2023
29. Sparse harmonic transforms II: best s-term approximation guarantees for bounded orthonormal product bases in sublinear-time
- Author
-
Choi, Bosu, Iwen, Mark, and Volkmer, Toni
- Published
- 2021
- Full Text
- View/download PDF
30. Alternating direction method of multipliers for linear hyperspectral unmixing.
- Author
-
Dai, Yu-Hong, Xu, Fangfang, and Zhang, Liwei
- Subjects
REMOTE sensing ,MULTIPLIERS (Mathematical analysis) ,CONSTRAINED optimization - Abstract
Linear hyperspectral unmixing (LHU) is a class of important problems in remote sensing. It can be modelled by a linearly constrained convex optimization problem with a coupled objective function. This paper proposes an alternating direction method of multipliers (ADMM) for solving this LHU model. The special structure of the LHU model allows explicit solutions to the subproblems in the ADMM and hence the ADMM is easily implementable. The global convergence of the ADMM is established despite the existence of a coupled term in the objective function. Our numerical experiments with four data sets demonstrated that the proposed ADMM is effective for solving the LHU model. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
31. Linear convergence of Frank–Wolfe for rank-one matrix recovery without strong convexity
- Author
-
Garber, Dan
- Published
- 2023
- Full Text
- View/download PDF
32. A probabilistic extension to Conway's Game of Life.
- Author
-
Aguilera-Venegas, Gabriel, Galán-García, José Luis, Egea-Guerrero, Rocío, Galán-García, María Á., Rodríguez-Cielos, Pedro, Padilla-Domínguez, Yolanda, and Galán-Luque, María
- Subjects
PROBABILISTIC number theory ,CELLULAR automata - Abstract
The "Game of life" model was created in 1970 by the mathematician John Horton Conway using cellular automata. Since then, different extensions of these cellular automata have been used in many applications. In this work, we introduce probabilistic cellular automata which include non-deterministic rules for transitions between successive generations of the automaton together with probabilistic decisions about life and death of the cells in the next generation of the automaton. Different directions of the neighbours of each cell are treated with the possibility of applying distinct probabilities. This way, more realistic situations can be modelled and the obtained results are also non-deterministic. In this paper, we include a brief state of the art, the description of the model and some examples obtained with an implementation of the model made in Java. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
33. A PTAS for the horizontal rectangle stabbing problem
- Author
-
Khan, Arindam, Subramanian, Aditya, and Wiese, Andreas
- Published
- 2024
- Full Text
- View/download PDF
34. SVD-based algorithms for tensor wheel decomposition
- Author
-
Wang, Mengyu, Cui, Honghua, and Li, Hanyu
- Published
- 2024
- Full Text
- View/download PDF
35. Practical Sketching Algorithms for Low-Rank Tucker Approximation of Large Tensors.
- Author
-
Dong, Wandi, Yu, Gaohang, Qi, Liqun, and Cai, Xiaohao
- Abstract
Low-rank approximation of tensors has been widely used in high-dimensional data analysis. It usually involves singular value decomposition (SVD) of large-scale matrices with high computational complexity. Sketching is an effective data compression and dimensionality reduction technique applied to the low-rank approximation of large matrices. This paper presents two practical randomized algorithms for low-rank Tucker approximation of large tensors based on sketching and power scheme, with a rigorous error-bound analysis. Numerical experiments on synthetic and real-world tensor data demonstrate the competitive performance of the proposed algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
36. Probabilistic methods for approximate archetypal analysis.
- Author
-
Han, Ruijian, Osting, Braxton, Wang, Dong, and Xu, Yiming
- Subjects
COMPUTATIONAL complexity ,DATA analysis ,POLYTOPES ,SUBSPACES (Mathematics) - Abstract
Archetypal analysis (AA) is an unsupervised learning method for exploratory data analysis. One major challenge that limits the applicability of AA in practice is the inherent computational complexity of the existing algorithms. In this paper, we provide a novel approximation approach to partially address this issue. Utilizing probabilistic ideas from high-dimensional geometry, we introduce two preprocessing techniques to reduce the dimension and representation cardinality of the data, respectively. We prove that provided data are approximately embedded in a low-dimensional linear subspace and the convex hull of the corresponding representations is well approximated by a polytope with a few vertices, our method can effectively reduce the scaling of AA. Moreover, the solution of the reduced problem is near-optimal in terms of prediction errors. Our approach can be combined with other acceleration techniques to further mitigate the intrinsic complexity of AA. We demonstrate the usefulness of our results by applying our method to summarize several moderately large-scale datasets. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
37. A simple polynomial-time approximation algorithm for the total variation distance between two product distributions
- Author
-
Feng, Weiming, Guo, Heng, Jerrum, Mark, and Wang, Jiaheng
- Subjects
Computer Science - Data Structures and Algorithms ,Statistics - Methodology ,68W20 ,F.2.0 ,G.3 - Abstract
We give a simple polynomial-time approximation algorithm for the total variation distance between two product distributions.
- Published
- 2022
- Full Text
- View/download PDF
38. PPSZ is better than you think
- Author
-
Scheder, Dominik
- Subjects
Computer Science - Data Structures and Algorithms ,68W20 ,F.2.2 - Abstract
PPSZ, for long time the fastest known algorithm for $k$-SAT, works by going through the variables of the input formula in random order; each variable is then set randomly to $0$ or $1$, unless the correct value can be inferred by an efficiently implementable rule (like small-width resolution; or being implied by a small set of clauses). We show that PPSZ performs exponentially better than previously known, for all $k \geq 3$. For Unique-$3$-SAT we bound its running time by $O(1.306973^{n})$, which is somewhat better than the algorithm of Hansen, Kaplan, Zamir, and Zwick, which runs in time $O(1.306995^n)$. Before that, the best known upper bound for Unique-$3$-SAT was $O(1.3070319^n)$. All improvements are achieved without changing the original PPSZ. The core idea is to pretend that PPSZ does not process the variables in uniformly random order, but according to a carefully designed distribution. We write "pretend" since this can be done without any actual change to the algorithm., Comment: Journal version of this work. The previous arxiv version is the "full version", which contains the proof for the k=3 case
- Published
- 2022
- Full Text
- View/download PDF
39. The Simplex Algorithm in Dimension Three
- Author
-
Kaibel, Volker, Mechtel, Rafael, Sharir, Micha, and Ziegler, Guenter M.
- Subjects
Mathematics - Combinatorics ,Mathematics - Optimization and Control ,90C05 ,52B10 ,68W20 - Abstract
We investigate the worst-case behavior of the simplex algorithm on linear programs with three variables, that is, on 3-dimensional simple polytopes. Among the pivot rules that we consider, the ``random edge'' rule yields the best asymptotic behavior as well as the most complicated analysis. All other rules turn out to be much easier to study, but also produce worse results: Most of them show essentially worst-possible behavior; this includes both Kalai's ``random-facet'' rule, which without dimension restriction is known to be subexponential, as well as Zadeh's deterministic history dependent rule, for which no non-polynomial instances in general dimensions have been found so far., Comment: 24 pages, to appear in: SIAM J. Comp.; the paper comprises the contents of our paper 'The Random Edge Rule on Three-Dimensional Linear Programs' (math.CO/0301076)
- Published
- 2003
40. Automatic generation of fast algorithms for matrix–vector multiplication.
- Author
-
Andreatto, B. and Cariow, A.
- Subjects
MULTIPLICATION ,CROSS product (Mathematics) ,MATRICES (Mathematics) ,MATHEMATICAL optimization ,MATHEMATICAL decomposition - Abstract
This paper describes the methods for finding fast algorithms for computing matrix–vector products including the procedures based on the block-structured matrices. The proposed methods involve an analysis of the structural properties of matrices. The presented approaches are based on the well-known optimization techniques: the simulated annealing and the hill-climbing algorithm along with its several extensions. The main idea of the proposed methods consists in finding a decomposition of the original matrix into a sparse matrix and a matrix corresponding to an appropriate block-structured pattern. The main criterion for optimizing is a reduction of the computational cost. The methods presented in this paper can be successfully implemented in many digital signal processing tasks. [ABSTRACT FROM PUBLISHER]
- Published
- 2018
- Full Text
- View/download PDF
41. Momentum and stochastic momentum for stochastic gradient, Newton, proximal point and subspace descent methods.
- Author
-
Loizou, Nicolas and Richtárik, Peter
- Subjects
STOCHASTIC convergence ,PROCESS optimization - Abstract
In this paper we study several classes of stochastic optimization algorithms enriched with heavy ball momentum. Among the methods studied are: stochastic gradient descent, stochastic Newton, stochastic proximal point and stochastic dual subspace ascent. This is the first time momentum variants of several of these methods are studied. We choose to perform our analysis in a setting in which all of the above methods are equivalent: convex quadratic problems. We prove global non-asymptotic linear convergence rates for all methods and various measures of success, including primal function values, primal iterates, and dual function values. We also show that the primal iterates converge at an accelerated linear rate in a somewhat weaker sense. This is the first time a linear rate is shown for the stochastic heavy ball method (i.e., stochastic gradient descent method with momentum). Under somewhat weaker conditions, we establish a sublinear convergence rate for Cesàro averages of primal iterates. Moreover, we propose a novel concept, which we call stochastic momentum, aimed at decreasing the cost of performing the momentum step. We prove linear convergence of several stochastic methods with stochastic momentum, and show that in some sparse data regimes and for sufficiently small momentum parameters, these methods enjoy better overall complexity than methods with deterministic momentum. Finally, we perform extensive numerical testing on artificial and real datasets, including data coming from average consensus problems. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
42. Binary decompositions of probability densities and random-bit simulation.
- Author
-
Nekrutkin, Vladimir
- Subjects
DISTRIBUTION (Probability theory) ,RANDOM numbers ,PROBABILITY theory ,BINARY codes ,DENSITY - Abstract
This paper is devoted to random-bit simulation of probability densities, supported on [ 0 , 1 ] {[0,1]}. The term "random-bit" means that the source of randomness for simulation is a sequence of symmetrical Bernoulli trials. In contrast to the pioneer paper [D. E. Knuth and A. C. Yao, The complexity of nonuniform random number generation, Algorithms and Complexity, Academic Press, New York 1976, 357–428], the proposed method demands the knowledge of the probability density under simulation, and not the values of the corresponding distribution function. The method is based on the so-called binary decomposition of the density and comes down to simulation of a special discrete distribution to get several principal bits of output, while further bits of output are produced by "flipping a coin". The complexity of the method is studied and several examples are presented. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
43. Sampling Kaczmarz-Motzkin method for linear feasibility problems: generalization and acceleration
- Author
-
Morshed, Md Sarowar, Islam, Md Saiful, and Noor-E-Alam, Md.
- Published
- 2022
- Full Text
- View/download PDF
44. Single-pass randomized QLP decomposition for low-rank approximation.
- Author
-
Ren, Huan, Xiao, Guiyun, and Bai, Zheng-Jian
- Abstract
As a special UTV decomposition, the QLP decomposition is an effective alternative of the singular value decomposition (SVD) for the low-rank approximation. In this paper, we propose a single-pass randomized QLP decomposition algorithm for computing a low-rank matrix approximation. Compared with the randomized QLP decomposition, the complexity of the proposed algorithm does not increase significantly and the data matrix needs to be accessed only once. Therefore, our algorithm is suitable for a large matrix stored outside of memory or generated by streaming data. In the error analysis, we give the matrix approximation error analysis. We also provide singular value approximation error bounds, which can track the target largest singular values of the data matrix with high probability. Numerical experiments are also reported to verify our results. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
45. Randomized Quaternion QLP Decomposition for Low-Rank Approximation.
- Author
-
Ren, Huan, Ma, Ru-Ru, Liu, Qiaohua, and Bai, Zheng-Jian
- Abstract
The low-rank approximation of a quaternion matrix has attracted growing attention in many applications including color image processing and signal processing. In this paper, based on quaternion normal distribution random sampling, we propose a randomized quaternion QLP decomposition algorithm for computing a low-rank approximation to a quaternion data matrix. For the theoretical analysis, we first present convergence results of the quaternion QLP decomposition, which provides slightly tighter upper bounds than the existing ones for the real QLP decomposition. Then, for the randomized quaternion QLP decomposition, the matrix approximation error and the singular value approximation error analyses are also established to show the proposed randomized algorithm can track the singular values of the quaternion data matrix with high probability. Finally, we present some numerical examples to illustrate the effectiveness and reliablity of the proposed algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
46. Impatient PPSZ -- a Faster algorithm for CSP
- Author
-
Li, Shibo and Scheder, Dominik
- Subjects
Computer Science - Data Structures and Algorithms ,68W20 ,F.2.2 - Abstract
PPSZ is the fastest known algorithm for (d,k)-CSP problems, for most values of d and k. It goes through the variables in random order and sets each variable randomly to one of the d colors, excluding those colors that can be ruled out by looking at few constraints at a time. We propose and analyze a modification of PPSZ: whenever all but 2 colors can be ruled out for some variable, immediately set that variable randomly to one of the remaining colors. We show that our new "impatient PPSZ" outperforms PPSZ exponentially for all k and all d >= 3 on formulas with a unique satisfying assignment.
- Published
- 2021
47. SVD-based algorithms for fully-connected tensor network decomposition
- Author
-
Wang, Mengyu and Li, Hanyu
- Published
- 2024
- Full Text
- View/download PDF
48. A random sampling algorithm for fully-connected tensor network decomposition with applications
- Author
-
Wang, Mengyu, Cui, Honghua, and Li, Hanyu
- Published
- 2024
- Full Text
- View/download PDF
49. Parallel Computation of Combinatorial Symmetries
- Author
-
Anders, Markus and Schweitzer, Pascal
- Subjects
Computer Science - Data Structures and Algorithms ,68W20 ,G.2.2 - Abstract
In practice symmetries of combinatorial structures are computed by transforming the structure into an annotated graph whose automorphisms correspond exactly to the desired symmetries. An automorphism solver is then employed to compute the automorphism group of the constructed graph. Such solvers have been developed for over 50 years, and highly efficient sequential, single core tools are available. However no competitive parallel tools are available for the task. We introduce a new parallel randomized algorithm that is based on a modification of the individualization-refinement paradigm used by sequential solvers. The use of randomization crucially enables parallelization. We report extensive benchmark results that show that our solver is competitive to state-of-the-art solvers on a single thread, while scaling remarkably well with the use of more threads. This results in order-of-magnitude improvements on many graph classes over state-of-the-art solvers. In fact, our tool is the first parallel graph automorphism tool that outperforms current sequential tools., Comment: ESA 2021
- Published
- 2021
50. How well do SEM algorithms imitate EM algorithms? A non-asymptotic analysis for mixture models.
- Author
-
Blömer, Johannes, Brauer, Sascha, Bujna, Kathrin, and Kuntze, Daniel
- Abstract
In this paper, we present a theoretical and an experimental comparison of EM and SEM algorithms for different mixture models. The SEM algorithm is a stochastic variant of the EM algorithm. The qualitative intuition behind the SEM algorithm is simple: If the number of observations is large enough, then we expect that an update step of the stochastic SEM algorithm is similar to the corresponding update step of the deterministic EM algorithm. In this paper, we quantify this intuition. We show that with high probability the update equations of any EM-like algorithm and its stochastic variant are similar, given that the input set satisfies certain properties. For instance, this result applies to the well-known EM and SEM algorithm for Gaussian mixture models and EM-like and SEM-like heuristics for multivariate power exponential distributions. Our experiments confirm that our theoretical results also hold for a large number of successive update steps. Thereby we complement the known asymptotic results for the SEM algorithm. We also show that, for multivariate Gaussian and multivariate Laplacian mixture models, an update step of SEM runs nearly twice as fast as an EM update set. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.