341 results on '"Gärtner, Bernd"'
Search Results
2. Computing Enclosing Depth
- Author
-
Gärtner, Bernd, Rasiti, Fatime, and Schnider, Patrick
- Subjects
Computer Science - Computational Geometry - Abstract
Enclosing depth is a recently introduced depth measure which gives a lower bound to many depth measures studied in the literature. So far, enclosing depth has only been studied from a combinatorial perspective. In this work, we give the first algorithms to compute the enclosing depth of a query point with respect to a data point set in any dimension. In the plane we are able to optimize the algorithm to get a runtime of O(n log n). In constant dimension, our algorithms still run in polynomial time.
- Published
- 2024
3. Optimizing Symbol Visibility through Displacement
- Author
-
Gärtner, Bernd, Kalani, Vishwas, Reddy, Meghana M., Meulemans, Wouter, Speckmann, Bettina, and Stojaković, Miloš
- Subjects
Computer Science - Computational Geometry - Abstract
In information visualization, the position of symbols often encodes associated data values. When visualizing data elements with both a numerical and a categorical dimension, positioning in the categorical axis admits some flexibility. This flexibility can be exploited to reduce symbol overlap, and thereby increase legibility. In this paper we initialize the algorithmic study of optimizing symbol legibility via a limited displacement of the symbols. Specifically, we consider unit square symbols that need to be placed at specified $y$-coordinates. We optimize the drawing order of the symbols as well as their $x$-displacement, constrained within a rectangular container, to maximize the minimum visible perimeter over all squares. If the container has width and height at most $2$, there is a point that stabs all squares. In this case, we prove that a staircase layout is arbitrarily close to optimality and can be computed in $O(n\log n)$ time. If the width is at most $2$, there is a vertical line that stabs all squares, and in this case, we give a 2-approximation algorithm that runs in $O(n\log n)$ time. As a minimum visible perimeter of $2$ is always trivially achievable, we measure this approximation with respect to the visible perimeter exceeding $2$. We show that, despite its simplicity, the algorithm gives asymptotically optimal results for certain instances.
- Published
- 2023
4. A Note on the Faces of the Dual Koch Arrangement
- Author
-
Gärtner, Bernd and Wettstein, Manuel
- Subjects
Computer Science - Computational Geometry ,Mathematics - Combinatorics - Abstract
We analyze the faces of the dual Koch arrangement, which is the arrangement of $2^s + 1$ lines obtained by projective duality from the Koch chain $K_s$. In particular, we show that this line arrangement does not contain any $k$-gons for $k > 5$, and that the number of pentagons is $3 \cdot 2^{s-1} - 3$.
- Published
- 2023
5. A Characterization of the Realizable Matou\v{s}ek Unique Sink Orientations
- Author
-
Weber, Simon and Gärtner, Bernd
- Subjects
Mathematics - Combinatorics ,Computer Science - Discrete Mathematics - Abstract
The Matou\v{s}ek LP-type problems were used by Matou\v{s}ek to show that the Sharir-Welzl algorithm may require at least subexponential time. Later, G\"artner translated this result into the language of Unique Sink Orientations (USOs) and introduced the Matou\v{s}ek USOs, the USOs equivalent to Matou\v{s}ek's LP-type problems. He further showed that the Random Facet algorithm only requires quadratic time on the realizable subset of the Matou\v{s}ek USOs, but without characterizing this subset. In this paper, we deliver this missing characterization and also provide concrete realizations for all realizable Matou\v{s}ek USOs. Furthermore, we show that the realizable Matou\v{s}ek USOs are exactly the orientations arising from simple extensions of cyclic-P-matroids., Comment: 17 pages, 5 figures
- Published
- 2021
6. A Subexponential Algorithm for ARRIVAL
- Author
-
Gärtner, Bernd, Haslebacher, Sebastian, and Hoang, Hung P.
- Subjects
Computer Science - Data Structures and Algorithms ,05C57, 05C85, 68Q25, 68W05, 91A46 ,F.2.2 ,G.2.2 - Abstract
The ARRIVAL problem is to decide the fate of a train moving along the edges of a directed graph, according to a simple (deterministic) pseudorandom walk. The problem is in $NP \cap coNP$ but not known to be in $P$. The currently best algorithms have runtime $2^{\Theta(n)}$ where $n$ is the number of vertices. This is not much better than just performing the pseudorandom walk. We develop a subexponential algorithm with runtime $2^{O(\sqrt{n}\log n)}$. We also give a polynomial-time algorithm if the graph is almost acyclic. Both results are derived from a new general approach to solve ARRIVAL instances., Comment: 13 pages, 1 figure Added a reference
- Published
- 2021
7. A New Combinatorial Property of Geometric Unique Sink Orientations
- Author
-
Gao, Yuan, Gärtner, Bernd, and Lamperski, Jourdain
- Subjects
Mathematics - Combinatorics ,Computer Science - Discrete Mathematics ,Mathematics - Optimization and Control ,05A16, 68R05 ,G.2.1 ,F.2.2 - Abstract
A unique sink orientation (USO) is an orientation of the hypercube graph with the property that every face has a unique sink. A number of well-studied problems reduce in strongly polynomial time to finding the global sink of a USO; most notably, linear programming (LP) and the P-matrix linear complementarity problem (P-LCP). The former is not known to have a strongly polynomial-time algorithm, while the latter is not known to even have a polynomial-time algorithm, motivating the problem to find the global sink of a USO. Although, every known class of geometric USOs, arising from a concrete problem such as LP, is exponentially small, relative to the class of all USOs. Accordingly, geometric USOs exhibit additional properties that set them apart from general USOs, and it may be advantageous, if not necessary, to leverage these properties to find the global sink of a USO faster. Only a few such properties are known. In this paper, we establish a new combinatorial property of the USOs that arise from symmetric P-LCP, which includes the USOs that arise from linear and simple convex quadratic programming.
- Published
- 2020
8. Phase Transition in Democratic Opinion Dynamics
- Author
-
Gärtner, Bernd and Zehmakan, Ahad N.
- Subjects
Computer Science - Data Structures and Algorithms ,Computer Science - Discrete Mathematics ,Mathematics - Dynamical Systems - Abstract
Consider a community where initially, each individual is positive or negative regarding a reform proposal. In each round, individuals gather randomly in fixed rooms of different sizes, and all individuals in a room agree on the majority opinion in the room (with ties broken in favor of the negative opinion). The Galam model---introduced in statistical physics, specifically sociophysics---approximates this basic random process. We approach the model from a more mathematical perspective and study the threshold behavior and the consensus time of the model.
- Published
- 2019
9. The Crossing Tverberg Theorem
- Author
-
Fulek, Radoslav, Gärtner, Bernd, Kupavskii, Andrey, Valtr, Pavel, and Wagner, Uli
- Subjects
Computer Science - Computational Geometry ,Mathematics - Combinatorics ,05A18, 68R05 ,F.2.2 ,G.2.1 - Abstract
Tverberg's theorem is one of the cornerstones of discrete geometry. It states that, given a set $X$ of at least $(d+1)(r-1)+1$ points in $\mathbb R^d$, one can find a partition $X=X_1\cup \ldots \cup X_r$ of $X$, such that the convex hulls of the $X_i$, $i=1,\ldots,r$, all share a common point. In this paper, we prove a strengthening of this theorem that guarantees a partition which, in addition to the above, has the property that the boundaries of full-dimensional convex hulls have pairwise nonempty intersections. Possible generalizations and algorithmic aspects are also discussed. As a concrete application, we show that any $n$ points in the plane in general position span $\lfloor n/3\rfloor$ vertex-disjoint triangles that are pairwise crossing, meaning that their boundaries have pairwise nonempty intersections; this number is clearly best possible. A previous result of Rebollar et al.\ guarantees $\lfloor n/6\rfloor$ pairwise crossing triangles. Our result generalizes to a result about simplices in $\mathbb R^d,d\ge2$., Comment: 13 pages, 7 figures
- Published
- 2018
- Full Text
- View/download PDF
10. ARRIVAL: Next Stop in CLS
- Author
-
Gärtner, Bernd, Hansen, Thomas Dueholm, Hubáček, Pavel, Král, Karel, Mosaad, Hagar, and Slívová, Veronika
- Subjects
Computer Science - Computational Complexity ,F.1.3 ,F.2.2 ,G.2.2 - Abstract
We study the computational complexity of ARRIVAL, a zero-player game on $n$-vertex switch graphs introduced by Dohrau, G\"{a}rtner, Kohler, Matou\v{s}ek, and Welzl. They showed that the problem of deciding termination of this game is contained in $\text{NP} \cap \text{coNP}$. Karthik C. S. recently introduced a search variant of ARRIVAL and showed that it is in the complexity class PLS. In this work, we significantly improve the known upper bounds for both the decision and the search variants of ARRIVAL. First, we resolve a question suggested by Dohrau et al. and show that the decision variant of ARRIVAL is in $\text{UP} \cap \text{coUP}$. Second, we prove that the search variant of ARRIVAL is contained in CLS. Third, we give a randomized $\mathcal{O}(1.4143^n)$-time algorithm to solve both variants. Our main technical contributions are (a) an efficiently verifiable characterization of the unique witness for termination of the ARRIVAL game, and (b) an efficient way of sampling from the state space of the game. We show that the problem of finding the unique witness is contained in CLS, whereas it was previously conjectured to be FPSPACE-complete. The efficient sampling procedure yields the first algorithm for the problem that has expected runtime $\mathcal{O}(c^n)$ with $c<2$., Comment: 13 pages, 6 figures
- Published
- 2018
11. (Biased) Majority Rule Cellular Automata
- Author
-
Gärtner, Bernd and Zehmakan, Ahad N.
- Subjects
Computer Science - Formal Languages and Automata Theory ,Computer Science - Data Structures and Algorithms ,Nonlinear Sciences - Cellular Automata and Lattice Gases - Abstract
Consider a graph $G=(V,E)$ and a random initial vertex-coloring, where each vertex is blue independently with probability $p_{b}$, and red with probability $p_r=1-p_b$. In each step, all vertices change their current color synchronously to the most frequent color in their neighborhood and in case of a tie, a vertex conserves its current color; this model is called majority model. If in case of a tie a vertex always chooses blue color, it is called biased majority model. We are interested in the behavior of these deterministic processes, especially in a two-dimensional torus (i.e., cellular automaton with (biased) majority rule). In the present paper, as a main result we prove both majority and biased majority cellular automata exhibit a threshold behavior with two phase transitions. More precisely, it is shown that for a two-dimensional torus $T_{n,n}$, there are two thresholds $0\leq p_1, p_2\leq 1$ such that $p_b \ll p_1$, $p_1 \ll p_b \ll p_2$, and $p_2 \ll p_b$ result in monochromatic configuration by red, stable coexistence of both colors, and monochromatic configuration by blue, respectively in $\mathcal{O}(n^2)$ number of steps
- Published
- 2017
12. Majority Model on Random Regular Graphs
- Author
-
Gärtner, Bernd and Zehmakan, Ahad N.
- Subjects
Computer Science - Data Structures and Algorithms ,Computer Science - Distributed, Parallel, and Cluster Computing ,Computer Science - Discrete Mathematics - Abstract
Consider a graph $G=(V,E)$ and an initial random coloring where each vertex $v \in V$ is blue with probability $P_b$ and red otherwise, independently from all other vertices. In each round, all vertices simultaneously switch their color to the most frequent color in their neighborhood and in case of a tie, a vertex keeps its current color. The main goal of the present paper is to analyze the behavior of this basic and natural process on the random $d$-regular graph $\mathbb{G}_{n,d}$. It is shown that for all $\epsilon>0$, $P_b \le 1/2-\epsilon$ results in final complete occupancy by red in $\mathcal{O}(\log_d\log n)$ rounds with high probability, provided that $d\geq c/\epsilon^2$ for a suitable constant $c$. Furthermore, we show that with high probability, $\mathbb{G}_{n,d}$ is immune; i.e., the smallest dynamic monopoly is of linear size. A dynamic monopoly is a subset of vertices that can take over in the sense that a commonly chosen initial color eventually spreads throughout the whole graph, irrespective of the colors of other vertices. This answers an open question of Peleg.
- Published
- 2017
13. Pseudo Unique Sink Orientations
- Author
-
Bosshard, Vitor and Gärtner, Bernd
- Subjects
Mathematics - Combinatorics ,Computer Science - Discrete Mathematics ,05A16, 68R05 ,G.2.1 ,F.2.2 - Abstract
A unique sink orientation (USO) is an orientation of the $n$-dimensional cube graph ($n$-cube) such that every face (subcube) has a unique sink. The number of unique sink orientations is $n^{\Theta(2^n)}$. If a cube orientation is not a USO, it contains a pseudo unique sink orientation (PUSO): an orientation of some subcube such that every proper face of it has a unique sink, but the subcube itself hasn't. In this paper, we characterize and count PUSOs of the $n$-cube. We show that PUSOs have a much more rigid structure than USOs and that their number is between $2^{\Omega(2^{n-\log n})}$ and $2^{O(2^n)}$ which is negligible compared to the number of USOs. As tools, we introduce and characterize two new classes of USOs: border USOs (USOs that appear as facets of PUSOs), and odd USOs which are dual to border USOs but easier to understand., Comment: 22 pages, 10 figures
- Published
- 2017
14. Screening Rules for Convex Problems
- Author
-
Raj, Anant, Olbrich, Jakob, Gärtner, Bernd, Schölkopf, Bernhard, and Jaggi, Martin
- Subjects
Mathematics - Optimization and Control ,Computer Science - Learning ,Statistics - Machine Learning - Abstract
We propose a new framework for deriving screening rules for convex optimization problems. Our approach covers a large class of constrained and penalized optimization formulations, and works in two steps. First, given any approximate point, the structure of the objective function and the duality gap is used to gather information on the optimal solution. In the second step, this information is used to produce screening rules, i.e. safely identifying unimportant weight variables of the optimal solution. Our general framework leads to a large variety of useful existing as well as new screening rules for many applications. For example, we provide new screening rules for general simplex and $L_1$-constrained problems, Elastic Net, squared-loss Support Vector Machines, minimum enclosing ball, as well as structured norm regularized problems, such as group lasso.
- Published
- 2016
15. The Niceness of Unique Sink Orientations
- Author
-
Gärtner, Bernd and Thomas, Antonis
- Subjects
Computer Science - Discrete Mathematics - Abstract
Random Edge is the most natural randomized pivot rule for the simplex algorithm. Considerable progress has been made recently towards fully understanding its behavior. Back in 2001, Welzl introduced the concepts of \emph{reachmaps} and \emph{niceness} of Unique Sink Orientations (USO), in an effort to better understand the behavior of Random Edge. In this paper, we initiate the systematic study of these concepts. We settle the questions that were asked by Welzl about the niceness of (acyclic) USO. Niceness implies natural upper bounds for Random Edge and we provide evidence that these are tight or almost tight in many interesting cases. Moreover, we show that Random Edge is polynomial on at least $n^{\Omega(2^n)}$ many (possibly cyclic) USO. As a bonus, we describe a derandomization of Random Edge which achieves the same asymptotic upper bounds with respect to niceness and discuss some algorithmic properties of the reachmap., Comment: An extended abstract appears in the proceedings of Approx/Random 2016
- Published
- 2016
16. ARRIVAL: A zero-player graph game in NP $\cap$ coNP
- Author
-
Dohrau, Jérôme, Gärtner, Bernd, Kohler, Manuel, Matoušek, Jiří, and Welzl, Emo
- Subjects
Computer Science - Computational Complexity ,68Q05, 68Q25, 68Q80 ,F.1.3 ,F.2.2 - Abstract
Suppose that a train is running along a railway network, starting from a designated origin, with the goal of reaching a designated destination. The network, however, is of a special nature: every time the train traverses a switch, the switch will change its position immediately afterwards. Hence, the next time the train traverses the same switch, the other direction will be taken, so that directions alternate with each traversal of the switch. Given a network with origin and destination, what is the complexity of deciding whether the train, starting at the origin, will eventually reach the destination? It is easy to see that this problem can be solved in exponential time, but we are not aware of any polynomial-time method. In this short paper, we prove that the problem is in NP $\cap$ coNP. This raises the question whether we have just failed to find a (simple) polynomial-time solution, or whether the complexity status is more subtle, as for some other well-known (two-player) graph games., Comment: 6 pages, 3 figures; final version is due to be published in the collection of papers "A Journey through Discrete Mathematics. A Tribute to Ji\v{r}\'i Matou\v{s}ek" edited by Martin Loebl, Jaroslav Ne\v{s}et\v{r}il and Robin Thomas, due to be published by Springer
- Published
- 2016
17. Algorithms for Learning Sparse Additive Models with Interactions in High Dimensions
- Author
-
Tyagi, Hemant, Kyrillidis, Anastasios, Gärtner, Bernd, and Krause, Andreas
- Subjects
Computer Science - Learning ,Computer Science - Information Theory ,Mathematics - Numerical Analysis ,Statistics - Machine Learning - Abstract
A function $f: \mathbb{R}^d \rightarrow \mathbb{R}$ is a Sparse Additive Model (SPAM), if it is of the form $f(\mathbf{x}) = \sum_{l \in \mathcal{S}}\phi_{l}(x_l)$ where $\mathcal{S} \subset [d]$, $|\mathcal{S}| \ll d$. Assuming $\phi$'s, $\mathcal{S}$ to be unknown, there exists extensive work for estimating $f$ from its samples. In this work, we consider a generalized version of SPAMs, that also allows for the presence of a sparse number of second order interaction terms. For some $\mathcal{S}_1 \subset [d], \mathcal{S}_2 \subset {[d] \choose 2}$, with $|\mathcal{S}_1| \ll d, |\mathcal{S}_2| \ll d^2$, the function $f$ is now assumed to be of the form: $\sum_{p \in \mathcal{S}_1}\phi_{p} (x_p) + \sum_{(l,l^{\prime}) \in \mathcal{S}_2}\phi_{(l,l^{\prime})} (x_l,x_{l^{\prime}})$. Assuming we have the freedom to query $f$ anywhere in its domain, we derive efficient algorithms that provably recover $\mathcal{S}_1,\mathcal{S}_2$ with finite sample bounds. Our analysis covers the noiseless setting where exact samples of $f$ are obtained, and also extends to the noisy setting where the queries are corrupted with noise. For the noisy setting in particular, we consider two noise models namely: i.i.d Gaussian noise and arbitrary but bounded noise. Our main methods for identification of $\mathcal{S}_2$ essentially rely on estimation of sparse Hessian matrices, for which we provide two novel compressed sensing based schemes. Once $\mathcal{S}_1, \mathcal{S}_2$ are known, we show how the individual components $\phi_p$, $\phi_{(l,l^{\prime})}$ can be estimated via additional queries of $f$, with uniform error bounds. Lastly, we provide simulation results on synthetic data that validate our theoretical findings., Comment: To appear in Information and Inference: A Journal of the IMA. Made following changes after review process: (a) Corrected typos throughout the text. (b) Corrected choice of sampling distribution in Section 5, see eqs. (5.2), (5.3). (c) More detailed comparison with existing work in Section 8. (d) Added Section B in appendix on roots of cubic equation
- Published
- 2016
18. Learning Sparse Additive Models with Interactions in High Dimensions
- Author
-
Tyagi, Hemant, Kyrillidis, Anastasios, Gärtner, Bernd, and Krause, Andreas
- Subjects
Computer Science - Learning ,Computer Science - Information Theory ,Statistics - Machine Learning - Abstract
A function $f: \mathbb{R}^d \rightarrow \mathbb{R}$ is referred to as a Sparse Additive Model (SPAM), if it is of the form $f(\mathbf{x}) = \sum_{l \in \mathcal{S}}\phi_{l}(x_l)$, where $\mathcal{S} \subset [d]$, $|\mathcal{S}| \ll d$. Assuming $\phi_l$'s and $\mathcal{S}$ to be unknown, the problem of estimating $f$ from its samples has been studied extensively. In this work, we consider a generalized SPAM, allowing for second order interaction terms. For some $\mathcal{S}_1 \subset [d], \mathcal{S}_2 \subset {[d] \choose 2}$, the function $f$ is assumed to be of the form: $$f(\mathbf{x}) = \sum_{p \in \mathcal{S}_1}\phi_{p} (x_p) + \sum_{(l,l^{\prime}) \in \mathcal{S}_2}\phi_{(l,l^{\prime})} (x_{l},x_{l^{\prime}}).$$ Assuming $\phi_{p},\phi_{(l,l^{\prime})}$, $\mathcal{S}_1$ and, $\mathcal{S}_2$ to be unknown, we provide a randomized algorithm that queries $f$ and exactly recovers $\mathcal{S}_1,\mathcal{S}_2$. Consequently, this also enables us to estimate the underlying $\phi_p, \phi_{(l,l^{\prime})}$. We derive sample complexity bounds for our scheme and also extend our analysis to include the situation where the queries are corrupted with noise -- either stochastic, or arbitrary but bounded. Lastly, we provide simulation results on synthetic data, that validate our theoretical findings., Comment: 23 pages, to appear in Proceedings of the 19th International Conference on Artificial Intelligence and Statistics (AISTATS) 2016
- Published
- 2016
19. Majority rule cellular automata
- Author
-
Gärtner, Bernd and Zehmakan, Ahad N.
- Published
- 2021
- Full Text
- View/download PDF
20. Random Sampling with Removal
- Author
-
Clarkson, Kenneth L., Gärtner, Bernd, Lengler, Johannes, and Szedlak, May
- Subjects
Computer Science - Computational Geometry - Abstract
We study randomized algorithms for constrained optimization, in abstract frameworks that include, in strictly increasing generality: convex programming; LP-type problems; violator spaces; and a setting we introduce, consistent spaces. Such algorithms typically involve a step of finding the optimal solution for a random sample of the constraints. They exploit the condition that, in finite dimension $\delta$, this sample optimum violates a provably small expected fraction of the non-sampled constraints, with the fraction decreasing in the sample size~$r$. We extend such algorithms by considering the technique of removal, where a fixed number $k$ of constraints are removed from the sample according to a fixed rule, with the goal of improving the solution quality. This may have the effect of increasing the number of violated non-sampled constraints. We study this increase, and bound it in a variety of general settings. This work is motivated by, and extends, results on removal as proposed for chance-constrained optimization. For many relevant values of $r$, $\delta$, and $k$, we prove matching upper and lower bounds for the expected number of constraints violated by a random sample, after the removal of $k$ constraints. For a large range of values of $k$, the new upper bounds improve the previously best bounds for LP-type problems, which moreover had only been known in special cases, and not in the generality we consider. Moreover, we show that our results extend from finite to infinite spaces, for chance-constrained optimization.
- Published
- 2015
21. Efficient edge-skeleton computation for polytopes defined by oracles
- Author
-
Emiris, Ioannis Z., Fisikopoulos, Vissarion, and Gärtner, Bernd
- Subjects
Computer Science - Computational Geometry ,Computer Science - Symbolic Computation ,Mathematics - Optimization and Control ,52-XX, 14Qxx - Abstract
In general dimension, there is no known total polynomial algorithm for either convex hull or vertex enumeration, i.e. an algorithm whose complexity depends polynomially on the input and output sizes. It is thus important to identify problems (and polytope representations) for which total polynomial-time algorithms can be obtained. We offer the first total polynomial-time algorithm for computing the edge-skeleton (including vertex enumeration) of a polytope given by an optimization or separation oracle, where we are also given a superset of its edge directions. We also offer a space-efficient variant of our algorithm by employing reverse search. All complexity bounds refer to the (oracle) Turing machine model. There is a number of polytope classes naturally defined by oracles; for some of them neither vertex nor facet representation is obvious. We consider two main applications, where we obtain (weakly) total polynomial-time algorithms: Signed Minkowski sums of convex polytopes, where polytopes can be subtracted provided the signed sum is a convex polytope, and computation of secondary, resultant, and discriminant polytopes. Further applications include convex combinatorial optimization and convex integer programming, where we offer a new approach, thus removing the complexity's exponential dependence in the dimension., Comment: 22 pages, 2 figures
- Published
- 2014
- Full Text
- View/download PDF
22. Combinatorial Redundancy Detection
- Author
-
Fukuda, Komei, Gärtner, Bernd, and Szedlák, May
- Subjects
Computer Science - Computational Geometry ,Computer Science - Data Structures and Algorithms ,Mathematics - Optimization and Control - Abstract
The problem of detecting and removing redundant constraints is fundamental in optimization. We focus on the case of linear programs (LPs) in dictionary form, given by $n$ equality constraints in $n+d$ variables, where the variables are constrained to be nonnegative. A variable $x_r$ is called redundant, if after removing $x_r \geq 0$ the LP still has the same feasible region. The time needed to solve such an LP is denoted by $LP(n,d)$. It is easy to see that solving $n+d$ LPs of the above size is sufficient to detect all redundancies. The currently fastest practical method is the one by Clarkson: it solves $n+d$ linear programs, but each of them has at most $s$ variables, where $s$ is the number of nonredundant constraints. In the first part we show that knowing all of the finitely many dictionaries of the LP is sufficient for the purpose of redundancy detection. A dictionary is a matrix that can be thought of as an enriched encoding of a vertex in the LP. Moreover - and this is the combinatorial aspect - it is enough to know only the signs of the entries, the actual values do not matter. Concretely we show that for any variable $x_r$ one can find a dictionary, such that its sign pattern is either a redundancy or nonredundancy certificate for $x_r$. In the second part we show that considering only the sign patterns of the dictionary, there is an output sensitive algorithm of running time $\mathcal{O}(d \cdot (n+d) \cdot s^{d-1} \cdot LP(s,d) + d \cdot s^{d} \cdot LP(n,d))$ to detect all redundancies. In the case where all constraints are in general position, the running time is $\mathcal{O}(s \cdot LP(n,d) + (n+d) \cdot LP(s,d))$, which is essentially the running time of the Clarkson method. Our algorithm extends naturally to a more general setting of arrangements of oriented topological hyperplane arrangements.
- Published
- 2014
23. Optimizing Symbol Visibility Through Displacement
- Author
-
Gärtner, Bernd, Kalani, Vishwas, M. Reddy, Meghana, Meulemans, Wouter, Speckmann, Bettina, Stojaković, Miloš, Gärtner, Bernd, Kalani, Vishwas, M. Reddy, Meghana, Meulemans, Wouter, Speckmann, Bettina, and Stojaković, Miloš
- Abstract
In information visualization, the position of symbols often encodes associated data values. When visualizing data elements with both a numerical and a categorical dimension, positioning in the categorical axis admits some flexibility. This flexibility can be exploited to reduce symbol overlap, and thereby increase legibility. In this paper we initialize the algorithmic study of optimizing symbol legibility via a limited displacement of the symbols. Specifically, we consider unit square symbols that need to be placed at specified y-coordinates. We optimize the drawing order of the symbols as well as their x-displacement, constrained within a rectangular container, to maximize the minimum visible perimeter over all squares. If the container has width and height at most 2, there is a point that stabs all squares. In this case, we prove that a staircase layout is arbitrarily close to optimality and can be computed in O(n log n) time. If the width is at most 2, there is a vertical line that stabs all squares, and in this case, we give a 2-approximation algorithm (assuming fixed container height) that runs in O(n log n) time. As a minimum visible perimeter of 2 is always trivially achievable, we measure this approximation with respect to the visible perimeter exceeding 2. We show that, despite its simplicity, the algorithm gives asymptotically optimal results for certain instances.
- Published
- 2024
24. Random Sampling with Removal
- Author
-
Clarkson, Kenneth L., Gärtner, Bernd, Lengler, Johannes, and Szedlák, May
- Published
- 2020
- Full Text
- View/download PDF
25. Threshold Behavior of Democratic Opinion Dynamics
- Author
-
Gärtner, Bernd and Zehmakan, Ahad N.
- Published
- 2020
- Full Text
- View/download PDF
26. Stochastic continuum armed bandit problem of few linear parameters in high dimensions
- Author
-
Tyagi, Hemant, Stich, Sebastian, and Gärtner, Bernd
- Subjects
Statistics - Machine Learning ,Computer Science - Learning ,Mathematics - Optimization and Control - Abstract
We consider a stochastic continuum armed bandit problem where the arms are indexed by the $\ell_2$ ball $B_{d}(1+\nu)$ of radius $1+\nu$ in $\mathbb{R}^d$. The reward functions $r :B_{d}(1+\nu) \rightarrow \mathbb{R}$ are considered to intrinsically depend on $k \ll d$ unknown linear parameters so that $r(\mathbf{x}) = g(\mathbf{A} \mathbf{x})$ where $\mathbf{A}$ is a full rank $k \times d$ matrix. Assuming the mean reward function to be smooth we make use of results from low-rank matrix recovery literature and derive an efficient randomized algorithm which achieves a regret bound of $O(C(k,d) n^{\frac{1+k}{2+k}} (\log n)^{\frac{1}{2+k}})$ with high probability. Here $C(k,d)$ is at most polynomial in $d$ and $k$ and $n$ is the number of rounds or the sampling budget which is assumed to be known beforehand., Comment: Changes from previous version: (a) Corrected typos throughout. (b) In earlier version, regret was defined as a conditional expectation (and hence bounded w.h.p); this is changed to an expectation now resulting in minor changes in statements of Lemma 1, Theorems 1,2 and Corollary 1. See Remark 1. (c) Added Remark 3, and corrected statement of Proposition 3
- Published
- 2013
27. Large Shadows from Sparse Inequalities
- Author
-
Gärtner, Bernd, Helbling, Christian, Ota, Yoshiki, and Takahashi, Takeru
- Subjects
Mathematics - Metric Geometry ,Computer Science - Discrete Mathematics ,Mathematics - Combinatorics ,Mathematics - Optimization and Control ,05A99 - Abstract
The $d$-dimensional Goldfarb cube is a polytope with the property that all its $2^d$ vertices appear on some \emph{shadow} of it (projection onto a 2-dimensional plane). The Goldfarb cube is the solution set of a system of 2d linear inequalities with at most 3 variables per inequality. We show in this paper that the $d$-dimensional Klee-Minty cube --- constructed from inequalities with at most 2 variables per inequality --- also has a shadow with $2^d$ vertices. In contrast, with one variable per inequality, the size of the shadow is bounded by 2d., Comment: 10 pages
- Published
- 2013
28. Continuum armed bandit problem of few variables in high dimensions
- Author
-
Tyagi, Hemant and Gärtner, Bernd
- Subjects
Computer Science - Learning - Abstract
We consider the stochastic and adversarial settings of continuum armed bandits where the arms are indexed by [0,1]^d. The reward functions r:[0,1]^d -> R are assumed to intrinsically depend on at most k coordinate variables implying r(x_1,..,x_d) = g(x_{i_1},..,x_{i_k}) for distinct and unknown i_1,..,i_k from {1,..,d} and some locally Holder continuous g:[0,1]^k -> R with exponent 0 < alpha <= 1. Firstly, assuming (i_1,..,i_k) to be fixed across time, we propose a simple modification of the CAB1 algorithm where we construct the discrete set of sampling points to obtain a bound of O(n^((alpha+k)/(2*alpha+k)) (log n)^((alpha)/(2*alpha+k)) C(k,d)) on the regret, with C(k,d) depending at most polynomially in k and sub-logarithmically in d. The construction is based on creating partitions of {1,..,d} into k disjoint subsets and is probabilistic, hence our result holds with high probability. Secondly we extend our results to also handle the more general case where (i_1,...,i_k) can change over time and derive regret bounds for the same., Comment: (1) Appeared in proceedings of 11th Workshop on Approximation and Online Algorithms (WAOA 2013). (2) Corrected minor typos in previous version (3) 17 pages
- Published
- 2013
29. Variable Metric Random Pursuit
- Author
-
Stich, Sebastian U., Müller, Christian L., and Gärtner, Bernd
- Subjects
Mathematics - Optimization and Control - Abstract
We consider unconstrained randomized optimization of smooth convex objective functions in the gradient-free setting. We analyze Random Pursuit (RP) algorithms with fixed (F-RP) and variable metric (V-RP). The algorithms only use zeroth-order information about the objective function and compute an approximate solution by repeated optimization over randomly chosen one-dimensional subspaces. The distribution of search directions is dictated by the chosen metric. Variable Metric RP uses novel variants of a randomized zeroth-order Hessian approximation scheme recently introduced by Leventhal and Lewis (D. Leventhal and A. S. Lewis., Optimization 60(3), 329--245, 2011). We here present (i) a refined analysis of the expected single step progress of RP algorithms and their global convergence on (strictly) convex functions and (ii) novel convergence bounds for V-RP on strongly convex functions. We also quantify how well the employed metric needs to match the local geometry of the function in order for the RP algorithms to converge with the best possible rate. Our theoretical results are accompanied by numerical experiments, comparing V-RP with the derivative-free schemes CMA-ES, Implicit Filtering, Nelder-Mead, NEWUOA, Pattern-Search and Nesterov's gradient-free algorithms., Comment: 42 pages, 6 figures, 15 tables, submitted to journal, Version 3: majorly revised second part, i.e. Section 5 and Appendix
- Published
- 2012
30. A Polynomial-Time Algorithm for the Tridiagonal and Hessenberg P-Matrix Linear Complementarity Problem
- Author
-
Gärtner, Bernd and Sprecher, Markus
- Subjects
Mathematics - Optimization and Control ,Computer Science - Computational Complexity ,65K05, 90C33 - Abstract
We give a polynomial-time dynamic programming algorithm for solving the linear complementarity problem with tridiagonal or, more generally, Hessenberg P-matrices. We briefly review three known tractable matrix classes and show that none of them contains all tridiagonal P-matrices., Comment: 4 pages, 3 figures
- Published
- 2011
31. Optimization of Convex Functions with Random Pursuit
- Author
-
Stich, Sebastian U., Müller, Christian L., and Gärtner, Bernd
- Subjects
Mathematics - Optimization and Control ,Computer Science - Data Structures and Algorithms ,Computer Science - Numerical Analysis ,Mathematics - Numerical Analysis - Abstract
We consider unconstrained randomized optimization of convex objective functions. We analyze the Random Pursuit algorithm, which iteratively computes an approximate solution to the optimization problem by repeated optimization over a randomly chosen one-dimensional subspace. This randomized method only uses zeroth-order information about the objective function and does not need any problem-specific parametrization. We prove convergence and give convergence rates for smooth objectives assuming that the one-dimensional optimization can be solved exactly or approximately by an oracle. A convenient property of Random Pursuit is its invariance under strictly monotone transformations of the objective function. It thus enjoys identical convergence behavior on a wider function class. To support the theoretical results we present extensive numerical performance results of Random Pursuit, two gradient-free algorithms recently proposed by Nesterov, and a classical adaptive step-size random search scheme. We also present an accelerated heuristic version of the Random Pursuit algorithm which significantly improves standard Random Pursuit on all numerical benchmark problems. A general comparison of the experimental results reveals that (i) standard Random Pursuit is effective on strongly convex functions with moderate condition number, and (ii) the accelerated scheme is comparable to Nesterov's fast gradient method and outperforms adaptive step-size strategies. The appendix contains additional supporting online material., Comment: 35 pages, 5 figures, 8 algorithms, 21 tables, submitted to journal The appendix contains additional supporting online material, not contained in the journal version
- Published
- 2011
32. Counting Unique-Sink Orientations
- Author
-
Foniok, Jan, Gärtner, Bernd, Klaus, Lorenz, and Sprecher, Markus
- Subjects
Mathematics - Combinatorics ,Computer Science - Discrete Mathematics ,90C33, 52B12, 05A16 - Abstract
Unique-sink orientations (USOs) are an abstract class of orientations of the n-cube graph. We consider some classes of USOs that are of interest in connection with the linear complementarity problem. We summarise old and show new lower and upper bounds on the sizes of some such classes. Furthermore, we provide a characterisation of K-matrices in terms of their corresponding USOs., Comment: 13 pages; v2: proof of main theorem expanded, plus various other corrections. Now 16 pages; v3: minor corrections
- Published
- 2010
- Full Text
- View/download PDF
33. Optimal Lower Bounds for Projective List Update Algorithms
- Author
-
Ambuehl, Christoph, Gaertner, Bernd, and von Stengel, Bernhard
- Subjects
Computer Science - Computational Complexity ,Computer Science - Data Structures and Algorithms ,68W27, 68W40, 68P05, 68P10 ,F.1.2 - Abstract
The list update problem is a classical online problem, with an optimal competitive ratio that is still open, known to be somewhere between 1.5 and 1.6. An algorithm with competitive ratio 1.6, the smallest known to date, is COMB, a randomized combination of BIT and the TIMESTAMP algorithm TS. This and almost all other list update algorithms, like MTF, are projective in the sense that they can be defined by looking only at any pair of list items at a time. Projectivity (also known as "list factoring") simplifies both the description of the algorithm and its analysis, and so far seems to be the only way to define a good online algorithm for lists of arbitrary length. In this paper we characterize all projective list update algorithms and show that their competitive ratio is never smaller than 1.6 in the partial cost model. Therefore, COMB is a best possible projective algorithm in this model., Comment: Version 3 same as version 2, but date in LaTeX \today macro replaced by March 8, 2012
- Published
- 2010
- Full Text
- View/download PDF
34. Clarksons Algorithm for Violator Spaces
- Author
-
Brise, Yves and Gärtner, Bernd
- Subjects
Computer Science - Computational Geometry ,G.1.6 - Abstract
Clarksons algorithm is a two-staged randomized algorithm for solving linear programs. This algorithm has been simplified and adapted to fit the framework of LP-type problems. In this framework we can tackle a number of non-linear problems such as computing the smallest enclosing ball of a set of points in R^d . In 2006, it has been shown that the algorithm in its original form works for violator spaces too, which are a proper general- ization of LP-type problems. It was not clear, however, whether previous simplifications of the algorithm carry over to the new setting. In this paper we show the following theoretical results: (a) It is shown, for the first time, that Clarksons second stage can be simplified. (b) The previous simplifications of Clarksons first stage carry over to the violator space setting. (c) Furthermore, we show the equivalence of violator spaces and partitions of the hypercube by hypercubes., Comment: 21 pages
- Published
- 2009
35. A Combinatorial Algorithm to Compute Regularization Paths
- Author
-
Gärtner, Bernd, Giesen, Joachim, Jaggi, Martin, and Welsch, Torsten
- Subjects
Computer Science - Learning ,Computer Science - Artificial Intelligence ,Computer Science - Computer Vision and Pattern Recognition ,F.2.2 ,I.5.1 - Abstract
For a wide variety of regularization methods, algorithms computing the entire solution path have been developed recently. Solution path algorithms do not only compute the solution for one particular value of the regularization parameter but the entire path of solutions, making the selection of an optimal parameter much easier. Most of the currently used algorithms are not robust in the sense that they cannot deal with general or degenerate input. Here we present a new robust, generic method for parametric quadratic programming. Our algorithm directly applies to nearly all machine learning applications, where so far every application required its own different algorithm. We illustrate the usefulness of our method by applying it to a very low rank problem which could not be solved by existing path tracking methods, namely to compute part-worth values in choice based conjoint analysis, a popular technique from market research to estimate consumers preferences on a class of parameterized options., Comment: 7 Pages, 1 Figure
- Published
- 2009
36. An Exponential Lower Bound on the Complexity of Regularization Paths
- Author
-
Gärtner, Bernd, Jaggi, Martin, and Maria, Clément
- Subjects
Computer Science - Learning ,Computer Science - Computational Geometry ,Computer Science - Computer Vision and Pattern Recognition ,Mathematics - Optimization and Control ,Statistics - Machine Learning ,90C20 ,F.2.2 ,I.5.1 - Abstract
For a variety of regularized optimization problems in machine learning, algorithms computing the entire solution path have been developed recently. Most of these methods are quadratic programs that are parameterized by a single parameter, as for example the Support Vector Machine (SVM). Solution path algorithms do not only compute the solution for one particular value of the regularization parameter but the entire path of solutions, making the selection of an optimal parameter much easier. It has been assumed that these piecewise linear solution paths have only linear complexity, i.e. linearly many bends. We prove that for the support vector machine this complexity can be exponential in the number of training points in the worst case. More strongly, we construct a single instance of n input points in d dimensions for an SVM such that at least \Theta(2^{n/2}) = \Theta(2^d) many distinct subsets of support vectors occur as the regularization parameter changes., Comment: Journal version, 28 Pages, 5 Figures
- Published
- 2009
37. Ranking Unit Squares with Few Visibilities
- Author
-
Gärtner, Bernd
- Subjects
Computer Science - Computational Geometry ,Computer Science - Data Structures and Algorithms - Abstract
Given a set of n unit squares in the plane, the goal is to rank them in space in such a way that only few squares see each other vertically. We prove that ranking the squares according to the lexicographic order of their centers results in at most 3n-7 pairwise visibilities for n at least 4. We also show that this bound is best possible, by exhibiting a set of n squares with at least 3n-7 pairwise visibilities under any ranking., Comment: 4 pages, 2 EPS-figures
- Published
- 2008
38. Pivoting in Linear Complementarity: Two Polynomial-Time Cases
- Author
-
Foniok, Jan, Fukuda, Komei, Gärtner, Bernd, and Lüthi, Hans-Jakob
- Subjects
Mathematics - Optimization and Control ,90C33, 68Q25 - Abstract
We study the behavior of simple principal pivoting methods for the P-matrix linear complementarity problem (P-LCP). We solve an open problem of Morris by showing that Murty's least-index pivot rule (under any fixed index order) leads to a quadratic number of iterations on Morris's highly cyclic P-LCP examples. We then show that on K-matrix LCP instances, all pivot rules require only a linear number of iterations. As the main tool, we employ unique-sink orientations of cubes, a useful combinatorial abstraction of the P-LCP., Comment: 20 pages, v2: restructured and shortened, implemented referees' suggestions
- Published
- 2008
- Full Text
- View/download PDF
39. Majority Model on Random Regular Graphs
- Author
-
Gärtner, Bernd, Zehmakan, Ahad N., Hutchison, David, Series Editor, Kanade, Takeo, Series Editor, Kittler, Josef, Series Editor, Kleinberg, Jon M., Series Editor, Mattern, Friedemann, Series Editor, Mitchell, John C., Series Editor, Naor, Moni, Series Editor, Pandu Rangan, C., Series Editor, Steffen, Bernhard, Series Editor, Terzopoulos, Demetri, Series Editor, Tygar, Doug, Series Editor, Weikum, Gerhard, Series Editor, Bender, Michael A., editor, Farach-Colton, Martín, editor, and Mosteiro, Miguel A., editor
- Published
- 2018
- Full Text
- View/download PDF
40. Violator Spaces: Structure and Algorithms
- Author
-
Gärtner, Bernd, Matousek, Jirka, Rüst, Leo, and Skovron, Petr
- Subjects
Computer Science - Discrete Mathematics - Abstract
Sharir and Welzl introduced an abstract framework for optimization problems, called LP-type problems or also generalized linear programming problems, which proved useful in algorithm design. We define a new, and as we believe, simpler and more natural framework: violator spaces, which constitute a proper generalization of LP-type problems. We show that Clarkson's randomized algorithms for low-dimensional linear programming work in the context of violator spaces. For example, in this way we obtain the fastest known algorithm for the P-matrix generalized linear complementarity problem with a constant number of blocks. We also give two new characterizations of LP-type problems: they are equivalent to acyclic violator spaces, as well as to concrete LP-type problems (informally, the constraints in a concrete LP-type problem are subsets of a linearly ordered ground set, and the value of a set of constraints is the minimum of its intersection)., Comment: 28 pages, 5 figures, extended abstract was presented at ESA 2006; author spelling fixed
- Published
- 2006
- Full Text
- View/download PDF
41. Two New Bounds on the Random-Edge Simplex Algorithm
- Author
-
Gärtner, Bernd and Kaibel, Volker
- Subjects
Mathematics - Combinatorics ,Mathematics - Optimization and Control ,90C05 ,68W20 - Abstract
We prove that the Random-Edge simplex algorithm requires an expected number of at most 13n/sqrt(d) pivot steps on any simple d-polytope with n vertices. This is the first nontrivial upper bound for general polytopes. We also describe a refined analysis that potentially yields much better bounds for specific classes of polytopes. As one application, we show that for combinatorial d-cubes, the trivial upper bound of 2^d on the performance of Random-Edge can asymptotically be improved by any desired polynomial factor in d., Comment: 10 pages
- Published
- 2005
- Full Text
- View/download PDF
42. Color War: Cellular Automata with Majority-Rule
- Author
-
Gärtner, Bernd, N. Zehmakan, Ahad, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Drewes, Frank, editor, Martín-Vide, Carlos, editor, and Truthe, Bianca, editor
- Published
- 2017
- Full Text
- View/download PDF
43. ARRIVAL: A Zero-Player Graph Game in NP ∩ coNP
- Author
-
Dohrau, Jérôme, Gärtner, Bernd, Kohler, Manuel, Matoušek, Jiří, Welzl, Emo, Loebl, Martin, editor, Nešetřil, Jaroslav, editor, and Thomas, Robin, editor
- Published
- 2017
- Full Text
- View/download PDF
44. Combinatorial redundancy detection
- Author
-
Fukuda, Komei, Gärtner, Bernd, and Szedlák, May
- Published
- 2018
- Full Text
- View/download PDF
45. Rounding Via Miniatures
- Author
-
Gärtner, Bernd, Matoušek, Jiří, Gärtner, Bernd, and Matousek, Jiri
- Published
- 2012
- Full Text
- View/download PDF
46. Constraint Satisfaction Problems, and Relaxing Them Semidefinitely
- Author
-
Gärtner, Bernd, Matoušek, Jiří, Gärtner, Bernd, and Matousek, Jiri
- Published
- 2012
- Full Text
- View/download PDF
47. Maximizing a Quadratic Form on a Graph
- Author
-
Gärtner, Bernd, Matoušek, Jiří, Gärtner, Bernd, and Matousek, Jiri
- Published
- 2012
- Full Text
- View/download PDF
48. Lower Bounds for the Goemans–Williamson MaxCut Algorithm
- Author
-
Gärtner, Bernd, Matoušek, Jiří, Gärtner, Bernd, and Matousek, Jiri
- Published
- 2012
- Full Text
- View/download PDF
49. Copositive Programming
- Author
-
Gärtner, Bernd, Matoušek, Jiří, Gärtner, Bernd, and Matousek, Jiri
- Published
- 2012
- Full Text
- View/download PDF
50. Duality and Cone Programming
- Author
-
Gärtner, Bernd, Matoušek, Jiří, Gärtner, Bernd, and Matousek, Jiri
- Published
- 2012
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.