Algorithmic Construction of Sets for k-Restrictions

Slides:



Advertisements
Similar presentations
Lower Bounds for Additive Spanners, Emulators, and More David P. Woodruff MIT and Tsinghua University To appear in FOCS, 2006.
Advertisements

Iterative Rounding and Iterative Relaxation
Inapproximability of Hypergraph Vertex-Cover. A k-uniform hypergraph H= : V – a set of vertices E - a collection of k-element subsets of V Example: k=3.
Inapproximability of MAX-CUT Khot,Kindler,Mossel and O ’ Donnell Moshe Ben Nehemia June 05.
The Communication Complexity of Approximate Set Packing and Covering
COMP 553: Algorithmic Game Theory Fall 2014 Yang Cai Lecture 21.
Lecture 24 Coping with NPC and Unsolvable problems. When a problem is unsolvable, that's generally very bad news: it means there is no general algorithm.
1 NP-completeness Lecture 2: Jan P The class of problems that can be solved in polynomial time. e.g. gcd, shortest path, prime, etc. There are many.
Combinatorial Algorithms
Complexity ©D Moshkovitz 1 Approximation Algorithms Is Close Enough Good Enough?
Parallel Scheduling of Complex DAGs under Uncertainty Grzegorz Malewicz.
Interchanging distance and capacity in probabilistic mappings Uriel Feige Weizmann Institute.
Algorithmic Construction of Sets for k-Restrictions Dana Moshkovitz Joint work with Noga Alon and Muli Safra Tel-Aviv University.
Noga Alon Institute for Advanced Study and Tel Aviv University
The number of edge-disjoint transitive triples in a tournament.
Approximation Algorithms for Non-Uniform Buy-at-Bulk Network Design Problems Mohammad R. Salavatipour Department of Computing Science University of Alberta.
Complexity 16-1 Complexity Andrei Bulatov Non-Approximability.
1 Discrete Structures & Algorithms Graphs and Trees: II EECE 320.
1 Introduction to Computability Theory Lecture12: Reductions Prof. Amos Israeli.
Limitations of VCG-Based Mechanisms Shahar Dobzinski Joint work with Noam Nisan.
Testing of Clustering Noga Alon, Seannie Dar Michal Parnas, Dana Ron.
Sublinear Algorithms for Approximating Graph Parameters Dana Ron Tel-Aviv University.
May 7 th, 2006 On the distribution of edges in random regular graphs Sonny Ben-Shimon and Michael Krivelevich.
(work appeared in SODA 10’) Yuk Hei Chan (Tom)
Multipath Routing Algorithms for Congestion Minimization Ron Banner and Ariel Orda Department of Electrical Engineering Technion- Israel Institute of Technology.
A General Approach to Online Network Optimization Problems Seffi Naor Computer Science Dept. Technion Haifa, Israel Joint work: Noga Alon, Yossi Azar,
Dana Moshkovitz, MIT Joint work with Subhash Khot, NYU.
TECH Computer Science NP-Complete Problems Problems  Abstract Problems  Decision Problem, Optimal value, Optimal solution  Encodings  //Data Structure.
Week 10Complexity of Algorithms1 Hard Computational Problems Some computational problems are hard Despite a numerous attempts we do not know any efficient.
Private Approximation of Search Problems Amos Beimel Paz Carmi Kobbi Nissim Enav Weinreb (Technion)
1/19 Minimizing weighted completion time with precedence constraints Nikhil Bansal (IBM) Subhash Khot (NYU)
Topics in Algorithms 2007 Ramesh Hariharan. Tree Embeddings.
Unique Games Approximation Amit Weinstein Complexity Seminar, Fall 2006 Based on: “Near Optimal Algorithms for Unique Games" by M. Charikar, K. Makarychev,
Dense graphs with a large triangle cover have a large triangle packing Raphael Yuster SIAM DM’10.
NP Completeness Piyush Kumar. Today Reductions Proving Lower Bounds revisited Decision and Optimization Problems SAT and 3-SAT P Vs NP Dealing with NP-Complete.
Why almost all satisfiable k - CNF formulas are easy? Danny Vilenchik Joint work with A. Coja-Oghlan and M. Krivelevich.
Hardness of Hyper-Graph Coloring Irit Dinur NEC Joint work with Oded Regev and Cliff Smyth.
Approximation Algorithms by bounding the OPT Instructor Neelima Gupta
Approximation Algorithms Greedy Strategies. I hear, I forget. I learn, I remember. I do, I understand! 2 Max and Min  min f is equivalent to max –f.
1 Introduction to Quantum Information Processing QIC 710 / CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lectures
An algorithmic proof of the Lovasz Local Lemma via resampling oracles Jan Vondrak IBM Almaden TexPoint fonts used in EMF. Read the TexPoint manual before.
Hongyu Liang Institute for Theoretical Computer Science Tsinghua University, Beijing, China The Algorithmic Complexity.
Approximation algorithms
Theory of Computational Complexity Probability and Computing Chapter Hikaru Inada Iwama and Ito lab M1.
P & NP.
8.3.2 Constant Distance Approximations
Mathematical Foundations of AI
Information Complexity Lower Bounds
Polynomial integrality gaps for
Finding Cycles and Trees in Sublinear Time
CS4234 Optimiz(s)ation Algorithms
Sum of Squares, Planted Clique, and Pseudo-Calibration
Computability and Complexity
Analysis and design of algorithm
Discrete Mathematics for Computer Science
ICS 353: Design and Analysis of Algorithms
Exponential Time Paradigms Through the Polynomial Time Lens
On the effect of randomness on planted 3-coloring models
Approximation Algorithms
András Sebő and Anke van Zuylen
Chapter 11 Limitations of Algorithm Power
Chapter 34: NP-Completeness
ICS 353: Design and Analysis of Algorithms
Complexity Theory in Practice
CS 6310 Advanced Design and Analysis of Algorithms Rajani Pingili
Independence and Counting
Independence and Counting
Submodular Maximization with Cardinality Constraints
Locality In Distributed Graph Algorithms
Integer and fractional packing of graph families
Presentation transcript:

Algorithmic Construction of Sets for k-Restrictions Dana Moshkovitz Joint work with Noga Alon and Muli Safra Tel-Aviv University

Talk Plan Problem definition: k-restrictions Applications: … group testing generealized hashing Set-Cover Hardness Background Techniques and Results

Techniques Greedine$$ k-wise approximating distributions Concatenation multi-way splitters via the topological Necklace Splitting Theorem

Problem Definition

On Forgetful Hot-Tempered Pirates and Helpless Goldsmiths One day the hot-tempered pirate asks the goldsmith to prepare him a nice string in m.

But the capricious pirate has various contradicting local demands he may pose when he comes to collect it… this pattern! should differ!

What will the goldsmith do?

make many strings, so every demand is met!

Formal Definition [~NSS95] Input: alphabet , length m. demands f1,…,fs:k{0,1}, Solution: Am s.t for every 1i1<…<ikm, 1js, there is aA s.t. fj(a(i1),…,a(ik))=1. Measure: how small |A| is  k

Applications

Goldsmith-Pirate Games Capture Many Known Problems universal sets hashing and its generalizations group testing set-cover gadget separating codes superimposed codes color coding …

Application I Universal Set every k configuration is tried. circuit 1 . 1 . 1 . . . . . . m

Application II Hashing Goal: small set of functions [m][q] For every kq in [m], some function maps them to k different elements small set of functions u1 u2 u3 u4 . um k r1 r2 . rq

Generalized Hashing Theorem Definition (t,u)-hash families [ACKL]: for all TU, |T|=t, |U|=u, some function f satisfies f(i)≠f(j) for every iT, jU-{i}. Theorem: For any fixed 2≤t<u, for any >0, one can construct efficiently a (t,u)-hash family over alphabet of size t+1, whose rate (i.e logqm/n) ≥ (1-)t!(u-t)u-t/uu+1ln(t+1)

Application III Group Testing [DH,ND…] . m people at most k-1 are ill can test a group: contains illness? Goal: identify the ill people by few tests. . . . ? ? ? ? ? ?

Group-Tests Theorem Theorem: For every >0, there exists d(), s.t for any number of ill people d>d(), there exists an algorithm that outputs a set of at most (1+)ed2lnm group-tests in time polynomial in the population’s size (m).

Application IV Orientations [AYZ94] Input: directed graph G Question: simple k-path? if G were DAG…

Application IV Orientations [AYZ94] Need several orientations, s.t wherever the path is, one reflects it. Pick an orientation Delete ‘bad’ edges Now G is a DAG… 3 5 1 4 2 1 2 3 4 5

Application V Set-Cover Gadget sets Gadget: a succinct set-cover instance so that: a small, illegal sub-collection is not a cover.  elements legal cover: set and its complement small: its total weight ≤ … sets and complements differ in weight    

Approximability of Set-Cover approximation ratio (upto low-order terms) known app. algorithms [Lov75,Sla95,Sri99] ln n if NPDTIME(nloglogn) [Feige96] if NPP [RS97]

Random and Pseudo-Random Solutions Background Random and Pseudo-Random Solutions

 = minI,j PraD[ fj(a(I))=1 ] Density m D:m[0,1] - probability distribution. density w.r.t D is:  = minI,j PraD[ fj(a(I))=1 ]    m    . k

Probabilistic Strategy Claim: t=-1(klnm+lns+1) random strings from D form a solution, with probability≥½. Let Cj be some constraint. Prr[rCj]  1- Choose a random set of strings A.  Prr[A∩Cj =]  (1-)|A|  Prr[A∩Cj =]  e-|A| The probability some constraint has A∩Cj=, is sC(m,k)e-|A|.

Deterministic Construction!

First Observation m support(D) is a solution if density positive w.r.t D.  every demand is satisfied w.p ≥ |support(uniform)|=qm k

Second Observation A k-wise, O()-close to D is a solution. m k  every demand is satisfied w.p  (1-..) A k-wise, O()-close to D is a solution. Theorem [EGLNV98]: Product dist. are efficiently (poly(qk,m,-1)) approximatable

So What’s the Problem? It’s much more costly than a random solution! Random solution: ~ klogm/ for all distributions! k-wise -close to uniform: O(2kk2 log2m /2) [AGHP90] for other distributions, the state of affairs is usually much worse… e.g for the uniform distribution 2k-2k2log2m

Background Sum-Up Random strings are good solutions for k-restriction problems if one picks the ‘right’ distribution… k-wise approximating distributions are deterministic solutions of larger size… Our goal: simulate deterministically the probabilistic bound

Our Results

Outline k=O(1) Greedy on approximation k=O(logm/loglogm) Concatenation assumes invariance under permutations + k=O(logm/loglogm) Concatenation works for some problems + multi-way splitters larger k’s

same as random solution! Greedine$$ same as random solution! m Claim: Can find a solution of size --1(klnm+lns) in time poly(C(m,k), s, |support|) Proof: Formulate as Set-Cover: elements: <position,constraint> sets: <support vector> Apply greedy strategy. k

Concatenation m m’ m’ N N hash family inefficient solution

Concatenation Works For Permutations Invariant Demands

Theorem Theorem: Fix some eff. approx. dist. D. Given a k-rest. prob. with density  w.r.t D, obtain a solution of size arbitrarily close to (2klnk+lns)/ × k4logm in time poly(m,s,kk,qk,-1).

Dividing Into BLOCKS m

Splitters, [NSS95] What are they? How to construct? several block divisions any k are splat by one k-restriction problem! How to construct? needs only (b-1) cuts use concatenation

Multi-Way Splitters m For any I1⊎…⊎It[m], |⊎Ij|k, some partition to b blocks is a split. k-restriction problem! b k

Necklace Splitting [A87] b thieves t types How many splits?

Necklace Splitting [A87]

Necklace Splitting Theorem Theorem (Alon, 1987): Every necklace with bai beads of color i, 1it, has a b-splitting of size at most (b-1)t. tight! Corollary: A multi-way splitter of size b(b-1)t+1 C(m, (b-1)t) is efficiently constructible. Noga’s result: Continuous splitting: Given a t-coloring of [0,1], divide it into b pairwise disjoint Lebesgue measurable subfamilies, s.t each captures 1/b measure. Reduction from discrete splitting to continuous splitting: Given a necklace color [0,1] accordingly. Problem: single bids can be splat too. Solution: show we can get rid of ‘bad cuts’. Draw a multi-graph: vertex for each thief, edge for each color i s.t bid of this color is splat between the two thieves. Note: All degrees are even! [Each color is splat evenly between the thieves] Hence, there is an Euler cycle in that multi-graph. Now – slide the cuts along this cycle. Prove the continuous version: (1) Show it holds for every prime (the case b=2 was already proven). (2) Note this implies the general case: say we prove for (t,k) and (t,l). For (t,kl): First split to k parts. Gather all of them, re-scale and split to l parts. Topological Proof for (1): via a generalization of the Borsuk-Ulam theorem [Any continuous function from an n-sphere into Euclidean n-space maps some pair of antipodal points to the same point.] C(k2, ·|Hashm,k2,k| concatenation

The b=t=2 Case

Sum-Up Beat k-wise approximations for k-restriction problems. Multi-way splitters via Necklace Splitting.  Substantial improvements for: Group Testing Generalized Hashing Set-Cover

Further Research Applications: complexity, algorithms, combinatorics, cryptography… Better constructions? different techniques?