A Faster Algorithm for Computing the Principal Sequence of Partitions

Slides:



Advertisements
Similar presentations
Primal-dual Algorithm for Convex Markov Random Fields Vladimir Kolmogorov University College London GDR (Optimisation Discrète, Graph Cuts et Analyse d'Images)
Advertisements

Algorithms for MAP estimation in Markov Random Fields Vladimir Kolmogorov University College London Tutorial at GDR (Optimisation Discrète, Graph Cuts.
Minimum Clique Partition Problem with Constrained Weight for Interval Graphs Jianping Li Department of Mathematics Yunnan University Jointed by M.X. Chen.
Comp 122, Spring 2004 Greedy Algorithms. greedy - 2 Lin / Devi Comp 122, Fall 2003 Overview  Like dynamic programming, used to solve optimization problems.
1 EE5900 Advanced Embedded System For Smart Infrastructure Static Scheduling.
1 Maximum flow sender receiver Capacity constraint Lecture 6: Jan 25.
ICCV 2007 tutorial Part III Message-passing algorithms for energy minimization Vladimir Kolmogorov University College London.
Online Social Networks and Media. Graph partitioning The general problem – Input: a graph G=(V,E) edge (u,v) denotes similarity between u and v weighted.
Optimization of Pearl’s Method of Conditioning and Greedy-Like Approximation Algorithm for the Vertex Feedback Set Problem Authors: Ann Becker and Dan.
Lectures on Network Flows
1 Network Coding: Theory and Practice Apirath Limmanee Jacobs University.
Distributed Message Passing for Large Scale Graphical Models Alexander Schwing Tamir Hazan Marc Pollefeys Raquel Urtasun CVPR2011.
MIN-COST ABORESCENCES YQ Lu. Aborescence Definition: Given a directed graph G=(V,E) and a root r, an aborescence rooted at r is a subgraph T that each.
Covering Trains by Stations or The power of Data Reduction Karsten Weihe, ALEX98, 1998 Presented by Yantao Song.
2010/5/171 Overview of graph cuts. 2010/5/172 Outline Introduction S-t Graph cuts Extension to multi-label problems Compare simulated annealing and alpha-
Graph Triangulation by Dmitry Pidan Based on the paper “A sufficiently fast algorithm for finding close to optimal junction tree” by Ann Becker and Dan.
Network Coding Project presentation Communication Theory 16:332:545 Amith Vikram Atin Kumar Jasvinder Singh Vinoo Ganesan.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Greedy Algorithms Reading Material: Chapter 8 (Except Section 8.5)
Maximum Flows Lecture 4: Jan 19. Network transmission Given a directed graph G A source node s A sink node t Goal: To send as much information from s.
Recovering Articulated Object Models from 3D Range Data Dragomir Anguelov Daphne Koller Hoi-Cheung Pang Praveen Srinivasan Sebastian Thrun Computer Science.
Greedy Algorithms Like dynamic programming algorithms, greedy algorithms are usually designed to solve optimization problems Unlike dynamic programming.
Randomness in Computation and Communication Part 1: Randomized algorithms Lap Chi Lau CSE CUHK.
Graph-Cut Algorithm with Application to Computer Vision Presented by Yongsub Lim Applied Algorithm Laboratory.
Extensions of submodularity and their application in computer vision
Primal-Dual Meets Local Search: Approximating MST’s with Non-uniform Degree Bounds Author: Jochen Könemann R. Ravi From CMU CS 3150 Presentation by Dan.
2-edge connected subgraphs with bounded rings B. Fortz Institut de Gestion et d’Administration, Louvain la Neuve, Belgique A. R. Mahjoub LIMOS, CNRS, Université.
Finding dense components in weighted graphs Paul Horn
Approximating Minimum Bounded Degree Spanning Tree (MBDST) Mohit Singh and Lap Chi Lau “Approximating Minimum Bounded DegreeApproximating Minimum Bounded.
CS774. Markov Random Field : Theory and Application Lecture 13 Kyomin Jung KAIST Oct
Minimizing general submodular functions
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
1 Optimal Cycle Vida Movahedi Elder Lab, January 2008.
Algorithms for MAP estimation in Markov Random Fields Vladimir Kolmogorov University College London.
Lecture 19 Greedy Algorithms Minimum Spanning Tree Problem.
Probabilistic Inference Lecture 5 M. Pawan Kumar Slides available online
Zhuo Peng, Chaokun Wang, Lu Han, Jingchao Hao and Yiyuan Ba Proceedings of the Third International Conference on Emerging Databases, Incheon, Korea (August.
Learning Spectral Clustering, With Application to Speech Separation F. R. Bach and M. I. Jordan, JMLR 2006.
CS223 Advanced Data Structures and Algorithms 1 Maximum Flow Neil Tang 3/30/2010.
Graphs and MSTs Sections 1.4 and 9.1. Partial-Order Relations Everybody is not related to everybody. Examples? Direct road connections between locations.
1 CS612 Algorithms for Electronic Design Automation CS 612 – Lecture 8 Lecture 8 Network Flow Based Modeling Mustafa Ozdal Computer Engineering Department,
Variations of the Prize- Collecting Steiner Tree Problem Olena Chapovska and Abraham P. Punnen Networks 2006 Reporter: Cheng-Chung Li 2006/08/28.
Vasilis Syrgkanis Cornell University
Chapter 7 May 3 Ford-Fulkerson algorithm Step-by-step walk through of an example Worst-case number of augmentations Edmunds-Karp modification Time complexity.
1 EE5900 Advanced Embedded System For Smart Infrastructure Static Scheduling.
1 Approximation algorithms Algorithms and Networks 2015/2016 Hans L. Bodlaender Johan M. M. van Rooij TexPoint fonts used in EMF. Read the TexPoint manual.
TU/e Algorithms (2IL15) – Lecture 12 1 Linear Programming.
Computational Intelligence Winter Term 2015/16 Prof. Dr. Günter Rudolph Lehrstuhl für Algorithm Engineering (LS 11) Fakultät für Informatik TU Dortmund.
Unconstrained Submodular Maximization Moran Feldman The Open University of Israel Based On Maximizing Non-monotone Submodular Functions. Uriel Feige, Vahab.
TU/e Algorithms (2IL15) – Lecture 8 1 MAXIMUM FLOW (part II)
Submodularity Reading Group Matroids, Submodular Functions M. Pawan Kumar
Introduction of BP & TRW-S
Maximum Flow c v 3/3 4/6 1/1 4/7 t s 3/3 w 1/9 3/5 1/1 3/5 u z 2/2
Computing and Compressive Sensing in Wireless Sensor Networks
The minimum cost flow problem
June 2017 High Density Clusters.
Lectures on Network Flows
Efficient Graph Cut Optimization for Full CRFs with Quantized Edges
Maximum Flow c v 3/3 4/6 1/1 4/7 t s 3/3 w 1/9 3/5 1/1 3/5 u z 2/2
CSE 373: Data Structures and Algorithms
Coverage Approximation Algorithms
Applications of parametric max-flow problem in computer vision
Algorithms for Budget-Constrained Survivable Topology Design
EE5900 Advanced Embedded System For Smart Infrastructure
Max Flow / Min Cut.
Maximum Flow c v 3/3 4/6 1/1 4/7 t s 3/3 w 1/9 3/5 1/1 3/5 u z 2/2
Network Flow.
Maximum Flow Neil Tang 4/8/2008
Network Flow.
Survey on Coverage Problems in Wireless Sensor Networks - 2
Presentation transcript:

A Faster Algorithm for Computing the Principal Sequence of Partitions of a Graph Vladimir Kolmogorov University College London

Graph partitioning Undirected weighted graph, weights ce  0 Cost l  0 Partition P Minimise objective function: [Cunningham’85]: “network attack” problem Attacker’s goal: disconnect the network ce : cost to break edge e l : benefit for each additional connected component

Principal sequence of partitions Increase l from 0 to +: Nested partitions Principal sequence of partitions [Narayanan’91] Network strength:

Principal sequence of partitions Applications: Network reliability Physics: computing partition function of Potts model in the infinite state limit [d’Auriac et al.’02] Image partitioning??

Graph partitioning: Algorithms Fixed l (network attack) [Narayanan’91,Baranona’92,d’Auriac et al.’02] l1 (network strength) [Cheng&Cunnigham’94 (memory!)] , [Gabow’98] All l‘s (principal sequence) [Narayanan’91] n T n T* O(n2) T n T* THIS WORK n : # of nodes m : # of edges T : maxflow algorithm T* : parametric maxflow

Parametric maxflow Minimise for all l’s: Nested sequence of solutions Terms Vuv(xu, xv) – submodular Unary terms Au(l): non-decreasing functions of l Nested sequence of solutions [Gallo,Grigoriadis,Tarjan’89]: same worst-case complexity as for a single maxflow - O(nm log(n2/m))

Graph partitioning: Algorithms Fixed l (network attack) [Narayanan’91,Baranona’92,d’Auriac et al.’02] l1 (network strength) [Cheng&Cunnigham’94 (memory!)] , [Gabow’98] All l‘s (principal sequence) [Narayanan’91] Outline: Part I: review of [Barahona’92] (fixed l) Part II: generalising [Barahona’92] (fixed l) Part III: parametric algorithm (all l’s) n T n T* O(n2) T n T* THIS WORK

Part I: Review of [Barahona’92] algorithm Solving network attack for fixed l

Relation to set minimisation Cost of partition P: Cost of subset A V :

Polymatroid P( f l) [Edmonds’70] Set of linear lower bounds: Non-empty subset A is tight for yP( f l) if

all subsets AP are tight Optimality condition yP( f l) and all subsets AP are tight  P minimises E l()

Greedy algorithm [Edmonds’70]: compute maximal vector yP( f l) Init: pick yP( f l) For each node vV: Increase yv as much as possible v

Greedy algorithm [Edmonds’70]: compute maximal vector yP( f l) Init: pick yP( f l) For each node vV: Increase yv as much as possible v A

Updating P Init: pick yP( f l), For each node vV: Increase yv as much as possible

Summary Introduced: Greedy algorithm: compute maximal vector yP( f l) Submodular function f l Polymatroid P( f l) Tight subsets A for yP( f l) Greedy algorithm: compute maximal vector yP( f l) Invariants: yP( f l) Subsets A  P are tight In the end P complete  global minimum n min cuts

Part II: Generalising greedy algorithm

Non-greedy algorithm Init: pick yP( f l) For each node vV: [optional] Correctness: see paper yP( f l) Subsets A  P are tight A

Part III: New parametric algorithm Solving network attack for all l‘s

Overview Maintain families {yl}l and {Pl}l for all l  0 Need to solve parametric problem for all l’s [optional]

Naïve idea: use greedy algorithm Does not quite work... Functions yvl – piecewise-linear with many breakpoints Non-monotonic!

[Cheng&Cunningham’94] Decreasing sequence l1 > l2 > ... > lk Solve for li (n min cuts), use final y as initialisation for li+1 k maxflow problems for each node u are parametric To exploit it, need to store n graphs of size O(n+m)! Can compute network strength, but not principal sequence

Use non-greedy algorithm! Functions - monotonic piecewise-linear with one breakpoint [optional]

Modifying v v v v u u u u

Modifying v v v v u u u u

Special case: node v v v v v

Correctness Need to show: for each l – non-greedy algorithm Claim 1: updating y l preserves optimality of Al Claim 2:

Claim 1 Family {Al}l is an optimal solution of for modified family {yl}l v v v v

f l(.)-y l(.) : submodular Claim 1 f l(.)-y l(.) : submodular y lu : stay monotonic  nestedness v v v v u u u u

Conclusions & Discussion Computing principal sequence: improved complexity Practical speed: remains to be seen O(n2) T n T* Graph/image partitioning? Potential problem: regions of different sizes Different l‘s for different parts of the graph? Preprocessing: initial weight => edge threshold same or larger

Graph partitioning & submodularity X: subset of edges k(X)=# connected components in (V, X) Supermodular Function is submodular Can be minimised in polynomial time Minimum corresponds to “valid” partition P

Updating partitions:

Claim 2 for modified family {yl}l v v v v