Yuzhong Qu Nanjing University

Slides:



Advertisements
Similar presentations
Optimal Lower Bounds for 2-Query Locally Decodable Linear Codes Kenji Obata.
Advertisements

PHYLOGENETIC TREES Bulent Moller CSE March 2004.
Approximation Algorithms Chapter 14: Rounding Applied to Set Cover.
Comp 122, Spring 2004 Greedy Algorithms. greedy - 2 Lin / Devi Comp 122, Fall 2003 Overview  Like dynamic programming, used to solve optimization problems.
Lecture 9 Greedy Approach
The Greedy Approach Chapter 8. The Greedy Approach It’s a design technique for solving optimization problems Based on finding optimal local solutions.
Chapter 4 The Greedy Approach. Minimum Spanning Tree A tree is an acyclic, connected, undirected graph. A spanning tree for a given graph G=, where E.
Approximation Algorithms Chapter 5: k-center. Overview n Main issue: Parametric pruning –Technique for approximation algorithms n 2-approx. algorithm.
A Fairy Tale of Greedy Algorithms Yuli Ye Joint work with Allan Borodin, University of Toronto.
Train DEPOT PROBLEM USING PERMUTATION GRAPHS
Complexity 16-1 Complexity Andrei Bulatov Non-Approximability.
CSC5160 Topics in Algorithms Tutorial 2 Introduction to NP-Complete Problems Feb Jerry Le
Lecture 7: Greedy Algorithms II Shang-Hua Teng. Greedy algorithms A greedy algorithm always makes the choice that looks best at the moment –My everyday.
Optimization problems INSTANCE FEASIBLE SOLUTIONS COST.
C241 PLTL SESSION – 3/3/2015 Relations & Graph Theory.
Lecture 7: Greedy Algorithms II
Math – Getting Information from the Graph of a Function 1.
Radial Basis Function Networks
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Sets.
Dr. Naveed Ahmad Assistant Professor Department of Computer Science University of Peshawar.
Image segmentation Prof. Noah Snavely CS1114
Memory Allocation of Multi programming using Permutation Graph By Bhavani Duggineni.
Lecture 19 Greedy Algorithms Minimum Spanning Tree Problem.
Chapter 4: Pattern Recognition. Classification is a process that assigns a label to an object according to some representation of the object’s properties.
CS774. Markov Random Field : Theory and Application Lecture 02
1/24 Introduction to Graphs. 2/24 Graph Definition Graph : consists of vertices and edges. Each edge must start and end at a vertex. Graph G = (V, E)
LECTURE 2-3. Course: “Design of Systems: Structural Approach” Dept. “Communication Networks &Systems”, Faculty of Radioengineering & Cybernetics Moscow.
Interchange and Weighted-Interchange Rearrangement Distances in Strings Joint work of: Amihood Amir, Tzvika Hartman, Oren Kapah and Avivit Levy.
Introduction to NP Instructor: Neelima Gupta 1.
割当問題とマッチング Assignment Problem B=(b ij ) : n×n matrix C ⊆ {b ij |1 ≦ i ≦ n, 1 ≦ j ≦ n} C is diagonal ⇔ (1) ∀ b ij, b kh ∈ C, ⇒ i≠k and j≠h (2) |C | =
Ch3 /Lecture #4 Brute Force and Exhaustive Search 1.
Exhaustive search Exhaustive search is simply a brute- force approach to combinatorial problems. It suggests generating each and every element of the problem.
Lecture 7: Relations Dr Andrew Purkiss-Trew Cancer Research UK Mathematics for Computing.
The Set-covering Problem Problem statement –given a finite set X and a family F of subsets where every element of X is contained in one of the subsets.
Approximation Algorithms
NP-Completeness (2) NP-Completeness Graphs 4/13/2018 5:22 AM x x x x x
Greedy Algorithms General principle of greedy algorithm
Hans Bodlaender, Marek Cygan and Stefan Kratsch
Saisai Gong, Wei Hu, Yuzhong Qu
NP-Completeness (2) NP-Completeness Graphs 7/23/ :02 PM x x x x
NP-Completeness (2) NP-Completeness Graphs 7/23/ :02 PM x x x x
NP-Completeness Proofs
Hard Problems Introduction to NP
Seminar on Dynamic Programming.
The Greedy Method and Text Compression
P and NP CISC4080, Computer Algorithms CIS, Fordham Univ.
Clustered representations: Clusters, covers, and partitions
NP-Completeness (2) NP-Completeness Graphs 11/23/2018 2:12 PM x x x x
Richard Anderson Lecture 28 NP-Completeness
Lecture 19-Problem Solving 4 Incremental Method
Advanced Algorithms Analysis and Design
Approximation Algorithms
Advanced Algorithms Analysis and Design
Consensus Partition Liang Zheng 5.21.
Fair Clustering through Fairlets ( NIPS 2017)
Problem Solving 4.
P and NP CISC5835, Algorithms for Big Data CIS, Fordham Univ.
Dynamic programming vs Greedy algo – con’t
Greedy Algorithms Comp 122, Spring 2004.
The Theory of NP-Completeness
Lecture 5 Dynamic Programming
Greedy algorithms.
Warm Up.
Tree Searching Strategies
Integrating Class Hierarchies
Instructor: Aaron Roth
NP-Completeness (2) NP-Completeness Graphs 7/9/2019 6:12 AM x x x x x
Lecture 28 Approximation of Set Cover
Seminar on Dynamic Programming.
Lecture 24 Vertex Cover and Hamiltonian Cycle
Presentation transcript:

Yuzhong Qu Nanjing University Consensus partition Yuzhong Qu Nanjing University

Problem W is a set of properties At some moments, a user might It has a public alignment, e.g. an equivalence relation R on W. An equivalence relation can also be represented by a partition At some moments, a user might See a list of a subset of W Align elements of W (move/remove an item to/from a partition) The problem How to preserve personal alignment for each user? How to improve (optimize) the public alignment according to users’ alignments?

Global alignment (Representation) Global alignment: an equivalence relation on W A function from W to {0}N (c: W{0}N)

User’s alignment (Representation) A (partial) function from Wi to {0, i}N (ci: Wi {0, i}N) Personalized alignment ci  c|W-Wi : W{0, i}N

Optimizing the global alignment Input: a family of users’ partitions {ci} Output: an optimal partition c* on Wi min id(c*, ci) Bn=j=1..n S(n,j)

Partition distance Vertex cover problem

Consensus Partition Clique partitioning problem  having a maximum total weight

Reference Gusfield D. Partition-distance: A problem and class of perfect graphs arising in clustering[J]. Information Processing Letters, 2002, 82(3): 159-164. Guénoche A. Consensus of partitions: a constructive approach[J]. Advances in Data Analysis and Classification, 2011, 5(3): 215-229

Websoft Research Group Acknowledgement Websoft Research Group http://ws.nju.edu.cn