cover times, blanket times, and majorizing measures Jian Ding U. C. Berkeley James R. Lee University of Washington Yuval Peres Microsoft Research TexPoint.

Slides:



Advertisements
Similar presentations
The Cover Time of Random Walks Uriel Feige Weizmann Institute.
Advertisements

05/11/2005 Carnegie Mellon School of Computer Science Aladdin Lamps 05 Combinatorial and algebraic tools for multigrid Yiannis Koutis Computer Science.
Matroid Bases and Matrix Concentration
TexPoint fonts used in EMF.
C&O 355 Lecture 23 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A A A A A A A.
Trees and Markov convexity James R. Lee Institute for Advanced Study [ with Assaf Naor and Yuval Peres ] RdRd x y.
Online Social Networks and Media. Graph partitioning The general problem – Input: a graph G=(V,E) edge (u,v) denotes similarity between u and v weighted.
Turnstile Streaming Algorithms Might as Well Be Linear Sketches Yi Li Huy L. Nguyen David Woodruff.
1 Maximum matching in graphs with an excluded minor Raphael Yuster University of Haifa Uri Zwick Tel Aviv University TexPoint fonts used in EMF. Read the.
10/11/2001Random walks and spectral segmentation1 CSE 291 Fall 2001 Marina Meila and Jianbo Shi: Learning Segmentation by Random Walks/A Random Walks View.
Random Walks Ben Hescott CS591a1 November 18, 2002.
Entropy Rates of a Stochastic Process
Parallel random walks Brian Moffat. Outline What are random walks What are Markov chains What are cover/hitting/mixing times Speed ups for different graphs.
CS774. Markov Random Field : Theory and Application Lecture 04 Kyomin Jung KAIST Sep
Analysis of Network Diffusion and Distributed Network Algorithms Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization.
CS774. Markov Random Field : Theory and Application Lecture 06 Kyomin Jung KAIST Sep
Graph Sparsifiers by Edge-Connectivity and Random Spanning Trees Nick Harvey U. Waterloo Department of Combinatorics and Optimization Joint work with Isaac.
(Omer Reingold, 2005) Speaker: Roii Werner TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A AA A A A A AA A.
Graph Sparsifiers by Edge-Connectivity and Random Spanning Trees Nick Harvey University of Waterloo Department of Combinatorics and Optimization Joint.
Graph Sparsifiers by Edge-Connectivity and Random Spanning Trees Nick Harvey U. Waterloo C&O Joint work with Isaac Fung TexPoint fonts used in EMF. Read.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Approximation Algorithm: Iterative Rounding Lecture 15: March 9.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Data Flow and Random Placement.
Randomness in Computation and Communication Part 1: Randomized algorithms Lap Chi Lau CSE CUHK.
1 Biased card shuffling and the asymmetric exclusion process Elchanan Mossel, Microsoft Research Joint work with Itai Benjamini, Microsoft Research Noam.
Finding a maximum independent set in a sparse random graph Uriel Feige and Eran Ofek.
Packing Element-Disjoint Steiner Trees Mohammad R. Salavatipour Department of Computing Science University of Alberta Joint with Joseph Cheriyan Department.
Approximation Algorithms: Bristol Summer School 2008 Seffi Naor Computer Science Dept. Technion Haifa, Israel TexPoint fonts used in EMF. Read the TexPoint.
Eigenvectors of random graphs: nodal domains James R. Lee University of Washington Yael Dekel and Nati Linial Hebrew University TexPoint fonts used in.
Distance scales, embeddings, and efficient relaxations of the cut cone James R. Lee University of California, Berkeley.
Graph Sparsifiers Nick Harvey University of British Columbia Based on joint work with Isaac Fung, and independent work of Ramesh Hariharan & Debmalya Panigrahi.
CS774. Markov Random Field : Theory and Application Lecture 08 Kyomin Jung KAIST Sep
Approximating Minimum Bounded Degree Spanning Tree (MBDST) Mohit Singh and Lap Chi Lau “Approximating Minimum Bounded DegreeApproximating Minimum Bounded.
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
The Complexity of Optimization Problems. Summary -Complexity of algorithms and problems -Complexity classes: P and NP -Reducibility -Karp reducibility.
Edge-disjoint induced subgraphs with given minimum degree Raphael Yuster 2012.
Random Walks Great Theoretical Ideas In Computer Science Steven Rudich, Anupam GuptaCS Spring 2005 Lecture 24April 7, 2005Carnegie Mellon University.
Graph Sparsifiers Nick Harvey Joint work with Isaac Fung TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A.
A PTAS for Computing the Supremum of Gaussian Processes Raghu Meka (IAS/DIMACS)
TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A A A A A A A Image:
PODC Distributed Computation of the Mode Fabian Kuhn Thomas Locher ETH Zurich, Switzerland Stefan Schmid TU Munich, Germany TexPoint fonts used in.
Spectrally Thin Trees Nick Harvey University of British Columbia Joint work with Neil Olver (MIT  Vrije Universiteit) TexPoint fonts used in EMF. Read.
Markov Chains and Random Walks. Def: A stochastic process X={X(t),t ∈ T} is a collection of random variables. If T is a countable set, say T={0,1,2, …
Cover times, blanket times, and the GFF Jian Ding Berkeley-Stanford-Chicago James R. Lee University of Washington Yuval Peres Microsoft Research.
Embeddings, flow, and cuts: an introduction University of Washington James R. Lee.
CPSC 536N Sparse Approximations Winter 2013 Lecture 1 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAAAAAAAA.
Discrete Structures CISC 2315 FALL 2010 Graphs & Trees.
Random Geometric Graph Model Model for ad hoc/sensor networks n nodes placed in d-dim space Connectivity threshold r Two nodes u,v connected iff ||u-v||
Date: 2005/4/25 Advisor: Sy-Yen Kuo Speaker: Szu-Chi Wang.
Multi-way spectral partitioning and higher-order Cheeger inequalities University of Washington James R. Lee Stanford University Luca Trevisan Shayan Oveis.
Generating Random Spanning Trees via Fast Matrix Multiplication Keyulu Xu University of British Columbia Joint work with Nick Harvey TexPoint fonts used.
TU/e Algorithms (2IL15) – Lecture 12 1 Linear Programming.
Shuffling by semi-random transpositions Elchanan Mossel, U.C. Berkeley Joint work with Yuval Peres and Alistair Sinclair.
Markov Chains and Random Walks
New Characterizations in Turnstile Streams with Applications
Computability and Complexity
Minimum Spanning Tree 8/7/2018 4:26 AM
Peer-to-Peer and Social Networks
R. Srikant University of Illinois at Urbana-Champaign
Reconstruction on trees and Phylogeny 1
Complexity of Expander-Based Reasoning and the Power of Monotone Proofs Sam Buss (UCSD), Valentine Kabanets (SFU), Antonina Kolokolova.
Complexity 6-1 The Class P Complexity Andrei Bulatov.
Coping With NP-Completeness
On the effect of randomness on planted 3-coloring models
Problem Solving 4.
NP-Completeness Yin Tat Lee
Algorithms (2IL15) – Lecture 7
Daniel Dadush Centrum Wiskunde & Informatica (CWI) Aussois 2019
Major Design Strategies
Coping With NP-Completeness
Presentation transcript:

cover times, blanket times, and majorizing measures Jian Ding U. C. Berkeley James R. Lee University of Washington Yuval Peres Microsoft Research TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A A A

random walks on graphs By putting conductances { c uv } on the edges of the graph, we can get any reversible Markov chain.

hitting and covering Hitting time: H(u,v) = expected # of steps to hit v starting at u Commute time: κ (u,v) = H(u,v) + H(v,u) (metric) Cover time: t cov ( G ) = expected time to hit all vertices of G, starting from the worst vertex

hitting and covering Hitting time: H(u,v) = expected # of steps to hit v starting at u Commute time: κ (u,v) = H(u,v) + H(v,u) (metric) Cover time: t cov ( G ) = expected time to hit all vertices of G, starting from the worst vertex path complete graph expander 2-dimensional grid 3-dimensional grid complete d-ary tree n 2 n log n n (log n) 2 n log n n (log n) 2 /log d orders of magnitude of some cover times [coupon collecting] [Broder-Karlin 88] [Aldous 89, Zuckerman 90] [Zuckerman 90]

hitting and covering Hitting time: H(u,v) = expected # of steps to hit v starting at u Commute time: κ (u,v) = H(u,v) + H(v,u) (metric) Cover time: t cov ( G ) = expected time to hit all vertices of G, starting from the worst vertex regular trees random graphs discrete torus, lattices [Aldous 91] [Cooper-Frieze 08] [Dembo-Peres-Rosen-Zeitouni 04] asymptotically optimal bounds

hitting and covering Hitting time: H(u,v) = expected # of steps to hit v starting at u Commute time: κ (u,v) = H(u,v) + H(v,u) (metric) Cover time: t cov ( G ) = expected time to hit all vertices of G, starting from the worst vertex (1-o(1)) n ln n · t cov ( G ) · min (4n 3 /27, 2mn) general bounds (n = vertices, m = edges) [Feige’95, Alelinuas-Karp-Lipton-Lovasz-Rackoff’79] [Feige’95, Matthews’88] (conjecture: the complete graph is extremal)

electrical resistance Hitting time: H(u,v) = expected # of steps to hit v starting at u Commute time: κ (u,v) = H(u,v) + H(v,u) (metric) Cover time: t cov ( G ) = expected time to hit all vertices of G, starting from the worst vertex + u v R eff (u,v) = inverse of electrical current flowing from u to v [Chandra-Raghavan-Ruzzo-Smolensky-Tiwari’89]: If G has m edges, then for every pair u,v κ (u,v) = 2m R eff (u,v) (endows κ with special geometric properties)

computation Hitting time: easy to compute in deterministic poly time by solving system of linear equations H(u,u) = 0 H(u,v) = 1 + E w » u H(w,v) Cover time: easy to compute in deterministic exponential time Approximations (deterministic, poly-time): [Matthews’88, CRRST’89] Augmented Matthews bound yields an O(log log n) 2 approximation [Kahn-Kim-Lovasz-Vu’99] For trees, there is an 1 + ² approximation for every ² > 0 [Feige-Zeitouni’09] max u,v κ (u,v) yields an O(log n) approximation Open question: Does there exist an O( 1 )-approximation for general graphs? [Aldous-Fill’94]

blanket times Blanket times [Winkler-Zuckerman’96] : ¯ -Blanket time is the expected first time T at which all the local times, are within a factor of ¯.

blanket times, comparisons Conjecture [Winkler-Zuckerman’96]: For every graph G and 0 < ¯ < 1, t blanket (G, ¯ ) ³ t cov (G). Proved for many special cases. True up to (log log n) 2 by [KKLV’99] Comparison of cover times: If G and G’ are two graphs on the same set of nodes and κ G (u,v) · κ G ’ (u,v) for all u,v 2 V, does it follow that ? ³³

main theorem Talagrand introduced a functional on any metric space (X, d). T HEOREM: For any graph G, where ³ denotes equivalence up to a universal constant. Some consequences: - There is a deterministic O( 1 )-approximation to for any metric space, hence the same holds for t cov ( G ). - Postively resolves the Winkler-Zuckerman blanket time conjectures. - Bi-lipschitz stability. For instance, t cov ( G ) ³ t cov ( G’ ) where G’ is a spectral sparsifier of G.

main theorem Talagrand introduced a functional on any metric space (X, d). T HEOREM: For any graph G, for any 0 < ¯ < 1, where A. B denotes A · O(B). Some consequences: - There is a deterministic O( 1 )-approximation to for any metric space, hence the same holds for t cov ( G ). - Postively resolves the Winkler-Zuckerman blanket time conjectures. - Bi-lipschitz stability. For instance, t cov ( G ) ³ t cov ( G’ ) where G’ is a spectral sparsifier of G.

a fast randomized algorithm T HEOREM: If g is an n-dimensional Gaussian, then D = diagonal degree matrix A = adjacency matrix of G T HEOREM: For m-edge graphs, there is an O(m polylog(m))-time randomized algorithm to compute an O( 1 )-approximation to the cover time. Uses [Spielman-Teng] and [Spielman-Srivistava]

main theorem T HEOREM: For any graph G and δ 2 (0,1), where ³ denotes equivalence up to a universal constant.

Gaussian processes Consider a Gaussian process { X u : u 2 S } with E ( X u )=0 8 u 2 S (i.e. every linear combination ® 1 X 1 +  + ® k X k is normal) Such a process comes with a natural metric transforming (S,d) into a metric space. Equivalently, for S finite, consider S µ R n, and the process X u = h g, u i for u 2 S where g =( g 1, …, g n ) is an i.i.d. N( 0,1 ) vector. P ROBLEM: What is E max { X u : u 2 S } ?

Gaussian processes P ROBLEM: What is E max { X u : u 2 S } ? ® If random variables are “independent,” expect the union bound to be tight. Gaussian concentration: Expect max for k points is about

Gaussian processes Gaussian concentration: Sudakov minoration:

Gaussian processes

covering trees Recursively partition into pieces of diameter j=0, 1, 2, … Value of this path is where d j is the sequence of degrees down the path

covering trees

packing trees Main technical theorem:

majorizing measure theorem Majorizing measures theorem (Talagrand):

main theorem [Ding, L, Peres] T HEOREM: For any graph G and δ 2 (0,1), where ³ denotes equivalence up to a universal constant.

hints of a connection Gaussian concentration: Sudakov minoration:

hints of a connection Sudakov minoration: Matthew’s bound (1988):

hints of a connection Gaussian concentration: KKLV concentration: Here, N t (w ) denotes the number of visits to w when the random walk started at u has returned to u for the (t deg(u)) th time.

hints of a connection - Trees + KKLV concentration suffice for upper bound - [Barlow-Ding-Nachmias-Peres] prove the “Dudley version”

an isomorphism theorem

a problem on Gaussian processes Gaussian process:

a problem on Gaussian processes Gaussian process: We need strong estimates on the size of this window as ε  0. (want to get a point there with probability at least 0.1 ) Problem: Majorizing measures handles first moments, but we need second moment bounds.

percolation on trees and the DGFF First and second moments agree for percolation on balanced trees Problem: General Gaussian processes behaves nothing like percolation! Resolution: Processes coming from the Isomorphism Theorem all arise from a “discrete Gaussian free field.”

percolation on trees and the DGFF First and second moments agree for percolation on balanced trees For DGFFs, using electrical network theory, we show that it is possible to select a subtree of the MM tree and a delicate filtration of the probability space so that the Gaussian process can be coupled to a percolation process.

open questions Holds for - complete graph - complete d-ary tree - discrete torus Q UESTION: Is there a deterministic, polynomial-time ( 1 + ² )-approximation to the cover time for every ² > 0 ? Q UESTION: Is the standard deviation of the time-to-cover bounded by the maximum hitting time?

open questions Holds for - complete graph - complete d-ary tree - discrete torus Q UESTION: Is there a deterministic, polynomial-time ( 1 + ² )-approximation to the cover time for every ² > 0 ? Q UESTION: Is the standard deviation of the time-to-cover bounded by the maximum hitting time?