Applications of Geometric Programming in Information Security Chris Ware University of Victoria.

Slides:



Advertisements
Similar presentations
Maximum Flow and Minimum Cut Problems In this handout: Duality theory Upper bounds for maximum flow value Minimum Cut Problem Relationship between Maximum.
Advertisements

C&O 355 Lecture 8 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A.
1 LP Duality Lecture 13: Feb Min-Max Theorems In bipartite graph, Maximum matching = Minimum Vertex Cover In every graph, Maximum Flow = Minimum.
Geometry and Theory of LP Standard (Inequality) Primal Problem: Dual Problem:
IEOR 4004 Midterm review (Part II) March 12, 2014.
EMGT 501 HW #1 Solutions Chapter 2 - SELF TEST 18
1 Linear Programming Jose Rolim University of Geneva.
Support Vector Machines (and Kernel Methods in general)
CSCI 3160 Design and Analysis of Algorithms Tutorial 6 Fei Chen.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2006 Lecture 9 Wednesday, 11/15/06 Linear Programming.
Linear Programming and Approximation
1 Introduction to Linear and Integer Programming Lecture 9: Feb 14.
Introduction to Linear and Integer Programming Lecture 7: Feb 1.
Duality Lecture 10: Feb 9. Min-Max theorems In bipartite graph, Maximum matching = Minimum Vertex Cover In every graph, Maximum Flow = Minimum Cut Both.
Maximum Flow and Minimum Cut Problems In this handout: Good choices for augmenting paths Duality theory Upper bounds for maximum flow value Minimum Cut.
Dual Problem of Linear Program subject to Primal LP Dual LP subject to ※ All duality theorems hold and work perfectly!
EMGT 501 HW # (b) (c) 6.1-4, Due Day: Sep. 21.
Constrained Optimization Rong Jin. Outline  Equality constraints  Inequality constraints  Linear Programming  Quadratic Programming.
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley Asynchronous Distributed Algorithm Proof.
7(2) THE DUAL THEOREMS Primal ProblemDual Problem b is not assumed to be non-negative.
Exponential Functions Intro. to Logarithms Properties.
Constrained Optimization Rong Jin. Outline  Equality constraints  Inequality constraints  Linear Programming  Quadratic Programming.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2008 Lecture 9 Tuesday, 11/18/08 Linear Programming.
Approximation Algorithms: Bristol Summer School 2008 Seffi Naor Computer Science Dept. Technion Haifa, Israel TexPoint fonts used in EMF. Read the TexPoint.
Machine Learning Week 4 Lecture 1. Hand In Data Is coming online later today. I keep test set with approx test images That will be your real test.
CS774. Markov Random Field : Theory and Application Lecture 08 Kyomin Jung KAIST Sep
Introduction to Geometric Programming. Basic Idea The Geometric Mean (1) (2) (3)
The Theory of the Simplex Method
6.6 – Solving Exponential Equations Using Common Logarithms. Objective: TSW solve exponential equations and use the change of base formula.
Duality Theory 對偶理論.
 If m & n are positive AND m = n, then  Can solve exponential equation by taking logarithm of each side of equation  Only works with base 10.
Introduction to Operations Research
Approximation Algorithms Department of Mathematics and Computer Science Drexel University.
Extremal Problems of Information Combining Alexei Ashikhmin  Information Combining: formulation of the problem  Mutual Information Function for the Single.
8.3-4 – Logarithmic Functions. Logarithm Functions.
Machine Learning Weak 4 Lecture 2. Hand in Data It is online Only around 6000 images!!! Deadline is one week. Next Thursday lecture will be only one hour.
Coding Theory Efficient and Reliable Transfer of Information
Logs Midterm Review Pre-Calculus. Topic 1: Be able to change logarithmic and exponential forms.
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley.
Steiner tree LP x e = 1 if edge e is included in the Steiner tree. Min.  e c e x e (primal) s.t.  e   (S) x e ≥ 1  S  V: S  T≠ , T\S≠  x e 
Solving Exponential Equations. We can solve exponential equations using logarithms. By converting to a logarithm, we can move the variable from the exponent.
Chapter 4 Sensitivity Analysis, Duality and Interior Point Methods.
1 Quadratic formula. y 2 Quadratic formula: Geometric interpretation Solve x 0.
+ Quadratic Programming and Duality Sivaraman Balakrishnan.
Applications of Common Logarithms Objective: Define and use common logs to solve exponential and logarithmic equations; use the change of base formula.
Common Logarithms - Definition Example – Solve Exponential Equations using Logs.
Chance Constrained Robust Energy Efficiency in Cognitive Radio Networks with Channel Uncertainty Yongjun Xu and Xiaohui Zhao College of Communication Engineering,
Property of Logarithms If x > 0, y > 0, a > 0, and a ≠ 1, then x = y if and only if log a x = log a y.
Facility Location with Service Installation Costs Chaitanya Swamy Joint work with David Shmoys and Retsef Levi Cornell University.
Approximation Algorithms Duality My T. UF.
OR Chapter 4. How fast is the simplex method  Efficiency of an algorithm : measured by running time (number of unit operations) with respect to.
Linear Programming Piyush Kumar Welcome to CIS5930.
Approximation Algorithms based on linear programming.
1 Support Vector Machines: Maximum Margin Classifiers Machine Learning and Pattern Recognition: September 23, 2010 Piotr Mirowski Based on slides by Sumit.
10.14 Applications of Logarithms. Ex 1) Solve log x = Round to 4 decimal places Remember: Common log = base 10 log 6 = log 10 6 x =
Interpreting Exponential Functions
6.4 Logarithmic & Exponential Equations
Logs – Solve USING EXPONENTIATION
8.6 Solving Exponential & Logarithmic Equations
Packet #15 Exponential and Logarithmic Equations
Chap 9. General LP problems: Duality and Infeasibility
Nuclear Norm Heuristic for Rank Minimization
Stochastic Network Interdiction
ENGM 631 Optimization.
Point-Line Duality Let
Warmup Solve 256
Exponential Functions Intro. to Logarithms Properties of Logarithms
Lecture 20 Linear Program Duality
Warm Up  .
Constraints.
Presentation transcript:

Applications of Geometric Programming in Information Security Chris Ware University of Victoria

06/23/09 16:22Information Security2 Outline Kelly Betting Channel Capacity Reformulated Kelly Purpose What's Next

06/23/09 16:22Information Security3 Optimization Problems General Optimization Problem We define a monomial as Then a Geometric Program is an optimization problem where all f are posynomials and all h are monomials

06/23/09 16:22Information Security4 J.L. Kelly, Jr “A New Interpretation of Information Rate” (1956) Growth rate is V n /V 0 =2 nG Maximum exponential rate of growth of gambler's capital G → Mutual Information: I(S;R) Maximum expected logarithm of gambler's capital after k rounds V k (w) = k I(S;R) + log w Kelly Betting Public KnowledgeTransmitted Results (S) Intercepted Results ( R) noise

06/23/09 16:22Information Security5 Channel Capacity From Information Theory: – The maximum mutual information over all input probabilities is the Channel Capacity. Formed as an optimization problem

06/23/09 16:22Information Security6 Channel Capacity: Dual If we take the Lagrange Dual of the CCP we get the following Geometric Program (in convex form)

06/23/09 16:22Information Security7 Reformulated Kelly Remember our Kelly formula Then reformulate as an optimization problem And finally the Kelly Dual as a GP (in convex form)

06/23/09 16:22Information Security8 Benefits of CCP as a GP Weak Duality: any feasible solution produces an upper bound on channel capacity Strong Duality: the optimal solution is the channel capacity Both primal and dual problems can be simultaneously and efficiently solved through the primal-dual interior point method

06/23/09 16:22Information Security9 What's Next Variations on source data distributions – Input costs – Encoding / Noise To create a more general version of Kelly