In the trajectory segmentation problem we are given a polygonal trajectory with n vertices that we have to subdivide into a minimum number of disjoint segments (subtrajectories) that all satisfy a given criterion. The...
ISBN:
(纸本)9781611972511
In the trajectory segmentation problem we are given a polygonal trajectory with n vertices that we have to subdivide into a minimum number of disjoint segments (subtrajectories) that all satisfy a given criterion. The problem is known to be solvable efficiently for monotone criteria: criteria with the property that if they hold on a certain segment, they also hold on every subsegment of that segment. To the best of our knowledge, no theoretical results are known for non-monotone criteria.
The triplet and quartet distances are distance measures to compare two rooted and two unrooted trees, respectively. The leaves of the two trees should have the same set of n labels. The distances are defined by enumer...
ISBN:
(纸本)9781611972511
The triplet and quartet distances are distance measures to compare two rooted and two unrooted trees, respectively. The leaves of the two trees should have the same set of n labels. The distances are defined by enumerating all subsets of three labels (triplets) and four labels (quartets), respectively, and counting how often the induced topologies in the two input trees are different. In this paper we present efficient algorithms for computing these distances. We show how to compute the triplet distance in time O(n log n) and the quartet distance in time O(dn log n), where d is the maximal degree of any node in the two trees. Within the same time bounds, our framework also allows us to compute the parameterized triplet and quartet distances, where a parameter is introduced to weight resolved (binary) topologies against unresolved (non-binary) topologies. The previous best algorithm for computing the triplet and parameterized triplet distances have O(n~2) running time, while the previous best algorithms for computing the quartet distance include an O(d~9n log n) time algorithm and an O(n~(2.688)) time algorithm, where the latter can also compute the parameterized quartet distance. Since d ≤ n, our algorithms improve on all these algorithms.
We study a fundamental measure for wireless interference in the SINR model known as (weighted) inductive independence. This measure characterizes the electiveness of using oblivious power - when the power used by a tr...
详细信息
ISBN:
(纸本)9781611972511
We study a fundamental measure for wireless interference in the SINR model known as (weighted) inductive independence. This measure characterizes the electiveness of using oblivious power - when the power used by a transmitter only depends on the distance to the receiver - as a mechanism for improving wireless capacity. We prove optimal bounds for inductive independence, implying a number of algorithmic applications. An algorithm is provided that achieves - due to existing lower bounds - capacity that is asymptotically best possible using oblivious power assignments. Improved approximation algorithms are provided for a number of problems for oblivious power and for power control, including distributed scheduling, connectivity, secondary spectrum auctions, and dynamic packet scheduling.
Engineering user interfaces has long implied careful design carried out using formal methods applied by human experts and automated systems. While these methods have advantages, especially for creating interfaces that...
详细信息
ISBN:
(纸本)9781450321389
Engineering user interfaces has long implied careful design carried out using formal methods applied by human experts and automated systems. While these methods have advantages, especially for creating interfaces that have the flexibility to adapt to users and situations, they can also be time consuming, expensive, and there are relatively few experts able to apply them effectively. In particular, many engineering methods require the construction of one or more models, each of which can only be created through many hours of work by an expert. In this keynote, I will explore how social and human computation methods can be applied to reduce the barriers to achieving user interface flexibility and ultimately to using engineering methods. In a first example, I will illustrate how groups of users can work together to modify and improve user interfaces through end-user programming examples from the CoScripter and Highlight projects. I will then discuss some initial work on using a crowd of novice workers to create models of existing user interfaces. I hope this keynote will inspire the engineering community to consider alternate approaches that creatively combine formal methods with the power of crowds.
A central problem in data mining and social network analysis is determining overlapping communities (clusters) among individuals or objects in the absence of external identification or tagging. We address this problem...
详细信息
ISBN:
(纸本)9781611972511
A central problem in data mining and social network analysis is determining overlapping communities (clusters) among individuals or objects in the absence of external identification or tagging. We address this problem by introducing a framework that captures the notion of communities or clusters determined by the relative affinities among their members. To this end we define what we call an affinity system, which is a set of elements, each with a vector characterizing its preference for all other elements in the set. We define a natural notion of (potentially overlapping) communities in an affinity system, in which the members of a given community collectively prefer each other to anyone else outside the community. Thus these communities are endogenously formed in the affinity system and are "self-determined" or "self-certified" by its members.
This paper presents a novel algorithm for the numerical computation of fractional-order derivatives, based on a suitable generalization of a sliding-mode based robust and exact first-order differentiator (see Levant (...
详细信息
Recent work has shown that the classical framework of solving optimization problems by obtaining a fractional solution to a linear program (LP) and rounding it to an integer solution can be extended to the online sett...
详细信息
ISBN:
(纸本)9781611972511
Recent work has shown that the classical framework of solving optimization problems by obtaining a fractional solution to a linear program (LP) and rounding it to an integer solution can be extended to the online setting using primal-dual techniques. The success of this new framework for online optimization can be gauged from the fact that it has led to progress in several longstanding open questions. However, to the best of our knowledge, this framework has previously been applied to LPs containing only packing or only covering constraints, or minor variants of these. We extend this framework in a fundamental way by demonstrating that it can be used to solve mixed packing and covering LPs online, where packing constraints are given of-fine and covering constraints are received online. The objective is to minimize the maximum multiplicative factor by which any packing constraint is violated, while satisfying the covering constraints. Our results represent the first algorithm that obtains a polylogarithmic competitive ratio for solving mixed LPs online. We then consider two canonical examples of mixed LPs: unrelated machine scheduling with startup costs, and capacity constrained facility location. We use ideas generated from our result for mixed packing and covering to obtain polylogarithmic-competitive algorithms for these problems. We also give lower bounds to show that the competitive ratios of our algorithms are nearly tight.
Here, we give an algorithm for deciding if the nonnegative rank of a matrix M of dimension m × n is at most r which runs in time (nm)~(O(r~2)). This is the first exact algorithm that runs in time singly-exponenti...
详细信息
ISBN:
(纸本)9781611972511
Here, we give an algorithm for deciding if the nonnegative rank of a matrix M of dimension m × n is at most r which runs in time (nm)~(O(r~2)). This is the first exact algorithm that runs in time singly-exponential in r. This algorithm (and earlier algorithms) are built on methods for finding a solution to a system of polynomial inequalities (if one exists). Notably, the best algorithms for this task run in time exponential in the number of variables but polynomial in all of the other parameters (the number of inequalities and the maximum degree). Hence these algorithms motivate natural algebraic questions whose solution have immediate algorithmic implications: How many variables do we need to represent the decision problem, does M have nonnegative rank at most r? A naive formulation uses nr + mr variables and yields an algorithm that is exponential in n and m even for constant r. (Arora, Ge, Kannan, Moitra, STOC 2012) recently reduced the number of variables to 2r~2 2~r, and here we exponentially reduce the number of variables to 2r~2 and this yields our main algorithm. In fact, the algorithm that we obtain is nearly-optimal (under the Exponential Time Hypothesis) since an algorithm that runs in time (nm)~(o(r)) would yield a subexponential algorithm for 3-SAT. Our main result is based on establishing a normal form for nonnegative matrix factorization - which in turn allows us to exploit algebraic dependence among a large collection of linear transformations with variable entries. Additionally, we also demonstrate that nonnegative rank cannot be certified by even a very large submatrix of M, and this property also follows from the intuition gained from viewing nonnegative rank through the lens of systems of polynomial inequalities.
This paper presents a novel algorithm for the numerical computation of fractional-order derivatives, based on a suitable generalization of a sliding-mode based robust and exact first-order differentiator (see Levant (...
详细信息
This paper presents a novel algorithm for the numerical computation of fractional-order derivatives, based on a suitable generalization of a sliding-mode based robust and exact first-order differentiator (see Levant (1998)). The method inherits the robustness properties against the measurement noise of the original scheme. The algorithm is first devised in the continuous time setting, leading to a block scheme where conventional and fractional order integrators are suitably combined in a closed loop configuration containing certain “stabilizing” static non-linearities as well. All integrators are discretized by an algorithm of the Adams-Bashforth-Moulton type (cfr. Diethelm et al, (2004)) yielding an overall discrete time form of the proposed fractional differentiator. The algorithm is then applied to derive a discretized implementation formula for the PI λ D μ controller. Simulation and experimental tests are carried out to verify the performance of the proposed algorithm and to compare it with other existing approaches.
暂无评论