Finding bounds on time separation of events is a fundamental problem in the verification and analysis of asynchronous and concurrent systems. Unfortunately, even for systems without repeated events or choice, computin...
详细信息
Finding bounds on time separation of events is a fundamental problem in the verification and analysis of asynchronous and concurrent systems. Unfortunately, even for systems without repeated events or choice, computing exact bounds on time separation of events is an intractable problem when both min and max type timing constraints are present. In this paper, we describe a method for approximating min and max type constraints, and develop a polynomial-time algorithm for computing approximate time separation bounds in choice-free systems without repeated events. Next, we develop a pseudo-polynomial time technique for analysing a class of asynchronous systems in which events repeat over time. Unlike earlier works, our algorithms can analyse systems with both min and max type timing constraints efficiently. Although the computed bounds are conservative in the worst-case, experimental results indicate that they are fairly accurate in practice. We present formal proofs of correctness of our algorithms, and demonstrate their efficiency and accuracy by applying them to a suite of benchmarks. A complete asynchronous chip has been modelled and analysed using the proposed technique, revealing potential timing problems (already known to designers) in the datapath design.
In this paper, we provide efficient algorithms for approximate C-m(R-n, R-D)-selection. In particular, given a set E, a constant M-0 > 0, and convex sets K(x) subset of R-D for x is an element of E, we show that an...
详细信息
In this paper, we provide efficient algorithms for approximate C-m(R-n, R-D)-selection. In particular, given a set E, a constant M-0 > 0, and convex sets K(x) subset of R-D for x is an element of E, we show that an algorithm running in C(tau)N log N steps is able to solve the smooth selection problem of selecting a point y is an element of (1 + tau)lozenge K(x) for x is an element of E for an appropriate dilation of K(x), (1 + tau)lozenge K(x), and guaranteeing that a function interpolating the points (x, y) will be C-m(R-n, R-D) with norm bounded by CM.
Counting the number of triangles in a large graph has many important applications in network analysis. Several frequently computed metrics such as the clustering coefficient and the transitivity ratio need to count th...
详细信息
ISBN:
(纸本)9781509052066
Counting the number of triangles in a large graph has many important applications in network analysis. Several frequently computed metrics such as the clustering coefficient and the transitivity ratio need to count the number of triangles. In this paper, we present a randomized framework for expressing and analyzing approximate triangle counting algorithms. We show that many existing approximate triangle counting algorithms can be described in terms of probability distributions given as parameters to the proposed framework. Then, we show that our proposed framework provides a quantitative measure for the quality of different approximate algorithms. Finally, we perform experiments on real-world networks from different domains and show that there is no unique sampling technique outperforming the others for all networks and the quality of sampling techniques depends on different factors such as the structure of the network, the vertex degree-triangle correlation and the number of samples.
Given a directed graph G, a source node s, and a target node t, the personalized PageRank (PPR) oft with respect to s is the probability that a random walk starting from s terminates at t. The average of the personali...
详细信息
ISBN:
(纸本)9781450317436
Given a directed graph G, a source node s, and a target node t, the personalized PageRank (PPR) oft with respect to s is the probability that a random walk starting from s terminates at t. The average of the personalized PageRank score of t with respect to each source node v is an element of V is exactly the PageRank score pi(t) of node t, which denotes the overall importance of node t in the graph. A heavy hitter of node t is a node whose contribution to pi(t) is above a phi fraction, where phi is a value between 0 and 1. Finding heavy hitters has important applications in link spam detection, classification of web pages, and friend recommendations. In this paper, we propose BLOG, an efficient framework for three types of heavy hitter queries: the pairwise approximate heavy hitter (AHH), the reverse AHH, and the multi-source reverse AHH queries. For pairwise AHH queries, our algorithm combines the Monte-Carlo approach and the backward propagation approach to reduce the cost of both methods, and incorporates new techniques to deal with high in-degree nodes. For reverse AHH and multi-source reverse AHH queries, our algorithm extends the ideas behind the pairwise AHH algorithm with a new "logarithmic bucketing" technique to improve the query efficiency. Extensive experiments demonstrate that our BLOG is far more efficient than alternative solutions on the three queries.
Streaming graph analysis is gaining importance in various fields due to the natural dynamicity in many real graph applications. However, approximately counting triangles in real-world streaming graphs with duplicate e...
详细信息
Streaming graph analysis is gaining importance in various fields due to the natural dynamicity in many real graph applications. However, approximately counting triangles in real-world streaming graphs with duplicate edges and sliding window model remains an unsolved problem. In this paper, we propose SWTC algorithm to address approximate sliding-window triangle counting problem in streaming graphs. In SWTC, we propose a fixed-length slicing strategy that addresses both sample maintaining and cardinality estimation issues with a bounded memory usage. We theoretically prove the superiority of our method in sample graph size and estimation accuracy under given memory upper bound. To further improve the performance of our algorithm, we propose two optimization techniques, vision counting to avoid computation peaks, and asynchronous grouping to stabilize the accuracy. Extensive experiments also confirm that our approach has higher accuracy compared with the baseline method under the same memory usage.
We give a (1 + epsilon)-approximate distance oracle with O(1) query time for an undirected planar graph G with n vertices and non-negative edge lengths. For epsilon > 0 and any two vertices u and v in G, our oracle...
详细信息
We give a (1 + epsilon)-approximate distance oracle with O(1) query time for an undirected planar graph G with n vertices and non-negative edge lengths. For epsilon > 0 and any two vertices u and v in G, our oracle gives a distance (d) over bar (u, v) with stretch (1 + epsilon) in O(1) time. The oracle has size O(n log n((log n)/epsilon + f (epsilon))) and pre-processing time O(n log n((log(3) n)/epsilon(2) + f(epsilon))), where f (epsilon) = 2(O(1/epsilon)). This is the first (1 + epsilon)-approximate distance oracle with O(1) query time independent of epsilon and the size and pre-processing time nearly linear in n, and improves the query time O(1/epsilon) of previous (1 + epsilon)-approximate distance oracle with size nearly linear in n. (C) 2018 Elsevier B.V. All rights reserved.
Centrality indices are essential in network analysis and betweenness centrality, which is based on shortest paths, is one of the most important measures. It has been widely used in different areas like social network ...
详细信息
Centrality indices are essential in network analysis and betweenness centrality, which is based on shortest paths, is one of the most important measures. It has been widely used in different areas like social network analysis, World Wide Web and route planning. However, even for mid-size networks, it is computationally expensive to compute exact betweenness scores. In this paper, we propose a generic randomized framework for unbiased estimation of betweenness scores. The proposed framework can be adapted with various sampling techniques and give algorithms with different characteristics. We discuss the conditions a promising sampling technique should satisfy to minimize the approximation error, and propose a sampling method that partially satisfies the conditions. We perform extensive experiments on synthetic networks as well as networks from the real world, and show that, compared with existing exact and inexact algorithms, our method works with higher accuracy or gives significant speedups.
Kernel selection is a fundamental problem of kernel-based learning algorithms. In this paper, we propose an approximate approach to automatic kernel selection for regression from the perspective of kernel matrix appro...
详细信息
Kernel selection is a fundamental problem of kernel-based learning algorithms. In this paper, we propose an approximate approach to automatic kernel selection for regression from the perspective of kernel matrix approximation. We first introduce multilevel circulant matrices into automatic kernel selection, and develop two approximate kernel selection algorithms by exploiting the computational virtues of multilevel circulant matrices. The complexity of the proposed algorithms is quasi-linear in the number of data points. Then, we prove an approximation error bound to measure the effect of the approximation in kernel matrices by multilevel circulant matrices on the hypothesis and further show that the approximate hypothesis produced with multilevel circulant matrices converges to the accurate hypothesis produced with kernel matrices. Experimental evaluations on benchmark datasets demonstrate the effectiveness of approximate kernel selection.
We study sublinear time algorithms for estimating the size of maximum matching. After a long line of research, the problem was finally settled by Behnezhad [FOCS’22], in the regime where one is willing to pay an app...
详细信息
ISBN:
(纸本)9781450399135
We study sublinear time algorithms for estimating the size of maximum matching. After a long line of research, the problem was finally settled by Behnezhad [FOCS’22], in the regime where one is willing to pay an approximation factor of 2. Very recently, Behnezhad et al. [SODA’23] improved the approximation factor to (2−1/2O(1/γ)) using n1+γ time. This improvement over the factor 2 is, however, minuscule and they asked if even 1.99-approximation is possible in n2−Ω(1) time. We give a strong affirmative answer to this open problem by showing (1.5+є)-approximation algorithms that run in n2−Θ(є2) time. Our approach is conceptually simple and diverges from all previous sublinear-time matching algorithms: we show a sublinear time algorithm for computing a variant of the edge-degree constrained subgraph (EDCS), a concept that has previously been exploited in dynamic [Bernstein Stein ICALP’15, SODA’16], distributed [Assadi et al. SODA’19] and streaming [Bernstein ICALP’20] settings, but never before in the sublinear setting.
A fast approximation algorithm for the multiple-choice knapsack problem is proposed whose solution is guaranteed to be 4/5-bounded. The algorithm is based on binary search and runs in O(n log m) time, n being the tota...
详细信息
A fast approximation algorithm for the multiple-choice knapsack problem is proposed whose solution is guaranteed to be 4/5-bounded. The algorithm is based on binary search and runs in O(n log m) time, n being the total number of items and m the number of multiple-choice classes in the knapsack problem. (C) 1998 Elsevier Science B.V. All rights reserved.
暂无评论