Performing robust detection with resource limitations such as low-power requirements or limited communication bandwidth is becoming increasingly important in contexts involving distributed signal processing. One way t...
详细信息
Performing robust detection with resource limitations such as low-power requirements or limited communication bandwidth is becoming increasingly important in contexts involving distributed signal processing. One way to address these constraints consists of reducing the amount of data used by the detection algorithms. Intelligent data selection in detection can be highly dependent on a priori information about the signal and noise. In this paper we explore detection strategies based on randomized data selection and analyze the resulting algorithms' performance. randomized data selection is a viable approach in the absence of reliable and detailed a priori information, and it provides a reasonable lower bound on signal processing performance as more a priori information is incorporated. The randomized selection procedure has the added benefits of simple implementation in a distributed environment and limited communication overhead. As an example of detection algorithms based upon randomized selection, we analyze a binary hypothesis testing problem, and determine several useful properties of detectors derived from the likelihood ratio test. Additionally, we suggest an adaptive detector that accounts for fluctuations in the selected data subset. The advantages and disadvantages of this approach in distributed sensor networks applications are also discussed.
In this paper, a new iterative approach to probabilistic robust controller design is presented, which is applicable to any robust controller/filter design problem that can be represented as an LMI feasibility problem....
详细信息
In this paper, a new iterative approach to probabilistic robust controller design is presented, which is applicable to any robust controller/filter design problem that can be represented as an LMI feasibility problem. Recently, a probabilistic Subgradient Iteration algorithm was proposed for solving LMIs. It transforms the initial feasibility problem to an equivalent convex optimization problem, which is subsequently solved by means of an iterative algorithm. While this algorithm always converges to a feasible solution in a finite number of iterations, it requires that the radius of a non-empty ball contained into the solution set is known a priori. This rather restrictive assumption is released in this paper, while retaining the convergence property. Given an initial ellipsoid that contains the solution set, the approach proposed here iteratively generates a sequence of ellipsoids with decreasing volumes, all containing the solution set. At each iteration a random uncertainty sample is generated with a specified probability density, which parameterizes an LMI. For this LMI the next minimum-volume ellipsoid that contains the solution set is computed. An upper bound on the maximum number of possible correction steps, that can be performed by the algorithm before finding a feasible solution, is derived. A method for finding an initial ellipsoid containing the solution set, which is necessary for initialization of the optimization, is also given. The proposed approach is illustrated on a real-life diesel actuator benchmark model with real parametric uncertainty, for which a H-2 robust state-feedback controller is designed. (C) 2003 Elsevier B.V. All rights reserved.
We consider the problem of determining whether a given function f : {0, 1}(n) --> {0, 1} belongs to a certain class of Boolean functions F or whether it is far from the class. More precisely, given query access to ...
详细信息
We consider the problem of determining whether a given function f : {0, 1}(n) --> {0, 1} belongs to a certain class of Boolean functions F or whether it is far from the class. More precisely, given query access to the function f and given a distance parameter epsilon, we would like to decide whether f is an element of F or whether it differs from every g is an element of F on more than an c-fraction of the domain elements. The classes of functions we consider are singleton ("dictatorship") functions, monomials, and monotone disjunctive normal form functions with a bounded number of terms. In all cases we provide algorithms whose query complexity is independent of n (the number of function variables), and linear in 1/epsilon.
We obtain a number of results regarding the distribution of values of a quadratic function f on the set of n x n permutation matrices (identified with the symmetric group S) around its optimum,. (minimum or maximum). ...
详细信息
We obtain a number of results regarding the distribution of values of a quadratic function f on the set of n x n permutation matrices (identified with the symmetric group S) around its optimum,. (minimum or maximum). We estimate the fraction of permutations sigma such that f (sigma) lies within a given neighborhood of the optimal value of f and relate the optimal value with the average value of f over a neighborhood of the optimal permutation. We describe a natural class of functions (which includes, for example, the objective function in the Traveling Salesman Problem) with a relative abundance of near-optimal permutations. Also, we identify a large class of functions f with the property that permutations close to the optimal permutation in the Hamming metric of S-n tend to produce near optimal values of f (such is, for example, the objective function in the symmetric Traveling Salesman Problem). We show that for general f, just the opposite behavior may take place: an average permutation in the vicinity of the optimal permutation may be much worse than an average permutation in the whole group S-n.
This paper presents an alternative approach to design of linear parameter-varying (LPV) control systems. In contrast to previous methods, which are focused on deterministic algorithms, this paper is based on a probabi...
详细信息
This paper presents an alternative approach to design of linear parameter-varying (LPV) control systems. In contrast to previous methods, which are focused on deterministic algorithms, this paper is based on a probabilistic setting. The proposed randomized algorithm provides a sequence of candidate solutions converging with probability one to a feasible solution in a finite number of steps. The main features of this approach are as follows: (i) The randomized algorithm gives a method for general LPV plants with state space matrices depending on scheduling parameters in a nonlinear manner. That is, the probabilistic setting does not need a gridding of the set of scheduling parameters or approximations such as a linear fractional transformation of the state space matrices. (ii) The proposed algorithm is sequential and, at each iteration, it does not require heavy computational effort such as solving simultaneously a large number of linear matrix inequalities. (C) 2003 Elsevier Ltd. All rights reserved.
We present techniques for computing small space representations of massive data streams. These are inspired by traditional wavelet-based approximations that consist of specific linear projections of the underlying dat...
详细信息
We present techniques for computing small space representations of massive data streams. These are inspired by traditional wavelet-based approximations that consist of specific linear projections of the underlying data. We present general "sketch"-based methods for capturing various linear projections and use them to provide pointwise and rangesum estimation of data streams. These methods use small amounts of space and per-item time while streaming through the data and provide accurate representation as our experiments with real data streams show.
Unfair metrical task systems are a generalization of online metrical task systems. In this paper we introduce new techniques to combine algorithms for unfair metrical task systems and apply these techniques to obtain ...
详细信息
Unfair metrical task systems are a generalization of online metrical task systems. In this paper we introduce new techniques to combine algorithms for unfair metrical task systems and apply these techniques to obtain improved randomized online algorithms for metrical task systems on arbitrary metric spaces.
Convex and submodular functions play an important role in many applications, and in particular in combinatorial optimization. Here we study two special cases: convexity in one dimension and submodularity in two dimens...
详细信息
Convex and submodular functions play an important role in many applications, and in particular in combinatorial optimization. Here we study two special cases: convexity in one dimension and submodularity in two dimensions. The latter type off unctions are equivalent to the well-known Monge matrices. A matrix V = {v(i, j)} (i= n)(i,j,=0)(1, j= n2) is called a Monge matrix if for every 0 less than or equal to i < i' <= n(1) and 0 <= j < j' less than or equal to n(2) we have v(i, j) + v(i, j') less than or equal to v(i, j') + v(i', j). If inequality holds in the opposite direction, then V is an inverse Monge matrix ( supermodular function). Many problems, such as the traveling salesperson problem and various transportation problems, can be solved more efficiently if the input is a Monge matrix. In this work we present testing algorithms for the above properties. A testing algorithm for a predetermined property P is given query access to an unknown function f and a distance parameter epsilon. The algorithm should accept f with high probability if it has the property P and reject it with high probability if more than an epsilon-fraction of the function values should be modified so that f obtains the property. Our algorithm for testing whether a 1-dimensional function f : [n] --> R is convex (concave) has query complexity and running time of O ((log n)/epsilon). Our algorithm for testing whether an n(1) x n(2) matrix V is a Monge ( inverse Monge) matrix has query complexity and running time of O ((log n(1) . log n(2))/epsilon).
The Data Broadcast Problem consists of finding an infinite schedule to broadcast a given set of messages so as to minimize a linear combination of the average service time to clients requesting messages, and of the co...
详细信息
The Data Broadcast Problem consists of finding an infinite schedule to broadcast a given set of messages so as to minimize a linear combination of the average service time to clients requesting messages, and of the cost of the broadcast. This problem also models the Maintenance Scheduling Problem and the Multi-Item Replenishment Problem. Previous work concentrated on a discrete-time restriction where all messages have transmission time equal to 1. Here, we study a generalization of the model to a setting of continuous time and messages of non-uniform transmission times. We prove that the Data Broadcast Problem is strongly NP-hard, even if the broadcast costs are all zero, and give 3-approximation algorithms.
We consider the following two instances of the projective clustering problem: Given a set S of n points in R-d and an integer k > 0, cover S by k slabs (respectively d-cylinders) so that the maximum width of a slab...
详细信息
We consider the following two instances of the projective clustering problem: Given a set S of n points in R-d and an integer k > 0, cover S by k slabs (respectively d-cylinders) so that the maximum width of a slab (respectively the maximum diameter of a d-cylinder) is minimized. Let w* be the smallest value so that S can be covered by k slabs (respectively d-cylinders), each of width (respectively diameter) at most w*. This paper contains three main results: (i) For d = 2, we present a randomized algorithm that computes O(k log k) strips of width at most w* that cover S. Its expected running time is O(nk(2) log(4) n) if k(2) log k less than or equal to n;for larger values of k, the expected running time is O(n(2/3) k(8/3) log(14/3) n). (ii) For d = 3, a cover of S by O(k log k) slabs of width at most w* can be computed in expected time O(n(3/2)k(9/4) polylog(n)). (iii) We compute a cover of S subset of R-d by O(d k log k) d-cylinders of diameter at most 8w* in expected time O(dnk(3) log(4) n). We also present a few extensions of this result. (C) 2003 Elsevier Science (USA). All rights reserved.
暂无评论