The generalized singular value decomposition(GSVD)of two matrices with the same number of columns is a very useful tool in many practical ***,the GSVD may suffer from heavy computational time and memory requirement wh...
详细信息
The generalized singular value decomposition(GSVD)of two matrices with the same number of columns is a very useful tool in many practical ***,the GSVD may suffer from heavy computational time and memory requirement when the scale of the matrices is quite *** this paper,we use random projections to capture the most of the action of the matrices and propose randomized algorithms for computing a low-rank approximation of the *** error bounds of the approximation are also presented for the proposed randomized ***,some experimental results show that the proposed randomized algorithms can achieve a good accuracy with less computational cost and storage requirement.
k-Set agreement is a central problem of fault-tolerant distributed computing. Considering a set of n processes, where up to t may commit failures, let us assume that each process proposes a value. The problem consists...
详细信息
k-Set agreement is a central problem of fault-tolerant distributed computing. Considering a set of n processes, where up to t may commit failures, let us assume that each process proposes a value. The problem consists in defining an algorithm such that each non-faulty process decides a value, at most k different values are decided, and the decided values satisfy some context-depending validity condition. algorithms solving k-set agreement in synchronous message-passing systems have been proposed for different failure models (mainly process crashes, and process Byzantine failures). Differently, k-set agreement cannot be solved in failure-prone asynchronous message-passing systems when t > k. To circumvent this impossibility an asynchronous system must be enriched with additional computational power. Assuming t > k, this paper presents two distributed algorithms that solve k-set agreement in asynchronous message-passing systems where up to t processes may commit crash failures (first algorithm) or more severe Byzantine failures (second algorithm). To circumvent k-set agreement impossibility, this article considers that the underlying system is enriched with the computability power provided by randomization. Interestingly, the algorithm that copes with Byzantine failures is signature-free, and ensures that no value proposed only by Byzantine processes can be decided by a non-faulty process. Both algorithms share basic design principles. (C) 2017 Elsevier B.V. All rights reserved.
We Study the approximation of Sobolev embeddings by linear randomized algorithms based on function values. Both the source and the target space are Sobolev spaces of non-negative smoothness order, defined on a bounded...
详细信息
We Study the approximation of Sobolev embeddings by linear randomized algorithms based on function values. Both the source and the target space are Sobolev spaces of non-negative smoothness order, defined on a bounded Lipschitz domain. The optimal order of convergence is determined. We also study the deterministic setting. Using interpolation, we extend the results to other classes of function spaces. In this context a problem posed by Novak and Wozniakowski is solved. Finally, we present an application to the complexity of general elliptic PDE. (C) 2009 Elsevier Inc. All rights reserved.
In this paper, we study the Parameterized P-2-Packing problem and Parameterized Co-Path Packing problem from random perspective. For the Parameterized P-2-Packing problem, based on the structure analysis of the proble...
详细信息
In this paper, we study the Parameterized P-2-Packing problem and Parameterized Co-Path Packing problem from random perspective. For the Parameterized P-2-Packing problem, based on the structure analysis of the problem and using random partition technique, a randomized parameterized algorithm of running time O*(6.75(k)) is obtained, improving the current best result O*(8(k)). For the Parameterized Co-Path Packing problem, we firstly study the kernel and randomized algorithm for the degree-bounded instance, where each vertex in the instance has degree at most three. A kernel of size 20k and a randomized algorithm of running time O*(2(k)) are given for the Parameterized Co-Path Packing problem with bounded degree constraint. By applying iterative compression technique and based on the randomized algorithm for degree bounded problem, a randomized algorithm of running time O*(3(k)) is given for the Parameterized Co-Path Packing problem.
Matrices with low -rank structure are ubiquitous in scientific computing. Choosing an appropriate rank is a key step in many computational algorithms that exploit low -rank structure. However, estimating the rank has ...
详细信息
Matrices with low -rank structure are ubiquitous in scientific computing. Choosing an appropriate rank is a key step in many computational algorithms that exploit low -rank structure. However, estimating the rank has been done largely in an ad -hoc fashion in large-scale settings. In this work we develop a randomized algorithm for estimating the numerical rank of a (numerically low -rank) matrix. The algorithm is based on sketching the matrix with random matrices from both left and right;the key fact is that with high probability, the sketches preserve the orders of magnitude of the leading singular values. We prove a result on the accuracy of the sketched singular values and show that gaps in the spectrum are detected. For an m x n (m >= n) matrix of numerical rank r, the algorithm runs with complexity O(mnlog n + r3), or less for structured matrices. The steps in the algorithm are required as a part of many low -rank algorithms, so the additional work required to estimate the rank can be even smaller in practice. Numerical experiments illustrate the speed and robustness of our rank estimator. (c) 2024 The Author(s). Published by Elsevier Inc. This is an open access article under the CC BY license (http:// creativecommons .org /licenses /by /4 .0/).
randomized approaches for circle detections are often used for the advantages of less computational time and memory requirements. However, randomized approaches involve examining a large number of candidate circles an...
详细信息
randomized approaches for circle detections are often used for the advantages of less computational time and memory requirements. However, randomized approaches involve examining a large number of candidate circles and may not be suitable for real-time applications. In this paper, a screening strategy based on the symmetric property of the circle is adopted to select the promising candidates for further investigation, resulting in substantial reduction in the computational time while maintaining the accuracy. Empirical results show that, under the same accuracy level, the proposed symmetry-based method achieves the improvement ratios of 40%-90% on the execution-time when compared to four state-of-the-art randomized methods. (c) 2012 Elsevier B.V. All rights reserved.
The randomized extended Gauss-Seidel method is a popular representative among the iterative algorithm due to its simplicity for solving the inconsistent and consistent systems of linear equations, which builds the con...
详细信息
The randomized extended Gauss-Seidel method is a popular representative among the iterative algorithm due to its simplicity for solving the inconsistent and consistent systems of linear equations, which builds the connection between the randomized Kaczmarz and Gauss-Seidel methods. In this work we develop a general version of the randomized extended Gauss-Seidel method, as well as some new iterative schemes. We prove that our algorithm can exponentially converge in expectation to the solutions of the consistent or inconsistent linear systems under two different sampling strategies. Numerical examples show that the proposed algorithm is feasible and effective, where the block method performs significantly better than the corresponding original form. (C) 2021 IMACS. Published by Elsevier B.V. All rights reserved.
In this paper, we propose a randomized algorithm to estimate the motion parameters of a planar shape without knowing a priori the point-to-point correspondences. By randomly searching points on two shapes measured at ...
详细信息
In this paper, we propose a randomized algorithm to estimate the motion parameters of a planar shape without knowing a priori the point-to-point correspondences. By randomly searching points on two shapes measured at different times, we determine the centroids, after which the algorithm proceeds to determine the rotation by randomly searching points on each shape that form congruent polygons.
We consider the problem of gathering n anonymous and oblivious mobile robots, which requires that all robots meet in finite time at a nonpredefined point. While the gathering problem cannot be solved deterministically...
详细信息
We consider the problem of gathering n anonymous and oblivious mobile robots, which requires that all robots meet in finite time at a nonpredefined point. While the gathering problem cannot be solved deterministically without assuming any additional capabilities for the robots, randomized approaches easily allow it to be solvable. However, the randomized solutions currently known have a time complexity that is exponential in n with no additional assumption. This fact yields the following two questions: Is it possible to construct a randomized gathering algorithm with polynomial expected time? If it is not possible, what is the minimal additional assumption necessary to obtain such an algorithm? In this paper, we address these questions from the aspect of multiplicity-detection capabilities. We newly introduce two weaker variants of multiplicity detection, called local-strong and local-weak multiplicity, and investigate whether those capabilities permit a gathering algorithm with polynomial expected time or not. The contribution of this paper is to show that any algorithm only assuming local-weak multiplicity detection takes exponential number of rounds in expectation. On the other hand, we can obtain a constant-round gathering algorithm using local-strong multiplicity detection. These results imply that the two models of multiplicity detection are significantly different in terms of their computational power. Interestingly, these differences disappear if we take one more assumption that all robots are scattered (i.e., no two robots stay at the same location) initially. We can obtain a gathering algorithm that takes a constant number of rounds in expectation, assuming local-weak multiplicity detection and scattered initial configurations.
We address the problem of randomized learning and generalization of fair and private classifiers. From one side we want to ensure that sensitive information does not unfairly influence the outcome of a classifier. Fro...
详细信息
We address the problem of randomized learning and generalization of fair and private classifiers. From one side we want to ensure that sensitive information does not unfairly influence the outcome of a classifier. From the other side we have to learn from data while preserving the privacy of individual observations. We initially face this issue in the PAC-Bayes framework presenting an approach which trades off and bounds the risk and the fairness of the randomized (Gibbs) classifier. Our new approach is able to handle several different state-of-the-art fairness measures. For this purpose, we further develop the idea that the PAC-Bayes prior can be defined based on the data-generating distribution without actually knowing it. In particular, we define a prior and a posterior which give more weight to functions with good generalization and fairness properties. Furthermore, we will show that this randomized classifier possesses interesting stability properties using the algorithmic distribution stability theory. Finally, we will show that the new posterior can be exploited to define a randomized accurate and fair algorithm. Differential privacy theory will allow us to derive that the latter algorithm has interesting privacy preserving properties ensuring our threefold goal of good generalization, fairness, and privacy of the final model. (C) 2020 Elsevier B.V. All rights reserved.
暂无评论