| Date |
Topic |
Speaker |
| Jan 25 |
Using Streaming to Streamline your
algorithms: Near Linear time algorithms for the b-Matching
problem
Abstract: Despite the advancement of efficient and
approximation algorithms for maximum matching, the maximum
b-Matching problem has eluded fast algorithms. The b-Matching
problem has vertex capacities and allows edges to be present
with with multiplicites larger than 1. It is a fundamental
combinatorial optimization problem and has found many recent
applications.
In this talk we present the first near linear linear time
fully polynomial time approximation for the b-Matching
problem. The overall algorithm will use the primal-dual method
and ideas developed with the applicability to the
semi-streaming model.
|
Sudipto
Guha |
| Feb 1 |
Interacting Viruses in Networks: Can Both Survive?
Abstract: Suppose we have two competing
ideas/products/viruses that propagate over a social or other network.
Suppose that they are strong/virulent enough, so that each, if left
alone, could lead to an epidemic. What will happen when both operate
on the network? What happens at the end, that is, which product will
"win," in terms of highest market share?
First we study the case where two viruses are fully
competitive/mutually exclusive (work from WWW 2012). One may naively
expect that the better product (stronger virus) will just have a
larger footprint, proportional to the quality ratio of the products
(or strength ratio of the viruses). However, we prove the surprising
result that, under realistic conditions, for any graph topology, the
stronger virus completely wipes-out the weaker one
("winner-takes-all"). In addition to the proofs, we also demonstrate
our result with simulations over diverse, real graph topologies and
match our model against real data about competing products from Google
Insights.
Second we study the case where the viruses are not mutually exclusive
but have some variable amount of interaction (work from KDD 2012).
For example, one type of flu may give partial immunity against some
other similar disease, or a user could install and use both Firefox
and Google Chrome. With our model we ask, what happens in-between the
two extremes of "winner takes all" (as is the case with mutually
exclusive viruses) and independent survival (as is the case with
non-interacting viruses). We show that there is a phase transition:
if the competition is harsher than a critical level, then "winner
takes all;" otherwise, the weaker virus survives. We discuss (a) the
problem definition, which is novel even in epidemiology literature (b)
the phase-transition result and (c) experiments on real data,
illustrating the suitability of our results.
|
Alex Beutel |
| Feb 8 |
Near Optimal Resources Allocation for Enhancing Networks Survivability Under Geographically Correlated Attacks
Abstract: In this work, we present new algorithms for
increasing the survivability of WDM networks after
geographically correlated attacks. Causes for such attacks
might include Electromagnetic Pulse (EMP) attacks, as well as
natural disasters, such as solar flares, earthquakes,
hurricanes, and floods. The aim is to pre-allocate resources in
the network, so their maintenance creates a small overhead on
the network functionality. Our algorithm provides a provably
almost-optimal solution, with close to linear running time. To
obtain this result, we have proven new bounds on the
VC-dimensions of topological structures the network might
exhibit after the attack.
|
Alon Efrat |
| Feb 15 |
Algorithms and problems in optimization of triangulations
Abstract: A point set in the plane has many
triangulations. One may define a measure of quality of a triangulation
and ask for the triangulation which optimizes that quality. One such
measure is the maximum angle, another the maximum area. For the former
criteria, "edge insertion" is an algorithm that will find the optimum
triangulation efficiently. Whereas, no polynomial time algorithm is
known for maximum area, the so called minmax area triangulation
problem. I will present the edge insertion algorithm and at the end
will give a counterexample that shows edge insertion cannot be used
for minmax area triangulation.
|
Salman Parsa |
| Feb 21 |
Energy-efficient Scheduling in the Non-clairvoyant model
Abstract:
A fundamental problem in energy-efficient computing is to
schedule multiple jobs released over time on a single machine
with adjustable speed so as to minimize the sum of flowtime and
energy. Note that the two objectives are in conflict: higher
speeds reduce flowtime at the cost of increased energy
consumption. In the clairvoyant version of the problem, the
parameters of a job (volume and density) are revealed when the
job is released. For this problem, a series of results
culminated in a (2+epsilon)-competitive algorithm due to
Bansal, Chan, and Pruhs. In this talk, I will consider the
non-clairvoyant version of the problem where the density of a
job is revealed on release but the volume is unknown. This
version is often more practical and has been widely considered
in other scheduling problems. We give a constant-competitive
algorithm, which to the best of our knowledge, is the first
non-trivial result for this problem.
Our algorithm is defined by simulating the clairvoyant algorithm
in a novel inductive way, which then leads to an inductive
analytical tool that may be of independent interest for other
non-clairvoyant scheduling problems.
(Based on joint work with Yossi Azar, Nikhil Devanur, and Zhiyi Huang.)
|
Debmalya Panigrahi |
| Feb 26 |
Net and Prune: A Linear Time
Algorithm for Euclidean Distance Problems
Abstract: We provide a general framework for getting
linear time constant factor approximations (and in many cases
FPTAS's) to a copious amount of well known and well studied
problems in Computational Geometry, such as k-center
clustering and furthest nearest neighbor. The new approach is
robust to variations in the input problem, and yet it is
simple, elegant and practical. In particular, many of these
well studied problems which fit easily into our framework,
either previously had no linear time approximation algorithm,
or required rather involved algorithms and analysis. A short
list of the problems we consider include furthest nearest
neighbor, finding the optimal k-center clustering, smallest
disk enclosing k points, kth largest distance, $k$th
smallest m-nearest neighbor distance, kth heaviest edge in
the MST and other spanning forest type problems, problems
involving upward closed set systems, and more.
Joint work with Benjamin Raichel.
http://valis.cs.uiuc.edu/~sariel/papers/12/aggregate/
|
Sariel Har-Peled |
| Mar 11 |
Minimal Residual Methods for Singular Complex Symmetric, Skew Symmetric,
and Skew Hermitian Systems
Abstract: Most existing Krylov subspace algorithms for
linear systems assume non-singularity of the matrices or
operators. MINRES-QLP (Choi, Paige, and Saunders 2011) is a
MINRES-like algorithm but designed for computing the unique
pseudoinverse solution of a singular symmetric or Hermitian problem
using short recurrence relations in solution updates and stopping
conditions. On a nonsingular system, MINRES-QLP is more stable than
MINRES (Paige and Saunders 1975). We design similarly stable
algorithms for singular (or nonsingular) complex-symmetric,
skew-symmetric, and skew-Hermitian linear systems or linear
least-squares problems. Our goal is to provide one efficient
implementation prototyped in Matlab for these different classes of
linear systems. We present extensive numerical experiments to
demonstrate the scalability and robustness of these algorithms.
|
Sou-Cheng Choi |
| Mar 22 |
The L1 Top-k Nearest Neighbor Searching with Uncertain Queries
Abstract: In this talk, I will present algorithms and data structures for the top-k nearest neighbor
searching where the input points are exact and the query point is uncertain under the L1
distance metric in the plane. The uncertain query point is represented by a discrete probability
density function, and the goal is to return the top-k expected nearest neighbors, which have
the smallest expected distances to the query point. Given a set of n exact points in the plane,
we build an O(n log n log log n)-size data structure in O(n log n log log n) time, such that for any
uncertain query point with m possible locations and any integer k with 1 \leq k \leq n, the top-k
expected nearest neighbors can be found in O(m log m + (k + m) log^2 n) time. Even for
the special case where k = 1, our result is better than the previously best method (in PODS
2012), which requires O(n log^2 n) preprocessing time, O(n log^2 n) space, and O(m^2 log^3 n) query
time. In addition, for the one-dimensional version of this problem, our approach can build an
O(n)-size data structure in O(n log n) time that can support O(min{km, k + m log m} + log n)
time queries.
Joint work with Haitao Wang, Utah State University. In the process of submitting to ESA 2013.
|
Wuzhou Zhang |