-
Stochastic Minimum Vertex Cover in General Graphs: a $3/2$-Approximation
Authors:
Mahsa Derakhshan,
Naveen Durvasula,
Nika Haghtalab
Abstract:
Our main result is designing an algorithm that returns a vertex cover of $\mathcal{G}^\star$ with size at most $(3/2+ε)$ times the expected size of the minimum vertex cover, using only $O(n/εp)$ non-adaptive queries. This improves over the best-known 2-approximation algorithm by Behnezhad, Blum, and Derakhshan [SODA'22], who also show that $Ω(n/p)$ queries are necessary to achieve any constant app…
▽ More
Our main result is designing an algorithm that returns a vertex cover of $\mathcal{G}^\star$ with size at most $(3/2+ε)$ times the expected size of the minimum vertex cover, using only $O(n/εp)$ non-adaptive queries. This improves over the best-known 2-approximation algorithm by Behnezhad, Blum, and Derakhshan [SODA'22], who also show that $Ω(n/p)$ queries are necessary to achieve any constant approximation.
Our guarantees also extend to instances where edge realizations are not fully independent. We complement this upper bound with a tight $3/2$-approximation lower bound for stochastic graphs whose edges realizations demonstrate mild correlations.
△ Less
Submitted 6 February, 2023;
originally announced February 2023.
-
Extending Universal Approximation Guarantees: A Theoretical Justification for the Continuity of Real-World Learning Tasks
Authors:
Naveen Durvasula
Abstract:
Universal Approximation Theorems establish the density of various classes of neural network function approximators in $C(K, \mathbb{R}^m)$, where $K \subset \mathbb{R}^n$ is compact. In this paper, we aim to extend these guarantees by establishing conditions on learning tasks that guarantee their continuity. We consider learning tasks given by conditional expectations…
▽ More
Universal Approximation Theorems establish the density of various classes of neural network function approximators in $C(K, \mathbb{R}^m)$, where $K \subset \mathbb{R}^n$ is compact. In this paper, we aim to extend these guarantees by establishing conditions on learning tasks that guarantee their continuity. We consider learning tasks given by conditional expectations $x \mapsto \mathrm{E}\left[Y \mid X = x\right]$, where the learning target $Y = f \circ L$ is a potentially pathological transformation of some underlying data-generating process $L$. Under a factorization $L = T \circ W$ for the data-generating process where $T$ is thought of as a deterministic map acting on some random input $W$, we establish conditions (that might be easily verified using knowledge of $T$ alone) that guarantee the continuity of practically \textit{any} derived learning task $x \mapsto \mathrm{E}\left[f \circ L \mid X = x\right]$. We motivate the realism of our conditions using the example of randomized stable matching, thus providing a theoretical justification for the continuity of real-world learning tasks.
△ Less
Submitted 6 December, 2022;
originally announced December 2022.
-
Utility-Based Communication Requirements for Stable Matching in Large Markets
Authors:
Naveen Durvasula
Abstract:
Results from the communication complexity literature have demonstrated that stable matching requires communication: one cannot find or verify a stable match without having access to essentially all of the ordinal preference information held privately by the agents in the market. Stated differently, these results show that stable matching mechanisms are not robust to even a small number of labeled…
▽ More
Results from the communication complexity literature have demonstrated that stable matching requires communication: one cannot find or verify a stable match without having access to essentially all of the ordinal preference information held privately by the agents in the market. Stated differently, these results show that stable matching mechanisms are not robust to even a small number of labeled inaccuracies in the input preferences. In practice, these results indicate that agents must go through the time-intensive process of accurately ranking each and every potential match candidate if they wish for the resulting match to be guaranteedly stable. Thus, in large markets, communication requirements for stable matching may be impractically high.
A natural question to ask, given this result, is whether some higher-order structure in the market can indicate which large markets have steeper communication requirements. In this paper, we perform such an analysis in a regime where agents have a utility-based notion of preference. We consider a dynamic model where agents only have access to an approximation of their utility that satisfies a universal multiplicative error bound. We apply guarantees from the theoretical computer science literature on low-distortion embeddings of finite metric spaces to understand the communication requirements of stable matching in large markets in terms of their structural properties. Our results show that for a broad family of markets, the error bound may not grow faster than $n^2\log(n)$ while maintaining a deterministic guarantee on the behavior of stable matching mechanisms in the limit. We also show that a stronger probabilistic guarantee may be made so long as the bound grows at most logarithmically in the underlying topological complexity of the market.
△ Less
Submitted 7 December, 2022;
originally announced December 2022.
-
Recommending with Recommendations
Authors:
Naveen Durvasula,
Franklyn Wang,
Scott Duke Kominers
Abstract:
Recommendation systems are a key modern application of machine learning, but they have the downside that they often draw upon sensitive user information in making their predictions. We show how to address this deficiency by basing a service's recommendation engine upon recommendations from other existing services, which contain no sensitive information by nature. Specifically, we introduce a conte…
▽ More
Recommendation systems are a key modern application of machine learning, but they have the downside that they often draw upon sensitive user information in making their predictions. We show how to address this deficiency by basing a service's recommendation engine upon recommendations from other existing services, which contain no sensitive information by nature. Specifically, we introduce a contextual multi-armed bandit recommendation framework where the agent has access to recommendations for other services. In our setting, the user's (potentially sensitive) information belongs to a high-dimensional latent space, and the ideal recommendations for the source and target tasks (which are non-sensitive) are given by unknown linear transformations of the user information. So long as the tasks rely on similar segments of the user information, we can decompose the target recommendation problem into systematic components that can be derived from the source recommendations, and idiosyncratic components that are user-specific and cannot be derived from the source, but have significantly lower dimensionality. We propose an explore-then-refine approach to learning and utilizing this decomposition; then using ideas from perturbation theory and statistical concentration of measure, we prove our algorithm achieves regret comparable to a strong skyline that has full knowledge of the source and target transformations. We also consider a generalization of our algorithm to a model with many simultaneous targets and no source. Our methods obtain superior empirical results on synthetic benchmarks.
△ Less
Submitted 1 December, 2021;
originally announced December 2021.
-
The Muffin Problem
Authors:
Guangiqi Cui,
John Dickerson,
Naveen Durvasula,
William Gasarch,
Erik Metz,
Jacob Prinz,
Naveen Raman,
Daniel Smolyak,
Sung Hyun Yoo
Abstract:
You have $m$ muffins and $s$ students. You want to divide the muffins into pieces and give the shares to students such that every student has $\frac{m}{s}$ muffins. Find a divide-and-distribute protocol that maximizes the minimum piece. Let $f(m,s)$ be the minimum piece in the optimal protocol. We prove that $f(m,s)$ exists, is rational, and finding it is computable (though possibly difficult). We…
▽ More
You have $m$ muffins and $s$ students. You want to divide the muffins into pieces and give the shares to students such that every student has $\frac{m}{s}$ muffins. Find a divide-and-distribute protocol that maximizes the minimum piece. Let $f(m,s)$ be the minimum piece in the optimal protocol. We prove that $f(m,s)$ exists, is rational, and finding it is computable (though possibly difficult). We show that $f(m,s)$ can be derived from $f(s,m)$; hence we need only consider $m\ge s$. We give a function $FC(m,s)$ such that, for $m\ge s+1$, $f(m,s)\le FC(m,s)$. It is often the case that $f(m,s)=FC(m,s)$. More formally, for all $s$, for all but a finite number of $m$, $f(m,s)=FC(m,s)$. This leads to a nice formula for $f(m,s)$, though there are exceptions to it. We give a formula $INT(m,s)$, which has 6 parts, such that for many of the exceptional $m$, $f(m,s)=INT(m,s)<FC(m,s)$. This works for most of the exceptional $m$ where ceil${2m/s}\ge 4$. There are still some exceptional $m$ with ceil${2m/s}=3$ (if its $\le 2$ then the problem is trivial). For these cases we have a way to {\it generate theorems}. For $1\le d\le 7$ we have generated formulas for $f(s+d,s)$. We do not have a theorem here but we do have a methodology which leads to, for some of the $m$, a value $BM(m,s)$ such that often $f(m,s)=BM(m,s)<INT(m,s)<FC(m,s)$. So far it seems like, for $m\ge s$, $f(m,s) = \min\{FC(m,s), INT(m,s), BM(m,s) \}$, though we have not prove this. For $1\le s\le 50$ and $s\le m\le 60$ we have obtained $f(m,s)$ for all but 20 values.
△ Less
Submitted 12 July, 2019; v1 submitted 7 September, 2017;
originally announced September 2017.