-
Sublinear Algorithms for $(Δ+ 1)$ Vertex Coloring
Authors:
Sepehr Assadi,
Yu Chen,
Sanjeev Khanna
Abstract:
Any graph with maximum degree $Δ$ admits a proper vertex coloring with $Δ+ 1$ colors that can be found via a simple sequential greedy algorithm in linear time and space. But can one find such a coloring via a sublinear algorithm?
We answer this fundamental question in the affirmative for several canonical classes of sublinear algorithms including graph streaming, sublinear time, and massively pa…
▽ More
Any graph with maximum degree $Δ$ admits a proper vertex coloring with $Δ+ 1$ colors that can be found via a simple sequential greedy algorithm in linear time and space. But can one find such a coloring via a sublinear algorithm?
We answer this fundamental question in the affirmative for several canonical classes of sublinear algorithms including graph streaming, sublinear time, and massively parallel computation (MPC) algorithms. In particular, we design:
* A single-pass semi-streaming algorithm in dynamic streams using $\tilde{O}(n)$ space. The only known semi-streaming algorithm prior to our work was a folklore O(log n)-pass algorithm obtained by simulating classical distributed algorithms in the streaming model.
* A sublinear-time algorithm in the standard query model that allows neighbor queries and pair queries using $\tilde{O}(n\sqrt{n})$ time. We further show that any algorithm that outputs a valid coloring with sufficiently large constant probability requires $Ω(n\sqrt{n})$ time. No non-trivial sublinear time algorithms were known prior to our work.
* A parallel algorithm in the massively parallel computation (MPC) model using $\tilde{O}(n)$ memory per machine and $O(1)$ MPC rounds. Our number of rounds significantly improves upon the recent $O(\log\logΔ\cdot\log^*{(n)})$-round algorithm of Parter [ICALP 2018].
At the core of our results is a remarkably simple meta-algorithm for the $(Δ+1)$ coloring problem: Sample $O(\log{n})$ colors for each vertex from the $Δ+1$ colors; find a proper coloring of the graph using only the sampled colors. We prove that the sampled set of colors with high probability contains a proper coloring of the input graph. The sublinear algorithms are then obtained by designing efficient algorithms for finding a proper coloring of the graph from the sampled colors in the corresponding models.
△ Less
Submitted 5 January, 2019; v1 submitted 23 July, 2018;
originally announced July 2018.
-
The GALAH Survey: Velocity fluctuations in the Milky Way using red clump giants
Authors:
Shourya Khanna,
Sanjib Sharma,
Joss Bland-Hawthorn,
Michael Hayden,
David M. Nataf,
Yuan-Sen Ting,
Janez Kos,
Sarah Martell,
Tomaz Zwitter,
Gayandhi De Silva,
Martin Asplund,
Sven Buder,
Ly Duong,
Jane Lin,
Jeffrey D. Simpson,
Borja Anguiano,
Jonathan Horner,
Prajwal R. Kafle,
Geraint F. Lewis,
Thomas Nordlander,
Rosemary F. G. Wyse,
Robert A. Wittenmyer,
Daniel B. Zucker
Abstract:
If the Galaxy is axisymmetric and in dynamical equilibrium, we expect negligible fluctuations in the residual line-of-sight velocity field. Recent results using the \apg{} survey find significant fluctuations in velocity for stars in the midplane ($|z|<$0.25 kpc) out to 5 kpc, suggesting that the dynamical influence of non-axisymmetric features i.e., the Milky Way's bar, spiral arms and merger eve…
▽ More
If the Galaxy is axisymmetric and in dynamical equilibrium, we expect negligible fluctuations in the residual line-of-sight velocity field. Recent results using the \apg{} survey find significant fluctuations in velocity for stars in the midplane ($|z|<$0.25 kpc) out to 5 kpc, suggesting that the dynamical influence of non-axisymmetric features i.e., the Milky Way's bar, spiral arms and merger events extends out to the Solar neighborhood. Their measured power spectrum has a characteristic amplitude of 11 \kms{} on a scale of 2.5 kpc. The existence of such large-scale streaming motions has important implications for determining the Sun's motion about the Galactic Centre. Using Red Clump stars from \glh{} and \apg{}, we map the line-of-sight velocities around the Sun (d$<$5 kpc), and $|z|<$1.25 kpc from the midplane. By subtracting a smooth axisymmetric model for the velocity field, we study the residual fluctuations and compare our findings with mock survey generated by \glx{}. We find negligible large-scale fluctuations away from the plane. In the mid-plane, we reproduce the earlier \apg{} power spectrum but with 20\% smaller amplitude (9.3 \kms{}) after taking into account a few systematics (e.g., volume completeness). Using a flexible axisymmetric model the power-amplitude is further reduced to 6.3 \kms{}. Additionally, our simulations show that, in the plane, distances are underestimated for high-mass Red Clump stars which can lead to spurious power-amplitude of about 5.2 \kms{}. Taking this into account, we estimate the amplitude of real fluctuations to be $<$4.6 \kms{}, about a factor of three less than the \apg{} result.
△ Less
Submitted 3 November, 2018; v1 submitted 19 April, 2018;
originally announced April 2018.
-
The GALAH and TESS-HERMES surveys: high-resolution spectroscopy of luminous supergiants in the Magellanic Clouds and Bridge
Authors:
Jeffrey D. Simpson,
Dennis Stello,
Sanjib Sharma,
Yuan-Sen Ting,
David M. Nataf,
Gary Da Costa,
Robert A. Wittenmyer,
Jonathan Horner,
Sarah L. Martell,
Geraint F. Lewis,
Gayandhi M. De Silva,
Peter L. Cottrell,
Martin Asplund,
Joss Bland-Hawthorn,
Sven Buder,
Valentina D'Orazi,
Ly Duong,
Ken C. Freeman,
Janez Kos,
Jane Lin,
Karin Lind,
Katharine. J. Schlesinger,
Daniel B. Zucker,
Tomaž Zwitter,
Prajwal R. Kafle
, et al. (2 additional authors not shown)
Abstract:
We report the serendipitous observations of 571 luminous supergiants in the Magellanic Clouds by the spectroscopic GALAH and TESS-HERMES surveys: 434 stars in the Large Magellanic Cloud and 137 in the Small Magellanic Cloud. We also find one star that appears associated with structured star formation in the Magellanic Bridge. Both of these surveys are aimed at the local volume of the Galaxy but ha…
▽ More
We report the serendipitous observations of 571 luminous supergiants in the Magellanic Clouds by the spectroscopic GALAH and TESS-HERMES surveys: 434 stars in the Large Magellanic Cloud and 137 in the Small Magellanic Cloud. We also find one star that appears associated with structured star formation in the Magellanic Bridge. Both of these surveys are aimed at the local volume of the Galaxy but have simple, magnitude-limited selection functions that mean they include some observations of luminous extra-Galactic stars. The surveys determine stellar parameter and abundances using The Cannon, a data-driven generative modelling approach. In this work, we explore the results from The Cannon when it is fed the spectra of these intrinsically luminous supergiants in the Magellanic Clouds, which are well outside the normal bounds of The Cannon's training set. We find that, although the parameters are astrophysically incorrect, the $v\sin i$ and the abundances of lithium, barium, and magnesium are excellent discriminants of these stars. It shows that in the future, with an expanded training set, it should be possible to determine accurate values for these types of stars.
△ Less
Submitted 19 April, 2018; v1 submitted 16 April, 2018;
originally announced April 2018.
-
Asteroseismology of 16000 Kepler Red Giants: Global Oscillation Parameters, Masses, and Radii
Authors:
Jie Yu,
Daniel Huber,
Timothy R. Bedding,
Dennis Stello,
Marc Hon,
Simon J. Murphy,
Shourya Khanna
Abstract:
The Kepler mission has provided exquisite data to perform an ensemble asteroseismic analysis on evolved stars. In this work we systematically characterize solar-like oscillations and granulation for 16,094 oscillating red giants, using end-of-mission long-cadence data. We produced a homogeneous catalog of the frequency of maximum power (typical uncertainty $σ_{ν_{\rm max}}$=1.6\%), the mean large…
▽ More
The Kepler mission has provided exquisite data to perform an ensemble asteroseismic analysis on evolved stars. In this work we systematically characterize solar-like oscillations and granulation for 16,094 oscillating red giants, using end-of-mission long-cadence data. We produced a homogeneous catalog of the frequency of maximum power (typical uncertainty $σ_{ν_{\rm max}}$=1.6\%), the mean large frequency separation ($σ_{Δν}$=0.6\%), oscillation amplitude ($σ_{\rm A}$=4.7\%), granulation power ($σ_{\rm gran}$=8.6\%), power excess width ($σ_{\rm width}$=8.8\%), seismically-derived stellar mass ($σ_{\rm M}$=7.8\%), radius ($σ_{\rm R}$=2.9\%), and thus surface gravity ($σ_{\log g}$=0.01 dex). Thanks to the large red giant sample, we confirm that red-giant-branch (RGB) and helium-core-burning (HeB) stars collectively differ in the distribution of oscillation amplitude, granulation power, and width of power excess, which is mainly due to the mass difference. The distribution of oscillation amplitudes shows an extremely sharp upper edge at fixed $ν_{\rm max}$, which might hold clues to understand the excitation and dam** mechanisms of the oscillation modes. We find both oscillation amplitude and granulation power depend on metallicity, causing a spread of 15\% in oscillation amplitudes and a spread of 25\% in granulation power from [Fe/H]=-0.7 to 0.5 dex. Our asteroseismic stellar properties can be used as reliable distance indicators and age proxies for map** and dating galactic stellar populations observed by Kepler. They will also provide an excellent opportunity to test asteroseismology using Gaia parallaxes, and lift degeneracies in deriving atmospheric parameters in large spectroscopic surveys such as APOGEE and LAMOST.
△ Less
Submitted 2 April, 2018; v1 submitted 12 February, 2018;
originally announced February 2018.
-
Magnetic Behaviour of Assemblies of Interacting Cobalt-Carbide Nanoparticles
Authors:
Pallabi Sutradhar,
Shiv N. Khanna,
Jayasimha Atulasimha
Abstract:
Recent work [1] demonstrated high coercivity and magnetic moment in cobalt carbide nanoparticle assemblies and explained the high coercivity from first principles in terms of the high magnetocrystalline anisotropy of the cobalt carbide nanoparticles. In this work, we comprehensively model the interaction between the nanoparticles comprising the assembly and systematically understand the effect of…
▽ More
Recent work [1] demonstrated high coercivity and magnetic moment in cobalt carbide nanoparticle assemblies and explained the high coercivity from first principles in terms of the high magnetocrystalline anisotropy of the cobalt carbide nanoparticles. In this work, we comprehensively model the interaction between the nanoparticles comprising the assembly and systematically understand the effect of particle size, distribution of the orientations of the nanoparticles' magnetocrystalline anisotropy axis with respect to the applied magnetic field, and dipole coupling between nanoparticles on the temperature dependent magnetic behavior of the nanoparticle assembly. We show that magnetocrystalline anisotropy alone is not enough to explain the large hysteresis over the 50K-400K temperature range and suggest that defects and inhomogeneties that pin the magnetization could also play a significant role on this temperature dependent magnetic behavior.
△ Less
Submitted 20 January, 2018;
originally announced January 2018.
-
Tight Bounds on the Round Complexity of the Distributed Maximum Coverage Problem
Authors:
Sepehr Assadi,
Sanjeev Khanna
Abstract:
We study the maximum $k$-set coverage problem in the following distributed setting. A collection of sets $S_1,\ldots,S_m$ over a universe $[n]$ is partitioned across $p$ machines and the goal is to find $k$ sets whose union covers the most number of elements. The computation proceeds in synchronous rounds. In each round, all machines simultaneously send a message to a central coordinator who then…
▽ More
We study the maximum $k$-set coverage problem in the following distributed setting. A collection of sets $S_1,\ldots,S_m$ over a universe $[n]$ is partitioned across $p$ machines and the goal is to find $k$ sets whose union covers the most number of elements. The computation proceeds in synchronous rounds. In each round, all machines simultaneously send a message to a central coordinator who then communicates back to all machines a summary to guide the computation for the next round. At the end, the coordinator outputs the answer. The main measures of efficiency in this setting are the approximation ratio of the returned solution, the communication cost of each machine, and the number of rounds of computation.
Our main result is an asymptotically tight bound on the tradeoff between these measures for the distributed maximum coverage problem. We first show that any $r$-round protocol for this problem either incurs a communication cost of $ k \cdot m^{Ω(1/r)}$ or only achieves an approximation factor of $k^{Ω(1/r)}$. This implies that any protocol that simultaneously achieves good approximation ratio ($O(1)$ approximation) and good communication cost ($\widetilde{O}(n)$ communication per machine), essentially requires logarithmic (in $k$) number of rounds. We complement our lower bound result by showing that there exist an $r$-round protocol that achieves an $\frac{e}{e-1}$-approximation (essentially best possible) with a communication cost of $k \cdot m^{O(1/r)}$ as well as an $r$-round protocol that achieves a $k^{O(1/r)}$-approximation with only $\widetilde{O}(n)$ communication per each machine (essentially best possible).
We further use our results in this distributed setting to obtain new bounds for the maximum coverage problem in two other main models of computation for massive datasets, namely, the dynamic streaming model and the MapReduce model.
△ Less
Submitted 22 August, 2018; v1 submitted 8 January, 2018;
originally announced January 2018.
-
Better and Simpler Error Analysis of the Sinkhorn-Knopp Algorithm for Matrix Scaling
Authors:
Deeparnab Chakrabarty,
Sanjeev Khanna
Abstract:
Given a non-negative $n \times m$ real matrix $A$, the {\em matrix scaling} problem is to determine if it is possible to scale the rows and columns so that each row and each column sums to a specified target value for it. This problem arises in many algorithmic applications, perhaps most notably as a preconditioning step in solving a linear system of equations. One of the most natural and by now c…
▽ More
Given a non-negative $n \times m$ real matrix $A$, the {\em matrix scaling} problem is to determine if it is possible to scale the rows and columns so that each row and each column sums to a specified target value for it. This problem arises in many algorithmic applications, perhaps most notably as a preconditioning step in solving a linear system of equations. One of the most natural and by now classical approach to matrix scaling is the Sinkhorn-Knopp algorithm (also known as the RAS method) where one alternately scales either all rows or all columns to meet the target values. In addition to being extremely simple and natural, another appeal of this procedure is that it easily lends itself to parallelization. A central question is to understand the rate of convergence of the Sinkhorn-Knopp algorithm.
In this paper, we present an elementary convergence analysis for the Sinkhorn-Knopp algorithm that improves upon the previous best bound. In a nutshell, our approach is to show a simple bound on the number of iterations needed so that the KL-divergence between the current row-sums and the target row-sums drops below a specified threshold $δ$, and then connect the KL-divergence with $\ell_1$ and $\ell_2$ distances. For $\ell_1$, we can use Pinsker's inequality. For $\ell_2$, we develop a strengthening of Pinsker's inequality, called (KL vs $\ell_1/\ell_2$) in the paper, which lower bounds the KL-divergence by a combination of $\ell_1$ and $\ell_2$ distance. This inequality may be of independent interest.
The idea of studying Sinkhorn-Knopp convergence via KL-divergence is not new and has indeed been previously explored. Our contribution is an elementary, self-contained presentation of this approach and an interesting new inequality that yields a significantly stronger convergence guarantee for the extensively studied $\ell_2$-error.
△ Less
Submitted 16 February, 2018; v1 submitted 8 January, 2018;
originally announced January 2018.
-
The K2-HERMES Survey. I. Planet Candidate Properties from K2 Campaigns 1-3
Authors:
Robert A. Wittenmyer,
Sanjib Sharma,
Dennis Stello,
Sven Buder,
Janez Kos,
Martin Asplund,
Ly Duong,
Jane Lin,
Karin Lind,
Melissa Ness,
Tomaz Zwitter,
Jonathan Horner,
Jake Clark,
Stephen R. Kane,
Daniel Huber,
Joss Bland-Hawthorn,
Andrew R. Casey,
Gayandhi M. De Silva,
Valentina D'Orazi,
Ken Freeman,
Sarah Martell,
Jeffrey D. Simpson,
Daniel B. Zucker,
Borja Anguiano,
Luca Casagrande
, et al. (9 additional authors not shown)
Abstract:
Accurate and precise radius estimates of transiting exoplanets are critical for understanding their compositions and formation mechanisms. To know the planet, we must know the host star in as much detail as possible. We present first results from the K2-HERMES project, which uses the HERMES multi-object spectrograph on the Anglo-Australian Telescope to obtain R$\sim$28,000 spectra of up to 360 sta…
▽ More
Accurate and precise radius estimates of transiting exoplanets are critical for understanding their compositions and formation mechanisms. To know the planet, we must know the host star in as much detail as possible. We present first results from the K2-HERMES project, which uses the HERMES multi-object spectrograph on the Anglo-Australian Telescope to obtain R$\sim$28,000 spectra of up to 360 stars in one exposure. This ongoing project aims to derive self-consistent spectroscopic parameters for about half of K2 target stars. We present complete stellar parameters and isochrone-derived masses and radii for 46 stars hosting 57 K2 candidate planets in Campaigns 1-3. Our revised host-star radii cast severe doubt on three candidate planets: EPIC\,201407812.01, EPIC\,203070421.01, and EPIC\,202843107.01, all of which now have inferred radii well in excess of the largest known inflated Jovian planets.
△ Less
Submitted 18 December, 2017;
originally announced December 2017.
-
On the Restricted Isometry of the Columnwise Khatri-Rao Product
Authors:
Saurabh Khanna,
Chandra R Murthy
Abstract:
The columnwise Khatri-Rao product of two matrices is an important matrix type, reprising its role as a structured sensing matrix in many fundamental linear inverse problems. Robust signal recovery in such inverse problems is often contingent on proving the restricted isometry property (RIP) of a certain system matrix expressible as a Khatri-Rao product of two matrices. In this work, we analyze the…
▽ More
The columnwise Khatri-Rao product of two matrices is an important matrix type, reprising its role as a structured sensing matrix in many fundamental linear inverse problems. Robust signal recovery in such inverse problems is often contingent on proving the restricted isometry property (RIP) of a certain system matrix expressible as a Khatri-Rao product of two matrices. In this work, we analyze the RIP of a generic columnwise Khatri-Rao product matrix by deriving two upper bounds for its $k^{\text{th}}$ order Restricted Isometry Constant ($k$-RIC) for different values of $k$. The first RIC bound is computed in terms of the individual RICs of the input matrices participating in the Khatri-Rao product. The second RIC bound is probabilistic, and is specified in terms of the input matrix dimensions. We show that the Khatri-Rao product of a pair of $m \times n$ sized random matrices comprising independent and identically distributed subgaussian entries satisfies $k$-RIP with arbitrarily high probability, provided $m$ exceeds $O(k \log n)$. Our RIC bounds confirm that the Khatri-Rao product exhibits stronger restricted isometry compared to its constituent matrices for the same RIP order. The proposed RIC bounds are potentially useful in the sample complexity analysis of several sparse recovery problems.
△ Less
Submitted 23 July, 2018; v1 submitted 18 September, 2017;
originally announced September 2017.
-
The TESS-HERMES survey Data Release 1: high-resolution spectroscopy of the TESS southern continuous viewing zone
Authors:
Sanjib Sharma,
Dennis Stello,
Sven Buder,
Janez Kos,
Joss Bland-Hawthorn,
Martin Asplund,
Ly Duong,
Jane Lin,
Karin Lind,
Melissa Ness,
Daniel Huber,
Tomaz Zwitter,
Gregor Traven,
Marc Hon,
Prajwal R. Kafle,
Shourya Khanna,
Hafiz Saddon,
Borja Anguiano,
Andrew R. Casey,
Ken Freeman,
Sarah Martell,
Gayandhi M. De Silva,
Jeffrey D. Simpson,
Rob A. Wittenmyer,
Daniel B. Zucker
Abstract:
The Transiting Exoplanet Survey Satellite (TESS) will provide high precision time-series photometry for millions of stars with at least a half-hour cadence. Of particular interest are the circular regions of 12-degree radius centered around the ecliptic poles that will be observed continuously for a full year. Spectroscopic stellar parameters are desirable to characterize and select suitable targe…
▽ More
The Transiting Exoplanet Survey Satellite (TESS) will provide high precision time-series photometry for millions of stars with at least a half-hour cadence. Of particular interest are the circular regions of 12-degree radius centered around the ecliptic poles that will be observed continuously for a full year. Spectroscopic stellar parameters are desirable to characterize and select suitable targets for TESS, whether they are focused on exploring exoplanets, stellar astrophysics, or Galactic archaeology. Here, we present spectroscopic stellar parameters ($T_{\rm eff}$, $\log g$, [Fe/H], $v \sin i$, $v_{\rm micro}$) for about 16,000 dwarf and subgiant stars in TESS' southern continuous viewing zone. For almost all the stars, we also present Bayesian estimates of stellar properties including distance, extinction, mass, radius, and age using theoretical isochrones. Stellar surface gravity and radius are made available for an additional set of roughly 8,500 red giants. All our target stars are in the range $10<V<13.1$. Among them, we identify and list 227 stars belonging to the Large Magellanic Cloud. The data were taken using the the High Efficiency and Resolution Multi-Element Spectrograph (HERMES, R $\sim 28,000$) at the Anglo-Australian Telescope as part of the TESS-HERMES survey. Comparing our results with the TESS Input Catalog (TIC) shows that the TIC is generally efficient in separating dwarfs and giants, but it has flagged more than hundred cool dwarfs ($T_{\rm eff}< 4800$ K) as giants, which ought to be high-priority targets for the exoplanet search. The catalog can be accessed via http://www.physics.usyd.edu.au/tess-hermes/ , or at MAST via https://archive.stsci.edu/prepds/tess-hermes/ .
△ Less
Submitted 30 September, 2017; v1 submitted 18 July, 2017;
originally announced July 2017.
-
Randomized Composable Coresets for Matching and Vertex Cover
Authors:
Sepehr Assadi,
Sanjeev Khanna
Abstract:
A common approach for designing scalable algorithms for massive data sets is to distribute the computation across, say $k$, machines and process the data using limited communication between them. A particularly appealing framework here is the simultaneous communication model whereby each machine constructs a small representative summary of its own data and one obtains an approximate/exact solution…
▽ More
A common approach for designing scalable algorithms for massive data sets is to distribute the computation across, say $k$, machines and process the data using limited communication between them. A particularly appealing framework here is the simultaneous communication model whereby each machine constructs a small representative summary of its own data and one obtains an approximate/exact solution from the union of the representative summaries. If the representative summaries needed for a problem are small, then this results in a communication-efficient and round-optimal protocol. While many fundamental graph problems admit efficient solutions in this model, two prominent problems are notably absent from the list of successes, namely, the maximum matching problem and the minimum vertex cover problem. Indeed, it was shown recently that for both these problems, even achieving a polylog$(n)$ approximation requires essentially sending the entire input graph from each machine.
The main insight of our work is that the intractability of matching and vertex cover in the simultaneous communication model is inherently connected to an adversarial partitioning of the underlying graph across machines. We show that when the underlying graph is randomly partitioned across machines, both these problems admit randomized composable coresets of size $\widetilde{O}(n)$ that yield an $\widetilde{O}(1)$-approximate solution. This results in an $\widetilde{O}(1)$-approximation simultaneous protocol for these problems with $\widetilde{O}(nk)$ total communication when the input is randomly partitioned across $k$ machines. We further prove the optimality of our results. Finally, by a standard application of composable coresets, our results also imply MapReduce algorithms with the same approximation guarantee in one or two rounds of communication
△ Less
Submitted 23 May, 2017;
originally announced May 2017.
-
The Stochastic Matching Problem: Beating Half with a Non-Adaptive Algorithm
Authors:
Sepehr Assadi,
Sanjeev Khanna,
Yang Li
Abstract:
In the stochastic matching problem, we are given a general (not necessarily bipartite) graph $G(V,E)$, where each edge in $E$ is realized with some constant probability $p > 0$ and the goal is to compute a bounded-degree (bounded by a function depending only on $p$) subgraph $H$ of $G$ such that the expected maximum matching size in $H$ is close to the expected maximum matching size in $G$. The al…
▽ More
In the stochastic matching problem, we are given a general (not necessarily bipartite) graph $G(V,E)$, where each edge in $E$ is realized with some constant probability $p > 0$ and the goal is to compute a bounded-degree (bounded by a function depending only on $p$) subgraph $H$ of $G$ such that the expected maximum matching size in $H$ is close to the expected maximum matching size in $G$. The algorithms in this setting are considered non-adaptive as they have to choose the subgraph $H$ without knowing any information about the set of realized edges in $G$. Originally motivated by an application to kidney exchange, the stochastic matching problem and its variants have received significant attention in recent years.
The state-of-the-art non-adaptive algorithms for stochastic matching achieve an approximation ratio of $\frac{1}{2}-ε$ for any $ε> 0$, naturally raising the question that if $1/2$ is the limit of what can be achieved with a non-adaptive algorithm. In this work, we resolve this question by presenting the first algorithm for stochastic matching with an approximation guarantee that is strictly better than $1/2$: the algorithm computes a subgraph $H$ of $G$ with the maximum degree $O(\frac{\log{(1/ p)}}{p})$ such that the ratio of expected size of a maximum matching in realizations of $H$ and $G$ is at least $1/2+δ_0$ for some absolute constant $δ_0 > 0$. The degree bound on $H$ achieved by our algorithm is essentially the best possible (up to an $O(\log{(1/p)})$ factor) for any constant factor approximation algorithm, since an $Ω(\frac{1}{p})$ degree in $H$ is necessary for a vertex to acquire at least one incident edge in a realization.
△ Less
Submitted 5 May, 2017;
originally announced May 2017.
-
On the Support Recovery of Jointly Sparse Gaussian Sources using Sparse Bayesian Learning
Authors:
Saurabh Khanna,
Chandra R. Murthy
Abstract:
In this work, we provide non-asymptotic, probabilistic guarantees for successful recovery of the common nonzero support of jointly sparse Gaussian sources in the multiple measurement vector (MMV) problem. The support recovery problem is formulated as the marginalized maximum likelihood (or type-II ML) estimation of the variance hyperparameters of a joint sparsity inducing Gaussian prior on the sou…
▽ More
In this work, we provide non-asymptotic, probabilistic guarantees for successful recovery of the common nonzero support of jointly sparse Gaussian sources in the multiple measurement vector (MMV) problem. The support recovery problem is formulated as the marginalized maximum likelihood (or type-II ML) estimation of the variance hyperparameters of a joint sparsity inducing Gaussian prior on the source signals. We derive conditions under which the resulting nonconvex constrained optimization perfectly recovers the nonzero support of a joint-sparse Gaussian source ensemble with arbitrarily high probability. The support error probability decays exponentially with the number of MMVs at a rate that depends on the smallest restricted singular value and the nonnegative null space property of the self Khatri-Rao product of the sensing matrix. Our analysis confirms that nonzero supports of size as high as O($m^2$) are recoverable from $m$ measurements per sparse vector. Our derived sufficient conditions for support consistency of the proposed constrained type-II ML solution also guarantee the support consistency of any global solution of the multiple sparse Bayesian learning (M-SBL) optimization whose nonzero coefficients lie inside a bounded interval. For the case of noiseless measurements, we further show that a single MMV is sufficient for perfect recovery of the $k$-sparse support by M-SBL, provided all subsets of $k + 1$ columns of the sensing matrix are linearly independent.
△ Less
Submitted 26 July, 2021; v1 submitted 15 March, 2017;
originally announced March 2017.
-
Outflows, infall and evolution of a sample of embedded low-mass protostars. The William Herschel Line Legacy (WILL) survey
Authors:
J. C. Mottram,
E. F. van Dishoeck,
L. E. Kristensen,
A. Karska,
I. San José-García,
S. Khanna,
G. J. Herczeg,
Ph. Andr,
S. Bontemps,
S. Cabrit,
M. T. Carney,
M. N. Drozdovskaya,
M. M. Dunham,
N. J. Evans,
D. Fedele,
J. D. Green,
D. Harsono,
D. Johnstone,
J. K. Jørgensen,
V. Könyves,
B. Nisini,
M. V. Persson,
M. Tafalla,
R. Visser,
U. A. Yıldız
Abstract:
[Abridged] We present spectroscopic observations in H$_{2}$O, CO and related species with \textit{Herschel} HIFI and PACS, as well as ground-based follow-up with the JCMT and APEX in CO, HCO$^{+}$ and isotopologues, of a sample of 49 nearby ($d<$500\,pc) candidate protostars. These data are used to study the outflow and envelope properties of these sources. We also compile their continuum SEDs in…
▽ More
[Abridged] We present spectroscopic observations in H$_{2}$O, CO and related species with \textit{Herschel} HIFI and PACS, as well as ground-based follow-up with the JCMT and APEX in CO, HCO$^{+}$ and isotopologues, of a sample of 49 nearby ($d<$500\,pc) candidate protostars. These data are used to study the outflow and envelope properties of these sources. We also compile their continuum SEDs in order to constrain their physical properties. Water emission is dominated by shocks associated with the outflow, rather than the cooler, slower entrained outflowing gas probed by ground-based CO observations. These shocks become less energetic as sources evolve from Class 0 to Class I. The fraction of mass in the outflow relative to the total envelope (i.e. $M_{\mathrm{out}}/M_{\mathrm{env}}$) remains broadly constant between Class 0 and I. The median value ($\sim$1$\%$) is consistent with a core to star formation efficiency on the order of 50$\%$ and an outflow duty cycle on the order of 5$\%$. Entrainment efficiency, as probed by $F_{\mathrm{CO}}/\dot{M}_{\mathrm{acc}}$, is also invariant with source properties and evolutionary stage. The median value (6.3\kms{}) suggests an entrainment efficiency of between 30 and 60$\%$ if the wind is launched at $\sim$1AU. $L$[O\,{\sc i}] is strongly correlated with $L_{\mathrm{bol}}$ but not with $M_{\mathrm{env}}$, while low-$J$ CO is more closely correlated with the latter than the former. This suggests that [O\,{\sc i}] traces the present-day accretion activity while CO traces time-averaged accretion over the dynamical timescale of the outflow. $L$[O\,{\sc i}] does not vary from Class 0 to Class I, unlike CO and H$_{2}$O. This is likely due to the ratio of atomic to molecular gas in the wind increasing as the source evolves, balancing out the decrease in mass accretion rate. Infall signatures are detected in HCO$^{+}$ and H$_{2}$O in a few sources.
△ Less
Submitted 19 January, 2017; v1 submitted 17 January, 2017;
originally announced January 2017.
-
On Estimating Maximum Matching Size in Graph Streams
Authors:
Sepehr Assadi,
Sanjeev Khanna,
Yang Li
Abstract:
We study the problem of estimating the maximum matching size in graphs whose edges are revealed in a streaming manner. We consider both insertion-only streams and dynamic streams and present new upper and lower bound results for both models.
On the upper bound front, we show that an $α$-approximate estimate of the matching size can be computed in dynamic streams using $\widetilde{O}({n^2/α^4})$…
▽ More
We study the problem of estimating the maximum matching size in graphs whose edges are revealed in a streaming manner. We consider both insertion-only streams and dynamic streams and present new upper and lower bound results for both models.
On the upper bound front, we show that an $α$-approximate estimate of the matching size can be computed in dynamic streams using $\widetilde{O}({n^2/α^4})$ space, and in insertion-only streams using $\widetilde{O}(n/α^2)$-space. On the lower bound front, we prove that any $α$-approximation algorithm for estimating matching size in dynamic graph streams requires $Ω(\sqrt{n}/α^{2.5})$ bits of space, even if the underlying graph is both sparse and has arboricity bounded by $O(α)$. We further improve our lower bound to $Ω(n/α^2)$ in the case of dense graphs.
Furthermore, we prove that a $(1+ε)$-approximation to matching size in insertion-only streams requires RS$(n) \cdot n^{1-O(ε)}$ space; here, RS${n}$ denotes the maximum number of edge-disjoint induced matchings of size $Θ(n)$ in an $n$-vertex graph. It is a major open problem to determine the value of RS$(n)$, and current results leave open the possibility that RS$(n)$ may be as large as $n/\log n$. We also show how to avoid the dependency on the parameter RS$(n)$ in proving lower bound for dynamic streams and present a near-optimal lower bound of $n^{2-O(ε)}$ for $(1+ε)$-approximation in this model.
Using a well-known connection between matching size and matrix rank, all our lower bounds also hold for the problem of estimating matrix rank. In particular our results imply a near-optimal $n^{2-O(ε)}$ bit lower bound for $(1+ε)$-approximation of matrix ranks for dense matrices in dynamic streams, answering an open question of Li and Woodruff (STOC 2016).
△ Less
Submitted 16 January, 2017;
originally announced January 2017.
-
Ultrasensitive Self-powered large area planar GaN UV-photodetector using reduced graphene oxide electrodes
Authors:
Nisha Prakash,
Manjri Singh,
Gaurav Kumar,
Arun Barvat,
Kritika Anand,
Prabir Pal,
Surinder P. Singh,
Suraj P. Khanna
Abstract:
A simplistic design of a self-powered UV-photodetector device based on hybrid r-GO/GaN is demonstrated. Under zero bias, the fabricated hybrid photodetector shows a photosensivity of ~ 85% while ohmic contact GaN photodetector with identical device structure exhibits only ~ 5.3% photosensivity at 350 nm illumination (18 microWatt/cm^2). The responsivity and detectivity of the hybrid device were fo…
▽ More
A simplistic design of a self-powered UV-photodetector device based on hybrid r-GO/GaN is demonstrated. Under zero bias, the fabricated hybrid photodetector shows a photosensivity of ~ 85% while ohmic contact GaN photodetector with identical device structure exhibits only ~ 5.3% photosensivity at 350 nm illumination (18 microWatt/cm^2). The responsivity and detectivity of the hybrid device were found to be 1.54 mA/W and 1.45x10^10 Jones (cm Hz^(1/2) W^(-1)), respectively at zero bias under 350 nm illumination (18 microWatt/cm^2) with fast response (60 ms), recovery time (267 ms) and excellent repeatability. Power density-dependent responsivity & detectivity revealed ultrasensitive behaviour under low light conditions. The source of observed self-powered effect in hybrid photodetector is attributed to the depletion region formed at the r-GO and GaN quasi-ohmic interface.
△ Less
Submitted 15 November, 2016; v1 submitted 11 November, 2016;
originally announced November 2016.
-
Magnetic Behavior of Superatom-Fullerene Assemblies
Authors:
Pallabi Sutradhar,
Vikas Chauhan,
Shiv N. Khanna,
Jayasimha Atulasimha
Abstract:
It has recently been possible to synthesize ordered assemblies composed of magnetic superatomic clusters Ni9Te6(PEt3)8 separated by C60 and study their magnetic behavior. We have carried out theoretical studies on model systems consisting of magnetic superatoms separated by non-magnetic species to examine the evolution in magnetic response as the nature of the magnetic superatom (directions of spi…
▽ More
It has recently been possible to synthesize ordered assemblies composed of magnetic superatomic clusters Ni9Te6(PEt3)8 separated by C60 and study their magnetic behavior. We have carried out theoretical studies on model systems consisting of magnetic superatoms separated by non-magnetic species to examine the evolution in magnetic response as the nature of the magnetic superatom (directions of spin quantization), the strength of isotropic and anisotropic interactions, the magnetic anisotropy energy, and the size of the assembly are varied. We have examined square planar configurations consisting 16, 24 and 48 sites with 8, 12 and 24 magnetic superatoms respectively. The magnetic atoms are allowed 2 or 5 orientations. The model Hamiltonian includes isotropic exchange interactions with second nearest neighbor ferromagnetic and nearest neighbor antiferromagnetic couplings and anisotropic Dzyaloshinskii-Moriya interactions. It is shown that the inclusion of Dzyaloshinskii-Moriya interaction that cause spin canting is necessary to get qualitative response as observed in experiments.
△ Less
Submitted 18 July, 2016;
originally announced July 2016.
-
Tight Bounds for Single-Pass Streaming Complexity of the Set Cover Problem
Authors:
Sepehr Assadi,
Sanjeev Khanna,
Yang Li
Abstract:
We resolve the space complexity of single-pass streaming algorithms for approximating the classic set cover problem. For finding an $α$-approximate set cover (for any $α= o(\sqrt{n})$) using a single-pass streaming algorithm, we show that $Θ(mn/α)$ space is both sufficient and necessary (up to an $O(\log{n})$ factor); here $m$ denotes number of the sets and $n$ denotes size of the universe. This p…
▽ More
We resolve the space complexity of single-pass streaming algorithms for approximating the classic set cover problem. For finding an $α$-approximate set cover (for any $α= o(\sqrt{n})$) using a single-pass streaming algorithm, we show that $Θ(mn/α)$ space is both sufficient and necessary (up to an $O(\log{n})$ factor); here $m$ denotes number of the sets and $n$ denotes size of the universe. This provides a strong negative answer to the open question posed by Indyk et al. (2015) regarding the possibility of having a single-pass algorithm with a small approximation factor that uses sub-linear space.
We further study the problem of estimating the size of a minimum set cover (as opposed to finding the actual sets), and establish that an additional factor of $α$ saving in the space is achievable in this case and that this is the best possible. In other words, we show that $Θ(mn/α^2)$ space is both sufficient and necessary (up to logarithmic factors) for estimating the size of a minimum set cover to within a factor of $α$. Our algorithm in fact works for the more general problem of estimating the optimal value of a covering integer program. On the other hand, our lower bound holds even for set cover instances where the sets are presented in a random order.
△ Less
Submitted 17 March, 2016;
originally announced March 2016.
-
Flow and Heat Transfer in Micro Pin Fin Heat Sinks with Nano-Encapsulated Phase Change Materials
Authors:
Bahram Rajabifar,
Hamid Reza Seyf,
Yuwen Zhang,
Sanjeev K. Khanna
Abstract:
In this paper, a 3D conjugated heat transfer model for Nano-Encapsulated Phase Change Materials (NEPCMs) cooled Micro Pin Fin Heat Sink (MPFHS) is presented. The governing equations of flow and heat transfer are solved using a finite volume method based on collocated grid and the results are validated with the available data reported in the literature. The effect of nanoparticles volume fraction (…
▽ More
In this paper, a 3D conjugated heat transfer model for Nano-Encapsulated Phase Change Materials (NEPCMs) cooled Micro Pin Fin Heat Sink (MPFHS) is presented. The governing equations of flow and heat transfer are solved using a finite volume method based on collocated grid and the results are validated with the available data reported in the literature. The effect of nanoparticles volume fraction (C = 0.1, 0.2, 0.3), inlet velocity (Vin = 0.015, 0.030, 0.045 m/s), and bottom wall temperature (Twall = 299.15, 303.15, 315.15, 350.15 K) are studied on Nusselt and Euler numbers as well as temperature contours in the system. The results indicate that significant heat transfer enhancement is achieved when using NEPCM slurry as an advanced coolant. The maximum Nusselt number when NEPCM slurry (C = 0.3) with Vin = 0.015, 0.030, 0.045 (m/s) is employed, are 2.27, 1.81, 1.56 times higher than the ones with base fluid, respectively. However, with increasing bottom wall temperature, the Nusselt number first increases then decreases. The former is due to higher heat transfer capability of coolant at temperatures over the melting range of PCM particles due to partial melting of nanoparticles in this range. While, the latter phenomena is due to the lower capability of NEPCM particles and consequently coolant in absorbing heat at coolant temperatures higher than the temperature correspond to fully melted NEPCM. It was observed that NEPCM slurry has a drastic effect on Euler number, and with increasing volume fraction and decreasing inlet velocity, the Euler number increases accordingly.
△ Less
Submitted 12 February, 2016;
originally announced February 2016.
-
Algorithms for Provisioning Queries and Analytics
Authors:
Sepehr Assadi,
Sanjeev Khanna,
Yang Li,
Val Tannen
Abstract:
Provisioning is a technique for avoiding repeated expensive computations in what-if analysis. Given a query, an analyst formulates $k$ hypotheticals, each retaining some of the tuples of a database instance, possibly overlap**, and she wishes to answer the query under scenarios, where a scenario is defined by a subset of the hypotheticals that are "turned on". We say that a query admits compact…
▽ More
Provisioning is a technique for avoiding repeated expensive computations in what-if analysis. Given a query, an analyst formulates $k$ hypotheticals, each retaining some of the tuples of a database instance, possibly overlap**, and she wishes to answer the query under scenarios, where a scenario is defined by a subset of the hypotheticals that are "turned on". We say that a query admits compact provisioning if given any database instance and any $k$ hypotheticals, one can create a poly-size (in $k$) sketch that can then be used to answer the query under any of the $2^{k}$ possible scenarios without accessing the original instance.
In this paper, we focus on provisioning complex queries that combine relational algebra (the logical component), grou**, and statistics/analytics (the numerical component). We first show that queries that compute quantiles or linear regression (as well as simpler queries that compute count and sum/average of positive values) can be compactly provisioned to provide (multiplicative) approximate answers to an arbitrary precision. In contrast, exact provisioning for each of these statistics requires the sketch size to be exponential in $k$. We then establish that for any complex query whose logical component is a positive relational algebra query, as long as the numerical component can be compactly provisioned, the complex query itself can be compactly provisioned. On the other hand, introducing negation or recursion in the logical component again requires the sketch size to be exponential in $k$. While our positive results use algorithms that do not access the original instance after a scenario is known, we prove our lower bounds even for the case when, knowing the scenario, limited access to the instance is allowed.
△ Less
Submitted 18 December, 2015;
originally announced December 2015.
-
Strategic Network Formation with Attack and Immunization
Authors:
Sanjeev Goyal,
Shahin Jabbari,
Michael Kearns,
Sanjeev Khanna,
Jamie Morgenstern
Abstract:
Strategic network formation arises where agents receive benefit from connections to other agents, but also incur costs for forming links. We consider a new network formation game that incorporates an adversarial attack, as well as immunization against attack. An agent's benefit is the expected size of her connected component post-attack, and agents may also choose to immunize themselves from attac…
▽ More
Strategic network formation arises where agents receive benefit from connections to other agents, but also incur costs for forming links. We consider a new network formation game that incorporates an adversarial attack, as well as immunization against attack. An agent's benefit is the expected size of her connected component post-attack, and agents may also choose to immunize themselves from attack at some additional cost. Our framework is a stylized model of settings where reachability rather than centrality is the primary concern and vertices vulnerable to attacks may reduce risk via costly measures.
In the reachability benefit model without attack or immunization, the set of equilibria is the empty graph and any tree. The introduction of attack and immunization changes the game dramatically; new equilibrium topologies emerge, some more sparse and some more dense than trees. We show that, under a mild assumption on the adversary, every equilibrium network with $n$ agents contains at most $2n-4$ edges for $n\geq 4$. So despite permitting topologies denser than trees, the amount of overbuilding is limited. We also show that attack and immunization don't significantly erode social welfare: every non-trivial equilibrium with respect to several adversaries has welfare at least as that of any equilibrium in the attack-free model.
We complement our theory with simulations demonstrating fast convergence of a new bounded rationality dynamic which generalizes linkstable best response but is considerably more powerful in our game. The simulations further elucidate the wide variety of asymmetric equilibria and demonstrate topological consequences of the dynamics e.g. heavy-tailed degree distributions. Finally, we report on a behavioral experiment on our game with over 100 participants, where despite the complexity of the game, the resulting network was surprisingly close to equilibrium.
△ Less
Submitted 9 November, 2016; v1 submitted 16 November, 2015;
originally announced November 2015.
-
Probing the photoionised outflow in the NLS1 Ark 564: An XMM-Newton view
Authors:
Shourya Khanna,
Jelle. S. Kaastra,
Missagh Mehdipour
Abstract:
We present a detailed analysis of xmm X-ray observations of the Narrow line Seyfert-1 (NLS1) galaxy Ark 564 taken between 2000 and 2011. High-resolution X-ray spectroscopy is carried out on the resultant high signal-to-noise stacked spectrum. We find three separate photoionised warm absorbers outflowing at velocities unusually lower than typical NLS1s. Using recombination timescale estimates, impr…
▽ More
We present a detailed analysis of xmm X-ray observations of the Narrow line Seyfert-1 (NLS1) galaxy Ark 564 taken between 2000 and 2011. High-resolution X-ray spectroscopy is carried out on the resultant high signal-to-noise stacked spectrum. We find three separate photoionised warm absorbers outflowing at velocities unusually lower than typical NLS1s. Using recombination timescale estimates, improved constraints on the location of these clouds show they could be located beyond 4 pc from the central source. Our estimates of the outflow kinetics suggest that the AGN in Ark 564 is unlikely to affect the host galaxy in its current state but over typical lifetime of 10^7 years the ISM could be affected. The individual observations used here suggest the luminosity varies over weekly timescales and in addition we find evidence of gas response to changes in the ionising radiation.
△ Less
Submitted 10 November, 2015;
originally announced November 2015.
-
Dynamic Sketching for Graph Optimization Problems with Applications to Cut-Preserving Sketches
Authors:
Sepehr Assadi,
Sanjeev Khanna,
Yang Li,
Val Tannen
Abstract:
In this paper, we introduce a new model for sublinear algorithms called \emph{dynamic sketching}. In this model, the underlying data is partitioned into a large \emph{static} part and a small \emph{dynamic} part and the goal is to compute a summary of the static part (i.e, a \emph{sketch}) such that given any \emph{update} for the dynamic part, one can combine it with the sketch to compute a given…
▽ More
In this paper, we introduce a new model for sublinear algorithms called \emph{dynamic sketching}. In this model, the underlying data is partitioned into a large \emph{static} part and a small \emph{dynamic} part and the goal is to compute a summary of the static part (i.e, a \emph{sketch}) such that given any \emph{update} for the dynamic part, one can combine it with the sketch to compute a given function. We say that a sketch is \emph{compact} if its size is bounded by a polynomial function of the length of the dynamic data, (essentially) independent of the size of the static part.
A graph optimization problem $P$ in this model is defined as follows. The input is a graph $G(V,E)$ and a set $T \subseteq V$ of $k$ terminals; the edges between the terminals are the dynamic part and the other edges in $G$ are the static part. The goal is to summarize the graph $G$ into a compact sketch (of size poly$(k)$) such that given any set $Q$ of edges between the terminals, one can answer the problem $P$ for the graph obtained by inserting all edges in $Q$ to $G$, using only the sketch.
We study the fundamental problem of computing a maximum matching and prove tight bounds on the sketch size. In particular, we show that there exists a (compact) dynamic sketch of size $O(k^2)$ for the matching problem and any such sketch has to be of size $Ω(k^2)$. Our sketch for matchings can be further used to derive compact dynamic sketches for other fundamental graph problems involving cuts and connectivities. Interestingly, our sketch for matchings can also be used to give an elementary construction of a \emph{cut-preserving vertex sparsifier} with space $O(kC^2)$ for $k$-terminal graphs; here $C$ is the total capacity of the edges incident on the terminals. Additionally, we give an improved lower bound (in terms of $C$) of $Ω(C/\log{C})$ on size of cut-preserving vertex sparsifiers.
△ Less
Submitted 12 October, 2015;
originally announced October 2015.
-
Fast Convergence in the Double Oral Auction
Authors:
Sepehr Assadi,
Sanjeev Khanna,
Yang Li,
Rakesh Vohra
Abstract:
A classical trading experiment consists of a set of unit demand buyers and unit supply sellers with identical items. Each agent's value or opportunity cost for the item is their private information and preferences are quasi-linear. Trade between agents employs a double oral auction (DOA) in which both buyers and sellers call out bids or offers which an auctioneer recognizes. Transactions resulting…
▽ More
A classical trading experiment consists of a set of unit demand buyers and unit supply sellers with identical items. Each agent's value or opportunity cost for the item is their private information and preferences are quasi-linear. Trade between agents employs a double oral auction (DOA) in which both buyers and sellers call out bids or offers which an auctioneer recognizes. Transactions resulting from accepted bids and offers are recorded. This continues until there are no more acceptable bids or offers. Remarkably, the experiment consistently terminates in a Walrasian price. The main result of this paper is a mechanism in the spirit of the DOA that converges to a Walrasian equilibrium in a polynomial number of steps, thus providing a theoretical basis for the above-described empirical phenomenon. It is well-known that computation of a Walrasian equilibrium for this market corresponds to solving a maximum weight bipartite matching problem. The uncoordinated but rational responses of agents thus solve in a distributed fashion a maximum weight bipartite matching problem that is encoded by their private valuations. We show, furthermore, that every Walrasian equilibrium is reachable by some sequence of responses. This is in contrast to the well known auction algorithms for this problem which only allow one side to make offers and thus essentially choose an equilibrium that maximizes the surplus for the side making offers. Our results extend to the setting where not every agent pair is allowed to trade with each other.
△ Less
Submitted 30 September, 2015;
originally announced October 2015.
-
Decentralized Joint-Sparse Signal Recovery: A Sparse Bayesian Learning Approach
Authors:
Saurabh Khanna,
Chandra R. Murthy
Abstract:
This work proposes a decentralized, iterative, Bayesian algorithm called CB-DSBL for in-network estimation of multiple jointly sparse vectors by a network of nodes, using noisy and underdetermined linear measurements. The proposed algorithm exploits the network wide joint sparsity of the un- known sparse vectors to recover them from significantly fewer number of local measurements compared to stan…
▽ More
This work proposes a decentralized, iterative, Bayesian algorithm called CB-DSBL for in-network estimation of multiple jointly sparse vectors by a network of nodes, using noisy and underdetermined linear measurements. The proposed algorithm exploits the network wide joint sparsity of the un- known sparse vectors to recover them from significantly fewer number of local measurements compared to standalone sparse signal recovery schemes. To reduce the amount of inter-node communication and the associated overheads, the nodes exchange messages with only a small subset of their single hop neighbors. Under this communication scheme, we separately analyze the convergence of the underlying Alternating Directions Method of Multipliers (ADMM) iterations used in our proposed algorithm and establish its linear convergence rate. The findings from the convergence analysis of decentralized ADMM are used to accelerate the convergence of the proposed CB-DSBL algorithm. Using Monte Carlo simulations, we demonstrate the superior signal reconstruction as well as support recovery performance of our proposed algorithm compared to existing decentralized algorithms: DRL-1, DCOMP and DCSP.
△ Less
Submitted 18 December, 2015; v1 submitted 9 July, 2015;
originally announced July 2015.
-
Tight Bounds for Linear Sketches of Approximate Matchings
Authors:
Sepehr Assadi,
Sanjeev Khanna,
Yang Li,
Grigory Yaroslavtsev
Abstract:
We resolve the space complexity of linear sketches for approximating the maximum matching problem in dynamic graph streams where the stream may include both edge insertion and deletion. Specifically, we show that for any $ε> 0$, there exists a one-pass streaming algorithm, which only maintains a linear sketch of size $\tilde{O}(n^{2-3ε})$ bits and recovers an $n^ε$-approximate maximum matching in…
▽ More
We resolve the space complexity of linear sketches for approximating the maximum matching problem in dynamic graph streams where the stream may include both edge insertion and deletion. Specifically, we show that for any $ε> 0$, there exists a one-pass streaming algorithm, which only maintains a linear sketch of size $\tilde{O}(n^{2-3ε})$ bits and recovers an $n^ε$-approximate maximum matching in dynamic graph streams, where $n$ is the number of vertices in the graph. In contrast to the extensively studied insertion-only model, to the best of our knowledge, no non-trivial single-pass streaming algorithms were previously known for approximating the maximum matching problem on general dynamic graph streams.
Furthermore, we show that our upper bound is essentially tight. Namely, any linear sketch for approximating the maximum matching to within a factor of $O(n^ε)$ has to be of size $n^{2-3ε-o(1)}$ bits. We establish this lower bound by analyzing the corresponding simultaneous number-in-hand communication model, with a combinatorial construction based on Ruzsa-Szemerédi graphs.
△ Less
Submitted 6 May, 2015;
originally announced May 2015.
-
Sensitivity and Computational Complexity in Financial Networks
Authors:
Brett Hemenway,
Sanjeev Khanna
Abstract:
Modern financial networks exhibit a high degree of interconnectedness and determining the causes of instability and contagion in financial networks is necessary to inform policy and avoid future financial collapse. In the American Economic Review, Elliott, Golub and Jackson proposed a simple model for capturing the dynamics of complex financial networks. In Elliott, Golub and Jackson's model, each…
▽ More
Modern financial networks exhibit a high degree of interconnectedness and determining the causes of instability and contagion in financial networks is necessary to inform policy and avoid future financial collapse. In the American Economic Review, Elliott, Golub and Jackson proposed a simple model for capturing the dynamics of complex financial networks. In Elliott, Golub and Jackson's model, each institution in the network can buy underlying assets or percentage shares in other institutions (cross-holdings) and if any institution's value drops below a critical threshold value, its value suffers an additional failure cost.
This work shows that even in simple model put forward by Elliott, Golub and Jackson there are fundamental barriers to understanding the risks that are inherent in a network. First, if institutions are not required to maintain a minimum amount of self-holdings, an $ε$ change in investments by a single institution can have an arbitrarily magnified influence on the net worth of the institutions in the system. This sensitivity result shows that if institutions have small self-holdings, then estimating the market value of an institution requires almost perfect information about every cross-holding in the system. Second, we show that even if a regulator has complete information about all cross-holdings in the system, it may be computationally intractable to even estimate the number of failures that could be caused by an arbitrarily small shock to the system. Together, these results show that any uncertainty in the cross-holdings or values of the underlying assets can be amplified by the network to arbitrarily large uncertainty in the valuations of institutions in the network.
△ Less
Submitted 25 October, 2016; v1 submitted 26 March, 2015;
originally announced March 2015.
-
Eigenmodes of trapped horizontal oscillations in accretion disks
Authors:
S. Khanna,
Z. Strzelecka,
B. Mishra,
W. Kluzniak
Abstract:
We present eigenfrequencies and eigenfunctions of trapped acoustic-inertial oscillations of thin accretion disks for a Schwarzschild black hole and a rapidly rotating Newtonian star (a Maclaurin spheroid). The results are derived in the formalism of Nowak and Wagoner (1991) with the assumption that the oscillatory motion is parallel to the midplane of the disk. The first four radial modes for each…
▽ More
We present eigenfrequencies and eigenfunctions of trapped acoustic-inertial oscillations of thin accretion disks for a Schwarzschild black hole and a rapidly rotating Newtonian star (a Maclaurin spheroid). The results are derived in the formalism of Nowak and Wagoner (1991) with the assumption that the oscillatory motion is parallel to the midplane of the disk. The first four radial modes for each of five azimuthal modes $m = 0$ through $m = 4$ are presented. The frequencies and wavefunctions of the lowest modes may be accurately approximated by the Airy function.
△ Less
Submitted 17 November, 2014;
originally announced November 2014.
-
On $(1,ε)$-Restricted Assignment Makespan Minimization
Authors:
Deeparnab Chakrabarty,
Sanjeev Khanna,
Shi Li
Abstract:
Makespan minimization on unrelated machines is a classic problem in approximation algorithms. No polynomial time $(2-δ)$-approximation algorithm is known for the problem for constant $δ> 0$. This is true even for certain special cases, most notably the restricted assignment problem where each job has the same load on any machine but can be assigned to one from a specified subset. Recently in a bre…
▽ More
Makespan minimization on unrelated machines is a classic problem in approximation algorithms. No polynomial time $(2-δ)$-approximation algorithm is known for the problem for constant $δ> 0$. This is true even for certain special cases, most notably the restricted assignment problem where each job has the same load on any machine but can be assigned to one from a specified subset. Recently in a breakthrough result, Svensson [Svensson, 2011] proved that the integrality gap of a certain configuration LP relaxation is upper bounded by $1.95$ for the restricted assignment problem; however, the rounding algorithm is not known to run in polynomial time.
In this paper we consider the $(1,\varepsilon)$-restricted assignment problem where each job is either heavy ($p_j = 1$) or light ($p_j = \varepsilon$), for some parameter $\varepsilon > 0$. Our main result is a $(2-δ)$-approximate polynomial time algorithm for the $(1,ε)$-restricted assignment problem for a fixed constant $δ> 0$. Even for this special case, the best polynomial-time approximation factor known so far is 2. We obtain this result by rounding the configuration LP relaxation for this problem. A simple reduction from vertex cover shows that this special case remains NP-hard to approximate to within a factor better than 7/6.
△ Less
Submitted 27 October, 2014;
originally announced October 2014.
-
Streaming Lower Bounds for Approximating MAX-CUT
Authors:
Michael Kapralov,
Sanjeev Khanna,
Madhu Sudan
Abstract:
We consider the problem of estimating the value of max cut in a graph in the streaming model of computation. At one extreme, there is a trivial $2$-approximation for this problem that uses only $O(\log n)$ space, namely, count the number of edges and output half of this value as the estimate for max cut value. On the other extreme, if one allows $\tilde{O}(n)$ space, then a near-optimal solution t…
▽ More
We consider the problem of estimating the value of max cut in a graph in the streaming model of computation. At one extreme, there is a trivial $2$-approximation for this problem that uses only $O(\log n)$ space, namely, count the number of edges and output half of this value as the estimate for max cut value. On the other extreme, if one allows $\tilde{O}(n)$ space, then a near-optimal solution to the max cut value can be obtained by storing an $\tilde{O}(n)$-size sparsifier that essentially preserves the max cut. An intriguing question is if poly-logarithmic space suffices to obtain a non-trivial approximation to the max-cut value (that is, beating the factor $2$). It was recently shown that the problem of estimating the size of a maximum matching in a graph admits a non-trivial approximation in poly-logarithmic space.
Our main result is that any streaming algorithm that breaks the $2$-approximation barrier requires $\tildeΩ(\sqrt{n})$ space even if the edges of the input graph are presented in random order. Our result is obtained by exhibiting a distribution over graphs which are either bipartite or $\frac{1}{2}$-far from being bipartite, and establishing that $\tildeΩ(\sqrt{n})$ space is necessary to differentiate between these two cases. Thus as a direct corollary we obtain that $\tildeΩ(\sqrt{n})$ space is also necessary to test if a graph is bipartite or $\frac{1}{2}$-far from being bipartite.
We also show that for any $ε> 0$, any streaming algorithm that obtains a $(1 + ε)$-approximation to the max cut value when edges arrive in adversarial order requires $n^{1 - O(ε)}$ space, implying that $Ω(n)$ space is necessary to obtain an arbitrarily good approximation to the max cut value.
△ Less
Submitted 7 September, 2014;
originally announced September 2014.
-
Differential Privacy: An Economic Method for Choosing Epsilon
Authors:
Justin Hsu,
Marco Gaboardi,
Andreas Haeberlen,
Sanjeev Khanna,
Arjun Narayan,
Benjamin C. Pierce,
Aaron Roth
Abstract:
Differential privacy is becoming a gold standard for privacy research; it offers a guaranteed bound on loss of privacy due to release of query results, even under worst-case assumptions. The theory of differential privacy is an active research area, and there are now differentially private algorithms for a wide range of interesting problems.
However, the question of when differential privacy wor…
▽ More
Differential privacy is becoming a gold standard for privacy research; it offers a guaranteed bound on loss of privacy due to release of query results, even under worst-case assumptions. The theory of differential privacy is an active research area, and there are now differentially private algorithms for a wide range of interesting problems.
However, the question of when differential privacy works in practice has received relatively little attention. In particular, there is still no rigorous method for choosing the key parameter $ε$, which controls the crucial tradeoff between the strength of the privacy guarantee and the accuracy of the published results.
In this paper, we examine the role that these parameters play in concrete applications, identifying the key questions that must be addressed when choosing specific values. This choice requires balancing the interests of two different parties: the data analyst and the prospective participant, who must decide whether to allow their data to be included in the analysis. We propose a simple model that expresses this balance as formulas over a handful of parameters, and we use our model to choose $ε$ on a series of simple statistical studies. We also explore a surprising insight: in some circumstances, a differentially private study can be more accurate than a non-private study for the same cost, under our model. Finally, we discuss the simplifying assumptions in our model and outline a research agenda for possible refinements.
△ Less
Submitted 13 February, 2014;
originally announced February 2014.
-
Continuous-wave coherent imaging with terahertz quantum cascade lasers using electro-optic harmonic sampling
Authors:
Marco Ravaro,
Vishal Jagtap,
Giorgio Santarelli,
Carlo Sirtori,
Lianhe Li,
S. P. Khanna,
Edmund H. Linfield,
Stefano Barbieri
Abstract:
We demonstrate a coherent imaging system based on a terahertz (THz) frequency quantum cascade laser (QCL) phase-locked to a near-infrared fs-laser comb. The phase locking enables coherent electro-optic sampling of the continuous-wave radiation emitted by the QCL through the generation of a heterodyne beat-note signal. We use this beat-note signal to demonstrate raster scan coherent imaging using a…
▽ More
We demonstrate a coherent imaging system based on a terahertz (THz) frequency quantum cascade laser (QCL) phase-locked to a near-infrared fs-laser comb. The phase locking enables coherent electro-optic sampling of the continuous-wave radiation emitted by the QCL through the generation of a heterodyne beat-note signal. We use this beat-note signal to demonstrate raster scan coherent imaging using a QCL emitting at 2.5 THz. At this frequency the detection noise floor of our system is of 3 pW/Hz and the long-term phase stability is <3 degrees/h, limited by the mechanical stability of the apparatus.
△ Less
Submitted 11 April, 2013;
originally announced April 2013.
-
Terahertz quantum cascade lasers with thin resonant-phonon depopulation active regions and surface-plasmon waveguides
Authors:
M. Salih,
P. Dean,
A. Valavanis,
S. P. Khanna,
L. H. Li,
J. E. Cunningham,
A. G. Davies,
E. H. Linfield
Abstract:
We report three-well, resonant-phonon depopulation terahertz quantum cascade lasers with semi-insulating surface-plasmon waveguides and reduced active region (AR) thicknesses. Devices with thicknesses of 10, 7.5, 6, and 5 μm are compared in terms of threshold current density, maximum operating temperature, output power and AR temperature. Thinner ARs are technologically less demanding for epitaxia…
▽ More
We report three-well, resonant-phonon depopulation terahertz quantum cascade lasers with semi-insulating surface-plasmon waveguides and reduced active region (AR) thicknesses. Devices with thicknesses of 10, 7.5, 6, and 5 μm are compared in terms of threshold current density, maximum operating temperature, output power and AR temperature. Thinner ARs are technologically less demanding for epitaxial growth and result in reduced electrical heating of devices. However, it is found that 7.5-μm-thick devices give the lowest electrical power densities at threshold, as they represent the optimal trade-off between low electrical resistance and low threshold gain.
△ Less
Submitted 13 March, 2013;
originally announced March 2013.
-
The Power of Local Information in Social Networks
Authors:
Christian Borgs,
Michael Brautbar,
Jennifer Chayes,
Sanjeev Khanna,
Brendan Lucier
Abstract:
We study the power of \textit{local information algorithms} for optimization problems on social networks. We focus on sequential algorithms for which the network topology is initially unknown and is revealed only within a local neighborhood of vertices that have been irrevocably added to the output set. The distinguishing feature of this setting is that locality is necessitated by constraints on t…
▽ More
We study the power of \textit{local information algorithms} for optimization problems on social networks. We focus on sequential algorithms for which the network topology is initially unknown and is revealed only within a local neighborhood of vertices that have been irrevocably added to the output set. The distinguishing feature of this setting is that locality is necessitated by constraints on the network information visible to the algorithm, rather than being desirable for reasons of efficiency or parallelizability. In this sense, changes to the level of network visibility can have a significant impact on algorithm design.
We study a range of problems under this model of algorithms with local information. We first consider the case in which the underlying graph is a preferential attachment network. We show that one can find the node of maximum degree in the network in a polylogarithmic number of steps, using an opportunistic algorithm that repeatedly queries the visible node of maximum degree. This addresses an open question of Bollob{á}s and Riordan. In contrast, local information algorithms require a linear number of queries to solve the problem on arbitrary networks.
Motivated by problems faced by recruiters in online networks, we also consider network coverage problems such as finding a minimum dominating set. For this optimization problem we show that, if each node added to the output set reveals sufficient information about the set's neighborhood, then it is possible to design randomized algorithms for general networks that nearly match the best approximations possible even with full access to the graph structure. We show that this level of visibility is necessary.
We conclude that a network provider's decision of how much structure to make visible to its users can have a significant effect on a user's ability to interact strategically with the network.
△ Less
Submitted 13 October, 2013; v1 submitted 27 February, 2012;
originally announced February 2012.
-
Distributed Private Heavy Hitters
Authors:
Justin Hsu,
Sanjeev Khanna,
Aaron Roth
Abstract:
In this paper, we give efficient algorithms and lower bounds for solving the heavy hitters problem while preserving differential privacy in the fully distributed local model. In this model, there are n parties, each of which possesses a single element from a universe of size N. The heavy hitters problem is to find the identity of the most common element shared amongst the n parties. In the local m…
▽ More
In this paper, we give efficient algorithms and lower bounds for solving the heavy hitters problem while preserving differential privacy in the fully distributed local model. In this model, there are n parties, each of which possesses a single element from a universe of size N. The heavy hitters problem is to find the identity of the most common element shared amongst the n parties. In the local model, there is no trusted database administrator, and so the algorithm must interact with each of the $n$ parties separately, using a differentially private protocol. We give tight information-theoretic upper and lower bounds on the accuracy to which this problem can be solved in the local model (giving a separation between the local model and the more common centralized model of privacy), as well as computationally efficient algorithms even in the case where the data universe N may be exponentially large.
△ Less
Submitted 6 November, 2014; v1 submitted 22 February, 2012;
originally announced February 2012.
-
Mechanism Design and Risk Aversion
Authors:
Anand Bhalgat,
Tanmoy Chakraborty,
Sanjeev Khanna
Abstract:
We develop efficient algorithms to construct utility maximizing mechanisms in the presence of risk averse players (buyers and sellers) in Bayesian settings. We model risk aversion by a concave utility function, and players play strategically to maximize their expected utility. Bayesian mechanism design has usually focused on maximizing expected revenue in a {\em risk neutral} environment, and no s…
▽ More
We develop efficient algorithms to construct utility maximizing mechanisms in the presence of risk averse players (buyers and sellers) in Bayesian settings. We model risk aversion by a concave utility function, and players play strategically to maximize their expected utility. Bayesian mechanism design has usually focused on maximizing expected revenue in a {\em risk neutral} environment, and no succinct characterization of expected utility maximizing mechanisms is known even for single-parameter multi-unit auctions.
We first consider the problem of designing optimal DSIC mechanism for a risk averse seller in the case of multi-unit auctions, and we give a poly-time computable SPM that is $(1-1/e-\eps)$-approximation to the expected utility of the seller in an optimal DSIC mechanism. Our result is based on a novel application of a correlation gap bound, along with {\em splitting} and {\em merging} of random variables to redistribute probability mass across buyers. This allows us to reduce our problem to that of checking feasibility of a small number of distinct configurations, each of which corresponds to a covering LP. A feasible solution to the LP gives us the distribution on prices for each buyer to use in a randomized SPM.
We next consider the setting when buyers as well as the seller are risk averse, and the objective is to maximize the seller's expected utility. We design a truthful-in-expectation mechanism whose utility is a $(1-1/e -\eps)^3$-approximation to the optimal BIC mechanism under two mild assumptions. Our mechanism consists of multiple rounds that processes each buyer in a round with small probability. Lastly, we consider the problem of revenue maximization for a risk neutral seller in presence of risk averse buyers, and give a poly-time algorithm to design an optimal mechanism for the seller.
△ Less
Submitted 27 June, 2012; v1 submitted 24 July, 2011;
originally announced July 2011.
-
Delays and the Capacity of Continuous-time Channels
Authors:
Sanjeev Khanna,
Madhu Sudan
Abstract:
Any physical channel of communication offers two potential reasons why its capacity (the number of bits it can transmit in a unit of time) might be unbounded: (1) Infinitely many choices of signal strength at any given instant of time, and (2) Infinitely many instances of time at which signals may be sent. However channel noise cancels out the potential unboundedness of the first aspect, leaving t…
▽ More
Any physical channel of communication offers two potential reasons why its capacity (the number of bits it can transmit in a unit of time) might be unbounded: (1) Infinitely many choices of signal strength at any given instant of time, and (2) Infinitely many instances of time at which signals may be sent. However channel noise cancels out the potential unboundedness of the first aspect, leaving typical channels with only a finite capacity per instant of time. The latter source of infinity seems less studied. A potential source of unreliability that might restrict the capacity also from the second aspect is delay: Signals transmitted by the sender at a given point of time may not be received with a predictable delay at the receiving end. Here we examine this source of uncertainty by considering a simple discrete model of delay errors. In our model the communicating parties get to subdivide time as microscopically finely as they wish, but still have to cope with communication delays that are macroscopic and variable. The continuous process becomes the limit of our process as the time subdivision becomes infinitesimal. We taxonomize this class of communication channels based on whether the delays and noise are stochastic or adversarial; and based on how much information each aspect has about the other when introducing its errors. We analyze the limits of such channels and reach somewhat surprising conclusions: The capacity of a physical channel is finitely bounded only if at least one of the two sources of error (signal noise or delay noise) is adversarial. In particular the capacity is finitely bounded only if the delay is adversarial, or the noise is adversarial and acts with knowledge of the stochastic delay. If both error sources are stochastic, or if the noise is adversarial and independent of the stochastic delay, then the capacity of the associated physical channel is infinite.
△ Less
Submitted 17 May, 2011;
originally announced May 2011.
-
Social Welfare in One-sided Matching Markets without Money
Authors:
Anand Bhalgat,
Deeparnab Chakrabarty,
Sanjeev Khanna
Abstract:
We study social welfare in one-sided matching markets where the goal is to efficiently allocate n items to n agents that each have a complete, private preference list and a unit demand over the items. Our focus is on allocation mechanisms that do not involve any monetary payments. We consider two natural measures of social welfare: the ordinal welfare factor which measures the number of agents tha…
▽ More
We study social welfare in one-sided matching markets where the goal is to efficiently allocate n items to n agents that each have a complete, private preference list and a unit demand over the items. Our focus is on allocation mechanisms that do not involve any monetary payments. We consider two natural measures of social welfare: the ordinal welfare factor which measures the number of agents that are at least as happy as in some unknown, arbitrary benchmark allocation, and the linear welfare factor which assumes an agent's utility linearly decreases down his preference lists, and measures the total utility to that achieved by an optimal allocation. We analyze two matching mechanisms which have been extensively studied by economists. The first mechanism is the random serial dictatorship (RSD) where agents are ordered in accordance with a randomly chosen permutation, and are successively allocated their best choice among the unallocated items. The second mechanism is the probabilistic serial (PS) mechanism of Bogomolnaia and Moulin [8], which computes a fractional allocation that can be expressed as a convex combination of integral allocations. The welfare factor of a mechanism is the infimum over all instances. For RSD, we show that the ordinal welfare factor is asymptotically 1/2, while the linear welfare factor lies in the interval [.526, 2/3]. For PS, we show that the ordinal welfare factor is also 1/2 while the linear welfare factor is roughly 2/3. To our knowledge, these results are the first non-trivial performance guarantees for these natural mechanisms.
△ Less
Submitted 14 April, 2011;
originally announced April 2011.
-
Optimal Lower Bounds for Universal and Differentially Private Steiner Tree and TSP
Authors:
Anand Bhalgat,
Deeparnab Chakrabarty,
Sanjeev Khanna
Abstract:
Given a metric space on n points, an α-approximate universal algorithm for the Steiner tree problem outputs a distribution over rooted spanning trees such that for any subset X of vertices containing the root, the expected cost of the induced subtree is within an α factor of the optimal Steiner tree cost for X. An α-approximate differentially private algorithm for the Steiner tree problem takes as…
▽ More
Given a metric space on n points, an α-approximate universal algorithm for the Steiner tree problem outputs a distribution over rooted spanning trees such that for any subset X of vertices containing the root, the expected cost of the induced subtree is within an α factor of the optimal Steiner tree cost for X. An α-approximate differentially private algorithm for the Steiner tree problem takes as input a subset X of vertices, and outputs a tree distribution that induces a solution within an α factor of the optimal as before, and satisfies the additional property that for any set X' that differs in a single vertex from X, the tree distributions for X and X' are "close" to each other. Universal and differentially private algorithms for TSP are defined similarly. An α-approximate universal algorithm for the Steiner tree problem or TSP is also an α-approximate differentially private algorithm. It is known that both problems admit O(logn)-approximate universal algorithms, and hence O(log n)-approximate differentially private algorithms as well. We prove an Ω(logn) lower bound on the approximation ratio achievable for the universal Steiner tree problem and the universal TSP, matching the known upper bounds. Our lower bound for the Steiner tree problem holds even when the algorithm is allowed to output a more general solution of a distribution on paths to the root.
△ Less
Submitted 17 November, 2010; v1 submitted 16 November, 2010;
originally announced November 2010.
-
Approximability of Capacitated Network Design
Authors:
Deeparnab Chakrabarty,
Chandra Chekuri,
Sanjeev Khanna,
Nitish Korula
Abstract:
In the {\em capacitated} survivable network design problem (Cap-SNDP), we are given an undirected multi-graph where each edge has a capacity and a cost. The goal is to find a minimum cost subset of edges that satisfies a given set of pairwise minimum-cut requirements. Unlike its classical special case of SNDP when all capacities are unit, the approximability of Cap-SNDP is not well understood; eve…
▽ More
In the {\em capacitated} survivable network design problem (Cap-SNDP), we are given an undirected multi-graph where each edge has a capacity and a cost. The goal is to find a minimum cost subset of edges that satisfies a given set of pairwise minimum-cut requirements. Unlike its classical special case of SNDP when all capacities are unit, the approximability of Cap-SNDP is not well understood; even in very restricted settings no known algorithm achieves a $o(m)$ approximation, where $m$ is the number of edges in the graph. In this paper, we obtain several new results and insights into the approximability of Cap-SNDP.
△ Less
Submitted 28 September, 2010;
originally announced September 2010.
-
Provenance Views for Module Privacy
Authors:
Susan B. Davidson,
Sanjeev Khanna,
Tova Milo,
Debmalya Panigrahi,
Sudeepa Roy
Abstract:
Scientific workflow systems increasingly store provenance information about the module executions used to produce a data item, as well as the parameter settings and intermediate data items passed between module executions. However, authors/owners of workflows may wish to keep some of this information confidential. In particular, a module may be proprietary, and users should not be able to infer it…
▽ More
Scientific workflow systems increasingly store provenance information about the module executions used to produce a data item, as well as the parameter settings and intermediate data items passed between module executions. However, authors/owners of workflows may wish to keep some of this information confidential. In particular, a module may be proprietary, and users should not be able to infer its behavior by seeing map**s between all data inputs and outputs. The problem we address in this paper is the following: Given a workflow, abstractly modeled by a relation R, a privacy requirement Γand costs associated with data. The owner of the workflow decides which data (attributes) to hide, and provides the user with a view R' which is the projection of R over attributes which have not been hidden. The goal is to minimize the cost of hidden data while guaranteeing that individual modules are Γ-private. We call this the "secureview" problem. We formally define the problem, study its complexity, and offer algorithmic solutions.
△ Less
Submitted 4 April, 2011; v1 submitted 30 May, 2010;
originally announced May 2010.
-
Graph Sparsification via Refinement Sampling
Authors:
Ashish Goel,
Michael Kapralov,
Sanjeev Khanna
Abstract:
A graph G'(V,E') is an \eps-sparsification of G for some \eps>0, if every (weighted) cut in G' is within (1\pm \eps) of the corresponding cut in G. A celebrated result of Benczur and Karger shows that for every undirected graph G, an \eps-sparsification with O(n\log n/\e^2) edges can be constructed in O(m\log^2n) time. Applications to modern massive data sets often constrain algorithms to use co…
▽ More
A graph G'(V,E') is an \eps-sparsification of G for some \eps>0, if every (weighted) cut in G' is within (1\pm \eps) of the corresponding cut in G. A celebrated result of Benczur and Karger shows that for every undirected graph G, an \eps-sparsification with O(n\log n/\e^2) edges can be constructed in O(m\log^2n) time. Applications to modern massive data sets often constrain algorithms to use computation models that restrict random access to the input. The semi-streaming model, in which the algorithm is constrained to use \tilde O(n) space, has been shown to be a good abstraction for analyzing graph algorithms in applications to large data sets. Recently, a semi-streaming algorithm for graph sparsification was presented by Anh and Guha; the total running time of their implementation is Ω(mn), too large for applications where both space and time are important. In this paper, we introduce a new technique for graph sparsification, namely refinement sampling, that gives an \tilde{O}(m) time semi-streaming algorithm for graph sparsification.
Specifically, we show that refinement sampling can be used to design a one-pass streaming algorithm for sparsification that takes O(\log\log n) time per edge, uses O(\log^2 n) space per node, and outputs an \eps-sparsifier with O(n\log^3 n/\eps^2) edges. At a slightly increased space and time complexity, we can reduce the sparsifier size to O(n \log n/\e^2) edges matching the Benczur-Karger result, while improving upon the Benczur-Karger runtime for m=ω(n\log^3 n). Finally, we show that an \eps-sparsifier with O(n \log n/\eps^2) edges can be constructed in two passes over the data and O(m) time whenever m =Ω(n^{1+δ}) for some constant δ>0. As a by-product of our approach, we also obtain an O(m\log\log n+n \log n) time streaming algorithm to compute a sparse k-connectivity certificate of a graph.
△ Less
Submitted 27 April, 2010;
originally announced April 2010.
-
Facial Gesture Recognition Using Correlation And Mahalanobis Distance
Authors:
Supriya Kapoor,
Shruti Khanna,
Rahul Bhatia
Abstract:
Augmenting human computer interaction with automated analysis and synthesis of facial expressions is a goal towards which much research effort has been devoted recently. Facial gesture recognition is one of the important component of natural human-machine interfaces; it may also be used in behavioural science, security systems and in clinical practice. Although humans recognise facial expressions…
▽ More
Augmenting human computer interaction with automated analysis and synthesis of facial expressions is a goal towards which much research effort has been devoted recently. Facial gesture recognition is one of the important component of natural human-machine interfaces; it may also be used in behavioural science, security systems and in clinical practice. Although humans recognise facial expressions virtually without effort or delay, reliable expression recognition by machine is still a challenge. The face expression recognition problem is challenging because different individuals display the same expression differently. This paper presents an overview of gesture recognition in real time using the concepts of correlation and Mahalanobis distance.We consider the six universal emotional categories namely joy, anger, fear, disgust, sadness and surprise.
△ Less
Submitted 9 March, 2010;
originally announced March 2010.
-
Improved Hardness of Approximation for Stackelberg Shortest-Path Pricing
Authors:
Patrick Briest,
Sanjeev Khanna
Abstract:
We consider the Stackelberg shortest-path pricing problem, which is defined as follows. Given a graph G with fixed-cost and pricable edges and two distinct vertices s and t, we may assign prices to the pricable edges. Based on the predefined fixed costs and our prices, a customer purchases a cheapest s-t-path in G and we receive payment equal to the sum of prices of pricable edges belonging to t…
▽ More
We consider the Stackelberg shortest-path pricing problem, which is defined as follows. Given a graph G with fixed-cost and pricable edges and two distinct vertices s and t, we may assign prices to the pricable edges. Based on the predefined fixed costs and our prices, a customer purchases a cheapest s-t-path in G and we receive payment equal to the sum of prices of pricable edges belonging to the path. Our goal is to find prices maximizing the payment received from the customer. While Stackelberg shortest-path pricing was known to be APX-hard before, we provide the first explicit approximation threshold and prove hardness of approximation within 2-o(1).
△ Less
Submitted 1 October, 2009;
originally announced October 2009.
-
Perfect Matchings in O(n \log n) Time in Regular Bipartite Graphs
Authors:
Ashish Goel,
Michael Kapralov,
Sanjeev Khanna
Abstract:
In this paper we consider the well-studied problem of finding a perfect matching in a d-regular bipartite graph on 2n nodes with m=nd edges. The best-known algorithm for general bipartite graphs (due to Hopcroft and Karp) takes time O(m\sqrt{n}). In regular bipartite graphs, however, a matching is known to be computable in O(m) time (due to Cole, Ost and Schirra). In a recent line of work by Goel,…
▽ More
In this paper we consider the well-studied problem of finding a perfect matching in a d-regular bipartite graph on 2n nodes with m=nd edges. The best-known algorithm for general bipartite graphs (due to Hopcroft and Karp) takes time O(m\sqrt{n}). In regular bipartite graphs, however, a matching is known to be computable in O(m) time (due to Cole, Ost and Schirra). In a recent line of work by Goel, Kapralov and Khanna the O(m) time algorithm was improved first to \tilde O(min{m, n^{2.5}/d}) and then to \tilde O(min{m, n^2/d}). It was also shown that the latter algorithm is optimal up to polylogarithmic factors among all algorithms that use non-adaptive uniform sampling to reduce the size of the graph as a first step.
In this paper, we give a randomized algorithm that finds a perfect matching in a d-regular graph and runs in O(n\log n) time (both in expectation and with high probability). The algorithm performs an appropriately truncated random walk on a modified graph to successively find augmenting paths. Our algorithm may be viewed as using adaptive uniform sampling, and is thus able to bypass the limitations of (non-adaptive) uniform sampling established in earlier work. We also show that randomization is crucial for obtaining o(nd) time algorithms by establishing an Ω(nd) lower bound for any deterministic algorithm. Our techniques also give an algorithm that successively finds a matching in the support of a doubly stochastic matrix in expected time O(n\log^2 n) time, with O(m) pre-processing time; this gives a simple O(m+mn\log^2 n) time algorithm for finding the Birkhoff-von Neumann decomposition of a doubly stochastic matrix.
△ Less
Submitted 12 November, 2010; v1 submitted 17 September, 2009;
originally announced September 2009.
-
Dynamic and Non-Uniform Pricing Strategies for Revenue Maximization
Authors:
Tanmoy Chakraborty,
Zhiyi Huang,
Sanjeev Khanna
Abstract:
We consider the Item Pricing problem for revenue maximization in the limited supply setting, where a single seller with $n$ items caters to $m$ buyers with unknown subadditive valuation functions who arrive in a sequence. The seller sets the prices on individual items. Each buyer buys a subset of yet unsold items that maximizes her utility. Our goal is to design pricing strategies that guarantee…
▽ More
We consider the Item Pricing problem for revenue maximization in the limited supply setting, where a single seller with $n$ items caters to $m$ buyers with unknown subadditive valuation functions who arrive in a sequence. The seller sets the prices on individual items. Each buyer buys a subset of yet unsold items that maximizes her utility. Our goal is to design pricing strategies that guarantee an expected revenue that is within a small factor $α$ of the maximum possible social welfare -- an upper bound on the maximum revenue that can be generated. Most earlier work has focused on the unlimited supply setting, where selling items to some buyer does not affect their availability to the future buyers. Balcan et. al. (EC 2008) studied the limited supply setting, giving a randomized strategy that assigns a single price to all items (uniform strategy), and never changes it (static strategy), that gives an $2^{O(\sqrt{\log n \log \log n})}$-approximation, and moreover, no static uniform pricing strategy can give better than $2^{Ω(\log^{1/4} n)}$- approximation. We improve this lower bound to $2^{Ω(sqrt{\log n})}$.
We consider dynamic uniform strategies, which can change the price upon the arrival of each buyer but the price on all unsold items is the same at all times, and static non-uniform strategies, which can assign different prices to different items but can never change it after setting it initially. We design such pricing strategies that give a poly-logarithmic approximation to maximum revenue. Thus in the limited supply setting, our results highlight a strong separation between the power of dynamic and non-uniform pricing versus static uniform pricing. To our knowledge, this is the first non-trivial analysis of dynamic and non-uniform pricing schemes for revenue maximization.
△ Less
Submitted 19 May, 2009;
originally announced May 2009.
-
Perfect Matchings in Õ(n^{1.5}) Time in Regular Bipartite Graphs
Authors:
Ashish Goel,
Michael Kapralov,
Sanjeev Khanna
Abstract:
We consider the well-studied problem of finding a perfect matching in $d$-regular bipartite graphs with $2n$ vertices and $m = nd$ edges. While the best-known algorithm for general bipartite graphs (due to Hopcroft and Karp) takes $O(m \sqrt{n})$ time, in regular bipartite graphs, a perfect matching is known to be computable in $O(m)$ time. Very recently, the $O(m)$ bound was improved to…
▽ More
We consider the well-studied problem of finding a perfect matching in $d$-regular bipartite graphs with $2n$ vertices and $m = nd$ edges. While the best-known algorithm for general bipartite graphs (due to Hopcroft and Karp) takes $O(m \sqrt{n})$ time, in regular bipartite graphs, a perfect matching is known to be computable in $O(m)$ time. Very recently, the $O(m)$ bound was improved to $O(\min\{m, \frac{n^{2.5}\ln n}{d}\})$ expected time, an expression that is bounded by $\tilde{O}(n^{1.75})$. In this paper, we further improve this result by giving an $O(\min\{m, \frac{n^2\ln^3 n}{d}\})$ expected time algorithm for finding a perfect matching in regular bipartite graphs; as a function of $n$ alone, the algorithm takes expected time $O((n\ln n)^{1.5})$.
To obtain this result, we design and analyze a two-stage sampling scheme that reduces the problem of finding a perfect matching in a regular bipartite graph to the same problem on a subsampled bipartite graph with $O(n\ln n)$ edges that has a perfect matching with high probability. The matching is then recovered using the Hopcroft-Karp algorithm. While the standard analysis of Hopcroft-Karp gives us an $\tilde{O}(n^{1.5})$ running time, we present a tighter analysis for our special case that results in the stronger $\tilde{O}(\min\{m, \frac{n^2}{d} \})$ time mentioned earlier.
Our proof of correctness of this sampling scheme uses a new correspondence theorem between cuts and Hall's theorem ``witnesses'' for a perfect matching in a bipartite graph that we prove. We believe this theorem may be of independent interest; as another example application, we show that a perfect matching in the support of an $n \times n$ doubly stochastic matrix with $m$ non-zero entries can be found in expected time $\tilde{O}(m + n^{1.5})$.
△ Less
Submitted 29 July, 2009; v1 submitted 10 February, 2009;
originally announced February 2009.
-
On Allocating Goods to Maximize Fairness
Authors:
Deeparnab Chakrabarty,
Julia Chuzhoy,
Sanjeev Khanna
Abstract:
Given a set of $m$ agents and a set of $n$ items, where agent $A$ has utility $u_{A,i}$ for item $i$, our goal is to allocate items to agents to maximize fairness. Specifically, the utility of an agent is the sum of its utilities for items it receives, and we seek to maximize the minimum utility of any agent. While this problem has received much attention recently, its approximability has not be…
▽ More
Given a set of $m$ agents and a set of $n$ items, where agent $A$ has utility $u_{A,i}$ for item $i$, our goal is to allocate items to agents to maximize fairness. Specifically, the utility of an agent is the sum of its utilities for items it receives, and we seek to maximize the minimum utility of any agent. While this problem has received much attention recently, its approximability has not been well-understood thus far: the best known approximation algorithm achieves an $\tilde{O}(\sqrt{m})$-approximation, and in contrast, the best known hardness of approximation stands at 2.
Our main result is an approximation algorithm that achieves an $\tilde{O}(n^{\eps})$ approximation for any $\eps=Ω(\log\log n/\log n)$ in time $n^{O(1/\eps)}$. In particular, we obtain poly-logarithmic approximation in quasi-polynomial time, and for any constant $\eps > 0$, we obtain $O(n^{\eps})$ approximation in polynomial time. An interesting aspect of our algorithm is that we use as a building block a linear program whose integrality gap is $Ω(\sqrt m)$. We bypass this obstacle by iteratively using the solutions produced by the LP to construct new instances with significantly smaller integrality gaps, eventually obtaining the desired approximation.
We also investigate the special case of the problem, where every item has a non-zero utility for at most two agents. We show that even in this restricted setting the problem is hard to approximate upto any factor better tha 2, and show a factor $(2+\eps)$-approximation algorithm running in time $poly(n,1/\eps)$ for any $\eps>0$. This special case can be cast as a graph edge orientation problem, and our algorithm can be viewed as a generalization of Eulerian orientations to weighted graphs.
△ Less
Submitted 1 January, 2009;
originally announced January 2009.
-
An $O(k^{3} log n)$-Approximation Algorithm for Vertex-Connectivity Survivable Network Design
Authors:
Julia Chuzhoy,
Sanjeev Khanna
Abstract:
In the Survivable Network Design problem (SNDP), we are given an undirected graph $G(V,E)$ with costs on edges, along with a connectivity requirement $r(u,v)$ for each pair $u,v$ of vertices. The goal is to find a minimum-cost subset $E^*$ of edges, that satisfies the given set of pairwise connectivity requirements. In the edge-connectivity version we need to ensure that there are $r(u,v)$ edge-…
▽ More
In the Survivable Network Design problem (SNDP), we are given an undirected graph $G(V,E)$ with costs on edges, along with a connectivity requirement $r(u,v)$ for each pair $u,v$ of vertices. The goal is to find a minimum-cost subset $E^*$ of edges, that satisfies the given set of pairwise connectivity requirements. In the edge-connectivity version we need to ensure that there are $r(u,v)$ edge-disjoint paths for every pair $u, v$ of vertices, while in the vertex-connectivity version the paths are required to be vertex-disjoint. The edge-connectivity version of SNDP is known to have a 2-approximation. However, no non-trivial approximation algorithm has been known so far for the vertex version of SNDP, except for special cases of the problem. We present an extremely simple algorithm to achieve an $O(k^3 \log n)$-approximation for this problem, where $k$ denotes the maximum connectivity requirement, and $n$ denotes the number of vertices. We also give a simple proof of the recently discovered $O(k^2 \log n)$-approximation result for the single-source version of vertex-connectivity SNDP. We note that in both cases, our analysis in fact yields slightly better guarantees in that the $\log n$ term in the approximation guarantee can be replaced with a $\log τ$ term where $τ$ denotes the number of distinct vertices that participate in one or more pairs with a positive connectivity requirement.
△ Less
Submitted 23 December, 2008;
originally announced December 2008.
-
Perfect Matchings via Uniform Sampling in Regular Bipartite Graphs
Authors:
Ashish Goel,
Michael Kapralov,
Sanjeev Khanna
Abstract:
In this paper we further investigate the well-studied problem of finding a perfect matching in a regular bipartite graph. The first non-trivial algorithm, with running time $O(mn)$, dates back to König's work in 1916 (here $m=nd$ is the number of edges in the graph, $2n$ is the number of vertices, and $d$ is the degree of each node). The currently most efficient algorithm takes time $O(m)$, and…
▽ More
In this paper we further investigate the well-studied problem of finding a perfect matching in a regular bipartite graph. The first non-trivial algorithm, with running time $O(mn)$, dates back to König's work in 1916 (here $m=nd$ is the number of edges in the graph, $2n$ is the number of vertices, and $d$ is the degree of each node). The currently most efficient algorithm takes time $O(m)$, and is due to Cole, Ost, and Schirra. We improve this running time to $O(\min\{m, \frac{n^{2.5}\ln n}{d}\})$; this minimum can never be larger than $O(n^{1.75}\sqrt{\ln n})$. We obtain this improvement by proving a uniform sampling theorem: if we sample each edge in a $d$-regular bipartite graph independently with a probability $p = O(\frac{n\ln n}{d^2})$ then the resulting graph has a perfect matching with high probability. The proof involves a decomposition of the graph into pieces which are guaranteed to have many perfect matchings but do not have any small cuts. We then establish a correspondence between potential witnesses to non-existence of a matching (after sampling) in any piece and cuts of comparable size in that same piece. Karger's sampling theorem for preserving cuts in a graph can now be adapted to prove our uniform sampling theorem for preserving perfect matchings. Using the $O(m\sqrt{n})$ algorithm (due to Hopcroft and Karp) for finding maximum matchings in bipartite graphs on the sampled graph then yields the stated running time. We also provide an infinite family of instances to show that our uniform sampling result is tight up to poly-logarithmic factors (in fact, up to $\ln^2 n$).
△ Less
Submitted 15 November, 2008;
originally announced November 2008.