-
A Note on the Faces of the Dual Koch Arrangement
Authors:
Bernd Gärtner,
Manuel Wettstein
Abstract:
We analyze the faces of the dual Koch arrangement, which is the arrangement of $2^s + 1$ lines obtained by projective duality from the Koch chain $K_s$. In particular, we show that this line arrangement does not contain any $k$-gons for $k > 5$, and that the number of pentagons is $3 \cdot 2^{s-1} - 3$.
We analyze the faces of the dual Koch arrangement, which is the arrangement of $2^s + 1$ lines obtained by projective duality from the Koch chain $K_s$. In particular, we show that this line arrangement does not contain any $k$-gons for $k > 5$, and that the number of pentagons is $3 \cdot 2^{s-1} - 3$.
△ Less
Submitted 27 February, 2023;
originally announced February 2023.
-
A Characterization of the Realizable Matoušek Unique Sink Orientations
Authors:
Simon Weber,
Bernd Gärtner
Abstract:
The Matoušek LP-type problems were used by Matoušek to show that the Sharir-Welzl algorithm may require at least subexponential time. Later, Gärtner translated this result into the language of Unique Sink Orientations (USOs) and introduced the Matoušek USOs, the USOs equivalent to Matoušek's LP-type problems. He further showed that the Random Facet algorithm only requires quadratic time on the rea…
▽ More
The Matoušek LP-type problems were used by Matoušek to show that the Sharir-Welzl algorithm may require at least subexponential time. Later, Gärtner translated this result into the language of Unique Sink Orientations (USOs) and introduced the Matoušek USOs, the USOs equivalent to Matoušek's LP-type problems. He further showed that the Random Facet algorithm only requires quadratic time on the realizable subset of the Matoušek USOs, but without characterizing this subset. In this paper, we deliver this missing characterization and also provide concrete realizations for all realizable Matoušek USOs. Furthermore, we show that the realizable Matoušek USOs are exactly the orientations arising from simple extensions of cyclic-P-matroids.
△ Less
Submitted 8 September, 2021;
originally announced September 2021.
-
A New Combinatorial Property of Geometric Unique Sink Orientations
Authors:
Yuan Gao,
Bernd Gärtner,
Jourdain Lamperski
Abstract:
A unique sink orientation (USO) is an orientation of the hypercube graph with the property that every face has a unique sink. A number of well-studied problems reduce in strongly polynomial time to finding the global sink of a USO; most notably, linear programming (LP) and the P-matrix linear complementarity problem (P-LCP). The former is not known to have a strongly polynomial-time algorithm, whi…
▽ More
A unique sink orientation (USO) is an orientation of the hypercube graph with the property that every face has a unique sink. A number of well-studied problems reduce in strongly polynomial time to finding the global sink of a USO; most notably, linear programming (LP) and the P-matrix linear complementarity problem (P-LCP). The former is not known to have a strongly polynomial-time algorithm, while the latter is not known to even have a polynomial-time algorithm, motivating the problem to find the global sink of a USO. Although, every known class of geometric USOs, arising from a concrete problem such as LP, is exponentially small, relative to the class of all USOs. Accordingly, geometric USOs exhibit additional properties that set them apart from general USOs, and it may be advantageous, if not necessary, to leverage these properties to find the global sink of a USO faster. Only a few such properties are known. In this paper, we establish a new combinatorial property of the USOs that arise from symmetric P-LCP, which includes the USOs that arise from linear and simple convex quadratic programming.
△ Less
Submitted 29 March, 2022; v1 submitted 20 August, 2020;
originally announced August 2020.
-
Phase Transition in Democratic Opinion Dynamics
Authors:
Bernd Gärtner,
Ahad N. Zehmakan
Abstract:
Consider a community where initially, each individual is positive or negative regarding a reform proposal. In each round, individuals gather randomly in fixed rooms of different sizes, and all individuals in a room agree on the majority opinion in the room (with ties broken in favor of the negative opinion). The Galam model---introduced in statistical physics, specifically sociophysics---approxima…
▽ More
Consider a community where initially, each individual is positive or negative regarding a reform proposal. In each round, individuals gather randomly in fixed rooms of different sizes, and all individuals in a room agree on the majority opinion in the room (with ties broken in favor of the negative opinion). The Galam model---introduced in statistical physics, specifically sociophysics---approximates this basic random process. We approach the model from a more mathematical perspective and study the threshold behavior and the consensus time of the model.
△ Less
Submitted 26 April, 2019;
originally announced April 2019.
-
The Crossing Tverberg Theorem
Authors:
Radoslav Fulek,
Bernd Gärtner,
Andrey Kupavskii,
Pavel Valtr,
Uli Wagner
Abstract:
Tverberg's theorem is one of the cornerstones of discrete geometry. It states that, given a set $X$ of at least $(d+1)(r-1)+1$ points in $\mathbb R^d$, one can find a partition $X=X_1\cup \ldots \cup X_r$ of $X$, such that the convex hulls of the $X_i$, $i=1,\ldots,r$, all share a common point. In this paper, we prove a strengthening of this theorem that guarantees a partition which, in addition t…
▽ More
Tverberg's theorem is one of the cornerstones of discrete geometry. It states that, given a set $X$ of at least $(d+1)(r-1)+1$ points in $\mathbb R^d$, one can find a partition $X=X_1\cup \ldots \cup X_r$ of $X$, such that the convex hulls of the $X_i$, $i=1,\ldots,r$, all share a common point. In this paper, we prove a strengthening of this theorem that guarantees a partition which, in addition to the above, has the property that the boundaries of full-dimensional convex hulls have pairwise nonempty intersections. Possible generalizations and algorithmic aspects are also discussed.
As a concrete application, we show that any $n$ points in the plane in general position span $\lfloor n/3\rfloor$ vertex-disjoint triangles that are pairwise crossing, meaning that their boundaries have pairwise nonempty intersections; this number is clearly best possible. A previous result of Rebollar et al.\ guarantees $\lfloor n/6\rfloor$ pairwise crossing triangles. Our result generalizes to a result about simplices in $\mathbb R^d,d\ge2$.
△ Less
Submitted 11 April, 2021; v1 submitted 12 December, 2018;
originally announced December 2018.
-
Pseudo Unique Sink Orientations
Authors:
Vitor Bosshard,
Bernd Gärtner
Abstract:
A unique sink orientation (USO) is an orientation of the $n$-dimensional cube graph ($n$-cube) such that every face (subcube) has a unique sink. The number of unique sink orientations is $n^{Θ(2^n)}$. If a cube orientation is not a USO, it contains a pseudo unique sink orientation (PUSO): an orientation of some subcube such that every proper face of it has a unique sink, but the subcube itself has…
▽ More
A unique sink orientation (USO) is an orientation of the $n$-dimensional cube graph ($n$-cube) such that every face (subcube) has a unique sink. The number of unique sink orientations is $n^{Θ(2^n)}$. If a cube orientation is not a USO, it contains a pseudo unique sink orientation (PUSO): an orientation of some subcube such that every proper face of it has a unique sink, but the subcube itself hasn't. In this paper, we characterize and count PUSOs of the $n$-cube. We show that PUSOs have a much more rigid structure than USOs and that their number is between $2^{Ω(2^{n-\log n})}$ and $2^{O(2^n)}$ which is negligible compared to the number of USOs. As tools, we introduce and characterize two new classes of USOs: border USOs (USOs that appear as facets of PUSOs), and odd USOs which are dual to border USOs but easier to understand.
△ Less
Submitted 27 April, 2017;
originally announced April 2017.
-
Screening Rules for Convex Problems
Authors:
Anant Raj,
Jakob Olbrich,
Bernd Gärtner,
Bernhard Schölkopf,
Martin Jaggi
Abstract:
We propose a new framework for deriving screening rules for convex optimization problems. Our approach covers a large class of constrained and penalized optimization formulations, and works in two steps. First, given any approximate point, the structure of the objective function and the duality gap is used to gather information on the optimal solution. In the second step, this information is used…
▽ More
We propose a new framework for deriving screening rules for convex optimization problems. Our approach covers a large class of constrained and penalized optimization formulations, and works in two steps. First, given any approximate point, the structure of the objective function and the duality gap is used to gather information on the optimal solution. In the second step, this information is used to produce screening rules, i.e. safely identifying unimportant weight variables of the optimal solution. Our general framework leads to a large variety of useful existing as well as new screening rules for many applications. For example, we provide new screening rules for general simplex and $L_1$-constrained problems, Elastic Net, squared-loss Support Vector Machines, minimum enclosing ball, as well as structured norm regularized problems, such as group lasso.
△ Less
Submitted 23 September, 2016;
originally announced September 2016.
-
Algorithms for Learning Sparse Additive Models with Interactions in High Dimensions
Authors:
Hemant Tyagi,
Anastasios Kyrillidis,
Bernd Gärtner,
Andreas Krause
Abstract:
A function $f: \mathbb{R}^d \rightarrow \mathbb{R}$ is a Sparse Additive Model (SPAM), if it is of the form $f(\mathbf{x}) = \sum_{l \in \mathcal{S}}φ_{l}(x_l)$ where $\mathcal{S} \subset [d]$, $|\mathcal{S}| \ll d$. Assuming $φ$'s, $\mathcal{S}$ to be unknown, there exists extensive work for estimating $f$ from its samples. In this work, we consider a generalized version of SPAMs, that also allow…
▽ More
A function $f: \mathbb{R}^d \rightarrow \mathbb{R}$ is a Sparse Additive Model (SPAM), if it is of the form $f(\mathbf{x}) = \sum_{l \in \mathcal{S}}φ_{l}(x_l)$ where $\mathcal{S} \subset [d]$, $|\mathcal{S}| \ll d$. Assuming $φ$'s, $\mathcal{S}$ to be unknown, there exists extensive work for estimating $f$ from its samples. In this work, we consider a generalized version of SPAMs, that also allows for the presence of a sparse number of second order interaction terms. For some $\mathcal{S}_1 \subset [d], \mathcal{S}_2 \subset {[d] \choose 2}$, with $|\mathcal{S}_1| \ll d, |\mathcal{S}_2| \ll d^2$, the function $f$ is now assumed to be of the form: $\sum_{p \in \mathcal{S}_1}φ_{p} (x_p) + \sum_{(l,l^{\prime}) \in \mathcal{S}_2}φ_{(l,l^{\prime})} (x_l,x_{l^{\prime}})$. Assuming we have the freedom to query $f$ anywhere in its domain, we derive efficient algorithms that provably recover $\mathcal{S}_1,\mathcal{S}_2$ with finite sample bounds. Our analysis covers the noiseless setting where exact samples of $f$ are obtained, and also extends to the noisy setting where the queries are corrupted with noise. For the noisy setting in particular, we consider two noise models namely: i.i.d Gaussian noise and arbitrary but bounded noise. Our main methods for identification of $\mathcal{S}_2$ essentially rely on estimation of sparse Hessian matrices, for which we provide two novel compressed sensing based schemes. Once $\mathcal{S}_1, \mathcal{S}_2$ are known, we show how the individual components $φ_p$, $φ_{(l,l^{\prime})}$ can be estimated via additional queries of $f$, with uniform error bounds. Lastly, we provide simulation results on synthetic data that validate our theoretical findings.
△ Less
Submitted 8 May, 2017; v1 submitted 2 May, 2016;
originally announced May 2016.
-
Efficient edge-skeleton computation for polytopes defined by oracles
Authors:
Ioannis Z. Emiris,
Vissarion Fisikopoulos,
Bernd Gärtner
Abstract:
In general dimension, there is no known total polynomial algorithm for either convex hull or vertex enumeration, i.e. an algorithm whose complexity depends polynomially on the input and output sizes. It is thus important to identify problems (and polytope representations) for which total polynomial-time algorithms can be obtained. We offer the first total polynomial-time algorithm for computing th…
▽ More
In general dimension, there is no known total polynomial algorithm for either convex hull or vertex enumeration, i.e. an algorithm whose complexity depends polynomially on the input and output sizes. It is thus important to identify problems (and polytope representations) for which total polynomial-time algorithms can be obtained. We offer the first total polynomial-time algorithm for computing the edge-skeleton (including vertex enumeration) of a polytope given by an optimization or separation oracle, where we are also given a superset of its edge directions. We also offer a space-efficient variant of our algorithm by employing reverse search. All complexity bounds refer to the (oracle) Turing machine model. There is a number of polytope classes naturally defined by oracles; for some of them neither vertex nor facet representation is obvious. We consider two main applications, where we obtain (weakly) total polynomial-time algorithms: Signed Minkowski sums of convex polytopes, where polytopes can be subtracted provided the signed sum is a convex polytope, and computation of secondary, resultant, and discriminant polytopes. Further applications include convex combinatorial optimization and convex integer programming, where we offer a new approach, thus removing the complexity's exponential dependence in the dimension.
△ Less
Submitted 12 December, 2014;
originally announced December 2014.
-
Combinatorial Redundancy Detection
Authors:
Komei Fukuda,
Bernd Gärtner,
May Szedlák
Abstract:
The problem of detecting and removing redundant constraints is fundamental in optimization. We focus on the case of linear programs (LPs) in dictionary form, given by $n$ equality constraints in $n+d$ variables, where the variables are constrained to be nonnegative. A variable $x_r$ is called redundant, if after removing $x_r \geq 0$ the LP still has the same feasible region. The time needed to so…
▽ More
The problem of detecting and removing redundant constraints is fundamental in optimization. We focus on the case of linear programs (LPs) in dictionary form, given by $n$ equality constraints in $n+d$ variables, where the variables are constrained to be nonnegative. A variable $x_r$ is called redundant, if after removing $x_r \geq 0$ the LP still has the same feasible region. The time needed to solve such an LP is denoted by $LP(n,d)$.
It is easy to see that solving $n+d$ LPs of the above size is sufficient to detect all redundancies. The currently fastest practical method is the one by Clarkson: it solves $n+d$ linear programs, but each of them has at most $s$ variables, where $s$ is the number of nonredundant constraints.
In the first part we show that knowing all of the finitely many dictionaries of the LP is sufficient for the purpose of redundancy detection. A dictionary is a matrix that can be thought of as an enriched encoding of a vertex in the LP. Moreover - and this is the combinatorial aspect - it is enough to know only the signs of the entries, the actual values do not matter. Concretely we show that for any variable $x_r$ one can find a dictionary, such that its sign pattern is either a redundancy or nonredundancy certificate for $x_r$.
In the second part we show that considering only the sign patterns of the dictionary, there is an output sensitive algorithm of running time $\mathcal{O}(d \cdot (n+d) \cdot s^{d-1} \cdot LP(s,d) + d \cdot s^{d} \cdot LP(n,d))$ to detect all redundancies. In the case where all constraints are in general position, the running time is $\mathcal{O}(s \cdot LP(n,d) + (n+d) \cdot LP(s,d))$, which is essentially the running time of the Clarkson method. Our algorithm extends naturally to a more general setting of arrangements of oriented topological hyperplane arrangements.
△ Less
Submitted 3 December, 2014;
originally announced December 2014.
-
Stochastic continuum armed bandit problem of few linear parameters in high dimensions
Authors:
Hemant Tyagi,
Sebastian Stich,
Bernd Gärtner
Abstract:
We consider a stochastic continuum armed bandit problem where the arms are indexed by the $\ell_2$ ball $B_{d}(1+ν)$ of radius $1+ν$ in $\mathbb{R}^d$. The reward functions $r :B_{d}(1+ν) \rightarrow \mathbb{R}$ are considered to intrinsically depend on $k \ll d$ unknown linear parameters so that $r(\mathbf{x}) = g(\mathbf{A} \mathbf{x})$ where $\mathbf{A}$ is a full rank $k \times d$ matrix. Assu…
▽ More
We consider a stochastic continuum armed bandit problem where the arms are indexed by the $\ell_2$ ball $B_{d}(1+ν)$ of radius $1+ν$ in $\mathbb{R}^d$. The reward functions $r :B_{d}(1+ν) \rightarrow \mathbb{R}$ are considered to intrinsically depend on $k \ll d$ unknown linear parameters so that $r(\mathbf{x}) = g(\mathbf{A} \mathbf{x})$ where $\mathbf{A}$ is a full rank $k \times d$ matrix. Assuming the mean reward function to be smooth we make use of results from low-rank matrix recovery literature and derive an efficient randomized algorithm which achieves a regret bound of $O(C(k,d) n^{\frac{1+k}{2+k}} (\log n)^{\frac{1}{2+k}})$ with high probability. Here $C(k,d)$ is at most polynomial in $d$ and $k$ and $n$ is the number of rounds or the sampling budget which is assumed to be known beforehand.
△ Less
Submitted 30 May, 2017; v1 submitted 1 December, 2013;
originally announced December 2013.
-
Large Shadows from Sparse Inequalities
Authors:
Bernd Gärtner,
Christian Helbling,
Yoshiki Ota,
Takeru Takahashi
Abstract:
The $d$-dimensional Goldfarb cube is a polytope with the property that all its $2^d$ vertices appear on some \emph{shadow} of it (projection onto a 2-dimensional plane). The Goldfarb cube is the solution set of a system of 2d linear inequalities with at most 3 variables per inequality. We show in this paper that the $d$-dimensional Klee-Minty cube --- constructed from inequalities with at most 2 v…
▽ More
The $d$-dimensional Goldfarb cube is a polytope with the property that all its $2^d$ vertices appear on some \emph{shadow} of it (projection onto a 2-dimensional plane). The Goldfarb cube is the solution set of a system of 2d linear inequalities with at most 3 variables per inequality. We show in this paper that the $d$-dimensional Klee-Minty cube --- constructed from inequalities with at most 2 variables per inequality --- also has a shadow with $2^d$ vertices. In contrast, with one variable per inequality, the size of the shadow is bounded by 2d.
△ Less
Submitted 12 August, 2013;
originally announced August 2013.
-
Variable Metric Random Pursuit
Authors:
Sebastian U. Stich,
Christian L. Müller,
Bernd Gärtner
Abstract:
We consider unconstrained randomized optimization of smooth convex objective functions in the gradient-free setting. We analyze Random Pursuit (RP) algorithms with fixed (F-RP) and variable metric (V-RP). The algorithms only use zeroth-order information about the objective function and compute an approximate solution by repeated optimization over randomly chosen one-dimensional subspaces. The dist…
▽ More
We consider unconstrained randomized optimization of smooth convex objective functions in the gradient-free setting. We analyze Random Pursuit (RP) algorithms with fixed (F-RP) and variable metric (V-RP). The algorithms only use zeroth-order information about the objective function and compute an approximate solution by repeated optimization over randomly chosen one-dimensional subspaces. The distribution of search directions is dictated by the chosen metric.
Variable Metric RP uses novel variants of a randomized zeroth-order Hessian approximation scheme recently introduced by Leventhal and Lewis (D. Leventhal and A. S. Lewis., Optimization 60(3), 329--245, 2011). We here present (i) a refined analysis of the expected single step progress of RP algorithms and their global convergence on (strictly) convex functions and (ii) novel convergence bounds for V-RP on strongly convex functions. We also quantify how well the employed metric needs to match the local geometry of the function in order for the RP algorithms to converge with the best possible rate.
Our theoretical results are accompanied by numerical experiments, comparing V-RP with the derivative-free schemes CMA-ES, Implicit Filtering, Nelder-Mead, NEWUOA, Pattern-Search and Nesterov's gradient-free algorithms.
△ Less
Submitted 30 September, 2014; v1 submitted 18 October, 2012;
originally announced October 2012.
-
A Polynomial-Time Algorithm for the Tridiagonal and Hessenberg P-Matrix Linear Complementarity Problem
Authors:
Bernd Gärtner,
Markus Sprecher
Abstract:
We give a polynomial-time dynamic programming algorithm for solving the linear complementarity problem with tridiagonal or, more generally, Hessenberg P-matrices. We briefly review three known tractable matrix classes and show that none of them contains all tridiagonal P-matrices.
We give a polynomial-time dynamic programming algorithm for solving the linear complementarity problem with tridiagonal or, more generally, Hessenberg P-matrices. We briefly review three known tractable matrix classes and show that none of them contains all tridiagonal P-matrices.
△ Less
Submitted 1 December, 2011;
originally announced December 2011.
-
Optimization of Convex Functions with Random Pursuit
Authors:
Sebastian U. Stich,
Christian L. Müller,
Bernd Gärtner
Abstract:
We consider unconstrained randomized optimization of convex objective functions. We analyze the Random Pursuit algorithm, which iteratively computes an approximate solution to the optimization problem by repeated optimization over a randomly chosen one-dimensional subspace. This randomized method only uses zeroth-order information about the objective function and does not need any problem-specific…
▽ More
We consider unconstrained randomized optimization of convex objective functions. We analyze the Random Pursuit algorithm, which iteratively computes an approximate solution to the optimization problem by repeated optimization over a randomly chosen one-dimensional subspace. This randomized method only uses zeroth-order information about the objective function and does not need any problem-specific parametrization. We prove convergence and give convergence rates for smooth objectives assuming that the one-dimensional optimization can be solved exactly or approximately by an oracle. A convenient property of Random Pursuit is its invariance under strictly monotone transformations of the objective function. It thus enjoys identical convergence behavior on a wider function class. To support the theoretical results we present extensive numerical performance results of Random Pursuit, two gradient-free algorithms recently proposed by Nesterov, and a classical adaptive step-size random search scheme. We also present an accelerated heuristic version of the Random Pursuit algorithm which significantly improves standard Random Pursuit on all numerical benchmark problems. A general comparison of the experimental results reveals that (i) standard Random Pursuit is effective on strongly convex functions with moderate condition number, and (ii) the accelerated scheme is comparable to Nesterov's fast gradient method and outperforms adaptive step-size strategies.
The appendix contains additional supporting online material.
△ Less
Submitted 24 May, 2012; v1 submitted 1 November, 2011;
originally announced November 2011.
-
Counting Unique-Sink Orientations
Authors:
Jan Foniok,
Bernd Gärtner,
Lorenz Klaus,
Markus Sprecher
Abstract:
Unique-sink orientations (USOs) are an abstract class of orientations of the n-cube graph. We consider some classes of USOs that are of interest in connection with the linear complementarity problem. We summarise old and show new lower and upper bounds on the sizes of some such classes. Furthermore, we provide a characterisation of K-matrices in terms of their corresponding USOs.
Unique-sink orientations (USOs) are an abstract class of orientations of the n-cube graph. We consider some classes of USOs that are of interest in connection with the linear complementarity problem. We summarise old and show new lower and upper bounds on the sizes of some such classes. Furthermore, we provide a characterisation of K-matrices in terms of their corresponding USOs.
△ Less
Submitted 5 July, 2013; v1 submitted 7 December, 2010;
originally announced December 2010.
-
An Exponential Lower Bound on the Complexity of Regularization Paths
Authors:
Bernd Gärtner,
Martin Jaggi,
Clément Maria
Abstract:
For a variety of regularized optimization problems in machine learning, algorithms computing the entire solution path have been developed recently. Most of these methods are quadratic programs that are parameterized by a single parameter, as for example the Support Vector Machine (SVM). Solution path algorithms do not only compute the solution for one particular value of the regularization paramet…
▽ More
For a variety of regularized optimization problems in machine learning, algorithms computing the entire solution path have been developed recently. Most of these methods are quadratic programs that are parameterized by a single parameter, as for example the Support Vector Machine (SVM). Solution path algorithms do not only compute the solution for one particular value of the regularization parameter but the entire path of solutions, making the selection of an optimal parameter much easier.
It has been assumed that these piecewise linear solution paths have only linear complexity, i.e. linearly many bends. We prove that for the support vector machine this complexity can be exponential in the number of training points in the worst case. More strongly, we construct a single instance of n input points in d dimensions for an SVM such that at least Θ(2^{n/2}) = Θ(2^d) many distinct subsets of support vectors occur as the regularization parameter changes.
△ Less
Submitted 25 October, 2012; v1 submitted 27 March, 2009;
originally announced March 2009.
-
Pivoting in Linear Complementarity: Two Polynomial-Time Cases
Authors:
Jan Foniok,
Komei Fukuda,
Bernd Gärtner,
Hans-Jakob Lüthi
Abstract:
We study the behavior of simple principal pivoting methods for the P-matrix linear complementarity problem (P-LCP). We solve an open problem of Morris by showing that Murty's least-index pivot rule (under any fixed index order) leads to a quadratic number of iterations on Morris's highly cyclic P-LCP examples. We then show that on K-matrix LCP instances, all pivot rules require only a linear num…
▽ More
We study the behavior of simple principal pivoting methods for the P-matrix linear complementarity problem (P-LCP). We solve an open problem of Morris by showing that Murty's least-index pivot rule (under any fixed index order) leads to a quadratic number of iterations on Morris's highly cyclic P-LCP examples. We then show that on K-matrix LCP instances, all pivot rules require only a linear number of iterations. As the main tool, we employ unique-sink orientations of cubes, a useful combinatorial abstraction of the P-LCP.
△ Less
Submitted 28 March, 2009; v1 submitted 8 July, 2008;
originally announced July 2008.
-
Two New Bounds on the Random-Edge Simplex Algorithm
Authors:
Bernd Gärtner,
Volker Kaibel
Abstract:
We prove that the Random-Edge simplex algorithm requires an expected number of at most 13n/sqrt(d) pivot steps on any simple d-polytope with n vertices. This is the first nontrivial upper bound for general polytopes. We also describe a refined analysis that potentially yields much better bounds for specific classes of polytopes. As one application, we show that for combinatorial d-cubes, the tri…
▽ More
We prove that the Random-Edge simplex algorithm requires an expected number of at most 13n/sqrt(d) pivot steps on any simple d-polytope with n vertices. This is the first nontrivial upper bound for general polytopes. We also describe a refined analysis that potentially yields much better bounds for specific classes of polytopes. As one application, we show that for combinatorial d-cubes, the trivial upper bound of 2^d on the performance of Random-Edge can asymptotically be improved by any desired polynomial factor in d.
△ Less
Submitted 15 July, 2008; v1 submitted 1 February, 2005;
originally announced February 2005.