Thesis and Analysis of Probabilistic Models

Total Page:16

File Type:pdf, Size:1020Kb

Thesis and Analysis of Probabilistic Models Diagnosis, Synthesis and Analysis of Probabilistic Models Tingting Han Graduation committee: prof. dr. ir. L. van Wijngaarden University of Twente, The Netherlands (chairman) prof. dr. ir. J.-P. Katoen RWTH Aachen University / University of Twente, (promotor) Germany / The Netherlands prof. dr. P. R. D’Argenio Universidad Nacional de C´ordoba, Argentina prof. dr. ir. B. R. Haverkort University of Twente, The Netherlands prof. dr. S. Leue University of Konstanz, Germany prof. dr. J. C. van de Pol University of Twente, The Netherlands prof. dr. R. J. Wieringa University of Twente, The Netherlands prof. dr. F. W. Vaandrager Radboud University Nijmegen, The Netherlands IPA Dissertation Series 2009-21. CTIT Ph.D.-Thesis Series No. 09-149, ISSN 1381-3617. ISBN: 978-90-365-2858-0. The research reported in this dissertation has been carried out under the auspices of the Institute for Programming Research and Algorithmics (IPA) and within the context of the Center for Telematics and Information Technology (CTIT). The research funding was provided by the NWO Grant through the project: Verifying Quantitative Properties of Embedded Software (QUPES). Translation of the Dutch abstract: Viet Yen Nguyen. Translation of the German abstract: Martin R. Neuh¨außer. Typeset by LATEX. Cover design: Tingting Han. Picture from www.vladstudio.com. Publisher: W¨ohrmann Printing Service - www.wps.nl. Copyright c 2009 by Tingting Han, Aachen, Germany. DIAGNOSIS, SYNTHESIS AND ANALYSIS OF PROBABILISTIC MODELS PROEFSCHRIFT ter verkrijging van de graad van doctor aan de Universiteit Twente, op gezag van de rector magnificus prof. dr. H. Brinksma, volgens besluit van het College voor Promoties, in het openbaar te verdedigen op vrijdag 25 september 2009 om 13:15 uur door Tingting Han geboren op 27 december 1980 te Hangzhou, Volksrepubliek China Dit proefschrift is goedgekeurd door de promotor, prof. dr. ir. Joost-Pieter Katoen. DIAGNOSIS, SYNTHESIS AND ANALYSIS OF PROBABILISTIC MODELS Der Fakult¨at f¨ur Mathematik, Informatik und Naturwissenschaften der Rheinisch-Westf¨alischen Technischen Hochschule Aachen vorgelegte Dissertation zur Erlangung des akademischen Grades einer Doktorin der Naturwissenschaften vorgelegt von Tingting Han, M. Eng aus Hangzhou, Volksrepublik China Berichter: Prof. Dr. Ir. Joost-Pieter Katoen Prof. Dr. Marta Z. Kwiatkowska Tag der m¨undlichen Pr¨ufung: 16. Oktober 2009 Diese Dissertation ist auf den Internetseiten der Hochschulbibliothek online verf¨ugbar. Acknowledgements I still remember the summer back in 2005 when I took this PhD position. Four years were just like a snap of fingers, leaving me this booklet and many vivid pieces of snapshots deep and clear in my mind. I was a “risk” four years ago when Joost-Pieter Katoen, my promotor and supervi- sor, decided to offer me this job. After all, to Joost-Pieter at that time, I was nothing more than a two-page CV and a short international call. I do appreciate this trust, which in these years keeps urging me to make progress and “make profits”:). His ex- pertise, insights and far-reaching interests broadened my views and helped me find “shorter (if not the shortest:) paths” at each crossroad. I am grateful for his endur- ing guidance, his great support, understanding and flexibility. I am also thankful for his big effort and contribution going to China in 2008, visiting different universities and institutes, giving both tutorials and more advanced invited talks, attracting more Chinese students and researchers to the field of formal verification. Many results presented in this thesis are a product of joint work. Apart from Joost- Pieter, I am grateful to Berteun Damman, Alexandru Mereacre and Taolue Chen, who shared ideas, had (usually long and fruitful) discussions and transferred their expertise to me. I am also thankful to Christel Baier, David N. Jansen and Jeremy Sproston for their useful remark and insightful discussion on my papers. The peer review and exchange of ideas inside the group, usually by/with Henrik Bohnenkamp, Daniel Klink and Martin Neuh¨außer have provided me with their precious comments and enlightening thoughts. Besides, I would like to thank Prof. Marta Kwiatkowska for inviting me to visit her group in Birmingham. I also enjoyed the visit(s) from Husain Aljazzar, Miguel Andr´es, Lars Grunske, Ralf Wimmer and Lijun Zhang for the interesting talks and discussions. Besides, the regular VOSS and QUASIMODO meetings made me feel like being in a big and happy family. I would like also to thank my reading and defense committee in Twente: Prof. Pedro D’Argenio, Prof. Boudewijn Haverkort, Prof. Stefan Leue, Prof. Jaco van de Pol, Prof. Frits Vaandrager, Prof. Roel Wieringa and Prof. Leen van Wijngaarden as well as the examiners in Aachen: Prof. Gerhard Lakemeyer, Prof. Marta Kwiatkowska, Prof. Stefan Kowalewski and Prof. Wolfgang Thomas. Although I already knew in the beginning that I would move with Joost-Pieter from Twente to Aachen, I had never anticipated what this “double identity” would mean to me. Actually I always feel proud when I can fill in two affiliations. I also feel lucky that I can get to know both top research groups. (Of course this acknowledgement will become twice as long as it would have been.:) i First, I really appreciate the liberty that Twente rendered me during my PhD study. The FMT group is so supportive, helpful and flexible that I do feel in debt to it. I would like to thank Ed Brinksma for introducing me to Joost-Pieter; and Jaco van de Pol for his understanding and support; also many thanks to Axel Belinfante, Rom Langerak, Arend Rensink, Theo Ruys, Mari¨elle Stoelinga, Mark Timmer, Michael Weber and the former members Hichem Boudali and Ivan Zapreev. Special thanks go to Joke Lammerink for everything she has done for me. Bedankt! On the other hand, I witnessed the growth and fast developments of the MOVES group, which offers me a relaxed and productive working atmosphere. As my roommate, Martin Neuh¨außer is always there and ready to help in every respect. I owe you a lot! I am also very lucky to have Haidi Yue, Viet Yen Nguyen, Alexandru Mereacre and Henrik Bohnenkamp around who make my laughters loud and lasting. Martin and Viet Yen are specially thanked for translating the abstract. Also many thanks to Erika Abr´aham,´ Xin Chen, Fabian Emmes, Carsten (Fuhs Kern Otto), Arnd Gehrmann, | | J¨urgen Giesl, Jonathan Heinen, Nils Jansen, Daniel Klink, Ulrich Loup, Thomas Noll, Elke Ohlenforst and Stefan Rieger and the former members Ren´eThiemann, Peter Schneider-Kamp and Stephan Swiderski. You made my time in the group more colorful! Dank sehr! My life in Aachen would have not been as pleasant if there were no cheerful com- pany and encouragements from friends in and outside Aachen. Just to name a few: Sebastian Bitzen, Andreas Brand, Yiwei Cao, Qingxia Gong, Olivier Guillard, Jianwei Han, Yingchun He, Xuan Li, Fang Liu, Leiqin Lu, Mikhail Pletyukhov, Kuangyu Shi, Leyi Shi, Hailin Wang, Wei Wang, Yan Wang, Yutian Wang, Shaochen Wei, Wei Wu, Ping Yu, Haidi Yue, Yuqi Zhang, Ziyun Zhang and many other friends. I am forever indebted to my family, especially my parents in China. Without their ÛÛåå unconditional love, encouragement and support, I won’t reach this far. a ! Also many thanks go to my little grandpa and my cousins Bin, Jian and Xiaoyun, who share experience, give advices and send me many pictures of my lovely little nephew ¤k|±³±ó[<ڶРand nieces. a ! Finally, to Taolue, well, due to the small space here, we can do this offline...:) ÜÜ Tingting Han (ô ) Amsterdam, May 2, 2009 ii Abstract This dissertation considers three important aspects of model checking Markov mod- els: diagnosis — generating counterexamples, synthesis — providing valid parameter values and analysis — verifying linear real-time properties. The three aspects are rela- tively independent while all contribute to developing new theory and algorithms in the research field of probabilistic model checking. We start by introducing a formal definition of counterexamples in the setting of probabilistic model checking. We transform the problem of finding informative coun- terexamples to shortest path problems. A framework is explored and provided for generating such counterexamples. We then investigate a more compact representation of counterexamples by regular expressions. Heuristic based algorithms are applied to obtain short regular expression counterexamples. In the end of this part, we extend the definition and counterexample generation algorithms to various combinations of probabilistic models and logics. We move on to the problem of synthesizing values for parametric continuous-time Markov chains (pCTMCs) wrt. time-bounded reachability specifications. The rates in the pCTMCs are expressed by polynomials over reals with parameters and the main question is to find all the parameter values (forming a synthesis region) with which the specification is satisfied. We first present a symbolic approach where the intersection points are computed by solving polynomial equations and then connected to approximate the synthesis region. An alternative non-symbolic approach based on interval arithmetic is investigated, where pCTMCs are instantiated. The error bound, time complexity as well as some experimental results have been provided, followed by a detailed comparison of the two approaches. In the last part, we focus on verifying CTMCs against linear real-time properties specified by deterministic timed automata (DTAs). The model checking problem aims at computing the probability of the set of paths in CTMC that can be accepted C by DTA , denoted PathsC( ). We consider DTAs with reachability (finite, DTA ) A A ♦ and Muller (infinite, DTAω) acceptance conditions, respectively. It is shown that PathsC( ) is measurable and computing its probability for DTA can be reduced to A ♦ computing the reachability probability in a piecewise deterministic Markov process (PDP). The reachability probability is characterized as the least solution of a system of integral equations and is shown to be approximated by solving a system of PDEs.
Recommended publications
  • Modeling Ddos Attacks by Generalized Minimum Cut Problems
    Modeling DDoS Attacks by Generalized Minimum Cut Problems Qi Duan, Haadi Jafarian and Ehab Al-Shaer Jinhui Xu Department of Software and Information Systems Department of Computer Science and Engineering University of North Carolina at Charlotte State University of New York at Buffalo Charlotte, NC, USA Buffalo, NY, USA Abstract—Distributed Denial of Service (DDoS) attack is one applications in many different areas [24]–[26], [32]. In this of the most preeminent threats in Internet. Despite considerable paper, we investigate two important generalizations of the progress on this problem in recent years, a remaining challenge minimum cut problem and their applications in link/node cut is to determine its hardness by adopting proper mathematical models. In this paper, we propose to use generalized minimum based DDoS attacks. The first generalization is denoted as cut as basic tools to model various types of DDoS attacks. the Connectivity Preserving Minimum Cut (CPMC) problem, Particularly, we study two important extensions of the classical which is to find the minimum cut that separates a pair (or pairs) minimum cut problem, called Connectivity Preserving Minimum of source and destination nodes and meanwhile preserve the Cut (CPMC) and Threshold Minimum Cut (TMC), to model large- connectivity between the source and its partner node(s). The scale DDoS attacks. In the CPMC problem, a minimum cut is sought to separate a source node from a destination node second generalization is denoted as the Threshold Minimum and meanwhile preserve the connectivity between the source Cut (TMC) problem in which a minimum cut is sought to and its partner node(s).
    [Show full text]
  • Scheduling on Uniform and Unrelated Machines with Bipartite Incompatibility Graphs Tytus Pikies ! Dept
    Scheduling on uniform and unrelated machines with bipartite incompatibility graphs Tytus Pikies ! Dept. of Algorithims and System Modelling, ETI Faculty, Gdańsk University of Technology, 11/12 Gabriela Narutowicza Street, 80-233 Gdańsk, Poland Hanna Furmańczyk ! Institute of Informatics, Faculty of Mathematics, Physics and Informatics, University of Gdańsk, 57 Wita Stwosza Street, 80-309 Gdańsk, Poland Abstract In this paper the problem of scheduling of jobs on parallel machines under incompatibility relation is considered. In this model a binary relation between jobs is given and no two jobs that are in the relation can be scheduled on the same machine. In particular, we consider job scheduling under incompatibility relation forming bipartite graphs, under makespan optimality criterion, on uniform and unrelated machines. We show that no algorithm can achieve a good approximation ratio for uniform machines, even for a case of unit time jobs, under P ≠ NP. We also provide an approximation algorithm that achieves the best possible approximation ratio, even for the case of jobs of arbitrary lengths pj , under the same assumption. Precisely, we present an O(n1/2−ϵ) inapproximability bound, for any pP ϵ > 0; and pj -approximation algorithm, respectively. To enrich the analysis, bipartite graphs generated randomly according to Gilbert’s model Gn,n,p(n) are considered. For a broad class of p(n) functions we show that there exists an algorithm producing a schedule with makespan almost surely at most twice the optimum. Due to our knowledge, this is the first study of randomly generated graphs in the context of scheduling in the considered model.
    [Show full text]
  • Curriculum Vitae
    Curriculum Vitae Tandy Warnow Grainger Distinguished Chair in Engineering 1 Contact Information Department of Computer Science The University of Illinois at Urbana-Champaign Email: [email protected] Homepage: http://tandy.cs.illinois.edu 2 Research Interests Phylogenetic tree inference in biology and historical linguistics, multiple sequence alignment, metage- nomic analysis, big data, statistical inference, probabilistic analysis of algorithms, machine learning, combinatorial and graph-theoretic algorithms, and experimental performance studies of algorithms. 3 Professional Appointments • Co-chief scientist, C3.ai Digital Transformation Institute, 2020-present • Grainger Distinguished Chair in Engineering, 2020-present • Associate Head for Computer Science, 2019-present • Special advisor to the Head of the Department of Computer Science, 2016-present • Associate Head for the Department of Computer Science, 2017-2018. • Founder Professor of Computer Science, the University of Illinois at Urbana-Champaign, 2014- 2019 • Member, Carl R. Woese Institute for Genomic Biology. Affiliate of the National Center for Supercomputing Applications (NCSA), Coordinated Sciences Laboratory, and the Unit for Criticism and Interpretive Theory. Affiliate faculty member in the Departments of Mathe- matics, Electrical and Computer Engineering, Bioengineering, Statistics, Entomology, Plant Biology, and Evolution, Ecology, and Behavior, 2014-present. • National Science Foundation, Program Director for Big Data, July 2012-July 2013. • Member, Big Data Senior Steering Group of NITRD (The Networking and Information Tech- nology Research and Development Program), subcomittee of the National Technology Council (coordinating federal agencies), 2012-2013 • Departmental Scholar, Institute for Pure and Applied Mathematics, UCLA, Fall 2011 • Visiting Researcher, University of Maryland, Spring and Summer 2011. 1 • Visiting Researcher, Smithsonian Institute, Spring and Summer 2011. • Professeur Invit´e,Ecole Polytechnique F´ed´erale de Lausanne (EPFL), Summer 2010.
    [Show full text]
  • A Gentle Introduction to Matroid Algorithmics
    A Gentle Introduction to Matroid Algorithmics Matthias F. Stallmann April 14, 2016 1 Matroid axioms The term matroid was first used in 1935 by Hassler Whitney [34]. Most of the material in this overview comes from the textbooks of Lawler [25] and Welsh [33]. A matroid is defined by a set of axioms with respect to a ground set S. There are several ways to do this. Among these are: Independent sets. Let I be a collection of subsets defined by • (I1) ; 2 I • (I2) if X 2 I and Y ⊆ X then Y 2 I • (I3) if X; Y 2 I with jXj = jY j + 1 then there exists x 2 X n Y such that Y [ x 2 I A classic example is a graphic matroid. Here S is the set of edges of a graph and X 2 I if X is a forest. (I1) and (I2) are clearly satisfied. (I3) is a simplified version of the key ingredient in the correctness proofs of most minimum spanning tree algorithms. If a set of edges X forms a forest then jV (X)j − jXj = jc(X)j, where V (x) is the set of endpoints of X and c(X) is the set of components induced by X. If jXj = jY j + 1, then jc(X)j = jc(Y )j − 1, meaning X must have at least one edge x that connects two of the components induced by Y . So Y [ x is also a forest. Another classic algorithmic example is the following uniprocessor scheduling problem, let's call it the scheduling matroid.
    [Show full text]
  • Lecture Notes: “Graph Theory 2”
    Lecture notes: \Graph Theory 2" November 28, 2018 Anders Nedergaard Jensen Preface In this course we study algorithms, polytopes and matroids related to graphs. These notes are almost complete, but some of the examples from the lectures have not been typed up, and some background information, such as proper definitions are sometimes lacking. For proper definitions we refer to: Bondy and Murty: "Graph Theory". Besides these minor problems, the notes represent the content of the class very well. 1 Contents 1 Matchings 6 1.1 Matchings . .6 1.2 When is a matching maximum? . .7 1.2.1 Coverings . .8 1.2.2 Hall's Theorem . 10 1.3 Augmenting path search . 11 1.4 Matchings in general graphs . 16 1.4.1 Certificates . 16 1.4.2 Edmonds' Blossom Algorithm . 18 1.5 Maximum weight matching in bipartite graphs . 23 1.6 Distances in graphs (parts of this section are skipped) . 26 1.6.1 Warshall's Algorithm . 28 1.6.2 Bellman-Ford-Moore . 30 1.6.3 Floyd's Algorithm . 33 1.7 Maximal weight matching in general graphs . 34 1.7.1 The Chinese postman problem . 35 1.7.2 Edmonds' perfect matching polytope theorem . 36 1.7.3 A separation oracle . 40 1.7.4 Some ideas from the ellipsoid method . 43 2 Matroids 44 2.1 Planar graphs . 44 2.2 Duality of plane graphs . 46 2.3 Deletion and contraction in dual graphs . 47 2.4 Matroids . 48 2.4.1 Independent sets . 48 2.4.2 The cycle matroid of a graph .
    [Show full text]
  • Algorithms for Weighted Multidimensional Search and Perfect Phylogeny Richa Agarwala Iowa State University
    Iowa State University Capstones, Theses and Retrospective Theses and Dissertations Dissertations 1994 Algorithms for weighted multidimensional search and perfect phylogeny Richa Agarwala Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/rtd Part of the Computer Sciences Commons Recommended Citation Agarwala, Richa, "Algorithms for weighted multidimensional search and perfect phylogeny " (1994). Retrospective Theses and Dissertations. 10669. https://lib.dr.iastate.edu/rtd/10669 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Retrospective Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. U-M-I MICROFILMED 1994 INFORMATION TO USERS This manuscript has been reproduced from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer. The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality iUustrations and photographs, print bleedthrough, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are reproduced by sectioning the original, beginning at the upper left-hand corner and continuing from left to right in equal sections with small overlaps.
    [Show full text]
  • Alyson “Allie” Fletcher Education Academic
    ALYSON “ALLIE”FLETCHER Assistant Professor Research Scientist University of California, Los Angeles University of California, Berkeley 8125 Math Sciences Bldg. Redwood Center for Theoretical Neuroscience Los Angeles, CA 90095-1554 Helen Wills Neuroscience Institute Tel: +1 201 965 1900 Citizenships: US & United Kingdom http://www.stat.ucla.edu/∼akfletcher/ Email: akfl[email protected] EDUCATION University of California, Berkeley: Ph.D. in Electrical Engineering and Computer Sciences (EECS), January 2006 A Jump Linear Framework for Estimation with Markovian Source and Channel Dynamics Committee - EECS: Kannan Ramchandran (chair) & Venkat Anantharam Mathematics: Alexandre J. Chorin M.S. in Mathematics, May 2005 Estimation via Sparse Approximation: Error Bounds and Random Frame Analysis Committee - Mathematics: F. Alberto Grunbaum¨ (chair) Statistics: David J. Aldous & Bin Yu M.S. in Electrical Engineering, May 2002 Denoising via Recursive Wavelet Thresholding Committee - EECS: Kannan Ramchandran (chair) & Laurent El Ghaoui University of Iowa, Iowa City, Iowa: B.S. with honors in Mathematics Minors: Physics & Music ACADEMIC APPOINTMENTS Assistant Professor, January 2016– Statistics, Mathematics, and Electrical Engineering University of California, Los Angeles Assistant Professor, September 2012–present Department of Electrical Engineering University of California, Santa Cruz Research Scientist, September 2012–present Redwood Center for Theoretical Neuroscience Helen Wills Neuroscience Institute University of California, Berkeley Postdoctoral
    [Show full text]
  • Scheduling in and out Forests in the Presence of Communication Delays
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 7, NO. 10, OCTOBER 1996 1065 Scheduling In and Out Forests in the Presence of Communication Delays Theodora A. Varvarigou, Member, IEEE, Vwani P. Roychowdhury, Member, IEEE, Thomas Kailath, Fellow, /€E€, and Eugene Lawler Abstract-We consider the problem of scheduling tasks on multiprocessor architectures in the presence of communication delays. Given a set of dependent tasks, the schedulingproblem is to allocate the tasks to processors such that the pre-specified precedence constraints among the tasks are obeyed and certain cost-measures(such as the computation time) are minimized. Several cases of the scheduling problem have been proven to be NP-complete [16],[lo]. Nevertheless, there are polynomial time algorithms for interesting special cases of the general scheduling problem [12], [14], [lo]. Most of these results, however, do not take into consideration the delays due to message passing among processors. In this paper we study the increase in time complexity of scheduling problems due to the introduction of communication delays. In particular, we address the open problem of scheduling Out-forests (In-forests)in a multiprocessor system of m identical processors when communication delays are considered. The corresponding problem of scheduling Out-forests (In-forests) without communication delays admits an elegant polynomial time solution as presentedfirst by Hu in 1961 1121; however, the problem in the presence of communication delays has remained unsolved. We present here first known polynomial time algorithms for the computation of the optimal schedule when the number of available processors is given and bounded and both computation and communication delays are assumed to take one unit of time.
    [Show full text]
  • UC Berkeley UC Berkeley Electronic Theses and Dissertations
    UC Berkeley UC Berkeley Electronic Theses and Dissertations Title Learned Human-in-the-Loop Decision Making Permalink https://escholarship.org/uc/item/0787m66c Author Basso, Brandon Publication Date 2012 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California Learned Human-in-the-Loop Decision Making by Brandon Basso A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Engineering - Mechanical Engineering in the Graduate Division of the University of California, Berkeley Committee in charge: Professor J. Karl Hedrick, Chair Professor Hugh Durrant-Whyte Professor David Auslander Professor Pieter Abbeel Fall 2012 Learned Human-in-the-Loop Decision Making Copyright 2012 by Brandon Basso 1 Abstract Learned Human-in-the-Loop Decision Making by Brandon Basso Doctor of Philosophy in Engineering - Mechanical Engineering University of California, Berkeley Professor J. Karl Hedrick, Chair Human beings are decision making engines. From low level automatic activities, such as walking, to high-level reasoning, we readily solve complex perception and decision problems in real time. On the other end of the spectrum, computers and robots have proven particu- larly useful in dull, dirty, and dangerous domains|inspecting nuclear disaster sites, solving vast optimization problems, and generally accomplishing tasks difficult for humans. Recent advances in robotics and computer science have only served to underscore the difference be- tween humans and robots, namely that robots tend to excel at lower level structured tasks, while humans are unmatched at higher level decision making, particularly when problems involve unstructured data, soft constraints, and ambiguous objectives. This thesis explores decision problems that lie in the gap between current robot capabil- ity and human ability.
    [Show full text]
  • 14 NP, NP Completeness, and the Cook-Levin Theorem
    Learning Objectives: • Introduce the class NP capturing a great many important computational problems • NP-completeness: evidence that a problem might be intractable. • The P vs NP problem. 14 NP, NP completeness, and the Cook-Levin Theorem “In this paper we give theorems that suggest, but do not imply, that these problems, as well as many others, will remain intractable perpetually”, Richard Karp, 1972 “Sad to say, but it will be many more years, if ever before we really understand the Mystical Power of Twoness… 2-SAT is easy, 3-SAT is hard, 2-dimensional matching is easy, 3-dimensional matching is hard. Why? oh, Why?” Eugene Lawler So far we have shown that 3SAT is no harder than Quadratic Equa- tions, Independent Set, Maximum Cut, and Longest Path. But to show that these problems are computationally equivalent we need to give re- ductions in the other direction, reducing each one of these problems to 3SAT as well. It turns out we can reduce all three problems to 3SAT in one fell swoop. In fact, this result extends far beyond these particular problems. All of the problems we discussed in Chapter 13, and a great many other problems, share the same commonality: they are all search problems, where the goal is to decide, given an instance 푥, whether there exists a solution 푦 that satisfies some condition that can be verified inpoly- nomial time. For example, in 3SAT, the instance is a formula and the solution is an assignment to the variable; in Max-Cut the instance is a graph and the solution is a cut in the graph; and so on and so forth.
    [Show full text]
  • Analysis of Cumulants
    Analysis of cumulants Lek-Heng Lim University of California, Berkeley March 6, 2009 Joint work with Jason Morton L.-H. Lim (Applied Math Seminar) Analysis of cumulants March 6, 2009 1 / 46 Cover Story: January 4, 2009 L.-H. Lim (Applied Math Seminar) Analysis of cumulants March 6, 2009 2 / 46 January 4, 2009 Risk Mismanagement By JOE NOCERA THERE AREN’T MANY widely told anecdotes about the current financial crisis, at least not yet, but there’s one that made the rounds in 2007, back when the big investment banks were first starting to write down billions of dollars in mortgage-backed derivatives and other so-called toxic securities. This was well before Bear Stearns collapsed, before Fannie Mae and Freddie Mac were taken over by the federal government, before Lehman fell and Merrill Lynch was sold and A.I.G. saved, before the $700 billion bailout bill was rushed into law. Before, that is, it became obvious that the risks taken by the largest banks and investment firms in the United States — and, indeed, in much of the Western world — were so excessive and foolhardy that they threatened to bring down the financial system itself. On the contrary: this was back when the major investment firms were still assuring investors that all was well, these little speed bumps notwithstanding — assurances based, in part, on their fantastically complex mathematical models for measuring the risk in their various portfolios. There are many such models, but by far the most widely used is called VaR — Value at Risk. Built around statistical ideas and probability theories that have been around for centuries, VaR was developed and popularized in the early 1990s by a handful of scientists and mathematicians — “quants,” they’re called in the business — who went to work for JPMorgan.
    [Show full text]
  • Combinatorics, Complexity, and Randomness
    TURINGA WARD LECTURE COMBINATORICS, COMPLEXITY, AND RANDOMNESS The 1985 Turing Award winner presents his perspective on the development of the field that has come to be called theoretical computer science. RICHARD M. KARP This lecture is dedicated to the memory of my father, coherence, there was a very special spirit in the air; we Abraham Louis Karp. knew that we were witnessing the birth of a new scien- tific discipline centered on the computer. I discovered I am honored and pleased to be the recipient of this that I found beauty and elegance in the structure of year’s Turing Award. As satisfying as it is to receive algorithms, and that I had a knack for the discrete such recognition, I find that my greatest satisfaction mathematics that formed the basis for the study of as a researcher has stemmed from doing the research computers and computation. In short, I had stumbled itself. and from the friendships I have formed along the more or less by accident into a field that was very way. I would like to roam with you through my 25 much to my liking. years as a researcher in the field of combinatorial algo- rithms and computational complexity, and tell you EASY AND HARD COMBINATORIAL PROBLEMS about some of the concepts that have seemed important Ever since those early days, I have had a special inter- to me, and about some of the people who have inspired est in combinatorial search problems-problems that and influenced me. can be likened to jigsaw puzzles where one has to as- semble the parts of a structure in a particular way.
    [Show full text]