Oct D 5 2010 Libraries

Total Page:16

File Type:pdf, Size:1020Kb

Oct D 5 2010 Libraries Average-Case Complexity of Detecting Cliques by Benjamin Rossman Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Doctor of Philosophy MASSACHUSETTS INSTITUTE OF TECHOLOGY at the OCT D5 2010 MASSACHUSETTS INSTITUTE OF TECHNOLOGY September 2010 LIBRARIES @ Benjamin Rossman, 2010. All rights reserved. ARCHNES The author hereby grants to MIT permission to reproduce and distribute publicly paper and electronic copies of this thesis document in whole or in part. Author........... .......................... Department of Electrical Enginf ring and Computer Science September 3, 2010 I I A 1, It t\ Certified by.............. Madhu Sudan Professor of Electrical Engineering and Computer Science Thesis Supervisor A ccepted by ................................. Ter.. .......... Terry P. Orlando Chairman, Department of Electrical Engineering and Computer Science Average-Case Complexity of Detecting Cliques by Benjamin Rossman Submitted to the Department of Electrical Engineering and Computer Science on September 3, 2010, in partial fulfillment of the requirements for the degree of Doctor of Philosophy Abstract The computational problem of testing whether a graph contains a complete subgraph of size k is among the most fundamental problems studied in theoretical computer science. This thesis is concerned with proving lower bounds for k-CLIQUE, as this problem is known. Our results show that, in certain models of computation, solving k-CLIQUE in the average case requires Q(nk/4) resources (moreover, k/4 is tight). Here the models of computation are bounded-depth Boolean circuits and unbounded-depth monotone circuits, the complexity measure is the number of gates, and the input distributions are random graphs with an appropriate density of edges. Such random graphs (the well-studied Erdos-Renyi random graphs) are widely believed to be a source of computationally hard instances for clique problems (as Karp suggested in 1976). Our results are the first unconditional lower bounds supporting this hypothesis. For bounded-depth Boolean circuits, our average-case hardness result significantly im- proves the previous worst-case lower bounds of Q(nk/Poly(d)) for depth-d circuits. In partic- ular, our lower bound of Q(nk/ 4 ) has no noticeable dependence on d for circuits of depth d ; k- log n/log log n, thus bypassing the previous "size-depth tradeoffs". As a conse- quence, we obtain a novel Size Hierarchy Theorem for uniform AC0 . A related application answers a longstanding open question in finite model theory (raised by Immerman in 1982): we show that the hierarchy of bounded-variable fragments of first-order logic is strict on finite ordered graphs. Additional results of this thesis characterize the average-case descrip- tive complexity of k-CLIQUE through the lens of first-order logic. Thesis Supervisor: Madhu Sudan Title: Professor of Electrical Engineering and Computer Science Acknowledgments It was my extreme good fortunate to have Madhu Sudan as an advisor. Madhu, thanks for all the encouragement and enlightened advice you gave me on so many occasions. To my thesis committee-Scott Aaronson, Neil Immerman and Joel Spencer-thanks for your feedback, especially a few insights that have improved the results in this thesis. I am eternally grateful to my early mentors, Scott Weinstein and Yuri Gurevich. Scott, with contagious enthusiasm, introduced me to the subject of finite model theory and pointed me in many fruitful directions. Yuri has been a valuable teacher, who guided me through early beginnings in research with patience and the most exceptional kindness. My sincere thanks to all those who hosted me with warm hospitality during various visits and internships: Albert Atserias, Eli Ben-Sasson, Ron Fagin, Phokion Kolaitis, Janos Makowsky, Sasha Razborov, Michel de Rougemont, Saharon Shelah and Osamu Watanabe. In addition to this list, I thank Andreas Blass, Anuj Dawar, Martin Grohe, Leonid Libkin, Patrice Ossona de Mendez and Mike Sipser for stimulating conversations. Special thanks to Rahul Santhanam for discussions that helped shape this thesis. Let me not fail to mention that I am a member of the Jarik Nesetril Appreciation Society. Many thanks to the friends at MIT who made this experience so great: Anna, Andy, Bernhard, Brendan, Chih-yu, Dan, Elena, Eriko, Erin, Jing, Krzysztof, Nadia, Oren, Petar, Rotem, Shubhangi, Swastik, Qinwen and Yulan (to name just a few). And two friends in particular, Annie Liu and Costin Alamariu, whose kindness and generosity are more than I deserve. (Annie, here is your own sentence.) Finally and most of all, I thank my family-David, Lynne, Jenny and Zayna-for their love and support. I dedicate this thesis to my parents, David and Lynne Rossman. Bibliographic note The main results in this thesis appear in two conference papers: " "On the constant-depth complexity of k-CLIQUE" [64], containing preliminary versions of the results in Chapter 3, and * "The monotone complexity of k-CLIQUE on random graphs" [66] (forthcoming), which constitutes Chapter 4. I thank Christoph Berkholz for pointing out a minor mistake in [64] (fixed in this thesis) and Tomoyuki Hayasaka and Koutaro Nakagawa for helpful feedback on [66]. Chapter 6 of this thesis (on descriptive complexity) includes an unpublished result due to Neil Immerman (Theorem 6.11), as well as the fruits of a collaboration with Joel Spencer (Theorem 6.23). Contents 1 Introduction 9 1.1 Lower bounds in computational complexity .................. 9 1.1.1 Bounded-depth circuits ......................... 10 1.1.2 Monotone circuits ... ......................... 11 1.2 Average-case lower bounds ........... ............. 11 1.2.1 Karp's question ......................... ..... 12 1.2.2 Scaling Karp's question to G(n, n-) ... ............... 12 1.3 Bounded-variable logics ........ ..................... 13 1.4 O ur results ............... ..................... 15 1.5 Applications in complexity and logic ...................... 16 1.6 Techniques ................... 17 2 Definitions and Preliminaries 19 2.1 Basic notation .................................. 19 2.2 C ircuits ...................................... 20 2.2.1 Circuit parameters ............. ............... 20 2.2.2 Complexity ...................... .21 2.3 Graphs and patterns .......................... ..... 21 2.3.1 Threshold exponent ............ ............... 21 2.3.2 Graph functions, monotonicity and minterms ............. 21 2.4 Probability .... ........................... ..... 22 2.4.1 Random graphs .................... .......... 22 2.4.2 Background lemmas .. ......................... 22 2.4.3 Janson's inequality ............ ............. ... 23 2.5 Small, medium, large .... ........................... 24 3 Lower Bound for Bounded-Depth Circuits 27 3.1 A lemma on random restrictions. ...................... 28 3.2 The f-sensitive subgraph......... .... ............... 31 3.3 Preliminary result: lower bound on wires ................... 35 3.4 Main result: lower bound on size ....... ............. .... 37 4 Lower Bound for Monotone Circuits 43 4.1 Results of this chapter ............. ............. .... 43 4.2 Razborov's approximation method ...... ............. .... 45 4.3 Quasi-sunflowers .. .............. ............. .... 46 4.4 The approximation via a closure operator...... ......... .... 48 4.5 K vs. G . ...... ... .................................. 51 4.6 GUKvs.GUG- ................................. 53 4.7 Removing the fan-in restriction ......................... 54 5 Matching Upper Bound 59 5.1 Auxiliary subcircuits. .................... .. 59 5.2 Som e random sets .......... ...................... 61 5.3 The full construction.. ........................... 63 6 Descriptive Complexity 65 6.1 k/4 variable lower bound ....................... ..... 66 6.2 Strictness of the variable hierarchy .. ..................... 66 6.3 Average-case definability of k-CLIQUE without order . ............ 69 6.3.1 k/2 variables are necessary ....................... 69 6.3.2 k/2+log k + O(1) variables suffice ................... 70 6.3.3 k/2 + 0(1) variables suffice ............. .......... 72 7 Extensions and Open Problems 75 7.1 Extensions of our results ............................. 75 7.1.1 Size-depth and size-gap tradeoffs .................... 75 7.1.2 Planting a larger clique ......................... 76 7.1.3 Subgraph isomorphism problem ...... ............... 76 7.2 Open problem s ....... ........................... 77 7.2.1 Karp's question at the k-clique threshold .......... ..... 77 7.2.2 Monotone lower bound at a single threshold .............. 77 7.2.3 Additional questions ........................... 77 Chapter 1 Introduction The computational problem of testing whether a graph contains a complete subgraph of size k is among the most fundamental problems studied in theoretical computer science. This thesis is concerned with proving lower bounds for k-CLIQUE, as this problem is known. That is, our aim is to show that k-CLIQUE cannot be solved with certain limited computational resources. Understanding the complexity of k-CLIQUE is key to unlocking the relationship between P and NP. In the traditional view where k is part of the input, the problem of detecting k- cliques is famously NP-complete (one Karp's 21 NP-complete problems [45]). In this thesis, however, we consider the problem for fixed but arbitrary values of k. Here the brute-force O(nk) algorithm places k-CLIQUE in P. A crucial observation is that to separate
Recommended publications
  • Zaawansowane Zagadnienia Kombinatoryk
    Zał nr 4 do ZW Faculty of Fundamental Problems of Technology COURSE CARD Name in polish : Zaawansowane Zagadnienia Kombinatoryki Name in english : Advanced Topics of Combinatorics Field of study : Computer Science Specialty (if applicable) : Undergraduate degree and form of : masters, stationary Type of course : optional Course code : E2_W30 Group rate : Yes Lectures Exercides Laboratory Project Seminar Number of classes held in schools (ZZU) 30 30 The total number of hours of student wor- 90 90 kload (CNPS) Assesment pass For a group of courses final course mark X Number of ECTS credits 3 3 including the number of points correspon- 3 ding to the classes of practical (P) including the number of points correspon- 3 3 ding occupations requiring direct contact (BK) PREREQUISITES FOR KNOWLEDGE, SKILLS AND OTHER POWERS The knowledge of basic topics of Mathematical analysis 1, Discrete Mathematics and Probabilistic methods and statistics (Probability theory) is required. The elementary knowledge on Graph theory is recommended but not mandatory. COURSE OBJECTIVES C1 Presentation of selected advanced issues of modern combinatorics. C2 Learning modern techniques used to solve combinatorial problems. 1 COURSE LEARNING OUTCOMES The scope of the student’s knowledge: W1 Student understands the concept of issues in extremal combinatorics and is able to indicate their examples. W2 Student knows the basics of Ramsey theory. W3 Student knows the elementary issues of percolation and understands their threshold nature. The student skills: U1 Student can apply basic probability tools in analyzing a combinatorial problem U2 Student can use the theorems of Ramsey theory to identify features of mathematical objects. U3 Student can indicate threshold character of different percolation processes.
    [Show full text]
  • Sub–Optimality of Local Algorithms on Sparse Random Graphs by Mustazee Rahman a Thesis Submitted in Conformity with the Requir
    Sub{optimality of local algorithms on sparse random graphs by Mustazee Rahman A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department of Mathematics University of Toronto c Copyright 2015 by Mustazee Rahman Abstract Sub{optimality of local algorithms on sparse random graphs Mustazee Rahman Doctor of Philosophy Graduate Department of Mathematics University of Toronto 2015 This thesis studies local algorithms for solving combinatorial optimization problems on large, sparse random graphs. Local algorithms are randomized algorithms that run in parallel at each vertex of a graph by using only local information around each vertex. In practice, they generate important structures on large graphs such as independent sets, matchings, colourings and eigenfunctions of the graph Laplacian with efficient run{time and little memory usage. They have also been used to solve instances of constraint satisfaction problems such as k-SAT. Hatami, Lov´aszand Szegedy conjectured that all reasonable optimization problems on large random d-regular graphs can be approximately solved by local algorithms. This is true for matchings: local algorithms can produce near perfect matchings in random d-regular graphs. However, this conjecture was recently shown to be false for independent sets by Gamarnik and Sudan. They showed that local algorithms cannot generate maximal independent sets on large random d-regular graphs if the degree d is sufficiently large. We prove an optimal quantitative measure of failure of this conjecture for the problem of percolation on graphs. The basic question is this. Consider a large integer τ, which is a threshold parameter. Given some large graph G, find the maximum sized induced subgraph of G whose connected components have size no bigger than τ.
    [Show full text]
  • On the Upper Tail of Counts of Strictly Balanced Subgraphs
    On the Upper Tail of Counts of Strictly Balanced Subgraphs Matas Sileikisˇ Department of Mathematics and Computer Science, Adam Mickiewicz University, Pozna´n, Poland [email protected] Submitted: Aug 20, 2011; Accepted: Dec 19, 2012; Published: Jan 6, 2012 Mathematics Subject Classification: 05C80 Abstract Let XG be the number of copies of G in the Erd}os-R´enyi binomial random graph G(n; p). Janson, Oleszkiewicz and Ruci´nskiproved that for every t > 1 ∗ ∗ exp{−Ot(MG ln(1=p))g 6 P fXG > t EXGg 6 exp{−Ωt(MG)g; ∗ where MG is a certain function of n and p. For G = K3 the logarithmic gap between the bounds was closed by Chatterjee and, independently, DeMarco and Kahn. We provide matching bounds for strictly balanced G, when EXG 6 ln n. Also, we give matching bounds for C4, K4, and stars K1;k in a broader range of EXG. In particular, this improves some results of Janson and Ruci´nskifor which the so called deletion method was used. 1 Introduction For a fixed graph G, let XG be the number of copies of G in the random graph G(n; p) (see, e.g., [5] for definition) and let µG = EXG. We consider the asymptotics of − ln P fXG > tµGg for fixed t > 1, as n ! 1. In the sequel, we always assume that G has at least one edge. We use the asymptotic notation O; Ω; Θ; o; ; as it is defined in [5] with implicit constants possibly depending on G. Subscripts added to these symbols indicate additional parameters on which the implicit constants depend.
    [Show full text]
  • On General Subtrees of a Conditioned Galton–Watson Tree
    ON GENERAL SUBTREES OF A CONDITIONED GALTON{WATSON TREE SVANTE JANSON Abstract. We show that the number of copies of a given rooted tree in a conditioned Galton{Watson tree satisfies a law of large numbers under a minimal moment condition on the offspring distribution. 1. Introduction Let Tn be a random conditioned Galton{Watson tree with n nodes, defined by an offspring distribution ξ with mean E ξ = 1, and let t be a fixed ordered rooted tree. We are interested in the number of copies of t as a (general) subtree of Tn, which we denote by Nt(Tn). For details of these and other definitions, see Section 2. Note that we consider subtrees in a general sense. (Thus, e.g., not just fringe trees; for them, see similar results in [9].) The purpose of the present paper is to show the following law of large numbers under minimal moment assumptions. Let nt(T ) be the number of rooted copies of t in a tree T , i.e., copies with the root at the root of T . Further, let ∆(t) be the maximum outdegree in t. Theorem 1.1. Let t be a fixed ordered tree, and let Tn be a conditioned Galton{ ∆(t) Watson tree defined by an offspring distribution ξ with E ξ = 1 and E ξ < 1. Also, let T be a Galton{Watson tree with the same offspring distribution. Then, as n ! 1, L1 Nt(Tn)=n −! E nt(T ); (1.1) where the limit is finite and given explicitly by (3.2) below.
    [Show full text]
  • Comments on Sparse Graphs Using Exchangeable Random Measures by Fran¸Coiscaron and Emily B
    Comments on Sparse graphs using exchangeable random measures by Fran¸coisCaron and Emily B. Fox Professor Svante Janson∗ Uppsala University, Sweden 10 May, 2017 I find the random graph model introduced here by Caron and Fox very interesting. Apart from its potential use in applications, it has novel and interesting mathematical properties. Moreover, it has been an inspiration of important generalizations developed after the first version of the present paper by, in particular, [1] and [2]. The relation with Kallenberg's characterization of exchangeable random measures is interesting, and presumably useful in further developments of the theory, but I would like to stress that, for the contents of the present paper, Kallenberg's highly technical theorem may serve as a (possibly important) inspiration for the model, but it is not needed for the formal construction of the model and the study of its properties. Furthermore, the basic construction can be stated in several different, equivalent, ways. I prefer to see the basic construction in the paper as follows, including generalizations by [1] and [2]. Let (S; µ) be a σ-finite measure space, and let F (x; y) be a fixed symmetric measurable function 1 S × S ! [0; 1]. Generate a random countable point set (wi; θi)1 of points in S × R+ by taking a Poisson point process in S × R+ with intensity µ × λ. Regard the θi as (labels of) vertices, and add an edge θiθj with probability F (wi; wj), independently for all pairs (θi; θj) with i 6 j. (Finally, eliminate isolated vertices.) The version in the present paper constructs 1 (wi; θi)1 by a CRM, which is equivalent to choosing S = R+ with µ the L´evymeasure; furthermore, F is chosen as F (x; y) = 1 − e−2xy (for x 6= y).
    [Show full text]
  • WEIGHTED RANDOM STAIRCASE TABLEAUX 1. Introduction This Paper Is Concerned with a Combinatorial Structure Introduced Re
    WEIGHTED RANDOM STAIRCASE TABLEAUX PAWELHITCZENKO † AND SVANTE JANSON‡ Abstract. This paper concerns a relatively new combinatorial struc- ture called staircase tableaux. They were introduced in the context of the asymmetric exclusion process and Askey–Wilson polynomials, how- ever, their purely combinatorial properties have gained considerable in- terest in the past few years. In this paper we further study combinatorial properties of staircase tableaux. We consider a general model of random staircase tableaux in which symbols (Greek letters) that appear in staircase tableaux may have arbitrary positive weights. (We consider only the case with the parameters u = q = 1.) Under this general model we derive a number of results. Some of our results concern the limiting laws for the number of appearances of symbols in a random staircase tableaux. They generalize and subsume earlier results that were obtained for specific values of the weights. One advantage of our generality is that we may let the weights ap- proach extreme values of zero or infinity which covers further special cases appearing earlier in the literature. Furthermore, our generality allows us to analyze the structure of random staircase tableaux and we obtain several results in this direction. One of the tools we use are generating functions of the parameters of interests. This leads us to a two–parameter family of polynomials, generalizing the classical Eulerian polynomials. We also briefly discuss the relation of staircase tableaux to the asym- metric exclusion process, to other recently introduced types of tableaux, and to an urn model studied by a number of researchers, including Philippe Flajolet. 1.
    [Show full text]
  • Celebrating 50 Years of the Applied Probability Trust
    J. Appl. Prob. Spec. Vol. 51A, 123–137 (2014) © Applied Probability Trust 2014 CELEBRATING 50 YEARS OF THE APPLIED PROBABILITY TRUST Edited by S. ASMUSSEN, P.JAGERS, I. MOLCHANOV and L. C. G. ROGERS Part 4. Random graphs and particle systems THE PROBABILITY THAT A RANDOM MULTIGRAPH IS SIMPLE. II SVANTE JANSON, Uppsala University Department of Mathematics, Uppsala University, PO Box 480, SE-751 06 Uppsala, Sweden. Email address: [email protected] APPLIED PROBABILITY TRUST DECEMBER 2014 Downloaded from https://www.cambridge.org/core. IP address: 170.106.34.90, on 01 Oct 2021 at 02:14:20, subject to the Cambridge Core terms of use, available at https://www.cambridge.org/core/terms. https://doi.org/10.1239/jap/1417528471 THE PROBABILITY THAT A RANDOM MULTIGRAPH IS SIMPLE. II BY SVANTE JANSON Abstract ∗ Consider a random multigraph G with given vertex degrees d1,...,dn, constructed by the configuration model. We give a new proof of the fact that, asymptotically for a 1 →∞ sequence of such multigraphs with the number of edges 2 i di , the probability 2 = that the multigraph is simple stays away from 0 if and only if i di O( i di ). The new proof uses the method of moments, which makes it possible to use it in some applications concerning convergence in distribution. Corresponding results for bipartite graphs are included. Keywords: Configuration model; random multigraph; random bipartite graph 2010 Mathematics Subject Classification: Primary 05C80; 05C30; 60C05 1. Introduction n [ ]:={ } Let G(n, (di)1) be the random (simple) graph with vertex set n 1,...,n and vertex degrees d1,...,dn, uniformly chosen among all such graphs.
    [Show full text]
  • Completely Continuous Hankel Operators on 77°° and Bourgain Algebras
    proceedings of the american mathematical society Volume 105, Number 1, January 1989 COMPLETELY CONTINUOUS HANKEL OPERATORS ON 77°° AND BOURGAIN ALGEBRAS JOSEPH A. CIMA, SVANTE JANSON AND KEITH YALE (Communicated by John B. Conway) Abstract. Let {H°°)b be the Bourgain algebra of /Y00 C L°° . We prove (H°°)b = H°° + C. In particular if / e L°° then the Hankel operator Hf is a compact map of H°° into BMO iff whenever f„ — 0 weakly in H°° , then di8t(//B,//°°)-»0. 1. Introduction and results Cima and Timoney [3] introduced the following definition, based on an idea of Bourgain [1]: Let A be a Banach algebra and let X be a linear subspace of A . Then the "Bourgain algebra" Xb is defined to be the set of all xe A such that (1.1) if xn —•0 weakly in X, then dist(xxn, X) -* Q, It is proved in Cima and Timoney [3] that Xb is a closed subalgebra of A, and that if X is an algebra then Xb D X. (Actually, Cima and Timoney only consider the case A = C(K), but the same proof holds in general.) Bourgain [2] has shown that H°°(D) has the Dunford-Pettis property using the theory of ultra-products. A Banach space X has the Dunford-Pettis property if whenever xn-t0 weakly in X and x* —►0 weakly in X* then Hm (x„ ,x„) -0. In trying to develop a more basic function theoretic proof of this result the following question arose. If A = L°°(T) and X = H°°, characterize the closed subalgebra Xb, H°° c Xb c L°° ; equality Xb = L°° implying that 77°° has the Dunford-Pettis property.
    [Show full text]
  • On Directed Random Graphs and Greedy Walks on Point Processes
    UPPSALA DISSERTATIONS IN MATHEMATICS 97 On Directed Random Graphs and Greedy Walks on Point Processes Katja Gabrysch Department of Mathematics Uppsala University UPPSALA 2016 Dissertation presented at Uppsala University to be publicly examined in Polhemsalen, Ångströmlaboratoriet, Lägerhyddsvägen 1, Uppsala, Friday, 9 December 2016 at 13:15 for the degree of Doctor of Philosophy. The examination will be conducted in English. Faculty examiner: Professor Thomas Mountford (EPFL, Switzerland). Abstract Gabrysch, K. 2016. On Directed Random Graphs and Greedy Walks on Point Processes. Uppsala Dissertations in Mathematics 97. 28 pp. Uppsala: Department of Mathematics. ISBN 978-91-506-2608-7. This thesis consists of an introduction and five papers, of which two contribute to the theory of directed random graphs and three to the theory of greedy walks on point processes. We consider a directed random graph on a partially ordered vertex set, with an edge between any two com- parable vertices present with probability p, independently of all other edges, and each edge is directed from the vertex with smaller label to the vertex with larger label. In Paper I we consider a directed random graph on 2 with the vertices ordered according to the product order and we show that the limiting distribution of the centered and rescaled length of the longest path from (0,0) to (n, na ), a<3/14, is ℤthe Tracy-Widom distribution. In Paper II we show that, under a suitable rescaling, the closure of vertex 0 of a directed random graph on with edge probability n−1 converges⌊ in⌋ distribution to the Poisson-weighted infinite tree.
    [Show full text]
  • Arxiv:1910.13358V1 [Math.PR] 29 Oct 2019 Variables Ohmtiswe Hr Sn Iko Confusion
    ON DISTANCE COVARIANCE IN METRIC AND HILBERT SPACES SVANTE JANSON Abstract. Distance covariance is a measure of dependence between two random variables that take values in two, in general different, met- ric spaces, see Sz´ekely, Rizzo and Bakirov (2007) and Lyons (2013). It is known that the distance covariance, and its generalization α-distance covariance, can be defined in several different ways that are equivalent under some moment conditions. The present paper considers four such definitions and find minimal moment conditions for each of them, to- gether with some partial results when these conditions are not satisfied. The paper also studies the special case when the variables are Hilbert space valued, and shows under weak moment conditions that two such variables are independent if and only if their (α-)distance covariance is 0; this extends results by Lyons (2013) and Dehling et al. (2018+). The proof uses a new definition of distance covariance in the Hilbert space case, generalizing the definition for Euclidean spaces using characteristic functions by Sz´ekely, Rizzo and Bakirov (2007). 1. Introduction Distance covariance is a measure of dependence between two random variables X and Y that take values in two, in general different, spaces and . This measure appears in Feuerverger [9] as a test statistic whenX = Y = R; it was more generally introduced by Sz´ekely, Rizzo and Bakirov [26]X forY the case of random variables in Euclidean spaces, possibly of different dimensions. This was extended to general separable measure spaces by Lyons [18], see also Jakobsen [12], and to semimetric spaces (of negative type, see below) by Sejdinovic et al.
    [Show full text]
  • An Interview with Donald Knuth 1974 ACM Turing Award Recipient
    An Interview with Donald Knuth 1974 ACM Turing Award Recipient Interviewed by: Edward Feigenbaum March 14, 2007 and March 21, 2007 Mountain View, California This transcript and the interview on which it is based is from the files of the Computer History Museum in Mountain View, California. It is used here by the ACM with Kind permission from the Museum. CHM Reference number: X3926.2007, © 2007 Computer History Museum DK: Donald Knuth, The 1974 ACM Turing Award Recipient EF: Edward Feigenbaum, a professor at Stanford University EF: My name is Edward Feigenbaum. I’m a professor at Stanford University, in the Computer Science Department. I’m very pleased to have the opportunity to interview my colleague and friend from 1968 on, Professor Don Knuth of the Computer Science Department. Don and I have discussed the question of what viewers and readers of this oral history we think there are. We’re orienting our questions and comments to several groups of you readers and viewers. First, the generally intelligent and enlightened science-oriented person who has seen the field of computer science explode in the past half century and would like to find out what is important, even beautiful, and what some of the field’s problems have been. Second, the student of today who would like orientation and motivation toward computer science as a field of scholarly work and application, much as Don and I had to do in the 1950s. And third, those of you who maybe are not yet born, the history of science scholar of a dozen or 100 years from now, who will want to know more about Donald Knuth, the scientist and programming artist, who produced a memorable body of work in the decades just before and after the turn of the millennium.
    [Show full text]
  • Downloads Over 8,000)
    Volume 46 • Issue 3 IMS Bulletin April/May 2017 2017 Tweedie Award winner CONTENTS The Institute of Mathematical Statistics 1 Tweedie Award has selected Rina Foygel Barber as the winner of this year’s Tweedie New 2 Members’ News: Danny Pfeffermann, Peter Researcher Award. Guttorp, Rajen Shah, Anton Rina is an Assistant Professor in the Wakolbinger Department of Statistics at the University of Chicago, since January 2014. In 3 Members’ News: ISI Elected members’ IMS elections; 2012–2013 she was an NSF postdoctoral Photo quiz fellow in the Department of Statistics at Stanford University, supervised by 4 Obituaries: Stephen E. Fienberg, Ulf Grenander Emmanuel Candès. Before her postdoc, she received her PhD in Statistics at the Pro Bono Statistics: Yoram Rina Barber 7 University of Chicago in 2012, advised Gat’s new column by Mathias Drton and Nati Srebro, and a MS in Mathematics at the University of 9 Recent papers: Stochastic Chicago in 2009. Prior to graduate school, she was a mathematics teacher at the Park Systems, Probability Surveys School of Baltimore from 2005 to 2007. 10 Donors to IMS Funds Rina lists her research interests as: high-dimensional inference, sparse and low-rank models, and nonconvex optimization, particularly optimization problems arising in 12 Meeting report medical imaging. Her homepage is https://www.stat.uchicago.edu/~rina/. 13 Terence’s Stuff: It Exists! The IMS Travel Awards Committee selected Rina “for groundbreaking contribu- 14 Meetings tions in high-dimensional statistics, including the identifiability of graphical models, low-rank matrix estimation, and false discovery rate theory. A special mention is made 22 Employment Opportunities for her role in the development of the knockoff filter for controlled variable selection.” Rina will present the Tweedie New Researcher Invited Lecture at the IMS New 23 International Calendar Researchers Conference, held this year at the Johns Hopkins University from July 27 Information for Advertisers 27–29 (see http://groups.imstat.org/newresearchers/conferences/nrc.html).
    [Show full text]