Algebraic Methods in the Congested Clique∗

Total Page:16

File Type:pdf, Size:1020Kb

Algebraic Methods in the Congested Clique∗ Algebraic Methods in the Congested Clique∗ y z Keren Censor-Hillel Petteri Kaski Janne H. Korhonen Technion Helsinki Institute for Helsinki Institute for [email protected] Information Technology & Information Technology & Aalto University University of Helsinki petteri.kaski@aalto.fi janne.h.korhonen@helsinki.fi Christoph Lenzen Ami Paz Jukka Suomela MPI for Informatics Technion Helsinki Institute for [email protected] [email protected] Information Technology & Aalto University jukka.suomela@aalto.fi ABSTRACT lem Complexity]: General; G.2.2 [Mathematics of Com- In this work, we use algebraic methods for studying distance puting]: Discrete Mathematics|Graph Theory computation and subgraph detection tasks in the congested clique model. Specifically, we adapt parallel matrix multipli- Keywords cation implementations to the congested clique, obtaining Distributed computing; congested clique model; lower bounds; an O(n1−2=!) round matrix multiplication algorithm, where matrix multiplication; subgraph detection; distance compu- ! < 2:3728639 is the exponent of matrix multiplication. In tation conjunction with known techniques from centralised algorith- mics, this gives significant improvements over previous best upper bounds in the congested clique model. The highlight 1. INTRODUCTION results include: Algebraic methods have become a recurrent tool in cen- { triangle and 4-cycle counting in O(n0:158) rounds, im- tralised algorithmics, employing a wide range of techniques (e.g., [10{16, 21{23, 27, 29, 30, 44, 45, 51, 59, 72, 73]). In proving upon the O(n1=3) triangle counting algorithm this paper, we bring techniques from the algebraic toolbox to of Dolev et al. [DISC 2012], the aid of distributed computing, by leveraging fast matrix { a (1 + o(1))-approximation of all-pairs shortest paths multiplication in the congested clique model. in O(n0:158) rounds, improving upon the O~(n1=2)-round In the congested clique model, the n nodes of a graph (2+o(1))-approximation algorithm of Nanongkai [STOC G communicate by exchanging messages of O(log n) size in 2014], and { computing the girth in O(n0:158) rounds, which is the first non-trivial solution in this model. Running time In addition, we present a novel constant-round combinatorial Problem This work Prior work algorithm for detecting 4-cycles. mat. mult. (semiring) O(n1=3) | Categories and Subject Descriptors mat. mult. (ring) O(n0:158) O(n0:373)[26] 0:158 1=3 F.1.1 [Computation by Abstract Devices]: Models of triangle counting O(n ) O(n = log n)[25] Computation; F.2.0 [Analysis of Algorithms and Prob- 4-cycle detection O(1) O(n1=2= log n)[25] 0:158 1=2 ∗ 4-cycle counting O(n ) O(n = log n)[25] A full version of this paper is available at [18]. k-cycle detection 2O(k)n0:158 O(n1−2=k= log n)[25] y Supported by ISF Individual Research Grant 1696/14 girth O(n0:158) | z Supported by the European Research Council under the APSP: European Union's Seventh Framework programme (FP/2007{ weighted, directed O(n1=3 log n) | 2013) / ERC Grant Agreement n. 338077. · weighted diameter UO(Un0:158) | · (1 + o(1))-approx. O(n0:158) | Permission to make digital or hard copies of all or part of this work for personal or ~ 1=2 classroom use is granted without fee provided that copies are not made or distributed · (2 + o(1))-approx. O(n )[58] for profit or commercial advantage and that copies bear this notice and the full cita- APSP: tion on the first page. Copyrights for components of this work owned by others than unweighted, undirected O(n0:158) | ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or re- ~ 1=2 publish, to post on servers or to redistribute to lists, requires prior specific permission · (2 + o(1))-approx. O(n )[58] and/or a fee. Request permissions from [email protected]. PODC’15, July 21–23, 2015, Donostia-San Sebastián, Spain. Table 1: Our results versus prior work, using ! < Copyright c 2015 ACM 978-1-4503-3617-8 /15/07 ...$15.00. 2:3729 [34]; O~ hides polylogarithmic factors. DOI: http://dx.doi.org/10.1145/2767386.2767414 . a fully-connected synchronous network; initially, each node exists a matrix multiplication algorithm in the congested is aware of its neighbours in G. In comparison with the clique running in O(nσ) rounds. In this notation, Theorem 1 traditional CONGEST model [61], the key difference is that gives us a pair of nodes can communicate directly even if they are not ρ ≤ 1 − 2=! < 0:15715 ; adjacent in graph G. The congested clique model masks away the effect of distances on the computation and focuses on prior to this work, it was known that ρ ≤ ! − 2 [26]. the limited bandwidth. As such, it has been recently gaining For the rest of this paper, we will { as is convention for increasing attention [25, 26, 37, 38, 47, 50, 52, 58, 60, 64], in centralised algorithmics { slightly abuse notation by writing an attempt to understand the relative computational power nρ for the complexity of matrix multiplication in the con- of distributed computing models. gested clique. This hides factors of O(n") resulting from the The key insight of this paper is that matrix multiplication fact that ρ is defined as infimum of an infinite set. We also algorithms from parallel computing can be adapted to obtain use O~ and Ω~ notation to hide polylogarithmic factors. an O(n1−2=!) round matrix multiplication algorithm in the congested clique, where ! < 2:3728639 is the matrix mul- Lower bounds for matrix multiplication. Our results are tiplication exponent [34]. Combining this with well-known optimal in the sense that for any sequential matrix multi- centralised techniques allows us to use fast matrix multipli- plication implementation, no scheme simulating it on the cation to solve various combinatorial problems, immediately congested clique can give a faster algorithm than the con- 0:158 giving O(n )-time algorithms in the congested clique for struction underlying Theorem 1; this follows from known many classical graph problems. Indeed, while most of the results for parallel matrix multiplication [2, 8, 42, 70]. More- techniques we use in this work are known beforehand, their over, we note that for the broadcast congested clique model, combination gives significant improvements over the best pre- where each node is required to send the same message to all viously known upper bounds. Table 1 contains a summary nodes in any given round, recent lower bounds [39] imply of our results, which we overview in more details in what that matrix multiplication requires Ω(~ n) rounds. follows. 1.2 Applications in Cycle Detection and 1.1 Matrix Multiplication in the Congested Counting Clique Our first application of fast matrix multiplication is to the As a basic primitive, we consider the computation of the problems of triangle counting [43] and 4-cycle counting. product P = ST of two n×n matrices S and T on a congested clique of n nodes. We will tacitly assume that the matrices Corollary 2. On directed and undirected graphs, count- are initially distributed so that node v has row v of both ing triangles and 4-cycles takes O(nρ) rounds. S and T , and it will receive row v of P in the end. Recall that the matrix multiplication exponent ! is defined as the For ρ ≤ 1−2=!, this is an improvement upon the previously infimum over σ such that the product of two n × n matrices best known O(n1=3)-round triangle detection algorithm of σ can be computed with O(n ) arithmetic operations; it is Dolev et al. [25]. In particular, we disprove the conjecture known that 2 ≤ ! < 2:3728639 [34], and it is conjectured, of Dolev et al. [25] that any deterministic oblivious algorithm though not unanimously, that ! = 2. for detecting triangles requires Ω(~ n1=3) rounds. When only detection of cycles is required, we observe that Theorem 1. The product of two n × n matrices can be combining fast distributed matrix multiplication with the computed in a congested clique of n nodes in O(n1=3) rounds 1−2=!+" well-known technique of colour-coding [5] allows to detect over semirings. Over rings, O(n ) rounds suffice (for k-cycles in O~(nρ) rounds for any constant k. This improves any constant " > 0). upon the subgraph detection algorithm of Dolev et al. [25], ~ 1−2=k Theorem 1 follows by adapting known parallel matrix which requires O(n ) rounds for detecting (arbitrary) multiplication algorithms for semirings [1, 55] and rings [7, subgraphs of k nodes. 53, 56, 71] to the clique model, via the routing technique Corollary 3. For any graph, the existence of k-cycles of Lenzen [47]. In fact, with little extra work one can show can be detected in 2O(k)nρ log n rounds. that the resulting algorithm is also oblivious, that is, the communication pattern is predefined and does not depend on For the specific case of k = 4, we provide a novel algorithm the input matrices. Hence, the oblivious routing technique that does not use matrix multiplication and detects 4-cycles of Dolev et al. [25] suffices for implementing these algorithms. in only O(1) rounds. The above addresses matrices whose entries can be encoded with O(log n) bits, which is sufficient for dealing with integers Theorem 4. On undirected graphs, the existence of 4- of absolute value at most nO(1). In general, if b bits are cycles can be detected in O(1) rounds. If such a cycle exists, sufficient to encode matrix entries, the bounds above hold one such cycle can also be reported in O(1) rounds.
Recommended publications
  • 1 Introduction and Contents
    University of Padova - DEI Course “Introduction to Natural Language Processing”, Academic Year 2002-2003 Term paper Fast Matrix Multiplication PhD Student: Carlo Fantozzi, XVI ciclo 1 Introduction and Contents This term paper illustrates some results concerning the fast multiplication of n × n matrices: we use the adjective “fast” as a synonym of “in time asymptotically lower than n3”. This subject is relevant to natural language processing since, in 1975, Valiant showed [27] that Boolean matrix multiplication can be used to parse context-free grammars (or CFGs, for short): as a consequence, a fast boolean matrix multiplication algorithm yields a fast CFG parsing algorithm. Indeed, Valiant’s algorithm parses a string of length n in time proportional to TBOOL(n), i.e. the time required to multiply two n × n boolean matrices. Although impractical because of its high constants, Valiant’s algorithm is the asymptotically fastest CFG parsing solution known to date. A simpler (hence nearer to practicality) version of Valiant’s algorithm has been devised by Rytter [20]. One might hope to find a fast, practical parsing scheme which do not rely on matrix multiplica- tion: however, some results seem to suggest that this is a hard quest. Satta has demonstrated [21] that tree-adjoining grammar (TAG) parsing can be reduced to boolean matrix multiplication. Subsequently, Lee has proved [18] that any CFG parser running in time O gn3−, with g the size of the context-free grammar, can be converted into an O m3−/3 boolean matrix multiplication algorithm∗; the constants involved in the translation process are small. Since canonical parsing schemes exhibit a linear depen- dence on g, it can be reasonably stated that fast, practical CFG parsing algorithms can be translated into fast matrix multiplication algorithms.
    [Show full text]
  • Mathematics People
    Mathematics People Srinivas Receives TWAS Prize Strassen Awarded ACM Knuth in Mathematics Prize Vasudevan Srinivas of the Tata Institute of Fundamental Volker Strassen of the University of Konstanz has been Research, Mumbai, has been named the winner of the 2008 awarded the 2008 Knuth Prize of the Association for TWAS Prize in Mathematics, awarded by the Academy of Computing Machinery (ACM) Special Interest Group on Sciences for the Developing World (TWAS). He was hon- Algorithms and Computation Theory (SIGACT). He was ored “for his basic contributions to algebraic geometry honored for his contributions to the theory and practice that have helped deepen our understanding of cycles, of algorithm design. The award carries a cash prize of motives, and K-theory.” Srinivas will receive a cash prize US$5,000. of US$15,000 and will deliver a lecture at the academy’s According to the prize citation, “Strassen’s innovations twentieth general meeting, to be held in South Africa in enabled fast and efficient computer algorithms, the se- September 2009. quence of instructions that tells a computer how to solve a particular problem. His discoveries resulted in some of the —From a TWAS announcement most important algorithms used today on millions if not billions of computers around the world and fundamentally altered the field of cryptography, which uses secret codes Pujals Awarded ICTP/IMU to protect data from theft or alteration.” Ramanujan Prize His algorithms include fast matrix multiplication, inte- ger multiplication, and a test for the primality
    [Show full text]
  • Amortized Circuit Complexity, Formal Complexity Measures, and Catalytic Algorithms
    Electronic Colloquium on Computational Complexity, Report No. 35 (2021) Amortized Circuit Complexity, Formal Complexity Measures, and Catalytic Algorithms Robert Roberey Jeroen Zuiddamy McGill University Courant Institute, NYU [email protected] and U. of Amsterdam [email protected] March 12, 2021 Abstract We study the amortized circuit complexity of boolean functions. Given a circuit model F and a boolean function f : f0; 1gn ! f0; 1g, the F-amortized circuit complexity is defined to be the size of the smallest circuit that outputs m copies of f (evaluated on the same input), divided by m, as m ! 1. We prove a general duality theorem that characterizes the amortized circuit complexity in terms of “formal complexity measures”. More precisely, we prove that the amortized circuit complexity in any circuit model composed out of gates from a finite set is equal to the pointwise maximum of the family of “formal complexity measures” associated with F. Our duality theorem captures many of the formal complexity measures that have been previously studied in the literature for proving lower bounds (such as formula complexity measures, submodular complexity measures, and branching program complexity measures), and thus gives a characterization of formal complexity measures in terms of circuit complexity. We also introduce and investigate a related notion of catalytic circuit complexity, which we show is “intermediate” between amortized circuit complexity and standard circuit complexity, and which we also characterize (now, as the best integer solution to a linear program). Finally, using our new duality theorem as a guide, we strengthen the known upper bounds for non-uniform catalytic space, introduced by Buhrman et.
    [Show full text]
  • Michael Oser Rabin Automata, Logic and Randomness in Computation
    Michael Oser Rabin Automata, Logic and Randomness in Computation Luca Aceto ICE-TCS, School of Computer Science, Reykjavik University Pearls of Computation, 6 November 2015 \One plus one equals zero. We have to get used to this fact of life." (Rabin in a course session dated 30/10/1997) Thanks to Pino Persiano for sharing some anecdotes with me. Luca Aceto The Work of Michael O. Rabin 1 / 16 Michael Rabin's accolades Selected awards and honours Turing Award (1976) Harvey Prize (1980) Israel Prize for Computer Science (1995) Paris Kanellakis Award (2003) Emet Prize for Computer Science (2004) Tel Aviv University Dan David Prize Michael O. Rabin (2010) Dijkstra Prize (2015) \1970 in computer science is not classical; it's sort of ancient. Classical is 1990." (Rabin in a course session dated 17/11/1998) Luca Aceto The Work of Michael O. Rabin 2 / 16 Michael Rabin's work: through the prize citations ACM Turing Award 1976 (joint with Dana Scott) For their joint paper \Finite Automata and Their Decision Problems," which introduced the idea of nondeterministic machines, which has proved to be an enormously valuable concept. ACM Paris Kanellakis Award 2003 (joint with Gary Miller, Robert Solovay, and Volker Strassen) For \their contributions to realizing the practical uses of cryptography and for demonstrating the power of algorithms that make random choices", through work which \led to two probabilistic primality tests, known as the Solovay-Strassen test and the Miller-Rabin test". ACM/EATCS Dijkstra Prize 2015 (joint with Michael Ben-Or) For papers that started the field of fault-tolerant randomized distributed algorithms.
    [Show full text]
  • Modular Algorithms in Symbolic Summation and Sy
    Lecture Notes in Computer Science 3218 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos New York University, NY, USA Doug Tygar University of California, Berkeley, CA, USA Moshe Y. Vardi Rice University, Houston, TX, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany Jürgen Gerhard Modular Algorithms in Symbolic Summation and Symbolic Integration 13 Author Jürgen Gerhard Maplesoft 615 Kumpf Drive, Waterloo, ON, N2V 1K8, Canada E-mail: [email protected] This work was accepted as PhD thesis on July 13, 2001, at Fachbereich Mathematik und Informatik Universität Paderborn 33095 Paderborn, Germany Library of Congress Control Number: 2004115730 CR Subject Classification (1998): F.2.1, G.1, I.1 ISSN 0302-9743 ISBN 3-540-24061-6 Springer Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks.
    [Show full text]
  • Strassen's Matrix Multiplication Algorithm for Matrices of Arbitrary
    STRASSEN’S MATRIX MULTIPLICATION ALGORITHM FOR MATRICES OF ARBITRARY ORDER IVO HEDTKE Abstract. The well known algorithm of Volker Strassen for matrix mul- tiplication can only be used for (m2k × m2k) matrices. For arbitrary (n × n) matrices one has to add zero rows and columns to the given matrices to use Strassen’s algorithm. Strassen gave a strategy of how to set m and k for arbitrary n to ensure n ≤ m2k. In this paper we study the number d of ad- ditional zero rows and columns and the influence on the number of flops used by the algorithm in the worst case (d = n/16), best case (d = 1) and in the average case (d ≈ n/48). The aim of this work is to give a detailed analysis of the number of additional zero rows and columns and the additional work caused by Strassen’s bad parameters. Strassen used the parameters m and k to show that his matrix multiplication algorithm needs less than 4.7nlog2 7 flops. We can show in this paper, that these parameters cause an additional work of approximately 20 % in the worst case in comparison to the optimal strategy for the worst case. This is the main reason for the search for better parameters. 1. Introduction In his paper “Gaussian Elimination is not Optimal” ([14]) Volker Strassen developed a recursive algorithm (we will call it S) for multiplication of square matrices of order m2k. The algorithm itself is described below. Further details can be found in [8, p. 31]. Before we start with our analysis of the parameters of Strassen’s algorithm we will have a short look on the history of fast matrix multiplication.
    [Show full text]
  • An Interview with Michael Rabin Interviewer: David Harel (DH) November 12, 2015 in Jerusalem
    Page 1 An Interview with Michael Rabin Interviewer: David Harel (DH) November 12, 2015 in Jerusalem. DH: David Harel MR: Michael Rabin DH: My name is David Harel and I have the great pleasure of interviewing you, Michael Rabin but we will try and stick with “Michael” here. This interview is taking ( ִמ ָיכ ֵאל עוזר ַר ִבּין :Hebrew) place as a result of you winning the Turing Award in 1976 and the ACM producing a series of these interviews. Maybe you can start by telling us where you were born and how you began to shift into things that were close to mathematics. MR: So I was born in Germany in a city called Breslau which was later on annexed to Poland and is now called Wrocław. My father was there, at that time, the Rector, the Head, of the Jewish Theological Seminary – a very famous institution in Jewry. In 1935, I was born in 1931, my father realized where things were going in Germany, took us, his family, and we emigrated to what was then Palestine, now the state of Israel, and we settled in Haifa. DH: So you were four years old? MR: Not yet four, actually. So we settled in Haifa. I have a sister who is five years older than I am and she used to bring home books on various subjects – one of those books was Microbe Hunters by Paul de Kruif. So I read it when I was about eight years old and it captivated my imagination and I decided that I wanted to be a microbiologist.
    [Show full text]
  • Visiting Mathematicians Jon Barwise, in Setting the Tone for His New Column, Has Incorporated Three Articles Into This Month's Offering
    OTICES OF THE AMERICAN MATHEMATICAL SOCIETY The Growth of the American Mathematical Society page 781 Everett Pitcher ~~ Centennial Celebration (August 8-12) page 831 JULY/AUGUST 1988, VOLUME 35, NUMBER 6 Providence, Rhode Island, USA ISSN 0002-9920 Calendar of AMS Meetings and Conferences This calendar lists all meetings which have been approved prior to Mathematical Society in the issue corresponding to that of the Notices the date this issue of Notices was sent to the press. The summer which contains the program of the meeting. Abstracts should be sub­ and annual meetings are joint meetings of the Mathematical Associ­ mitted on special forms which are available in many departments of ation of America and the American Mathematical Society. The meet­ mathematics and from the headquarters office of the Society. Ab­ ing dates which fall rather far in the future are subject to change; this stracts of papers to be presented at the meeting must be received is particularly true of meetings to which no numbers have been as­ at the headquarters of the Society in Providence, Rhode Island, on signed. Programs of the meetings will appear in the issues indicated or before the deadline given below for the meeting. Note that the below. First and supplementary announcements of the meetings will deadline for abstracts for consideration for presentation at special have appeared in earlier issues. sessions is usually three weeks earlier than that specified below. For Abstracts of papers presented at a meeting of the Society are pub­ additional information, consult the meeting announcements and the lished in the journal Abstracts of papers presented to the American list of organizers of special sessions.
    [Show full text]
  • Notices of the American Mathematical Society ABCD Springer.Com
    ISSN 0002-9920 Notices of the American Mathematical Society ABCD springer.com Visit Springer at the of the American Mathematical Society 2010 Joint Mathematics December 2009 Volume 56, Number 11 Remembering John Stallings Meeting! page 1410 The Quest for Universal Spaces in Dimension Theory page 1418 A Trio of Institutes page 1426 7 Stop by the Springer booths and browse over 200 print books and over 1,000 ebooks! Our new touch-screen technology lets you browse titles with a single touch. It not only lets you view an entire book online, it also lets you order it as well. It’s as easy as 1-2-3. Volume 56, Number 11, Pages 1401–1520, December 2009 7 Sign up for 6 weeks free trial access to any of our over 100 journals, and enter to win a Kindle! 7 Find out about our new, revolutionary LaTeX product. Curious? Stop by to find out more. 2010 JMM 014494x Adrien-Marie Legendre and Joseph Fourier (see page 1455) Trim: 8.25" x 10.75" 120 pages on 40 lb Velocity • Spine: 1/8" • Print Cover on 9pt Carolina ,!4%8 ,!4%8 ,!4%8 AMERICAN MATHEMATICAL SOCIETY For the Avid Reader 1001 Problems in Mathematics under the Classical Number Theory Microscope Jean-Marie De Koninck, Université Notes on Cognitive Aspects of Laval, Quebec, QC, Canada, and Mathematical Practice Armel Mercier, Université du Québec à Chicoutimi, QC, Canada Alexandre V. Borovik, University of Manchester, United Kingdom 2007; 336 pages; Hardcover; ISBN: 978-0- 2010; approximately 331 pages; Hardcover; ISBN: 8218-4224-9; List US$49; AMS members 978-0-8218-4761-9; List US$59; AMS members US$47; Order US$39; Order code PINT code MBK/71 Bourbaki Making TEXTBOOK A Secret Society of Mathematics Mathematicians Come to Life Maurice Mashaal, Pour la Science, Paris, France A Guide for Teachers and Students 2006; 168 pages; Softcover; ISBN: 978-0- O.
    [Show full text]
  • Session II – Unit I – Fundamentals
    Tutor:- Prof. Avadhoot S. Joshi Subject:- Design & Analysis of Algorithms Session II Unit I - Fundamentals • Algorithm Design – II • Algorithm as a Technology • What kinds of problems are solved by algorithms? • Evolution of Algorithms • Timeline of Algorithms Algorithm Design – II Algorithm Design (Cntd.) Figure briefly shows a sequence of steps one typically goes through in designing and analyzing an algorithm. Figure: Algorithm design and analysis process. Algorithm Design (Cntd.) Understand the problem: Before designing an algorithm is to understand completely the problem given. Read the problem’s description carefully and ask questions if you have any doubts about the problem, do a few small examples by hand, think about special cases, and ask questions again if needed. There are a few types of problems that arise in computing applications quite often. If the problem in question is one of them, you might be able to use a known algorithm for solving it. If you have to choose among several available algorithms, it helps to understand how such an algorithm works and to know its strengths and weaknesses. But often you will not find a readily available algorithm and will have to design your own. An input to an algorithm specifies an instance of the problem the algorithm solves. It is very important to specify exactly the set of instances the algorithm needs to handle. Algorithm Design (Cntd.) Ascertaining the Capabilities of the Computational Device: After understanding the problem you need to ascertain the capabilities of the computational device the algorithm is intended for. The vast majority of algorithms in use today are still destined to be programmed for a computer closely resembling the von Neumann machine—a computer architecture outlined by the prominent Hungarian-American mathematician John von Neumann (1903–1957), in collaboration with A.
    [Show full text]
  • Approximate Nearest Neighbor Search in High Dimensions
    P. I. C. M. – 2018 Rio de Janeiro, Vol. 4 (3305–3336) APPROXIMATE NEAREST NEIGHBOR SEARCH IN HIGH DIMENSIONS A A, P I I R Abstract The nearest neighbor problem is defined as follows: Given a set P of n points in some metric space (X; D), build a data structure that, given any point q, returns a point in P that is closest to q (its “nearest neighbor” in P ). The data structure stores additional information about the set P , which is then used to find the nearest neighbor without computing all distances between q and P . The problem has a wide range of applications in machine learning, computer vision, databases and other fields. To reduce the time needed to find nearest neighbors and the amount of memory used by the data structure, one can formulate the approximate nearest neighbor prob- lem, where the the goal is to return any point p P such that the distance from q to 0 2 p is at most c minp P D(q; p), for some c 1. Over the last two decades many 0 efficient solutions to this2 problem were developed. In this article we survey these de- velopments, as well as their connections to questions in geometric functional analysis and combinatorial geometry. 1 Introduction The nearest neighbor problem is defined as follows: Given a set P of n points in a metric space defined over a set X with distance function D, build a data structure1 that, given any “query” point q X, returns its “nearest neighbor” arg minp P D(q; p).A 2 2 particularly interesting and well-studied case is that of nearest neighbor in geometric spaces, where X = Rd and the metric D is induced by some norm.
    [Show full text]
  • Gaussian Elimination Is Not Optimal, Revisited
    Downloaded from orbit.dtu.dk on: Sep 30, 2021 Gaussian elimination is not optimal, revisited Macedo, Hugo Daniel Published in: Journal of Logical and Algebraic Methods in Programming Link to article, DOI: 10.1016/j.jlamp.2016.06.003 Publication date: 2016 Document Version Peer reviewed version Link back to DTU Orbit Citation (APA): Macedo, H. D. (2016). Gaussian elimination is not optimal, revisited. Journal of Logical and Algebraic Methods in Programming, 85(5, Part 2), 999-1010. https://doi.org/10.1016/j.jlamp.2016.06.003 General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Users may download and print one copy of any publication from the public portal for the purpose of private study or research. You may not further distribute the material or use it for any profit-making activity or commercial gain You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Gaussian elimination is not optimal, revisited. Hugo Daniel Macedoa,b,1,∗ aDTU Compute, Technical University of Denmark, Kongens Lyngby, Denmark bDepartamento de Inform´atica, Pontif´ıciaUniversidade Cat´olica do Rio de Janeiro, Brazil Abstract We refactor the universal law for the tensor product to express matrix multipli- cation as the product M · N of two matrices M and N thus making possible to use such matrix product to encode and transform algorithms performing matrix multiplication using techniques from linear algebra.
    [Show full text]