Algorithms for Weighted Multidimensional Search and Perfect Phylogeny Richa Agarwala Iowa State University

Total Page:16

File Type:pdf, Size:1020Kb

Algorithms for Weighted Multidimensional Search and Perfect Phylogeny Richa Agarwala Iowa State University Iowa State University Capstones, Theses and Retrospective Theses and Dissertations Dissertations 1994 Algorithms for weighted multidimensional search and perfect phylogeny Richa Agarwala Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/rtd Part of the Computer Sciences Commons Recommended Citation Agarwala, Richa, "Algorithms for weighted multidimensional search and perfect phylogeny " (1994). Retrospective Theses and Dissertations. 10669. https://lib.dr.iastate.edu/rtd/10669 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Retrospective Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. U-M-I MICROFILMED 1994 INFORMATION TO USERS This manuscript has been reproduced from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer. The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality iUustrations and photographs, print bleedthrough, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are reproduced by sectioning the original, beginning at the upper left-hand corner and continuing from left to right in equal sections with small overlaps. Each original is also photographed in one exposure and is included in reduced form at the back of the book. Photographs included in the original manuscript have been reproduced xerographically in this copy. Higher quality 6" x 9" black and white photographic prints are available for any photographs or illustrations appearing in this copy for an additional charge. Contact UMI directly to order. University Microfilms International A Bell & Howell Information Company 300 North Zeeb Road. Ann Arbor. Ml 48106-1346 USA 313/761-4700 800/521-0600 Order Number 9503622 Algorithms for weighted multidimensional search and perfect phylogeny Agarwala, Richa, Ph.D. Iowa State University, 1994 Copyright ©1994 by Agarwala, Richa. All rights reserved. UMI 300N.ZeebRd. Ann Arbor, MI 48106 Algorithms for weighted multidimensional search and perfect phylogeny by Richa Agarwaia A Dissertation Submitted to the Graduate Faculty in Partial Fulfillment of the Requirements for the Degree of DOCTOR OF PHILOSOPHY Department: Computer Science Major; Computer Science Approved: Members of the Committee: Signature was redacted for privacy. Signature was redacted for privacy. Signature was redacted for privacy. For the Major Department Signature was redacted for privacy. For the Graduate College Iowa State University Ames, Iowa 1994 Copyright © Richa Agarwaia, 1994. All rights reserved. 11 TABLE OF CONTENTS ACKNOWLEDGEMENTS vi ABSTRACT vii 1. INTRODUCTION 1 1.1 Problem Definitions and Related Work • . 1 1.1.1 Weighted Multidimensional Search 1 1.1.2 Perfect Phylogeny 3 1.2 Dissertation Organization 8 2. WEIGHTED MULTIDIMENSIONAL SEARCH AND ITS AP­ PLICATION TO CONVEX OPTIMIZATION 10 2.1 Abstract 10 2.2 Introduction 11 2.3 Weighted Multidimensional Search 12 2.3.1 Preliminaries 13 2.3.2 The Search Algorithm 17 2.3.3 Improving the Efficiency of the Search 22 2.4 Convex Optimization in Fixed Dimension 24 2.4.1 The Basic Scheme 25 2.4.2 Speeding up the Search 31 Ill 2.4.3 Some Remarks on Constant Factors 36 2.5 Solving the Lagrangian Dual when the Number of Constraints is Fixed 36 2.5.1 Matroidal Knapsack Problems 38 2.5.2 Constrained Optimum Subgraph Problems 40 3. FAST ALGORITHMS FOR INFERRING EVOLUTIONARY TREES 42 3.1 Abstract 42 3.2 Introduction 43 3.3 An algorithm for BP 45 3.4 An online algorithm for characters 49 3.5 An online algorithm for species 55 4. A POLYNOMIAL-TIME ALGORITHM FOR THE PERFECT PHYLOGENY PROBLEM WHEN THE NUMBER OF CHAR­ ACTER STATES IS FIXED 60 4.1 Abstract 60 4.2 Introduction 61 4.3 Preliminaries 63 4.4 Subphylogenies 66 4.5 Building a subphylogeny 70 4.6 Building a perfect phylogeny 73 4.7 Concluding remarks 75 5. A SIMPLE AND FAST ALGORITHM FOR THE PERFECT PHYLOGENY PROBLEM WHEN THE NUMBER OF CHAR­ ACTERS IS FIXED 78 iv 5.1 Abstract 78 5.2 Introduction 79 5.3 Preliminaries 80 5.4 Finding c-clusters 83 5.5 Basic Algorithm for Perfect Phylogeny 85 5.6 Improved Algorithm for Perfect Phylogeny 88 6. CONCLUSIONS AND FUTURE WORK 90 BIBLIOGRAPHY 97 APPENDIX A: WEIGHTED SEARCH IN EUCLIDEAN PLANE . 103 APPENDIX B: ACCOMPANYING DISKETTE AND OPERAT­ ING INSTRUCTIONS 106 V LIST OF FIGURES 3.1 (a) A matrix M and (b) its phylogenetic tree P 44 3.2 (a) Characters Cj, • • •, Cg and (b) their character tree T. 46 3.3 Compact character tree R for T in Figure 2 50 3.4 Dividing iV^ into Ni^ and adding Nj 58 4.1 Forced and unforced states 64 6.1 3-restricted Steiner trees 94 6.2 4-restricted Steiner trees 95 6.3 Wp and 104 vi ACKNOWLEDGEMENTS The author spent three busy, constructive, and pleasant years at Iowa State University for the research leading to this dissertation. During this time, there were several people who have made direct or indirect contributions to this work and the author wishes to take this opportunity to thank some of them personaly. Thanks to my advisor Dr. David Fernandez-Baca without whom it would have been difficult for me to organize my ideas in a useful way. I also appreciate the understanding shown by him during this rapidly changing period of my life. I would like to thank my Program of Study committee members Dr. Giora Slutzki and Dr. Vasant Honavar from Department of Computer Science, Dr. Clifford Bergman from Department of Mathematics, and Dr. Ricardo F. Rosenbusch from Department of Microbiology, Immunology and Preventive Medicine, for the time and suggestions they gave to this dissertation. Special thanks are due to Dr. Daniel A. Ashlock for attending my final oral examination in place of Dr. Clifford Bergman. I am also grateful to the Department of Computer Science and the Liberal Arts and Science College at Iowa State University for providing financial assistance during this period. Vll ABSTRACT This dissertation is a collection of papers from two independent areas: convex J optimization problems in R and the construction of evolutionary trees. The paper on convex optimization problems in R^ gives improved algorithms for solving the Lagrangian duals of problems that have both of the following proper­ ties. First, in absence of the bad constraints, the problems can be solved in strongly polynomial time by combinatorial algorithms. Second, the number of bad constraints is fixed. As part of our solution to these problems, we extend Cole's circuit simula­ tion approach and develop a weighted version of Megiddo's multidimensional search technique. The papers on evolutionary tree construction deal with the perfect phylogeny problem, where species are specified by a set of characters and each character can occur in a species in one of a fixed number of states. This problem is known to be NP- complete. The dissertation contains the following results on the perfect phylogeny problem: • A linear time algorithm when all the characters have two states. • A polynomial time algorithm when the number of character states is fixed. • A polynomial time algorithm when the number of characters is fixed. 1 1. INTRODUCTION 1.1 Problem Definitions and Related Work This dissertation can be viewed as having two independent parts. In the first part J (Chapter 2 and Appendix A), we study some convex optimization problems in R". Their solution involves the development of a technique that we shall call weighted multidimensional search. The second part (Chapters 3, 4, 5 and Appendix B) deals with the combinatorial problem of inferring the evolutionary relationships of a set of species; specifically, we consider what is known as the perfect phylogeny problem. 1.1.1 Weighted Multidimensional Search Lagrangian relaxation is a widely-used and an efficient way to obtain good es­ timates on the value of the optimum solution to many NP-hard combinatorial prob­ lems [40, 41]. These bounds are very useful in branch-and-bound methods. As the name suggests, the idea is to "relax" the problem constraints enough so that the resulting problem is easier to solve, but not so much that the result obtained from the relaxed problem is too far from the true optimum. The optimization problems that we consider have the following form: g = min{c^x : Ax < 0,a: G X}, (P) where c is a n x 1 vector, A is a. d X n matrix, x is a n x 1 vector and X is a 2 polyhedral subset of We obtain a Lagrangian relaxation of (P) by pricing out the complicating set of constraints < 0 into the objective function by introducing a vector A = (Aj, • • •, A^) of Lagrange multipliers as follows: g£){X) = min{c^x + Ax : x G X}. (^W) It is well known that fl'£)(A) < g for all A > 0 [35]. Thus, the relaxation will provide a useful bounding tool if, for any fixed A > 0, problem (JD(A)) is easier to solve than (P). The best lower bound on g that is attainable via (X)(A)) is given by: g* = max{5f/j{A) : A > 0}. This problem is called the Lagrangian dualoi (P) with respect to the set of constraints Ax < 0.
Recommended publications
  • Modeling Ddos Attacks by Generalized Minimum Cut Problems
    Modeling DDoS Attacks by Generalized Minimum Cut Problems Qi Duan, Haadi Jafarian and Ehab Al-Shaer Jinhui Xu Department of Software and Information Systems Department of Computer Science and Engineering University of North Carolina at Charlotte State University of New York at Buffalo Charlotte, NC, USA Buffalo, NY, USA Abstract—Distributed Denial of Service (DDoS) attack is one applications in many different areas [24]–[26], [32]. In this of the most preeminent threats in Internet. Despite considerable paper, we investigate two important generalizations of the progress on this problem in recent years, a remaining challenge minimum cut problem and their applications in link/node cut is to determine its hardness by adopting proper mathematical models. In this paper, we propose to use generalized minimum based DDoS attacks. The first generalization is denoted as cut as basic tools to model various types of DDoS attacks. the Connectivity Preserving Minimum Cut (CPMC) problem, Particularly, we study two important extensions of the classical which is to find the minimum cut that separates a pair (or pairs) minimum cut problem, called Connectivity Preserving Minimum of source and destination nodes and meanwhile preserve the Cut (CPMC) and Threshold Minimum Cut (TMC), to model large- connectivity between the source and its partner node(s). The scale DDoS attacks. In the CPMC problem, a minimum cut is sought to separate a source node from a destination node second generalization is denoted as the Threshold Minimum and meanwhile preserve the connectivity between the source Cut (TMC) problem in which a minimum cut is sought to and its partner node(s).
    [Show full text]
  • Thesis and Analysis of Probabilistic Models
    Diagnosis, Synthesis and Analysis of Probabilistic Models Tingting Han Graduation committee: prof. dr. ir. L. van Wijngaarden University of Twente, The Netherlands (chairman) prof. dr. ir. J.-P. Katoen RWTH Aachen University / University of Twente, (promotor) Germany / The Netherlands prof. dr. P. R. D’Argenio Universidad Nacional de C´ordoba, Argentina prof. dr. ir. B. R. Haverkort University of Twente, The Netherlands prof. dr. S. Leue University of Konstanz, Germany prof. dr. J. C. van de Pol University of Twente, The Netherlands prof. dr. R. J. Wieringa University of Twente, The Netherlands prof. dr. F. W. Vaandrager Radboud University Nijmegen, The Netherlands IPA Dissertation Series 2009-21. CTIT Ph.D.-Thesis Series No. 09-149, ISSN 1381-3617. ISBN: 978-90-365-2858-0. The research reported in this dissertation has been carried out under the auspices of the Institute for Programming Research and Algorithmics (IPA) and within the context of the Center for Telematics and Information Technology (CTIT). The research funding was provided by the NWO Grant through the project: Verifying Quantitative Properties of Embedded Software (QUPES). Translation of the Dutch abstract: Viet Yen Nguyen. Translation of the German abstract: Martin R. Neuh¨außer. Typeset by LATEX. Cover design: Tingting Han. Picture from www.vladstudio.com. Publisher: W¨ohrmann Printing Service - www.wps.nl. Copyright c 2009 by Tingting Han, Aachen, Germany. DIAGNOSIS, SYNTHESIS AND ANALYSIS OF PROBABILISTIC MODELS PROEFSCHRIFT ter verkrijging van de graad van doctor aan de Universiteit Twente, op gezag van de rector magnificus prof. dr. H. Brinksma, volgens besluit van het College voor Promoties, in het openbaar te verdedigen op vrijdag 25 september 2009 om 13:15 uur door Tingting Han geboren op 27 december 1980 te Hangzhou, Volksrepubliek China Dit proefschrift is goedgekeurd door de promotor, prof.
    [Show full text]
  • Scheduling on Uniform and Unrelated Machines with Bipartite Incompatibility Graphs Tytus Pikies ! Dept
    Scheduling on uniform and unrelated machines with bipartite incompatibility graphs Tytus Pikies ! Dept. of Algorithims and System Modelling, ETI Faculty, Gdańsk University of Technology, 11/12 Gabriela Narutowicza Street, 80-233 Gdańsk, Poland Hanna Furmańczyk ! Institute of Informatics, Faculty of Mathematics, Physics and Informatics, University of Gdańsk, 57 Wita Stwosza Street, 80-309 Gdańsk, Poland Abstract In this paper the problem of scheduling of jobs on parallel machines under incompatibility relation is considered. In this model a binary relation between jobs is given and no two jobs that are in the relation can be scheduled on the same machine. In particular, we consider job scheduling under incompatibility relation forming bipartite graphs, under makespan optimality criterion, on uniform and unrelated machines. We show that no algorithm can achieve a good approximation ratio for uniform machines, even for a case of unit time jobs, under P ≠ NP. We also provide an approximation algorithm that achieves the best possible approximation ratio, even for the case of jobs of arbitrary lengths pj , under the same assumption. Precisely, we present an O(n1/2−ϵ) inapproximability bound, for any pP ϵ > 0; and pj -approximation algorithm, respectively. To enrich the analysis, bipartite graphs generated randomly according to Gilbert’s model Gn,n,p(n) are considered. For a broad class of p(n) functions we show that there exists an algorithm producing a schedule with makespan almost surely at most twice the optimum. Due to our knowledge, this is the first study of randomly generated graphs in the context of scheduling in the considered model.
    [Show full text]
  • Curriculum Vitae
    Curriculum Vitae Tandy Warnow Grainger Distinguished Chair in Engineering 1 Contact Information Department of Computer Science The University of Illinois at Urbana-Champaign Email: [email protected] Homepage: http://tandy.cs.illinois.edu 2 Research Interests Phylogenetic tree inference in biology and historical linguistics, multiple sequence alignment, metage- nomic analysis, big data, statistical inference, probabilistic analysis of algorithms, machine learning, combinatorial and graph-theoretic algorithms, and experimental performance studies of algorithms. 3 Professional Appointments • Co-chief scientist, C3.ai Digital Transformation Institute, 2020-present • Grainger Distinguished Chair in Engineering, 2020-present • Associate Head for Computer Science, 2019-present • Special advisor to the Head of the Department of Computer Science, 2016-present • Associate Head for the Department of Computer Science, 2017-2018. • Founder Professor of Computer Science, the University of Illinois at Urbana-Champaign, 2014- 2019 • Member, Carl R. Woese Institute for Genomic Biology. Affiliate of the National Center for Supercomputing Applications (NCSA), Coordinated Sciences Laboratory, and the Unit for Criticism and Interpretive Theory. Affiliate faculty member in the Departments of Mathe- matics, Electrical and Computer Engineering, Bioengineering, Statistics, Entomology, Plant Biology, and Evolution, Ecology, and Behavior, 2014-present. • National Science Foundation, Program Director for Big Data, July 2012-July 2013. • Member, Big Data Senior Steering Group of NITRD (The Networking and Information Tech- nology Research and Development Program), subcomittee of the National Technology Council (coordinating federal agencies), 2012-2013 • Departmental Scholar, Institute for Pure and Applied Mathematics, UCLA, Fall 2011 • Visiting Researcher, University of Maryland, Spring and Summer 2011. 1 • Visiting Researcher, Smithsonian Institute, Spring and Summer 2011. • Professeur Invit´e,Ecole Polytechnique F´ed´erale de Lausanne (EPFL), Summer 2010.
    [Show full text]
  • A Gentle Introduction to Matroid Algorithmics
    A Gentle Introduction to Matroid Algorithmics Matthias F. Stallmann April 14, 2016 1 Matroid axioms The term matroid was first used in 1935 by Hassler Whitney [34]. Most of the material in this overview comes from the textbooks of Lawler [25] and Welsh [33]. A matroid is defined by a set of axioms with respect to a ground set S. There are several ways to do this. Among these are: Independent sets. Let I be a collection of subsets defined by • (I1) ; 2 I • (I2) if X 2 I and Y ⊆ X then Y 2 I • (I3) if X; Y 2 I with jXj = jY j + 1 then there exists x 2 X n Y such that Y [ x 2 I A classic example is a graphic matroid. Here S is the set of edges of a graph and X 2 I if X is a forest. (I1) and (I2) are clearly satisfied. (I3) is a simplified version of the key ingredient in the correctness proofs of most minimum spanning tree algorithms. If a set of edges X forms a forest then jV (X)j − jXj = jc(X)j, where V (x) is the set of endpoints of X and c(X) is the set of components induced by X. If jXj = jY j + 1, then jc(X)j = jc(Y )j − 1, meaning X must have at least one edge x that connects two of the components induced by Y . So Y [ x is also a forest. Another classic algorithmic example is the following uniprocessor scheduling problem, let's call it the scheduling matroid.
    [Show full text]
  • Lecture Notes: “Graph Theory 2”
    Lecture notes: \Graph Theory 2" November 28, 2018 Anders Nedergaard Jensen Preface In this course we study algorithms, polytopes and matroids related to graphs. These notes are almost complete, but some of the examples from the lectures have not been typed up, and some background information, such as proper definitions are sometimes lacking. For proper definitions we refer to: Bondy and Murty: "Graph Theory". Besides these minor problems, the notes represent the content of the class very well. 1 Contents 1 Matchings 6 1.1 Matchings . .6 1.2 When is a matching maximum? . .7 1.2.1 Coverings . .8 1.2.2 Hall's Theorem . 10 1.3 Augmenting path search . 11 1.4 Matchings in general graphs . 16 1.4.1 Certificates . 16 1.4.2 Edmonds' Blossom Algorithm . 18 1.5 Maximum weight matching in bipartite graphs . 23 1.6 Distances in graphs (parts of this section are skipped) . 26 1.6.1 Warshall's Algorithm . 28 1.6.2 Bellman-Ford-Moore . 30 1.6.3 Floyd's Algorithm . 33 1.7 Maximal weight matching in general graphs . 34 1.7.1 The Chinese postman problem . 35 1.7.2 Edmonds' perfect matching polytope theorem . 36 1.7.3 A separation oracle . 40 1.7.4 Some ideas from the ellipsoid method . 43 2 Matroids 44 2.1 Planar graphs . 44 2.2 Duality of plane graphs . 46 2.3 Deletion and contraction in dual graphs . 47 2.4 Matroids . 48 2.4.1 Independent sets . 48 2.4.2 The cycle matroid of a graph .
    [Show full text]
  • Alyson “Allie” Fletcher Education Academic
    ALYSON “ALLIE”FLETCHER Assistant Professor Research Scientist University of California, Los Angeles University of California, Berkeley 8125 Math Sciences Bldg. Redwood Center for Theoretical Neuroscience Los Angeles, CA 90095-1554 Helen Wills Neuroscience Institute Tel: +1 201 965 1900 Citizenships: US & United Kingdom http://www.stat.ucla.edu/∼akfletcher/ Email: akfl[email protected] EDUCATION University of California, Berkeley: Ph.D. in Electrical Engineering and Computer Sciences (EECS), January 2006 A Jump Linear Framework for Estimation with Markovian Source and Channel Dynamics Committee - EECS: Kannan Ramchandran (chair) & Venkat Anantharam Mathematics: Alexandre J. Chorin M.S. in Mathematics, May 2005 Estimation via Sparse Approximation: Error Bounds and Random Frame Analysis Committee - Mathematics: F. Alberto Grunbaum¨ (chair) Statistics: David J. Aldous & Bin Yu M.S. in Electrical Engineering, May 2002 Denoising via Recursive Wavelet Thresholding Committee - EECS: Kannan Ramchandran (chair) & Laurent El Ghaoui University of Iowa, Iowa City, Iowa: B.S. with honors in Mathematics Minors: Physics & Music ACADEMIC APPOINTMENTS Assistant Professor, January 2016– Statistics, Mathematics, and Electrical Engineering University of California, Los Angeles Assistant Professor, September 2012–present Department of Electrical Engineering University of California, Santa Cruz Research Scientist, September 2012–present Redwood Center for Theoretical Neuroscience Helen Wills Neuroscience Institute University of California, Berkeley Postdoctoral
    [Show full text]
  • Scheduling in and out Forests in the Presence of Communication Delays
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 7, NO. 10, OCTOBER 1996 1065 Scheduling In and Out Forests in the Presence of Communication Delays Theodora A. Varvarigou, Member, IEEE, Vwani P. Roychowdhury, Member, IEEE, Thomas Kailath, Fellow, /€E€, and Eugene Lawler Abstract-We consider the problem of scheduling tasks on multiprocessor architectures in the presence of communication delays. Given a set of dependent tasks, the schedulingproblem is to allocate the tasks to processors such that the pre-specified precedence constraints among the tasks are obeyed and certain cost-measures(such as the computation time) are minimized. Several cases of the scheduling problem have been proven to be NP-complete [16],[lo]. Nevertheless, there are polynomial time algorithms for interesting special cases of the general scheduling problem [12], [14], [lo]. Most of these results, however, do not take into consideration the delays due to message passing among processors. In this paper we study the increase in time complexity of scheduling problems due to the introduction of communication delays. In particular, we address the open problem of scheduling Out-forests (In-forests)in a multiprocessor system of m identical processors when communication delays are considered. The corresponding problem of scheduling Out-forests (In-forests) without communication delays admits an elegant polynomial time solution as presentedfirst by Hu in 1961 1121; however, the problem in the presence of communication delays has remained unsolved. We present here first known polynomial time algorithms for the computation of the optimal schedule when the number of available processors is given and bounded and both computation and communication delays are assumed to take one unit of time.
    [Show full text]
  • UC Berkeley UC Berkeley Electronic Theses and Dissertations
    UC Berkeley UC Berkeley Electronic Theses and Dissertations Title Learned Human-in-the-Loop Decision Making Permalink https://escholarship.org/uc/item/0787m66c Author Basso, Brandon Publication Date 2012 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California Learned Human-in-the-Loop Decision Making by Brandon Basso A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Engineering - Mechanical Engineering in the Graduate Division of the University of California, Berkeley Committee in charge: Professor J. Karl Hedrick, Chair Professor Hugh Durrant-Whyte Professor David Auslander Professor Pieter Abbeel Fall 2012 Learned Human-in-the-Loop Decision Making Copyright 2012 by Brandon Basso 1 Abstract Learned Human-in-the-Loop Decision Making by Brandon Basso Doctor of Philosophy in Engineering - Mechanical Engineering University of California, Berkeley Professor J. Karl Hedrick, Chair Human beings are decision making engines. From low level automatic activities, such as walking, to high-level reasoning, we readily solve complex perception and decision problems in real time. On the other end of the spectrum, computers and robots have proven particu- larly useful in dull, dirty, and dangerous domains|inspecting nuclear disaster sites, solving vast optimization problems, and generally accomplishing tasks difficult for humans. Recent advances in robotics and computer science have only served to underscore the difference be- tween humans and robots, namely that robots tend to excel at lower level structured tasks, while humans are unmatched at higher level decision making, particularly when problems involve unstructured data, soft constraints, and ambiguous objectives. This thesis explores decision problems that lie in the gap between current robot capabil- ity and human ability.
    [Show full text]
  • 14 NP, NP Completeness, and the Cook-Levin Theorem
    Learning Objectives: • Introduce the class NP capturing a great many important computational problems • NP-completeness: evidence that a problem might be intractable. • The P vs NP problem. 14 NP, NP completeness, and the Cook-Levin Theorem “In this paper we give theorems that suggest, but do not imply, that these problems, as well as many others, will remain intractable perpetually”, Richard Karp, 1972 “Sad to say, but it will be many more years, if ever before we really understand the Mystical Power of Twoness… 2-SAT is easy, 3-SAT is hard, 2-dimensional matching is easy, 3-dimensional matching is hard. Why? oh, Why?” Eugene Lawler So far we have shown that 3SAT is no harder than Quadratic Equa- tions, Independent Set, Maximum Cut, and Longest Path. But to show that these problems are computationally equivalent we need to give re- ductions in the other direction, reducing each one of these problems to 3SAT as well. It turns out we can reduce all three problems to 3SAT in one fell swoop. In fact, this result extends far beyond these particular problems. All of the problems we discussed in Chapter 13, and a great many other problems, share the same commonality: they are all search problems, where the goal is to decide, given an instance 푥, whether there exists a solution 푦 that satisfies some condition that can be verified inpoly- nomial time. For example, in 3SAT, the instance is a formula and the solution is an assignment to the variable; in Max-Cut the instance is a graph and the solution is a cut in the graph; and so on and so forth.
    [Show full text]
  • Analysis of Cumulants
    Analysis of cumulants Lek-Heng Lim University of California, Berkeley March 6, 2009 Joint work with Jason Morton L.-H. Lim (Applied Math Seminar) Analysis of cumulants March 6, 2009 1 / 46 Cover Story: January 4, 2009 L.-H. Lim (Applied Math Seminar) Analysis of cumulants March 6, 2009 2 / 46 January 4, 2009 Risk Mismanagement By JOE NOCERA THERE AREN’T MANY widely told anecdotes about the current financial crisis, at least not yet, but there’s one that made the rounds in 2007, back when the big investment banks were first starting to write down billions of dollars in mortgage-backed derivatives and other so-called toxic securities. This was well before Bear Stearns collapsed, before Fannie Mae and Freddie Mac were taken over by the federal government, before Lehman fell and Merrill Lynch was sold and A.I.G. saved, before the $700 billion bailout bill was rushed into law. Before, that is, it became obvious that the risks taken by the largest banks and investment firms in the United States — and, indeed, in much of the Western world — were so excessive and foolhardy that they threatened to bring down the financial system itself. On the contrary: this was back when the major investment firms were still assuring investors that all was well, these little speed bumps notwithstanding — assurances based, in part, on their fantastically complex mathematical models for measuring the risk in their various portfolios. There are many such models, but by far the most widely used is called VaR — Value at Risk. Built around statistical ideas and probability theories that have been around for centuries, VaR was developed and popularized in the early 1990s by a handful of scientists and mathematicians — “quants,” they’re called in the business — who went to work for JPMorgan.
    [Show full text]
  • Combinatorics, Complexity, and Randomness
    TURINGA WARD LECTURE COMBINATORICS, COMPLEXITY, AND RANDOMNESS The 1985 Turing Award winner presents his perspective on the development of the field that has come to be called theoretical computer science. RICHARD M. KARP This lecture is dedicated to the memory of my father, coherence, there was a very special spirit in the air; we Abraham Louis Karp. knew that we were witnessing the birth of a new scien- tific discipline centered on the computer. I discovered I am honored and pleased to be the recipient of this that I found beauty and elegance in the structure of year’s Turing Award. As satisfying as it is to receive algorithms, and that I had a knack for the discrete such recognition, I find that my greatest satisfaction mathematics that formed the basis for the study of as a researcher has stemmed from doing the research computers and computation. In short, I had stumbled itself. and from the friendships I have formed along the more or less by accident into a field that was very way. I would like to roam with you through my 25 much to my liking. years as a researcher in the field of combinatorial algo- rithms and computational complexity, and tell you EASY AND HARD COMBINATORIAL PROBLEMS about some of the concepts that have seemed important Ever since those early days, I have had a special inter- to me, and about some of the people who have inspired est in combinatorial search problems-problems that and influenced me. can be likened to jigsaw puzzles where one has to as- semble the parts of a structure in a particular way.
    [Show full text]