Compact Matrix Decomposition for Large Graphs: Theory and Practice

Total Page:16

File Type:pdf, Size:1020Kb

Compact Matrix Decomposition for Large Graphs: Theory and Practice Compact Matrix Decomposition for Large Graphs: Theory and Practice Jimeng Sun Yinglian Xie Hui Zhang Christos Faloutsos Carnegie Mellon University jimeng,ylxie, hzhang, christos @cs.cmu.edu { } Abstract 1 Introduction Given a large sparse graph, how can we find patterns Graphs are used in multiple important applications and anomalies? Several important applications can be such as network traffic monitoring, web structure anal- modeled as large sparse graphs, e.g., network traffic ysis, social network mining, protein interaction study, monitoring, research citation network analysis, social and scientific computing. Given a large graph, usu- network analysis, and regulatory networks in genes. ally represented as an adjacency matrix, a challenging Low rank decompositions, such as SVD and CUR, are question is how to discover patterns and anomalies in powerful techniques for revealing latent/hidden vari- spite of the high dimensionality of data. We refer to ables and associated patterns from high dimensional this challenge as the static graph mining problem. data. However, those methods often ignore the spar- An even more challenging problem is finding pat- sity property of the graph, and hence usually incur too terns in graphs that evolve over time. For exam- high memory and computational costs to be practical. ple, consider a network administrator, monitoring the We propose a novel method, the Compact Matrix (source, destination) IP flows over time. For a given Decomposition (CMD), to compute sparse low rank time window, the traffic information can be repre- approximations. CMD dramatically reduces both the sented as a matrix, with all the sources as rows, all the computation cost and the space requirements over destinations as columns, and the count of exchanged existing decomposition methods (SVD, CUR). Using flows as the entries. In this setting, we want to find CMD as the key building block, we further propose patterns, summaries, and anomalies for the given win- procedures to efficiently construct and analyze dy- dow or across multiple such windows. Specifically for namic graphs from real-time application data. We these applications that generate huge volume of data provide theoretical guarantee for our methods, and with high speed, the method has to be fast, so that present results on two real, large datasets, one on net- it can catch anomalies early on. Closely related ques- work flow data (100GB trace of 22K hosts over one tions are how to summarize dynamic graphs, so that month) and one on DBLP (200MB over 25 years). they can be efficiently stored, e.g., for historical anal- ysis. We refer to this challenge as the dynamic graph We show that CMD is often an order of magni- mining problem. tude more efficient than the state of the art (SVD and The typical way of summarizing and approximating CUR): it is over 10X faster, but requires less than 1/10 matrices is through transformations, with SVD [16] of the space, for the same reconstruction accuracy. Fi- and PCA [19] being the most popular ones. Recently, nally, we demonstrate how CMD is used for detect- random projections [18] have also been proposed. Al- ing anomalies and monitoring time-evolving graphs, though all these methods are very successful in gen- in which it successfully detects worm-like hierarchical eral, for large sparse graphs they tend to require huge scanning patterns in real network data. amounts of space, exactly because their resulting ma- trices are not sparse any more. Permission to copy without fee all or part of this material is Large, real graphs are often very sparse. For exam- granted provided that the copies are not made or distributed for ple, the web graph [21], Internet topology graphs [12], direct commercial advantage, the VLDB copyright notice and who-trusts-whom social networks [7], along with nu- the title of the publication and its date appear, and notice is merous other real graphs, are all sparse. Recently, given that copying is by permission of the Very Large Data Base Endowment. To copy otherwise, or to republish, requires a fee Drineas et al. [10] proposed the CUR decomposition and/or special permission from the Endowment. method, which exactly tries to address the loss-of- Proceedings of the 32nd VLDB Conference, sparsity issue. Seoul, Korea, 2006 We propose a new method, called Compact Matrix Decomposition (CMD), for generating low-rank matrix weights G = (V,E,W ). Every row or column in A approximations. CMD provides provably equivalent corresponds to a node in V . We set the value of A(i, j) decomposition as CUR, but it requires much less space to w(i, j) W if there is an edge from node v V ∈ i ∈ and computation time, and hence is more efficient. to node vj V with weight w(i, j). Otherwise, we set Moreover, we show that CMD can not only analyze it to zero.∈ For example, in the network traffic matrix static graphs, but we can also extend it to handle dy- case, we could have m (active) sources, n (active) des- namic graphs. Another contribution of our work is ex- tinations, and for each (source,destination) pair, we actly a detailed procedure to put CMD into practice, record the corresponding count of flows. Note that and especially for high-speed applications like inter- our definition of the adjacency matrix is more gen- net traffic monitoring, where new traffic matrices are eral, because we omit rows or columns that have no streamed-in in real time. entries. It can include both special cases such as bi- Our work bridges the gap between mathematical partite graphs (rows and columns referring the differ- matrix decomposition methods and real world mining ent sets of nodes), and traditional graphs (rows and applications, with several novel proposals for static- columns referring to the same set of nodes). and dynamic- graph mining. Overall, our method has Since most graphs from real applications are large the following desirable properties: but sparse, i.e., the number of edges E is roughly lin- Computationally efficient: Despite the high di- ear in the number of nodes V , we can| store| them very mensionality of large graphs, the entire mining process efficiently using sparse matrix| | representation by only is fast, which is especially important for high-volume, keeping the nonzero entries. Thus, the space overhead streaming applications. is O( V ) instead of O( V 2). Space efficient: We preserve the sparsity of graphs so There| | are many approaches| | to extract patterns or that both the intermediate results and the final results structures from a graph given its adjacency matrix. In fit in memory, even for large graphs that are usually particular, we consider the patterns as a low dimen- too expensive to mine today. sional summary of the adjacency matrix. Hence, the Anomaly detection: We show how to spot anoma- goal is to efficiently identify a low dimensional sum- lies. A vital step here is our proposed fast method mary while preserving the sparsity of the graph. to estimate the reconstruction error of our approxima- More specifically, we formulate the problem as a tions. matrix decomposition problem. The basic question is From the theory viewpoint, we provide the theoret- how to approximate A as the product of three smaller ical guarantees about the performance of CMD. More- matrices C Rm×c, U Rc×r, and R Rr×n, such over, from the practice viewpoint, we extensively eval- that: (1) A∈ CUR 1 is∈ small, and (2)∈C,U, and R uate CMD on two real datasets: The first dataset is can be computed| − quickly| using a small space. More a network flow trace spanning >100GB, collected over intuitively, we look for a low rank approximation of A a period of about one-month; the second is 25 years that is both accurate and can be efficiently computed. of DBLP records. Our experiments show that CMD With matrix decomposition as our core component, performs orders of magnitude better than the state we consider two general class of graph mining prob- of the art, namely, both SVD and CUR. As we show lems, depending on the input data: later in Figures 13,13, CMD is over 10 times faster Static graph mining: Given a sparse matrix A and requires less than 1/10 space. Moreover, we also Rm×n, find patterns, outliers, and summarize it. In∈ demonstrate how CMD can help in monitoring and in this case, the input data is a given static graph repre- anomaly detection of time-evolving graphs: As shown sented as its adjacency matrix. in Figure 17 CMD helps detect real worm-like hierar- Dynamic graph mining: Given timestamped pairs chical scanning patterns early on. (e.g., source-destination pairs from network traffic, The rest of the paper is organized as follows: email messages, IM chats), potentially in high volume Section 2 defines our problem more formally. We de- and high speed, construct graphs, find patterns, out- scribe the algorithm and analysis of CMD in Section 3. liers, and summaries as they evolve. In other words, Section 4 presents the detailed procedures for mining the input data are raw event records that need to be large graphs. Section 5 shows how to spot outliers pre-processed. using CMD in example applications. Section 6 and The research questions now are how to sample data Section 7 provide the experimental evaluation and ap- and construct matrices (graphs) efficiently? How to plication case study to show the efficiency and applica- leverage the matrix decomposition of the static case, bility of CMD. Finally, Section 8 discusses the related into the mining process? What are the underlying work before we conclude in Section 9. processing modules, and how do they interact with each other? These are more practical questions that 2 Problem Definition require a systematic process.
Recommended publications
  • Codes and Modules Associated with Designs and T-Uniform Hypergraphs Richard M
    Codes and modules associated with designs and t-uniform hypergraphs Richard M. Wilson California Institute of Technology (1) Smith and diagonal form (2) Solutions of linear equations in integers (3) Square incidence matrices (4) A chain of codes (5) Self-dual codes; Witt’s theorem (6) Symmetric and quasi-symmetric designs (7) The matrices of t-subsets versus k-subsets, or t-uniform hy- pergaphs (8) Null designs (trades) (9) A diagonal form for Nt (10) A zero-sum Ramsey-type problem (11) Diagonal forms for matrices arising from simple graphs 1. Smith and diagonal form Given an r by m integer matrix A, there exist unimodular matrices E and F ,ofordersr and m,sothatEAF = D where D is an r by m diagonal matrix. Here ‘diagonal’ means that the (i, j)-entry of D is 0 unless i = j; but D is not necessarily square. We call any matrix D that arises in this way a diagonal form for A. As a simple example, ⎛ ⎞ 0 −13 10 314⎜ ⎟ 100 ⎝1 −1 −1⎠ = . 21 4 −27 050 01−2 The matrix on the right is a diagonal form for the middle matrix on the left. Let the diagonal entries of D be d1,d2,d3,.... ⎛ ⎞ 20 0 ··· ⎜ ⎟ ⎜0240 ···⎟ ⎜ ⎟ ⎝0 0 120 ···⎠ . ... If all diagonal entries di are nonnegative and di divides di+1 for i =1, 2,...,thenD is called the integer Smith normal form of A, or simply the Smith form of A, and the integers di are called the invariant factors,ortheelementary divisors of A.TheSmith form is unique; the unimodular matrices E and F are not.
    [Show full text]
  • Hadamard and Conference Matrices
    Hadamard and conference matrices Peter J. Cameron December 2011 with input from Dennis Lin, Will Orrick and Gordon Royle Now det(H) is equal to the volume of the n-dimensional parallelepiped spanned by the rows of H. By assumption, each row has Euclidean length at most n1/2, so that det(H) ≤ nn/2; equality holds if and only if I every entry of H is ±1; > I the rows of H are orthogonal, that is, HH = nI. A matrix attaining the bound is a Hadamard matrix. Hadamard's theorem Let H be an n × n matrix, all of whose entries are at most 1 in modulus. How large can det(H) be? A matrix attaining the bound is a Hadamard matrix. Hadamard's theorem Let H be an n × n matrix, all of whose entries are at most 1 in modulus. How large can det(H) be? Now det(H) is equal to the volume of the n-dimensional parallelepiped spanned by the rows of H. By assumption, each row has Euclidean length at most n1/2, so that det(H) ≤ nn/2; equality holds if and only if I every entry of H is ±1; > I the rows of H are orthogonal, that is, HH = nI. Hadamard's theorem Let H be an n × n matrix, all of whose entries are at most 1 in modulus. How large can det(H) be? Now det(H) is equal to the volume of the n-dimensional parallelepiped spanned by the rows of H. By assumption, each row has Euclidean length at most n1/2, so that det(H) ≤ nn/2; equality holds if and only if I every entry of H is ±1; > I the rows of H are orthogonal, that is, HH = nI.
    [Show full text]
  • One Method for Construction of Inverse Orthogonal Matrices
    ONE METHOD FOR CONSTRUCTION OF INVERSE ORTHOGONAL MATRICES, P. DIÞÃ National Institute of Physics and Nuclear Engineering, P.O. Box MG6, Bucharest, Romania E-mail: [email protected] Received September 16, 2008 An analytical procedure to obtain parametrisation of complex inverse orthogonal matrices starting from complex inverse orthogonal conference matrices is provided. These matrices, which depend on nonzero complex parameters, generalize the complex Hadamard matrices and have applications in spin models and digital signal processing. When the free complex parameters take values on the unit circle they transform into complex Hadamard matrices. 1. INTRODUCTION In a seminal paper [1] Sylvester defined a general class of orthogonal matrices named inverse orthogonal matrices and provided the first examples of what are nowadays called (complex) Hadamard matrices. A particular class of inverse orthogonal matrices Aa()ij are those matrices whose inverse is given 1 t by Aa(1ij ) (1 a ji ) , where t means transpose, and their entries aij satisfy the relation 1 AA nIn (1) where In is the n-dimensional unit matrix. When the entries aij take values on the unit circle A–1 coincides with the Hermitian conjugate A* of A, and in this case (1) is the definition of complex Hadamard matrices. Complex Hadamard matrices have applications in quantum information theory, several branches of combinatorics, digital signal processing, etc. Complex orthogonal matrices unexpectedly appeared in the description of topological invariants of knots and links, see e.g. Ref. [2]. They were called two- weight spin models being related to symmetric statistical Potts models. These matrices have been generalized to two-weight spin models, also called , Paper presented at the National Conference of Physics, September 10–13, 2008, Bucharest-Mãgurele, Romania.
    [Show full text]
  • Hadamard Matrices Include
    Hadamard and conference matrices Peter J. Cameron University of St Andrews & Queen Mary University of London Mathematics Study Group with input from Rosemary Bailey, Katarzyna Filipiak, Joachim Kunert, Dennis Lin, Augustyn Markiewicz, Will Orrick, Gordon Royle and many happy returns . Happy Birthday, MSG!! Happy Birthday, MSG!! and many happy returns . Now det(H) is equal to the volume of the n-dimensional parallelepiped spanned by the rows of H. By assumption, each row has Euclidean length at most n1/2, so that det(H) ≤ nn/2; equality holds if and only if I every entry of H is ±1; > I the rows of H are orthogonal, that is, HH = nI. A matrix attaining the bound is a Hadamard matrix. This is a nice example of a continuous problem whose solution brings us into discrete mathematics. Hadamard's theorem Let H be an n × n matrix, all of whose entries are at most 1 in modulus. How large can det(H) be? A matrix attaining the bound is a Hadamard matrix. This is a nice example of a continuous problem whose solution brings us into discrete mathematics. Hadamard's theorem Let H be an n × n matrix, all of whose entries are at most 1 in modulus. How large can det(H) be? Now det(H) is equal to the volume of the n-dimensional parallelepiped spanned by the rows of H. By assumption, each row has Euclidean length at most n1/2, so that det(H) ≤ nn/2; equality holds if and only if I every entry of H is ±1; > I the rows of H are orthogonal, that is, HH = nI.
    [Show full text]
  • Lattices from Tight Equiangular Frames Albrecht Böttcher
    Claremont Colleges Scholarship @ Claremont CMC Faculty Publications and Research CMC Faculty Scholarship 1-1-2016 Lattices from tight equiangular frames Albrecht Böttcher Lenny Fukshansky Claremont McKenna College Stephan Ramon Garcia Pomona College Hiren Maharaj Pomona College Deanna Needell Claremont McKenna College Recommended Citation Albrecht Böttcher, Lenny Fukshansky, Stephan Ramon Garcia, Hiren Maharaj and Deanna Needell. “Lattices from equiangular tight frames.” Linear Algebra and its Applications, vol. 510, 395–420, 2016. This Article is brought to you for free and open access by the CMC Faculty Scholarship at Scholarship @ Claremont. It has been accepted for inclusion in CMC Faculty Publications and Research by an authorized administrator of Scholarship @ Claremont. For more information, please contact [email protected]. Lattices from tight equiangular frames Albrecht B¨ottcher, Lenny Fukshansky, Stephan Ramon Garcia, Hiren Maharaj, Deanna Needell Abstract. We consider the set of all linear combinations with integer coefficients of the vectors of a unit tight equiangular (k, n) frame and are interested in the question whether this set is a lattice, that is, a discrete additive subgroup of the k-dimensional Euclidean space. We show that this is not the case if the cosine of the angle of the frame is irrational. We also prove that the set is a lattice for n = k + 1 and that there are infinitely many k such that a lattice emerges for n = 2k. We dispose of all cases in dimensions k at most 9. In particular, we show that a (7,28) frame generates a strongly eutactic lattice and give an alternative proof of Roland Bacher’s recent observation that this lattice is perfect.
    [Show full text]
  • SYMMETRIC CONFERENCE MATRICES of ORDER Pq2 + 1
    Can. J. Math., Vol. XXX, No. 2, 1978, pp. 321-331 SYMMETRIC CONFERENCE MATRICES OF ORDER pq2 + 1 RUDOLF MATHON Introduction and definitions. A conference matrix of order n is a square matrix C with zeros on the diagonal and zbl elsewhere, which satisfies the orthogonality condition CCT = (n — 1)1. If in addition C is symmetric, C = CT, then its order n is congruent to 2 modulo 4 (see [5]). Symmetric conference matrices (C) are related to several important combinatorial configurations such as regular two-graphs, equiangular lines, Hadamard matrices and balanced incomplete block designs [1; 5; and 7, pp. 293-400]. We shall require several definitions. A strongly regular graph with parameters (v, k, X, /z) is an undirected regular graph of order v and degree k with adjacency matrix A = AT satisfying (1.1) A2 + 0* - \)A + (/x - k)I = \xJ, AJ = kJ where / is the all one matrix. Note that in a strongly regular graph any two adjacent (non-adjacent) vertices are adjacent to exactly X(/x) other vertices. An easy counting argument implies the following relation between the param­ eters v, k, X and /x; (1.2) k(k - X - 1) = (v - k - l)/x. A strongly regular graph is said to be pseudo-cyclic (PC) if v — 1 = 2k = 4/x. From (1.1) and (1.2) it is readily deduced that a PC-graph has parameters of the form (4/ + 1, 2/, t — 1, /), where t > 0 is an integer. We note that the complement of a PC-graph is again pseudo-cyclic with the same parameters as the original graph (though not necessarily isomorphic to it), i.e.
    [Show full text]
  • MATRIX THEORY and APPLICATIONS Edited by Charles R
    http://dx.doi.org/10.1090/psapm/040 AMS SHORT COURSE LECTURE NOTES Introductory Survey Lectures A Subseries of Proceedings of Symposia in Applied Mathematics Volume 40 MATRIX THEORY AND APPLICATIONS Edited by Charles R. Johnson (Phoenix, Arizona, January 1989) Volume 39 CHAOS AND FRACTALS: THE MATHEMATICS BEHIND THE COMPUTER GRAPHICS Edited by Robert L.. Devaney and Linda Keen (Providence, Rhode Island, August 1988) Volume 38 COMPUTATIONAL COMPLEXITY THEORY Edited by Juris Hartmanis (Atlanta, Georgia, January 1988) Volume 37 MOMENTS IN MATHEMATICS Edited by Henry J. Landau (San Antonio, Texas, January 1987) Volume 36 APPROXIMATION THEORY Edited by Carl de Boor (New Orleans, Louisiana, January 1986) Volume 35 ACTUARIAL MATHEMATICS Edited by Harry H. Panjer (Laramie, Wyoming, August 1985) Volume 34 MATHEMATICS OF INFORMATION PROCESSING Edited by Michael Anshel and William Gewirtz (Louisville, Kentucky, January 1984) Volume 33 FAIR ALLOCATION Edited by H. Peyton Young (Anaheim, California, January 1985) Volume 32 ENVIRONMENTAL AND NATURAL RESOURCE MATHEMATICS Edited by R. W. McKelvey (Eugene, Oregon, August 1984) Volume 31 COMPUTER COMMUNICATIONS Edited by B. Gopinath (Denver, Colorado, January 1983) Volume 30 POPULATION BIOLOGY Edited by Simon A. Levin (Albany, New York, August 1983) Volume 29 APPLIED CRYPTOLOGY, CRYPTOGRAPHIC PROTOCOLS, AND COMPUTER SECURITY MODELS By R. A. DeMillo, G. I. Davida, D. P. Dobkin, M. A. Harrison, and R. J. Lipton (San Francisco, California, January 1981) Volume 28 STATISTICAL DATA ANALYSIS Edited by R. Gnanadesikan (Toronto, Ontario, August 1982) Volume 27 COMPUTED TOMOGRAPHY Edited by L. A. Shepp (Cincinnati, Ohio, January 1982) Volume 26 THE MATHEMATICS OF NETWORKS Edited by S. A. Burr (Pittsburgh, Pennsylvania, August 1981) Volume 25 OPERATIONS RESEARCH: MATHEMATICS AND MODELS Edited by S.
    [Show full text]
  • Hadamard and Conference Matrices
    Journal of Algebraic Combinatorics 14 (2001), 103–117 c 2001 Kluwer Academic Publishers. Manufactured in The Netherlands. Hadamard and Conference Matrices K.T. ARASU Department of Mathematics and Statistics, Wright State University, Dayton, Ohio 45435, USA YU QING CHEN Department of Mathematics, RMIT-City Campus, GPO Box 2476V, Melbourne, Victoria 3001, Australia ALEXANDER POTT Institute for Algebra and Geometry, Otto-von-Guericke-University Magdeburg, 39016 Magdeburg, Germany Received October 11, 2000; Revised April 12, 2001 Abstract. We discuss new constructions of Hadamard and conference matrices using relative difference ( , , − , n−2 ) − sets. We present the first example of a relative n 2 n 1 2 -difference set where n 1 is not a prime power. Keywords: difference sets, relative difference sets, Hadamard matrices 1. Introduction One of the most interesting problems in combinatorics is the question whether Hadamard matrices exist for all orders n divisible by 4. A Hadamard matrix H of order n is a t ±1-matrix which satisfies HH = nIn. They exist for − − − 1 1 1 1 1 −1 −11−1 −1 n = 1, n = 2 , n = 4 −11 −1 −11−1 −1 −1 −11 and many more values of n. It is not difficult to see that a Hadamard matrix of order n satisfies n = 1, n = 2orn is divisible by 4. The smallest case n where it is presently not known whether a Hadamard matrix exists is n = 428. Many recursive or clever “ad hoc” constructions of Hadamard matrices are known; we refer the reader to [3, 5] and [23], for instance. We also refer the reader to [3] for background from design theory.
    [Show full text]
  • Complex Conference Matrices, Complex Hadamard Matrices And
    Complex conference matrices, complex Hadamard matrices and complex equiangular tight frames Boumediene Et-Taoui Universit´ede Haute Alsace – LMIA 4 rue des fr`eres Lumi`ere 68093 Mulhouse Cedex October 25, 2018 Abstract In this article we construct new, previously unknown parametric families of complex conference ma- trices and of complex Hadamard matrices of square orders and related them to complex equiangular tight frames. It is shown that for any odd integer k 3 such that 2k = pα + 1, p prime, α non-negative integer, on the one hand there exists a (2k, k) complex≥ equiangular tight frame and for any β N∗ there exists a 2β 1 2β−1 2β−1 ∈ ((2k) , 2 (2k) ((2k) 1)) complex equiangular tight frame depending on one unit complex num- ± 2β 1 2β−1 2β−1 ber, and on the other hand there exist a family of ((4k) , 2 (4k) ((4k) 1)) complex equiangular tight frames depending on two unit complex numbers. ± AMS Classification. Primacy 42C15, 52C17; Secondary 05B20. [email protected] 1 Introduction This article deals with the so-called notion of complex equiangular tight frames. Important for coding and quantum information theories are real and complex equiangular tight frames, for a survey we refer to [13]. In a Hilbert space , a subset F = f is called a frame for provided that there are two constants H { i}i I ⊂H H C,D > 0 such that ∈ C x 2 x,f 2 D x 2 , k k ≤ |h ii| ≤ k k i I X∈ holds for every x . If C = D = 1 then the frame is called normalized tight or a Parseval frame.
    [Show full text]
  • A Survey on Modular Hadamard Matrices ∗
    Morfismos, Vol. 7, No. 2, 2003, pp. 17{45 A survey on modular Hadamard matrices ∗ Shalom Eliahou Michel Kervaire Abstract We provide constructions of 32-modular Hadamard matrices for every size n divisible by 4. They are based on the description of several families of modular Golay pairs and quadruples. Higher moduli are also considered, such as 48, 64, 128 and 192. Finally, we exhibit infinite families of circulant modular Hadamard matrices of various types for suitable moduli and sizes. 2000 Mathematics Subject Classification: 05B20, 11L05, 94A99. Keywords and phrases: modular Hadamard matrix, modular Golay pair. 1 Introduction A square matrix H of size n, with all entries 1, is a Hadamard matrix if HHT = nI, where HT is the transpose of H and I the identity matrix of size n. It is easy to see that the order n of a Hadamard matrix must be 1, 2 or else a multiple of 4. There are two fundamental open problems about these matrices: • Hadamard's conjecture, according to which there should exist a Hadamard matrix of every size n divisible by 4. (See [9].) • Ryser's conjecture, stating that there probably exists no circulant Hadamard matrix of size greater than 4. (See [13].) Recall that a circulant matrix is a square matrix C = (ci;j)0≤i;j≤n−1 of size n, such that ci;j = c0;j−i for every i; j (with indices read mod n). ∗Invited article 17 18 Eliahou and Kervaire There are many known constructions of Hadamard matrices. How- ever, Hadamard's conjecture is widely open.
    [Show full text]
  • Graph Spectra and Continuous Quantum Walks Gabriel Coutinho
    Graph Spectra and Continuous Quantum Walks Gabriel Coutinho, Chris Godsil September 1, 2020 Preface If A is the adjacency matrix of a graph X, we define a transition matrix U(t) by U(t) = exp(itA). Physicists say that U(t) determines a continuous quantum walk. Most ques- tions they ask about these matrices concern the squared absolute values of the entries of U(t) (because these may be determined by measurement, and the entries themselves cannot be). The matrices U(t) are unitary and U(t) = U(−t), so we may say that the physicists are concerned with ques- tions about the entries of the Schur product M(t) = U(t) ◦ U(t) = U(t) ◦ U(−t). Since U(t) is unitary, the matrix M(t) is doubly stochastic. Hence each column determines a probability density on V (X) and there are two extreme cases: (a) A row of M(t) has one nonzero entry (necessarily equal to 1). (b) All entries in a row of U(t) are equal to 1/|V (X)|. In case (a), there are vertices a and b of X such that |U(t)a,b| = 1. If a =6 b, we have perfect state transfer from a to b at time t, otherwise we say that X is periodic at a at time t. Physicists are particularly interested in perfect state transfer. In case (b), if the entries of the a-row of M(t) is constant, we have local uniform mixing at a at time t. (Somewhat surprisingly these two concepts are connected—in a number of cases, perfect state transfer and local uniform mixing occur on the same graph.) The quest for graphs admitting perfect state transfer or uniform mixing has unveiled new results in spectral graph theory, and rich connections to other fields of mathematics.
    [Show full text]
  • Robust Hadamard Matrices and Equi-Entangled Bases
    Robust Hadamard matrices and equi-entangled bases Grzegorz Rajchel1;2 Coauthors of the paper: Adam G ˛asiorowski2, Karol Zyczkowski˙ 1;3 1Centrum Fizyki Teoretycznej PAN; 2 Wydział Fizyki, Uniwersytet Warszawski; 3Instytut Fizyki im. Smoluchowskiego, Uniwersytet Jagiellonski´ Introduction Now we can introduce another notion important for results of this work: Definition 8 A symmetric matrix with entries ±1 outside the diagonal and 0 at the diagonal, which satisfy or- Hadamard matrices with particular structure attract a lot of attention, as their existence is related to several prob- thogonality relations: T lems in combinatorics and mathematical physics. Usually one poses a question, whether for a given size n there CC = (n − 1)I; exists a Hadamard matrix with a certain symmetry or satisfying some additional conditions. is called a symmetric conference matrix. We introduce notion of robust Hadamard matrices. This will be useful to broaden our understanding of the problem of unistochasticity inside the Birkhoff polytope. Lemma 9 Matrices of the structure: R H = C + iI; Birkhoff polytope where C is symmetric conference matrix, are complex robust Hadamard matrices. Definition 1 The set Bn of bistochastic matrices (also called Birkhoff polytope) consists of matrices with non- negative entries which satisfy two sum conditions for rows and columns: Main result n n We proved following propositions: X X Bn = fB 2 Mn(R); Bij = Bji = 1; j = 1; : : : ; ng (1) Proposition 10 For every order n, for which there exists a symmetric conference matrix or a skew Hadamard i=1 i=1 matrix, every matrix belonging to any ray R or any counter-ray Re of the Birkhoff polytope Bn is unistochastic.
    [Show full text]