随机算法 (Spring 2014)/The Monte Carlo Method and 高级算法 (Fall 2018): Difference between pages

From TCS Wiki
(Difference between pages)
Jump to navigation Jump to search
imported>Etone
 
imported>Etone
No edit summary
 
Line 1: Line 1:
= Parameter Estimation =
{{Infobox
Consider the following abstract problem of parameter estimation.
|name        = Infobox
|bodystyle    =  
|title        = <font size=3>高级算法
<br>Advanced Algorithms</font>
|titlestyle  =


Let <math>U</math> be a finite set of known size, and let <math>G\subseteq U</math>. We want to estimate the ''parameter'' <math>|G|</math>, i.e. the size of <math>G</math>, or equivalently, the density (or frequency) <math>\frac{|G|}{|U|}</math>.
|image        =
|imagestyle  =
|caption      =
|captionstyle =
|headerstyle  = background:#ccf;
|labelstyle  = background:#ddf;
|datastyle    =


We assume two devices:
|header1 =Instructor
* A '''uniform sampler''' <math>\mathcal{U}</math>, which uniformly and independently samples a member of <math>U</math> upon each calling.
|label1 =
* A '''membership oracle''' of <math>G</math>, denoted <math>\mathcal{O}</math>. Given as the input an <math>x\in U</math>, <math>\mathcal{O}(x)</math> indicates whether or not <math>x</math> is a member of <math>G</math>.
|data1  =  
 
|header2 =
Equipped by <math>\mathcal{U}</math> and <math>\mathcal{O}</math>, we can have the following '''Monte Carlo method''':
|label2  =  
*Choose <math>N</math> independent samples from <math>U</math> by the uniform sampler <math>\mathcal{U}</math>, represented by the random variables <math>X_1,X_2,\ldots, X_N</math>.
|data2  = 尹一通<br>郑朝栋
* Let <math>Y_i</math> be the indicator random variable defined as <math>Y_i=\mathcal{O}(X_i)</math>, namely, <math>Y_i</math> indicates whether <math>X_i\in G</math>.
|header3 =  
* Define the estimator random variable for <math>|G|</math> as
|label3  = Email
::<math>Z=\frac{|U|}{N}\sum_{i=1}^N Y_i</math>
|data3  = yinyt@nju.edu.cn chaodong@nju.edu.cn 
* Define the estimator random variable for <math>\alpha=\frac{|G|}{|U|}</math> as
|header4 =
::<math>\overline{Y}=\frac{1}{N}\sum_{i=1}^N Y_i</math>.
|label4= office
 
|data4= 计算机系 804
It is easy to see that <math>\mathbf{E}[Z]=|G|</math> and <math>\mathbf{E}[\overline{Y}]=\alpha</math>.
|header5 = Class
We might hope that with high probability the values of <math>Z</math> and <math>\overline{Y}</math> are close to their respective expectations. Formally, <math>Z</math> is called an '''<math>\epsilon</math>-approximation''' of <math>|G|</math> if
|label5  =  
:<math>
|data5  =
(1-\epsilon)|G|\le Z\le (1+\epsilon)|G|.
|header6 =
</math>
|label6  = Class meetings
And <math>\overline{Y}</math> is called an '''<math>(\epsilon,\delta)</math>-estimator''' for <math>\alpha</math> if
|data6  = Wednesday, 8am-10am <br> 仙I-319
:<math>
|header7 =
\Pr[|\overline{Y}-\alpha|\le \epsilon]\ge 1-\delta.
|label7  = Place
</math>
|data7  =  
 
|header8 =
The following general theorem bounds the reliance between the accuracy of estimation and the number of samples.
|label8  = Office hours
 
|data8  = Wednesday, 10am-12pm <br>计算机系 804(尹一通)、302(郑朝栋)
{{Theorem
|header9 = Textbooks
|Theorem (estimator theorem)|
|label9  =  
:Let <math>\alpha=\frac{|G|}{|U|}</math>. The following holds:
|data9  =  
:1. <math>Z</math> is an <math>\epsilon</math>-approximation to <math>|G|</math> with probability at least <math>1-\delta</math> if
|header10 =
::<math>N\ge\frac{4}{\epsilon^2 \alpha}\ln\frac{2}{\delta}</math>.
|label10  =  
:2. <math>\overline{Y}</math> is an <math>(\epsilon,\delta)</math>-estimator for <math>\alpha</math> if
|data10  = [[File:MR-randomized-algorithms.png|border|100px]]
::<math>N\ge\frac{4}{\epsilon^2}\ln\frac{2}{\delta}</math>.
|header11 =
}}
|label11  =  
{{Proof|  
|data11  = Motwani and Raghavan. <br>''Randomized Algorithms''.<br> Cambridge Univ Press, 1995.
Recall that <math>Y_i</math> indicates whether the <math>i</math>-th sample is in <math>G</math>. Let <math>Y=\sum_{i=1}^NY_i</math>. Then we have <math>Z=\frac{|U|}{N}Y</math>, and hence the event <math>(1-\epsilon)|G|\le Z\le (1+\epsilon)|G|</math> is equivalent to that <math>(1-\epsilon)\frac{|G|}{|U|}N\le Y\le (1+\epsilon)\frac{|G|}{|U|}N</math>. Note that each <math>Y_i</math> is a Bernoulli trial that succeeds with probability <math>\frac{|G|}{|U|}</math>, thus <math>\mathbb{E}[Y]=\frac{|G|}{|U|}N</math>. Then the rest is due to Chernoff bound.}}
|header12 =
 
|label12  =  
A counting algorithm for the set <math>G</math> has to deal with the following three issues:
|data12  = [[File:Approximation_Algorithms.jpg|border|100px]]
# Implement the membership oracle <math>\mathcal{O}</math>. This is usually straightforward, or assumed by the model.
|header13 =
# Implement the uniform sampler <math>\mathcal{U}</math>. This can be straightforward or highly nontrivial, depending on the problem.
|label13  =
# Deal with exponentially small <math>\alpha=\frac{|G|}{|U|}</math>. This requires us to cleverly choose the universe <math>U</math>. And this part usually uses some beautiful ideas.
|data13  = Vazirani. <br>''Approximation Algorithms''. <br> Springer-Verlag, 2001.
 
|belowstyle = background:#ddf;
= Counting DNFs =
|below =  
A disjunctive normal form (DNF) formular is a disjunction (OR) of clauses, where each clause is a conjunction (AND) of literals. For example:
:<math>(x_1\wedge \overline{x_2}\wedge x_3)\vee(x_2\wedge x_4)\vee(\overline{x_1}\wedge x_3\wedge x_4)</math>.
Note the difference from the conjunctive normal forms (CNF).
 
Given a DNF formular <math>\phi</math> as the input, the problem is to count the number of satisfying assignments of <math>\phi</math>. This problem is [http://en.wikipedia.org/wiki/Sharp-P-complete '''#P-complete''']. So we do not expect to have a polynomial-time algorithm for exact solving the problem. Instead we are seeking for approximation algorithms. Interestingly, even though the computational complexity of the problem is so high, it admits some very nice approximation algorithm which has very good approximation ratio (theoretically speaking). We need to introduce some general concepts for approximation algorithms.
 
{{Theorem|FPTAS (Fully Polynomial-Time Approximation Scheme)|
:Consider a computational problem <math>f:\{0,1\}^*\to \mathbb{Z}^+</math> whose outputs are positive integers.
 
:A '''FPTAS (fully polynomial-time approximation scheme)''' for <math>f</math> is an algorithm <math>\mathcal{A}</math> that takes the following inputs:
:*an input instance <math>x</math> of problem <math>f</math>, which we use <math>n=|x|</math> to denote its length;
:*a real number <math>0<\epsilon<1</math>;
:and in time polynomial in both <math>n</math> and <math>\frac{1}{\epsilon}</math>, returns an output <math>\mathcal{A}(x,\epsilon)</math> such that
::<math>
(1-\epsilon)f(x)\le\mathcal{A}(x,\epsilon)\le (1+\epsilon)f(x).
</math>
}}
 
The adverb "fully" stresses the polynomial reliance on not just the input size <math>n</math> but also the approximation parameter <math>\frac{1}{\epsilon}</math>. An FPTAS may approximate the true value of the output within any accuracy in polynomial time, though the polynomial becomes larger when the approximation is more accurate. Moreover, the running time grows just polynomially with repeat to the accuracy bounds. Theoretically speaking, FPTAS is the best we can get for computational hard problems, though in practice sometimes the polynomial bound might be too large even for a moderate <math>\epsilon</math>.
 
The FPRAS (fully polynomial-time randomized approximation scheme), on the other hand, is the randomized relaxation of FPTAS.
 
{{Theorem|FPRAS (Fully Polynomial-time Randomized Approximation Scheme)|
:Consider a computational problem <math>f:\{0,1\}^*\to \mathbb{Z}^+</math> whose outputs are positive integers.
 
:A '''FPRAS (fully polynomial-time randomized approximation scheme)''' for <math>f</math> is a randomized algorithm <math>\mathcal{A}</math> that takes the following inputs:
:*an input instance <math>x</math> of problem <math>f</math>, which we use <math>n=|x|</math> to denote its length;
:*two real numbers <math>0<\epsilon,\delta<1</math>;
:and in time polynomial in <math>n</math>, <math>\frac{1}{\epsilon}</math>, and <math>\log\frac{1}{\delta}</math>, returns an output <math>\mathcal{A}(x,\epsilon,\delta)</math> such that
::<math>
\Pr\left[(1-\epsilon)f(x)\le\mathcal{A}(x,\epsilon,\delta)\le (1+\epsilon)f(x)\right]\ge 1-\delta.
</math>
}}
 
Note that the reliance on the ''confidence error'' <math>\delta</math> is polynomial in <math>\log\frac{1}{\delta}</math>, instead of <math>\frac{1}{\delta}</math>. This is because due to the Chernoff bound, the confidence error can be reduced in an exponential rate by independent repetitions. This motivates the following simpler but equivalent definition of FPRAS, which only considers the special confidence error <math>\delta=\frac{1}{3}</math>. Apparently, this is a more natural way to relax the FPTAS to randomized algorithms as it mimics the way of generalizing class '''P''' to '''BPP''' for decision problems. If you are familiar with the Chernoff bound, it is quite easy to observe the equivalence between the following definition and the above one. And this simple definition is also easier to check (you only need to verify the case for the error <math>\delta=\frac{1}{3}</math>), which makes it more convenient to apply.
 
{{Theorem|FPRAS (equivalent simple version)|
:Consider a computational problem <math>f:\{0,1\}^*\to \mathbb{Z}^+</math> whose outputs are positive integers.
 
:A '''FPRAS (fully polynomial-time randomized approximation scheme)''' for <math>f</math> is a randomized algorithm <math>\mathcal{A}</math> that takes the following inputs:
:*an input instance <math>x</math> of problem <math>f</math>, which we use <math>n=|x|</math> to denote its length;
:*a real number <math>0<\epsilon<1</math>;
:and in time polynomial in <math>n</math> and <math>\frac{1}{\epsilon}</math>, returns an output <math>\mathcal{A}(x,\epsilon)</math> such that
::<math>
\Pr\left[(1-\epsilon)f(x)\le\mathcal{A}(x,\epsilon)\le (1+\epsilon)f(x)\right]\ge \frac{2}{3}.
</math>
}}
 
The Monte Carlo method for the parameter estimation problem would give us an FPRAS if the sampler and membership oracle are poly-time realizable and the fraction <math>\alpha=\frac{|G|}{|U|}</math> is bounded from below by a <math>\frac{1}{\mathrm{poly}(n)}</math>.
 
However, for the DNF counting problem, naively applying the Monte Carlo method (treat the set of all <math>2^n</math> truth assignments as <math>U</math> and the set of DNF solutions as <math>G</math>) will not give a good algorithm. The problem is that the fraction <math>\alpha=\frac{|G|}{|U|}</math> can be exponentially small:
:Suppose that there are <math>n</math> variables. Let <math>U=\{\mathrm{true},\mathrm{false}\}^n</math> be the set of all truth assignments of the <math>n</math> variables. Let <math>G=\{x\in U\mid \phi(x)=\mathrm{true}\}</math> be the set of satisfying assignments for <math>\phi</math>. The straightforward use of Monte Carlo method samples <math>N</math> assignments from <math>U</math> and check how many of them satisfy <math>\phi</math>. This algorithm fails when <math>|G|/|U|</math> is exponentially small, namely, when exponentially small fraction of the assignments satisfy the input DNF formula.
 
So instead of naively considering the space of satisfying solutions and the space of all solutions, we represent the space of satisfying solutions to a DNF formula as a union of sets of satisfying solutions to the individual clauses, and count this union of sets. This gives us an abstract problem called the union of sets problem.
 
==The union of sets problem==
We reformulate the DNF counting problem in a more abstract framework, called the '''union of sets''' problem.
 
{{Theorem|The union of sets problem|
:Let <math>V</math> be a finite universe.
:'''Input''': <math>m</math> subsets <math>H_1,H_2,\ldots,H_m\subseteq V</math> of the universe;
:'''Output''': the size of the union set <math>H=\bigcup_{i=1}^m H_i</math>
}}
 
To make the algorithm work, we make the following assumptions:
# For all <math>i</math>, the value of <math>|H_i|</math> can be computed efficiently.
# It is possible to sample uniformly from each individual <math>H_i</math>.
# For any <math>x\in V</math>, it can be determined efficiently whether <math>x\in H_i</math>.
 
DNF counting can be easily put into this general framework: Suppose that the DNF formula is a disjunction (<math>\vee</math>) of <math>m</math> clauses <math>C_1,C_2,\ldots,C_m</math> on <math>n</math> variables, where each clause <math>C_i</math> is a conjunction (<math>\wedge</math>) of <math>k_i</math> literals. Without loss of generality, we may assume that in each clause, each variable appears at most once. The satisfying solutions to this DNF can be represented as a union of <math>m</math> sets as follows:
* <math>V=\{\text{true},\text{false}\}^n</math> is the set of all <math>2^n</math> truth assignments.
* Each <math>H_i=\{x\in\{\text{true},\text{false}\}^n\mid x\mbox{ satisfies }C_i\}</math> is the set of satisfying assignments for the <math>i</math>-th clause <math>C_i</math> of the DNF formula.  
Then the union of sets <math>H=\bigcup_i H_i</math> gives the set of satisfying assignments for the DNF formula <math>C_1\vee C_2\vee\cdots \vee C_m</math>. Its size <math>|H|</math> gives the number of satisfying assignments for the DNF.
 
Furthermore, the three assumptions above can also be guaranteed in this construction:
# Since each clause <math>C_i</math> is a conjunction of <math>k_i</math> literals, it is easy to see that <math>|H_i|=2^{n-k_i}</math>, which is obviously efficiently computable.
# Sampling from each <math>H_i</math> is very easy: we just fix the assignments of the <math>k_i</math> variables involved in the corresponding clause <math>C_i</math> to satisfy <math>C_i</math> (there is exactly one such choice), and sample uniformly and independently the rest <math>(n-k_i)</math> variable assignments.
# For each assignment <math>x</math>, it is easy to check whether it satisfies a clause <math>C_i</math>, thus it is easy to determine whether <math>x\in H_i</math>.
 
==The coverage algorithm==
We now introduce the coverage algorithm for the union of sets problem.
 
Consider the multiset <math>U</math> defined by
:<math>U=H_1\uplus H_2\uplus\cdots \uplus H_m</math>,
where <math>\uplus</math> denotes the multiset union. It is more convenient to define <math>U</math> as the set
:<math>U=\{(x,i)\mid x\in H_i\}</math>.
For each <math>x\in H</math>, there may be more than one instances of <math>(x,i)\in U</math>. We may choose the <math>(x,i)</math> with the minimum <math>i</math>, and collect all such <math>(x,i)</math> to form a set <math>G</math>.
 
Formally, the set <math>G</math> is defined as
:<math>G=\{(x,i)\in U\mid \forall (x,j)\in U, j\ge i\}</math>.  
Every <math>x\in H</math> corresponds to a unique <math>(x,i)\in G</math> where <math>i</math> is the smallest among <math>x\in H_i</math>.
 
The following proposition is obvious
{{Theorem|Proposition|
#<math>G\subseteq U</math>;
#<math>|G|=|H|\,</math>.
}}
 
Therefore, the estimation of the size of the union set <math>H\bigcup_{i=1}^mH_i</math> is reduced to the estimation of the size of the subset <math>G\subseteq U</math>, where <math>U</math> is the multiset union of <math>H_1, H_2,\ldots, H_m</math> and <math>H</math>. Note that now the fraction <math>\alpha=|G|/|U|</math> becomes large enough. As long as we can implement a uniform sampler for <math>U</math> and a membership oracle for <math>G</math>, we can apply the estimator theorem to get a good approximation algorithm for <math>|G|=|H|</math>.
 
An uniform sample from <math>U</math> can be implemented as follows.
{{Theorem|Uniform sampler for <math>U</math>|
* generate an <math>i\in\{1,2,\ldots,m\}</math> with probability <math>\frac{|H_i|}{\sum_{i=1}^m|H_i|}</math>;
* uniformly sample an <math>x\in H_i</math>, and return <math>(x,i)</math>.
}}
It is easy to see that this gives a uniform member of <math>U</math>. And this uniform sampler is efficient as long as each <math>|H_i|</math> is efficiently computable and we have an efficient uniform sample for each <math>H_i</math>, both of which are assumed.
 
It is also easy to implement the membership oracle for <math>G</math>:
{{Theorem|Membership oracle for <math>G</math>|
upon each query <math>(x,i)</math>:
:if <math>i</math> is the smallest among all <math>j</math> that <math>x\in H_j</math>
:: return "yes";
:else return "no";
}}
By definition of <math>G</math>, it is easy to see this membership oracle works, and it is efficient if the membership of each <math>H_i</math> can be efficiently determined, which is also assumed.
 
We now only need to lower bound the fraction
:<math>\alpha=\frac{|G|}{|U|}</math>.
 
{{Theorem|Proposition|
:<math>\alpha\ge\frac{1}{m}</math>.
}}
{{Proof|
For every <math>x\in H</math>, there are at most <math>m</math> different pairs <math>(x,i)</math> in <math>U</math>, thus <math>|U|\le m|H|</math>. And we already know that <math>|G|=|H|</math>.
}}
}}


Applying the estimator theorem, this gives us an algorithm which returns an <math>\epsilon</math>-approximation of <math>|H|</math> with probability at least <math>1-\delta</math>, by making at most <math>\frac{4m}{\epsilon^2}\ln\frac{2}{\delta}</math> calls to the uniform random sampler for <math>U</math> and the membership oracle for <math>G</math>, due to the three efficiency assumptions, both of which can be efficiently implemented. The resulting algorithm is called the '''coverage algorithm'''.
This is the webpage for the ''Advanced Algorithms'' class of fall 2018. Students who take this class should check this page periodically for content updates and new announcements.  


Applying the coverage algorithm to the DNF counting, which as we have discussed above, is a special case for the union of set problem, we have an FPRAS.
= Announcement =
{{Theorem|Theorem (Karp-Luby, 1983)|
* (2018/9/5) 新学期第一次上课。
:There exists an FPRAS for the DNF counting problem.
}}


= Count Matchings =
= Course info =
Recall that a matching <math>M</math> in a graph <math>G(V,E)</math> is a subset <math>M\subseteq E</math> of edges such that no vertex in <math>V</math> is incident to more than one edges in <math>M</math>, i.e. a matching is an "edge-version" of independent set.
* '''Instructor ''': 尹一通、郑朝栋
:*email: yinyt@nju.edu.cn, chaodong@nju.edu.cn
* '''Class meeting''': Wednesday 8am-10am, 仙I-319.
* '''Office hour''': Wednesday 10am-12pm, 计算机系 804.


Let us consider a more complicated counting problem, counting the number matchings in an input graph. The problem is formally defined as follows.
= Syllabus =
:'''Input''': an indirected graph <math>G(V,E)</math>;
:'''Output''': <math>Z(G)=</math> number of matchings in <math>G</math>.


Note that we count all matchings, not just maximum or maximal matchings. For example, an empty set (containing no edge) is always a matching.
=== 先修课程 Prerequisites ===
* 必须:离散数学,概率论,线性代数。
* 推荐:算法设计与分析。


This problem is '''#P-complete'''. In fact, it is among the first few problems known to be '''#P-complete'''. The studies of the computational complexity and efficient approximation algorithms for this problem pioneer the fields of counting complexity and randomized algorithms.
=== Course materials ===
* [[高级算法 (Fall 2018) / Course materials|<font size=3>教材和参考书</font>]]


== A self-reduction procedure ==
=== 成绩 Grades ===
We show a generic self-reduction procedure due to Jerrum-Valiant-Vazirani, which reduces a counting problem to the problems of smaller instances. This technique does not just work for counting matchings, but may also work a wide range of counting version of CSPs (constraint satisfaction problem) who show self-reducibility property.
* 课程成绩:本课程将会有若干次作业和一次期末考试。最终成绩将由平时作业成绩和期末考试成绩综合得出。
* 迟交:如果有特殊的理由,无法按时完成作业,请提前联系授课老师,给出正当理由。否则迟交的作业将不被接受。


Fix an input graph <math>G(V,E)</math>. Let <math>Z(G)</math> be the number of matchings in <math>G</math>.
=== <font color=red> 学术诚信 Academic Integrity </font>===
学术诚信是所有从事学术活动的学生和学者最基本的职业道德底线,本课程将不遗余力的维护学术诚信规范,违反这一底线的行为将不会被容忍。


We consider the uniform probability distribution over all matchings in <math>G</math>. Let <math>X</math> be such a random matching sampled uniformly at random from all matchings in <math>G</math>. More formally, for any <math>M\subseteq E</math>,
作业完成的原则:署你名字的工作必须由你完成。允许讨论,但作业必须独立完成,并在作业中列出所有参与讨论的人。不允许其他任何形式的合作——尤其是与已经完成作业的同学“讨论”。
:<math>
\Pr[X=M]=
\begin{cases}
\frac{1}{Z(G)} & \mbox{if }M\mbox{ is a matching in }G,\\
0 & \mbox{otherwise.}\\
\end{cases}
</math>


Consider the special matching <math>M=\emptyset</math>. It clearly holds that <math>\Pr[X=\emptyset]=\frac{1}{Z(G)}</math>, thus
本课程将对剽窃行为采取零容忍的态度。在完成作业过程中,对他人工作(出版物、互联网资料、其他人的作业等)直接的文本抄袭和对关键思想、关键元素的抄袭,按照 [http://www.acm.org/publications/policies/plagiarism_policy ACM Policy on Plagiarism]的解释,都将视为剽窃。剽窃者成绩将被取消。如果发现互相抄袭行为,<font color=red> 抄袭和被抄袭双方的成绩都将被取消</font>。因此请主动防止自己的作业被他人抄袭。
:<math>
Z(G)=\frac{1}{\Pr[X=\emptyset]}.
</math>
Thus we can estimate <math>Z(G)</math> by estimating the probability <math>\Pr[X=\emptyset]</math>.


We denote <math>E=\{e_1,e_2,\ldots,e_m\}</math>, where the order of edges <math>e_1,e_2,\ldots,e_m</math> is arbitrary.
学术诚信影响学生个人的品行,也关乎整个教育系统的正常运转。为了一点分数而做出学术不端的行为,不仅使自己沦为一个欺骗者,也使他人的诚实努力失去意义。让我们一起努力维护一个诚信的环境。


{|border="2" width="100%" cellspacing="4" cellpadding="3" rules="all" style="margin:1em 1em 1em 0; border:solid 1px #AAAAAA; border-collapse:collapse;empty-cells:show;"
= Assignments =
|
* TBA
:The random matching <math>X</math> can be seen as a random vector <math>X=(X_1,X_2,\ldots,X_m)</math>, where each <math>X_i</math> indicates whether <math>e_i</math> appears in the random matching <math>X</math>.
Thus the probability <math>\Pr[X=\emptyset]</math> is usually called a '''''joint probability''''' of the random vector <math>X</math>.
The joint probability can be represented as a product of '''''marginal probabilities''''' by the chain rule.
:<math>
\Pr[X=(0,0,\ldots,0)] = \prod_{i=1}^m\Pr[X_i=0\mid \forall j<i,X_j=0].
</math>
|}
 
Back to the matching problem, note that the event <math>X=\emptyset</math> is equivalent to the event that <math>\forall i, e_i\not\in X</math>.
Due to the chain rule,  we have
:<math>
\begin{align}
\Pr[X=\emptyset]
&=
\Pr[\forall i, e_i\not\in X]\\
&=
\prod_{i=1}^m\Pr[e_i\not\in X\mid \forall j<i,e_i\not\in X]\\
&=
\prod_{i=1}^m(1-\Pr[e_i\in X\mid \forall j<i,e_i\not\in X]).
\end{align}
</math>
 
For a graph <math>G(V,E)</math> and an edge <math>e</math>, we use
:<math>
P_G(e)=\Pr[e\in X]
</math>
to denote the marginal probability of <math>e</math> being occupied by a uniformly random matching <math>X</math> in <math>G</math>.
 
{{Theorem|Observation (self-reduction)|
:Let <math>G_i=G\setminus\{e_1,e_2,\ldots,e_{i-1}\}</math> be the subgraph of <math>G</math> obtained from removing the first <math>(i-1)</math> edges from <math>G</math>.
:It holds that
::<math>P_{G_i}(e_i)=\Pr[e_i\in X\mid \forall j<i,e_i\not\in X]</math>
}}
 
This observation can be easily proved by the following "telescopic product" version of the chain rule. Note that with the notation <math>G_i</math> we have <math>G_1=G</math> and <math>G_{m+1}=\emptyset</math> to be the empty graph.
:<math>
\begin{align}
\Pr[X=\emptyset]
&=
\frac{1}{Z(G)}
=
\frac{Z(G_{m+1})}{Z(G_1)}
=
\prod_{i=1}^m\frac{Z(G_{i+1})}{Z(G_i)}.
\end{align}
</math>
On the other hand, each term in the product is
:<math>\frac{Z(G_{i+1})}{Z(G_i)}=\frac{|\{\text{matchings formed by edges }e_{i+1},e_{e+2},\ldots,e_{m}\}|}{|\{\text{matchings formed by edges }e_i,e_{i+1},\ldots,e_{m}\}|}
=\Pr[e_i\not\in X\mid \forall j<i,e_j\not\in X].
</math>
So the above observation is proved.
 
==From counting to sampling ==
With the above observation and recalling that <math>Z(G)=\frac{1}{\Pr[X=\emptyset]}</math>, we have
:<math>
Z(G)=\frac{1}{\Pr[X=\emptyset]}=\prod_{i=1}^m\frac{1}{(1-P_{G_i}(e_i))}.
</math>
 
The number of matchings in graph <math>G</math>, <math>Z(G)</math>, can be efficiently approximated if the marginal probabilities <math>P_{G_i}(e_i)</math> can be efficiently approximated, where the latter can be achieved by doing the statistical experiments by sampling uniform random matchings in graph <math>G_i</math>.
 
This generic process is described in more details as follows:
# If we can sample a uniform (or ''almost uniform'', whose meaning to be specified later) random matching from any graph <math>G</math> in polynomial time, then due to the estimator theorem, we can have an '''<math>(\epsilon,\delta)</math>-estimator''' of each <math>P_{G_i}(e_i)</math>. This estimator runs in time polynomial in <math>n=|V|</math>, <math>\frac{1}{\epsilon}</math>, and <math>\log\frac{1}{\delta}</math>, and returns an estimation <math>\hat{P}_i</math> for each <math>P_{G_i}(e_i)</math> such that <math>|\hat{P}_i-P_{G_i}(e_i)|>\epsilon</math> holds with probability at most <math>\delta</math>.
# The above <math>(\epsilon,\delta)</math>-estimators are efficient approximations of marginal probabilities with small ''additive errors''. To get an FPRAS for <math>Z(G)</math>, whose error is multiplicative, we still need that each <math>P_{G_i}(e_i)</math> is bounded away from 1. i.e. there is a constant <math>c>0</math> such that it always holds that <math>P_{G_i}(e_i)\le 1-c</math>. For matching, this is always guaranteed. We have the following lemma.
{{Theorem|Lemma|
:For any graph <math>G</math> and edge <math>e</math>, it always holds that <math>P_G(e)\le \frac{1}{2}</math>.
}}
:This lemma holds for quite obvious reasons: If <math>e</math> is an isolated edge (with both endpoints of degree 1), then it is covered by an uniformly random matching <math>X</math> with probability exactly 1/2. And more edges sharing vertices with <math>e</math> can not increase this probability.


With the above lemma, the task of designing a FPRAS for the number of matchings in an input graph is reduced to the task of uniformly sampling a matching in the input graph in polynomial time. In fact, precisely uniform sampling such complicated structure is quite difficult, but there are ways to ''almost uniform sampling'' matchings or other complicated structures in polynomial time. This is achieved by '''random walks''' in a very large but fast converging Markov chain.
= Lecture Notes =
# [[高级算法 (Fall 2018)/Min-Cut and Max-Cut|Min-Cut and Max-Cut]]
#: [[高级算法 (Fall 2018)/Probability Basics|Probability basics]]

Revision as of 14:15, 4 September 2018

高级算法
Advanced Algorithms
Instructor
尹一通
郑朝栋
Email yinyt@nju.edu.cn chaodong@nju.edu.cn
office 计算机系 804
Class
Class meetings Wednesday, 8am-10am
仙I-319
Office hours Wednesday, 10am-12pm
计算机系 804(尹一通)、302(郑朝栋)
Textbooks
Motwani and Raghavan.
Randomized Algorithms.
Cambridge Univ Press, 1995.
Vazirani.
Approximation Algorithms.
Springer-Verlag, 2001.
v · d · e

This is the webpage for the Advanced Algorithms class of fall 2018. Students who take this class should check this page periodically for content updates and new announcements.

Announcement

  • (2018/9/5) 新学期第一次上课。

Course info

  • Instructor : 尹一通、郑朝栋
  • email: yinyt@nju.edu.cn, chaodong@nju.edu.cn
  • Class meeting: Wednesday 8am-10am, 仙I-319.
  • Office hour: Wednesday 10am-12pm, 计算机系 804.

Syllabus

先修课程 Prerequisites

  • 必须:离散数学,概率论,线性代数。
  • 推荐:算法设计与分析。

Course materials

成绩 Grades

  • 课程成绩:本课程将会有若干次作业和一次期末考试。最终成绩将由平时作业成绩和期末考试成绩综合得出。
  • 迟交:如果有特殊的理由,无法按时完成作业,请提前联系授课老师,给出正当理由。否则迟交的作业将不被接受。

学术诚信 Academic Integrity

学术诚信是所有从事学术活动的学生和学者最基本的职业道德底线,本课程将不遗余力的维护学术诚信规范,违反这一底线的行为将不会被容忍。

作业完成的原则:署你名字的工作必须由你完成。允许讨论,但作业必须独立完成,并在作业中列出所有参与讨论的人。不允许其他任何形式的合作——尤其是与已经完成作业的同学“讨论”。

本课程将对剽窃行为采取零容忍的态度。在完成作业过程中,对他人工作(出版物、互联网资料、其他人的作业等)直接的文本抄袭和对关键思想、关键元素的抄袭,按照 ACM Policy on Plagiarism的解释,都将视为剽窃。剽窃者成绩将被取消。如果发现互相抄袭行为, 抄袭和被抄袭双方的成绩都将被取消。因此请主动防止自己的作业被他人抄袭。

学术诚信影响学生个人的品行,也关乎整个教育系统的正常运转。为了一点分数而做出学术不端的行为,不仅使自己沦为一个欺骗者,也使他人的诚实努力失去意义。让我们一起努力维护一个诚信的环境。

Assignments

  • TBA

Lecture Notes

  1. Min-Cut and Max-Cut
    Probability basics