随机算法 (Fall 2015)/Lovász Local Lemma and 高级算法 (Fall 2018): Difference between pages

From TCS Wiki
(Difference between pages)
Jump to navigation Jump to search
imported>Etone
 
imported>Etone
No edit summary
 
Line 1: Line 1:
= Lovász Local Lemma=
{{Infobox
Suppose that we are give a set of "bad" events <math>A_1,A_2,\ldots,A_n</math>. We want to know that it is possible that none of them occurs, that is:
|name        = Infobox
:<math>
|bodystyle    =
\Pr\left[\bigwedge_{i=1}^n\overline{A_i}\right]>0.
|title        = <font size=3>高级算法
</math>
<br>Advanced Algorithms</font>
Obviously, a ''necessary'' condition for this is that for none of the bad events its occurrence is certain, i.e. <math>\Pr[A_i]<1</math> for all <math>i</math>. We are interested in the ''sufficient'' condition for the above. There are two easy cases:
|titlestyle  =  
;Case 1<nowiki>: mutual independence.</nowiki>
If all the bad events <math>A_1,A_2,\ldots,A_m</math> are mutually independent, then
:<math>
\Pr\left[\bigwedge_{i=1}^m\overline{A_i}\right]=\prod_{i=1}^m(1-\Pr[A_i])
</math>
and hence this probability is positive if <math>\Pr[A_i]<1</math> for all <math>i</math>.


;Case 2<nowiki>: arbitrary dependency.</nowiki>
|image        =
On the other extreme, if we know nothing about the dependencies between these bad event, the best we can do is to apply the union bound:
|imagestyle  =
:<math>
|caption      =
\Pr\left[\bigwedge_{i=1}^m\overline{A_i}\right]\ge 1-\sum_{i=1}^m\Pr\left[A_i\right],
|captionstyle =  
</math>
|headerstyle  = background:#ccf;
which is positive if <math>\sum_{i=1}^m\Pr\left[A_i\right]<1</math>. This is a very loose bound, however it cannot be further improved if no further information regarding the dependencies between the events is assumed.
|labelstyle  = background:#ddf;
|datastyle    =  


== Lovász Local Lemma (symmetric case) ==
|header1 =Instructor
In most situations, the dependencies between events are somewhere between these two extremal cases: the events are not independent of each other, but on the other hand the dependencies between them are not total out of control. For these more general cases, we would like to exploit the tradeoff between probabilities of bad events and dependencies between them.
|label1  =  
 
|data1  =  
The Lovász local lemma is such a powerful tool for showing the possibility of rare event under ''limited dependencies''. The structure of dependencies between a set of events is described by a '''dependency graph''', which is a graph with events as vertices and each event is adjacent to the events which are dependent with it in the dependency graph.
|header2 =  
 
|label2  =
{{Theorem
|data2  = 尹一通<br>郑朝栋
|Definition (dependency graph)|
|header3 =  
:Let <math>A_1,A_2,\ldots,A_m</math> be a set of events. A graph <math>D=(V,E)</math> with set of vertices <math>V=\{A_1,A_2,\ldots,A_m\}</math> is called a '''dependency graph''' for the events <math>A_1,\ldots,A_m</math> if every event <math>A_i</math> is mutually independent of all the events in <math>\{A_j\mid (A_i,A_j)\not\in E\}</math>.
|label3 = Email
}}
|data3  = yinyt@nju.edu.cn chaodong@nju.edu.cn 
The maximum degree <math>d</math> of the dependency graph <math>D</math> is a very useful information, as it tells us that every event <math>A_i</math> among <math>A_1,A_2,\ldots,A_m</math> is dependent with how many other events at most.
|header4 =
 
|label4= office
;Remark on the mutual independence
|data4= 计算机系 804
:In probability theory, an event <math>A</math> is said to be independent of events <math>B_1,B_2,\ldots,B_k</math> if for any ''disjoint'' <math>I,J\subseteq\{1,2,\ldots,k\}</math>, we have
|header5 = Class
:::<math>\Pr\left[A\mid \left(\bigwedge_{i\in I}B_i \right)\wedge \left(\bigwedge_{i\in J}\overline{B}_i\right) \right]=\Pr[A]</math>,
|label5  =  
:that is, occurrences of events among <math>B_1,B_2,\ldots,B_k</math> have no influence on the occurrence of <math>A</math>.
|data5  =  
 
|header6 =
;Example
|label6  = Class meetings
:Let <math>X_1,X_2,\ldots,X_n</math> be a set of ''mutually independent'' random variables. Each event <math>A_i</math> is a predicate defined on a number of variables among <math>X_1,X_2,\ldots,X_n</math>. Let <math>\mathsf{vbl}(A_i)</math> be the unique smallest set of variables which determine <math>A_i</math>. The dependency graph <math>D=(V,E)</math> is defined as that any two events <math>A_i,A_j</math> are adjacent in <math>D</math> if and only if they share variables, i.e. <math>\mathsf{vbl}(A_i)\cap\mathsf{vbl}(A_j)\neq\emptyset</math>.
|data6  = Wednesday, 8am-10am <br> 仙I-319
 
|header7 =
The following theorem was proved by Erdős and Lovász in 1975 and then later improved by Lovász in 1977. Now it is commonly referred as the '''Lovász local lemma'''. It is a very powerful tool, especially when being used with the probabilistic method, as it supplies a way for dealing with rare events.
|label7  = Place
 
|data7  =
{{Theorem
|header8 =
|Lovász Local Lemma (symmetric case)|
|label8  = Office hours
:Let <math>A_1,A_2,\ldots,A_m</math> be a set of events, and assume that the followings hold:
|data8  = Wednesday, 10am-12pm <br>计算机系 804(尹一通)、302(郑朝栋)
#<math>\Pr[A_i]\le p</math> for every event <math>A_i</math>;
|header9 = Textbooks
#every event <math>A_i</math> is mutually independent of all other events except at most <math>d</math> of them, and
|label9  =  
:::<math>\mathrm{e}p(d+1)\le 1</math>.
|data9  =  
:Then
|header10 =
::<math>\Pr\left[\bigwedge_{i=1}^n\overline{A_i}\right]>0</math>.
|label10  =
}}
|data10  = [[File:MR-randomized-algorithms.png|border|100px]]
Here <math>d</math> is the maximum degree of the dependency graph <math>D</math> for the events <math>A_1,\ldots,A_m</math>.
|header11 =
 
|label11 =  
Intuitively, the Lovász Local Lemma says that if a rare (but hopefully possible) event is formulated as to avoid a series of bad events simultaneously, then the rare event is indeed possible if:
|data11  = Motwani and Raghavan. <br>''Randomized Algorithms''.<br> Cambridge Univ Press, 1995.
* none of these bad events is too probable;
|header12 =
* none of these bad events is dependent with too many other bad events;
|label12  =  
Here the tradeoff between "too probable" and "too many" is characterized by the <math>\mathrm{e}p(d+1)\le 1</math> condition.
|data12  = [[File:Approximation_Algorithms.jpg|border|100px]]
 
|header13 =
According to a result of Shearer in 1985, the condition of the Lovász Local Lemma cannot be substantially improved if only the bounds on <math>p</math> and <math>d</math> are known.
|label13  =  
 
|data13  = Vazirani. <br>''Approximation Algorithms''. <br> Springer-Verlag, 2001.
==Lovász Local Lemma (asymmetric case)==
|belowstyle = background:#ddf;
Sometimes when applying the local lemma, a few bad events are much more probable than others or are dependent with more other bad events. In this case, using the same upper bounds <math>p</math> on the probability of bad events or <math>d</math> on the number of dependent events will be much wasteful. To more accurately deal with such general cases, we need a more refined way to characterize the tradeoff between local dependencies and probabilities of bad events.
|below =
 
We need to introduce a few notations that will be frequently used onwards.
Let <math>\mathcal{A}=\{A_1,A_2,\ldots,A_m\}</math> be a set of events. For every event <math>A_i\in\mathcal{A}</math>, we define its neighborhood and inclusive neighborhood as follows:
*'''inclusive neighborhood''': <math>\Gamma^+(A_i)\,</math> denotes the set of events in <math>\mathcal{A}</math>, including <math>A_i</math> itself, that are dependent with <math>A_i</math>. More precisely, <math>A_i</math> is mutually independent of all events in <math>\mathcal{A}\setminus\Gamma^+(A_i)</math>.
*'''neighborhood''': <math>\Gamma(A_i)=\Gamma^+(A_i)\setminus \{A_i\}</math>, that is, <math>\Gamma(A_i)</math> contains the events in <math>\mathcal{A}</math> that are dependent with <math>A_i</math>, not including <math>A_i</math> itself.
 
The following is the asymmetric version of the Lovász Local Lemma. This generalization is due to Spencer.
 
{{Theorem
|Lovász Local Lemma (general case)|
:Let <math>\mathcal{A}=\{A_1,A_2,\ldots,A_m\}</math> be a set of events, where every event <math>A_i\in\mathcal{A}</math> is mutually independent of all other events excepts those in its neighborhood <math>\Gamma(A_i)\,</math> in the dependency graph. Suppose there exist real numbers <math>\alpha_1,\alpha_2,\ldots, \alpha_m\in[0,1)</math> such that for every <math>A_i\in\mathcal{A}</math>,
::<math>\Pr[A_i]\le \alpha_i\prod_{A_j\in\Gamma(A_i)}(1-\alpha_j)</math>.
:Then
::<math>\Pr\left[\bigwedge_{A_i\in\mathcal{A}}\overline{A_i}\right]\ge\prod_{i=1}^m(1-\alpha_i)</math>.
}}
This generalized version of the local lemma immediately implies the symmetric version of the lemma. Namely, <math>\Pr\left[\bigwedge_{i}\overline{A_i}\right]>0</math> if the followings are satisfied:
# <math>\Pr[A_i]\le p</math> for all <math>A_i\in\mathcal{A}</math>;
# <math>\mathrm{e}p(d+1)\le 1</math>, where <math>d=\max_{A_i\in\mathcal{A}}|\Gamma(A_i)|</math> is the maximum degree of the dependency graph.
To see this, for every <math>A_i\in\mathcal{A} </math> let <math>\alpha_i=\frac{1}{d+1}</math>. Note that <math>\prod_{A_j\in\Gamma(A_i)}(1-\alpha_j)\ge \left(1-\frac{1}{d+1}\right)^d>\frac{1}{\mathrm{e}}</math>.
 
With the above two conditions satisfied, for all <math>A_i\in\mathcal{A}</math>, it is easy to verify:
:<math>\Pr[A_i]\le p\le\frac{1}{\mathrm{e}(d+1)}<\frac{1}{d+1}\left(1-\frac{1}{d+1}\right)^d\le \alpha_i\prod_{A_j\in\Gamma(A_i)}(1-\alpha_j)</math>,
which according to the Lovász Local Lemma (general case), implies that
:<math>\Pr\left[\bigwedge_{i=1}\overline{A_i}\right]\ge\prod_{i=1}^m(1-\alpha_i)=\left(1-\frac{1}{d+1}\right)^m>0</math>.
This gives the symmetric version of the local lemma.
 
== A non-constructive proof of LLL ==
We then give the proof of the generalized Lovász Local Lemma. In particular, this proof is '''''non-constructive''''', in contrast to the '''''constructive''''' proofs that we are going to introduce later, which are basically algorithms.
 
Apply the chain rule. The probability that none of the bad events occurs can be expressed as:
:<math>
\begin{align}
\Pr\left[\bigwedge_{i=1}^m\overline{A_i}\right]
=\prod_{i=1}^m\Pr\left[\overline{A_i}\mid \bigwedge_{j=1}^{i-1}\overline{A_{j}}\right]
=\prod_{i=1}^m\left(1-\Pr\left[A_i\mid \bigwedge_{j=1}^{i-1}\overline{A_{j}}\right]\right).
\end{align}
</math>
 
It is then sufficient to show that
:<math>\Pr\left[A_i\mid \bigwedge_{j=1}^{i-1}\overline{A_{j}}\right]\le\alpha_i</math>,
which will prove the lemma.
 
We then prove a slightly more general statement:
:(induction hypothesis) <math>\Pr\left[A_{i_1}\mid \bigwedge_{j=2}^\ell\overline{A_{i_j}}\right]\le \alpha_{i_1}</math> for any distinct events <math>A_{i_1},A_{i_2}\ldots,A_{i_\ell}\in\mathcal{A}</math>.
 
The proof is by induction on <math>\ell</math>. For <math>\ell=1</math>, due to the assumption in the Lovász Local Lemma
:<math>\Pr[A_{i_1}]\le\alpha_{i_1}\prod_{A_j\in\Gamma(A_{i_1})}(1-\alpha_{j})\le\alpha_{i_1}</math>.
 
For general <math>\ell</math>, assume the hypothesis is true for all smaller <math>\ell</math>.  
Without loss of generality, assume that <math>A_{i_2},\ldots,A_{i_k}</math> are the events among <math>A_{i_2}\ldots,A_{i_\ell}</math> that are dependent with <math>A_{i_1}</math>, and <math>A_{i_1}</math> is mutually independent of the rest <math>A_{i_{k+1}},\ldots,A_{i_\ell}</math>.
 
Then applying the following basic conditional probability identity
:<math>\Pr[A\mid BC]=\frac{\Pr[AB\mid C]}{\Pr[B\mid C]}</math>,
we have
:<math>
\Pr\left[A_{i_1}\mid \bigwedge_{j=2}^\ell\overline{A_{i_j}}\right]
=\frac{\Pr\left[ A_i\wedge \bigwedge_{j=2}^k\overline{A_{i_j}}\mid \bigwedge_{j=k+1}^\ell\overline{A_{i_j}}\right]}
{\Pr\left[\bigwedge_{j=2}^k\overline{A_{i_j}}\mid \bigwedge_{j=k+1}^\ell\overline{A_{i_j}}\right]}
=\frac{\text{Numerator}}{\text{Denominator}}.
</math>
Due to the mutual independence between <math>A_{i_1}</math> and <math>A_{i_k+1},\ldots,A_{i_\ell}</math>, the <math>\text{Numerator}</math> becomes
:<math>
\text{Numerator}
\le\Pr\left[ A_{i_1}\mid \bigwedge_{j=k+1}^\ell\overline{A_{i_j}}\right]=\Pr[A_{i_1}],
</math>
which according to the assumption in the Lovász Local Lemma, is bounded as
:<math>
\text{Numerator}\le \alpha_{i_1}\prod_{A_j\in \Gamma(A_{i_1})}(1-\alpha_j).
</math>
Applying the chain rule to the <math>\text{Denominator}</math> we have
:<math>
\text{Denominator}=\prod_{j=2}^k\Pr\left[\overline{A_{i_j}}\mid \bigwedge_{r=j+1}^\ell\overline{A_{i_r}}\right].
</math>
Note that there are always less than <math>\ell</math> events involved, so we can apply the induction hypothesis and have
:<math>
\text{Denominator}\ge \prod_{j=2}^k(1-\alpha_{i_j})\ge \prod_{A_j\in\Gamma(A_{i_1})}(1-\alpha_j),
</math>
where the last inequality is due to the fact that <math>A_{i_2},\ldots,A_{i_k}\in\Gamma(A_{i_1})</math>.
 
Combining everything together, we have
:<math>
\Pr\left[A_{i_1}\mid \bigwedge_{j=2}^\ell\overline{A_{i_j}}\right]
\le\alpha_{i_1}.
</math>
As we argued in the beginning, this proves the general Lovász Local Lemma.
 
=Random Search for Exact-<math>k</math>-SAT=
We start by giving the definition of <math>k</math>-CNF and <math>k</math>-SAT.
{{Theorem|Definition (exact-<math>k</math>-CNF)|
:A logic expression <math>\phi</math> defined on <math>n</math> Boolean variables <math>x_1,x_2,\ldots,x_n\in\{\mathrm{true},\mathrm{false}\}</math> is said to be a '''conjunctive normal form (CNF)''' if <math>\phi</math> can be written as a conjunction(AND) of '''clauses''' as <math>\phi=C_1\wedge C_2\wedge\cdots\wedge C_m</math>, where each clause <math>C_i=\ell_{i_1}\vee \ell_{i_2}\vee\cdots\vee\ell_{i_k}</math> is a disjunction(OR) of '''literals''', where every literal <math>\ell_j</math> is either a variable <math>x_i</math> or the negation <math>\neg x_i</math> of a variable.
:*We call a CNF formula a '''exact-<math>k</math>-CNF''' if every clause consists of ''exact'' <math>k</math> ''distinct'' literals.
}}
}}
For example:
:<math>
(x_1\vee \neg x_2 \vee \neg x_3)\wedge (\neg x_1\vee \neg x_3\vee x_4)\wedge (x_1\vee x_2\vee x_4)\wedge (x_2\vee x_3\vee \neg x_4)
</math>
is an exact-<math>3</math>-CNF formula.


;Remark
This is the webpage for the ''Advanced Algorithms'' class of fall 2018. Students who take this class should check this page periodically for content updates and new announcements.  
:The notion of exact-<math>k</math>-CNF is slightly more restrictive than the <math>k</math>-CNF, where each clause consists of ''at most'' <math>k</math> variables. The discussion of the subtle differences between these two definitions can be found [https://en.wikipedia.org/wiki/Boolean_satisfiability_problem#3-satisfiability here].


A logic expression <math>\phi</math> is said to be '''satisfiable''' if there is an assignment of values of true or false to the variables <math>\boldsymbol{x}=(x_1,x_2,\ldots,x_n)</math> so that <math>\phi(\boldsymbol{x})</math> is true. For a CNF <math>\phi</math>, this mean that there is a truth assignment that satisfies all clauses in <math>\phi</math> simultaneously.
= Announcement =
* (2018/9/5) 新学期第一次上课。


The '''exact-<math>k</math>-satisfiability (exact-<math>k</math>-SAT)''' problem is that given as input an exact-<math>k</math>-CNF formula <math>\phi</math> decide whether <math>\phi</math> is satisfiable.
= Course info =
{{Theorem|exact-<math>k</math>-SAT|
* '''Instructor ''': 尹一通、郑朝栋
:'''Input:''' an exact-<math>k</math>-CNF formula <math>\phi</math>.
:*email: yinyt@nju.edu.cn, chaodong@nju.edu.cn
:'''Output:''' whether <math>\phi</math> is satisfiable.
* '''Class meeting''': Wednesday 8am-10am, 仙I-319.
}}
* '''Office hour''': Wednesday 10am-12pm, 计算机系 804.
It is well known that <math>k</math>-SAT is '''NP-complete''' for any <math>k\ge 3</math>. The same also holds for the exact-<math>k</math>-SAT.


== Satisfiability of exact-<math>k</math>-CNF==
= Syllabus =
Inspired by the Lovasz local lemma, we now consider the dependencies between clauses in a CNF formula.


Given a CNF formula <math>\phi</math> defined over Boolean variables <math>\mathcal{X}=\{x_1,x_2,\ldots,x_n\}</math> and a clause <math>C</math> in <math>\phi</math>, we use <math>\mathsf{vbl}(C)\subseteq\mathcal{X}</math> to denote the set of variables that appear in <math>C</math>.
=== 先修课程 Prerequisites ===
For a clause <math>C</math> in a CNF formula <math>\phi</math>, its '''degree''' <math>d(C)=|\{D\neq C\mid \mathsf{D}\cap\mathsf{C}\neq\emptyset\}|</math> is the number of other clauses in <math>\phi</math> that share variables with <math>C</math>. The '''maximum degree''' <math>d</math> of a CNF formula <math>\phi</math> is <math>d=\max_{C\text{ in }\phi}d(C)</math>.
* 必须:离散数学,概率论,线性代数。
* 推荐:算法设计与分析。


By the Lovasz local lemma, we almost immediately have the following theorem for the satisfiability of exact-<math>k</math>-CNF with bounded degree.
=== Course materials ===
{{Theorem|Theorem|
* [[高级算法 (Fall 2018) / Course materials|<font size=3>教材和参考书</font>]]
:Let <math>\phi</math> be an exact-<math>k</math>-CNF formula with maximum degree <math>d</math>. If <math>d\le 2^{k}/\mathrm{e}-1</math> then <math>\phi</math> is always satisfiable.
}}
{{Proof|
Let <math>X_1,X_2,\ldots,X_n</math> be Boolean random variables sampled uniformly and independently from <math>\{\text{true},\text{false}\}</math>. We are going to show that <math>\phi</math> is satisfied by this random assignment with positive probability. Due to the probabilistic method, this will prove the existence of a satisfying assignment for <math>\phi</math>.


Suppose there are <math>m</math> clauses <math>C_1,C_2,\ldots,C_m</math> in <math>\phi</math>. Let <math>A_i</math> denote the bad event that <math>C_i</math> is not satisfied by the random assignment <math>X_1,X_2,\ldots,X_n</math>. Clearly, each <math>A_i</math> is dependent with at most <math>d</math> other <math>A_j</math>'s. And our goal is to show that
=== 成绩 Grades ===
:<math>\Pr\left[\bigwedge_{i=1}^m\overline{A_i}\right]>0</math>.
* 课程成绩:本课程将会有若干次作业和一次期末考试。最终成绩将由平时作业成绩和期末考试成绩综合得出。
* 迟交:如果有特殊的理由,无法按时完成作业,请提前联系授课老师,给出正当理由。否则迟交的作业将不被接受。


Recall that in an exact-<math>k</math>-CNF, every clause <math>C_i</math> consists of exact <math>k</math> variable, and is violated by precisely one local assignment among all <math>2^k</math> possibilities. Thus the probability that <math>C_i</math> is not satisfied is <math>\Pr[A_i]=2^{-k}</math>.
=== <font color=red> 学术诚信 Academic Integrity </font>===
学术诚信是所有从事学术活动的学生和学者最基本的职业道德底线,本课程将不遗余力的维护学术诚信规范,违反这一底线的行为将不会被容忍。


Assuming that <math>d\le 2^{k}/\mathrm{e}-1</math>, i.e. <math>\mathrm{e}(d+1)2^{-k}\le 1</math>, by the Lovasz local lemma (symmetric case), we have
作业完成的原则:署你名字的工作必须由你完成。允许讨论,但作业必须独立完成,并在作业中列出所有参与讨论的人。不允许其他任何形式的合作——尤其是与已经完成作业的同学“讨论”。
:<math>\Pr\left[\bigwedge_{i=1}^m\overline{A_i}\right]>0</math>.
}}


== The random search algorithm ==
本课程将对剽窃行为采取零容忍的态度。在完成作业过程中,对他人工作(出版物、互联网资料、其他人的作业等)直接的文本抄袭和对关键思想、关键元素的抄袭,按照 [http://www.acm.org/publications/policies/plagiarism_policy ACM Policy on Plagiarism]的解释,都将视为剽窃。剽窃者成绩将被取消。如果发现互相抄袭行为,<font color=red> 抄袭和被抄袭双方的成绩都将被取消</font>。因此请主动防止自己的作业被他人抄袭。
The above theorem basically says that for a CNF if every individual clause is easy to satisfy and is dependent with few other clauses then the CNF should be always satisfiable. However, the theorem only states the existence of a satisfying solution, but does not specify a way to find this solution. Next we give a simple randomized algorithm and prove it can find the satisfying solution efficiently under a slightly stronger assumption than the Lovasz local lemma.  


Given as input a CNF formula <math>\phi</math> defined on Boolean variables <math>\mathcal{X}=\{x_1,x_2,\ldots,x_n\}</math>, recall that for a clause <math>C</math> in a CNF <math>\phi</math>, we use <math>\mathsf{vbl}(C)\subseteq\mathcal{X}</math> to denote the set of variables on which <math>C</math> is defined.
学术诚信影响学生个人的品行,也关乎整个教育系统的正常运转。为了一点分数而做出学术不端的行为,不仅使自己沦为一个欺骗者,也使他人的诚实努力失去意义。让我们一起努力维护一个诚信的环境。


The following algorithm is due to Moser in 2009. The algorithm consists of two components: the main function ''Solve''() and a sub-routine ''Fix''().
= Assignments =
 
* TBA
{{Theorem
|Solve(CNF <math>\phi</math>)|
:Pick values of <math>x_1,x_2\ldots,x_n</math> uniformly and independently at random;
:While there is an unsatisfied clause <math>C</math> in <math>\phi</math>
:: '''Fix'''(<math>C</math>);
}}
 
The sub-routine '''Fix()''' is a recursive procedure:
{{Theorem
|Fix(Clause <math>C</math>)|
:Replace the values of variables in <math>\mathsf{vbl}(C)</math> with new uniform and independent random values;
:While there is ''unsatisfied'' clause <math>D</math> (including <math>C</math> itself) that <math>\mathsf{vbl}(C)\cap \mathsf{vbl}(D)\neq \emptyset</math>
:: '''Fix'''(<math>D</math>);
}}
 
It is an amazing discovery that this simple algorithm works well as long as the condition of Lovasz local lemma is satisfied. Here we prove a slightly weakened statement for the convenience of analysis.
 
{{Theorem|Theorem|
:Let <math>\phi</math> be an exact-<math>k</math>-CNF formula with maximum degree <math>d</math>.
:There is a <math>d_0=\Theta(2^{k})</math> such that if <math>d< d_0</math> then the algorithm ''Solve''(<math>\phi</math>) finds a satisfying assignment for <math>\phi</math> in time <math>O(n+km\log m)</math> with high probability.
}}
 
The analysis is based on a technique called '''''entropy compression'''''. This is a very clever idea and may be very different from what you might have seen so far about algorithm analysis.
 
We first give a high level description of the ideas behind the analysis of this brilliant algorithm:
* We use <math>\mathsf{Alg}(r, \phi)</math> to abstractly denote an algorithm <math>\mathsf{Alg}</math> running on an input <math>\phi</math> with random bits <math>r\in\{0,1\}^*</math>. For an algorithm with no access to the random bits <math>r</math>, once the input <math>\phi</math> is fixed, the behavior of the algorithm as well as its output is ''deterministic''. But for ''randomized'' algorithms, the behavior of <math>\mathsf{Alg}(r, \phi)</math> is a random variable even when the input <math>\phi</math> is fixed.
* Fix an arbitrary (worst-case) input <math>\phi</math>. We try to construct a ''succinct representation'' <math>c</math> of the behavior of <math>\mathsf{Alg}(r, \phi)</math> in such a manner that the random bits <math>r</math> can always be fully recovered from this succinct representation <math>c</math>. In other words, <math>\mathsf{Alg}(r, \phi)</math> gives an encoding (a 1-1 mapping) of the random bits <math>r</math> to a succinct representation <math>c</math>.
* It is a fundamental law that random bits cannot be compressed significantly by any encoding. Therefore if a longer running time of <math>\mathsf{Alg}(r, \phi)</math> would imply that the random bits <math>r</math> can be encoded to a succinct representation <math>c</math> which is much shorter than <math>r</math>, then we prove the running time of the algorithm <math>\mathsf{Alg}(r, \phi)</math> cannot be too long.
:* A natural way to reach this last contradiction is to have the following situation: As the running time of <math>\mathsf{Alg}(r, \phi)</math> grows, naturally both lengths of random bits <math>r</math> and the succinct representation <math>c</math> of the behavior of <math>\mathsf{Alg}(r, \phi)</math> grow. So if the former grows much faster than the latter as the running time grows, then a large running time may cause the length of <math>r</math> significantly greater than the length of <math>c</math>.
 
---------
We now proceed to the analysis of <math>\text{Slove}(\phi)</math> and prove the above theorem.
 
Fix any exact-<math>k</math>-CNF formula <math>\phi</math> with maximum degree <math>d</math>. Let <math>T</math> denote the total number of time the function <math>\text{Fix}()</math> is called (including both the calls in <math>\text{Solve}(\phi)</math> and the recursive calls). Note that <math>T</math> is a random variable depends solely on the random bits used by the algorithm (after the input <math>\phi</math> being fixed). We then show that <math>T=O(m\log m)</math> with high probability.
 
Potentially <math>T</math> can be both finite and infinite
 
----------
We consider a restrictive case.
 
Let <math>X_1,X_2,\ldots,X_m\in\{\mathrm{true},\mathrm{false}\}</math> be a set of ''mutually independent'' random variables which assume boolean values. Each event <math>A_i</math> is an AND of at most <math>k</math> literals (<math>X_i</math> or <math>\neg X_i</math>). Let <math>v(A_i)</math> be the set of the <math>k</math> variables that <math>A_i</math> depends on. The probability that none of the bad events occurs is
:<math>
\Pr\left[\bigwedge_{i=1}^n \overline{A_i}\right].
</math>
In this particular model, the dependency graph <math>D=(V,E)</math> is defined as that <math>(i,j)\in E</math> iff <math>v(A_i)\cap v(A_j)\neq \emptyset</math>.
 
Observe that <math>\overline{A_i}</math> is a clause (OR of literals). Thus, <math>\bigwedge_{i=1}^n \overline{A_i}</math> is a '''<math>k</math>-CNF''', the CNF that each clause depends on <math>k</math> variables.
The probability
:<math>
\bigwedge_{i=1}^n \overline{A_i}>0
</math>
means that the the <math>k</math>-CNF <math>\bigwedge_{i=1}^n \overline{A_i}</math> is satisfiable.
 
The satisfiability of <math>k</math>-CNF is a hard problem. In particular, 3SAT (the satisfiability of 3-CNF) is the first '''NP-complete''' problem (the Cook-Levin theorem). Given the current suspect on '''NP''' vs '''P''', we do not expect to solve this problem generally.
 
However, the condition of the Lovasz local lemma has an extra assumption on the degree of dependency graph. In our model, this means that each clause shares variables with at most <math>d</math> other clauses. We call a <math>k</math>-CNF with this property a <math>k</math>-CNF with bounded degree <math>d</math>.
 
Therefore, proving the Lovasz local lemma on the restricted forms of events as described above, can be reduced to the following problem:
;Problem
:Find a condition on <math>k</math> and <math>d</math>, such that any <math>k</math>-CNF with bounded degree <math>d</math> is satisfiable.
 
In 2009, Moser comes up with the following procedure solving the problem. He later generalizes the procedure to general forms of events. This not only gives a beautiful constructive proof to the Lovasz local lemma, but also provides an efficient randomized algorithm for finding a satisfiable assignment for a number of events with bounded dependencies.
 
Let <math>\phi</math> be a <math>k</math>-CNF of <math>n</math> clauses with bounded degree <math>d</math>,  defined on variables <math>X_1,\ldots,X_m</math>. The following procedure find a satisfiable assignment for <math>\phi</math>.
 
{{Theorem
|Solve(<math>\phi</math>)|
:Pick a random assignment of <math>X_1,\ldots,X_m</math>.
:While there is an unsatisfied clause <math>C</math> in <math>\phi</math>
:: '''Fix'''(<math>C</math>).
}}
 
The sub-routine '''Fix''' is defined as follows:
{{Theorem
|Fix(<math>C</math>)|
:Replace the variables in <math>v(C)</math> with new random values.
:While there is unsatisfied clause <math>D</math> that <math>v(C)\cap v(D)\neq \emptyset</math>
:: '''Fix'''(<math>D</math>).
}}
 
The procedure looks very simple. It just recursively fixes the unsatisfied clauses by randomly replacing the assignment to the variables.
 
We then prove it works.
 
===Number of top-level callings of Fix ===
In '''Solve'''(<math>\phi</math>), the subroutine '''Fix'''(<math>C</math>) is called. We now upper bound the number of times it is called (not including the recursive calls).
 
Assume '''Fix'''(<math>C</math>) always terminates.
:;Observation
::Every clause that was satisfied before '''Fix'''(<math>C</math>) was called will still remain satisfied and <math>C</math> will also be satisfied after '''Fix'''(<math>C</math>) returns.
 
The observation can be proved by induction on the structure of recursion.  Since there are <math>n</math> clauses, '''Solve'''(<math>\phi</math>) makes at most <math>n</math> calls to '''Fix'''.
 
We then prove that '''Fix'''(<math>C</math>) terminates.
 
=== Termination of Fix ===
The idea of the proof is to '''reconstruct''' a random string.
 
Suppose that during the running of '''Solve'''(<math>\phi</math>), the '''Fix''' subroutine is called for <math>t</math> times (including all the recursive calls).
 
Let <math>s</math> be the sequence of the random bits used by '''Solve'''(<math>\phi</math>). It is easy to see that the length of <math>s</math> is <math>|s|=m+tk</math>, because the initial random assignment of <math>m</math> variables takes <math>m</math> bits, and each time of calling '''Fix''' takes <math>k</math> bits.
 
We then reconstruct <math>s</math> in an alternative way.
 
Recall that '''Solve'''(<math>\phi</math>) calls '''Fix'''(<math>C</math>) at top-level for at most <math>n</math> times. Each calling of '''Fix'''(<math>C</math>) defines a recursion tree, rooted at clause <math>C</math>, and each node corresponds to a clause (not necessarily distinct, since a clause might be fixed for several times). Therefore, the entire running history of '''Solve'''(<math>\phi</math>) can be described by at most <math>n</math> recursion trees.
 
:;Observation 1
::Fix a <math>\phi</math>. The <math>n</math> recursion trees which capture the total running history of '''Solve'''(<math>\phi</math>) can be encoded in <math>n\log n+t(\log d+O(1))</math> bits.
Each root node corresponds to a clause. There are <math>n</math> clauses in <math>\phi</math>. The <math>n</math> root nodes can be represented in <math>n\log n</math> bits.
 
The smart part is how to encode the branches of the tree. Note that '''Fix'''(<math>C</math>) will call '''Fix'''(<math>D</math>) only for the <math>D</math> that shares variables with <math>C</math>. For a k-CNF with bounded degree <math>d</math>, each clause <math>C</math> can share variables with at most <math>d</math> many other clauses. Thus, each branch in the recursion tree can be represented  in <math>\log d</math> bits. There are extra <math>O(1)</math> bits needed to denote whether the recursion ends. So totally  <math>n\log n+t(\log d+O(1))</math> bits are sufficient to encode all <math>n</math> recursion trees.
 
:;Observation 2
::The random sequence <math>s</math> can be encoded in <math>m+n\log n+t(\log d+O(1))</math> bits.
 
With <math>n\log n+t(\log d+O(1))</math> bits, the structure of all the recursion trees can be encoded. With extra <math>m</math> bits, the final assignment of the <math>m</math>
variables is stored.
 
We then observe that with these information, the sequence of the random bits <math>s</math> can be reconstructed from backwards from the final assignment.
 
The key step is that a clause <math>C</math> is only fixed when it is unsatisfied (obvious), and an unsatisfied clause <math>C</math> must have exact one assignment (a clause is OR of literals, thus has exact one unsatisfied assignment). Thus, each node in the recursion tree tells the <math>k</math> random bits in the random sequence <math>s</math> used in the call of the Fix corresponding to the node. Therefore, <math>s</math> can be reconstructed from the final assignment plus at most <math>n</math> recursion trees, which can be encoded in at most <math>m+n\log n+t(\log d+O(1))</math> bits.
 
The following theorem lies in the heart of the '''Kolmogorov complexity'''. The theorem states that random sequence is '''incompressible'''.
{{Theorem
|Theorem (Kolmogorov)|
:For any encoding scheme , with high probability, a random sequence <math>s</math> is encoded in at least <math>|s|</math> bits.
}}
 
Applying the theorem, we have that with high probability,
:<math>m+n\log n+t(\log d+O(1))\ge |s|=m+tk</math>.
Therefore,
:<math>
t(k-O(1)-\log d)\le n\log n.
</math>
In order to bound <math>t</math>, we need
:<math>k-O(1)-\log d>0</math>,
which hold for <math>d< 2^{k-\alpha}</math> for some constant <math>\alpha>0</math>. In fact, in this case, <math>t=O(n\log n)</math>, the running time of the procedure is bounded by a polynomial!
 
=== Back to the local lemma ===
We showed that for <math>d<2^{k-O(1)}</math>, any <math>k</math>-CNF with bounded degree <math>d</math> is satisfiable, and the satisfied assignment can be found within polynomial time with high probability. Now we interprete this in a language of the local lemma.
 
Recall that the symmetric version of the local lemma:
{{Theorem
|Theorem (The local lemma: symmetric case)|
:Let <math>A_1,A_2,\ldots,A_n</math> be a set of events, and assume that the following hold:
:#for all <math>1\le i\le n</math>, <math>\Pr[A_i]\le p</math>;
:#the maximum degree of the dependency graph for the events <math>A_1,A_2,\ldots,A_n</math> is <math>d</math>, and
:::<math>ep(d+1)\le 1</math>.
:Then
::<math>\Pr\left[\bigwedge_{i=1}^n\overline{A_i}\right]>0</math>.
}}
Suppose the underlying probability space is a number of mutually independent uniform random boolean variables, and the evens <math>\overline{A_i}</math> are clauses defined on <math>k</math> variables. Then,
:<math>
p=2^{-k}
</math>
thus, the condition <math>ep(d+1)\le 1</math> means that
:<math>
d<2^{k}/e
</math>
which means the Moser's procedure is asymptotically optimal on the degree of dependency.


= Algorithmic Lovász Local Lemma =
= Lecture Notes =
# [[高级算法 (Fall 2018)/Min-Cut and Max-Cut|Min-Cut and Max-Cut]]
#:  [[高级算法 (Fall 2018)/Probability Basics|Probability basics]]

Revision as of 14:15, 4 September 2018

高级算法
Advanced Algorithms
Instructor
尹一通
郑朝栋
Email yinyt@nju.edu.cn chaodong@nju.edu.cn
office 计算机系 804
Class
Class meetings Wednesday, 8am-10am
仙I-319
Office hours Wednesday, 10am-12pm
计算机系 804(尹一通)、302(郑朝栋)
Textbooks
Motwani and Raghavan.
Randomized Algorithms.
Cambridge Univ Press, 1995.
Vazirani.
Approximation Algorithms.
Springer-Verlag, 2001.
v · d · e

This is the webpage for the Advanced Algorithms class of fall 2018. Students who take this class should check this page periodically for content updates and new announcements.

Announcement

  • (2018/9/5) 新学期第一次上课。

Course info

  • Instructor : 尹一通、郑朝栋
  • email: yinyt@nju.edu.cn, chaodong@nju.edu.cn
  • Class meeting: Wednesday 8am-10am, 仙I-319.
  • Office hour: Wednesday 10am-12pm, 计算机系 804.

Syllabus

先修课程 Prerequisites

  • 必须:离散数学,概率论,线性代数。
  • 推荐:算法设计与分析。

Course materials

成绩 Grades

  • 课程成绩:本课程将会有若干次作业和一次期末考试。最终成绩将由平时作业成绩和期末考试成绩综合得出。
  • 迟交:如果有特殊的理由,无法按时完成作业,请提前联系授课老师,给出正当理由。否则迟交的作业将不被接受。

学术诚信 Academic Integrity

学术诚信是所有从事学术活动的学生和学者最基本的职业道德底线,本课程将不遗余力的维护学术诚信规范,违反这一底线的行为将不会被容忍。

作业完成的原则:署你名字的工作必须由你完成。允许讨论,但作业必须独立完成,并在作业中列出所有参与讨论的人。不允许其他任何形式的合作——尤其是与已经完成作业的同学“讨论”。

本课程将对剽窃行为采取零容忍的态度。在完成作业过程中,对他人工作(出版物、互联网资料、其他人的作业等)直接的文本抄袭和对关键思想、关键元素的抄袭,按照 ACM Policy on Plagiarism的解释,都将视为剽窃。剽窃者成绩将被取消。如果发现互相抄袭行为, 抄袭和被抄袭双方的成绩都将被取消。因此请主动防止自己的作业被他人抄袭。

学术诚信影响学生个人的品行,也关乎整个教育系统的正常运转。为了一点分数而做出学术不端的行为,不仅使自己沦为一个欺骗者,也使他人的诚实努力失去意义。让我们一起努力维护一个诚信的环境。

Assignments

  • TBA

Lecture Notes

  1. Min-Cut and Max-Cut
    Probability basics