SlideShare a Scribd company logo
Approximation Algorithms for Problems
    on Networks and Streams of Data
    Luca Foschini - Ph.D. Defense

    Committee: Subhash Suri (chair), John Gilbert, Teofilo Gonzalez


Friday, September 7, 12
Why Approximation Algorithms?




Friday, September 7, 12
Why Approximation Algorithms?

              Exact algorithms require many resources




Friday, September 7, 12
Why Approximation Algorithms?
                                                               Hardware
              Exact algorithms require many resources




                                                        Apps




                                                               Data



Friday, September 7, 12
Why Approximation Algorithms?
                                                               Hardware
              Exact algorithms require many resources




                                                        Apps



                    Problems solvable
                         exactly                               Data



Friday, September 7, 12
A Long History,
    and Work in Progress




                           © Original Artist




Friday, September 7, 12
A Long History,
    and Work in Progress

      ✤    Early ‘70s - many combinatorial
           problems found to be NP-hard

      ✤    Recently - more restricting
           computation models proposed e.g.,
           data stream

                                               © Original Artist




Friday, September 7, 12
A Long History,
    and Work in Progress

      ✤    Early ‘70s - many combinatorial
           problems found to be NP-hard

      ✤    Recently - more restricting
           computation models proposed e.g.,
           data stream

                                                                            © Original Artist




                          Heuristics not sufficient, provable guarantees needed

Friday, September 7, 12
Content of the Dissertation




Friday, September 7, 12
Content of the Dissertation




       "




Friday, September 7, 12
Content of the Dissertation


                      Networks



       "

                   Data Streams




Friday, September 7, 12
Content of the Dissertation

                                                     STACS12 +
                                  Partitioning
                                                    Algorithmica
                      Networks
                                                  SODA11 +
                                  Shortest Paths
                                                 Algorithmica
       "
                                  Time Series         ICDE10

                   Data Streams

                                  Burst Detection     NSDI11


Friday, September 7, 12
Content of the Dissertation

                                                     STACS12 +      ICISS08
                                  Partitioning
                                                    Algorithmica
                      Networks                                      ICIP11
                                                  SODA11 +
                                  Shortest Paths                   ALENEX10
                                                 Algorithmica
       "
                                                                    ESA11
                                  Time Series         ICDE10

                   Data Streams                                    WOOT11

                                  Burst Detection     NSDI11        WAW09

Friday, September 7, 12
Roadmap

                                                                STACS12 +
                                             Partitioning
                                                               Algorithmica
                              Networks
                                                             SODA11 +
                                             Shortest Paths
                                                            Algorithmica
                          "
                                             Time Series         ICDE10

                              Data Streams

                                             Burst Detection     NSDI11

Friday, September 7, 12
k-Balanced Partitioning Problem
            Given: an unweighted graph G on n
            vertices; an integer k

            Find: a partition of the vertices of G
            into k sets Vi s.t.

                   ✤      |Vi |  dn/ke
                   ✤      Cut size (number of edges
                          connecting vertices in
                          different Vi) is minimized


                                    joint work with Andi Feldmann (ETHz)
                               (appeared in STACS12, submitted to Algorithmica)
Friday, September 7, 12
Motivation & Complexity

    ✤    Divide-and-conquer algorithms

    ✤    VLSI design

    ✤    Parallel computing



    ✤    NP-hard to approximate cut size within any finite value alpha
         [Andreev and Räcke 2006]


Friday, September 7, 12
Related Work




Friday, September 7, 12
General Graphs & Trees

    ✤     Algorithm is !-approximation if
          finds a cut at most ! times optimal

    ✤     NP-hard to approximate cut size
          within any finite ! [Andreev and
          Räcke 2006]




Friday, September 7, 12
General Graphs & Trees

    ✤     Algorithm is !-approximation if
          finds a cut at most ! times optimal

    ✤     NP-hard to approximate cut size
          within any finite ! [Andreev and
          Räcke 2006]


                   Trees - simple instances?



Friday, September 7, 12
General Graphs & Trees

    ✤     Algorithm is !-approximation if
          finds a cut at most ! times optimal

    ✤     NP-hard to approximate cut size      n=31, k=8 cut size = 10
          within any finite ! [Andreev and
          Räcke 2006]


                   Trees - simple instances?


                                               n=31, k=9 cut size = 8
Friday, September 7, 12
Trees Are Hard




Friday, September 7, 12
Trees Are Hard

       ✤     NP-hard to approx. cut size for !=nc
             (for any c<1) even if constant diameter




Friday, September 7, 12
Trees Are Hard

       ✤     NP-hard to approx. cut size for !=nc
             (for any c<1) even if constant diameter

       ✤     APX-hard to approx. cut-size even if
             constant degree




Friday, September 7, 12
Trees Are Hard

       ✤     NP-hard to approx. cut size for !=nc
             (for any c<1) even if constant diameter

       ✤     APX-hard to approx. cut-size even if
             constant degree




                          Most NP-hard problems become trivial on trees


Friday, September 7, 12
Relax!




Friday, September 7, 12
Relax!

         Balance constraint relaxed:
              |Vi |  (1 + ")dn/ke




Friday, September 7, 12
Relax!

         Balance constraint relaxed:
              |Vi |  (1 + ")dn/ke


                                       Balance relaxed
        Perfect balance
        Optimal cut size
                                                           Cut size
                                                         approximated
                                          !



Friday, September 7, 12
Relax!

         Balance constraint relaxed:          Bicriteria Approximation: cut
                                              size approximation ! measured
              |Vi |  (1 + ")dn/ke
                                              w.r.t perfectly balanced optimum


                                       Balance relaxed
        Perfect balance
        Optimal cut size
                                                                 Cut size
                                                               approximated
                                          !



Friday, September 7, 12
0<eps<1 on general graphs



    ✤    eps>1 -- alpha in .... spreading metric techniques

    ✤    0<eps < 1 not much improvement. 1/epsˆ2 log ^1.5 n

    ✤    What about trees?




Friday, September 7, 12
Summary of PTAS for Trees


    ✤    Compute optimal cut size for each coarse signature using DP

    ✤    Pack each coarse signatures into bins of size (1 + ")dn/ke

    ✤    Pick solution with smallest cut size among those fitting into k bins
                                     4       1+3d 1 log( 1 )e
    ✤    Total time complexity O(n (k/")          "      "      )




Friday, September 7, 12
Summary of PTAS for Trees


    ✤    Compute optimal cut size for each coarse signature using DP

    ✤    Pack each coarse signatures into bins of size (1 + ")dn/ke

    ✤    Pick solution with smallest cut size among those fitting into k bins
                                     4       1+3d 1 log( 1 )e
    ✤    Total time complexity O(n (k/")          "      "      )


                                    Show that ! =1

Friday, September 7, 12
Extension to General Graphs


    ✤    Decomposition of graph into collection of trees [Räcke, Madry], cut
         size worsen by at most O(log n) for at least 1 tree

    ✤    Apply PTAS for trees to each instance

    ✤    Return partition for tree with minimum cut

    ✤    alpha = O(log n) improves




Friday, September 7, 12
Tree Decomposition




Friday, September 7, 12
Analysis of Embedding




Friday, September 7, 12
Extensions & Open Problems
       ✤     Tree embedding techniques allow the !=1 tree PTAS to translate to a
             !=O(log n) approx for general weighted graphs

       ✤     Improves on previous best != O(log 1.5 n/"2 )




Friday, September 7, 12
Extensions & Open Problems
       ✤     Tree embedding techniques allow the !=1 tree PTAS to translate to a
             !=O(log n) approx for general weighted graphs

       ✤     Improves on previous best != O(log 1.5 n/"2 )


                                                      



                                      




                                                                     
                          Graphs                             Trees
Friday, September 7, 12
Roadmap

                                                                STACS12 +
                                             Partitioning
                                                               Algorithmica
                              Networks
                                                             SODA11 +
                                             Shortest Paths
                                                            Algorithmica
                          "
                                             Time Series         ICDE10

                              Data Streams

                                             Burst Detection     NSDI11

Friday, September 7, 12
Approximating Time Series



    ✤    Represent a time series with B
         linear segments

    ✤    New value arrives to the time
         series, need to reallocate
         segments




Friday, September 7, 12
Approximating Time Series



    ✤    Represent a time series with B
         linear segments

    ✤    New value arrives to the time
         series, need to reallocate
         segments




Friday, September 7, 12
Approximating Time Series



    ✤    Represent a time series with B
         linear segments

    ✤    New value arrives to the time
         series, need to reallocate
         segments




Friday, September 7, 12
Old Algorithms, New Proofs




Friday, September 7, 12
Old Algorithms, New Proofs

     ✤    We prove that a popular greedy merge
          scheme gives constant (bicriteria)
          approx. for many L_p norms. (ICDE10;
          joint with Gandhi, Suri)




Friday, September 7, 12
Old Algorithms, New Proofs

     ✤    We prove that a popular greedy merge
          scheme gives constant (bicriteria)
          approx. for many L_p norms. (ICDE10;
          joint with Gandhi, Suri)

     ✤    Results implemented in Linux Kernel
          and used to detect traffic bursts in
          networks (NSDI11, joint with Uyeda,
          Suri, Varghese, Baker)




Friday, September 7, 12
Old Algorithms, New Proofs

     ✤    We prove that a popular greedy merge
          scheme gives constant (bicriteria)
          approx. for many L_p norms. (ICDE10;
          joint with Gandhi, Suri)

     ✤    Results implemented in Linux Kernel
          and used to detect traffic bursts in
          networks (NSDI11, joint with Uyeda,
          Suri, Varghese, Baker)


                          Next steps: Extend results in ICDE10 to other norms
Friday, September 7, 12
Conclusion


    ✤    Approximation is necessary to reduce resource utilization

    ✤    Presented approximation algorithms for problems from different
         domains that we cannot afford to solve exactly

    ✤    Presented basic building blocks that can be used across the board to
         design approximation algorithms




Friday, September 7, 12

More Related Content

Viewers also liked

Production log v1
Production log v1Production log v1
Production log v1halo4robo
 
Actividad deaprendizaje 08
Actividad deaprendizaje   08Actividad deaprendizaje   08
Actividad deaprendizaje 08
Kevin Salinas
 
Unit 73 ig1 assignment computer game audio cut sequence production 2013_y2
Unit 73 ig1 assignment computer game audio cut sequence production 2013_y2Unit 73 ig1 assignment computer game audio cut sequence production 2013_y2
Unit 73 ig1 assignment computer game audio cut sequence production 2013_y2halo4robo
 
Production log
Production logProduction log
Production loghalo4robo
 
2012.9.新興數位教學點數位教案培訓
2012.9.新興數位教學點數位教案培訓2012.9.新興數位教學點數位教案培訓
2012.9.新興數位教學點數位教案培訓Heng Sin
 
Resipi baozi
Resipi baoziResipi baozi
Resipi baozivoon sj
 
Schedules complete
Schedules completeSchedules complete
Schedules completehalo4robo
 
Sound programme process
Sound programme processSound programme process
Sound programme processhalo4robo
 
Familo prezentacja
Familo prezentacjaFamilo prezentacja
Familo prezentacja
piotrek1990
 
Dislexia
DislexiaDislexia
Dislexia
Kevin Salinas
 
Business presentation
Business presentationBusiness presentation
Grande bouquet
Grande bouquetGrande bouquet
Grande bouquet
Isupova Maria
 

Viewers also liked (17)

Production log v1
Production log v1Production log v1
Production log v1
 
Actividad deaprendizaje 08
Actividad deaprendizaje   08Actividad deaprendizaje   08
Actividad deaprendizaje 08
 
Unit 73 ig1 assignment computer game audio cut sequence production 2013_y2
Unit 73 ig1 assignment computer game audio cut sequence production 2013_y2Unit 73 ig1 assignment computer game audio cut sequence production 2013_y2
Unit 73 ig1 assignment computer game audio cut sequence production 2013_y2
 
Production log
Production logProduction log
Production log
 
2012.9.新興數位教學點數位教案培訓
2012.9.新興數位教學點數位教案培訓2012.9.新興數位教學點數位教案培訓
2012.9.新興數位教學點數位教案培訓
 
TED slideshow
TED slideshowTED slideshow
TED slideshow
 
Resipi baozi
Resipi baoziResipi baozi
Resipi baozi
 
Schedules complete
Schedules completeSchedules complete
Schedules complete
 
11
1111
11
 
Banke
BankeBanke
Banke
 
Survey
SurveySurvey
Survey
 
Sound programme process
Sound programme processSound programme process
Sound programme process
 
Familo prezentacja
Familo prezentacjaFamilo prezentacja
Familo prezentacja
 
Elemnts of comm pro
Elemnts of comm proElemnts of comm pro
Elemnts of comm pro
 
Dislexia
DislexiaDislexia
Dislexia
 
Business presentation
Business presentationBusiness presentation
Business presentation
 
Grande bouquet
Grande bouquetGrande bouquet
Grande bouquet
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 

Aaabbbbccccc

  • 1. Approximation Algorithms for Problems on Networks and Streams of Data Luca Foschini - Ph.D. Defense Committee: Subhash Suri (chair), John Gilbert, Teofilo Gonzalez Friday, September 7, 12
  • 3. Why Approximation Algorithms? Exact algorithms require many resources Friday, September 7, 12
  • 4. Why Approximation Algorithms? Hardware Exact algorithms require many resources Apps Data Friday, September 7, 12
  • 5. Why Approximation Algorithms? Hardware Exact algorithms require many resources Apps Problems solvable exactly Data Friday, September 7, 12
  • 6. A Long History, and Work in Progress © Original Artist Friday, September 7, 12
  • 7. A Long History, and Work in Progress ✤ Early ‘70s - many combinatorial problems found to be NP-hard ✤ Recently - more restricting computation models proposed e.g., data stream © Original Artist Friday, September 7, 12
  • 8. A Long History, and Work in Progress ✤ Early ‘70s - many combinatorial problems found to be NP-hard ✤ Recently - more restricting computation models proposed e.g., data stream © Original Artist Heuristics not sufficient, provable guarantees needed Friday, September 7, 12
  • 9. Content of the Dissertation Friday, September 7, 12
  • 10. Content of the Dissertation " Friday, September 7, 12
  • 11. Content of the Dissertation Networks " Data Streams Friday, September 7, 12
  • 12. Content of the Dissertation STACS12 + Partitioning Algorithmica Networks SODA11 + Shortest Paths Algorithmica " Time Series ICDE10 Data Streams Burst Detection NSDI11 Friday, September 7, 12
  • 13. Content of the Dissertation STACS12 + ICISS08 Partitioning Algorithmica Networks ICIP11 SODA11 + Shortest Paths ALENEX10 Algorithmica " ESA11 Time Series ICDE10 Data Streams WOOT11 Burst Detection NSDI11 WAW09 Friday, September 7, 12
  • 14. Roadmap STACS12 + Partitioning Algorithmica Networks SODA11 + Shortest Paths Algorithmica " Time Series ICDE10 Data Streams Burst Detection NSDI11 Friday, September 7, 12
  • 15. k-Balanced Partitioning Problem Given: an unweighted graph G on n vertices; an integer k Find: a partition of the vertices of G into k sets Vi s.t. ✤ |Vi |  dn/ke ✤ Cut size (number of edges connecting vertices in different Vi) is minimized joint work with Andi Feldmann (ETHz) (appeared in STACS12, submitted to Algorithmica) Friday, September 7, 12
  • 16. Motivation & Complexity ✤ Divide-and-conquer algorithms ✤ VLSI design ✤ Parallel computing ✤ NP-hard to approximate cut size within any finite value alpha [Andreev and Räcke 2006] Friday, September 7, 12
  • 18. General Graphs & Trees ✤ Algorithm is !-approximation if finds a cut at most ! times optimal ✤ NP-hard to approximate cut size within any finite ! [Andreev and Räcke 2006] Friday, September 7, 12
  • 19. General Graphs & Trees ✤ Algorithm is !-approximation if finds a cut at most ! times optimal ✤ NP-hard to approximate cut size within any finite ! [Andreev and Räcke 2006] Trees - simple instances? Friday, September 7, 12
  • 20. General Graphs & Trees ✤ Algorithm is !-approximation if finds a cut at most ! times optimal ✤ NP-hard to approximate cut size n=31, k=8 cut size = 10 within any finite ! [Andreev and Räcke 2006] Trees - simple instances? n=31, k=9 cut size = 8 Friday, September 7, 12
  • 21. Trees Are Hard Friday, September 7, 12
  • 22. Trees Are Hard ✤ NP-hard to approx. cut size for !=nc (for any c<1) even if constant diameter Friday, September 7, 12
  • 23. Trees Are Hard ✤ NP-hard to approx. cut size for !=nc (for any c<1) even if constant diameter ✤ APX-hard to approx. cut-size even if constant degree Friday, September 7, 12
  • 24. Trees Are Hard ✤ NP-hard to approx. cut size for !=nc (for any c<1) even if constant diameter ✤ APX-hard to approx. cut-size even if constant degree Most NP-hard problems become trivial on trees Friday, September 7, 12
  • 26. Relax! Balance constraint relaxed: |Vi |  (1 + ")dn/ke Friday, September 7, 12
  • 27. Relax! Balance constraint relaxed: |Vi |  (1 + ")dn/ke Balance relaxed Perfect balance Optimal cut size Cut size approximated ! Friday, September 7, 12
  • 28. Relax! Balance constraint relaxed: Bicriteria Approximation: cut size approximation ! measured |Vi |  (1 + ")dn/ke w.r.t perfectly balanced optimum Balance relaxed Perfect balance Optimal cut size Cut size approximated ! Friday, September 7, 12
  • 29. 0<eps<1 on general graphs ✤ eps>1 -- alpha in .... spreading metric techniques ✤ 0<eps < 1 not much improvement. 1/epsˆ2 log ^1.5 n ✤ What about trees? Friday, September 7, 12
  • 30. Summary of PTAS for Trees ✤ Compute optimal cut size for each coarse signature using DP ✤ Pack each coarse signatures into bins of size (1 + ")dn/ke ✤ Pick solution with smallest cut size among those fitting into k bins 4 1+3d 1 log( 1 )e ✤ Total time complexity O(n (k/") " " ) Friday, September 7, 12
  • 31. Summary of PTAS for Trees ✤ Compute optimal cut size for each coarse signature using DP ✤ Pack each coarse signatures into bins of size (1 + ")dn/ke ✤ Pick solution with smallest cut size among those fitting into k bins 4 1+3d 1 log( 1 )e ✤ Total time complexity O(n (k/") " " ) Show that ! =1 Friday, September 7, 12
  • 32. Extension to General Graphs ✤ Decomposition of graph into collection of trees [Räcke, Madry], cut size worsen by at most O(log n) for at least 1 tree ✤ Apply PTAS for trees to each instance ✤ Return partition for tree with minimum cut ✤ alpha = O(log n) improves Friday, September 7, 12
  • 34. Analysis of Embedding Friday, September 7, 12
  • 35. Extensions & Open Problems ✤ Tree embedding techniques allow the !=1 tree PTAS to translate to a !=O(log n) approx for general weighted graphs ✤ Improves on previous best != O(log 1.5 n/"2 ) Friday, September 7, 12
  • 36. Extensions & Open Problems ✤ Tree embedding techniques allow the !=1 tree PTAS to translate to a !=O(log n) approx for general weighted graphs ✤ Improves on previous best != O(log 1.5 n/"2 )    Graphs Trees Friday, September 7, 12
  • 37. Roadmap STACS12 + Partitioning Algorithmica Networks SODA11 + Shortest Paths Algorithmica " Time Series ICDE10 Data Streams Burst Detection NSDI11 Friday, September 7, 12
  • 38. Approximating Time Series ✤ Represent a time series with B linear segments ✤ New value arrives to the time series, need to reallocate segments Friday, September 7, 12
  • 39. Approximating Time Series ✤ Represent a time series with B linear segments ✤ New value arrives to the time series, need to reallocate segments Friday, September 7, 12
  • 40. Approximating Time Series ✤ Represent a time series with B linear segments ✤ New value arrives to the time series, need to reallocate segments Friday, September 7, 12
  • 41. Old Algorithms, New Proofs Friday, September 7, 12
  • 42. Old Algorithms, New Proofs ✤ We prove that a popular greedy merge scheme gives constant (bicriteria) approx. for many L_p norms. (ICDE10; joint with Gandhi, Suri) Friday, September 7, 12
  • 43. Old Algorithms, New Proofs ✤ We prove that a popular greedy merge scheme gives constant (bicriteria) approx. for many L_p norms. (ICDE10; joint with Gandhi, Suri) ✤ Results implemented in Linux Kernel and used to detect traffic bursts in networks (NSDI11, joint with Uyeda, Suri, Varghese, Baker) Friday, September 7, 12
  • 44. Old Algorithms, New Proofs ✤ We prove that a popular greedy merge scheme gives constant (bicriteria) approx. for many L_p norms. (ICDE10; joint with Gandhi, Suri) ✤ Results implemented in Linux Kernel and used to detect traffic bursts in networks (NSDI11, joint with Uyeda, Suri, Varghese, Baker) Next steps: Extend results in ICDE10 to other norms Friday, September 7, 12
  • 45. Conclusion ✤ Approximation is necessary to reduce resource utilization ✤ Presented approximation algorithms for problems from different domains that we cannot afford to solve exactly ✤ Presented basic building blocks that can be used across the board to design approximation algorithms Friday, September 7, 12