Heuristic (Informed) Search (Where we try to choose smartly)
|
|
|
- Jack Holt
- 9 years ago
- Views:
Transcription
1 Heuristic (Informed) Search (Where we try to choose smartly) R&: Chap., Sect.. Recall that the ordering of FRIGE defines the search strategy Search Algorithm # SEARCH#. ISERT(initial-node,FRIGE). Repeat: a. If empty(frige) then return failure b. REMOVE(FRIGE) c. s STATE() d. If GOAL?(s) then return path or goal state e. For every state s in SUCCESSORS(s) i. Create a node as a successor of ii. ISERT(,FRIGE) Best-First Search It exploits state description to estimate how good each search node is An evaluation function f maps each node of the search tree to a real number f() 0 [Traditionally, f() is an estimated cost; so, the smaller f(), the more promising ] Best-first search sorts the FRIGE in increasing f [Arbitrary order is assumed among nodes with equal f] Best-First Search It exploits state description to estimate how good each search node is An evaluation function f maps each node of the search tree to a real number Best does not refer to the quality f() 0 of the generated path [Traditionally, f() is an estimated cost; so, the smaller f(), the more promising Best-first ] search does not generate optimal paths in general Best-first search sorts the FRIGE in increasing f [Arbitrary order is assumed among nodes with equal f] How to construct f? Typically, f() estimates: either the cost of a solution path through Then, where g() is the cost of the path from the initial node to h() is an estimate of the cost of a path from to a goal node or the cost of a path from to a goal node Then f() = h() Greedy best-search But there are no limitations on f. Any function of your choice is acceptable. But will it help the search algorithm? How to construct f? Typically, f() estimates: either the cost of a solution path through Then, where g() is the cost of the path from the initial node to h() is an estimate of the cost of a path from to a goal node or the cost of a path from to a goal node Then f() = h() Heuristic function But there are no limitations on f. Any function of your choice is acceptable. But will it help the search algorithm?
2 Heuristic Function The heuristic function h() 0 estimates the cost to go from STATE() to a goal state Its value is independent of the current search tree; it depends only on STATE() and the goal test GOAL? Example: STATE() h () = number of misplaced numbered tiles = [Why is it an estimate of the distance to the goal?] Goal state Other Examples STATE() Goal state h () = number of misplaced numbered tiles = h () = sum of the (Manhattan) distance of every numbered tile to its goal position = = h () = sum of permutation inversions = n + n + n + n + n + n + n + n = = -Puzzle f() = h() = number of misplaced numbered tiles -Puzzle with h() = number of misplaced numbered tiles The white tile is the empty tile 9 0 -Puzzle f() = h() = Σ distances of numbered tiles to their goals Robot avigation y 0 y g h () = (x -x ) +(y -y ) (L or Euclidean distance) g g h () = x -x g + y -y g x x g (L or Manhattan distance)
3 Best-First Efficiency Local-minimum problem Can we prove anything? If the state space is infinite, in general the search is not complete If the state space is finite and we do not discard nodes that revisit states, in general the search is not complete If the state space is finite and we discard nodes that revisit states, the search is complete, but in general is not optimal f() = h() = straight distance to the goal Admissible Heuristic Admissible Heuristic Let h*() be the cost of the optimal path from to a goal node The heuristic function h() is admissible if: 0 h() h*() An admissible heuristic function is always optimistic! Let h*() be the cost of the optimal path from to a goal node The heuristic function h() is admissible if: 0 h() h*() An admissible heuristic function is always optimistic! G is a goal node h(g) = 0 -Puzzle Heuristics -Puzzle Heuristics STATE() Goal state STATE() Goal state h () = number of misplaced tiles = is??? h () = sum of the (Manhattan) distances of every tile to its goal position = = is admissible h () = sum of permutation inversions = = is not admissible h () = number of misplaced tiles = is admissible h () = sum of the (Manhattan) distances of every tile to its goal position = = is??? h () = sum of permutation inversions = = is not admissible
4 -Puzzle Heuristics -Puzzle Heuristics STATE() Goal state STATE() Goal state h () = number of misplaced tiles = is admissible h () = sum of the (Manhattan) distances of every tile to its goal position = = is admissible h () = sum of permutation inversions = = is??? 9 h () = number of misplaced tiles = is admissible h () = sum of the (Manhattan) distances of every tile to its goal position = = is admissible h () = sum of permutation inversions = = is not admissible 0 Robot avigation Heuristics Robot avigation Heuristics Cost of one horizontal/vertical step = Cost of one diagonal step = Cost of one horizontal/vertical step = Cost of one diagonal step = h () = (x -x ) +(y -y ) is admissible g g h () = x -x g + y -y g is??? Robot avigation Heuristics How to create an admissible h? Cost of one horizontal/vertical step = Cost of one diagonal step = h () = x -x g + y -y g h*(i) = h (I) = is admissible if moving along diagonals is not allowed, and not admissible otherwise An admissible heuristic can usually be seen as the cost of an optimal solution to a relaxed problem (one obtained by removing constraints) In robot navigation: The Manhattan distance corresponds to removing the obstacles The Euclidean distance corresponds to removing both the obstacles and the constraint that the robot moves on a grid More on this topic later
5 A* Search (most popular algorithm in AI) ), where: g() = cost of best path found so far to h() = admissible heuristic function ) for all arcs: c(, ) ε > 0 Result # A* is complete and optimal [This result holds if nodes revisiting states are not discarded] ) SEARCH# algorithm is used Best-first search is then called A* search Proof (/) ) If a solution exists, A* terminates and returns a solution Proof (/) ) If a solution exists, A* terminates and returns a solution - For each node on the fringe, f() = g()+h() g() d() ε, where d() is the depth of in the tree K - For each node on the fringe, f() = g()+h() g() d() ε, where d() is the depth of in the tree - As long as A* hasn t terminated, a node K on the fringe lies on a solution path Proof (/) ) If a solution exists, A* terminates and returns a solution K - For each node on the fringe, f() = g()+h() g() d() ε, where d() is the depth of in the tree - As long as A* hasn t terminated, a node K on the fringe lies on a solution path - Since each node expansion increases the length of one path, K will eventually be selected for expansion, unless a solution is found along another path 9 Proof (/) ) Whenever A* chooses to expand a goal node, the path to this node is optimal - C*= cost of the optimal solution path - G : non-optimal goal node in the fringe f(g ) = g(g ) + h(g ) = g(g ) > C* G K - A node K in the fringe lies on an optimal path: f(k) = g(k) + h(k) C* - So, G will not be selected for expansion 0
6 Time Limit Issue When a problem has no solution, A* runs for ever if the state space is infinite. In other cases, it may take a huge amount of time to terminate So, in practice, A* is given a time limit. If it has not found a solution within this limit, it stops. Then there is no way to know if the problem has no solution, or if more time was needed to find it When AI systems are small and solving a single search problem at a time, this is not too much of a concern. When AI systems become larger, they solve many search problems concurrently, some with no solution. What should be the time limit for each of them? More on this in the lecture on Motion Planning Puzzle Robot avigation Robot avigation f() = h(), with h() = Manhattan distance to the goal (not A*) 0 Robot avigation Robot avigation f() = h(), with h() = Manhattan distance to the goal (not A*) 0 f() = g()+h(), with h() = Manhattan distance to goal (A*)
7 Best-First Search An evaluation function f maps each node of the search tree to a real number f() 0 Best-first search sorts the FRIGE in increasing f A* Search ), where: g() = cost of best path found so far to h() = admissible heuristic function ) for all arcs: c(, ) ε > 0 ) SEARCH# algorithm is used Best-first search is then called A* search Result # What to do with revisited states? A* is complete and optimal [This result holds if nodes revisiting states are not discarded] c = h = 00 The heuristic h is clearly admissible What to do with revisited states? What to do with revisited states? c = h = 00 f = ? If we discard this new node, then the search algorithm expands the goal node next and returns a non-optimal solution Instead, if we do not discard nodes revisiting states, the search terminates with an optimal solution
8 But... If we do not discard nodes revisiting states, the size of the search tree can be exponential in the number of visited states But... If we do not discard nodes revisiting states, the size of the search tree can be exponential in the number of visited states n+ states O( n ) nodes It is not harmful to discard a node revisiting a state if the cost of the new path to this state is cost of the previous path [so, in particular, one can discard a node if it re-visits a state already visited by one of its ancestors] A* remains optimal, but states can still be re- visited multiple times [the size of the search tree can still be exponential in the number of visited states] Fortunately, for a large family of admissible heuristics consistent heuristics there is a much more efficient way to handle revisited states Consistent Heuristic An admissible heuristic h is consistent (or monotone) if for each node and each child of : c(, ) h() c(, ) + h( ) h() h( ) (triangle inequality) Intuition: a consistent heuristics becomes more precise as we get deeper in the search tree Consistency Violation If h tells that is 00 units from the goal, then moving from along an arc costing 0 units should not lead to a node that h estimates to be 0 units away from the goal c(, ) =0 h() =00 h( ) =0 (triangle inequality) Consistent Heuristic (alternative definition) A heuristic h is consistent (or monotone) if ) for each node and each child of : h() c(, ) + h( ) c(, ) ) for each goal node G: h() h(g) = 0 h( ) A consistent heuristic (triangle inequality) is also admissible
9 Admissibility and Consistency A consistent heuristic is also admissible An admissible heuristic may not be consistent, nt but many admissible heuristics s are consistent c(, ) h() h( ) h() c(, ) + h( ) -Puzzle STATE() goal h () = number of misplaced tiles h () = sum of the (Manhattan) distances of every tile to its goal position are both consistent (why?) 9 0 c(, ) h() h( ) Robot avigation Result # If h is consistent, then whenever A* expands a node, it has already found an optimal path to this node s state h() c(, ) + h( ) Cost of one horizontal/vertical step = Cost of one diagonal step = h () = (x -x ) +(y -y ) h () = x -x g + y -y g g g is consistent is consistent if moving along diagonals is not allowed, and not consistent otherwise Proof (/) ) Consider a node and its child Since h is consistent: h() c(, )+h( ) f() = g()+h() g()+c(, )+h( ) = f( ) So, f is non-decreasing along any path Proof (/) ) If a node K is selected for expansion, then any other node in the fringe verifies f() f(k) K S If one node lies on another path to the state of K, the cost of this other path is no smaller than that of the path to K: f( ) f() f(k) and h( ) = h(k) So, g( ) g(k) 9
10 Proof (/) Result # If h is consistent, then whenever A* expands a ) If node, a node it K has is already selected found for expansion, optimal then path any to this other node node s in state the fringe verifies f() f(k) K S If one node lies on another path to the state of K, the cost of this other path is no smaller than that of the path to K: f( ) f() f(k) and h( ) = h(k) So, g( ) g(k) The path to is the optimal path to S Implication of Result # S S can be discarded Revisited States with Consistent Heuristic When a node is expanded, store its state into CLOSED When a new node is generated: If STATE() is in CLOSED, discard If there exists a node in the fringe such that STATE( ) = STATE(), discard the node or with the largest f (or, equivalently, g) Is A* with some consistent heuristic all that we need? o! There are very dumb consistent heuristic functions For example: h 0 It is consistent (hence, admissible)! A* with h 0 is uniform-cost search Breadth-first t and uniform-cost are particular cases of A* Heuristic Accuracy Let h and h be two consistent heuristics such that for all nodes : h () h () h is said to be more accurate (or more informed) than h STATE() Goal state h () = number of misplaced tiles h () = sum of distances of every tile to its goal position 9 h is more accurate than h 0 0
11 Result # Let h be more accurate than h Let A * be A* using h and A * be A* using h Whenever a solution exists, all the nodes expanded by A *, except possibly for some nodes such that f () = f () = C* (cost of optimal solution) are also expanded by A * Proof C* = h*(initial-node) [cost of optimal solution] Every node such that f() < C* is eventually expanded. o node such that f() > C* is ever expanded Every node such that h() < C* g() is eventually expanded. So, every node such that h () < C* g() is expanded by A *. Since h () h (), is also expanded by A * If there are several nodes such that f () = f () = C* (such nodes include the optimal goal nodes, if there exists a solution), A * and A * may or may not expand them in the same order (until one goal node is expanded) Effective Branching Factor It is used as a measure the effectiveness of a heuristic Let n be the total number of nodes expanded by A* for a particular problem and d the depth of the solution The effective branching factor b* is defined by n = + b* + (b*) (b*) d Experimental Results (see R& for details) -puzzle with: h = number of misplaced tiles h = sum of distances of tiles to their goal positions Random generation of many problem instances Average effective branching factors (number of expanded d nodes): d IDS A * A * (,,0). (). () (9,). (,) How to create good heuristics? By solving relaxed problems at each node In the -puzzle, the sum of the distances of each tile to its goal position (h ) corresponds to solving simple problems: d i is the length of the shortest path to move tile i to its goal position, ignoring the other tiles, e.g., d = h = Σ i=,... d i Can we do better? For example, we could consider two more complex relaxed problems: d = length of the shortest path to move tiles,,, and to their goal positions, ignoring the other tiles h = d + d [disjoint pattern heuristic] d It ignores negative interactions among tiles
12 Can we do better? For example, we could consider two more complex relaxed problems: Can we do better? For example, we could consider two more complex relaxed problems: d = length of the shortest path to move tiles,,, and to their goal positions, ignoring the other tiles d d = length of the shortest path to move tiles,,, and to their goal positions, ignoring the other tiles d h = d + d [disjoint pattern heuristic] How to compute d and d? h = d + d [disjoint pattern heuristic] These distances are pre-computed and stored [Each requires generating a tree of,0 nodes/states (breadth-first search)] Can we do better? For example, we could consider two more complex relaxed problems: d = length of the shortest path to move tiles,,, and to their goal positions, ignoring the other tiles Several order-of-magnitude speedups d for the - and -puzzle (see R&) h = d + d [disjoint pattern heuristic] These distances are pre-computed and stored [Each requires generating a tree of,0 nodes/states (breadth-first search)] On Completeness and Optimality A* with a consistent heuristic function has nice properties: completeness, optimality, no need to revisit states Theoretical completeness does not mean practical completeness if you must wait too long to get a solution (remember the time limit issue) So, if one can t design an accurate consistent heuristic, it may be better to settle for a non-admissible heuristic that works well in practice, even through completeness and optimality are no longer guaranteed 0 Iterative Deepening A* (IDA*) Idea: Reduce memory requirement of A* by applying cutoff on values of f Consistent heuristic function h Algorithm IDA*:. Initialize cutoff to f(initial-node). Repeat: a. Perform depth-first search by expanding all nodes such that f() cutoff b. Reset cutoff to smallest value f of nonexpanded (leaf) nodes -Puzzle Cutoff=
13 -Puzzle -Puzzle Cutoff= Cutoff= -Puzzle -Puzzle Cutoff= Cutoff= -Puzzle -Puzzle Cutoff= Cutoff=
14 -Puzzle -Puzzle Cutoff= Cutoff= 9 0 -Puzzle -Puzzle Cutoff= Cutoff= -Puzzle Cutoff= Advantages/Drawbacks of IDA* Advantages: Still complete and optimal Requires less memory than A* Avoid the overhead to sort the fringe Drawbacks: Can t avoid revisiting states not on the current path Available memory is poorly used ( memory-bounded search, see R& p. 0-0)
15 Local Search Light-memory search method o search tree; only the current state is represented! Only applicable to problems where the path is irrelevant (e.g., -queen), unless the path is encoded in the state Many similarities with optimization techniques Steepest Descent ) S initial state ) Repeat: a) S arg min S SUCCESSORS(S) {h(s )} b) if GOAL?(S ) return S c) if h(s ) < h(s) then S S else return failure Similar to: - hill climbing with h - gradient descent over continuous space Application: -Queen Repeat n times: ) Pick an initial state S at random with one queen in each column ) Repeat k times: a) If GOAL?(S) then return S b) Pick an attacked queen Q at random c) Move Q in its column to minimize the number of attacking queens new S [min-conflicts heuristic] ) Return failure 0 Application: -Queen Why does it work??? Repeat n times: ) ) Pick There an initial are state many S at random goal states with one that queen in are each column ) Repeat k times: well-distributed over the state space a) If GOAL?(S) then return S ) If no solution has been found after a few b) Pick an attacked queen Q at random c) steps, Move Qit s in its better column to minimize start it the all number over of again. attacking queens is minimum new S Building a search tree would be much less efficient because of the high branching factor ) Running time almost independent 0 of the number of queens Steepest Descent ) S initial state ) Repeat: a) S arg min S SUCCESSORS(S) {h(s )} b) if GOAL?(S ) return S c) if h(s ) < h(s) then S S else return failure may easily get stuck in local minima Random restart (as in n-queen example) Monte Carlo descent 9 Monte Carlo Descent ) S initial state ) Repeat k times: a) If GOAL?(S) then return S b) S successor of S picked at random c) if h(s ) h(s) then S S d) else - Δh = h(s )-h(s) - with probability ~ exp( Δh/T), where T is called the temperature, do: S S [Metropolis criterion] ) Return failure Simulated annealing lowers T over the k iterations. It starts with a large T and slowly decreases T 90
16 Parallel Local Search Techniques They perform several local searches concurrently, but not independently: Beam search Genetic algorithms Search problems Blind search Heuristic search: best-first and A* See R&, pages -9 Construction of heuristics Variants of A* Local search 9 9 When to Use Search Techniques? ) The search space is small, and o other technique is available, or Developing a more efficient technique is not worth the effort ) The search space is large, and o other available technique is available, and There exist good heuristics 9
AI: A Modern Approach, Chpts. 3-4 Russell and Norvig
AI: A Modern Approach, Chpts. 3-4 Russell and Norvig Sequential Decision Making in Robotics CS 599 Geoffrey Hollinger and Gaurav Sukhatme (Some slide content from Stuart Russell and HweeTou Ng) Spring,
Informed search algorithms. Chapter 4, Sections 1 2 1
Informed search algorithms Chapter 4, Sections 1 2 Chapter 4, Sections 1 2 1 Outline Best-first search A search Heuristics Chapter 4, Sections 1 2 2 Review: Tree search function Tree-Search( problem, fringe)
Smart Graphics: Methoden 3 Suche, Constraints
Smart Graphics: Methoden 3 Suche, Constraints Vorlesung Smart Graphics LMU München Medieninformatik Butz/Boring Smart Graphics SS2007 Methoden: Suche 2 Folie 1 Themen heute Suchverfahren Hillclimbing Simulated
Measuring the Performance of an Agent
25 Measuring the Performance of an Agent The rational agent that we are aiming at should be successful in the task it is performing To assess the success we need to have a performance measure What is rational
Approximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
CS91.543 MidTerm Exam 4/1/2004 Name: KEY. Page Max Score 1 18 2 11 3 30 4 15 5 45 6 20 Total 139
CS91.543 MidTerm Exam 4/1/2004 Name: KEY Page Max Score 1 18 2 11 3 30 4 15 5 45 6 20 Total 139 % INTRODUCTION, AI HISTORY AND AGENTS 1. [4 pts. ea.] Briefly describe the following important AI programs.
Cost Model: Work, Span and Parallelism. 1 The RAM model for sequential computation:
CSE341T 08/31/2015 Lecture 3 Cost Model: Work, Span and Parallelism In this lecture, we will look at how one analyze a parallel program written using Cilk Plus. When we analyze the cost of an algorithm
2. Length and distance in hyperbolic geometry
2. Length and distance in hyperbolic geometry 2.1 The upper half-plane There are several different ways of constructing hyperbolic geometry. These different constructions are called models. In this lecture
Search methods motivation 1
Suppose you are an independent software developer, and your software package Windows Defeater R, widely available on sourceforge under a GNU GPL license, is getting an international attention and acclaim.
An Introduction to The A* Algorithm
An Introduction to The A* Algorithm Introduction The A* (A-Star) algorithm depicts one of the most popular AI methods used to identify the shortest path between 2 locations in a mapped area. The A* algorithm
Applied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
The Graphical Method: An Example
The Graphical Method: An Example Consider the following linear program: Maximize 4x 1 +3x 2 Subject to: 2x 1 +3x 2 6 (1) 3x 1 +2x 2 3 (2) 2x 2 5 (3) 2x 1 +x 2 4 (4) x 1, x 2 0, where, for ease of reference,
CMPSCI611: Approximating MAX-CUT Lecture 20
CMPSCI611: Approximating MAX-CUT Lecture 20 For the next two lectures we ll be seeing examples of approximation algorithms for interesting NP-hard problems. Today we consider MAX-CUT, which we proved to
Graph Theory Problems and Solutions
raph Theory Problems and Solutions Tom Davis [email protected] http://www.geometer.org/mathcircles November, 005 Problems. Prove that the sum of the degrees of the vertices of any finite graph is
SIMS 255 Foundations of Software Design. Complexity and NP-completeness
SIMS 255 Foundations of Software Design Complexity and NP-completeness Matt Welsh November 29, 2001 [email protected] 1 Outline Complexity of algorithms Space and time complexity ``Big O'' notation Complexity
(Refer Slide Time: 2:03)
Control Engineering Prof. Madan Gopal Department of Electrical Engineering Indian Institute of Technology, Delhi Lecture - 11 Models of Industrial Control Devices and Systems (Contd.) Last time we were
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms
1 The Brownian bridge construction
The Brownian bridge construction The Brownian bridge construction is a way to build a Brownian motion path by successively adding finer scale detail. This construction leads to a relatively easy proof
6.3 Conditional Probability and Independence
222 CHAPTER 6. PROBABILITY 6.3 Conditional Probability and Independence Conditional Probability Two cubical dice each have a triangle painted on one side, a circle painted on two sides and a square painted
Data Mining Practical Machine Learning Tools and Techniques
Ensemble learning Data Mining Practical Machine Learning Tools and Techniques Slides for Chapter 8 of Data Mining by I. H. Witten, E. Frank and M. A. Hall Combining multiple models Bagging The basic idea
ECON 459 Game Theory. Lecture Notes Auctions. Luca Anderlini Spring 2015
ECON 459 Game Theory Lecture Notes Auctions Luca Anderlini Spring 2015 These notes have been used before. If you can still spot any errors or have any suggestions for improvement, please let me know. 1
Offline sorting buffers on Line
Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: [email protected] 2 IBM India Research Lab, New Delhi. email: [email protected]
CPSC 211 Data Structures & Implementations (c) Texas A&M University [ 313]
CPSC 211 Data Structures & Implementations (c) Texas A&M University [ 313] File Structures A file is a collection of data stored on mass storage (e.g., disk or tape) Why on mass storage? too big to fit
Binary Search Trees. A Generic Tree. Binary Trees. Nodes in a binary search tree ( B-S-T) are of the form. P parent. Key. Satellite data L R
Binary Search Trees A Generic Tree Nodes in a binary search tree ( B-S-T) are of the form P parent Key A Satellite data L R B C D E F G H I J The B-S-T has a root node which is the only node whose parent
Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh
Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem
Problem solving and search
Problem solving and search hapter 3 hapter 3 1 eminders ssignment 0 due 5pm today ssignment 1 posted, due 2/9 ection 105 will move to 9-10am starting next week hapter 3 2 Outline Problem-solving agents
Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows
TECHNISCHE UNIVERSITEIT EINDHOVEN Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows Lloyd A. Fasting May 2014 Supervisors: dr. M. Firat dr.ir. M.A.A. Boon J. van Twist MSc. Contents
Outline. NP-completeness. When is a problem easy? When is a problem hard? Today. Euler Circuits
Outline NP-completeness Examples of Easy vs. Hard problems Euler circuit vs. Hamiltonian circuit Shortest Path vs. Longest Path 2-pairs sum vs. general Subset Sum Reducing one problem to another Clique
Testing LTL Formula Translation into Büchi Automata
Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland
From Last Time: Remove (Delete) Operation
CSE 32 Lecture : More on Search Trees Today s Topics: Lazy Operations Run Time Analysis of Binary Search Tree Operations Balanced Search Trees AVL Trees and Rotations Covered in Chapter of the text From
Load Balancing. Load Balancing 1 / 24
Load Balancing Backtracking, branch & bound and alpha-beta pruning: how to assign work to idle processes without much communication? Additionally for alpha-beta pruning: implementing the young-brothers-wait
DEVELOPMENT OF A VULNERABILITY ASSESSMENT CODE FOR A PHYSICAL PROTECTION SYSTEM: SYSTEMATIC ANALYSIS OF PHYSICAL PROTECTION EFFECTIVENESS (SAPE)
DEVELOPMENT OF A VULNERABILITY ASSESSMENT CODE FOR A PHYSICAL PROTECTION SYSTEM: SYSTEMATIC ANALYSIS OF PHYSICAL PROTECTION EFFECTIVENESS (SAPE) SUNG SOON JANG *, SUNG-WOO KWAK, HOSIK YOO, JUNG-SOO KIM
Mathematical Induction
Mathematical Induction In logic, we often want to prove that every member of an infinite set has some feature. E.g., we would like to show: N 1 : is a number 1 : has the feature Φ ( x)(n 1 x! 1 x) How
Lecture 3: Finding integer solutions to systems of linear equations
Lecture 3: Finding integer solutions to systems of linear equations Algorithmic Number Theory (Fall 2014) Rutgers University Swastik Kopparty Scribe: Abhishek Bhrushundi 1 Overview The goal of this lecture
The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge,
The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge, cheapest first, we had to determine whether its two endpoints
Clock Arithmetic and Modular Systems Clock Arithmetic The introduction to Chapter 4 described a mathematical system
CHAPTER Number Theory FIGURE FIGURE FIGURE Plus hours Plus hours Plus hours + = + = + = FIGURE. Clock Arithmetic and Modular Systems Clock Arithmetic The introduction to Chapter described a mathematical
Special Situations in the Simplex Algorithm
Special Situations in the Simplex Algorithm Degeneracy Consider the linear program: Maximize 2x 1 +x 2 Subject to: 4x 1 +3x 2 12 (1) 4x 1 +x 2 8 (2) 4x 1 +2x 2 8 (3) x 1, x 2 0. We will first apply the
Y. Xiang, Constraint Satisfaction Problems
Constraint Satisfaction Problems Objectives Constraint satisfaction problems Backtracking Iterative improvement Constraint propagation Reference Russell & Norvig: Chapter 5. 1 Constraints Constraints are
Information Retrieval and Web Search Engines
Information Retrieval and Web Search Engines Lecture 7: Document Clustering December 10 th, 2013 Wolf-Tilo Balke and Kinda El Maarry Institut für Informationssysteme Technische Universität Braunschweig
Introduction to Scheduling Theory
Introduction to Scheduling Theory Arnaud Legrand Laboratoire Informatique et Distribution IMAG CNRS, France [email protected] November 8, 2004 1/ 26 Outline 1 Task graphs from outer space 2 Scheduling
Enumerating possible Sudoku grids
Enumerating possible Sudoku grids Bertram Felgenhauer Department of Computer Science TU Dresden 00 Dresden Germany [email protected] Frazer Jarvis Department of Pure Mathematics University of Sheffield,
Programming Using Python
Introduction to Computation and Programming Using Python Revised and Expanded Edition John V. Guttag The MIT Press Cambridge, Massachusetts London, England CONTENTS PREFACE xiii ACKNOWLEDGMENTS xv 1 GETTING
Decision Trees from large Databases: SLIQ
Decision Trees from large Databases: SLIQ C4.5 often iterates over the training set How often? If the training set does not fit into main memory, swapping makes C4.5 unpractical! SLIQ: Sort the values
Lecture. Simulation and optimization
Course Simulation Lecture Simulation and optimization 1 4/3/2015 Simulation and optimization Platform busses at Schiphol Optimization: Find a feasible assignment of bus trips to bus shifts (driver and
Network (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 [email protected],
7 Gaussian Elimination and LU Factorization
7 Gaussian Elimination and LU Factorization In this final section on matrix factorization methods for solving Ax = b we want to take a closer look at Gaussian elimination (probably the best known method
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.
Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three
Analysis of Algorithms, I
Analysis of Algorithms, I CSOR W4231.002 Eleni Drinea Computer Science Department Columbia University Thursday, February 26, 2015 Outline 1 Recap 2 Representing graphs 3 Breadth-first search (BFS) 4 Applications
CS104: Data Structures and Object-Oriented Design (Fall 2013) October 24, 2013: Priority Queues Scribes: CS 104 Teaching Team
CS104: Data Structures and Object-Oriented Design (Fall 2013) October 24, 2013: Priority Queues Scribes: CS 104 Teaching Team Lecture Summary In this lecture, we learned about the ADT Priority Queue. A
Lecture 4 Online and streaming algorithms for clustering
CSE 291: Geometric algorithms Spring 2013 Lecture 4 Online and streaming algorithms for clustering 4.1 On-line k-clustering To the extent that clustering takes place in the brain, it happens in an on-line
1 Solving LPs: The Simplex Algorithm of George Dantzig
Solving LPs: The Simplex Algorithm of George Dantzig. Simplex Pivoting: Dictionary Format We illustrate a general solution procedure, called the simplex algorithm, by implementing it on a very simple example.
3 Some Integer Functions
3 Some Integer Functions A Pair of Fundamental Integer Functions The integer function that is the heart of this section is the modulo function. However, before getting to it, let us look at some very simple
The Taxman Game. Robert K. Moniot September 5, 2003
The Taxman Game Robert K. Moniot September 5, 2003 1 Introduction Want to know how to beat the taxman? Legally, that is? Read on, and we will explore this cute little mathematical game. The taxman game
17.3.1 Follow the Perturbed Leader
CS787: Advanced Algorithms Topic: Online Learning Presenters: David He, Chris Hopman 17.3.1 Follow the Perturbed Leader 17.3.1.1 Prediction Problem Recall the prediction problem that we discussed in class.
Self Organizing Maps: Fundamentals
Self Organizing Maps: Fundamentals Introduction to Neural Networks : Lecture 16 John A. Bullinaria, 2004 1. What is a Self Organizing Map? 2. Topographic Maps 3. Setting up a Self Organizing Map 4. Kohonen
Linear Programming. March 14, 2014
Linear Programming March 1, 01 Parts of this introduction to linear programming were adapted from Chapter 9 of Introduction to Algorithms, Second Edition, by Cormen, Leiserson, Rivest and Stein [1]. 1
1 if 1 x 0 1 if 0 x 1
Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or
6.080 / 6.089 Great Ideas in Theoretical Computer Science Spring 2008
MIT OpenCourseWare http://ocw.mit.edu 6.080 / 6.089 Great Ideas in Theoretical Computer Science Spring 2008 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.
Big Data - Lecture 1 Optimization reminders
Big Data - Lecture 1 Optimization reminders S. Gadat Toulouse, Octobre 2014 Big Data - Lecture 1 Optimization reminders S. Gadat Toulouse, Octobre 2014 Schedule Introduction Major issues Examples Mathematics
Analysis of Micromouse Maze Solving Algorithms
1 Analysis of Micromouse Maze Solving Algorithms David M. Willardson ECE 557: Learning from Data, Spring 2001 Abstract This project involves a simulation of a mouse that is to find its way through a maze.
Problem Set 7 Solutions
8 8 Introduction to Algorithms May 7, 2004 Massachusetts Institute of Technology 6.046J/18.410J Professors Erik Demaine and Shafi Goldwasser Handout 25 Problem Set 7 Solutions This problem set is due in
LEARNING OBJECTIVES FOR THIS CHAPTER
CHAPTER 2 American mathematician Paul Halmos (1916 2006), who in 1942 published the first modern linear algebra book. The title of Halmos s book was the same as the title of this chapter. Finite-Dimensional
Scenario: Optimization of Conference Schedule.
MINI PROJECT 1 Scenario: Optimization of Conference Schedule. A conference has n papers accepted. Our job is to organize them in a best possible schedule. The schedule has p parallel sessions at a given
Introduction Solvability Rules Computer Solution Implementation. Connect Four. March 9, 2010. Connect Four
March 9, 2010 is a tic-tac-toe like game in which two players drop discs into a 7x6 board. The first player to get four in a row (either vertically, horizontally, or diagonally) wins. The game was first
Dynamic Programming. Lecture 11. 11.1 Overview. 11.2 Introduction
Lecture 11 Dynamic Programming 11.1 Overview Dynamic Programming is a powerful technique that allows one to solve many different types of problems in time O(n 2 ) or O(n 3 ) for which a naive approach
Three Effective Top-Down Clustering Algorithms for Location Database Systems
Three Effective Top-Down Clustering Algorithms for Location Database Systems Kwang-Jo Lee and Sung-Bong Yang Department of Computer Science, Yonsei University, Seoul, Republic of Korea {kjlee5435, yang}@cs.yonsei.ac.kr
Notes from Week 1: Algorithms for sequential prediction
CS 683 Learning, Games, and Electronic Markets Spring 2007 Notes from Week 1: Algorithms for sequential prediction Instructor: Robert Kleinberg 22-26 Jan 2007 1 Introduction In this course we will be looking
Kenken For Teachers. Tom Davis [email protected] http://www.geometer.org/mathcircles June 27, 2010. Abstract
Kenken For Teachers Tom Davis [email protected] http://www.geometer.org/mathcircles June 7, 00 Abstract Kenken is a puzzle whose solution requires a combination of logic and simple arithmetic skills.
Metric Spaces. Chapter 1
Chapter 1 Metric Spaces Many of the arguments you have seen in several variable calculus are almost identical to the corresponding arguments in one variable calculus, especially arguments concerning convergence
Cpt S 223. School of EECS, WSU
The Shortest Path Problem 1 Shortest-Path Algorithms Find the shortest path from point A to point B Shortest in time, distance, cost, Numerous applications Map navigation Flight itineraries Circuit wiring
Complete Solution of the Eight-Puzzle and the Benefit of Node Ordering in IDA*
Complete Solution of the Eight-Puzzle and the Benefit of Node Ordering in IDA* Alexander Reinefeld Paderborn Center for Parallel Computing Waxburger Str. 100, D-33095 Paderborn, Germany Abstract The 8-puzzle
M. Sugumaran / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (3), 2011, 1001-1006
A Design of Centralized Meeting Scheduler with Distance Metrics M. Sugumaran Department of Computer Science and Engineering,Pondicherry Engineering College, Puducherry, India. Abstract Meeting scheduling
Lecture 5 - CPA security, Pseudorandom functions
Lecture 5 - CPA security, Pseudorandom functions Boaz Barak October 2, 2007 Reading Pages 82 93 and 221 225 of KL (sections 3.5, 3.6.1, 3.6.2 and 6.5). See also Goldreich (Vol I) for proof of PRF construction.
APP INVENTOR. Test Review
APP INVENTOR Test Review Main Concepts App Inventor Lists Creating Random Numbers Variables Searching and Sorting Data Linear Search Binary Search Selection Sort Quick Sort Abstraction Modulus Division
Chapter 13: Binary and Mixed-Integer Programming
Chapter 3: Binary and Mixed-Integer Programming The general branch and bound approach described in the previous chapter can be customized for special situations. This chapter addresses two special situations:
Practical Guide to the Simplex Method of Linear Programming
Practical Guide to the Simplex Method of Linear Programming Marcel Oliver Revised: April, 0 The basic steps of the simplex algorithm Step : Write the linear programming problem in standard form Linear
Concurrency Control. Chapter 17. Comp 521 Files and Databases Fall 2010 1
Concurrency Control Chapter 17 Comp 521 Files and Databases Fall 2010 1 Conflict Serializable Schedules Recall conflicts (WR, RW, WW) were the cause of sequential inconsistency Two schedules are conflict
Data Structures Fibonacci Heaps, Amortized Analysis
Chapter 4 Data Structures Fibonacci Heaps, Amortized Analysis Algorithm Theory WS 2012/13 Fabian Kuhn Fibonacci Heaps Lacy merge variant of binomial heaps: Do not merge trees as long as possible Structure:
Roulette Wheel Selection Game Player
Macalester College DigitalCommons@Macalester College Honors Projects Mathematics, Statistics, and Computer Science 5-1-2013 Roulette Wheel Selection Game Player Scott Tong Macalester College, [email protected]
Robot Navigation. Johannes Maurer, Institute for Software Technology TEDUSAR Summerschool 2014. u www.tugraz.at
1 Robot Navigation u www.tugraz.at 2 Motivation challenges physical laws e.g. inertia, acceleration uncertainty e.g. maps, observations geometric constraints e.g. shape of a robot dynamic environment e.g.
! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.
Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of
Classification - Examples
Lecture 2 Scheduling 1 Classification - Examples 1 r j C max given: n jobs with processing times p 1,...,p n and release dates r 1,...,r n jobs have to be scheduled without preemption on one machine taking
Dynamic programming formulation
1.24 Lecture 14 Dynamic programming: Job scheduling Dynamic programming formulation To formulate a problem as a dynamic program: Sort by a criterion that will allow infeasible combinations to be eli minated
A hierarchical multicriteria routing model with traffic splitting for MPLS networks
A hierarchical multicriteria routing model with traffic splitting for MPLS networks João Clímaco, José Craveirinha, Marta Pascoal jclimaco@inesccpt, jcrav@deecucpt, marta@matucpt University of Coimbra
Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar
Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples
Introduction to Markov Chain Monte Carlo
Introduction to Markov Chain Monte Carlo Monte Carlo: sample from a distribution to estimate the distribution to compute max, mean Markov Chain Monte Carlo: sampling using local information Generic problem
Methods for Solving Sudoku Puzzles
Methods for Solving Sudoku Puzzles CSCI - 5454, CU Boulder Anshul Kanakia [email protected] John Klingner [email protected] 1 Introduction 1.1 A Brief History This number puzzle is relatively
Part 2: Community Detection
Chapter 8: Graph Data Part 2: Community Detection Based on Leskovec, Rajaraman, Ullman 2014: Mining of Massive Datasets Big Data Management and Analytics Outline Community Detection - Social networks -
Outline BST Operations Worst case Average case Balancing AVL Red-black B-trees. Binary Search Trees. Lecturer: Georgy Gimel farb
Binary Search Trees Lecturer: Georgy Gimel farb COMPSCI 220 Algorithms and Data Structures 1 / 27 1 Properties of Binary Search Trees 2 Basic BST operations The worst-case time complexity of BST operations
The vehicle routing problem with time windows is a hard combinatorial optimization problem that has
TRANSPORTATION SCIENCE Vol. 38, No. 4, November 2004, pp. 515 530 issn 0041-1655 eissn 1526-5447 04 3804 0515 informs doi 10.1287/trsc.1030.0049 2004 INFORMS A Two-Stage Hybrid Local Search for the Vehicle
B490 Mining the Big Data. 2 Clustering
B490 Mining the Big Data 2 Clustering Qin Zhang 1-1 Motivations Group together similar documents/webpages/images/people/proteins/products One of the most important problems in machine learning, pattern
