Survey of some new convergence analysis techniques for sum and max belief propagation on loopy graphs

Similar documents
Chapter Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.

Lecture 1: Course overview, circuits, and formulas

Full and Complete Binary Trees

Discuss the size of the instance for the minimum spanning tree problem.

The Goldberg Rao Algorithm for the Maximum Flow Problem

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.

Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams

Why? A central concept in Computer Science. Algorithms are ubiquitous.

8.1 Min Degree Spanning Tree

6.852: Distributed Algorithms Fall, Class 2

A Network Flow Approach in Cloud Computing

Adaptive Linear Programming Decoding

Approximation Algorithms

A Branch and Bound Algorithm for Solving the Binary Bi-level Linear Programming Problem

PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION

In-Network Coding for Resilient Sensor Data Storage and Efficient Data Mule Collection

Algorithm Design and Analysis

Analyzing Mission Critical Voice over IP Networks. Michael Todd Gardner

Guessing Game: NP-Complete?

Influences in low-degree polynomials

A simpler and better derandomization of an approximation algorithm for Single Source Rent-or-Buy

SIMS 255 Foundations of Software Design. Complexity and NP-completeness

Approximating Average Distortion of Embeddings into Line

Factoring & Primality

Finding the M Most Probable Configurations Using Loopy Belief Propagation

Data Structures and Algorithms Written Examination

On the effect of forwarding table size on SDN network utilization

Near Optimal Solutions

Graph Theory Origin and Seven Bridges of Königsberg -Rhishikesh

Mechanisms for Fair Attribution

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs

Max Flow. Lecture 4. Optimization on graphs. C25 Optimization Hilary 2013 A. Zisserman. Max-flow & min-cut. The augmented path algorithm

Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs

CS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010

Course: Model, Learning, and Inference: Lecture 5

Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths

Broadcasting in Wireless Networks

Data Structures Fibonacci Heaps, Amortized Analysis

Applied Algorithm Design Lecture 5

SIGMOD RWE Review Towards Proximity Pattern Mining in Large Graphs

The positive minimum degree game on sparse graphs

P versus NP, and More

Approximating the Partition Function by Deleting and then Correcting for Model Edges

Chapter 13: Binary and Mixed-Integer Programming

Math 120 Final Exam Practice Problems, Form: A

NP-complete? NP-hard? Some Foundations of Complexity. Prof. Sven Hartmann Clausthal University of Technology Department of Informatics

Lecture 13 - Basic Number Theory.

Online Adwords Allocation

MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research

Discrete Optimization

International Journal of Advanced Research in Computer Science and Software Engineering

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar

Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs

Smart Graphics: Methoden 3 Suche, Constraints

Lecture 3. Linear Programming. 3B1B Optimization Michaelmas 2015 A. Zisserman. Extreme solutions. Simplex method. Interior point method

THE SCHEDULING OF MAINTENANCE SERVICE

Binary Search Trees. Data in each node. Larger than the data in its left child Smaller than the data in its right child

MAP-Inference for Highly-Connected Graphs with DC-Programming

Introduction to Logic in Computer Science: Autumn 2006

Dynamic Programming and Graph Algorithms in Computer Vision

Max Flow, Min Cut, and Matchings (Solution)

Decentralized Utility-based Sensor Network Design

Algorithmic Aspects of Big Data. Nikhil Bansal (TU Eindhoven)

How Asymmetry Helps Load Balancing

CoNP and Function Problems

The Basics of Graphical Models

Integrating Benders decomposition within Constraint Programming

A Sublinear Bipartiteness Tester for Bounded Degree Graphs

Current Standard: Mathematical Concepts and Applications Shape, Space, and Measurement- Primary

WRITING PROOFS. Christopher Heil Georgia Institute of Technology

SOLUTIONS FOR PROBLEM SET 2

11. APPROXIMATION ALGORITHMS

Load Balancing. Load Balancing 1 / 24

How To Solve A K Path In Time (K)

Compact Representations and Approximations for Compuation in Games

ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015

Active Graph Reachability Reduction for Network Security and Software Engineering

GLM, insurance pricing & big data: paying attention to convergence issues.

Generating models of a matched formula with a polynomial delay

Practical Graph Mining with R. 5. Link Analysis

IMPROVING PERFORMANCE OF RANDOMIZED SIGNATURE SORT USING HASHING AND BITWISE OPERATORS

Integer Programming: Algorithms - 3

Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li

Cost Model: Work, Span and Parallelism. 1 The RAM model for sequential computation:

An Approximation Algorithm for Bounded Degree Deletion

IC05 Introduction on Networks &Visualization Nov

The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge,

Euler Paths and Euler Circuits

3. The Junction Tree Algorithms

Message-passing sequential detection of multiple change points in networks

In Search of Influential Event Organizers in Online Social Networks

Offline sorting buffers on Line

Equilibrium computation: Part 1

Satisfiability Checking

Data Structure [Question Bank]

Multi-objective Traffic Engineering for Data Center Networks

9th Max-Planck Advanced Course on the Foundations of Computer Science (ADFOCS) Primal-Dual Algorithms for Online Optimization: Lecture 1

TU e. Advanced Algorithms: experimentation project. The problem: load balancing with bounded look-ahead. Input: integer m 2: number of machines

Lecture 5 - CPA security, Pseudorandom functions

Transcription:

Survey of some new convergence analysis techniques for sum and max belief propagation on loopy graphs Alekh Agarwal December 13, 2007

Basic setup Pairwise MRFs on binary variables Sum-product and max-product inference algorithms Associated computation tree possibly infinite Can we truncate this tree? Figure: Sample graph and computation tree at first four time steps

Exact inference and Self-Avoiding Walks ([Weitz, 2006]) Self-avoiding walk tree - a truncated computation tree. Figure: Self-Avoiding Walk tree for a toy graph A node occuring for a second time on a path behaves as a 0 or 1. Values fixed consistently with some scheme. Potentially exponential in size. Gives exact marginal and max-marginal at root.

Truncating the SAW tree Can approximate sum marginal arbitrarily well under certain conditions. Key idea - correlation decay or spatial mixing. Influence of a node on others should decay fast with distances in the graph. Can truncate the tree at a polynomial number of nodes (i.e. O(log n depth)) when decay is exponential. Post-truncation, just doing a computation tree. SAW tree an analytical tool. Also extended to multi-spin and non-pairwise systems.

Message passing and contractions ([Roosta, 2007], [Mooij and Kappen, 2007]) Message passing iteratively solving fixed point system. Define ν = log µ(1) µ(0) log likelihood ratio. Message passing is a mapping ν = F (ν). Can use Banach s fixed point theorem when F is a contraction. Figure: Illustration of convergence to fixed point for a contraction First analysis: guarantee F (z) < 1 z. Tighter analysis: guarantee F (z) < 1 in range of F.

Analysis of max-product Above analyses don t carry over to max-product! Max-product inherently more unstable. Figure: Illustration of what makes Max-product unstable Looking at the probability of a joint configuration, not that of a single node. No phenomenon of mixing happening on computation tree. Can try extending sum-product analysis via simulated annealing based approaches. Hard to prove convergence here.

Analysis of max-product Can write max-product as an integer LP. max φ(x) x {0,1} n θ, max θ, µ µ Marg(G) TRW is an LP relaxation [Kolmogorov and Wainwright, 2005]. max θ, µ µ Local(G) Better than a lot of SOCP relaxations. Clearly tight for tree structured constraints. Tight for submodular potentials via reduction to network flows [Boros and Hammer, 2002]. Can we say something on average for near submodular potentials?

Near-submodularity and network flows Figure: Flow networks for a submodular and a non-submodular problem Suppose all 1 s is the MAP assignment. TRW finds max flow in networks shown above. The flow network has no cross-edges in the submodular problem, hence all 1 s is trivially optimal min-cut too. Cross-edges in a non-submodular problem make analysis harder.

Some sufficient conditions and future work Can obtain simple sufficient conditions like θ s x,y θ xy sum over cross-edges. Captures the effect of local fields. Better analysis gives θ s + } u N + (s) {θ min θ su, θ su u P t θut x,y θ xy sum over cross-edges. Allows you to borrow from rich neighbors! Future work to obtain sharper sufficient conditions. Do an average-case analysis for these conditions on random graphs. Acknowledgement: Would like to thank Prof. Martin Wainwright for his constant advice during this work.

Weitz, D. (2006). Counting independent sets up to the tree threshold. In STOC 06: Proceedings of the thirty-eighth annual ACM symposium on Theory of computing, pages 140 149, New York, NY, References Boros, E. and Hammer, P. L. (2002). Pseudo-boolean optimization. Discrete Applied Mathematics, 123(1-3):155 225. Kolmogorov, V. and Wainwright, M. (2005). On the optimality of tree-reweighted max-product message-passing. In Proceedings of the 21th Annual Conference on UAI 2005. Mooij, J. M. and Kappen, H. J. (2007). Sufficient conditions for convergence of the sum-product algorithm. arxiv preprint. Roosta, T.; Wainwright, M. S. S. (15-20 April 2007). Convergence analysis of reweighted sum-product algorithms. ICASSP, 2:II 541 II 544.