Sum-Product: Message Passing Belief Propagation

Size: px
Start display at page:

Download "Sum-Product: Message Passing Belief Propagation"

Transcription

1 Sum-Product: Message Passing Belief Propagation Advanced Topics in AI: Probabilistic Graphical Models Sharif University of Technology Soleymani Spring 2015

2 All single-node marginals If we need the full set of marginals, repeating Elimination algorithm for each individual variable is wasteful It does not share intermediate terms Message-passing algorithms on graphs (messages are the shared intermediate terms). sum-product and junction tree Upon convergence of the algorithms, we obtain marginal probabilities for all cliques of the original graph. 2

3 Tree Sum-product work only in trees (and we will see it also work on tree-like graphs) Undirected tree A unique path between any pair of nodes Directed tree All nodes have one parent expect to the root 3

4 Parameterization Consider a tree T(V, E) Potential functions: φ x i, φ(x i, x j ) P x = 1 Z i V φ x i i,j E φ x i, x j In directed graphs: P x = P(x r ) P x j x i i,j E φ x r = P(x r ), i r, φ x i = 1 φ x i, x j = P(x j x i ) (x i is the parent of x j ) Z = 1 When we have evidence on variable x i as x i = φ x i by φ x i δ x i, x i x i we replace 4

5 Sum-product: elimination view Query node r Elimination order: inverse of the topological order Starts from leaves and generates elimination cliques of size at most two Elimination of each node can be considered as messagepassing (or Belief Propagation): Elimination on trees is equivalent to message passing along tree branches Instead of the node elimination, we preserve the node and compute a message from it to its parent This message is equivalent to the factor resulted from the elimination of that node and all of the nodes in its subtree 5

6 Messages root Message that j sends to i 6

7 Messages and marginal distribution Message that X j sends to X i m ji x i = x j φ x j φ x i, x j k N(j)\i m kj (x j ) a function of only x i p x r φ x r k N(r) m kr (x r ) 7

8 Messages and marginal: Example m 12 x 2 = x 1 φ x 1 φ x 1, x 2 p x 2 φ x 2 m 12 (x 2 )m 32 (x 2 )m 42 (x 2 ) 8

9 Computing all node marginals We can compute over all possible elimination ordering by computing all possible messages (2 E ) To allow all nodes can be the root, we just need to compute 2 E messages Messages can be reused Instead of running the Elimination algorithm N times Dynamic programming approach 2-Pass algorithm that saves and uses messages A pair of messages (one for each direction) have been computed for each edge 9

10 A two-pass message-passing schedule Arbitrarily pick a node as the root First pass: starting at the leaves and proceeds inward each node passes a message to its parent. continues until the root has obtained messages from all of its adjoining nodes. Second pass: starting at the root and passing the messages back out messages are passed in the reverse direction. continues until all leaves have received their messages. 10

11 Asynchronous two-pass message-passing 11 First pass: upward Second pass: downward

12 Sum-product algorithm: example m 21 (x 1 ) m 21 (x 1 ) 12

13 Sum-product algorithm: example m 21 (x 1 ) 13

14 Parallel message-passing Message-passing protocol: a node can send a message to a neighboring node when and only when it has received messages from all of its other neighbors Correctness of parallel message-passing on trees The synchronous implementation is non-blocking Theorem: The message-passing guarantees obtaining all marginals in the tree 14

15 Parallel message passing: Example 15

16 Tree-like graphs Sum-product message passing idea can also be extended to work in tree-like graphs (e.g., polytrees) too. Although the undirected marginalized graph resulted from it is not tree, the corresponding factor graph is a tree 16 Polytree Nodes can have multiple parents Moralized graph Factor graph

17 Recall: Factor graph φ x 1, x 2, x 3 = f a (x 1, x 2 )f b (x 1, x 3 )f c (x 2, x 3 ) φ x 1, x 2, x 3 = f x 1, x 2, x 3 17

18 Sum-product on factor trees Factor tree: a factor graph with no loop Two types of messages: Message that flows from variable node i to factor node s: v is x i = t N(i)\s μ ti (x i ) Message that flows from factor node s to variable node i: μ si x i = x N(s)\i f s x N(s) j N(s)\i v js (x j ) 18

19 Sum-product on factor trees Message-passing protocol: a node can send a message to a neighboring node when and only when it has received messages from all of its other neighbors When the messages from all the neighbors of a node is received, the marginal probability will be: P x i s N i μ si x i P x i v is (x i )μ si (x i ) s N i 19

20 The relation between sum-product on factor graphs and sum-product on undirected trees Relation of m messages of sum-product algorithm for undirected graphs and μ messages of sum-product algorithm for factor graphs μ si x i = x N(s)\i f s x N(s) j N(s)\i v js (x j ) = x j φ(x i, x j )v js (x j ) = φ(x i, x j ) μ tj (x j ) x j t N(j)\s = φ(x i )φ(x i, x j ) μ tj (x j ) x j t N (j)\s 20

21 Example 21

22 References M.I. Jordan, An Introduction to Probabilistic Graphical Models, Chapter 4. 22

Sum-Product: Message Passing Belief Propagation

Sum-Product: Message Passing Belief Propagation Sum-Product: Message Passing Belief Propagation Probabilistic Graphical Models Sharif University of Technology Spring 2017 Soleymani All single-node marginals If we need the full set of marginals, repeating

More information

Factor Graphs. Seungjin Choi

Factor Graphs. Seungjin Choi Factor Graphs Seungjin Choi Department of Computer Science and Engineering Pohang University of Science and Technology 77 Cheongam-ro, Nam-gu, Pohang 37673, Korea seungjin@postech.ac.kr 1 / 17 Tanner Graphs

More information

Inference in Bayesian Networks

Inference in Bayesian Networks Andrea Passerini passerini@disi.unitn.it Machine Learning Inference in graphical models Description Assume we have evidence e on the state of a subset of variables E in the model (i.e. Bayesian Network)

More information

Exact Inference. Factor Graphs through Max-Sum Algorithm Figures from Bishop PRML Sec. 8.3/8.4. x 3. f s. x 2. x 1

Exact Inference. Factor Graphs through Max-Sum Algorithm Figures from Bishop PRML Sec. 8.3/8.4. x 3. f s. x 2. x 1 Exact Inference x 1 x 3 x 2 f s Geoffrey Roeder roeder@cs.toronto.edu 8 February 2018 Factor Graphs through Max-Sum Algorithm Figures from Bishop PRML Sec. 8.3/8.4 Building Blocks UGMs, Cliques, Factor

More information

CMPSCI 311: Introduction to Algorithms Second Midterm Practice Exam SOLUTIONS

CMPSCI 311: Introduction to Algorithms Second Midterm Practice Exam SOLUTIONS CMPSCI 311: Introduction to Algorithms Second Midterm Practice Exam SOLUTIONS November 17, 2016. Name: ID: Instructions: Answer the questions directly on the exam pages. Show all your work for each question.

More information

Gibbs Fields: Inference and Relation to Bayes Networks

Gibbs Fields: Inference and Relation to Bayes Networks Statistical Techniques in Robotics (16-831, F10) Lecture#08 (Thursday September 16) Gibbs Fields: Inference and Relation to ayes Networks Lecturer: rew agnell Scribe:ebadeepta ey 1 1 Inference on Gibbs

More information

COMP90051 Statistical Machine Learning

COMP90051 Statistical Machine Learning COMP90051 Statistical Machine Learning Semester 2, 2017 Lecturer: Trevor Cohn 22. PGM Probabilistic Inference Probabilistic inference on PGMs Computing marginal and conditional distributions from the joint

More information

Machine Learning. Graphical Models. Marc Toussaint University of Stuttgart Summer 2015

Machine Learning. Graphical Models. Marc Toussaint University of Stuttgart Summer 2015 Machine Learning Graphical Models Marc Toussaint University of Stuttgart Summer 2015 Outline A. Introduction Motivation and definition of Bayes Nets Conditional independence in Bayes Nets Examples B. Inference

More information

UGM Crash Course: Conditional Inference and Cutset Conditioning

UGM Crash Course: Conditional Inference and Cutset Conditioning UGM Crash Course: Conditional Inference and Cutset Conditioning Julie Nutini August 19 th, 2015 1 / 25 Conditional UGM 2 / 25 We know the value of one or more random variables i.e., we have observations,

More information

Outline. Objective. Previous Results Our Results Discussion Current Research. 1 Motivation. 2 Model. 3 Results

Outline. Objective. Previous Results Our Results Discussion Current Research. 1 Motivation. 2 Model. 3 Results On Threshold Esteban 1 Adam 2 Ravi 3 David 4 Sergei 1 1 Stanford University 2 Harvard University 3 Yahoo! Research 4 Carleton College The 8th ACM Conference on Electronic Commerce EC 07 Outline 1 2 3 Some

More information

Lecture 17: More on Markov Decision Processes. Reinforcement learning

Lecture 17: More on Markov Decision Processes. Reinforcement learning Lecture 17: More on Markov Decision Processes. Reinforcement learning Learning a model: maximum likelihood Learning a value function directly Monte Carlo Temporal-difference (TD) learning COMP-424, Lecture

More information

CSE 100: TREAPS AND RANDOMIZED SEARCH TREES

CSE 100: TREAPS AND RANDOMIZED SEARCH TREES CSE 100: TREAPS AND RANDOMIZED SEARCH TREES Midterm Review Practice Midterm covered during Sunday discussion Today Run time analysis of building the Huffman tree AVL rotations and treaps Huffman s algorithm

More information

Bioinformatics - Lecture 7

Bioinformatics - Lecture 7 Bioinformatics - Lecture 7 Louis Wehenkel Department of Electrical Engineering and Computer Science University of Liège Montefiore - Liège - November 20, 2007 Find slides: http://montefiore.ulg.ac.be/

More information

Principles of Program Analysis: Algorithms

Principles of Program Analysis: Algorithms Principles of Program Analysis: Algorithms Transparencies based on Chapter 6 of the book: Flemming Nielson, Hanne Riis Nielson and Chris Hankin: Principles of Program Analysis. Springer Verlag 2005. c

More information

Exact Inference (9/30/13) 2 A brief review of Forward-Backward and EM for HMMs

Exact Inference (9/30/13) 2 A brief review of Forward-Backward and EM for HMMs STA561: Probabilistic machine learning Exact Inference (9/30/13) Lecturer: Barbara Engelhardt Scribes: Jiawei Liang, He Jiang, Brittany Cohen 1 Validation for Clustering If we have two centroids, η 1 and

More information

AN ALGORITHM FOR FINDING SHORTEST ROUTES FROM ALL SOURCE NODES TO A GIVEN DESTINATION IN GENERAL NETWORKS*

AN ALGORITHM FOR FINDING SHORTEST ROUTES FROM ALL SOURCE NODES TO A GIVEN DESTINATION IN GENERAL NETWORKS* 526 AN ALGORITHM FOR FINDING SHORTEST ROUTES FROM ALL SOURCE NODES TO A GIVEN DESTINATION IN GENERAL NETWORKS* By JIN Y. YEN (University of California, Berkeley) Summary. This paper presents an algorithm

More information

Another Variant of 3sat. 3sat. 3sat Is NP-Complete. The Proof (concluded)

Another Variant of 3sat. 3sat. 3sat Is NP-Complete. The Proof (concluded) 3sat k-sat, where k Z +, is the special case of sat. The formula is in CNF and all clauses have exactly k literals (repetition of literals is allowed). For example, (x 1 x 2 x 3 ) (x 1 x 1 x 2 ) (x 1 x

More information

Path-properties of the tree-valued Fleming-Viot process

Path-properties of the tree-valued Fleming-Viot process Path-properties of the tree-valued Fleming-Viot process Peter Pfaffelhuber Joint work with Andrej Depperschmidt and Andreas Greven Luminy, 492012 The Moran model time t As every population model, the Moran

More information

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 15 Adaptive Huffman Coding Part I Huffman code are optimal for a

More information

Crash-tolerant Consensus in Directed Graph Revisited

Crash-tolerant Consensus in Directed Graph Revisited Crash-tolerant Consensus in Directed Graph Revisited Ashish Choudhury Gayathri Garimella Arpita Patra Divya Ravi Pratik Sarkar Abstract Fault-tolerant distributed consensus is a fundamental problem in

More information

Game Theory: Normal Form Games

Game Theory: Normal Form Games Game Theory: Normal Form Games Michael Levet June 23, 2016 1 Introduction Game Theory is a mathematical field that studies how rational agents make decisions in both competitive and cooperative situations.

More information

1) S = {s}; 2) for each u V {s} do 3) dist[u] = cost(s, u); 4) Insert u into a 2-3 tree Q with dist[u] as the key; 5) for i = 1 to n 1 do 6) Identify

1) S = {s}; 2) for each u V {s} do 3) dist[u] = cost(s, u); 4) Insert u into a 2-3 tree Q with dist[u] as the key; 5) for i = 1 to n 1 do 6) Identify CSE 3500 Algorithms and Complexity Fall 2016 Lecture 17: October 25, 2016 Dijkstra s Algorithm Dijkstra s algorithm for the SSSP problem generates the shortest paths in nondecreasing order of the shortest

More information

Project Management Techniques (PMT)

Project Management Techniques (PMT) Project Management Techniques (PMT) Critical Path Method (CPM) and Project Evaluation and Review Technique (PERT) are 2 main basic techniques used in project management. Example: Construction of a house.

More information

Machine Learning

Machine Learning Machine Learning 10-601 Tom M. Mitchell Machine Learning Department Carnegie Mellon University October 13, 2011 Today: Graphical models Bayes Nets: Conditional independencies Inference Learning Readings:

More information

The von Mises Graphical Model: Expectation Propagation for Inference

The von Mises Graphical Model: Expectation Propagation for Inference The von Mises Graphical Model: Expectation Propagation for Inference Narges Razavian, Hetunandan Kamisetty, Christopher James Langmead September 2011 CMU-CS-11-130 CMU-CB-11-102 School of Computer Science

More information

IEOR E4004: Introduction to OR: Deterministic Models

IEOR E4004: Introduction to OR: Deterministic Models IEOR E4004: Introduction to OR: Deterministic Models 1 Dynamic Programming Following is a summary of the problems we discussed in class. (We do not include the discussion on the container problem or the

More information

Lecture 6. 1 Polynomial-time algorithms for the global min-cut problem

Lecture 6. 1 Polynomial-time algorithms for the global min-cut problem ORIE 633 Network Flows September 20, 2007 Lecturer: David P. Williamson Lecture 6 Scribe: Animashree Anandkumar 1 Polynomial-time algorithms for the global min-cut problem 1.1 The global min-cut problem

More information

Machine Learning in Computer Vision Markov Random Fields Part II

Machine Learning in Computer Vision Markov Random Fields Part II Machine Learning in Computer Vision Markov Random Fields Part II Oren Freifeld Computer Science, Ben-Gurion University March 22, 2018 Mar 22, 2018 1 / 40 1 Some MRF Computations 2 Mar 22, 2018 2 / 40 Few

More information

Probabilistic Graphical Models

Probabilistic Graphical Models CS420, Machine Learning, Lecture 8 Probabilistic Graphical Models Weinan Zhang Shanghai Jiao Tong University http://wnzhang.net http://wnzhang.net/teaching/cs420/index.html Content of This Lecture Introduction

More information

What is Greedy Approach? Control abstraction for Greedy Method. Three important activities

What is Greedy Approach? Control abstraction for Greedy Method. Three important activities 0-0-07 What is Greedy Approach? Suppose that a problem can be solved by a sequence of decisions. The greedy method has that each decision is locally optimal. These locally optimal solutions will finally

More information

Handout 4: Deterministic Systems and the Shortest Path Problem

Handout 4: Deterministic Systems and the Shortest Path Problem SEEM 3470: Dynamic Optimization and Applications 2013 14 Second Term Handout 4: Deterministic Systems and the Shortest Path Problem Instructor: Shiqian Ma January 27, 2014 Suggested Reading: Bertsekas

More information

Global Joint Distribution Factorizes into Local Marginal Distributions on Tree-Structured Graphs

Global Joint Distribution Factorizes into Local Marginal Distributions on Tree-Structured Graphs Teaching Note October 26, 2007 Global Joint Distribution Factorizes into Local Marginal Distributions on Tree-Structured Graphs Xinhua Zhang Xinhua.Zhang@anu.edu.au Research School of Information Sciences

More information

Factor Graphs, the Sum-Product Algorithm and TrueSkill TM

Factor Graphs, the Sum-Product Algorithm and TrueSkill TM Factor Graphs, the Sum-Product Algorithm and TrueSkill TM Kuhwan Jeong 1 1 Department of Statistics, Seoul National University, South Korea July, 2018 1 / 17 Introduction x i : a variable taking on values

More information

Optimal Security Liquidation Algorithms

Optimal Security Liquidation Algorithms Optimal Security Liquidation Algorithms Sergiy Butenko Department of Industrial Engineering, Texas A&M University, College Station, TX 77843-3131, USA Alexander Golodnikov Glushkov Institute of Cybernetics,

More information

Multirate Multicast Service Provisioning I: An Algorithm for Optimal Price Splitting Along Multicast Trees

Multirate Multicast Service Provisioning I: An Algorithm for Optimal Price Splitting Along Multicast Trees Mathematical Methods of Operations Research manuscript No. (will be inserted by the editor) Multirate Multicast Service Provisioning I: An Algorithm for Optimal Price Splitting Along Multicast Trees Tudor

More information

Diusion in the French Input-output Network

Diusion in the French Input-output Network Diusion in the Input-output Contreras martha.alatriste@ehess.fr Aix-Marseille School of Economics, CNRS, EHESS Getting Inside the Black Box: Technological Evolution Economic Growth Santa Fe Institute Aug.

More information

Stochastic Dual Dynamic Programming

Stochastic Dual Dynamic Programming 1 / 43 Stochastic Dual Dynamic Programming Operations Research Anthony Papavasiliou 2 / 43 Contents [ 10.4 of BL], [Pereira, 1991] 1 Recalling the Nested L-Shaped Decomposition 2 Drawbacks of Nested Decomposition

More information

CSE 21 Winter 2016 Homework 6 Due: Wednesday, May 11, 2016 at 11:59pm. Instructions

CSE 21 Winter 2016 Homework 6 Due: Wednesday, May 11, 2016 at 11:59pm. Instructions CSE 1 Winter 016 Homework 6 Due: Wednesday, May 11, 016 at 11:59pm Instructions Homework should be done in groups of one to three people. You are free to change group members at any time throughout the

More information

Different Monotonicity Definitions in stochastic modelling

Different Monotonicity Definitions in stochastic modelling Different Monotonicity Definitions in stochastic modelling Imène KADI Nihal PEKERGIN Jean-Marc VINCENT ASMTA 2009 Plan 1 Introduction 2 Models?? 3 Stochastic monotonicity 4 Realizable monotonicity 5 Relations

More information

For every job, the start time on machine j+1 is greater than or equal to the completion time on machine j.

For every job, the start time on machine j+1 is greater than or equal to the completion time on machine j. Flow Shop Scheduling - makespan A flow shop is one where all the jobs visit all the machine for processing in the given order. If we consider a flow shop with n jobs and two machines (M1 and M2), all the

More information

SMT and POR beat Counter Abstraction

SMT and POR beat Counter Abstraction SMT and POR beat Counter Abstraction Parameterized Model Checking of Threshold-Based Distributed Algorithms Igor Konnov Helmut Veith Josef Widder Alpine Verification Meeting May 4-6, 2015 Igor Konnov 2/64

More information

Sequential Decision Making

Sequential Decision Making Sequential Decision Making Dynamic programming Christos Dimitrakakis Intelligent Autonomous Systems, IvI, University of Amsterdam, The Netherlands March 18, 2008 Introduction Some examples Dynamic programming

More information

V. Lesser CS683 F2004

V. Lesser CS683 F2004 The value of information Lecture 15: Uncertainty - 6 Example 1: You consider buying a program to manage your finances that costs $100. There is a prior probability of 0.7 that the program is suitable in

More information

The exam is closed book, closed calculator, and closed notes except your three crib sheets.

The exam is closed book, closed calculator, and closed notes except your three crib sheets. CS 188 Spring 2016 Introduction to Artificial Intelligence Final V2 You have approximately 2 hours and 50 minutes. The exam is closed book, closed calculator, and closed notes except your three crib sheets.

More information

The EM algorithm for HMMs

The EM algorithm for HMMs The EM algorithm for HMMs Michael Collins February 22, 2012 Maximum-Likelihood Estimation for Fully Observed Data (Recap from earlier) We have fully observed data, x i,1... x i,m, s i,1... s i,m for i

More information

Sublinear Time Algorithms Oct 19, Lecture 1

Sublinear Time Algorithms Oct 19, Lecture 1 0368.416701 Sublinear Time Algorithms Oct 19, 2009 Lecturer: Ronitt Rubinfeld Lecture 1 Scribe: Daniel Shahaf 1 Sublinear-time algorithms: motivation Twenty years ago, there was practically no investigation

More information

Another Variant of 3sat

Another Variant of 3sat Another Variant of 3sat Proposition 32 3sat is NP-complete for expressions in which each variable is restricted to appear at most three times, and each literal at most twice. (3sat here requires only that

More information

It is used when neither the TX nor RX knows anything about the statistics of the source sequence at the start of the transmission

It is used when neither the TX nor RX knows anything about the statistics of the source sequence at the start of the transmission It is used when neither the TX nor RX knows anything about the statistics of the source sequence at the start of the transmission -The code can be described in terms of a binary tree -0 corresponds to

More information

You Have an NP-Complete Problem (for Your Thesis)

You Have an NP-Complete Problem (for Your Thesis) You Have an NP-Complete Problem (for Your Thesis) From Propositions 27 (p. 242) and Proposition 30 (p. 245), it is the least likely to be in P. Your options are: Approximations. Special cases. Average

More information

The exam is closed book, closed calculator, and closed notes except your one-page crib sheet.

The exam is closed book, closed calculator, and closed notes except your one-page crib sheet. CS 188 Spring 2015 Introduction to Artificial Intelligence Midterm 1 You have approximately 2 hours and 50 minutes. The exam is closed book, closed calculator, and closed notes except your one-page crib

More information

Recall: Data Flow Analysis. Data Flow Analysis Recall: Data Flow Equations. Forward Data Flow, Again

Recall: Data Flow Analysis. Data Flow Analysis Recall: Data Flow Equations. Forward Data Flow, Again Data Flow Analysis 15-745 3/24/09 Recall: Data Flow Analysis A framework for proving facts about program Reasons about lots of little facts Little or no interaction between facts Works best on properties

More information

Markov Decision Processes

Markov Decision Processes Markov Decision Processes Ryan P. Adams COS 324 Elements of Machine Learning Princeton University We now turn to a new aspect of machine learning, in which agents take actions and become active in their

More information

CS221 / Spring 2018 / Sadigh. Lecture 9: Games I

CS221 / Spring 2018 / Sadigh. Lecture 9: Games I CS221 / Spring 2018 / Sadigh Lecture 9: Games I Course plan Search problems Markov decision processes Adversarial games Constraint satisfaction problems Bayesian networks Reflex States Variables Logic

More information

Non-Deterministic Search

Non-Deterministic Search Non-Deterministic Search MDP s 1 Non-Deterministic Search How do you plan (search) when your actions might fail? In general case, how do you plan, when the actions have multiple possible outcomes? 2 Example:

More information

Essays on Some Combinatorial Optimization Problems with Interval Data

Essays on Some Combinatorial Optimization Problems with Interval Data Essays on Some Combinatorial Optimization Problems with Interval Data a thesis submitted to the department of industrial engineering and the institute of engineering and sciences of bilkent university

More information

Maximizing the Spread of Influence through a Social Network Problem/Motivation: Suppose we want to market a product or promote an idea or behavior in

Maximizing the Spread of Influence through a Social Network Problem/Motivation: Suppose we want to market a product or promote an idea or behavior in Maximizing the Spread of Influence through a Social Network Problem/Motivation: Suppose we want to market a product or promote an idea or behavior in a society. In order to do so, we can target individuals,

More information

CSE 473: Artificial Intelligence

CSE 473: Artificial Intelligence CSE 473: Artificial Intelligence Markov Decision Processes (MDPs) Luke Zettlemoyer Many slides over the course adapted from Dan Klein, Stuart Russell or Andrew Moore 1 Announcements PS2 online now Due

More information

The formation of a core periphery structure in heterogeneous financial networks

The formation of a core periphery structure in heterogeneous financial networks The formation of a core periphery structure in heterogeneous financial networks Daan in t Veld 1,2 joint with Marco van der Leij 2,3 and Cars Hommes 2 1 SEO Economic Research 2 Universiteit van Amsterdam

More information

Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures without Trapdoors

Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures without Trapdoors Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures without Trapdoors Benoît Libert 1 San Ling 2 Khoa Nguyen 2 Huaxiong Wang 2 1 Ecole Normale

More information

A relation on 132-avoiding permutation patterns

A relation on 132-avoiding permutation patterns Discrete Mathematics and Theoretical Computer Science DMTCS vol. VOL, 205, 285 302 A relation on 32-avoiding permutation patterns Natalie Aisbett School of Mathematics and Statistics, University of Sydney,

More information

Heaps. Heap/Priority queue. Binomial heaps: Advanced Algorithmics (4AP) Heaps Binary heap. Binomial heap. Jaak Vilo 2009 Spring

Heaps. Heap/Priority queue. Binomial heaps: Advanced Algorithmics (4AP) Heaps Binary heap. Binomial heap. Jaak Vilo 2009 Spring .0.00 Heaps http://en.wikipedia.org/wiki/category:heaps_(structure) Advanced Algorithmics (4AP) Heaps Jaak Vilo 00 Spring Binary heap http://en.wikipedia.org/wiki/binary_heap Binomial heap http://en.wikipedia.org/wiki/binomial_heap

More information

Topics in Computational Sustainability CS 325 Spring 2016

Topics in Computational Sustainability CS 325 Spring 2016 Topics in Computational Sustainability CS 325 Spring 2016 Note to other teachers and users of these slides. Andrew would be delighted if you found this source material useful in giving your own lectures.

More information

Reinforcement Learning

Reinforcement Learning Reinforcement Learning MDP March May, 2013 MDP MDP: S, A, P, R, γ, µ State can be partially observable: Partially Observable MDPs () Actions can be temporally extended: Semi MDPs (SMDPs) and Hierarchical

More information

CS Homework 4: Expectations & Empirical Distributions Due Date: October 9, 2018

CS Homework 4: Expectations & Empirical Distributions Due Date: October 9, 2018 CS1450 - Homework 4: Expectations & Empirical Distributions Due Date: October 9, 2018 Question 1 Consider a set of n people who are members of an online social network. Suppose that each pair of people

More information

Tug of War Game. William Gasarch and Nick Sovich and Paul Zimand. October 6, Abstract

Tug of War Game. William Gasarch and Nick Sovich and Paul Zimand. October 6, Abstract Tug of War Game William Gasarch and ick Sovich and Paul Zimand October 6, 2009 To be written later Abstract Introduction Combinatorial games under auction play, introduced by Lazarus, Loeb, Propp, Stromquist,

More information

Q1. [?? pts] Search Traces

Q1. [?? pts] Search Traces CS 188 Spring 2010 Introduction to Artificial Intelligence Midterm Exam Solutions Q1. [?? pts] Search Traces Each of the trees (G1 through G5) was generated by searching the graph (below, left) with a

More information

University of British Columbia. Abstract. problems represented as inuence diagrams. An algorithm is given

University of British Columbia. Abstract. problems represented as inuence diagrams. An algorithm is given Flexible Policy Construction by Information Renement Michael C. Horsch horsch@cs.ubc.ca David Poole poole@cs.ubc.ca Department of Computer Science University of British Columbia 2366 Main Mall, Vancouver,

More information

Heaps

Heaps AdvancedAlgorithmics (4AP) Heaps Jaak Vilo 2009 Spring Jaak Vilo MTAT.03.190 Text Algorithms 1 Heaps http://en.wikipedia.org/wiki/category:heaps_(structure) Binary heap http://en.wikipedia.org/wiki/binary_heap

More information

arxiv: v1 [cs.dc] 24 May 2017

arxiv: v1 [cs.dc] 24 May 2017 On Using Time Without Clocks via Zigzag Causality Asa Dan Technion asadan@campus.technion.ac.il Rajit Manohar Yale University rajit.manohar@yale.edu Yoram Moses Technion moses@ee.technion.ac.il arxiv:1705.08627v1

More information

Levin Reduction and Parsimonious Reductions

Levin Reduction and Parsimonious Reductions Levin Reduction and Parsimonious Reductions The reduction R in Cook s theorem (p. 266) is such that Each satisfying truth assignment for circuit R(x) corresponds to an accepting computation path for M(x).

More information

Optimal Satisficing Tree Searches

Optimal Satisficing Tree Searches Optimal Satisficing Tree Searches Dan Geiger and Jeffrey A. Barnett Northrop Research and Technology Center One Research Park Palos Verdes, CA 90274 Abstract We provide an algorithm that finds optimal

More information

CS188 Spring 2012 Section 4: Games

CS188 Spring 2012 Section 4: Games CS188 Spring 2012 Section 4: Games 1 Minimax Search In this problem, we will explore adversarial search. Consider the zero-sum game tree shown below. Trapezoids that point up, such as at the root, represent

More information

Mechanisms for Matching Markets with Budgets

Mechanisms for Matching Markets with Budgets Mechanisms for Matching Markets with Budgets Paul Dütting Stanford LSE Joint work with Monika Henzinger and Ingmar Weber Seminar on Discrete Mathematics and Game Theory London School of Economics July

More information

Fibonacci Heaps Y Y o o u u c c an an s s u u b b m miitt P P ro ro b blle e m m S S et et 3 3 iin n t t h h e e b b o o x x u u p p fro fro n n tt..

Fibonacci Heaps Y Y o o u u c c an an s s u u b b m miitt P P ro ro b blle e m m S S et et 3 3 iin n t t h h e e b b o o x x u u p p fro fro n n tt.. Fibonacci Heaps You You can can submit submit Problem Problem Set Set 3 in in the the box box up up front. front. Outline for Today Review from Last Time Quick refresher on binomial heaps and lazy binomial

More information

DESCENDANTS IN HEAP ORDERED TREES OR A TRIUMPH OF COMPUTER ALGEBRA

DESCENDANTS IN HEAP ORDERED TREES OR A TRIUMPH OF COMPUTER ALGEBRA DESCENDANTS IN HEAP ORDERED TREES OR A TRIUMPH OF COMPUTER ALGEBRA Helmut Prodinger Institut für Algebra und Diskrete Mathematik Technical University of Vienna Wiedner Hauptstrasse 8 0 A-00 Vienna, Austria

More information

Lecture outline W.B.Powell 1

Lecture outline W.B.Powell 1 Lecture outline What is a policy? Policy function approximations (PFAs) Cost function approximations (CFAs) alue function approximations (FAs) Lookahead policies Finding good policies Optimizing continuous

More information

OPPA European Social Fund Prague & EU: We invest in your future.

OPPA European Social Fund Prague & EU: We invest in your future. OPPA European Social Fund Prague & EU: We invest in your future. Cooperative Game Theory Michal Jakob and Michal Pěchouček Agent Technology Center, Dept. of Computer Science and Engineering, FEE, Czech

More information

Multi-agent influence diagrams for representing and solving games

Multi-agent influence diagrams for representing and solving games Games and Economic Behavior 45 (2003) 181 221 www.elsevier.com/locate/geb Multi-agent influence diagrams for representing and solving games Daphne Koller a, and Brian Milch b a Stanford University, Computer

More information

Lecture 23: April 10

Lecture 23: April 10 CS271 Randomness & Computation Spring 2018 Instructor: Alistair Sinclair Lecture 23: April 10 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They

More information

Phylogenetic reconstruction 2

Phylogenetic reconstruction 2 Phylogenetic reconstruction The neighbor-joining algorithm Please sit in row K or forward RF: what s the worst epidemic of the last 100 years? amp Funston, Kansas Left: US rmy photographer/public domain

More information

Probabilistic Robotics: Probabilistic Planning and MDPs

Probabilistic Robotics: Probabilistic Planning and MDPs Probabilistic Robotics: Probabilistic Planning and MDPs Slide credits: Wolfram Burgard, Dieter Fox, Cyrill Stachniss, Giorgio Grisetti, Maren Bennewitz, Christian Plagemann, Dirk Haehnel, Mike Montemerlo,

More information

Price Dispersion in Stationary Networked Markets

Price Dispersion in Stationary Networked Markets Price Dispersion in Stationary Networked Markets Eduard Talamàs Abstract Different sellers often sell the same good at different prices. Using a strategic bargaining model, I characterize how the equilibrium

More information

Designing efficient market pricing mechanisms

Designing efficient market pricing mechanisms Designing efficient market pricing mechanisms Volodymyr Kuleshov Gordon Wilfong Department of Mathematics and School of Computer Science, McGill Universty Algorithms Research, Bell Laboratories August

More information

A combinatorial prediction market for the U.S. Elections

A combinatorial prediction market for the U.S. Elections A combinatorial prediction market for the U.S. Elections Miroslav Dudík Thanks: S Lahaie, D Pennock, D Rothschild, D Osherson, A Wang, C Herget Polling accurate, but costly limited range of questions

More information

Advanced Algorithmics (4AP) Heaps

Advanced Algorithmics (4AP) Heaps Advanced Algorithmics (4AP) Heaps Jaak Vilo 2009 Spring Jaak Vilo MTAT.03.190 Text Algorithms 1 Heaps http://en.wikipedia.org/wiki/category:heaps_(structure) Binary heap http://en.wikipedia.org/wiki/binary

More information

91.420/543: Artificial Intelligence UMass Lowell CS Fall 2010

91.420/543: Artificial Intelligence UMass Lowell CS Fall 2010 91.420/543: Artificial Intelligence UMass Lowell CS Fall 2010 Lecture 17 & 18: Markov Decision Processes Oct 12 13, 2010 A subset of Lecture 9 slides from Dan Klein UC Berkeley Many slides over the course

More information

CS 188: Artificial Intelligence Spring Announcements

CS 188: Artificial Intelligence Spring Announcements CS 188: Artificial Intelligence Spring 2011 Lecture 9: MDPs 2/16/2011 Pieter Abbeel UC Berkeley Many slides over the course adapted from either Dan Klein, Stuart Russell or Andrew Moore 1 Announcements

More information

Preliminary Notions in Game Theory

Preliminary Notions in Game Theory Chapter 7 Preliminary Notions in Game Theory I assume that you recall the basic solution concepts, namely Nash Equilibrium, Bayesian Nash Equilibrium, Subgame-Perfect Equilibrium, and Perfect Bayesian

More information

The formation of a core periphery structure in heterogeneous financial networks

The formation of a core periphery structure in heterogeneous financial networks The formation of a core periphery structure in heterogeneous financial networks Marco van der Leij 1,2,3 joint with Cars Hommes 1,3, Daan in t Veld 1,3 1 Universiteit van Amsterdam - CeNDEF 2 De Nederlandsche

More information

The Values of Information and Solution in Stochastic Programming

The Values of Information and Solution in Stochastic Programming The Values of Information and Solution in Stochastic Programming John R. Birge The University of Chicago Booth School of Business JRBirge ICSP, Bergamo, July 2013 1 Themes The values of information and

More information

Lesson 9: Heuristic Search and A* Search

Lesson 9: Heuristic Search and A* Search CAP 5602 Summer, 2011 Lesson 9: Heuristic Search and A* Search The topics 1. Heuristic Search 2. The A* Search 3. An example of the use of A* search. 1. Heuristic Search The idea of heuristics is to attach

More information

Lecture 9: Games I. Course plan. A simple game. Roadmap. Machine learning. Example: game 1

Lecture 9: Games I. Course plan. A simple game. Roadmap. Machine learning. Example: game 1 Lecture 9: Games I Course plan Search problems Markov decision processes Adversarial games Constraint satisfaction problems Bayesian networks Reflex States Variables Logic Low-level intelligence Machine

More information

Reinforcement Learning

Reinforcement Learning Reinforcement Learning Basic idea: Receive feedback in the form of rewards Agent s utility is defined by the reward function Must (learn to) act so as to maximize expected rewards Grid World The agent

More information

Outline for Today. Quick refresher on binomial heaps and lazy binomial heaps. An important operation in many graph algorithms.

Outline for Today. Quick refresher on binomial heaps and lazy binomial heaps. An important operation in many graph algorithms. Fibonacci Heaps Outline for Today Review from Last Time Quick refresher on binomial heaps and lazy binomial heaps. The Need for decrease-key An important operation in many graph algorithms. Fibonacci Heaps

More information

2 all subsequent nodes. 252 all subsequent nodes. 401 all subsequent nodes. 398 all subsequent nodes. 330 all subsequent nodes

2 all subsequent nodes. 252 all subsequent nodes. 401 all subsequent nodes. 398 all subsequent nodes. 330 all subsequent nodes ¼ À ÈÌ Ê ½¾ ÈÊÇ Ä ÅË ½µ ½¾º¾¹½ ¾µ ½¾º¾¹ µ ½¾º¾¹ µ ½¾º¾¹ µ ½¾º ¹ µ ½¾º ¹ µ ½¾º ¹¾ µ ½¾º ¹ µ ½¾¹¾ ½¼µ ½¾¹ ½ (1) CLR 12.2-1 Based on the structure of the binary tree, and the procedure of Tree-Search, any

More information

Lecture 2: The Simple Story of 2-SAT

Lecture 2: The Simple Story of 2-SAT 0510-7410: Topics in Algorithms - Random Satisfiability March 04, 2014 Lecture 2: The Simple Story of 2-SAT Lecturer: Benny Applebaum Scribe(s): Mor Baruch 1 Lecture Outline In this talk we will show that

More information

Multirate Multicast Service Provisioning II: A Tâtonnement Process for Rate Allocation

Multirate Multicast Service Provisioning II: A Tâtonnement Process for Rate Allocation Mathematical Methods of Operations Research manuscript No. (will be inserted by the editor) Multirate Multicast Service Provisioning II: A Tâtonnement Process for Rate Allocation Tudor Mihai Stoenescu

More information

Financial Mathematics and Supercomputing

Financial Mathematics and Supercomputing GPU acceleration in early-exercise option valuation Álvaro Leitao and Cornelis W. Oosterlee Financial Mathematics and Supercomputing A Coruña - September 26, 2018 Á. Leitao & Kees Oosterlee SGBM on GPU

More information

Tableau-based Decision Procedures for Hybrid Logic

Tableau-based Decision Procedures for Hybrid Logic Tableau-based Decision Procedures for Hybrid Logic Gert Smolka Saarland University Joint work with Mark Kaminski HyLo 2010 Edinburgh, July 10, 2010 Gert Smolka (Saarland University) Decision Procedures

More information

TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC

TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC THOMAS BOLANDER AND TORBEN BRAÜNER Abstract. Hybrid logics are a principled generalization of both modal logics and description logics. It is well-known

More information