{"title":"Improved Search of Relevant Points for Nearest-Neighbor Classification","authors":"Alejandro Flores-Velazco","doi":"10.48550/arXiv.2203.03567","DOIUrl":"https://doi.org/10.48550/arXiv.2203.03567","url":null,"abstract":"Given a training set $P subset mathbb{R}^d$, the nearest-neighbor classifier assigns any query point $q in mathbb{R}^d$ to the class of its closest point in $P$. To answer these classification queries, some training points are more relevant than others. We say a training point is relevant if its omission from the training set could induce the misclassification of some query point in $mathbb{R}^d$. These relevant points are commonly known as border points, as they define the boundaries of the Voronoi diagram of $P$ that separate points of different classes. Being able to compute this set of points efficiently is crucial to reduce the size of the training set without affecting the accuracy of the nearest-neighbor classifier. Improving over a decades-long result by Clarkson, in a recent paper by Eppstein an output-sensitive algorithm was proposed to find the set of border points of $P$ in $O( n^2 + nk^2 )$ time, where $k$ is the size of such set. In this paper, we improve this algorithm to have time complexity equal to $O( nk^2 )$ by proving that the first steps of their algorithm, which require $O( n^2 )$ time, are unnecessary.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"237 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124242787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Bhore, Arnold Filtser, Hadi Khodabandeh, Csaba D. T'oth
{"title":"Online Spanners in Metric Spaces","authors":"S. Bhore, Arnold Filtser, Hadi Khodabandeh, Csaba D. T'oth","doi":"10.4230/LIPIcs.ESA.2022.18","DOIUrl":"https://doi.org/10.4230/LIPIcs.ESA.2022.18","url":null,"abstract":"Given a metric space $mathcal{M}=(X,delta)$, a weighted graph $G$ over $X$ is a metric $t$-spanner of $mathcal{M}$ if for every $u,v in X$, $delta(u,v)le d_G(u,v)le tcdot delta(u,v)$, where $d_G$ is the shortest path metric in $G$. In this paper, we construct spanners for finite sets in metric spaces in the online setting. Here, we are given a sequence of points $(s_1, ldots, s_n)$, where the points are presented one at a time (i.e., after $i$ steps, we saw $S_i = {s_1, ldots , s_i}$). The algorithm is allowed to add edges to the spanner when a new point arrives, however, it is not allowed to remove any edge from the spanner. The goal is to maintain a $t$-spanner $G_i$ for $S_i$ for all $i$, while minimizing the number of edges, and their total weight. We construct online $(1+varepsilon)$-spanners in Euclidean $d$-space, $(2k-1)(1+varepsilon)$-spanners for general metrics, and $(2+varepsilon)$-spanners for ultrametrics. Most notably, in Euclidean plane, we construct a $(1+varepsilon)$-spanner with competitive ratio $O(varepsilon^{-3/2}logvarepsilon^{-1}log n)$, bypassing the classic lower bound $Omega(varepsilon^{-2})$ for lightness, which compares the weight of the spanner, to that of the MST.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114640397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SAT Backdoors: Depth Beats Size","authors":"Jannik Dreier, S. Ordyniak, Stefan Szeider","doi":"10.4230/LIPIcs.ESA.2022.46","DOIUrl":"https://doi.org/10.4230/LIPIcs.ESA.2022.46","url":null,"abstract":"For several decades, much effort has been put into identifying classes of CNF formulas whose satisfiability can be decided in polynomial time. Classic results are the linear-time tractability of Horn formulas (Aspvall, Plass, and Tarjan, 1979) and Krom (i.e., 2CNF) formulas (Dowling and Gallier, 1984). Backdoors, introduced by Williams Gomes and Selman (2003), gradually extend such a tractable class to all formulas of bounded distance to the class. Backdoor size provides a natural but rather crude distance measure between a formula and a tractable class. Backdoor depth, introduced by M\"{a}hlmann, Siebertz, and Vigny (2021), is a more refined distance measure, which admits the utilization of different backdoor variables in parallel. Bounded backdoor size implies bounded backdoor depth, but there are formulas of constant backdoor depth and arbitrarily large backdoor size. We propose FPT approximation algorithms to compute backdoor depth into the classes Horn and Krom. This leads to a linear-time algorithm for deciding the satisfiability of formulas of bounded backdoor depth into these classes. We base our FPT approximation algorithm on a sophisticated notion of obstructions, extending M\"{a}hlmann et al.'s obstruction trees in various ways, including the addition of separator obstructions. We develop the algorithm through a new game-theoretic framework that simplifies the reasoning about backdoors. Finally, we show that bounded backdoor depth captures tractable classes of CNF formulas not captured by any known method.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121862177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hedonic Games and Treewidth Revisited","authors":"T. Hanaka, M. Lampis","doi":"10.4230/LIPIcs.ESA.2022.64","DOIUrl":"https://doi.org/10.4230/LIPIcs.ESA.2022.64","url":null,"abstract":"We revisit the complexity of the well-studied notion of Additively Separable Hedonic Games (ASHGs). Such games model a basic clustering or coalition formation scenario in which selfish agents are represented by the vertices of an edge-weighted digraph $G=(V,E)$, and the weight of an arc $uv$ denotes the utility $u$ gains by being in the same coalition as $v$. We focus on (arguably) the most basic stability question about such a game: given a graph, does a Nash stable solution exist and can we find it efficiently? We study the (parameterized) complexity of ASHG stability when the underlying graph has treewidth $t$ and maximum degree $Delta$. The current best FPT algorithm for this case was claimed by Peters [AAAI 2016], with time complexity roughly $2^{O(Delta^5t)}$. We present an algorithm with parameter dependence $(Delta t)^{O(Delta t)}$, significantly improving upon the parameter dependence on $Delta$ given by Peters, albeit with a slightly worse dependence on $t$. Our main result is that this slight performance deterioration with respect to $t$ is actually completely justified: we observe that the previously claimed algorithm is incorrect, and that in fact no algorithm can achieve dependence $t^{o(t)}$ for bounded-degree graphs, unless the ETH fails. This, together with corresponding bounds we provide on the dependence on $Delta$ and the joint parameter establishes that our algorithm is essentially optimal for both parameters, under the ETH. We then revisit the parameterization by treewidth alone and resolve a question also posed by Peters by showing that Nash Stability remains strongly NP-hard on stars under additive preferences. Nevertheless, we also discover an island of mild tractability: we show that Connected Nash Stability is solvable in pseudo-polynomial time for constant $t$, though with an XP dependence on $t$ which, as we establish, cannot be avoided.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126671793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Insertion Time of Random Walk Cuckoo Hashing below the Peeling Threshold","authors":"Stefan Walzer","doi":"10.4230/LIPIcs.ESA.2022.87","DOIUrl":"https://doi.org/10.4230/LIPIcs.ESA.2022.87","url":null,"abstract":"Most hash tables have an insertion time of $O(1)$, possibly qualified as expected and/or amortised. While insertions into cuckoo hash tables indeed seem to take $O(1)$ expected time in practice, only polylogarithmic guarantees are proven in all but the simplest of practically relevant cases. Given the widespread use of cuckoo hashing to implement compact dictionaries and Bloom filter alternatives, closing this gap is an important open problem for theoreticians. In this paper, we show that random walk insertions into cuckoo hash tables take $O(1)$ expected amortised time when any number $k geq 3$ of hash functions is used and the load factor is below the corresponding peeling threshold (e.g. $approx 0.81$ for $k = 3$). To our knowledge, this is the first meaningful guarantee for constant time insertion for cuckoo hashing that works for $k in {3,dots,9}$. In addition to being useful in its own right, we hope that our key-centred analysis method can be a stepping stone on the path to the true end goal: $O(1)$ time insertions for all load factors below the load threshold (e.g. $approx 0.91$ for $k = 3$).","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127956116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Approximation Algorithms for ROUND-UFP and ROUND-SAP","authors":"Debajyoti Kar, Arindam Khan, Andreas Wiese","doi":"10.4230/LIPIcs.ESA.2022.71","DOIUrl":"https://doi.org/10.4230/LIPIcs.ESA.2022.71","url":null,"abstract":"We study ROUND-UFP and ROUND-SAP, two generalizations of the classical BIN PACKING problem that correspond to the unsplittable flow problem on a path (UFP) and the storage allocation problem (SAP), respectively. We are given a path with capacities on its edges and a set of tasks where for each task we are given a demand and a subpath. In ROUND-UFP, the goal is to find a packing of all tasks into a minimum number of copies (rounds) of the given path such that for each copy, the total demand of tasks on any edge does not exceed the capacity of the respective edge. In ROUND-SAP, the tasks are considered to be rectangles and the goal is to find a non-overlapping packing of these rectangles into a minimum number of rounds such that all rectangles lie completely below the capacity profile of the edges. We show that in contrast to BIN PACKING, both the problems do not admit an asymptotic polynomial-time approximation scheme (APTAS), even when all edge capacities are equal. However, for this setting, we obtain asymptotic $(2+varepsilon)$-approximations for both problems. For the general case, we obtain an $O(loglog n)$-approximation algorithm and an $O(loglogfrac{1}{delta})$-approximation under $(1+delta)$-resource augmentation for both problems. For the intermediate setting of the no bottleneck assumption (i.e., the maximum task demand is at most the minimum edge capacity), we obtain absolute $12$- and asymptotic $(16+varepsilon)$-approximation algorithms for ROUND-UFP and ROUND-SAP, respectively.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116149918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Prophet Inequalities for Combinatorial Welfare Maximization with (Approximately) Subadditive Agents","authors":"Hanrui Zhang","doi":"10.4230/LIPIcs.ESA.2020.82","DOIUrl":"https://doi.org/10.4230/LIPIcs.ESA.2020.82","url":null,"abstract":"7 We give a framework for designing prophet inequalities for combinatorial welfare maximization. 8 Instantiated with different parameters, our framework implies (1) an O(log m/ log log m)-competitive 9 prophet inequality for subadditive agents, improving over the O(log m) upper bound via item pricing, 10 (2) an O(D log m/ log log m)-competitive prophet inequality for D-approximately subadditive agents, 11 where D ∈ {1, . . . , m − 1} measures the maximum number of items that complement each other, 12 and (3) as a byproduct, an O(1)-competitive prophet inequality for submodular or fractionally 13 subadditive (a.k.a. XOS) agents, matching the optimal ratio asymptotically. Our framework is 14 computationally efficient given sample access to the prior and demand queries. 15 2012 ACM Subject Classification Theory of computation → Stochastic approximation; Theory of 16 computation → Algorithmic game theory and mechanism design 17","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123448884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Counting Simplices in Hypergraph Streams","authors":"Amit Chakrabarti, Themistoklis K. Haris","doi":"10.4230/LIPIcs.ESA.2022.32","DOIUrl":"https://doi.org/10.4230/LIPIcs.ESA.2022.32","url":null,"abstract":"We consider the problem of space-efficiently estimating the number of simplices in a hypergraph stream. This is the most natural hypergraph generalization of the highly-studied problem of estimating the number of triangles in a graph stream. Our input is a k -uniform hypergraph H with n vertices and m hyperedges, each hyperedge being a k -sized subset of vertices. A k -simplex in H is a subhypergraph on k + 1 vertices X such that all k + 1 possible hyperedges among X exist in H . The goal is to process the hyperedges of H , which arrive in an arbitrary order as a data stream, and compute a good estimate of T k ( H ), the number of k -simplices in H . We design a suite of algorithms for this problem. As with triangle-counting in graphs (which is the special case k = 2), sublinear space is achievable but only under a promise of the form T k ( H ) ≥ T . Under such a promise, our algorithms use at most four passes and together imply a space bound of O for each fixed k ≥ 3, in order to guarantee an estimate within (1 ± ε ) T k ( H ) with probability ≥ 1 − δ . We also give a simpler 1-pass algorithm that achieves O (cid:16) ε − 2 log δ − 1 log n · ( m/T ) (cid:16) ∆ E + ∆ − 1 /k V (cid:17)(cid:17) space, where ∆ E (respectively, ∆ V ) denotes the maximum number of k -simplices that share a hyperedge (respectively, a vertex), which generalizes a previous result for the k = 2 case. We complement these algorithmic results with space lower bounds of the form Ω( ε − 2 ), Ω( m 1+1 /k /T ), Ω( m/T 1 − 1 /k ) and Ω( m ∆ 1 /kV /T ) for multi-pass algorithms and Ω( m ∆ E /T ) for 1-pass algorithms, which show that some of the dependencies on parameters in our upper bounds are nearly tight. Our techniques extend and generalize several different ideas previously developed for triangle counting in graphs, using appropriate innovations to handle the more complicated combinatorics of hypergraphs. 2012 ACM Subject Classification Theory of computation → Sketching and sampling","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"78 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128092957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Conditional Lower Bounds for Dynamic Geometric Measure Problems","authors":"Justin Dallant, J. Iacono","doi":"10.4230/LIPIcs.ESA.2022.39","DOIUrl":"https://doi.org/10.4230/LIPIcs.ESA.2022.39","url":null,"abstract":"We give new polynomial lower bounds for a number of dynamic measure problems in computational geometry. These lower bounds hold in the Word-RAM model, conditioned on the hardness of either 3SUM, APSP, or the Online Matrix-Vector Multiplication problem [Henzinger et al., STOC 2015]. In particular we get lower bounds in the incremental and fully-dynamic settings for counting maximal or extremal points in R 3 , different variants of Klee’s Measure Problem, problems related to finding the largest empty disk in a set of points, and querying the size of the i ’th convex layer in a planar set of points. We also answer a question of Chan et al. [SODA 2022] by giving a conditional lower bound for dynamic approximate square set cover. While many conditional lower bounds for dynamic data structures have been proven since the seminal work of Pătraşcu [STOC 2010], few of them relate to computational geometry problems. This is the first paper focusing on this topic. Most problems we consider can be solved in O ( n log n ) time in the static case and their dynamic versions have only been approached from the perspective of improving known upper bounds. One exception to this is Klee’s measure problem in R 2 , for which Chan [CGTA 2010] gave an unconditional Ω( √ n ) lower bound on the worst-case update time. By a similar approach, we show that such a lower bound also holds for an important special case of Klee’s measure problem in R 3 known as the Hypervolume Indicator problem, even for amortized runtime in the incremental setting. discussions about the topic of this paper.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127009738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Localized Geometric Moves to Compute Hyperbolic Structures on Triangulated 3-Manifolds","authors":"Clément Maria, Owen Rouill'e","doi":"10.4230/LIPIcs.ESA.2022.78","DOIUrl":"https://doi.org/10.4230/LIPIcs.ESA.2022.78","url":null,"abstract":"A fundamental way to study 3-manifolds is through the geometric lens, one of the most prominent geometries being the hyperbolic one. We focus on the computation of a complete hyperbolic structure on a connected orientable hyperbolic 3-manifold with torus boundaries. This family of 3-manifolds includes the knot complements. This computation of a hyperbolic structure requires the resolution of gluing equations on a triangulation of the space, but not all triangulations admit a solution to the equations. In this paper, we propose a new method to find a triangulation that admits a solution to the gluing equations, using convex optimization and combinatorial modifications. It is based on Casson and Rivin s reformulation of the equations. We provide a novel approach to modify a triangulation and update its geometry, along with experimental results to support the new method.","PeriodicalId":201778,"journal":{"name":"Embedded Systems and Applications","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131966445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}