Amit Shahar , Daniel Keren , Felipe Gonçalves , Gal Yehuda
{"title":"使用随机场的几何覆盖","authors":"Amit Shahar , Daniel Keren , Felipe Gonçalves , Gal Yehuda","doi":"10.1016/j.tcs.2025.115431","DOIUrl":null,"url":null,"abstract":"<div><div>A set of vectors <span><math><mi>S</mi><mo>⊆</mo><msup><mrow><mi>R</mi></mrow><mrow><mi>d</mi></mrow></msup></math></span> is <span><math><mo>(</mo><msub><mrow><mi>k</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><mi>ε</mi><mo>)</mo></math></span>-clusterable if there are <span><math><msub><mrow><mi>k</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span> balls of radius <em>ε</em> that cover <em>S</em>. A set of vectors <span><math><mi>S</mi><mo>⊆</mo><msup><mrow><mi>R</mi></mrow><mrow><mi>d</mi></mrow></msup></math></span> is <span><math><mo>(</mo><msub><mrow><mi>k</mi></mrow><mrow><mn>2</mn></mrow></msub><mo>,</mo><mi>δ</mi><mo>)</mo></math></span>-far from being clusterable if there are at least <span><math><msub><mrow><mi>k</mi></mrow><mrow><mn>2</mn></mrow></msub></math></span> vectors in <em>S</em>, with all pairwise distances at least <em>δ</em>. We propose a probabilistic algorithm to distinguish between these two cases. Our algorithm reaches a decision by only looking at the extreme values of a <em>scalar valued</em> hash function, defined by a <em>random field</em>, on <em>S</em>; hence, it is especially suitable in distributed and online settings. An important feature of our method is that the algorithm is oblivious to the number of vectors: in the online setting, for example, the algorithm stores only a constant number of scalars, which is independent of the stream length.</div><div>We introduce random field hash functions, which are a key ingredient in our paradigm. Random field hash functions generalize <em>locality-sensitive hashing</em> (LSH). In addition to the LSH requirement that “nearby vectors are hashed to similar values”, our hash function also guarantees that the “hash values are (nearly) independent random variables for distant vectors”. We formulate necessary conditions for the kernels which define the random fields applied to our problem, as well as a measure of kernel optimality, for which we provide a bound. Then, we propose a method to construct kernels which approximate the optimal one.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1052 ","pages":"Article 115431"},"PeriodicalIF":1.0000,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Geometric covering using random fields\",\"authors\":\"Amit Shahar , Daniel Keren , Felipe Gonçalves , Gal Yehuda\",\"doi\":\"10.1016/j.tcs.2025.115431\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>A set of vectors <span><math><mi>S</mi><mo>⊆</mo><msup><mrow><mi>R</mi></mrow><mrow><mi>d</mi></mrow></msup></math></span> is <span><math><mo>(</mo><msub><mrow><mi>k</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><mi>ε</mi><mo>)</mo></math></span>-clusterable if there are <span><math><msub><mrow><mi>k</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span> balls of radius <em>ε</em> that cover <em>S</em>. A set of vectors <span><math><mi>S</mi><mo>⊆</mo><msup><mrow><mi>R</mi></mrow><mrow><mi>d</mi></mrow></msup></math></span> is <span><math><mo>(</mo><msub><mrow><mi>k</mi></mrow><mrow><mn>2</mn></mrow></msub><mo>,</mo><mi>δ</mi><mo>)</mo></math></span>-far from being clusterable if there are at least <span><math><msub><mrow><mi>k</mi></mrow><mrow><mn>2</mn></mrow></msub></math></span> vectors in <em>S</em>, with all pairwise distances at least <em>δ</em>. We propose a probabilistic algorithm to distinguish between these two cases. Our algorithm reaches a decision by only looking at the extreme values of a <em>scalar valued</em> hash function, defined by a <em>random field</em>, on <em>S</em>; hence, it is especially suitable in distributed and online settings. An important feature of our method is that the algorithm is oblivious to the number of vectors: in the online setting, for example, the algorithm stores only a constant number of scalars, which is independent of the stream length.</div><div>We introduce random field hash functions, which are a key ingredient in our paradigm. Random field hash functions generalize <em>locality-sensitive hashing</em> (LSH). In addition to the LSH requirement that “nearby vectors are hashed to similar values”, our hash function also guarantees that the “hash values are (nearly) independent random variables for distant vectors”. We formulate necessary conditions for the kernels which define the random fields applied to our problem, as well as a measure of kernel optimality, for which we provide a bound. Then, we propose a method to construct kernels which approximate the optimal one.</div></div>\",\"PeriodicalId\":49438,\"journal\":{\"name\":\"Theoretical Computer Science\",\"volume\":\"1052 \",\"pages\":\"Article 115431\"},\"PeriodicalIF\":1.0000,\"publicationDate\":\"2025-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Theoretical Computer Science\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S030439752500369X\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Theoretical Computer Science","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S030439752500369X","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
A set of vectors is -clusterable if there are balls of radius ε that cover S. A set of vectors is -far from being clusterable if there are at least vectors in S, with all pairwise distances at least δ. We propose a probabilistic algorithm to distinguish between these two cases. Our algorithm reaches a decision by only looking at the extreme values of a scalar valued hash function, defined by a random field, on S; hence, it is especially suitable in distributed and online settings. An important feature of our method is that the algorithm is oblivious to the number of vectors: in the online setting, for example, the algorithm stores only a constant number of scalars, which is independent of the stream length.
We introduce random field hash functions, which are a key ingredient in our paradigm. Random field hash functions generalize locality-sensitive hashing (LSH). In addition to the LSH requirement that “nearby vectors are hashed to similar values”, our hash function also guarantees that the “hash values are (nearly) independent random variables for distant vectors”. We formulate necessary conditions for the kernels which define the random fields applied to our problem, as well as a measure of kernel optimality, for which we provide a bound. Then, we propose a method to construct kernels which approximate the optimal one.
期刊介绍:
Theoretical Computer Science is mathematical and abstract in spirit, but it derives its motivation from practical and everyday computation. Its aim is to understand the nature of computation and, as a consequence of this understanding, provide more efficient methodologies. All papers introducing or studying mathematical, logic and formal concepts and methods are welcome, provided that their motivation is clearly drawn from the field of computing.