Hard Metrics from Cayley Graphs Yuri Rabinovich Haifa University Joint work with Ilan Newman.

Slides:



Advertisements
Similar presentations
Routing Complexity of Faulty Networks Omer Angel Itai Benjamini Eran Ofek Udi Wieder The Weizmann Institute of Science.
Advertisements

Lower Bounds for Additive Spanners, Emulators, and More David P. Woodruff MIT and Tsinghua University To appear in FOCS, 2006.
Vertex sparsifiers: New results from old techniques (and some open questions) Robert Krauthgamer (Weizmann Institute) Joint work with Matthias Englert,
1 Decomposing Hypergraphs with Hypertrees Raphael Yuster University of Haifa - Oranim.
Gillat Kol joint work with Ran Raz Locally Testable Codes Analogues to the Unique Games Conjecture Do Not Exist.
General Linear Model With correlated error terms  =  2 V ≠  2 I.
Orthogonal Drawing Kees Visser. Overview  Introduction  Orthogonal representation  Flow network  Bend optimal drawing.
Information and Coding Theory
Heuristics for the Hidden Clique Problem Robert Krauthgamer (IBM Almaden) Joint work with Uri Feige (Weizmann)
Metric Embeddings with Relaxed Guarantees Hubert Chan Joint work with Kedar Dhamdhere, Anupam Gupta, Jon Kleinberg, Aleksandrs Slivkins.
The Greedy Approach Chapter 8. The Greedy Approach It’s a design technique for solving optimization problems Based on finding optimal local solutions.
Parallel Scheduling of Complex DAGs under Uncertainty Grzegorz Malewicz.
1 The Monte Carlo method. 2 (0,0) (1,1) (-1,-1) (-1,1) (1,-1) 1 Z= 1 If  X 2 +Y 2  1 0 o/w (X,Y) is a point chosen uniformly at random in a 2  2 square.
Combinatorial Algorithms
Gillat Kol joint work with Ran Raz Locally Testable Codes Analogues to the Unique Games Conjecture Do Not Exist.
Every H-decomposition of K n has a nearly resolvable alternative Wilson: e(H) | n(n-1)/2 and gcd(H) | n-1 n>> then there exists an H-decomposition of K.
The Stackelberg Minimum Spanning Tree Game Jean Cardinal · Erik D. Demaine · Samuel Fiorini · Gwenaël Joret · Stefan Langerman · Ilan Newman · OrenWeimann.
Navigating Nets: Simple algorithms for proximity search Robert Krauthgamer (IBM Almaden) Joint work with James R. Lee (UC Berkeley)
The number of edge-disjoint transitive triples in a tournament.
CSL758 Instructors: Naveen Garg Kavitha Telikepalli Scribe: Manish Singh Vaibhav Rastogi February 7 & 11, 2008.
1 Algorithms for Large Data Sets Ziv Bar-Yossef Lecture 13 June 25, 2006
Testing of ‘massively parametrized problems’ - Ilan Newman Haifa University Based on joint work with: Sourav Chakraborty, Eldar Fischer, Shirley Halevi,
1 Optimization problems such as MAXSAT, MIN NODE COVER, MAX INDEPENDENT SET, MAX CLIQUE, MIN SET COVER, TSP, KNAPSACK, BINPACKING do not have a polynomial.
The 1’st annual (?) workshop. 2 Communication under Channel Uncertainty: Oblivious channels Michael Langberg California Institute of Technology.
CS5371 Theory of Computation
Probabilistic Methods in Coding Theory: Asymmetric Covering Codes Joshua N. Cooper UCSD Dept. of Mathematics Robert B. Ellis Texas A&M Dept. of Mathematics.
Undirected ST-Connectivity 2 DL Omer Reingold, STOC 2005: Presented by: Fenghui Zhang CPSC 637 – paper presentation.
EXPANDER GRAPHS Properties & Applications. Things to cover ! Definitions Properties Combinatorial, Spectral properties Constructions “Explicit” constructions.
On Testing Convexity and Submodularity Michal Parnas Dana Ron Ronitt Rubinfeld.
Expanders Eliyahu Kiperwasser. What is it? Expanders are graphs with no small cuts. The later gives several unique traits to such graph, such as: – High.
1 Introduction to Approximation Algorithms Lecture 15: Mar 5.
Repairable Fountain Codes Megasthenis Asteris, Alexandros G. Dimakis IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 5, MAY /5/221.
Primal-Dual Meets Local Search: Approximating MST’s with Non-uniform Degree Bounds Author: Jochen Könemann R. Ravi From CMU CS 3150 Presentation by Dan.
Information and Coding Theory Linear Block Codes. Basic definitions and some examples. Juris Viksna, 2015.
Approximation and Hardness Results for Packing Cycles Mohammad R. Salavatipour Department of Computing Science University of Alberta Joint work with M.
Streaming Algorithms Piotr Indyk MIT. Data Streams A data stream is a sequence of data that is too large to be stored in available memory Examples: –Network.
Why Extractors? … Extractors, and the closely related “Dispersers”, exhibit some of the most “random-like” properties of explicitly constructed combinatorial.
Pareto Linear Programming The Problem: P-opt Cx s.t Ax ≤ b x ≥ 0 where C is a kxn matrix so that Cx = (c (1) x, c (2) x,..., c (k) x) where c.
Combinatorial Algorithms Reference Text: Kreher and Stinson.
Edge-disjoint induced subgraphs with given minimum degree Raphael Yuster 2012.
Expanders via Random Spanning Trees R 許榮財 R 黃佳婷 R 黃怡嘉.
Chapter 2 Mathematical preliminaries 2.1 Set, Relation and Functions 2.2 Proof Methods 2.3 Logarithms 2.4 Floor and Ceiling Functions 2.5 Factorial and.
Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Joint work with M. Luby, R. Karp, O. Etesami.
Greedy Algorithms and Matroids Andreas Klappenecker.
1 Rainbow Decompositions Raphael Yuster University of Haifa Proc. Amer. Math. Soc. (2008), to appear.
13 th Nov Geometry of Graphs and It’s Applications Suijt P Gujar. Topics in Approximation Algorithms Instructor : T Kavitha.
1 Asymptotically optimal K k -packings of dense graphs via fractional K k -decompositions Raphael Yuster University of Haifa.
Word : Let F be a field then the expression of the form a 1, a 2, …, a n where a i  F  i is called a word of length n over the field F. We denote the.
1 Decomposition into bipartite graphs with minimum degree 1. Raphael Yuster.
Low Density Parity Check codes
The parity bits of linear block codes are linear combination of the message. Therefore, we can represent the encoder by a linear system described by matrices.
1 a1a1 A1A1 a2a2 a3a3 A2A Mixed Strategies When there is no saddle point: We’ll think of playing the game repeatedly. We continue to assume that.
International Iran conference on Quantum Information September 2007, Kish Island Evaluation of bounds of codes defined over hexagonal and honeycomb lattices.
Lower Bounds for Embedding Edit Distance into Normed Spaces A. Andoni, M. Deza, A. Gupta, P. Indyk, S. Raskhodnikova.
Raptor Codes Amin Shokrollahi EPFL. BEC(p 1 ) BEC(p 2 ) BEC(p 3 ) BEC(p 4 ) BEC(p 5 ) BEC(p 6 ) Communication on Multiple Unknown Channels.
Final Review Chris and Virginia. Overview One big multi-part question. (Likely to be on data structures) Many small questions. (Similar to those in midterm.
Presented by Alon Levin
Theory of Computational Complexity Probability and Computing Ryosuke Sasanuma Iwama and Ito lab M1.
Expanders and Ramanujan Graphs Mike Krebs, Cal State LA For slideshow: click “Research and Talks” from
Complexity Theory and Explicit Constructions of Ramsey Graphs Rahul Santhanam University of Edinburgh.
Approximation algorithms
An Introduction to Graph Theory
Dimension reduction for finite trees in L1
Generalized Sparsest Cut and Embeddings of Negative-Type Metrics
Computational Molecular Biology
Graph Operations And Representation
Linear Programming and Approximation
Embedding Metrics into Geometric Spaces
Graph Operations And Representation
The Complexity of Approximation
Presentation transcript:

Hard Metrics from Cayley Graphs Yuri Rabinovich Haifa University Joint work with Ilan Newman

Metric distortion and hard metrics The distortion of embedding a metric μ into an Euclidean space, c 2 (μ), is defined as the minimum contraction over all non-expanding embeddings of μ into L 2. A fundamental result of Bourgain[85] claims that for any metric μ on n points, c 2 (μ)=O(log n). A complementary result of LLR[95] and AR[98] claims that there exists metrics μ such that c 2 (μ)=Ω(log n). We call such metrics hard.

Examples of hard metrics In what follows, we restrict ourselves to shortest-path metrics μ G of undirected graphs G. It was shown in LLR[95] and AR[98] that when G is a constant degree expander, μ G is hard. This remained (essentially) the only known const- ruction of hard metrics until the work of KN[04]. Many fundamental results in the Theory of Finite Metric Spaces claim that certain important classes of metrics (e.g., planar, doubling, NEG) are not hard.

Results of this paper We present other construction of hard metrics. It is substantially different from LLR[95], AR[98]. Despite apparent lack of similarity with KN[05], our construction turns out to be more general, while being conceptually simpler. The construction is based on Cayley Graphs of Abelian groups.

Cayley Graphs: A reminder Let H be an Abelian group, and A=-A a set of generators of H. The Cayley graph G(H,A) has V=H, and E={(x,y) | x–y is in A}. The Cayley Graph of Z 8 with generators A={1,2,6,7}.

Lower bounds on distortion Let G=(V,E) be a graph of degree d, and let μ G be its shortest-path metrics. We want to lower- bound c 2 (μ G ). A Poincare form: F(δ) = ∑ E δ 2 (i,j) / ∑ VxV δ 2 (i,j). Let X= F(μ G ), and Y= min {F(δ) | δ is Euclidean}. Then, {c 2 (μ G )} 2 ≥ Y/X. In our case, X ≈ E/(n 2 Diam 2 (G)) and Y = γ G /n, where γ G is the spectral gap of G. Thus, {c 2 (μ G )} 2 ≥ γ G /d Diam 2 (G).

Hard graphs Thus, in order to get c 2 (μ G )=Ω(log n), it suffices to require constant relative spectral gap γ G /d, and Diam(G)=Ω(log n). Clearly, const. degree expanders achieve this. Are there other “hard” graphs? Consider Cayley graphs of Abelian groups. It is well known that in this case γ G /d cannot be constant unless for d=Ω(log n). This appears to be a problem: typically, a non- constant degree yields sub-logarithmic Diam…

Hard Metrics form Cayley graphs of Abelian groups However, in bounding the Diam, the commutativity is our ally! In particular, the number of vertices reachable from a fixed vertex in r steps is at most ( r+d-1 choose r ), the number of multisets of size r formed by d distinct elements. Consequently, for any such graph G with n vertices and O(log n) degree, Diam(G)=Ω(log n). It remains to take care of the normalized spectral gap γ G /d. We need it to be constant.

Cayley graphs of Abelian groups (cont.) A well known result of AR[94] claims that for any group H and a random set of generators A of size ≥ clog n, the corresponding Cayley graph G(H,A) almost surely has constant γ G /d. (For an Abelian H this is a mere exersize...) Combining our observations, we arrive at: Theorem For any Abelian group H, and a random (symmetric) set of generators A of size clog n, the shortest-path metric of the corresponding Cayley graph G(H,A) is almost surely hard.

When H=( Z 2 ) n In this case, the graph G(H,A) has constant γ G /d iff the matrix M nxm whose set of columns is A is a generator matrix of linear error- correcting code with linear distance. Since there exists such codes of constant rate, i.e., m=O(n), we conclude that Theorem* Let M be a generator matrix of a linear code of constant rate and linear distance, and let A be the set of M’s columns. Then the shortest-path metric of the Cayley graph G(H,A) is hard.

Conclusion Hard metrics is a very interesting class of metric spaces with extremal properties. It is closely related to expanders and optimal error-correcting codes. While the present work contributes to a better understanding of hard metrics, much remains to be done. It is our hope that gradually the structure of hard metrics will become (reasonably) clear.