Randomized Algorithms 2013 A Lecture 5 – Martingales , Closest Pairs , Hash Tables , Existential Proofs and Codes ∗
نویسنده
چکیده
The question is whether these two requirements are equivalent and whether we can get the nice concentration for both of them. They are not equivalent as the following example shows. Consider a random walk on the integers with a reflecting wall at 0 where the first step chooses whether the walk is in the non negative or non positive integers. That is X0 = 0, the first step is random in {−1, 1} and all subsequent steps are random in {−1, 1} if Xi 6= 0 and reflect to the previous step if Xi = 0 (i.e. Xi+1 = Xi−1). Now the sequence is not a martingale according to (2), since given Xi, Xi−1 . . . X0, if Xi = 0 then we know that Xi+1 = Xi−1. But requirement (1) holds, since given Xi = 0 we have no idea whether we arrived from the positives or negatives. Under both definitions we have Azuma’s inequality: ∗These notes summarize the material covered in class, usually skipping proofs, details, examples and so forth, and possibly adding some remarks, or pointers. The exercises are for self-practice and need not be handed in. In the interest of brevity, most references and credits were omitted.
منابع مشابه
Optimal hash functions for approximate closest pairs on the n-cube
One way to find closest pairs in large datasets is to use hash functions [6], [12]. In recent years locality-sensitive hash functions for various metrics have been given: projecting an n-cube onto k bits is simple hash function that performs well. In this paper we investigate alternatives to projection. For various parameters hash functions given by complete decoding algorithms for codes work b...
متن کاملReciprocal Hash Tables for Nearest Neighbor Search
Recent years have witnessed the success of hashing techniques in approximate nearest neighbor search. In practice, multiple hash tables are usually employed to retrieve more desired results from all hit buckets of each table. However, there are rare works studying the unified approach to constructing multiple informative hash tables except the widely used random way. In this paper, we regard th...
متن کاملLinear Probing with 5-Independent Hashing
These lecture notes show that linear probing takes expected constant time if the hash function is 5-independent. This result was first proved by Pagh et al. [STOC’07,SICOMP’09]. The simple proof here is essentially taken from [Pǎtraşcu and Thorup ICALP’10]. We will also consider a smaller space version of linear probing that may have false positives like Bloom filters. These lecture notes illus...
متن کاملHashing with dual complementary projection learning for fast image retrieval
Due to explosive growth of visual content on the web, there is an emerging need of fast similarity search to efficiently exploit such enormous web contents from very large databases. Recently, hashing has become very popular for efficient nearest neighbor search in large scale applications. However, many traditional hashing methods learn the binary codes in a single shot or only employ a single...
متن کاملA Reliable Randomized Algorithm for the Closest-Pair Problem
The following two computational problems are studied: Duplicate grouping: Assume that n items are given, each of which is labeled by an integer key from the set {0, . . . , U − 1}. Store the items in an array of size n such that items with the same key occupy a contiguous segment of the array. Closest pair: Assume that a multiset of n points in the d-dimensional Euclidean space is given, where ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012