Workshop on Stochastic Optimization in Networks and Related Topics

ثبت نشده
چکیده

Prof. Chandra Murthy (ECE, IISc Bengaluru) (Tutorial) Title: The surprising effectiveness of hierarchical Bayesian methods for sparse signal recovery Abstract: Hierarchical Bayesian methods have been empirically shown to significantly outperform their more conventional convex relaxation and greedy optimization based counterparts in several scenarios. In this talk, we will focus on the multiple measurement model, and discuss fundamental results that explain the surprising effectiveness of hierarchical Bayesian methods for sparse signal recovery. Inspired by the results, we discuss several new algorithms based on the principle underlying the hierarchical Bayesian methods, namely, that of covariance matching. These algorithms offer multi-fold improvement in performance and use far lower working memory, without compromising on the performance. Time permitting, we will discuss some applications in wireless communications. Hierarchical Bayesian methods have been empirically shown to significantly outperform their more conventional convex relaxation and greedy optimization based counterparts in several scenarios. In this talk, we will focus on the multiple measurement model, and discuss fundamental results that explain the surprising effectiveness of hierarchical Bayesian methods for sparse signal recovery. Inspired by the results, we discuss several new algorithms based on the principle underlying the hierarchical Bayesian methods, namely, that of covariance matching. These algorithms offer multi-fold improvement in performance and use far lower working memory, without compromising on the performance. Time permitting, we will discuss some applications in wireless communications. Prof. Aditya Gopalan (ECE, IISc Bengaluru) Title: Black-box Optimization Abstract: How would you maximize an unknown function if you could only query it at chosen inputs and observe the corresponding (noisy) function values? The talk will provide a gentle introduction to the Bayesian optimization paradigm for solving this widely encountered problem. We will also present algorithms for multi-armed bandit problems with continuous action spaces, based on nonparametric Gaussian process models for inference and decisionmaking under uncertainty (joint work with Sayak Ray Chowdhury). How would you maximize an unknown function if you could only query it at chosen inputs and observe the corresponding (noisy) function values? The talk will provide a gentle introduction to the Bayesian optimization paradigm for solving this widely encountered problem. We will also present algorithms for multi-armed bandit problems with continuous action spaces, based on nonparametric Gaussian process models for inference and decisionmaking under uncertainty (joint work with Sayak Ray Chowdhury). Prof. Amitabha Bagchi (CSE, IIT Delhi) Title: Decentralized random walk-based data collection in networks Abstract: We analyze a decentralized random walk-based algorithm for data collection at the sink in a multi-hop sensor network. Our algorithm, Random-Collect, which involves data packets being passed to random neighbors in the network according to a random walk mechanism, requires no configuration and incurs no routing overhead. To analyze this method, we model the data generation process as independent Bernoulli arrivals at the source nodes. We analyze both latency and throughput in this setting, providing a theoretical lower bound for the throughput and a theoretical upper bound for the latency. The main contribution of our paper, however, is the throughput result: we show that the rate at which our algorithm can collect data depends on the spectral gap of the given random walk's transition matrix. In particular, for We analyze a decentralized random walk-based algorithm for data collection at the sink in a multi-hop sensor network. Our algorithm, Random-Collect, which involves data packets being passed to random neighbors in the network according to a random walk mechanism, requires no configuration and incurs no routing overhead. To analyze this method, we model the data generation process as independent Bernoulli arrivals at the source nodes. We analyze both latency and throughput in this setting, providing a theoretical lower bound for the throughput and a theoretical upper bound for the latency. The main contribution of our paper, however, is the throughput result: we show that the rate at which our algorithm can collect data depends on the spectral gap of the given random walk's transition matrix. In particular, for the simple random walk, we show that the rate also depends on the maximum and minimum degrees of the graph modelling the network. For latency, we show that the time taken to collect data not only depends on the worst-case hitting time of the given random walk, but also depends on the data arrival rate. In fact, our latency bound reflects the data rate-latency tradeoff, i.e., in order to achieve a higher data rate we need to compromise on latency and vice-versa. We also discuss some examples that demonstrate that our lower bound on the data rate is optimal up to constant factors, i.e., there exists a network topology and sink placement for which the maximum stable data rate is just a constant factor above our lower bound. Prof. Anand Louis (CSA, IISc Bengaluru) Title: Algorithms for graph partitioning problems Abstract: Graph-partitioning problems are a central topic of research in study of algorithms and complexity theory. They are of interest to theoreticians with connections to error correcting codes, sampling algorithms, metric embeddings, among others, and to practitioners, as algorithms for graph partitioning can be used as fundamental building blocks in many applications. One of the central problems studied in this field is the sparsest cut problem, where we want to compute the cut which has the least ratio of number of edges cut to size of smaller side of the cut. This ratio is known as the expansion of the cut. In this talk, I shall survey some recent results and connections for graph expansion problems. Graph-partitioning problems are a central topic of research in study of algorithms and complexity theory. They are of interest to theoreticians with connections to error correcting codes, sampling algorithms, metric embeddings, among others, and to practitioners, as algorithms for graph partitioning can be used as fundamental building blocks in many applications. One of the central problems studied in this field is the sparsest cut problem, where we want to compute the cut which has the least ratio of number of edges cut to size of smaller side of the cut. This ratio is known as the expansion of the cut. In this talk, I shall survey some recent results and connections for graph expansion problems. Prof. Avhishek Chatterjee (EE, IIT Madras) Title: Energy-Reliability Limits in Nanoscale Boolean Trees and Feed forward Neural Networks Abstract: Nanoscale semiconductor devices are often unreliable, with reliability as a function of energy. We study energy-reliability limits for boolean tree circuits and deep feedforward neural networks (multilayer perceptrons) built using such devices. Pippenger had developed a mutual information propagation technique to characterize the complexity of noisy circuits. Since small circuit complexity need not imply low energy, however, we extend mutual information propagation to obtain energy lower bounds for boolean tree-structured circuits and for deep Nanoscale semiconductor devices are often unreliable, with reliability as a function of energy. We study energy-reliability limits for boolean tree circuits and deep feedforward neural networks (multilayer perceptrons) built using such devices. Pippenger had developed a mutual information propagation technique to characterize the complexity of noisy circuits. Since small circuit complexity need not imply low energy, however, we extend mutual information propagation to obtain energy lower bounds for boolean tree-structured circuits and for deep feedforward neural networks. Many device technologies require all gates to have the same electrical operating point; in circuits of such uniform gates, we show that the minimum energy required to achieve any non-trivial reliability scales superlinearly with the number of inputs. Circuits implemented in emerging device technologies like spin electronics can, however, have gates operate at different electrical points; in circuits of such heterogenous gates, we show energy scaling can be linear in the number of inputs. Building on our extended mutual information propagation technique and using insights from convex optimization theory, we develop an algorithm to compute energy lower bounds for any given boolean tree under heterogeneous gates. This algorithm runs in linear time in number of gates and is therefore useful for designing modern circuits with numerous gates. As part of our development we find a simple procedure for energy allocation across circuit gates with different operating points and neural networks with differently-operating layers. Prof. Bruce Hajek (ECE, UIUC) Title: On the challenge of gene regulatory network reconstruction from high throughput sequencing data Abstract: Gene regulatory networks are central to the functioning of biological organisms. High throughput genetic sequencing technology has enabled the production of massive amounts of data pertaining to activation levels of genes, which has the potential to help scientists reverse engineer gene regulatory networks. In this talk I will briefly explain the steps from data collection to network modelling and analysis that go into the process for a particular study examining soybean plants. Gene regulatory networks are central to the functioning of biological organisms. High throughput genetic sequencing technology has enabled the production of massive amounts of data pertaining to activation levels of genes, which has the potential to help scientists reverse engineer gene regulatory networks. In this talk I will briefly explain the steps from data collection to network modelling and analysis that go into the process for a particular study examining soybean plants. In collaboration with Xiaohan Kang, Faqiang Wu, and Yoshie Hanzawa. Prof. Krishna Jagannathan (EE, IIT Madras) Title: Qubits through Queues: The capacity of channels with waiting time dependent errors Abstract: We consider a setting where qubits are processed sequentially, and derive fundamental limits on the rate at which classical information can be transmitted using quantum states that decohere in time. Specifically, we model the sequential processing of qubits using a single-server queue, and derive explicit expressions for the capacity of such a `queue-channel'. We also demonstrate a sweet-spot phenomenon with respect to the arrival rate to the queue, i.e., we show that there exists a value of the arrival rate of the qubits at which the rate of information transmission (in bits/sec) through the queue-channel is maximized. Next, we consider a setting where the average rate of processing qubits is fixed, and show that the capacity of the queue-channel is maximized when the processing time is deterministic. We also discuss design implications of these results, and conclude by highlighting the importance of explicitly modelling delay induced errors in quantum information processing systems. We consider a setting where qubits are processed sequentially, and derive fundamental limits on the rate at which classical information can be transmitted using quantum states that decohere in time. Specifically, we model the sequential processing of qubits using a single-server queue, and derive explicit expressions for the capacity of such a `queue-channel'. We also demonstrate a sweet-spot phenomenon with respect to the arrival rate to the queue, i.e., we show that there exists a value of the arrival rate of the qubits at which the rate of information transmission (in bits/sec) through the queue-channel is maximized. Next, we consider a setting where the average rate of processing qubits is fixed, and show that the capacity of the queue-channel is maximized when the processing time is deterministic. We also discuss design implications of these results, and conclude by highlighting the importance of explicitly modelling delay induced errors in quantum information processing systems. Collaborative work with Avhishek Chatterjee (Dept. of Electrical Engineering, IIT Madras) and Prabha Mandayam (Dept. of Physics, IIT Madras). Prof. Ketan Rajawat (EE, IIT Kanpur) Title: Beyond Consensus and Synchrony in Decentralized Online Optimization using Saddle Point Method Abstract: We consider online learning problems in multi-agent systems comprised of distinct subsets of agents operating without a common time-scale. Each individual in the network is charged with minimizing the global regret, which is a sum of the instantaneous sub-optimality of each agent's actions with respect to a fixed global clairvoyant actor with access to all costs across the network for all time up to a time-horizon T. Since agents are not assumed to be of the same type, the hypothesis that all agents seek a common action is violated, and thus we We consider online learning problems in multi-agent systems comprised of distinct subsets of agents operating without a common time-scale. Each individual in the network is charged with minimizing the global regret, which is a sum of the instantaneous sub-optimality of each agent's actions with respect to a fixed global clairvoyant actor with access to all costs across the network for all time up to a time-horizon T. Since agents are not assumed to be of the same type, the hypothesis that all agents seek a common action is violated, and thus we introduce instead a notion of network discrepancy as a measure of how well agents coordinate their behavior while retaining distinct local behavior. Moreover, agents are not assumed to receive the sequentially arriving costs on a common time index, and thus seek to learn in an asynchronous manner. A variant of the Arrow-Hurwicz saddle point algorithm is proposed to control the growth of global regret and network discrepancy. This algorithm uses Lagrange multipliers to penalize the discrepancies between agents and leads to an implementation that relies on local operations and exchange of variables between neighbors. Decisions made with this method lead to regret whose order is O(T^{1/2})$and network discrepancy O(T^{3/4}). Empirical evaluation is conducted on an asynchronously operating sensor network estimating a spatially correlated random field. An application to vision based target localization with moving cameras demonstrates the benefits of this approach in practice. Prof. Nikhil Karamchandani (EE, IIT Bombay) Title: Rumor source identification in networks (or ``Who let the dogs out, who, who..?") Abstract: Consider a network where an unidentified source node starts a rumor, which then propagates along the edges of the underlying graph. After sufficient time has elapsed, we get to observe the infected subgraph and in addition, perhaps some partial information about the infection episodes. Using this information, we would like to design an estimator for the source Consider a network where an unidentified source node starts a rumor, which then propagates along the edges of the underlying graph. After sufficient time has elapsed, we get to observe the infected subgraph and in addition, perhaps some partial information about the infection episodes. Using this information, we would like to design an estimator for the source node to identify the starting point of the rumor. Such an estimator will have applications in several domains, ranging from identifying the source of malware spread in computer networks, to locating the fault which started a cascade of events leading to a power blackout or a financial meltdown, or identifying the starting point of an epidemic. This problem of `rumor source identification' has received significant attention recently, several different variants have been studied and various estimators have been proposed. We will begin with a short survey of some of the results and then discuss two recent directions we have pursued in this space: Persistence of estimators: Does the estimated source change as we wait longer and longer to observe larger and larger infected subgraphs, or does it stabilize after some time? Pairwise information: We consider the case where we have partial pairwise information about the infection episode, such as A infected B or A was infected before B, and devise efficient estimators for this setting. Prof. Piyush Srivastava (STCS, TIFR) Title: Zeros of polynomials and approximation of partition functions Abstract: This talk presents a recent method proposed by Alexander Barvinok which uses the This talk presents a recent method proposed by Alexander Barvinok which uses the analyticity of the free energy in the complex plane to design algorithms for the approximation of partition functions. We will then look at connections of this work with the classical Lee-Yang theory to give new algorithms for the approximation of the ferromagnetic Ising partition functions in settings where rigorous analyses of algorithms based on traditional ideas such as decay of correlations or Markov chain Monte Carlo are not yet available. Based on (partly ongoing) joint work with Jingcheng Liu and Alistair Sinclair Dr. Praneeth Netrapalli (Microsoft Research, Bengaluru) Title: Smoothed Analysis of Rank-Constrained Linear Semidefinite Programming Abstract: Semidefinite programming (SDP) is a widely used tool in the design of algorithms for various problems. Prominent examples include MAX-CUT, community detection and matrix completion. While ellipsoid and interior point methods solve SDPs in polynomial time, these methods do not scale well to large SDPs. In order to address this challenge, Burer and Monteiro (2003) proposed a nonconvex rank-constrained formulation of the SDPs that can be solved (for a local minimum) much faster. While the rank-constrained formulation could potentially have spurious local minima, Burer and Monteiro presented empirical results suggesting that solving the rank-constrained formulation almost always recovers the global optimum of the SDP. Understanding why this is the case has been an important open problem since then. In a recent work, Boumal, Voroninski and Bandeira (2016) made significant progress in solving this problem by showing that for almost all SDPs, the rank-constrained formulation has no spurious local minima, but stop short of providing runtime guarantees. In this work, we show that for almost all SDPs, the rank-constrained formulation can be solved to obtain an approximate global minimum in time that is polynomial in the input size, some problem dependent parameters and desired accuracy. Semidefinite programming (SDP) is a widely used tool in the design of algorithms for various problems. Prominent examples include MAX-CUT, community detection and matrix completion. While ellipsoid and interior point methods solve SDPs in polynomial time, these methods do not scale well to large SDPs. In order to address this challenge, Burer and Monteiro (2003) proposed a nonconvex rank-constrained formulation of the SDPs that can be solved (for a local minimum) much faster. While the rank-constrained formulation could potentially have spurious local minima, Burer and Monteiro presented empirical results suggesting that solving the rank-constrained formulation almost always recovers the global optimum of the SDP. Understanding why this is the case has been an important open problem since then. In a recent work, Boumal, Voroninski and Bandeira (2016) made significant progress in solving this problem by showing that for almost all SDPs, the rank-constrained formulation has no spurious local minima, but stop short of providing runtime guarantees. In this work, we show that for almost all SDPs, the rank-constrained formulation can be solved to obtain an approximate global minimum in time that is polynomial in the input size, some problem dependent parameters and desired accuracy. Joint work with Srinadh Bhojanapalli, Nicolas Boumal and Prateek Jain. Prof. Rajesh Sundaresan (ECE, IISc Bengaluru) Title: A double-auction mechanism for mobile data-offloading markets with strategic agents Abstract: We consider a double-auction mechanism for mobile data-offloading. Network operators (users) derive benefit from offloading their traffic to third party WiFi or femtocell network (link-supplier). A link-supplier experiences costs for the additional capacity that he provides. Users and link-supplier have their utilities and cost function as private knowledge. A system designer decomposes the problem into a network problem (with surrogate utilities and surrogate cost functions) and agent problems (one per agent). The surrogate utilities and cost functions are modulated by the agents's bids. Agents' payoffs and costs are then determined by the allocations and prices set by the system designer. We consider a double-auction mechanism for mobile data-offloading. Network operators (users) derive benefit from offloading their traffic to third party WiFi or femtocell network (link-supplier). A link-supplier experiences costs for the additional capacity that he provides. Users and link-supplier have their utilities and cost function as private knowledge. A system designer decomposes the problem into a network problem (with surrogate utilities and surrogate cost functions) and agent problems (one per agent). The surrogate utilities and cost functions are modulated by the agents's bids. Agents' payoffs and costs are then determined by the allocations and prices set by the system designer. It is already known that, if the agents do not anticipate the effect of their actions, a competitive equilibrium exists as a solution to the network and agent problems, and this equilibrium optimizes system utility. However, we will show that, if the agents are strategic (and thus priceanticipating), the presence of strategic supplying agents drives the system to an undesirable equilibrium with zero participation. This is in stark contrast to the setting when link-supplier is not strategic where the efficiency loss is at most 34%. We will then propose a Stackelberg-type modification to the mechanism to alleviate the efficiency loss problem. The system designer first announces the allocation and payment functions. He then invites the supplying agent to announce his bid. He then invites the users to respond to the suppliers' bids. The resulting efficiency loss is characterized in terms of the supplier's cost function, and is significantly reduced to at most 25% for the quadratic cost function.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mathematical Challenges in Stochastic Networks 2747

The workshop was devoted to the discussion of recent progress in modern stochastic network theory and to the exploration of open mathematical challenging problems in the field. The workshop covered a wide range of mathematical topics; while being centered around applied probability, it also included a substantial amount of graph theory and (combinatorial) optimization. Mathematics Subject Class...

متن کامل

Solving single facility goal Weber location problem using stochastic optimization methods

Location theory is one of the most important topics in optimization and operations research. In location problems, the goal is to find the location of one or more facilities in a way such that some criteria such as transportation costs, customer traveling distance, total service time, and cost of servicing are optimized. In this paper, we investigate the goal Weber location problem in which the...

متن کامل

An Inexact-Fuzzy-Stochastic Optimization Model for a Closed Loop Supply Chain Network Design Problem

The development of optimization and mathematical models for closed loop supply chain (CLSC) design has attracted considerable interest over the past decades. However, the uncertainties that are inherent in the network design and the complex interactions among various uncertain parameters are challenging the capabilities of the developed tools. The aim of this paper, therefore, is to propose a n...

متن کامل

سنتز شبکۀ تبادلگر‌های حرارتی با استفاده از ترکیب یک الگوریتم اکتشافی با یک الگوریتم قطعی

The optimization of the utility consumption (steam and cooling water) is an important part for the optimization of process operating cost. To this end, the heat exchanger networks (HEN) are investigated in a process manner. Different approaches are presented for the synthesis of HEN where stochastic algorithms have received more attention recently. In this paper, a combination of Ant Colony Opt...

متن کامل

Robust stability of stochastic fuzzy impulsive recurrent neural networks with\ time-varying delays

In this paper, global robust stability of stochastic impulsive recurrent neural networks with time-varyingdelays which are represented by the Takagi-Sugeno (T-S) fuzzy models is considered. A novel Linear Matrix Inequality (LMI)-based stability criterion is obtained by using Lyapunov functional theory to guarantee the asymptotic stability of uncertain fuzzy stochastic impulsive recurrent neural...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2018