Constraint satisfaction problems. Lirong Xia
|
|
- Fay Charles
- 5 years ago
- Views:
Transcription
1 Constraint satisfaction problems Lirong Xia Spring, 2017
2 Project 1 Ø You can use Windows Ø Read the instruction carefully, make sure you understand the goal search for YOUR CODE HERE Ø Ask and answer questions on Piazza we may give bonus score to insightful answers Please be careful about spoilers Ø State (in the search graph) vs. node (in the search tree) add node in the search tree to fringe add state to the visited sets 2
3 Today s schedule ØConstraint satisfaction problems ØAlgorithms backtracking search filtering forward checking constraint propagation 3
4 Constraint Satisfaction Problems Ø Standard search problems: State is a black box : arbitrary data structure Goal test: any function over states Successor function can be anything Ø Constraint satisfaction problems (CSPs): A special subset of search problems State is defined by variables X i with values from a domain D (sometimes D depends on i ) Goal test is a set of constraints specifying allowable combinations of values for subsets of variables Ø Allows useful general-purpose algorithms with more power than standard search algorithms 4
5 Ø Variables: WA, NT, Q, NSW, V, SA, T Ø Domains: Example: Map-Coloring D = { red, green, blue} Ø Constraints: adjacent regions must have different colors WA NT { } ( WA, NT ) ( red, green ), ( red, blue ), ( green, red ),... Ø Solutions are assignments satisfying all constraints, e.g.: WA = red, NT = green, Q = red, NSW = green, V = red, SA = blue, T = green 5
6 Example: N-Queens ØFormulation 1: Variables: Domains: X ij { 0,1} Constraints i, j,k ( X ij, X ) ik {( 0, 0), ( 0, 1), ( 1, 0) } i, j,k ( X ij, X ) kj {( 0, 0), ( 0, 1), ( 1, 0) } i, j,k ( X ij, X ) i+k, j+k ( 0, 0), ( 0, 1), 1, 0 i, j,k X ij, X i+k, j k ( ), ( 0, 1), 1, 0 i, j X ij = { ( )} ( ) { 0, 0 ( )} N 6
7 Example: N-Queens ØFormulation 2: Variables: Domains: Constraints Q k { 1, 2,3,...N } Q 1 Q 2 Q 3 Q 4 Implicit: -or- Explicit: ( ) i, j non-threatening Q, Q { } ( Q 1,Q ) 2 ( 1, 3), ( 1, 4),... i j 7
8 Constraint Graphs: Goal test Ø Binary CSP: each constraint relates (at most) two variables Ø Binary constraint graph: nodes are variables, arcs show constraints Ø General-purpose CSP algorithms use the graph structure to speed up search. E.g., Tasmania is an independent subproblem! 8
9 Example: Cryptarithmetic Ø Variables (circles): FTUWROX1 X2 X3 Ø Domains: T W O + T W O F O U R { 0, 1, 2, 3, 4, 5, 6, 7, 8, 9} Ø Constraints (boxes): alldiff ( F, T, U, W, R, O) O +O = R +10 X 1 9
10 Example: Sudoku Ø Variables: Each (open) square Ø Domains: { 1, 2,, 9} Ø Constraints: 9-way alldiff for each column 9-way alldiff for each row 9-way alldiff for each region 10
11 ØDiscrete Variables: Finite domains Varieties of CSPs Size d means O(d n ) complete assignments E.g., Boolean CSPs, including Boolean satisfiability (NPcomplete) Infinite domains (integers, strings, etc.) Linear constraints solvable ØContinuous variables: Linear constraints solvable in polynomial time by LP methods 11
12 Varieties of Constraints Ø Variables of Constraints Unary constraints involve a single variable (equiv. to shrinking domains): SA Binary constraints involve pairs of variables: SA WA green Higher-order constraints involve 3 or more variables: e.g., cryptarithmetic column constraints Ø Preferences (soft constraints): E.g., red is better than green Often representable by a cost for each variable assignment Gives constrained optimization problems 12
13 Standard Search Formulation ØStandard search formulation of CSPs (incremental) ØLet s start with the straightforward, dumb approach, then fix it ØStates are defined by the values assigned so far Initial state; the empty assignment, Successor function: assign a value to an unassigned variable Goal test: the current assignment is complete and satisfies all constraint 13
14 Search Methods Ø What would BFS do? Ø What would DFS do? Ø Is BFS better or DFS better? Ø Can we use A*? 14
15 Early detection of non-goal 15
16 Backtracking Search Ø Idea 1: only consider a single variable at each point Variable assignments are commutative, so fix ordering I.e., [WA = red then NT = green] same as [NT = green then WA = red] Only need to consider assignments to a single variable at each step Ø Idea 2: only allow legal assignments at each point Incremental goal test Ø DFS for CSPs with these two improvements is called backtracking search Ø Backtracking search is the basic uninformed algorithm for CSPs Ø Can solve n-queens for n 25 16
17 Backtracking Example 17
18 Improving Backtracking ØOrdering: Which variable should be assigned next? In what order should its values be tried? ØFiltering: Can we detect inevitable failure early? 18
19 Minimum Remaining Values ØMinimum remaining values (MRV): Choose the variable with the fewest legal values ØWhy min rather than max? ØAlso called most constrained variable Ø Fail-fast ordering 19
20 Example For every variable, keep track of which values are still possible Q X X X Q X X Q Q X X X Q X X Q Q X X X Q X X Q X X Q Q X X X Q X X Q X X X X Q Q X X Q Q X X X Q X X Q only one possibility for last column; might as well fill in now only one left for other two columns done! (no real branching needed!)
21 Choosing a value Ø Given a choice of variable: Choose the least constraining value The one that rules out the fewest values in the remaining variables May take some computation to determine this! Ø Why least rather than most? value 1 for SA value 0 for SA 21
22 Filtering: Forward Checking Ø Idea: keep track of remaining values for unassigned variables (using immediate constraints) Ø Idea: terminate when any variable has no legal values 22
23 Filtering: Constraint Propagating Ø Forward checking propagates information from assigned to unassigned variables, but doesn t provide early detection for all failures: step 1 step 2 step 1 step 2 Ø NT and SA cannot both be blue! Ø Why didn t we detect this yet? 23
24 Consistency of An Arc X Y Ø An arc is consistent iff for every x in the tail there is some y in the head which could be assigned without violating a constraint Delete from tail! Ø Forward checking = Enforcing consistency of each arc pointing to the new assignment 24
25 Arc Consistency of a CSP Ø A simple form of propagation makes sure all arcs are consistent: Delete from tail! X X X Ø If V loses a value, neighbors of V need to be rechecked! Ø Arc consistency detects failure earlier than forward checking Ø Can be run as a preprocessor or after each assignment Ø Might be time-consuming 25
Uninformed search. Lirong Xia
Uninformed search Lirong Xia Spring, 2017 Today s schedule ØRational agents ØSearch problems State space graph: modeling the problem Search trees: scratch paper for solution ØUninformed search Depth first
More informationComparison Sorts. EECS 2011 Prof. J. Elder - 1 -
Comparison Sorts - 1 - Sorting Ø We have seen the advantage of sorted data representations for a number of applications q Sparse vectors q Maps q Dictionaries Ø Here we consider the problem of how to efficiently
More informationSupport Vector Machines
Support Vector Machines Linearly Separable Data SVM: Simple Linear Separator hyperplane Which Simple Linear Separator? Classifier Margin Objective #1: Maximize Margin MARGIN MARGIN How s this look? MARGIN
More informationCoalitional Game Theory
Coalitional Game Theory Game Theory Algorithmic Game Theory 1 TOC Coalitional Games Fair Division and Shapley Value Stable Division and the Core Concept ε-core, Least core & Nucleolus Reading: Chapter
More informationCloning in Elections
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence (AAAI-10) Cloning in Elections Edith Elkind School of Physical and Mathematical Sciences Nanyang Technological University Singapore
More informationThe Australian Society for Operations Research
The Australian Society for Operations Research www.asor.org.au ASOR Bulletin Volume 34, Issue, (06) Pages -4 A minimum spanning tree with node index Elias Munapo School of Economics and Decision Sciences,
More informationAnalyzing and Representing Two-Mode Network Data Week 8: Reading Notes
Analyzing and Representing Two-Mode Network Data Week 8: Reading Notes Wasserman and Faust Chapter 8: Affiliations and Overlapping Subgroups Affiliation Network (Hypernetwork/Membership Network): Two mode
More informationCloning in Elections 1
Cloning in Elections 1 Edith Elkind, Piotr Faliszewski, and Arkadii Slinko Abstract We consider the problem of manipulating elections via cloning candidates. In our model, a manipulator can replace each
More informationHoboken Public Schools. Algebra II Honors Curriculum
Hoboken Public Schools Algebra II Honors Curriculum Algebra Two Honors HOBOKEN PUBLIC SCHOOLS Course Description Algebra II Honors continues to build students understanding of the concepts that provide
More informationCS 4407 Algorithms Greedy Algorithms and Minimum Spanning Trees
CS 4407 Algorithms Greedy Algorithms and Minimum Spanning Trees Prof. Gregory Provan Department of Computer Science University College Cork 1 Sample MST 6 5 4 9 14 10 2 3 8 15 Greedy Algorithms When are
More informationPatterns in Congressional Earmarks
Patterns in Congressional Earmarks Chris Musialek University of Maryland, College Park 8 November, 2012 Introduction This dataset from Taxpayers for Common Sense captures Congressional appropriations earmarks
More informationDimension Reduction. Why and How
Dimension Reduction Why and How The Curse of Dimensionality As the dimensionality (i.e. number of variables) of a space grows, data points become so spread out that the ideas of distance and density become
More informationHow hard is it to control sequential elections via the agenda?
How hard is it to control sequential elections via the agenda? Vincent Conitzer Department of Computer Science Duke University Durham, NC 27708, USA conitzer@cs.duke.edu Jérôme Lang LAMSADE Université
More informationFREEDOM ON THE NET 2011: GLOBAL GRAPHS
1 FREEDOM ON THE NET 2011: GLOBAL GRAPHS 37-COUNTRY SCORE COMPARISON (0 Best, 100 Worst) * A green-colored bar represents a status of Free, a yellow-colored one, the status of Partly Free, and a purple-colored
More informationTitle: Solving Problems by Searching AIMA: Chapter 3 (Sections 3.1, 3.2 and 3.3)
B.Y. Choueiry 1 Instructor s notes #5 Title: Solving Problems by Searching AIMA: Chapter 3 (Sections 3.1, 3.2 and 3.3) Introduction to Artificial Intelligence CSCE 476-876, Fall 2017 URL: www.cse.unl.edu/~choueiry/f17-476-876
More informationECE250: Algorithms and Data Structures Trees
ECE250: Algorithms and Data Structures Trees Ladan Tahvildari, PEng, SMIEEE Professor Software Technologies Applied Research (STAR) Group Dept. of Elect. & Comp. Eng. University of Waterloo Materials from
More informationExplaining rational decision making by arguing
Francesca Toni Workshop on Decision Making, Toulouse, 2017 Department of Computing, Imperial College London, UK CLArg (Computational Logic and Argumentation) Group 1/25 Argumentation in AI Non-Monotonic
More informationPolitical Districting for Elections to the German Bundestag: An Optimization-Based Multi-Stage Heuristic Respecting Administrative Boundaries
Political Districting for Elections to the German Bundestag: An Optimization-Based Multi-Stage Heuristic Respecting Administrative Boundaries Sebastian Goderbauer 1 Electoral Districts in Elections to
More informationMaps, Hash Tables and Dictionaries
Maps, Hash Tables and Dictionaries Chapter 9-1 - Outline Ø Maps Ø Hashing Ø Dictionaries Ø Ordered Maps & Dictionaries - 2 - Outline Ø Maps Ø Hashing Ø Dictionaries Ø Ordered Maps & Dictionaries - 3 -
More informationAnalysis of the Reputation System and User Contributions on a Question Answering Website: StackOverflow
Analysis of the Reputation System and User Contributions on a Question Answering Website: StackOverflow Dana Movshovitz-Attias Yair Movshovitz-Attias Peter Steenkiste Christos Faloutsos August 27, 2013
More informationComputational Social Choice: Spring 2017
Computational Social Choice: Spring 2017 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today So far we saw three voting rules: plurality, plurality
More informationMidterm Review. EECS 2011 Prof. J. Elder - 1 -
Midterm Review - 1 - Topics on the Midterm Ø Data Structures & Object-Oriented Design Ø Run-Time Analysis Ø Linear Data Structures Ø The Java Collections Framework Ø Recursion Ø Trees Ø Priority Queues
More informationOverview. Ø Neural Networks are considered black-box models Ø They are complex and do not provide much insight into variable relationships
Neural Networks Overview Ø s are considered black-box models Ø They are complex and do not provide much insight into variable relationships Ø They have the potential to model very complicated patterns
More informationNetworked Games: Coloring, Consensus and Voting. Prof. Michael Kearns Networked Life NETS 112 Fall 2013
Networked Games: Coloring, Consensus and Voting Prof. Michael Kearns Networked Life NETS 112 Fall 2013 Experimental Agenda Human-subject experiments at the intersection of CS, economics, sociology, network
More informationEvent Based Sequential Program Development: Application to Constructing a Pointer Program
Event Based Sequential Program Development: Application to Constructing a Pointer Program Jean-Raymond Abrial Consultant, Marseille, France jr@abrial.org Abstract. In this article, I present an event approach
More informationApproval Voting Theory with Multiple Levels of Approval
Claremont Colleges Scholarship @ Claremont HMC Senior Theses HMC Student Scholarship 2012 Approval Voting Theory with Multiple Levels of Approval Craig Burkhart Harvey Mudd College Recommended Citation
More informationCase Study: Border Protection
Chapter 7 Case Study: Border Protection 7.1 Introduction A problem faced by many countries is that of securing their national borders. The United States Department of Homeland Security states as a primary
More informationIntroduction to Computational Social Choice. Yann Chevaleyre. LAMSADE, Université Paris-Dauphine
Introduction to Computational Social Choice Yann Chevaleyre Jérôme Lang LAMSADE, Université Paris-Dauphine Computational social choice: two research streams From social choice theory to computer science
More informationInfluence in Social Networks
CSCI 3210: Computational Game Theory Influence Games Ref: Irfan & Ortiz, AI (2014) Reading: Sections 1 3(up to pg. 86), Sections 4.5, 5 (no proof), 6 bowdoin.edu/~mirfan/papers/irfan_ortiz_influence_games_ai2014.pdf
More informationStudies in Computational Aspects of Voting
Studies in Computational Aspects of Voting a Parameterized Complexity Perspective Dedicated to Michael R. Fellows on the occasion of his 60 th birthday Nadja Betzler, Robert Bredereck, Jiehua Chen, and
More informationVoting and Complexity
Voting and Complexity legrand@cse.wustl.edu Voting and Complexity: Introduction Outline Introduction Hardness of finding the winner(s) Polynomial systems NP-hard systems The minimax procedure [Brams et
More informationMulti-Winner Elections: Complexity of Manipulation, Control, and Winner-Determination
Multi-Winner Elections: Complexity of Manipulation, Control, and Winner-Determination Ariel D. Procaccia and Jeffrey S. Rosenschein and Aviv Zohar School of Engineering and Computer Science The Hebrew
More informationTitle: Local Search Required reading: AIMA, Chapter 4 LWH: Chapters 6, 10, 13 and 14.
B.Y. Choueiry 1 Instructor s notes #8 Title: Local Search Required reading: AIMA, Chapter 4 LWH: Chapters 6, 10, 13 and 14. Introduction to Artificial Intelligence CSCE 476-876, Fall 2017 URL: www.cse.unl.edu/
More informationDecomposition and Complexity of Hereditary History Preserving Bisimulation on BPP
Decomposition and Complexity of Hereditary History Preserving Bisimulation on BPP Sibylle Fröschle and Sławomir Lasota Institute of Informatics, Warsaw University 02 097 Warszawa, Banacha 2, Poland sib,sl
More informationComputational social choice Combinatorial voting. Lirong Xia
Computational social choice Combinatorial voting Lirong Xia Feb 23, 2016 Last class: the easy-tocompute axiom We hope that the outcome of a social choice mechanism can be computed in p-time P: positional
More informationSubreddit Recommendations within Reddit Communities
Subreddit Recommendations within Reddit Communities Vishnu Sundaresan, Irving Hsu, Daryl Chang Stanford University, Department of Computer Science ABSTRACT: We describe the creation of a recommendation
More informationNetwork Indicators: a new generation of measures? Exploratory review and illustration based on ESS data
Network Indicators: a new generation of measures? Exploratory review and illustration based on ESS data Elsa Fontainha 1, Edviges Coelho 2 1 ISEG Technical University of Lisbon, e-mail: elmano@iseg.utl.pt
More informationPathbreakers? Women's Electoral Success and Future Political Participation
Pathbreakers? Women's Electoral Success and Future Political Participation Sonia Bhalotra, University of Essex Irma Clots-Figueras, Universidad Carlos III de Madrid Lakshmi Iyer, University of Notre Dame
More informationMaps and Hash Tables. EECS 2011 Prof. J. Elder - 1 -
Maps and Hash Tables - 1 - Outline Ø Maps Ø Hashing Ø Multimaps Ø Ordered Maps - 2 - Learning Outcomes Ø By understanding this lecture, you should be able to: Ø Outline the ADT for a map and a multimap
More informationHyo-Shin Kwon & Yi-Yi Chen
Hyo-Shin Kwon & Yi-Yi Chen Wasserman and Fraust (1994) Two important features of affiliation networks The focus on subsets (a subset of actors and of events) the duality of the relationship between actors
More informationIntroduction to Game Theory. Lirong Xia
Introduction to Game Theory Lirong Xia Fall, 2016 Homework 1 2 Announcements ØWe will use LMS for submission and grading ØPlease just submit one copy ØPlease acknowledge your team mates 3 Ø Show the math
More informationFine-Grained Opinion Extraction with Markov Logic Networks
Fine-Grained Opinion Extraction with Markov Logic Networks Luis Gerardo Mojica and Vincent Ng Human Language Technology Research Institute University of Texas at Dallas 1 Fine-Grained Opinion Extraction
More informationSolutions of Implication Constraints yield Type Inference for More General Algebraic Data Types
Solutions of Implication Constraints yield Type Inference for More General Algebraic Data Types Peter J. Stuckey NICTA Victoria Laboratory Department of Computer Science and Software Engineering The University
More informationoductivity Estimates for Alien and Domestic Strawberry Workers and the Number of Farm Workers Required to Harvest the 1988 Strawberry Crop
oductivity Estimates for Alien and Domestic Strawberry Workers and the Number of Farm Workers Required to Harvest the 1988 Strawberry Crop Special Report 828 April 1988 UPI! Agricultural Experiment Station
More informationVOTING DYNAMICS IN INNOVATION SYSTEMS
VOTING DYNAMICS IN INNOVATION SYSTEMS Voting in social and collaborative systems is a key way to elicit crowd reaction and preference. It enables the diverse perspectives of the crowd to be expressed and
More informationPriority Queues & Heaps
Priority Queues & Heaps Chapter 8-1 - The Java Collections Framework (Ordered Data Types) Interface Abstract Class Class Iterable Collection Queue Abstract Collection List Abstract Queue Abstract List
More informationSimple methods for single winner elections
Simple methods for single winner elections Christoph Börgers Mathematics Department Tufts University Medford, MA April 14, 2018 http://emerald.tufts.edu/~cborgers/ I have posted these slides there. 1 /
More informationMinimum Spanning Tree Union-Find Data Structure. Feb 28, 2018 CSCI211 - Sprenkle. Comcast wants to lay cable in a neighborhood. Neighborhood Layout
Objec&ves Minimum Spanning Tree Union-Find Data Structure Feb, 0 CSCI - Sprenkle Started teasing out some algorithms. Laying Cable Focus on commonality: what should our final solution look like? Comcast
More informationPriority Queues & Heaps
Priority Queues & Heaps - 1 - Outline Ø The Priority Queue class of the Java Collections Framework Ø Total orderings, the Comparable Interface and the Comparator Class Ø Heaps Ø Adaptable Priority Queues
More informationComputational Social Processes. Lirong Xia
Computational Social Processes Lirong Xia Fall, 2016 This class ØEconomics: decision making by multiple actors, each with individual preferences, capabilities, and information, and motivated to act in
More informationDATA TO POLICY PROJECT. Using real data to solve real problems
DATA TO POLICY PROJECT Using real data to solve real problems INSPIRATION Giving students a constructive voice to respond to police shootings AND Get your data USED You know questions that need to be answered
More informationCluster Analysis. (see also: Segmentation)
Cluster Analysis (see also: Segmentation) Cluster Analysis Ø Unsupervised: no target variable for training Ø Partition the data into groups (clusters) so that: Ø Observations within a cluster are similar
More informationGeneralized Scoring Rules: A Framework That Reconciles Borda and Condorcet
Generalized Scoring Rules: A Framework That Reconciles Borda and Condorcet Lirong Xia Harvard University Generalized scoring rules [Xia and Conitzer 08] are a relatively new class of social choice mechanisms.
More informationVoting on combinatorial domains. LAMSADE, CNRS Université Paris-Dauphine. FET-11, session on Computational Social Choice
Voting on combinatorial domains Jérôme Lang LAMSADE, CNRS Université Paris-Dauphine FET-11, session on Computational Social Choice A key question: structure of the setx of candidates? Example 1 choosing
More informationParameterized Control Complexity in Bucklin Voting and in Fallback Voting 1
Parameterized Control Complexity in Bucklin Voting and in Fallback Voting 1 Gábor Erdélyi and Michael R. Fellows Abstract We study the parameterized control complexity of Bucklin voting and of fallback
More informationDoctoral Research Agenda
Doctoral Research Agenda Peter A. Hook Information Visualization Laboratory March 22, 2006 Information Science Information Visualization, Knowledge Organization Systems, Bibliometrics Law Legal Informatics,
More informationAustralian AI 2015 Tutorial Program Computational Social Choice
Australian AI 2015 Tutorial Program Computational Social Choice Haris Aziz and Nicholas Mattei www.csiro.au Social Choice Given a collection of agents with preferences over a set of things (houses, cakes,
More informationOn the Complexity of Voting Manipulation under Randomized Tie-Breaking
Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence On the Complexity of Voting Manipulation under Randomized Tie-Breaking Svetlana Obraztsova Edith Elkind School
More informationComputational Inelasticity FHLN05. Assignment A non-linear elasto-plastic problem
Computational Inelasticity FHLN05 Assignment 2016 A non-linear elasto-plastic problem General instructions A written report should be submitted to the Division of Solid Mechanics no later than 1 November
More informationCSCI211: Intro Objectives
CSCI211: Intro Objectives Introduction to Algorithms, Analysis Course summary Reviewing proof techniques Jan 7, 2019 Sprenkle CSCI211 1 My Bio From Dallastown, PA B.S., Gettysburg College M.S., Duke University
More informationComplexity of Strategic Behavior in Multi-Winner Elections
Journal of Artificial Intelligence Research 33 (2008) 149 178 Submitted 03/08; published 09/08 Complexity of Strategic Behavior in Multi-Winner Elections Reshef Meir Ariel D. Procaccia Jeffrey S. Rosenschein
More informationHASHGRAPH CONSENSUS: DETAILED EXAMPLES
HASHGRAPH CONSENSUS: DETAILED EXAMPLES LEEMON BAIRD BAIRD@SWIRLDS.COM DECEMBER 11, 2016 SWIRLDS TECH REPORT SWIRLDS-TR-2016-02 ABSTRACT: The Swirlds hashgraph consensus algorithm is explained through a
More informationAggregating Dependency Graphs into Voting Agendas in Multi-Issue Elections
Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence Aggregating Dependency Graphs into Voting Agendas in Multi-Issue Elections Stéphane Airiau, Ulle Endriss, Umberto
More informationCombating Friend Spam Using Social Rejections
Combating Friend Spam Using Social Rejections Qiang Cao Duke University Michael Sirivianos Xiaowei Yang Kamesh Munagala Cyprus Univ. of Technology Duke University Duke University Friend Spam in online
More informationChapter 11. Weighted Voting Systems. For All Practical Purposes: Effective Teaching
Chapter Weighted Voting Systems For All Practical Purposes: Effective Teaching In observing other faculty or TA s, if you discover a teaching technique that you feel was particularly effective, don t hesitate
More informationHow to identify experts in the community?
How to identify experts in the community? Balázs Sziklai XXXII. Magyar Operációkutatás Konferencia, Cegléd e-mail: sziklai.balazs@krtk.mta.hu 2017. 06. 15. Sziklai (CERS HAS) 1 / 34 1 Introduction Mechanism
More informationProbabilistic earthquake early warning in complex earth models using prior sampling
Probabilistic earthquake early warning in complex earth models using prior sampling Andrew Valentine, Paul Käufl & Jeannot Trampert EGU 2016 21 st April www.geo.uu.nl/~andrew a.p.valentine@uu.nl A case
More informationPolydisciplinary Faculty of Larache Abdelmalek Essaadi University, MOROCCO 3 Department of Mathematics and Informatics
International Journal of Pure and Applied Mathematics Volume 115 No. 4 2017, 801-812 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: 10.12732/ijpam.v115i4.13
More informationGenetic Algorithms with Elitism-Based Immigrants for Changing Optimization Problems
Genetic Algorithms with Elitism-Based Immigrants for Changing Optimization Problems Shengxiang Yang Department of Computer Science, University of Leicester University Road, Leicester LE1 7RH, United Kingdom
More informationHoboken Public Schools. College Algebra Curriculum
Hoboken Public Schools College Algebra Curriculum College Algebra HOBOKEN PUBLIC SCHOOLS Course Description College Algebra reflects the New Jersey learning standards at the high school level and is designed
More informationAn Empirical Study of the Manipulability of Single Transferable Voting
An Empirical Study of the Manipulability of Single Transferable Voting Toby Walsh arxiv:005.5268v [cs.ai] 28 May 200 Abstract. Voting is a simple mechanism to combine together the preferences of multiple
More informationChapter 8: Recursion
Chapter 8: Recursion Presentation slides for Java Software Solutions for AP* Computer Science 3rd Edition by John Lewis, William Loftus, and Cara Cocking Java Software Solutions is published by Addison-Wesley
More informationRandomized Pursuit-Evasion in Graphs
Randomized Pursuit-Evasion in Graphs Micah Adler Harald Räcke Ý Naveen Sivadasan Þ Christian Sohler Ý Berthold Vöcking Þ Abstract We analyze a randomized pursuit-evasion game on graphs. This game is played
More informationManipulating Two Stage Voting Rules
Manipulating Two Stage Voting Rules Nina Narodytska and Toby Walsh Abstract We study the computational complexity of computing a manipulation of a two stage voting rule. An example of a two stage voting
More informationarxiv: v5 [cs.gt] 21 Jun 2014
Schulze and Ranked-Pairs Voting Are Fixed-Parameter Tractable to Bribe, Manipulate, and Control arxiv:1210.6963v5 [cs.gt] 21 Jun 2014 Lane A. Hemaspaandra, Rahman Lavaee Department of Computer Science
More informationEvaluation of election outcomes under uncertainty
Evaluation of election outcomes under uncertainty Noam Hazon, Yonatan umann, Sarit Kraus, Michael Wooldridge Department of omputer Science Department of omputer Science ar-ilan University University of
More informationWind power integration and consumer behavior: a complementarity approach
1 Wind power integration and consumer behavior: a complementarity approach 8 th Annual Trans-Atlantic INFRADAY Conference on Energy November 7 th, 2014 Ali Daraeepour, Duke University Dr. Jalal Kazempour,
More informationTitle: Adverserial Search AIMA: Chapter 5 (Sections 5.1, 5.2 and 5.3)
B.Y. Choueiry 1 Instructor s notes #9 Title: dverserial Search IM: Chapter 5 (Sections 5.1, 5.2 and 5.3) Introduction to rtificial Intelligence CSCE 476-876, Fall 2017 URL: www.cse.unl.edu/ choueiry/f17-476-876
More informationHat problem on a graph
Hat problem on a graph Submitted by Marcin Piotr Krzywkowski to the University of Exeter as a thesis for the degree of Doctor of Philosophy by Publication in Mathematics In April 2012 This thesis is available
More informationComplexity of Manipulating Elections with Few Candidates
Complexity of Manipulating Elections with Few Candidates Vincent Conitzer and Tuomas Sandholm Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213 {conitzer, sandholm}@cs.cmu.edu
More informationPASW & Hand Calculations for ANOVA
PASW & Hand Calculations for ANOVA Gravetter & Wallnau Chapter 13, Problem 6 One possible reason that some birds migrate and others don t is intelligence. Birds with small brains relative to their body
More informationComputational Social Choice: Spring 2007
Computational Social Choice: Spring 2007 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today This lecture will be an introduction to voting
More informationFile Systems: Fundamentals
File Systems: Fundamentals 1 Files What is a file? Ø A named collection of related information recorded on secondary storage (e.g., disks) File attributes Ø Name, type, location, size, protection, creator,
More informationInstructors: Tengyu Ma and Chris Re
Instructors: Tengyu Ma and Chris Re cs229.stanford.edu Ø Probability (CS109 or STAT 116) Ø distribution, random variable, expectation, conditional probability, variance, density Ø Linear algebra (Math
More informationDesigning police patrol districts on street network
Designing police patrol districts on street network Huanfa Chen* 1 and Tao Cheng 1 1 SpaceTimeLab for Big Data Analytics, Department of Civil, Environmental, and Geomatic Engineering, University College
More informationEstimating the Margin of Victory for Instant-Runoff Voting
Estimating the Margin of Victory for Instant-Runoff Voting David Cary Abstract A general definition is proposed for the margin of victory of an election contest. That definition is applied to Instant Runoff
More informationRural Sprawl in Metropolitan Portland
Rural Sprawl in Metropolitan Portland A comparison of growth management in Oregon and Washington Clark Williams-Derry July 2012 As a single metropolis split between two states, greater Portland, Oregon,
More informationMidterm Review. EECS 2011 Prof. J. Elder - 1 -
Midterm Review - 1 - Topics on the Midterm Ø Data Structures & Object-Oriented Design Ø Run-Time Analysis Ø Linear Data Structures Ø The Java Collections Framework Ø Recursion Ø Trees Ø Priority Queues
More informationNP-Hard Manipulations of Voting Schemes
NP-Hard Manipulations of Voting Schemes Elizabeth Cross December 9, 2005 1 Introduction Voting schemes are common social choice function that allow voters to aggregate their preferences in a socially desirable
More informationUniversality of election statistics and a way to use it to detect election fraud.
Universality of election statistics and a way to use it to detect election fraud. Peter Klimek http://www.complex-systems.meduniwien.ac.at P. Klimek (COSY @ CeMSIIS) Election statistics 26. 2. 2013 1 /
More informationRelative Performance Evaluation and the Turnover of Provincial Leaders in China
Relative Performance Evaluation and the Turnover of Provincial Leaders in China Ye Chen Hongbin Li Li-An Zhou May 1, 2005 Abstract Using data from China, this paper examines the role of relative performance
More informationA comparative analysis of subreddit recommenders for Reddit
A comparative analysis of subreddit recommenders for Reddit Jay Baxter Massachusetts Institute of Technology jbaxter@mit.edu Abstract Reddit has become a very popular social news website, but even though
More informationPlanning versus Free Choice in Scientific Research
Planning versus Free Choice in Scientific Research Martin J. Beckmann a a Brown University and T U München Abstract The potential benefits of centrally planning the topics of scientific research and who
More informationCoalitional Game Theory for Communication Networks: A Tutorial
Coalitional Game Theory for Communication Networks: A Tutorial Walid Saad 1, Zhu Han 2, Mérouane Debbah 3, Are Hjørungnes 1 and Tamer Başar 4 1 UNIK - University Graduate Center, University of Oslo, Kjeller,
More informationBribery in voting with CP-nets
Ann Math Artif Intell (2013) 68:135 160 DOI 10.1007/s10472-013-9330-5 Bribery in voting with CP-nets Nicholas Mattei Maria Silvia Pini Francesca Rossi K. Brent Venable Published online: 7 February 2013
More informationPriority Queues & Heaps
Priority Queues & Heaps - 1 - Outline Ø The Priority Queue ADT Ø Total orderings, the Comparable Interface and the Comparator Class Ø Heaps Ø Adaptable Priority Queues - 2 - Outcomes Ø By understanding
More informationThe Integer Arithmetic of Legislative Dynamics
The Integer Arithmetic of Legislative Dynamics Kenneth Benoit Trinity College Dublin Michael Laver New York University July 8, 2005 Abstract Every legislature may be defined by a finite integer partition
More informationEconomics 470 Some Notes on Simple Alternatives to Majority Rule
Economics 470 Some Notes on Simple Alternatives to Majority Rule Some of the voting procedures considered here are not considered as a means of revealing preferences on a public good issue, but as a means
More informationDYNAMIC RISK MANAGEMENT IN ELECTRICITY PORTFOLIO OPTIMIZATION VIA POLYHEDRAL RISK FUNCTIONALS
DYNAMIC RISK MANAGEMENT IN ELECTRICITY PORTFOLIO OPTIMIZATION VIA POLYHEDRAL RISK FUNCTIONALS Andreas Eichhorn Department of Mathematics Humboldt University 199 Berlin, Germany Email eichhorn@math.hu-berlin.de
More informationParty Cue Inference Experiment. January 10, Research Question and Objective
Party Cue Inference Experiment January 10, 2017 Research Question and Objective Our overarching goal for the project is to answer the question: when and how do political parties influence public opinion?
More information