Zum Hauptinhalt springen

Showing 101–150 of 156 results for author: Dorr, B

.
  1. Control of Large Swarms via Random Finite Set Theory

    Authors: Bryce Doerr, Richard Linares

    Abstract: Controlling large swarms of robotic agents has many challenges including, but not limited to, computational complexity due to the number of agents, uncertainty in the functionality of each agent in the swarm, and uncertainty in the swarm's configuration. This work generalizes the swarm state using Random Finite Set (RFS) theory and solves the control problem using model predictive control which na… ▽ More

    Submitted 11 April, 2018; v1 submitted 22 January, 2018; originally announced January 2018.

  2. arXiv:1801.06733  [pdf, ps, other

    cs.DS cs.DM cs.NE math.PR

    Probabilistic Tools for the Analysis of Randomized Optimization Heuristics

    Authors: Benjamin Doerr

    Abstract: This chapter collects several probabilistic tools that proved to be useful in the analysis of randomized search heuristics. This includes classic material like Markov, Chebyshev and Chernoff inequalities, but also lesser known topics like stochastic domination and coupling or Chernoff bounds for geometrically distributed random variables and for negatively correlated random variables. Most of the… ▽ More

    Submitted 21 September, 2021; v1 submitted 20 January, 2018; originally announced January 2018.

    Comments: 91 pages. Microscopic changes over the previous version

    Journal ref: In Benjamin Doerr and Frank Neumann, editors, Theory of Evolutionary Computation: Recent Developments in Discrete Optimization, pages 1-87. Springer, 2020

  3. Better Runtime Guarantees Via Stochastic Domination

    Authors: Benjamin Doerr

    Abstract: Apart from few exceptions, the mathematical runtime analysis of evolutionary algorithms is mostly concerned with expected runtimes. In this work, we argue that stochastic domination is a notion that should be used more frequently in this area. Stochastic domination allows to formulate much more informative performance guarantees, it allows to decouple the algorithm analysis into the true algorithm… ▽ More

    Submitted 23 August, 2018; v1 submitted 13 January, 2018; originally announced January 2018.

    Comments: Significantly extended version of a paper that appeared in the proceedings of EvoCOP 2018

    Journal ref: Theoretical Computer Science, 773:115-137, 2019

  4. arXiv:1712.00519  [pdf, ps, other

    math.PR cs.DS cs.LG cs.NE

    An Elementary Analysis of the Probability That a Binomial Random Variable Exceeds Its Expectation

    Authors: Benjamin Doerr

    Abstract: We give an elementary proof of the fact that a binomial random variable $X$ with parameters $n$ and $0.29/n \le p < 1$ with probability at least $1/4$ strictly exceeds its expectation. We also show that for $1/n \le p < 1 - 1/n$, $X$ exceeds its expectation by more than one with probability at least $0.0370$. Both probabilities approach $1/2$ when $np$ and $n(1-p)$ tend to infinity.

    Submitted 4 January, 2018; v1 submitted 1 December, 2017; originally announced December 2017.

    Comments: v2: Minor change in the presentation of previous works (took into account the new version of Pel[16]). v3: Minor change in the presentation of previous works (the proof of Lemma 6.4 in [RT11] gives a significantly stronger result than what is stated in the Lemma itself). v4: Minor changes (typos, mentioned the work of Slud)

    Journal ref: Statistics and Probability Letters, 139:67-74, 2018

  5. Probabilistic Lower Bounds for the Discrepancy of Latin Hypercube Samples

    Authors: Benjamin Doerr, Carola Doerr, Michael Gnewuch

    Abstract: We provide probabilistic lower bounds for the star discrepancy of Latin hypercube samples. These bounds are sharp in the sense that they match the recent probabilistic upper bounds for the star discrepancy of Latin hypercube samples proved in [M.~Gnewuch, N.~Hebbinghaus. "Discrepancy bounds for a class of negatively dependent random points including Latin hypercube samples". Preprint 2016.]. Toget… ▽ More

    Submitted 26 July, 2017; originally announced July 2017.

    Journal ref: Contemporary Computational Mathematics -- A Celebration of the 80th Birthday of Ian Sloan, J. Dick, F. Y. Kuo, H. Wozniakowski (Eds.), 339-350, Springer, 2018

  6. Runtime Analysis of the $(1+(λ,λ))$ Genetic Algorithm on Random Satisfiable 3-CNF Formulas

    Authors: Maxim Buzdalov, Benjamin Doerr

    Abstract: The $(1+(λ,λ))$ genetic algorithm, first proposed at GECCO 2013, showed a surprisingly good performance on so me optimization problems. The theoretical analysis so far was restricted to the OneMax test function, where this GA profited from the perfect fitness-distance correlation. In this work, we conduct a rigorous runtime analysis of this GA on random 3-SAT instances in the planted solution mode… ▽ More

    Submitted 14 April, 2017; originally announced April 2017.

    Comments: An extended abstract of this report will appear in the proceedings of the 2017 Genetic and Evolutionary Computation Conference (GECCO 2017)

  7. The (1+$λ$) Evolutionary Algorithm with Self-Adjusting Mutation Rate

    Authors: Benjamin Doerr, Christian Gießen, Carsten Witt, Jing Yang

    Abstract: We propose a new way to self-adjust the mutation rate in population-based evolutionary algorithms in discrete search spaces. Roughly speaking, it consists of creating half the offspring with a mutation rate that is twice the current mutation rate and the other half with half the current rate. The mutation rate is then updated to the rate used in that subpopulation which contains the best offspring… ▽ More

    Submitted 25 May, 2018; v1 submitted 7 April, 2017; originally announced April 2017.

    Comments: An extended abstract of this report appeared in the proceedings of the 2017 Genetic and Evolutionary Computation Conference (GECCO 2017), https://doi.org/10.1145/3071178.3071279. Version 2: several extensions, most notably regarding experimental results; Version 3: revised presentation and added more experiments

  8. arXiv:1703.03334  [pdf, other

    cs.NE

    Fast Genetic Algorithms

    Authors: Benjamin Doerr, Huu Phuoc Le, Régis Makhmara, Ta Duy Nguyen

    Abstract: For genetic algorithms using a bit-string representation of length~$n$, the general recommendation is to take $1/n$ as mutation rate. In this work, we discuss whether this is really justified for multimodal functions. Taking jump functions and the $(1+1)$ evolutionary algorithm as the simplest example, we observe that larger mutation rates give significantly better runtimes. For the $\jump_{m,n}$… ▽ More

    Submitted 15 March, 2017; v1 submitted 9 March, 2017; originally announced March 2017.

    Journal ref: Proceedings of GECCO 2017

  9. arXiv:1604.03277  [pdf, ps, other

    cs.NE cs.DS

    The Right Mutation Strength for Multi-Valued Decision Variables

    Authors: Benjamin Doerr, Carola Doerr, Timo Kötzing

    Abstract: The most common representation in evolutionary computation are bit strings. This is ideal to model binary decision variables, but less useful for variables taking more values. With very little theoretical work existing on how to use evolutionary algorithms for such optimization problems, we study the run time of simple evolutionary algorithms on some OneMax-like functions defined over… ▽ More

    Submitted 12 April, 2016; originally announced April 2016.

    Comments: an extended abstract of this work is to appear at GECCO 2016

    ACM Class: F.2.2

  10. arXiv:1604.01088  [pdf, ps, other

    cs.NE cs.DS

    Optimal Parameter Settings for the $(1+(λ, λ))$ Genetic Algorithm

    Authors: Benjamin Doerr

    Abstract: The $(1+(λ,λ))$ genetic algorithm is one of the few algorithms for which a super-constant speed-up through the use of crossover could be proven. So far, this algorithm has been used with parameters based also on intuitive considerations. In this work, we rigorously regard the whole parameter space and show that the asymptotic time complexity proven by Doerr and Doerr (GECCO 2015) for the intuitive… ▽ More

    Submitted 28 July, 2016; v1 submitted 4 April, 2016; originally announced April 2016.

    Comments: Extended version of a paper that appeared at GECCO'16

  11. arXiv:1603.06113  [pdf, other

    cs.CR cs.DM

    Improved Protocols and Hardness Results for the Two-Player Cryptogenography Problem

    Authors: Benjamin Doerr, Marvin Künnemann

    Abstract: The cryptogenography problem, introduced by Brody, Jakobsen, Scheder, and Winkler (ITCS 2014), is to collaboratively leak a piece of information known to only one member of a group (i)~without revealing who was the origin of this information and (ii)~without any private communication, neither during the process nor before. Despite several deep structural results, even the smallest case of leaking… ▽ More

    Submitted 19 March, 2016; originally announced March 2016.

  12. arXiv:1506.05937  [pdf, ps, other

    cs.NE

    A Tight Runtime Analysis of the $(1+(λ, λ))$ Genetic Algorithm on OneMax

    Authors: Benjamin Doerr, Carola Doerr

    Abstract: Understanding how crossover works is still one of the big challenges in evolutionary computation research, and making our understanding precise and proven by mathematical means might be an even bigger one. As one of few examples where crossover provably is useful, the $(1+(λ, λ))$ Genetic Algorithm (GA) was proposed recently in [Doerr, Doerr, Ebel: TCS 2015]. Using the fitness level method, the ex… ▽ More

    Submitted 19 June, 2015; originally announced June 2015.

    Comments: This is a preliminary version of a paper that is to appear at Genetic and Evolutionary Computation Conference (GECCO 2015)

  13. arXiv:1506.05913  [pdf, ps, other

    cs.NE

    Solving Problems with Unknown Solution Length at (Almost) No Extra Cost

    Authors: Benjamin Doerr, Carola Doerr, Timo Kötzing

    Abstract: Most research in the theory of evolutionary computation assumes that the problem at hand has a fixed problem size. This assumption does not always apply to real-world optimization challenges, where the length of an optimal solution may be unknown a priori. Following up on previous work of Cathabard, Lehre, and Yao [FOGA 2011] we analyze variants of the (1+1) evolutionary algorithm for problems w… ▽ More

    Submitted 19 June, 2015; originally announced June 2015.

    Comments: This is a preliminary version of a paper that is to appear at the Genetic and Evolutionary Computation Conference (GECCO 2015)

  14. arXiv:1506.04566  [pdf, other

    cs.CV math.OC

    Optimising Spatial and Tonal Data for PDE-based Inpainting

    Authors: Laurent Hoeltgen, Markus Mainberger, Sebastian Hoffmann, Joachim Weickert, Ching Hoo Tang, Simon Setzer, Daniel Johannsen, Frank Neumann, Benjamin Doerr

    Abstract: Some recent methods for lossy signal and image compression store only a few selected pixels and fill in the missing structures by inpainting with a partial differential equation (PDE). Suitable operators include the Laplacian, the biharmonic operator, and edge-enhancing anisotropic diffusion (EED). The quality of such approaches depends substantially on the selection of the data that is kept. Opti… ▽ More

    Submitted 15 June, 2015; originally announced June 2015.

    MSC Class: 94A08; 65Nxx; 65Kxx

  15. arXiv:1504.03212  [pdf, other

    cs.NE

    Optimal Parameter Choices Through Self-Adjustment: Applying the 1/5-th Rule in Discrete Settings

    Authors: Benjamin Doerr, Carola Doerr

    Abstract: While evolutionary algorithms are known to be very successful for a broad range of applications, the algorithm designer is often left with many algorithmic choices, for example, the size of the population, the mutation rates, and the crossover rates of the algorithm. These parameters are known to have a crucial influence on the optimization time, and thus need to be chosen carefully, a task that o… ▽ More

    Submitted 13 April, 2015; originally announced April 2015.

    Comments: This is the full version of a paper that is to appear at GECCO 2015

  16. arXiv:1503.01190  [pdf, other

    cs.CL cs.LG stat.ML

    Statistical modality tagging from rule-based annotations and crowdsourcing

    Authors: Vinodkumar Prabhakaran, Michael Bloodgood, Mona Diab, Bonnie Dorr, Lori Levin, Christine D. Piatko, Owen Rambow, Benjamin Van Durme

    Abstract: We explore training an automatic modality tagger. Modality is the attitude that a speaker might have toward an event or state. One of the main hurdles for training a linguistic tagger is gathering training data. This is particularly problematic for training a tagger for modality because modality triggers are sparse for the overwhelming majority of sentences. We investigate an approach to automatic… ▽ More

    Submitted 3 March, 2015; originally announced March 2015.

    Comments: 8 pages, 6 tables; appeared in Proceedings of the Workshop on Extra-Propositional Aspects of Meaning in Computational Linguistics, July 2012; In Proceedings of the Workshop on Extra-Propositional Aspects of Meaning in Computational Linguistics, pages 57-64, Jeju, Republic of Korea, July 2012. Association for Computational Linguistics

    ACM Class: I.2.7; I.2.6; I.5.1; I.5.4

    Journal ref: In Proceedings of the Workshop on Extra-Propositional Aspects of Meaning in Computational Linguistics, pages 57-64, Jeju, Republic of Korea, July 2012. Association for Computational Linguistics

  17. arXiv:1502.01682  [pdf, other

    cs.CL cs.LG stat.ML

    Use of Modality and Negation in Semantically-Informed Syntactic MT

    Authors: Kathryn Baker, Michael Bloodgood, Bonnie J. Dorr, Chris Callison-Burch, Nathaniel W. Filardo, Christine Piatko, Lori Levin, Scott Miller

    Abstract: This paper describes the resource- and system-building efforts of an eight-week Johns Hopkins University Human Language Technology Center of Excellence Summer Camp for Applied Language Exploration (SCALE-2009) on Semantically-Informed Machine Translation (SIMT). We describe a new modality/negation (MN) annotation scheme, the creation of a (publicly available) MN lexicon, and two automated MN tagge… ▽ More

    Submitted 5 February, 2015; originally announced February 2015.

    Comments: 28 pages, 13 figures, 2 tables; appeared in Computational Linguistics, 38(2):411-438, 2012

    ACM Class: I.2.7; I.2.6; I.5.1; I.5.4

    Journal ref: Computational Linguistics, 38(2):411-438, 2012

  18. arXiv:1410.4868  [pdf, other

    cs.CL

    A Modality Lexicon and its use in Automatic Tagging

    Authors: Kathryn Baker, Michael Bloodgood, Bonnie J. Dorr, Nathaniel W. Filardo, Lori Levin, Christine Piatko

    Abstract: This paper describes our resource-building results for an eight-week JHU Human Language Technology Center of Excellence Summer Camp for Applied Language Exploration (SCALE-2009) on Semantically-Informed Machine Translation. Specifically, we describe the construction of a modality annotation scheme, a modality lexicon, and two automated modality taggers that were built using the lexicon and annotat… ▽ More

    Submitted 17 October, 2014; originally announced October 2014.

    Comments: 6 pages, 5 figures; appeared in Proceedings of the Seventh International Conference on Language Resources and Evaluation (LREC'10), May 2010

    ACM Class: I.2.7

    Journal ref: In Proceedings of the Seventh International Conference on Language Resources and Evaluation (LREC'10), pages 1402-1407, Valletta, Malta, May 2010. European Language Resources Association

  19. arXiv:1409.7085  [pdf, other

    cs.CL cs.LG stat.ML

    Semantically-Informed Syntactic Machine Translation: A Tree-Grafting Approach

    Authors: Kathryn Baker, Michael Bloodgood, Chris Callison-Burch, Bonnie J. Dorr, Nathaniel W. Filardo, Lori Levin, Scott Miller, Christine Piatko

    Abstract: We describe a unified and coherent syntactic framework for supporting a semantically-informed syntactic approach to statistical machine translation. Semantically enriched syntactic tags assigned to the target-language training texts improved translation quality. The resulting system significantly outperformed a linguistically naive baseline model (Hiero), and reached the highest scores yet reporte… ▽ More

    Submitted 24 September, 2014; originally announced September 2014.

    Comments: 10 pages, 7 figures, 3 tables; appeared in Proceedings of the Ninth Conference of the Association for Machine Translation in the Americas (AMTA), October 2010

    ACM Class: I.2.7; I.2.6; I.5.1; I.5.4

    Journal ref: In Proceedings of the Ninth Conference of the Association for Machine Translation in the Americas (AMTA), Denver, Colorado, October 2010

  20. arXiv:1403.7806  [pdf, ps, other

    cs.NE

    Unbiased Black-Box Complexities of Jump Functions

    Authors: Benjamin Doerr, Carola Doerr, Timo Kötzing

    Abstract: We analyze the unbiased black-box complexity of jump functions with small, medium, and large sizes of the fitness plateau surrounding the optimal solution. Among other results, we show that when the jump size is $(1/2 - \varepsilon)n$, that is, only a small constant fraction of the fitness values is visible, then the unbiased black-box complexities for arities $3$ and higher are of the same orde… ▽ More

    Submitted 16 October, 2014; v1 submitted 30 March, 2014; originally announced March 2014.

    Comments: This paper is based on results presented in the conference versions [GECCO 2011] and [GECCO 2014]

    ACM Class: F.2.2

  21. arXiv:1402.0556  [pdf

    cs.IR cs.CL

    Generating Extractive Summaries of Scientific Paradigms

    Authors: Vahed Qazvinian, Dragomir R. Radev, Saif M. Mohammad, Bonnie Dorr, David Zajic, Michael Whidby, Taesun Moon

    Abstract: Researchers and scientists increasingly find themselves in the position of having to quickly understand large amounts of technical material. Our goal is to effectively serve this need by using bibliometric text mining and summarization techniques to generate summaries of scientific literature. We show how we can use citations to produce automatically generated, readily consumable, technical extra… ▽ More

    Submitted 3 February, 2014; originally announced February 2014.

    Journal ref: Journal Of Artificial Intelligence Research, Volume 46, pages 165-201, 2013

  22. arXiv:1308.6384  [pdf, ps, other

    cs.DM cs.DS cs.NE

    Collecting Coupons with Random Initial Stake

    Authors: Benjamin Doerr, Carola Doerr

    Abstract: Motivated by a problem in the theory of randomized search heuristics, we give a very precise analysis for the coupon collector problem where the collector starts with a random set of coupons (chosen uniformly from all sets). We show that the expected number of rounds until we have a coupon of each type is $nH_{n/2} - 1/2 \pm o(1)$, where $H_{n/2}$ denotes the $(n/2)$th harmonic number when $n$ i… ▽ More

    Submitted 29 August, 2013; originally announced August 2013.

    ACM Class: F.2.2

    Journal ref: Algorithmica 75 (2016), 529-553

  23. arXiv:1308.6300  [pdf, ps, other

    cs.CL

    Computing Lexical Contrast

    Authors: Saif M. Mohammad, Bonnie J. Dorr, Graeme Hirst, Peter D. Turney

    Abstract: Knowing the degree of semantic contrast between words has widespread application in natural language processing, including machine translation, information retrieval, and dialogue systems. Manually-created lexicons focus on opposites, such as {\rm hot} and {\rm cold}. Opposites are of many kinds such as antipodals, complementaries, and gradable. However, existing lexicons often do not classify opp… ▽ More

    Submitted 28 August, 2013; originally announced August 2013.

    Journal ref: Computational Linguistics, 39 (3), 555-590, 2013

  24. arXiv:1304.7403  [pdf, ps, other

    cs.DS

    Improved Approximation Algorithms for the Min-Max Selecting Items Problem

    Authors: Benjamin Doerr

    Abstract: We give a simple deterministic $O(\log K / \log\log K)$ approximation algorithm for the Min-Max Selecting Items problem, where $K$ is the number of scenarios. While our main goal is simplicity, this result also improves over the previous best approximation ratio of $O(\log K)$ due to Kasperski, Kurpisz, and Zieliński (Information Processing Letters (2013)). Despite using the method of pessimistic… ▽ More

    Submitted 27 April, 2013; originally announced April 2013.

  25. arXiv:1303.7205  [pdf, ps, other

    math.CO cs.DM cs.GT

    Winkler's Hat Guessing Game: Better Results for Imbalanced Hat Distributions

    Authors: Benjamin Doerr

    Abstract: In this note, we give an explicit polynomial-time executable strategy for Peter Winkler's hat guessing game that gives superior results if the distribution of hats is imbalanced. While Winkler's strategy guarantees in any case that $\lfloor n/2 \rfloor$ of the $n$ player guess their hat color correct, our strategy ensures that the players produce $\max\{r,b\} - 1.2 n^{2/3} -2$ correct guesses for… ▽ More

    Submitted 28 March, 2013; originally announced March 2013.

    Comments: 8 pages. Mostly unchanged version from the author's habilitation thesis (2005)

  26. arXiv:1302.4216  [pdf, other

    cs.DS

    Online Checkpointing with Improved Worst-Case Guarantees

    Authors: Karl Bringmann, Benjamin Doerr, Adrian Neumann, Jakub Sliacan

    Abstract: In the online checkpointing problem, the task is to continuously maintain a set of k checkpoints that allow to rewind an ongoing computation faster than by a full restart. The only operation allowed is to replace an old checkpoint by the current state. Our aim are checkpoint placement strategies that minimize rewinding cost, i.e., such that at all times T when requested to rewind to some time t <=… ▽ More

    Submitted 30 April, 2013; v1 submitted 18 February, 2013; originally announced February 2013.

    Comments: 25 pages, 5 figures. ICALP 2013

  27. Evolutionary Algorithms and Dynamic Programming

    Authors: Benjamin Doerr, Anton Eremeev, Frank Neumann, Madeleine Theile, Christian Thyssen

    Abstract: Recently, it has been proven that evolutionary algorithms produce good results for a wide range of combinatorial optimization problems. Some of the considered problems are tackled by evolutionary algorithms that use a representation which enables them to construct solutions in a dynamic programming fashion. We take a general approach and relate the construction of such algorithms to the developmen… ▽ More

    Submitted 17 January, 2013; originally announced January 2013.

    Comments: This is an updated version of journal publication where few misprints are fixed

    Journal ref: Theoretical Computer Science, Vol. 412, Issue 43, 2011, P.6020-6035

  28. arXiv:1210.6465  [pdf, ps, other

    cs.DS cs.NE

    Black-Box Complexity: Breaking the $O(n \log n)$ Barrier of LeadingOnes

    Authors: Benjamin Doerr, Carola Winzen

    Abstract: We show that the unrestricted black-box complexity of the $n$-dimensional XOR- and permutation-invariant LeadingOnes function class is $O(n \log (n) / \log \log n)$. This shows that the recent natural looking $O(n\log n)$ bound is not tight. The black-box optimization algorithm leading to this bound can be implemented in a way that only 3-ary unbiased variation operators are used. Hence our boun… ▽ More

    Submitted 24 October, 2012; originally announced October 2012.

    Comments: 12 pages, to appear in the Proc. of Artificial Evolution 2011, LNCS 7401, Springer, 2012. For the unrestricted black-box complexity of LeadingOnes there is now a tight $Θ(n \log\log n)$ bound, cf. http://eccc.hpi-web.de/report/2012/087/

  29. arXiv:1210.0572  [pdf, ps, other

    math.NA cs.DM math.CO

    A Lower Bound for the Discrepancy of a Random Point Set

    Authors: Benjamin Doerr

    Abstract: We show that there is a constant $K > 0$ such that for all $N, s \in \N$, $s \le N$, the point set consisting of $N$ points chosen uniformly at random in the $s$-dimensional unit cube $[0,1]^s$ with probability at least $1-\exp(-Θ(s))$ admits an axis parallel rectangle $[0,x] \subseteq [0,1]^s$ containing $K \sqrt{sN}$ points more than expected. Consequently, the expected star discrepancy of a ran… ▽ More

    Submitted 5 October, 2013; v1 submitted 1 October, 2012; originally announced October 2012.

    Comments: 7 pages

    MSC Class: 11K38; 60C05; 65C05

  30. arXiv:1210.0230  [pdf, ps, other

    cs.GT

    The Price of Anarchy for Selfish Ring Routing is Two

    Authors: Xujin Chen, Benjamin Doerr, Xiaodong Hu, Weidong Ma, Rob van Stee, Carola Winzen

    Abstract: We analyze the network congestion game with atomic players, asymmetric strategies, and the maximum latency among all players as social cost. This important social cost function is much less understood than the average latency. We show that the price of anarchy is at most two, when the network is a ring and the link latencies are linear. Our bound is tight. This is the first sharp bound for the max… ▽ More

    Submitted 30 September, 2012; originally announced October 2012.

    Comments: Full version of WINE 2012 paper, 24 pages

  31. Simple and Optimal Randomized Fault-Tolerant Rumor Spreading

    Authors: Benjamin Doerr, Carola Doerr, Shay Moran, Shlomo Moran

    Abstract: We revisit the classic problem of spreading a piece of information in a group of $n$ fully connected processors. By suitably adding a small dose of randomness to the protocol of Gasienic and Pelc (1996), we derive for the first time protocols that (i) use a linear number of messages, (ii) are correct even when an arbitrary number of adversarially chosen processors does not participate in the proce… ▽ More

    Submitted 5 January, 2015; v1 submitted 27 September, 2012; originally announced September 2012.

    Comments: This is the author-generated version of a paper which is to appear in Distributed Computing, Springer, DOI: 10.1007/s00446-014-0238-z It is available online from http://link.springer.com/article/10.1007/s00446-014-0238-z This version contains some new results (Section 6)

    Journal ref: Distributed Computing, Springer, 2015

  32. arXiv:1207.0773  [pdf, other

    cs.DS cs.DM

    Playing Mastermind with Many Colors

    Authors: Benjamin Doerr, Carola Doerr, Reto Spöhel, Henning Thomas

    Abstract: We analyze the general version of the classic guessing game Mastermind with $n$ positions and $k$ colors. Since the case $k \le n^{1-\varepsilon}$, $\varepsilon>0$ a constant, is well understood, we concentrate on larger numbers of colors. For the most prominent case $k = n$, our results imply that Codebreaker can find the secret code with $O(n \log \log n)$ guesses. This bound is valid also when… ▽ More

    Submitted 17 January, 2013; v1 submitted 3 July, 2012; originally announced July 2012.

    Comments: Extended abstract appeared in SODA 2013. This full version has 22 pages and 1 picture

  33. arXiv:1207.0369  [pdf, ps, other

    cs.NE

    More Effective Crossover Operators for the All-Pairs Shortest Path Problem

    Authors: Benjamin Doerr, Daniel Johannsen, Timo Kötzing, Frank Neumann, Madeleine Theile

    Abstract: The all-pairs shortest path problem is the first non-artificial problem for which it was shown that adding crossover can significantly speed up a mutation-only evolutionary algorithm. Recently, the analysis of this algorithm was refined and it was shown to have an expected optimization time (w.r.t. the number of fitness evaluations) of $Θ(n^{3.25}(\log n)^{0.25})$. In contrast to this simple alg… ▽ More

    Submitted 2 July, 2012; originally announced July 2012.

  34. arXiv:1203.4111  [pdf, ps, other

    cs.NE

    Reducing the Arity in Unbiased Black-Box Complexity

    Authors: Benjamin Doerr, Carola Winzen

    Abstract: We show that for all $1<k \leq \log n$ the $k$-ary unbiased black-box complexity of the $n$-dimensional $\onemax$ function class is $O(n/k)$. This indicates that the power of higher arity operators is much stronger than what the previous $O(n/\log k)$ bound by Doerr et al. (Faster black-box algorithms through higher arity operators, Proc. of FOGA 2011, pp. 163--172, ACM, 2011) suggests. The key… ▽ More

    Submitted 19 March, 2012; originally announced March 2012.

    Comments: An extended abstract of this paper has been accepted for inclusion in the proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2012)

    ACM Class: F.2.2

  35. arXiv:1110.3619  [pdf, ps, other

    cs.DS cs.NE

    Playing Mastermind With Constant-Size Memory

    Authors: Benjamin Doerr, Carola Winzen

    Abstract: We analyze the classic board game of Mastermind with $n$ holes and a constant number of colors. A result of Chvátal (Combinatorica 3 (1983), 325-329) states that the codebreaker can find the secret code with $Θ(n / \log n)$ questions. We show that this bound remains valid if the codebreaker may only store a constant number of guesses and answers. In addition to an intrinsic interest in this questi… ▽ More

    Submitted 17 October, 2011; originally announced October 2011.

    Comments: 23 pages

    ACM Class: F.2.2

  36. arXiv:1108.0342  [pdf, ps, other

    cs.NE

    Black-Box Complexities of Combinatorial Problems

    Authors: Benjamin Doerr, Timo Kötzing, Johannes Lengler, Carola Winzen

    Abstract: Black-box complexity is a complexity theoretic measure for how difficult a problem is to be optimized by a general purpose optimization algorithm. It is thus one of the few means trying to understand which problems are tractable for genetic algorithms and other randomized search heuristics. Most previous work on black-box complexity is on artificial test functions. In this paper, we move a step… ▽ More

    Submitted 1 August, 2011; originally announced August 2011.

    Comments: 26 pages. This is the full version of the one presented at the Genetic and Evolutionary Computation Conference (GECCO 2011)

  37. Adaptive Drift Analysis

    Authors: Benjamin Doerr, Leslie Ann Goldberg

    Abstract: We show that, for any c>0, the (1+1) evolutionary algorithm using an arbitrary mutation rate p_n = c/n finds the optimum of a linear objective function over bit strings of length n in expected time Theta(n log n). Previously, this was only known for c at most 1. Since previous work also shows that universal drift functions cannot exist for c larger than a certain constant, we instead define drift… ▽ More

    Submitted 27 September, 2011; v1 submitted 1 August, 2011; originally announced August 2011.

    Comments: version 2 - fixed typos

    Journal ref: Algorithmica, 2012

  38. arXiv:1102.1140  [pdf, ps, other

    cs.NE cs.CC cs.DS

    Ranking-Based Black-Box Complexity

    Authors: Benjamin Doerr, Carola Winzen

    Abstract: Randomized search heuristics such as evolutionary algorithms, simulated annealing, and ant colony optimization are a broadly used class of general-purpose algorithms. Analyzing them via classical methods of theoretical computer science is a growing field. While several strong runtime analysis results have appeared in the last 20 years, a powerful complexity theory for such algorithms is yet to be… ▽ More

    Submitted 3 September, 2012; v1 submitted 6 February, 2011; originally announced February 2011.

    Comments: This is an extended version of our CSR 2011 paper. 31 pages. The journal version is to appear in Algorithmica, DOI: 10.1007/s00453-012-9684-9

  39. Multiplicative Drift Analysis

    Authors: Benjamin Doerr, Daniel Johannsen, Carola Winzen

    Abstract: In this work, we introduce multiplicative drift analysis as a suitable way to analyze the runtime of randomized search heuristics such as evolutionary algorithms. We give a multiplicative version of the classical drift theorem. This allows easier analyses in those settings where the optimization progress is roughly proportional to the current distance to the optimum. To display the strength of… ▽ More

    Submitted 4 January, 2011; originally announced January 2011.

    Comments: Contains results from our GECCO 2010 and CEC 2010 conference paper

    Journal ref: Algorithmica, 2012, Volume 64, Issue 4, pp 673-697

  40. arXiv:1012.5357  [pdf, other

    cs.DS cs.SI

    Quasirandom Rumor Spreading: An Experimental Analysis

    Authors: Benjamin Doerr, Tobias Friedrich, Marvin Künnemann, Thomas Sauerwald

    Abstract: We empirically analyze two versions of the well-known "randomized rumor spreading" protocol to disseminate a piece of information in networks. In the classical model, in each round each informed node informs a random neighbor. In the recently proposed quasirandom variant, each node has a (cyclic) list of its neighbors. Once informed, it starts at a random position of the list, but from then on inf… ▽ More

    Submitted 24 December, 2010; originally announced December 2010.

    Comments: 14 pages, appeared in ALENEX'09

    ACM Class: F.2.2

  41. arXiv:1012.5351  [pdf, other

    cs.DS cs.DC cs.DM

    Quasirandom Rumor Spreading

    Authors: Benjamin Doerr, Tobias Friedrich, Thomas Sauerwald

    Abstract: We propose and analyze a quasirandom analogue of the classical push model for disseminating information in networks ("randomized rumor spreading"). In the classical model, in each round each informed vertex chooses a neighbor at random and informs it, if it was not informed before. It is known that this simple protocol succeeds in spreading a rumor from one vertex to all others within O(log n) rou… ▽ More

    Submitted 7 August, 2013; v1 submitted 24 December, 2010; originally announced December 2010.

    Comments: 34 pages, to appear in ACM Transactions of Algorithms, parts of the results appeared in SODA'08 and ICALP'09

    ACM Class: F.2.2; G.2.2

  42. arXiv:1012.0952  [pdf, ps, other

    cs.NE

    Faster Black-Box Algorithms Through Higher Arity Operators

    Authors: Benjamin Doerr, Daniel Johannsen, Timo Kötzing, Per Kristian Lehre, Markus Wagner, Carola Winzen

    Abstract: We extend the work of Lehre and Witt (GECCO 2010) on the unbiased black-box model by considering higher arity variation operators. In particular, we show that already for binary operators the black-box complexity of \leadingones drops from $Θ(n^2)$ for unary operators to $O(n \log n)$. For \onemax, the $Ω(n \log n)$ unary black-box complexity drops to O(n) in the binary case. For $k$-ary operators… ▽ More

    Submitted 4 December, 2010; originally announced December 2010.

    Comments: To appear at FOGA 2011

  43. arXiv:1011.3466  [pdf, ps, other

    cs.NE math.PR

    Non-Existence of Linear Universal Drift Functions

    Authors: Benjamin Doerr, Daniel Johannsen, Carola Winzen

    Abstract: Drift analysis has become a powerful tool to prove bounds on the runtime of randomized search heuristics. It allows, for example, fairly simple proofs for the classical problem how the (1+1) Evolutionary Algorithm (EA) optimizes an arbitrary pseudo-Boolean linear function. The key idea of drift analysis is to measure the progress via another pseudo-Boolean function (called drift function) and use… ▽ More

    Submitted 15 November, 2010; originally announced November 2010.

    Comments: 19 pages; This work contains parts of the GECCO 2010 and CEC 2010 papers of the same authors

    ACM Class: F.2

  44. arXiv:1011.1868  [pdf, ps, other

    cs.DS cs.SI

    Asymptotically Optimal Randomized Rumor Spreading

    Authors: Benjamin Doerr, Mahmoud Fouz

    Abstract: We propose a new protocol solving the fundamental problem of disseminating a piece of information to all members of a group of n players. It builds upon the classical randomized rumor spreading protocol and several extensions. The main achievements are the following: Our protocol spreads the rumor to all other nodes in the asymptotically optimal time of (1 + o(1)) \log_2 n. The whole process can… ▽ More

    Submitted 17 November, 2010; v1 submitted 8 November, 2010; originally announced November 2010.

  45. arXiv:1010.1429  [pdf, ps, other

    cs.NE

    Optimizing Monotone Functions Can Be Difficult

    Authors: Benjamin Doerr, Thomas Jansen, Dirk Sudholt, Carola Winzen, Christine Zarges

    Abstract: Extending previous analyses on function classes like linear functions, we analyze how the simple (1+1) evolutionary algorithm optimizes pseudo-Boolean functions that are strictly monotone. Contrary to what one would expect, not all of these functions are easy to optimize. The choice of the constant $c$ in the mutation probability $p(n) = c/n$ can make a decisive difference. We show that if… ▽ More

    Submitted 14 October, 2010; v1 submitted 7 October, 2010; originally announced October 2010.

    Comments: Preliminary version appeared at PPSN XI. Compared to version 1, a small bug in the constants was fixed ($γ$ is slightly larger now, thus ensuring that $γ$ is now strictly larger than $ρ$ in Lemma 5)

  46. arXiv:1008.0501  [pdf, ps, other

    cs.DS

    Quasi-Random Rumor Spreading: Reducing Randomness Can Be Costly

    Authors: Benjamin Doerr, Mahmoud Fouz

    Abstract: We give a time-randomness tradeoff for the quasi-random rumor spreading protocol proposed by Doerr, Friedrich and Sauerwald [SODA 2008] on complete graphs. In this protocol, the goal is to spread a piece of information originating from one vertex throughout the network. Each vertex is assumed to have a (cyclic) list of its neighbors. Once a vertex is informed by one of its neighbors, it chooses a… ▽ More

    Submitted 3 August, 2010; originally announced August 2010.

    ACM Class: F.2.0

  47. arXiv:1007.0372  [pdf, other

    cs.DS

    Randomized Rounding for Routing and Covering Problems: Experiments and Improvements

    Authors: Benjamin Doerr, Marvin Künnemann, Magnus Wahlström

    Abstract: Following previous theoretical work by Srinivasan (FOCS 2001) and the first author (STACS 2006) and a first experimental evaluation on random instances (ALENEX 2009), we investigate how the recently developed different approaches to generate randomized roundings satisfying disjoint cardinality constraints behave when used in two classical algorithmic problems, namely low-congestion routing in netw… ▽ More

    Submitted 2 July, 2010; originally announced July 2010.

    Comments: Longer version of SEA 2010 paper

  48. arXiv:1006.1441  [pdf, ps, other

    math.CO cs.DM math.PR

    Deterministic Random Walks on Regular Trees

    Authors: Joshua Cooper, Benjamin Doerr, Tobias Friedrich, Joel Spencer

    Abstract: Jim Propp's rotor router model is a deterministic analogue of a random walk on a graph. Instead of distributing chips randomly, each vertex serves its neighbors in a fixed order. Cooper and Spencer (Comb. Probab. Comput. (2006)) show a remarkable similarity of both models. If an (almost) arbitrary population of chips is placed on the vertices of a grid $\Z^d$ and does a simultaneous walk in the… ▽ More

    Submitted 7 June, 2010; originally announced June 2010.

    Comments: 15 pages, to appear in Random Structures and Algorithms

  49. arXiv:1001.3056  [pdf, ps, other

    cs.DM

    Strong Robustness of Randomized Rumor Spreading Protocols

    Authors: Benjamin Doerr, Anna Huber, Ariel Levavi

    Abstract: Randomized rumor spreading is a classical protocol to disseminate information across a network. At SODA 2008, a quasirandom version of this protocol was proposed and competitive bounds for its run-time were proven. This prompts the question: to what extent does the quasirandom protocol inherit the second principal advantage of randomized rumor spreading, namely robustness against transmission fail… ▽ More

    Submitted 3 October, 2012; v1 submitted 18 January, 2010; originally announced January 2010.

    Comments: Accepted for publication in "Discrete Applied Mathematics". A short version appeared in the proceedings of the 20th International Symposium on Algorithms and Computation (ISAAC 2009). Minor typos fixed in the second version. Proofs of Lemma 11 and Theorem 12 fixed in the third version. Proof of Lemma 8 fixed in the fourth version

    Journal ref: Discrete Applied Mathematics, Volume 161 (6):778-793, 2013

  50. arXiv:math/0703453  [pdf, ps, other

    math.CO math.PR

    Deterministic Random Walks on the Two-Dimensional Grid

    Authors: Benjamin Doerr, Tobias Friedrich

    Abstract: Jim Propp's rotor router model is a deterministic analogue of a random walk on a graph. Instead of distributing chips randomly, each vertex serves its neighbors in a fixed order. We analyze the difference between Propp machine and random walk on the infinite two-dimensional grid. It is known that, apart from a technicality, independent of the starting configuration, at each time, the number of c… ▽ More

    Submitted 15 March, 2007; originally announced March 2007.

    Comments: 32 pages

    MSC Class: 60C05; 11K45