-
Minsum Problem for Discrete and Weighted Set Flow on Dynamic Path Network
Authors:
Bubai Manna,
Bodhayan Roy,
Vorapong Suppakitpaisarn
Abstract:
In this research, we examine the minsum flow problem in dynamic path networks where flows are represented as discrete and weighted sets. The minsum flow problem has been widely studied for its relevance in finding evacuation routes during emergencies such as earthquakes. However, previous approaches often assume that individuals are separable and identical, which does not adequately account for th…
▽ More
In this research, we examine the minsum flow problem in dynamic path networks where flows are represented as discrete and weighted sets. The minsum flow problem has been widely studied for its relevance in finding evacuation routes during emergencies such as earthquakes. However, previous approaches often assume that individuals are separable and identical, which does not adequately account for the fact that some groups of people, such as families, need to move together and that some groups may be more important than others. To address these limitations, we modify the minsum flow problem to support flows represented as discrete and weighted sets. We also propose a 2-approximation pseudo-polynomial time algorithm to solve this modified problem for path networks with uniform capacity.
△ Less
Submitted 2 July, 2024;
originally announced July 2024.
-
On Approximating the Dynamic and Discrete Network Flow Problem
Authors:
Bubai Manna,
Bodhayan Roy,
Vorapong Suppakitpaisarn
Abstract:
We examine the dynamic network flow problem under the assumption that the flow consists of discrete units. The dynamic network flow problem is commonly addressed in the context of developing evacuation plans, where the flow is typically treated as a continuous quantity. However, real-world scenarios often involve moving groups, such as families, as single units. We demonstrate that solving the dyn…
▽ More
We examine the dynamic network flow problem under the assumption that the flow consists of discrete units. The dynamic network flow problem is commonly addressed in the context of developing evacuation plans, where the flow is typically treated as a continuous quantity. However, real-world scenarios often involve moving groups, such as families, as single units. We demonstrate that solving the dynamic flow problem with this consideration is APX-hard. Conversely, we present a PTAS for instances where the base graph is a path with a constant number of nodes. We introduce a `ready time' constraint to the minsum bin packing problem, meaning certain items cannot be placed in specific bins, develop a PTAS for this modified problem, and apply our algorithms to the discrete and dynamic flow problem.
△ Less
Submitted 25 April, 2024;
originally announced April 2024.
-
Utilizing Graph Sparsification for Pre-processing in Maxcut QUBO Solver
Authors:
Vorapong Suppakitpaisarn,
Jin-Kao Hao
Abstract:
We suggest employing graph sparsification as a pre-processing step for maxcut programs using the QUBO solver. Quantum(-inspired) algorithms are recognized for their potential efficiency in handling quadratic unconstrained binary optimization (QUBO). Given that maxcut is an NP-hard problem and can be readily expressed using QUBO, it stands out as an exemplary case to demonstrate the effectiveness o…
▽ More
We suggest employing graph sparsification as a pre-processing step for maxcut programs using the QUBO solver. Quantum(-inspired) algorithms are recognized for their potential efficiency in handling quadratic unconstrained binary optimization (QUBO). Given that maxcut is an NP-hard problem and can be readily expressed using QUBO, it stands out as an exemplary case to demonstrate the effectiveness of quantum(-inspired) QUBO approaches. Here, the non-zero count in the QUBO matrix corresponds to the graph's edge count. Given that many quantum(-inspired) solvers operate through cloud services, transmitting data for dense graphs can be costly. By introducing the graph sparsification method, we aim to mitigate these communication costs. Experimental results on classical, quantum-inspired, and quantum solvers indicate that this approach substantially reduces communication overheads and yields an objective value close to the optimal solution.
△ Less
Submitted 22 January, 2024;
originally announced January 2024.
-
Communication Cost Reduction for Subgraph Counting under Local Differential Privacy via Hash Functions
Authors:
Quentin Hillebrand,
Vorapong Suppakitpaisarn,
Tetsuo Shibuya
Abstract:
We suggest the use of hash functions to cut down the communication costs when counting subgraphs under edge local differential privacy. While various algorithms exist for computing graph statistics, including the count of subgraphs, under the edge local differential privacy, many suffer with high communication costs, making them less efficient for large graphs. Though data compression is a typical…
▽ More
We suggest the use of hash functions to cut down the communication costs when counting subgraphs under edge local differential privacy. While various algorithms exist for computing graph statistics, including the count of subgraphs, under the edge local differential privacy, many suffer with high communication costs, making them less efficient for large graphs. Though data compression is a typical approach in differential privacy, its application in local differential privacy requires a form of compression that every node can reproduce. In our study, we introduce linear congruence hashing. With a sampling rate of $s$, our method can cut communication costs by a factor of $s^2$, albeit at the cost of increasing variance in the published graph statistic by a factor of $s$. The experimental results indicate that, when matched for communication costs, our method achieves a reduction in the $\ell_2$-error for triangle counts by up to 1000 times compared to the performance of leading algorithms.
△ Less
Submitted 12 December, 2023;
originally announced December 2023.
-
Local Differential Privacy for Number of Paths and Katz Centrality
Authors:
Louis Betzer,
Vorapong Suppakitpaisarn,
Quentin Hillebrand
Abstract:
In this paper, we give an algorithm to publish the number of paths and Katz centrality under the local differential privacy (LDP), providing a thorough theoretical analysis. Although various works have already introduced subgraph counting algorithms under LDP, they have primarily concentrated on subgraphs of up to five nodes. The challenge in extending this to larger subgraphs is the cumulative an…
▽ More
In this paper, we give an algorithm to publish the number of paths and Katz centrality under the local differential privacy (LDP), providing a thorough theoretical analysis. Although various works have already introduced subgraph counting algorithms under LDP, they have primarily concentrated on subgraphs of up to five nodes. The challenge in extending this to larger subgraphs is the cumulative and exponential growth of noise as the subgraph size increases in any publication under LDP. We address this issue by proposing an algorithm to publish the number of paths that start at every node in the graph, leading to an algorithm that publishes the Katz centrality of all nodes. This algorithm employs multiple rounds of communication and the clipping technique. Both our theoretical and experimental assessments indicate that our algorithm exhibits acceptable bias and variance, considerably less than an algorithm that bypasses clipping. Furthermore, our Katz centrality estimation is able to recall up to 90% of the nodes with the highest Katz centrality.
△ Less
Submitted 21 October, 2023;
originally announced October 2023.
-
Robustness for Spectral Clustering of General Graphs under Local Differential Privacy
Authors:
Sayan Mukherjee,
Vorapong Suppakitpaisarn
Abstract:
Spectral clustering is a widely used algorithm to find clusters in networks. Several researchers have studied the stability of spectral clustering under local differential privacy with the additional assumption that the underlying networks are generated from the stochastic block model (SBM). However, we argue that this assumption is too restrictive since social networks do not originate from the S…
▽ More
Spectral clustering is a widely used algorithm to find clusters in networks. Several researchers have studied the stability of spectral clustering under local differential privacy with the additional assumption that the underlying networks are generated from the stochastic block model (SBM). However, we argue that this assumption is too restrictive since social networks do not originate from the SBM. Thus, delve into an analysis for general graphs in this work. Our primary focus is the edge flipping method -- a common technique for protecting local differential privacy. On a positive side, our findings suggest that even when the edges of an $n$-vertex graph satisfying some reasonable well-clustering assumptions are flipped with a probability of $O(\log n/n)$, the clustering outcomes are largely consistent. Empirical tests further corroborate these theoretical findings. Conversely, although clustering outcomes have been stable for dense and well-clustered graphs produced from the SBM, we show that in general, spectral clustering may yield highly erratic results on certain dense and well-clustered graphs when the flipping probability is $ω(\log n/n)$. This indicates that the best privacy budget obtainable for general graphs is $Θ(\log n)$.
△ Less
Submitted 13 September, 2023;
originally announced September 2023.
-
Efficient Additions and Montgomery Reductions of Large Integers for SIMD
Authors:
Pengchang Ren,
Reiji Suda,
Vorapong Suppakitpaisarn
Abstract:
This paper presents efficient algorithms, designed to leverage SIMD for performing Montgomery reductions and additions on integers larger than 512 bits. The existing algorithms encounter inefficiencies when parallelized using SIMD due to extensive dependencies in both operations, particularly noticeable in costly operations like ARM's SVE. To mitigate this problem, a novel addition algorithm is in…
▽ More
This paper presents efficient algorithms, designed to leverage SIMD for performing Montgomery reductions and additions on integers larger than 512 bits. The existing algorithms encounter inefficiencies when parallelized using SIMD due to extensive dependencies in both operations, particularly noticeable in costly operations like ARM's SVE. To mitigate this problem, a novel addition algorithm is introduced that simulates the addition of large integers using a smaller addition, quickly producing the same set of carries. These carries are then utilized to perform parallel additions on large integers. For Montgomery reductions, serial multiplications are replaced with precomputations that can be effectively calculated using SIMD extensions. Experimental evidence demonstrates that these proposed algorithms substantially enhance the performance of state-of-the-art implementations of several post-quantum cryptography algorithms. Notably, they deliver a 30% speed-up from the latest CTIDH implementation, an 11% speed-up from the latest CSIDH implementation in AVX-512 processors, and a 7% speed-up from Microsoft's standard PQCrypto-SIDH for SIKEp503 on A64FX.
△ Less
Submitted 30 August, 2023;
originally announced August 2023.
-
Performances of Symmetric Loss for Private Data from Exponential Mechanism
Authors:
Jing Bi,
Vorapong Suppakitpaisarn
Abstract:
This study explores the robustness of learning by symmetric loss on private data. Specifically, we leverage exponential mechanism (EM) on private labels. First, we theoretically re-discussed properties of EM when it is used for private learning with symmetric loss. Then, we propose numerical guidance of privacy budgets corresponding to different data scales and utility guarantees. Further, we cond…
▽ More
This study explores the robustness of learning by symmetric loss on private data. Specifically, we leverage exponential mechanism (EM) on private labels. First, we theoretically re-discussed properties of EM when it is used for private learning with symmetric loss. Then, we propose numerical guidance of privacy budgets corresponding to different data scales and utility guarantees. Further, we conducted experiments on the CIFAR-10 dataset to present the traits of symmetric loss. Since EM is a more generic differential privacy (DP) technique, it being robust has the potential for it to be generalized, and to make other DP techniques more robust.
△ Less
Submitted 8 October, 2022;
originally announced October 2022.
-
Worst-Case Analysis of LPT Scheduling on Small Number of Non-Identical Processors
Authors:
Takuto Mitsunobu,
Reiji Suda,
Vorapong Suppakitpaisarn
Abstract:
The approximation ratio of the longest processing time (LPT) scheduling algorithm has been studied in several papers. While the tight approximation ratio is known for the case when all processors are identical, the ratio is not yet known when the processors have different speeds. In this work, we give a tight approximation ratio for the case when the number of processors is 3,4, and 5. We show tha…
▽ More
The approximation ratio of the longest processing time (LPT) scheduling algorithm has been studied in several papers. While the tight approximation ratio is known for the case when all processors are identical, the ratio is not yet known when the processors have different speeds. In this work, we give a tight approximation ratio for the case when the number of processors is 3,4, and 5. We show that the ratio for those cases are no more than the lower bound provided by Gonzalez, Ibarra, and Sahni (SIAM J. Computing 1977). They are approximately 1.38 for three processors, 1.43 for four processors, and 1.46 for five processors.
△ Less
Submitted 5 March, 2022;
originally announced March 2022.
-
Tight Lower Bound for Average Number of Terms in Optimal Double-base Number System
Authors:
Vorapong Suppakitpaisarn
Abstract:
We show in this note that the average number of terms in the optimal double-base number system is in Omega(n / log n). The lower bound matches the upper bound shown earlier by Dimitrov, Imbert, and Mishra (Math. of Comp. 2008).
We show in this note that the average number of terms in the optimal double-base number system is in Omega(n / log n). The lower bound matches the upper bound shown earlier by Dimitrov, Imbert, and Mishra (Math. of Comp. 2008).
△ Less
Submitted 13 April, 2021;
originally announced April 2021.
-
On the Size of Minimal Separators for Treedepth Decomposition
Authors:
Zijian Xu,
Vorapong Suppakitpaisarn
Abstract:
Treedepth decomposition has several practical applications and can be used to speed up many parameterized algorithms. There are several works aiming to design a scalable algorithm to compute exact treedepth decompositions. Those include works based on a set of all minimal separators. In those algorithms, although a number of minimal separators are enumerated, the minimal separators that are used f…
▽ More
Treedepth decomposition has several practical applications and can be used to speed up many parameterized algorithms. There are several works aiming to design a scalable algorithm to compute exact treedepth decompositions. Those include works based on a set of all minimal separators. In those algorithms, although a number of minimal separators are enumerated, the minimal separators that are used for an optimal solution are empirically very small. Therefore, analyzing the upper bound on the size of minimal separators is an important problem because it has the potential to significantly reduce the computation time. A minimal separator $S$ is called an optimal top separator if $td(G) = |S| + td(G \backslash S)$, where $td(G)$ denotes the treedepth of $G$. Then, we have two theoretical results on the size of optimal top separators. (1) For any $G$, there is an optimal top separator $S$ such that $|S| \le 2tw(G)$, where $tw(G)$ is the treewidth of $G$. (2) For any $c < 2$, there exists a graph $G$ such that any optimal top separator $S$ of $G$ have $|S| > c \cdot tw(G)$, i.e., the first result gives a tight bound on the size of an optimal top separator.
△ Less
Submitted 14 December, 2020; v1 submitted 22 August, 2020;
originally announced August 2020.
-
On the minimal Hamming weight of a multi-base representation
Authors:
Daniel Krenn,
Vorapong Suppakitpaisarn,
Stephan Wagner
Abstract:
Given a finite set of bases $b_1$, $b_2$, \dots, $b_r$ (integers greater than $1$), a multi-base representation of an integer~$n$ is a sum with summands $db_1^{α_1}b_2^{α_2} \cdots b_r^{α_r}$, where the $α_j$ are nonnegative integers and the digits $d$ are taken from a fixed finite set. We consider multi-base representations with at least two bases that are multiplicatively independent. Our main r…
▽ More
Given a finite set of bases $b_1$, $b_2$, \dots, $b_r$ (integers greater than $1$), a multi-base representation of an integer~$n$ is a sum with summands $db_1^{α_1}b_2^{α_2} \cdots b_r^{α_r}$, where the $α_j$ are nonnegative integers and the digits $d$ are taken from a fixed finite set. We consider multi-base representations with at least two bases that are multiplicatively independent. Our main result states that the order of magnitude of the minimal Hamming weight of an integer~$n$, i.e., the minimal number of nonzero summands in a representation of~$n$, is $\log n / (\log \log n)$. This is independent of the number of bases, the bases themselves, and the digit set.
For the proof, the existing upper bound for prime bases is generalized to multiplicatively independent bases, for the required analysis of the natural greedy algorithm, an auxiliary result in Diophantine approximation is derived. The lower bound follows by a counting argument and alternatively by using communication complexity, thereby improving the existing bounds and closing the gap in the order of magnitude. This implies also that the greedy algorithm terminates after $\mathcal{O}(\log n/\log \log n)$ steps, and that this bound is sharp.
△ Less
Submitted 12 July, 2019; v1 submitted 20 August, 2018;
originally announced August 2018.