118,875 research outputs found

    Maximizing Symmetric Submodular Functions

    Full text link
    Symmetric submodular functions are an important family of submodular functions capturing many interesting cases including cut functions of graphs and hypergraphs. Maximization of such functions subject to various constraints receives little attention by current research, unlike similar minimization problems which have been widely studied. In this work, we identify a few submodular maximization problems for which one can get a better approximation for symmetric objectives than the state of the art approximation for general submodular functions. We first consider the problem of maximizing a non-negative symmetric submodular function f ⁣:2NR+f\colon 2^\mathcal{N} \to \mathbb{R}^+ subject to a down-monotone solvable polytope P[0,1]N\mathcal{P} \subseteq [0, 1]^\mathcal{N}. For this problem we describe an algorithm producing a fractional solution of value at least 0.432f(OPT)0.432 \cdot f(OPT), where OPTOPT is the optimal integral solution. Our second result considers the problem max{f(S):S=k}\max \{f(S) : |S| = k\} for a non-negative symmetric submodular function f ⁣:2NR+f\colon 2^\mathcal{N} \to \mathbb{R}^+. For this problem, we give an approximation ratio that depends on the value k/Nk / |\mathcal{N}| and is always at least 0.4320.432. Our method can also be applied to non-negative non-symmetric submodular functions, in which case it produces 1/eo(1)1/e - o(1) approximation, improving over the best known result for this problem. For unconstrained maximization of a non-negative symmetric submodular function we describe a deterministic linear-time 1/21/2-approximation algorithm. Finally, we give a [1(11/k)k1][1 - (1 - 1/k)^{k - 1}]-approximation algorithm for Submodular Welfare with kk players having identical non-negative submodular utility functions, and show that this is the best possible approximation ratio for the problem.Comment: 31 pages, an extended abstract appeared in ESA 201

    Migrants, immigrants and welfare from the Old Poor Law to the Welfare State

    Get PDF
    Under the Old Poor Law internal migrants moved from one jurisdiction to another when they crossed parochial boundaries. Following the Poor Law Amendment Act of 1834 central government took an enlarged and expanding part in welfare. As it did so, the entitlement to welfare of immigrants from overseas was scrutinised at a national level in a way that was analogous to the manner in which the status of internal migrants had previously been scrutinised at a parochial level. Having established this analogy, the essay asks whether the entitlement to welfare of outsiders improved or deteriorated over time and seeks to account for the broad trends

    Learning DNF Expressions from Fourier Spectrum

    Full text link
    Since its introduction by Valiant in 1984, PAC learning of DNF expressions remains one of the central problems in learning theory. We consider this problem in the setting where the underlying distribution is uniform, or more generally, a product distribution. Kalai, Samorodnitsky and Teng (2009) showed that in this setting a DNF expression can be efficiently approximated from its "heavy" low-degree Fourier coefficients alone. This is in contrast to previous approaches where boosting was used and thus Fourier coefficients of the target function modified by various distributions were needed. This property is crucial for learning of DNF expressions over smoothed product distributions, a learning model introduced by Kalai et al. (2009) and inspired by the seminal smoothed analysis model of Spielman and Teng (2001). We introduce a new approach to learning (or approximating) a polynomial threshold functions which is based on creating a function with range [-1,1] that approximately agrees with the unknown function on low-degree Fourier coefficients. We then describe conditions under which this is sufficient for learning polynomial threshold functions. Our approach yields a new, simple algorithm for approximating any polynomial-size DNF expression from its "heavy" low-degree Fourier coefficients alone. Our algorithm greatly simplifies the proof of learnability of DNF expressions over smoothed product distributions. We also describe an application of our algorithm to learning monotone DNF expressions over product distributions. Building on the work of Servedio (2001), we give an algorithm that runs in time \poly((s \cdot \log{(s/\eps)})^{\log{(s/\eps)}}, n), where ss is the size of the target DNF expression and \eps is the accuracy. This improves on \poly((s \cdot \log{(ns/\eps)})^{\log{(s/\eps)} \cdot \log{(1/\eps)}}, n) bound of Servedio (2001).Comment: Appears in Conference on Learning Theory (COLT) 201

    Feminist science and epistemologies: Key issues central to GENNOVATE's research program

    Get PDF
    This methodological brief offers a window into GENNOVATE’s innovative collaborative research initiative to promote gender equality in agricultural and natural resource management. It addresses questions such as 1) Why is it important to distinguish among epistemology, methodology, and methods?; 2) What is feminist epistemology?; 3) What can researchers of gender, agriculture, and innovation learn from engaging the contributions of feminist epistemology?; and 4) How has GENNOVATE integrated lessons from feminist methods and feminist epistemics about gender relations, agricultural change, and innovation

    The Burden on Society from Eleventh-Hour Citizen Petitions Filed to Slow Generic Drugs

    Get PDF

    Jews and the British Empire c.1900

    Get PDF
    In the years of high imperialism at the beginning of the twentieth century what bearing did the British Empire have on the Jews, or Jews on the British Empire? The silence of scholarship might lead us to answer ‘not very much’. Concerned with the legacy of Jewish emancipation, the dynamics of social integration, the challenge of large-scale migration, and the representation of Jewish difference in political argument, historians of the Jews have barely touched on the subject. Historians of empire, for their part, have had other preoccupations too. Perhaps the identification of imperialism with Jewish finance by J. A. Hobson and other radical critics of empire in the 1890s and early 1900s, as well as the Jew-baiting rhetoric of some critics, has rendered the relationship of Jews to the Empire a difficult problem for later generations to address

    Distribution-Independent Evolvability of Linear Threshold Functions

    Full text link
    Valiant's (2007) model of evolvability models the evolutionary process of acquiring useful functionality as a restricted form of learning from random examples. Linear threshold functions and their various subclasses, such as conjunctions and decision lists, play a fundamental role in learning theory and hence their evolvability has been the primary focus of research on Valiant's framework (2007). One of the main open problems regarding the model is whether conjunctions are evolvable distribution-independently (Feldman and Valiant, 2008). We show that the answer is negative. Our proof is based on a new combinatorial parameter of a concept class that lower-bounds the complexity of learning from correlations. We contrast the lower bound with a proof that linear threshold functions having a non-negligible margin on the data points are evolvable distribution-independently via a simple mutation algorithm. Our algorithm relies on a non-linear loss function being used to select the hypotheses instead of 0-1 loss in Valiant's (2007) original definition. The proof of evolvability requires that the loss function satisfies several mild conditions that are, for example, satisfied by the quadratic loss function studied in several other works (Michael, 2007; Feldman, 2009; Valiant, 2010). An important property of our evolution algorithm is monotonicity, that is the algorithm guarantees evolvability without any decreases in performance. Previously, monotone evolvability was only shown for conjunctions with quadratic loss (Feldman, 2009) or when the distribution on the domain is severely restricted (Michael, 2007; Feldman, 2009; Kanade et al., 2010
    corecore