text stringlengths 16 3.88k | source stringlengths 60 201 |
|---|---|
idefinite, denoted X (cid:23) 0. The set of PSD matrices is a convex set. Also, the constraint
121(cid:107)ui(cid:107) = 1 can be expressed as Xii = 1. This means that the relaxed problem is equivalent to the
following semidefinite program (SDP):
max
s.t.
(cid:80)
i<j wij(1 − ij)
1
X
2
X (cid:23) 0 and Xii = 1, i = 1, .... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
the procedure described above. Note that W is a
random variable, whose expectation is easily seen (see Figure 20) to be given by
E[W ] =
(cid:88)
(cid:9)
wij Pr sign(rT ui) = sign(rT uj)
(cid:8)
i<j
(cid:88) 1
wij
π
i<j
=
arccos(uT
i uj).
122(cid:54)
If we define αGW as
it can be shown that αGW > 0.87.
It is then clear... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
) is the following: Given a graph and a set
of k colors, and, for each edge, a matching between the colors, the goal in the unique games problem
is to color the vertices as to agree with as high of a fraction of the edge matchings as possible. For
example, in Figure 21 the coloring agrees with 3 of the edge constraints... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
Sums-of-Squares interpretation
We now give a different interpretation to the approximation ratio obtained above. Let us first slightly
reformulate the problem (recall that wii = 0).
1
max
yi=±1 2
(cid:88)
i<j
wij(1 − yiyj) = max
yi=±1
1
4
= max
1
yi=±1 4
= max
1
yi=±1 4
= max
1
yi=±1 4
= max
1
yi=±1 4
(cid:88)
i,j
(cid:8... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
±1, i = 1, . . . , n.
Similarly, (68) can be written (by taking X = yyT ) as
max 1 Tr (LGX)
4
s.t. X (cid:23) 0
Xii = 1, i = 1, . . . , n.
(72)
(73)
Indeed, given
Next lecture we derive the formulation of the dual program to (73) in the context of recovery in
the Stochastic Block Model. Here we will simply show weak du... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
19)T
LG
+
1
4
n
(cid:88)
i=1
D
ii
(cid:0)y2
i − 1(cid:1) .
(75)
Note that (75) certifies that no cut of G is larger than RMaxCut. Indeed, if y ∈ {±1}2 then y2
i = 1
and so
RMaxCut −
1
4
yT LGy = yT
(cid:18)
D(cid:92) −
(cid:19)T
LG
.
1
4
125Since D(cid:92) − 1
v1, . . . , vn. This means that meaning that yT (cid:0)D(ci... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
but for details and actual formulations, please see the references.)
The remarkable fact is that, if one bounds the degree of the sum-of-squares certificate, it can be
found using Semidefinite programming [Par00, Las01]. In fact, SDPs (74) and (74) are finding the
smallest real number Λ such that Λ − 1 yT LGy is a sum-of-... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
yiyj + yjyk + ykyi ≥ −1,
Xij + Xjk + Xik ≥ −1,
however it is not difficult to see that the SDP (73) of degree 2 is only able to constraint
33This is related with Hilbert’s 17th problem [Sch12] and Stengle’s Positivstellensatz [Ste74]
Xij + Xjk + Xik ≥ −
3
2
,
126which is considerably weaker. There are a few different way... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
1 X
ij
1T
ij Xjk Xki
1 Xik Xjk
1 Xij
1
X
Xjk Xik
Xki Xjk Xij
1
≥
0.
Also, note that the inequality yiyj + yjyk + ykyi ≥ −1 can inde
with degree 4 (recall that y2
i = 1):
ed be proven using sum-of-squares proof
(1 + yiyj + yjyk + ykyi)2 ≥ 0 ⇒ yiyj + yjyk + ykyi ≥ −1.
Interestingly, it is known [KV13] tha... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
max (cid:80)
s.t.
ij AijuT
i vj
ui ∈ Rn+m,
vj ∈ R +m, (cid:107)vj(cid:107) = 1
n
(cid:107)ui(cid:107) = 1,
(77)
and 76, and its exact value is still unknown, the best known bounds are available here [] and are 1.676 <
KG <
√ . See also page 21 here [F+14]. There is also a complex valued analogue [Haa87].
π
2 log(1+
2)
... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
suggest that this approach has the potential to improve on the upper bound ω(p)
√
≤ p
Open Problem 8.4 What are the asymptotics of the Paley Graph clique number ω(p) ? Can the the
SOS degree 4 analogue of the theta number help upper bound it? 34
Interestingly, a polynomial improvement on Open Problem 6.4. is known to i... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
that are meaningful already for d = 3.
1299 Community detection and the Stochastic Block Model
9.1 Community Detection
Community detection in a network is a central problem in data science. A few lectures ago we discussed
clustering and gave a performance guarantee for spectral clustering (based on Cheeger’s Inequalit... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
of spectral
clustering to attempt to partition the graph.
Let A be the adjacency matrix of G, meaning that
Aij =
(cid:26) 1
0
if (i, j) ∈ E(G)
otherwise.
Note that in our model, A is a random matrix. We would like to solve
(cid:88)
max
Aijxixj
s.t. x
i,j
i = ±1, ∀i
(cid:88)
xj = 0,
The intended solution x takes the val... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
:0)A − E[A](cid:1)
. In previous lectures we saw that for large
enough λ, the eigenvalue associated with λ pops outside
the distribution of eigenvalues of W and
whenever this happens, the leading eigenvector has a non-trivial correlation with g (the eigenvector
associated with λ).
q
= −
p
2 n
λvvT
and
n
n
A = W + λvvT
... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
partition vector g as long as
(cid:114)
p − q
2
>
1
√
n
p(1 − p) + q(1 − q)
2
,
(84)
However, this argument is not necessarily valid because the matrix is not a Wigner matrix. For the
special case q = 1 − p, all entries of A − E[A] have the same variance and they can be made to
be identically distributed by conjugating... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
1 Consider the balanced Stochastic Block Model for k > 3 (constant) communities
with inner probability p = a
n and outer probability q = b , what is the threshold at which it becomes
possible to make an estimate that correlates with the original partition is open (known as the par-
tial recovery or detection threshold)... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
5 The algorithm
Note that if we remove the constraint that
Let us define B = 2A − (11T − I), meaning
j xj = 0 in (79) then the optimal solution becomes x = 1.
that
(cid:80)
Bij =
0
1
−1
if i = j
if (i, j) ∈ E(G)
otherwise
(88)
It is clear that the problem
133(cid:88)
max
Bijxixj
s.t. x
i,j
i = ±1, ∀i
(cid:88)
xj ... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
∀i
X (cid:23) 0
rank(X) = 1.
We now relax the problem by removing the non-convex rank constraint
max
Tr(BX)
s.t. Xii = 1, ∀i
X (cid:23) 0.
(92)
(93)
134This is an SDP that can be solved (up to arbitrary precision) in polynomial time [VB96].
Since we removed the rank constraint, the solution to (93) is no longer guaran... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
= D+
G − D−
G − A
A standard technique to show that a candidate solution is the optimal one for a convex problem is to
use convex duality.
We will describe duality with a game theoretical intuition in mind. The idea will be to rewrite (93)
without imposing constraints on X but rather have the constraints be implicitly ... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
this game theoretical intuition in mind, it is clear that if we change the “rules of the game” and
have the dual player decide their variables before the primal player (meaning that the primal player
can pick X knowing the values of Z and Q) then it is clear that the objective can only increase, which
means that:
max T... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
Z − B (cid:23) 0
(95)
is called the dual problem of (93).
The derivation above explains why the objective value of the dual is always larger or equal to
the primal. Nevertheless, there is a much simpler proof (although not as enlightening): let X, Z be
respectively a feasible point of (93) and (95). Since Z is diagonal... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
to (Z − B)g = 0. This means that we need to
B[i, :]g. Since B = 2A − (11T − I) we have
construct Z such that Zii = 1
gi
Zii =
1
gi
(2A
− (11T − I))[i, :]g = 2
1
gi
(Ag)i + 1,
137meaning that
Z = 2(D+
G − D−) + I
G
is our guess for the dual witness. As a result
Z − B = 2(D+
G − D−)G − I − (cid:2)2A − (11T − I)(cid:3) =... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
n) I + 1 − (α + β)
T (cid:3)
(cid:18)
(cid:19)
log n
n
11T − (α − β)
log n
n
ggT .
Since 2LSBM g = 0 we can ignore what happens in the span of g and it is not hard to see that
(cid:19)
(cid:18)
(cid:20)
(cid:21)
λ2
((α − β) log n) I +
1 − (α + β)
11T − (α − β)
= (α − β) log n.
log n
n
ggT
log n
n
This means that it is ... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
:= max
∞
ij
(cid:107)Xij(cid:107) .∞
Using these techniques one can show (this result was independently shown in [Ban15c] and [HWX14],
with a slightly different approach)
Theorem 9.4 Let G be a random graph with n nodes drawn accordingly to the stochastic block model
on two communities with edge probabilities p and q. L... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
can be similarly
defined for any k ≥ 2 communities: G is a graph on n = km nodes divided on k groups of m nodes
each. Similarly to the k = 2 case, for each pair (i, j) of nodes, (i, j) is an edge of G with probability p
if i and j are in the same set, and with probability q if they are in different sets. Each edge is dra... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
(see [ABKK15]).
9.11 Euclidean Clustering
The stochastic block model, although having fascinating phenomena, is not always an accurate model
for clustering. The independence assumption assumed on the connections between pairs of vertices
may sometimes be too unrealistic. Also, the minimum bisection of multisection obje... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
the set of points, in order to formulate the k-medians LP we use variables yp indicat-
ing whether p is a center of its cluster or not and zpq indicating whether q is assigned to p or not
(see [ABC+15] for details), the LP then reads:
35When the points are in Euclidean space there is an equivalent more common formulati... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
-means SDP and the k-medians
LP) are integral in instances that have clustering structure and not necessarily arising from generative
It is unclear however how to define what is meant by “clustering structure”. A
random models.
particularly interesting approach is through stability conditions (see, for example [AJP13]),... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
above) [IMPV15b].
9.13 Another conjectured instance of tightness
The following problem is posed, by Andrea Montanari, in [Mon14], a description also appears in [Ban15a].
We briefly describe it here as well:
Given a symmetric matrix W ∈ Rn×n the positive principal component analysis problem can be
written as
max
s. t.
xT... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
Remark 9.6 The dual of this SDP motivates a particularly interesting statement which is implied by
the conjecture. By duality, the value of the SDP is the same as the value of
which is thus conjectured to be
Λ = 0) is known.
√
2 + o(1), although no bound better than 2 (obtained by simply taking
min λmax (W + Λ) ,
Λ≥0
1... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
imator. Naturally, the measure of “consistency” is application specific. While there is a general
way of describing these problems and algorithmic approaches to them [BCS15, Ban15a], for the sake
of simplicity we will illustrate the ideas through some important examples.
10.2 Angular Synchronization
The angular synchron... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
spectral relaxation of (103) into
max x∗Y x.
(cid:107)x(cid:107)2=n
(104)
Notice that, since the solution to (104) will not necessarily be a vector with unit-modulus entries,
a rounding step will, in general, be needed. Also, to compute the leading eigenvector of A one would
likely use the power method. An interesting ... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
SDP relaxation similar to the one for Max-Cut and minimum
bisection.
max
Tr(Y X)
s.t. Xii = 1, ∀i
X (cid:23) 0.
(105)
In [BBS14] it is shown that, in the model of Y = zz∗zz∗ + σW , as long as σ = O(n1/4) then (105)
is tight, meaning that the optimal solution is rank 1 and thus it corresponds to the optimal solution
of ... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
random variables.
10.2.1 Orientation estimation in Cryo-EM
A particularly challenging application of this framework is the orientation estimation problem in
Cryo-Electron Microscopy [SS11].
Cryo-EM is a technique used to determine the three-dimensional structure of biological macro-
molecules. The molecules are rapidly... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
fferent com-
munities, then this problem essentially reduces to the Max-Cut problem.
10.3 Signal Alignment
In signal processing, the multireference alignment problem [BCSZ14] consists of recovering an unknown
signal u ∈ RL from n observations of the form
yi = Rliu + σξi,
(106)
where Rli is a circulant permutation matrix... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
information between observations, do not
suffer from model bias as they do not use any information besides the data itself.
In order to recover the shifts li from the shifted noisy signals (106) we will consider the following
estimator
argminl1,...,ln
∈Z
L
(cid:88)
(cid:13)R liyi −
(cid:13)
−
R y
−lj j
(cid:13)
2
(cid:1... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
)
we will refer to this estimator as the quasi-MLE.
It is not surprising that solving this problem is NP-hard in general (the search space for this
optimization problem has exponential size and is nonconvex). In fact, one can show [BCSZ14] that,
conditioned on the Unique Games Conjecture, it is hard to approximate up t... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
RT
l RT
l
1
2
· · ·
T
Rl
n
(cid:3)
∈
R × ,
nL nL
(109)
and can rewrite (108) as
max Tr(CX)
s. t. Xii = IL×L
Xij is a circulant permutation matrix
X (cid:23) 0
rank(X) ≤ L,
(110)
where C is the rank 1 matrix given by
C
1
y
y
2
=
..
.
yn
T
with blocks Cij = yiyj .
(cid:2)
T
y1
T
y2
· · ·
T (cid:3)
nL ... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
n the
SDP is tight with high probability?
10.3.3 Sample complexity for multireference alignment
Another important question related to this problem is to understand its sample complexity. Since
the objective is to recover the underlying signal u, a larger number of observations n should yield
a better recovery (consider... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
,
no need to round: integrality of clustering formulations. 6th Innovations in Theoretical
Computer Science (ITCS 2015), 2015.
[ABFM12] B. Alexeev, A. S. Bandeira, M. Fickus, and D. G. Mixon. Phase retrieval with polarization.
available online, 2012.
[ABG12]
L. Addario-Berry and S. Griffiths. The spectrum of random lifts... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
D. Amelunxen, M. Lotz, M. B. McCoy, and J. A. Tropp. Living on the edge: phase
transitions in convex programs with random data. 2014.
[Alo86]
N. Alon. Eigenvalues and expanders. Combinatorica, 6:83–96, 1986.
152[Alo03]
[AM85]
N. Alon. Problems and results in extremal combinatorics i. Discrete Mathematics, 273(1–
3):31... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
. Bai. Methodologies in spectral analysis of large dimensional random matrices, a
review. Statistics Sinica, 9:611–677, 1999.
[Ban15a]
A. S. Bandeira. Convex relaxations for certain inverse problems on graphs. PhD thesis,
Program in Applied and Computational Mathematics, Princeton University, 2015.
[Ban15b]
A. S. Bande... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
.OC], 2014.
[BCS15]
A. S. Bandeira, Y. Chen, and A. Singer. Non-unique games over compact groups and
orientation estimation in cryo-em. Available online at arXiv:1505.03840 [cs.CV], 2015.
[BCSZ14] A. S. Bandeira, M. Charikar, A. Singer, and A. Zhu. Multireference alignment using
semidefinite programming. 5th Innovations... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
.
[BKS13b] B. Barak, J. Kelner, and D. Steurer. Rounding sum-of-squares relaxations. Available
online at arXiv:1312.6652 [cs.DS], 2013.
[BKS14]
A. S. Bandeira, Y. Khoo, and A. Singer. Open problem: Tightness of maximum likeli-
hood semidefinite relaxations. In Proceedings of the 27th Conference on Learning Theory,
volum... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
and D. A. Spielman. A Cheeger inequality for the graph
connection Laplacian. SIAM J. Matrix Anal. Appl., 34(4):1611–1630, 2013.
A. S. Bandeira and R. v. Handel. Sharp nonasymptotic bounds on the norm of random
matrices with independent entries. Annals of Probability, to appear, 2015.
J. Cheeger. A lower bound for the s... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
Foundations of Computational Mathematics, 12(6):805–849, 2012.
155[CRT06a] E. J. Cand`es, J. Romberg, and T. Tao. Robust uncertainty principles: exact signal recon-
struction from highly incomplete frequency information. IEEE Trans. Inform. Theory,
52:489–509, 2006.
[CRT06b] E. J. Cand`es, J. Romberg, and T. Tao. Stab... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
deborov´a. Asymptotic analysis of the stochas-
tic block model for modular networks and its algorithmic applications. Phys. Rev. E, 84,
December 2011.
Y. Deshpande and A. Montanari. Finding hidden cliques of size (cid:112)N/e in nearly linear
time. Available online at arXiv:1304.7047 [math.PR], 2013.
[DM13]
[DMS15]
A. ... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
ating the average degree in a graph. 2005.
D. F´eral and S. P´ech´e. The largest eigenvalue of rank one deformation of large wigner
matrices. Communications in Mathematical Physics, 272(1):185–228, 2006.
S. Foucart and H. Rauhut. A Mathematical Introduction to Compressive Sensing.
Birkhauser, 2013.
J. J. Fuchs. On spar... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
cut and satisfiability problems using semidefine programming. Journal of the Association
for Computing Machinery, 42:1115–1145, 1995.
157[GZC+15] Amir Ghasemian, Pan Zhang, Aaron Clauset, Cristopher Moore, and Leto Peel. De-
tectability thresholds and optimal algorithms for community structure in dynamic net-
works. Ava... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
finite
programming: Extensions. Available online at arXiv:1502.07738, 2015.
[IKW14]
A. Israel, F. Krahmer, and R. Ward. An arithmetic-geometric mean inequality for prod-
ucts of three matrices. Available online at arXiv:1411.0333 [math.SP], 2014.
[IMPV15a] T. Iguchi, D. G. Mixon, J. Peterson, and S. Villar. On the tight... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
. Optimal inapproximability results for
max-cut and other 2-variable csps? 2005.
[KV13]
[KW92]
[Las01]
[Lat05]
[LGT12]
[Llo82]
[LM00]
S. A. Khot and N. K. Vishnoi. The unique games conjecture,
integrality gap for
cut problems and embeddability of negative type metrics into l1. Available online at
arXiv:1305.4581 [cs.CC... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
.
[Mas00]
[Mas14]
P. Massart. About the constants in Talagrand’s concentration inequalities for empirical
processes. The Annals of Probability, 28(2), 2000.
L. Massouli´e. Community detection thresholds and the weak ramanujan property.
In
Proceedings of the 46th Annual ACM Symposium on Theory of Computing, STOC ’14,
pa... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
. Probability
Theory and Related Fields (to appear), 2014.
[Mon14]
[Mos11]
[MP67]
[MR14]
A. Montanari. Principal component analysis with nonnegativity constraints. http: //
sublinear. info/ index. php? title= Open_ Problems: 62 , 2014.
M. S. Moslehian. Ky Fan inequalities. Available online at arXiv:1108.1467 [math.FA],... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
2000.
A. Nikolov. The komlos conjecture holds for vector colorings. Available online at
arXiv:1301.4039 [math.CO], 2013.
J. Nelson and L. Nguyen. Osnap: Faster numerical linear algebra algorithms via sparser
subspace embeddings. Available at arXiv:1211.1002 [cs.DS].
[NPW14]
J. Nelson, E. Price, and M. Wootters. New con... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
volume 294 of London Mathematical
G. Pisier. Grothendieck’s theorem, past and present. Bull. Amer. Math. Soc., 49:237–323,
2011.
[PW15]
W. Perry and A. S. Wein. A semidefinite program for unbalanced multisection in the
stochastic block model. Available online at arXiv:1507.05605 [cs.DS], 2015.
[QSW14] Q. Qu, J. Sun, and... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
Rokhlin, A. Szlam, and M. Tygert. A randomized algorithm for principal component
analysis. Available at arXiv:0809.2274 [stat.CO], 2009.
P. Raghavendra, D. Steurer, and M. Tulsiani. Reductions between expansion problems.
IEEE CCC, 2012.
M. Rudelson and R. Vershynin. On sparse reconstruction from Fourier and Gaussian
me... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
Shor. An approach to obtaining global extremums in polynomial mathematical pro-
gramming problems. Cybernetics and Systems Analysis, 23(5):695–700, 1987.
A. Singer. Angular synchronization by eigenvectors and semidefinite programming. Appl.
Comput. Harmon. Anal., 30(1):20 – 36, 2011.
[Spe75]
J. Spencer. Ramsey’s theorem... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
and J. C. Langford. A global geometric framework for
nonlinear dimensionality reduction. Science, 290(5500):2319–2323, 2000.
[TP13]
A. M. Tillmann and M. E. Pfefsch. The computational complexity of the restricted
isometry property, the nullspace property, and related concepts in compressed sensing.
2013.
[Tre11]
L. Tre... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
:1502.05003 [math.PR], 2015.
[Yam54]
K. Yamamoto. Logarithmic order of free distributive lattice. Journal of the Mathematical
Society of Japan, 6:343–353, 1954.
[ZB09]
[Zha14]
L. Zdeborova and S. Boettcher. Conjecture on the maximum cut and bisection width in
random regular graphs. Available online at arXiv:0912.4861 [... | https://ocw.mit.edu/courses/18-s096-topics-in-mathematics-of-data-science-fall-2015/5f0f7205d1cf274e80d77345a7edbf2a_MIT18_S096F15_TenLec.pdf |
3.044 MATERIALS PROCESSING
LECTURE 8
Radiation:
∂T−k
∂x
(cid:2)
=
−εσ
surf − T 4
T 4
source
(cid:3)
M = εσ
L
k
T 3
surf
∂T
∂t
= α
∇2T
q = εσ(T 4
surf − T 4
source)
⇒ Very few analytical solutions, some charts
Date: March 5th, 2012.
1
2
LECTURE 8
CVD: Chemical Vapor Deposition
At steady state the thermocouple outputs a... | https://ocw.mit.edu/courses/3-044-materials-processing-spring-2013/5f208d00cad80cf13ccba92887fe7aa3_MIT3_044S13_Lec08.pdf |
6)
∂T
∂x
(cid:7)
(cid:8)
(cid:8)
(cid:8)
(cid:8)
−ks
=
(cid:4)
s
(cid:4)
qout
(cid:5)(cid:6)
∂T
∂s
(cid:7)
(cid:8)
(cid:8)
(cid:8)
(cid:8)
l
−kl
3. heat of fusion
Look closely:
qin = −kl
(cid:8)
(cid:8)
(cid:8)
(cid:8)
∂T
∂x
x=s,l
4
LECTURE 8
qout = −ks
Fusion: − Hf
(cid:8)
(cid:8)
(cid:8)
(cid:8)
∂T
∂x
(cid:9)
kJ
kg
... | https://ocw.mit.edu/courses/3-044-materials-processing-spring-2013/5f208d00cad80cf13ccba92887fe7aa3_MIT3_044S13_Lec08.pdf |
)
MIT OpenCourseWare
http://ocw.mit.edu
3.044 Materials Processing
Spring 2013
For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. | https://ocw.mit.edu/courses/3-044-materials-processing-spring-2013/5f208d00cad80cf13ccba92887fe7aa3_MIT3_044S13_Lec08.pdf |
15.083J/6.859J Integer Optimization
Lecture 6: Ideal formulations II
1 Outline
• Randomized rounding methods
2 Randomized rounding
• Solve c(cid:2)x subject to x ∈ P for arbitrary c.
• x be optimal solution.
∗
• From x ∗ create a new random integer solution x, feasible in P : E[c(cid:2)x] =
ZLP = c(cid:2)x ∗ .
... | https://ocw.mit.edu/courses/15-083j-integer-programming-and-combinatorial-optimization-fall-2009/5f5e9ce28082dce02c359a8b43a40b62_MIT15_083JF09_lec06.pdf |
⎡
ZIP ≤ E[ZH] = E ⎣
(cid:2)
⎤
⎦
cuv xuv
(cid:2)
{u,v}∈E
(cid:2)
=
=
{u,v}∈E
(cid:7)
(cid:8)
(cid:10)
(cid:9)
(cid:9)
∗
∗
cuv P min yu, yv ≤ U < max yu, yv
(cid:8)
∗
∗
∗
∗
cuv |yu − yv |
{u,v}∈E
= ZLP ≤ ZIP
2.3 Stable matching
• n men {m1, . . . , mn} and n women {w1, . . . , wn}, with each person h... | https://ocw.mit.edu/courses/15-083j-integer-programming-and-combinatorial-optimization-fall-2009/5f5e9ce28082dce02c359a8b43a40b62_MIT15_083JF09_lec06.pdf |
=
xij .
• Complementary slackness of optimal primal and dual solutions.
i=1
j=1
i=1 j=1
i=1 j=1
3
0
mi
(cid:2)
xij
0011 01
01
x0011
ik
j }
w
{k|wk <mi
1
(cid:2)
{k|mk >wj
xkj
mi }
wj
01
01 01
2.4 Key Theorem
PSM = conv(S).
2.4.1 Randomization
• Generate a random number U uniformly in [0,1].
... | https://ocw.mit.edu/courses/15-083j-integer-programming-and-combinatorial-optimization-fall-2009/5f5e9ce28082dce02c359a8b43a40b62_MIT15_083JF09_lec06.pdf |
Slide 10
Slide 11
Slide 12
(cid:12)
• xij = 0
1 u
xij du: x can be written as a convex combination of stable matchings
x u as u varies over the interval [0, 1].
4
MIT OpenCourseWare
http://ocw.mit.edu
15.083J / 6.859J Integer Programming and Combinatorial Optimization
Fall 2009
For information about citing ... | https://ocw.mit.edu/courses/15-083j-integer-programming-and-combinatorial-optimization-fall-2009/5f5e9ce28082dce02c359a8b43a40b62_MIT15_083JF09_lec06.pdf |
MIT OpenCourseWare
http://ocw.mit.edu
18.102 Introduction to Functional Analysis
Spring 2009
For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.
LECTURE NOTES FOR 18.102, SPRING 2009
27
Lecture 6. Tuesday, Feb 24
By now the structure of the proofs should be getting... | https://ocw.mit.edu/courses/18-102-introduction-to-functional-analysis-spring-2009/5f60894efb394c09e45df3ba7120c74b_MIT18_102s09_lec06.pdf |
f1(x)|, gk(x) = |
fj (x)| − |
fj (x)| ∀ x ∈ R.
k
�
k−1
�
j=1
j=1
Then, for sure,
(6.4)
N
�
N
�
gk(x) = |
fj (x)| → |f (x)| if
�
|fj (x)| < ∞.
k=1
j=1
j
So, what we need to check, for a start, is that {gj } is an absolutely summable series
of step functions.
The triangle inequality in the form ||v| − ... | https://ocw.mit.edu/courses/18-102-introduction-to-functional-analysis-spring-2009/5f60894efb394c09e45df3ba7120c74b_MIT18_102s09_lec06.pdf |
�
⎪gk(x)
⎨
fk(x)
−fk(x)
⎩
⎪
if n = 3k − 2
if n = 3k − 1
if n = 3k.
This series converges absolutely if and only if both the |gk(x)| and |fk(x)| series
converge – the convergence of the latter implies the convergence of the former so
(6.9)
�
|hn(x)| < ∞ ⇐⇒
|fk(x)|.
�
n
k
On the other hand when this hold... | https://ocw.mit.edu/courses/18-102-introduction-to-functional-analysis-spring-2009/5f60894efb394c09e45df3ba7120c74b_MIT18_102s09_lec06.pdf |
E is of measure zero.
|f | = 0.
Proof. The main part of this is the first part, that the vanishing of
|f | implies
that f is null. This I will prove using the next Proposition. The converse is the
easier direction.
�
Namely, if f is null in the sense of (6.11) then, by the definition of a set of
measure zero, the... | https://ocw.mit.edu/courses/18-102-introduction-to-functional-analysis-spring-2009/5f60894efb394c09e45df3ba7120c74b_MIT18_102s09_lec06.pdf |
also closely
related to the completeness of L1(R).
Proposition 11. If fn ∈ L1(R) is an absolutely summable series, in the sense that
� �
|fn| < ∞ then
n
(6.17)
E = {x ∈ R;
�
|fn(x)| = ∞} has measure zero
and if f : R −→ C and
(6.18)
then f ∈ L1(R) and
(6.19)
n
f (x) =
�
fn(x) ∀ x ∈ R \ E
n
�
f =
� ... | https://ocw.mit.edu/courses/18-102-introduction-to-functional-analysis-spring-2009/5f60894efb394c09e45df3ba7120c74b_MIT18_102s09_lec06.pdf |
summability – so the tail of the series is
small. Having done this, we replace the series fn,j by
(6.22)
f � =
n,1
fn,j (x), n,j
f �
(x) = fn,Nn
+k−1(x) ∀ j ≥ 2.
�
j≤Nn
30
LECTURE NOTES FOR 18.102, SPRING 2009
This still converges to fn on the same set as in (6.20). So in fact we can simply
replace fn,j by ... | https://ocw.mit.edu/courses/18-102-introduction-to-functional-analysis-spring-2009/5f60894efb394c09e45df3ba7120c74b_MIT18_102s09_lec06.pdf |
convergent series we see that
(6.27)
|fn,j (x)| < ∞ = ⇒ f (x) =
|gk(x)| =
fn,j (x).
�
�
� �
n,j
k
n
j
From a result last week, we know that the set on the left here is of the form R \ E
|fn,j (x)| = ∞.
where E is of measure zero; E is the union of the sets En on which
�
j
So, take another absolutel summa... | https://ocw.mit.edu/courses/18-102-introduction-to-functional-analysis-spring-2009/5f60894efb394c09e45df3ba7120c74b_MIT18_102s09_lec06.pdf |
0
} has measure zero
which is what we wanted to show.
Finally this allows us to define the standard Lebesgue space
(6.29)
and to check that
L1(R) = L1(R)/N , N = {null functions}
|f | is indeed a norm on this space.
�
�
�
LECTURE NOTES FOR 18.102, SPRING 2009
31
Problem set 3, Due 11AM Tuesday 3 Mar.
This pro... | https://ocw.mit.edu/courses/18-102-introduction-to-functional-analysis-spring-2009/5f60894efb394c09e45df3ba7120c74b_MIT18_102s09_lec06.pdf |
(5) Show that the integral is a continuous linear functional
�
(6.31)
: L1(R) −→ C.
Problem 3.2 If I ⊂ R is an interval, including possibly (−∞, a) or (a, ∞), we
define Lebesgue integrability of a function f : I −→ C to mean the Lebesgue
integrability of
(6.32)
f˜ : R −→ C,
f˜(x) =
�
f (x) x ∈ I
0
x ∈ R \ I... | https://ocw.mit.edu/courses/18-102-introduction-to-functional-analysis-spring-2009/5f60894efb394c09e45df3ba7120c74b_MIT18_102s09_lec06.pdf |
102, SPRING 2009
(7) Show that the preceeding construction gives a surjective and continuous
linear map ‘restriction to I’
(6.35)
L1(R) −→ L1(I).
(Notice that these are the quotient spaces of integrable functions modulo
equality a.e.)
Problem 3.3 Really continuing the previous one.
(1) Show that if I = [a, b) and... | https://ocw.mit.edu/courses/18-102-introduction-to-functional-analysis-spring-2009/5f60894efb394c09e45df3ba7120c74b_MIT18_102s09_lec06.pdf |
to be zero outside, is Lebesgue integrable. Using this,
and the fact that step functions are dense in L1(R) show that the linear space of
continuous functions on R each of which vanishes outside a compact set (which
depends on the function) form a dense subset of L1(R).
Problem 3.6
(1) If g : R −→ C is bounded and... | https://ocw.mit.edu/courses/18-102-introduction-to-functional-analysis-spring-2009/5f60894efb394c09e45df3ba7120c74b_MIT18_102s09_lec06.pdf |
of contin
uous functions, with supremum norm, on [0, 1].
34
LECTURE NOTES FOR 18.102, SPRING 2009
Solutions to Problem set 2
I was originally going to make this problem set longer, since there is a missing
Tuesday. However, I would prefer you to concentrate on getting all four of these
questions really right!
... | https://ocw.mit.edu/courses/18-102-introduction-to-functional-analysis-spring-2009/5f60894efb394c09e45df3ba7120c74b_MIT18_102s09_lec06.pdf |
(6.45)
�
n
�bn�B < ∞.
We have to show that it converges in B. The first task is to guess what the limit
should be. The idea is that it should be a series which adds up to ‘the sum of the
(n) in V. So, we
bn’s’. Each bn is represented by an absolutely summable series vk
can just look for the usual diagonal sum of... | https://ocw.mit.edu/courses/18-102-introduction-to-functional-analysis-spring-2009/5f60894efb394c09e45df3ba7120c74b_MIT18_102s09_lec06.pdf |
∞ �
uk� and
�uk�V < ∞. Choosing M large it follows that
�
N
k=1
(6.50)
�uk�V ≤ 2−n−1 .
With this choice of M set v(n) =
1
uk and v(n) = uM +k−1 for all k ≥ 2. This does
k
still represent bn since the difference of the sums,
(6.51)
N
� �
(n) −
vk
N
uk = −
N +M −1
�
uk
k=1
k=1
k=N
for all N. The sum... | https://ocw.mit.edu/courses/18-102-introduction-to-functional-analysis-spring-2009/5f60894efb394c09e45df3ba7120c74b_MIT18_102s09_lec06.pdf |
�
�b −
n=1
�
n
�
N
n=1
with nth term
(6.55)
and the norm is then
(6.56)
N
�
(n)
vk
wk −
n=1
lim
p→∞
p
� �
(wk −
�
N
k=1
n=1
v(n)
k )�V .
The norm here is itself a limit – b −
bn is represented by the summable series
Then we need to understand what happens as N → ∞! Now, wk is the diagonal
(n... | https://ocw.mit.edu/courses/18-102-introduction-to-functional-analysis-spring-2009/5f60894efb394c09e45df3ba7120c74b_MIT18_102s09_lec06.pdf |
2 Let’s consider an example of an absolutely summable sequence
of step functions. For the interval [0, 1) (remember there is a strong preference
for left-closed but right-open intervals for the moment) consider a variant of the
construction of the standard Cantor subset based on 3 proceeding in steps. Thus,
remove ... | https://ocw.mit.edu/courses/18-102-introduction-to-functional-analysis-spring-2009/5f60894efb394c09e45df3ba7120c74b_MIT18_102s09_lec06.pdf |
to one on the union of all
the subintervals of [0, 1) which are removed in the construction and zero
elsewhere. Show that g is Lebesgue integrable and compute its integral.
Solution.
(1) The total length of the intervals is being reduced by a factor of
1/3 each time. Thus l(Ck) = 3k . Thus the integral of f, which... | https://ocw.mit.edu/courses/18-102-introduction-to-functional-analysis-spring-2009/5f60894efb394c09e45df3ba7120c74b_MIT18_102s09_lec06.pdf |
k+1, which is not an
empty set, f (x) = k.
(5) The set F, which is the union of the intervals removed is [0, 1) \ E. Taking
step functions equal to 1 on each of the intervals removed gives an absolutely
summable series, since they are non-negative and the kth one has integral
1/3×(2/3)k−1 for k = 1, . . . . This s... | https://ocw.mit.edu/courses/18-102-introduction-to-functional-analysis-spring-2009/5f60894efb394c09e45df3ba7120c74b_MIT18_102s09_lec06.pdf |
of the areas of the rectangles is at least as large of
that of the rectangle contained in the union.
(5) Prove the extension of the preceeding result to a countable collection of
rectangles with union containing a given rectangle.
Solution.
(1) For subdivision of one rectangle this is clear enough. Namely
we eith... | https://ocw.mit.edu/courses/18-102-introduction-to-functional-analysis-spring-2009/5f60894efb394c09e45df3ba7120c74b_MIT18_102s09_lec06.pdf |
number of
points in C1 and the finite number of points in C2. The total area remains
the same and now the rectangles covering [a1, b1) × [A2, b2) are precisely
the Ai × Bj where the Ai are a set of disjoint intervals covering [a1, b1)
and the Bj are a similar set covering [a2, b2). Applying the one-dimensional
resu... | https://ocw.mit.edu/courses/18-102-introduction-to-functional-analysis-spring-2009/5f60894efb394c09e45df3ba7120c74b_MIT18_102s09_lec06.pdf |
rectangles cover D. Now look at
the next one, DN −k+1. Subdivide it using all the endpoints of the intervals
for the earlier rectangles D1, . . . , Dk and D. After subdivision of DN −k+1
each resulting rectangle is either contained in one of the Dj , j ≤ N − k
or is not contained in D. All these can be discarded an... | https://ocw.mit.edu/courses/18-102-introduction-to-functional-analysis-spring-2009/5f60894efb394c09e45df3ba7120c74b_MIT18_102s09_lec06.pdf |
9
39
[a2, b1 − δ). Applying the preceeding finite result we see that
(6.66)
Sum of areas + 2Cδ ≥ Area D − 2Cδ.
Since this is true for all δ > 0 the result follows.
�
I encourage you to go through the discussion of integrals of step functions – now
based on rectangles instead of intervals – and see that everythin... | https://ocw.mit.edu/courses/18-102-introduction-to-functional-analysis-spring-2009/5f60894efb394c09e45df3ba7120c74b_MIT18_102s09_lec06.pdf |
function f and then
add afterwards. By the uniform continuity of a continuous function on a
compact set, in this case [0, 1], given n there exists N such that |x − y| ≤
2−N = ⇒ |f (x)−f (y)| ≤ 2−n . So, if we divide into 2N equal intervals, where
N depends on n and we insist that it be non-decreasing as a function ... | https://ocw.mit.edu/courses/18-102-introduction-to-functional-analysis-spring-2009/5f60894efb394c09e45df3ba7120c74b_MIT18_102s09_lec06.pdf |
� 1
0
f (x)dx
(6.71)
(6.72)
where on the right is the Riemann integral. However this follows from the
fact that
�
�
f = lim
n→∞
Fn
and the integral of the step function is between the Riemann upper and
lower sums for the corresponding partition of [0, 1].
� | https://ocw.mit.edu/courses/18-102-introduction-to-functional-analysis-spring-2009/5f60894efb394c09e45df3ba7120c74b_MIT18_102s09_lec06.pdf |
OpencourseWare
2.11 The p diacritic (and the %r tone label)
9 August 2006
Note for this 2006 ToBI tutorial: Prosodic labelling of disfluencies has turned out to be one of
the biggest challenges to the ToBI system, and because these events happen often in spontaneous
speech, extending the system to label them appro... | https://ocw.mit.edu/courses/6-911-transcribing-prosodic-structure-of-spoken-utterances-with-tobi-january-iap-2006/5f9c5ac91b6352207d27efe39712e480_chap2_11.pdf |
isi-Kelm and Sun-Ah Jun (2005) “A comparison of disfluency patterns in normal and stuttered
speech” in Proceedings of Disfluency in Spontaneous Speech Workshop, Aix-en Provence, France.
1 1 1
1 3-
2p 0
4
which leave after 4:00 p.m.
2p 2p 3p 2p 4
The p diacritic is used in conjunction with a break index 1, 2, o... | https://ocw.mit.edu/courses/6-911-transcribing-prosodic-structure-of-spoken-utterances-with-tobi-january-iap-2006/5f9c5ac91b6352207d27efe39712e480_chap2_11.pdf |
I mean the stuff he knows is kind of
0 0 1p 3 1 4 1
1 1
4 1 1 1
amazing 'coz he does a lot of um environmental
3 1p 1 1 X 0 1 4
1
impact stuff
2p 4
EXAMPLE <cheapest>: I want to see the cheapest flight from Atlanta
1
1 1 1 1 3p
1 1
3
to Baltimore
1
4
In general the p diacritic should be used conse... | https://ocw.mit.edu/courses/6-911-transcribing-prosodic-structure-of-spoken-utterances-with-tobi-january-iap-2006/5f9c5ac91b6352207d27efe39712e480_chap2_11.pdf |
In these cases there is clearly no disfluency and 1p should not be used. Conversely,
an abrupt cutoff that needs a 1p can occur when no phonological material is missing, as when a
final vowel is abruptly interrupted, e.g. in an utterance like “I-I don’t know”. In these cases
there is a perceived disfluency i.e. a su... | https://ocw.mit.edu/courses/6-911-transcribing-prosodic-structure-of-spoken-utterances-with-tobi-january-iap-2006/5f9c5ac91b6352207d27efe39712e480_chap2_11.pdf |
H*
H-L%
EXAMPLE <connections>: What are the plane sizes for these flights and
4 1
4 1
1
1 1 1
H*
1
L* H-H% H* H* H-L%
do they ha(ve)- do are there any other flights
2p 1
1p 1p 1
%r
1 1
H*
1
1
!H*
that have s-
connections
1 1 1p
4
%r H* L-L%
As with the use of the p diacritic, one should be cons... | https://ocw.mit.edu/courses/6-911-transcribing-prosodic-structure-of-spoken-utterances-with-tobi-january-iap-2006/5f9c5ac91b6352207d27efe39712e480_chap2_11.pdf |
index for the intermediate phrase.
Summary of ToBI labels introduced so far:
Tones:
H*: high pitch accent
L*: low pitch accent
L+H*: bitonal pitch accent with low tone followed by high tone prominence
L*+H: bitonal pitch accent with low tone prominence followed by high tone
!H*: downstepped high pitch accent
L+... | https://ocw.mit.edu/courses/6-911-transcribing-prosodic-structure-of-spoken-utterances-with-tobi-january-iap-2006/5f9c5ac91b6352207d27efe39712e480_chap2_11.pdf |
MIT OpenCourseWare
http://ocw.mit.edu
ESD.70J / 1.145J Engineering Economy Module
Fall 2009
For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.
ESD.70J Engineering Economy
Fall 2009
Session One
Michel-Alexandre Cardin
Prof. Richard de Neufville
ESD.70J Engineering Eco... | https://ocw.mit.edu/courses/esd-70j-engineering-economy-module-fall-2009/5fa0b84793362aca263cb900be59ba34_MITESD_70Jf09_lec01.pdf |
Analysis
– today
2. Monte Carlo simulations
3. Modeling uncertainty using different
stochastic models and probability
distributions
4. Analyzing the system in the context of
flexibility
ESD.70J Engineering Economy Module - Session 1
6
Course Materials
• Excel spreadsheets
– ESD70session# –1.xls : setup before the... | https://ocw.mit.edu/courses/esd-70j-engineering-economy-module-fall-2009/5fa0b84793362aca263cb900be59ba34_MITESD_70Jf09_lec01.pdf |
movie of THE BEST MAN, 1964
… weather … oil supply … stock market …
ESD.70J Engineering Economy Module - Session 1
10
Modeling with dynamic mentality
• Cannot ignore the intrinsic uncertainty of
the future (cid:198) DYNAMIC mentality in
decision-making to the rescue
• Excel is a decent tool for decision analysis
• W... | https://ocw.mit.edu/courses/esd-70j-engineering-economy-module-fall-2009/5fa0b84793362aca263cb900be59ba34_MITESD_70Jf09_lec01.pdf |
linked to
entries => NEVER HARD CODE INPUTS
ESD.70J Engineering Economy Module - Session 1
16
Net Present Value (NPV) primer
• NPV = PV (Cash Inflows) - PV (Cash Outflows)
=NPV
T
∑
0=t
CF
t
r)+(1
t
NPV ≥ 0 ⇒ valuable project
‘r’ reflects risk of project, expressed as required
rate of return. Also called discount ra... | https://ocw.mit.edu/courses/esd-70j-engineering-economy-module-fall-2009/5fa0b84793362aca263cb900be59ba34_MITESD_70Jf09_lec01.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.