-
Adaptive Inference through Bayesian and Inverse Bayesian Inference with Symmetry-Bias in Nonstationary Environments
Authors:
Shuji Shinohara,
Daiki Morita,
Hayato Hirai,
Ryosuke Kuribayashi,
Nobuhito Manome,
Toru Moriyama,
Yoshihiro Nakajima,
Yukio-Pegio Gunji,
Ung-il Chung
Abstract:
This study introduces a novel inference framework, designated as Bayesian and inverse Bayesian (BIB) inference, which concurrently performs both conventional and inverse Bayesian updates by integrating symmetry bias into Bayesian inference. The effectiveness of the model was evaluated through a sequential estimation task involving observations sampled from a Gaussian distribution with a stochastic…
▽ More
This study introduces a novel inference framework, designated as Bayesian and inverse Bayesian (BIB) inference, which concurrently performs both conventional and inverse Bayesian updates by integrating symmetry bias into Bayesian inference. The effectiveness of the model was evaluated through a sequential estimation task involving observations sampled from a Gaussian distribution with a stochastically time-varying mean. Conventional Bayesian inference entails a fundamental trade-off between adaptability to abrupt environmental shifts and estimation accuracy during stable intervals. The BIB framework addresses this limitation by dynamically modulating the learning rate through inverse Bayesian updates, thereby enhancing adaptive flexibility. The BIB model generated spontaneous bursts in the learning rate during sudden environmental transitions, transiently entering a high-sensitivity state to accommodate incoming data. This intermittent burst-relaxation pattern functions as a dynamic mechanism that balances adaptability and accuracy. Further analysis of burst interval distributions demonstrated that the BIB model consistently produced power-law distributions under diverse conditions. Such robust scaling behavior, absent in conventional Bayesian inference, appears to emerge from a self-regulatory mechanism driven by inverse Bayesian updates. These results present a novel computational perspective on scale-free phenomena in natural systems and offer implications for designing adaptive inference systems in nonstationary environments.
△ Less
Submitted 25 May, 2025; v1 submitted 19 May, 2025;
originally announced May 2025.
-
Walk model that continuously generates Brownian walks to Lévy walks depending on destination attractiveness
Authors:
Shuji Shinohara,
Daiki Morita,
Hayato Hirai,
Ryosuke Kuribayashi,
Nobuhito Manome,
Toru Moriyama,
Hiroshi Okamoto,
Yoshihiro Nakajima,
Yukio-Pegio Gunji,
Ung-il Chung
Abstract:
The Lévy walk, a type of random walk characterized by linear step lengths that follow a power-law distribution, is observed in the migratory behaviors of various organisms, ranging from bacteria to humans. Notably, Lévy walks with power exponents close to two, also known as Cauchy walks, are frequently observed, though their underlying causes remain elusive. This study proposes a walk model in whi…
▽ More
The Lévy walk, a type of random walk characterized by linear step lengths that follow a power-law distribution, is observed in the migratory behaviors of various organisms, ranging from bacteria to humans. Notably, Lévy walks with power exponents close to two, also known as Cauchy walks, are frequently observed, though their underlying causes remain elusive. This study proposes a walk model in which agents move toward a destination in multi-dimensional space and their movement strategy is parameterized by the extent to which they pursue the shortest path to the destination. This parameter is taken to represent the attractiveness of the destination to the agents. Our findings reveal that if the destination is very attractive, agents intensively search the area around it using Brownian walks, whereas if the destination is unattractive, they explore a distant region away from the point using Lévy walks with power exponents less than two. In the case where agents are unable to determine whether the destination is attractive or unattractive, Cauchy walks emerge. The Cauchy walker searches the region with a probability inversely proportional to the distance from the destination. This suggests that it preferentially searches the area close to the destination, while concurrently having the potential to extend the search area much further. Our model, which can change the search method and search area depending on the attractiveness of the destination, has the potential to be utilized for exploring the parameter space of optimization problems.
△ Less
Submitted 11 September, 2024; v1 submitted 13 May, 2024;
originally announced May 2024.
-
Algebraic combinatorial optimization on the degree of determinants of noncommutative symbolic matrices
Authors:
Hiroshi Hirai,
Yuni Iwamasa,
Taihei Oki,
Tasuku Soma
Abstract:
We address the computation of the degrees of minors of a noncommutative symbolic matrix of form \[
A[c] := \sum_{k=1}^m A_k t^{c_k} x_k, \] where $A_k$ are matrices over a field $\mathbb{K}$, $x_i$ are noncommutative variables, $c_k$ are integer weights, and $t$ is a commuting variable specifying the degree. This problem extends noncommutative Edmonds' problem (Ivanyos et al. 2017), and can form…
▽ More
We address the computation of the degrees of minors of a noncommutative symbolic matrix of form \[
A[c] := \sum_{k=1}^m A_k t^{c_k} x_k, \] where $A_k$ are matrices over a field $\mathbb{K}$, $x_i$ are noncommutative variables, $c_k$ are integer weights, and $t$ is a commuting variable specifying the degree. This problem extends noncommutative Edmonds' problem (Ivanyos et al. 2017), and can formulate various combinatorial optimization problems. Extending the study by Hirai 2018, and Hirai, Ikeda 2022, we provide novel duality theorems and polyhedral characterization for the maximum degrees of minors of $A[c]$ of all sizes, and develop a strongly polynomial-time algorithm for computing them. This algorithm is viewed as a unified algebraization of the classical Hungarian method for bipartite matching and the weight-splitting algorithm for linear matroid intersection. As applications, we provide polynomial-time algorithms for weighted fractional linear matroid matching and linear optimization over rank-2 Brascamp-Lieb polytopes.
△ Less
Submitted 24 October, 2023;
originally announced October 2023.
-
Interior-point methods on manifolds: theory and applications
Authors:
Hiroshi Hirai,
Harold Nieuwboer,
Michael Walter
Abstract:
Interior-point methods offer a highly versatile framework for convex optimization that is effective in theory and practice. A key notion in their theory is that of a self-concordant barrier. We give a suitable generalization of self-concordance to Riemannian manifolds and show that it gives the same structural results and guarantees as in the Euclidean setting, in particular local quadratic conver…
▽ More
Interior-point methods offer a highly versatile framework for convex optimization that is effective in theory and practice. A key notion in their theory is that of a self-concordant barrier. We give a suitable generalization of self-concordance to Riemannian manifolds and show that it gives the same structural results and guarantees as in the Euclidean setting, in particular local quadratic convergence of Newton's method. We analyze a path-following method for optimizing compatible objectives over a convex domain for which one has a self-concordant barrier, and obtain the standard complexity guarantees as in the Euclidean setting. We provide general constructions of barriers, and show that on the space of positive-definite matrices and other symmetric spaces, the squared distance to a point is self-concordant. To demonstrate the versatility of our framework, we give algorithms with state-of-the-art complexity guarantees for the general class of scaling and non-commutative optimization problems, which have been of much recent interest, and we provide the first algorithms for efficiently finding high-precision solutions for computing minimal enclosing balls and geometric medians in nonpositive curvature.
△ Less
Submitted 11 April, 2023; v1 submitted 8 March, 2023;
originally announced March 2023.
-
Polyhedral Clinching Auctions for Indivisible Goods
Authors:
Hiroshi Hirai,
Ryosuke Sato
Abstract:
In this study, we propose the polyhedral clinching auction for indivisible goods, which has so far been studied for divisible goods. As in the divisible setting by Goel et al. (2015), our mechanism enjoys incentive compatibility, individual rationality, and Pareto optimality, and works with polymatroidal environments. A notable feature for the indivisible setting is that the whole procedure can be…
▽ More
In this study, we propose the polyhedral clinching auction for indivisible goods, which has so far been studied for divisible goods. As in the divisible setting by Goel et al. (2015), our mechanism enjoys incentive compatibility, individual rationality, and Pareto optimality, and works with polymatroidal environments. A notable feature for the indivisible setting is that the whole procedure can be conducted in time polynomial of the number of buyers and goods. Moreover, we show additional efficiency guarantees, recently established by Sato for the divisible setting: The liquid welfare (LW) of our mechanism achieves more than 1/2 of the optimal LW, and that the social welfare is more than the optimal LW.
△ Less
Submitted 4 November, 2024; v1 submitted 28 February, 2023;
originally announced March 2023.
-
Finding Hall blockers by matrix scaling
Authors:
Koyo Hayashi,
Hiroshi Hirai,
Keiya Sakabe
Abstract:
For a given nonnegative matrix $A=(A_{ij})$, the matrix scaling problem asks whether $A$ can be scaled to a doubly stochastic matrix $D_1AD_2$ for some positive diagonal matrices $D_1,D_2$.The Sinkhorn algorithm is a simple iterative algorithm, which repeats row-normalization $A_{ij} \leftarrow A_{ij}/\sum_{j}A_{ij}$ and column-normalization $A_{ij} \leftarrow A_{ij}/\sum_{i}A_{ij}$ alternatively.…
▽ More
For a given nonnegative matrix $A=(A_{ij})$, the matrix scaling problem asks whether $A$ can be scaled to a doubly stochastic matrix $D_1AD_2$ for some positive diagonal matrices $D_1,D_2$.The Sinkhorn algorithm is a simple iterative algorithm, which repeats row-normalization $A_{ij} \leftarrow A_{ij}/\sum_{j}A_{ij}$ and column-normalization $A_{ij} \leftarrow A_{ij}/\sum_{i}A_{ij}$ alternatively. By this algorithm, $A$ converges to a doubly stochastic matrix in limit if and only if the bipartite graph associated with $A$ has a perfect matching. This property can decide the existence of a perfect matching in a given bipartite graph $G$, which is identified with the $0,1$-matrix $A_G$.Linial, Samorodnitsky, and Wigderson showed that $O(n^2 \log n)$ iterations for $A_G$ decide whether $G$ has a perfect matching. Here $n$ is the number of vertices in one of the color classes of $G$. In this paper, we show an extension of this result:If $G$ has no perfect matching, then a polynomial number of the Sinkhorn iterations identifies a Hall blocker -- a vertex subset $X$ having neighbors $Γ(X)$ with $|X| > |Γ(X)|$. Specifically, we show that $O(n^2 \log n)$ iterations can identify one Hall blocker, and that further polynomial iterations can also identify all parametric Hall blockers $X$ of maximizing $(1-λ) |X| - λ|Γ(X)|$ for $λ\in [0,1]$.The former result is based on an interpretation of the Sinkhorn algorithm as alternating minimization for geometric programming. The latter is on an interpretation as alternating minimization for KL-divergence (Csiszár and Tusnády 1984, Gietl and Reffel 2013) and its limiting behavior for a nonscalable matrix (Aas 2014). We also relate the Sinkhorn limit with parametric network flow, principal partition of polymatroids, and the Dulmage-Mendelsohn decomposition of a bipartite graph.
△ Less
Submitted 15 June, 2023; v1 submitted 15 April, 2022;
originally announced April 2022.
-
Two flags in a semimodular lattice generate an antimatroid
Authors:
Koyo Hayashi,
Hiroshi Hirai
Abstract:
A basic property in a modular lattice is that any two flags generate a distributive sublattice. It is shown (Abels 1991, Herscovic 1998) that two flags in a semimodular lattice no longer generate such a good sublattice, whereas shortest galleries connecting them form a relatively good join-sublattice. In this note, we sharpen this investigation to establish an analogue of the two-flag generation t…
▽ More
A basic property in a modular lattice is that any two flags generate a distributive sublattice. It is shown (Abels 1991, Herscovic 1998) that two flags in a semimodular lattice no longer generate such a good sublattice, whereas shortest galleries connecting them form a relatively good join-sublattice. In this note, we sharpen this investigation to establish an analogue of the two-flag generation theorem for a semimodular lattice. We consider the notion of a modular convex subset, which is a subset closed under the join and meet only for modular pairs, and show that the modular convex hull of two flags in a semimodular lattice of rank $n$ is isomorphic to a union-closed family on $[n]$. This family uniquely determines an antimatroid, which coincides with the join-sublattice of shortest galleries of the two flags.
△ Less
Submitted 6 April, 2022;
originally announced April 2022.
-
A cost-scaling algorithm for computing the degree of determinants
Authors:
Hiroshi Hirai,
Motoki Ikeda
Abstract:
In this paper, we address computation of the degree $\mathop{\rm deg Det} A$ of Dieudonné determinant $\mathop{\rm Det} A$ of \[ A = \sum_{k=1}^m A_k x_k t^{c_k}, \] where $A_k$ are $n \times n$ matrices over a field $\mathbb{K}$, $x_k$ are noncommutative variables, $t$ is a variable commuting with $x_k$, $c_k$ are integers, and the degree is considered for $t$. This problem generalizes noncommuta…
▽ More
In this paper, we address computation of the degree $\mathop{\rm deg Det} A$ of Dieudonné determinant $\mathop{\rm Det} A$ of \[ A = \sum_{k=1}^m A_k x_k t^{c_k}, \] where $A_k$ are $n \times n$ matrices over a field $\mathbb{K}$, $x_k$ are noncommutative variables, $t$ is a variable commuting with $x_k$, $c_k$ are integers, and the degree is considered for $t$. This problem generalizes noncommutative Edmonds' problem and fundamental combinatorial optimization problems including the weighted linear matroid intersection problem. It was shown that $\mathop{\rm deg Det} A$ is obtained by a discrete convex optimization on a Euclidean building. We extend this framework by incorporating a cost scaling technique, and show that $\mathop{\rm deg Det} A$ can be computed in time polynomial of $n,m,\log_2 C$, where $C:= \max_k |c_k|$. We give a polyhedral interpretation of $\mathop{\rm deg Det}$, which says that $\mathop{\rm deg Det} A$ is given by linear optimization over an integral polytope with respect to objective vector $c = (c_k)$. Based on it, we show that our algorithm becomes a strongly polynomial one. We apply this result to an algebraic combinatorial optimization problem arising from a symbolic matrix having $2 \times 2$-submatrix structure.
△ Less
Submitted 9 November, 2020; v1 submitted 26 August, 2020;
originally announced August 2020.
-
Node-Connectivity Terminal Backup, Separately-Capacitated Multiflow, and Discrete Convexity
Authors:
Hiroshi Hirai,
Motoki Ikeda
Abstract:
The terminal backup problems (Anshelevich and Karagiozova (2011)) form a class of network design problems: Given an undirected graph with a requirement on terminals, the goal is to find a minimum cost subgraph satisfying the connectivity requirement. The node-connectivity terminal backup problem requires a terminal to connect other terminals with a number of node-disjoint paths. This problem is no…
▽ More
The terminal backup problems (Anshelevich and Karagiozova (2011)) form a class of network design problems: Given an undirected graph with a requirement on terminals, the goal is to find a minimum cost subgraph satisfying the connectivity requirement. The node-connectivity terminal backup problem requires a terminal to connect other terminals with a number of node-disjoint paths. This problem is not known whether is NP-hard or tractable. Fukunaga (2016) gave a $4/3$-approximation algorithm based on LP-rounding scheme using a general LP-solver. In this paper, we develop a combinatorial algorithm for the relaxed LP to find a half-integral optimal solution in $O(m\log (nUA)\cdot \operatorname{MF}(kn,m+k^2n))$ time, where $n$ is the number of nodes, $m$ is the number of edges, $k$ is the number of terminals, $A$ is the maximum edge-cost, $U$ is the maximum edge-capacity, and $\operatorname{MF}(n',m')$ is the time complexity of a max-flow algorithm in a network with $n'$ nodes and $m'$ edges. The algorithm implies that the $4/3$-approximation algorithm for the node-connectivity terminal backup problem is also efficiently implemented. For the design of algorithm, we explore a connection between the node-connectivity terminal backup problem and a new type of a multiflow, called a separately-capacitated multiflow. We show a min-max theorem which extends Lovász-Cherkassky theorem to the node-capacity setting. Our results build on discrete convexity in the node-connectivity terminal backup problem.
△ Less
Submitted 23 August, 2020;
originally announced August 2020.
-
Minimum 0-Extension Problems on Directed Metrics
Authors:
Hiroshi Hirai,
Ryuhei Mizutani
Abstract:
For a metric $μ$ on a finite set $T$, the minimum 0-extension problem 0-Ext$[μ]$ is defined as follows: Given $V\supseteq T$ and $\ c:{V \choose 2}\rightarrow \mathbf{Q_+}$, minimize $\sum c(xy)μ(γ(x),γ(y))$ subject to $γ:V\rightarrow T,\ γ(t)=t\ (\forall t\in T)$, where the sum is taken over all unordered pairs in $V$. This problem generalizes several classical combinatorial optimization problems…
▽ More
For a metric $μ$ on a finite set $T$, the minimum 0-extension problem 0-Ext$[μ]$ is defined as follows: Given $V\supseteq T$ and $\ c:{V \choose 2}\rightarrow \mathbf{Q_+}$, minimize $\sum c(xy)μ(γ(x),γ(y))$ subject to $γ:V\rightarrow T,\ γ(t)=t\ (\forall t\in T)$, where the sum is taken over all unordered pairs in $V$. This problem generalizes several classical combinatorial optimization problems such as the minimum cut problem or the multiterminal cut problem. Karzanov and Hirai established a complete classification of metrics $μ$ for which 0-Ext$[μ]$ is polynomial time solvable or NP-hard. This result can also be viewed as a sharpening of the general dichotomy theorem for finite-valued CSPs (Thapper and Živný 2016) specialized to 0-Ext$[μ]$.
In this paper, we consider a directed version $\overrightarrow{0}$-Ext$[μ]$ of the minimum 0-extension problem, where $μ$ and $c$ are not assumed to be symmetric. We extend the NP-hardness condition of 0-Ext$[μ]$ to $\overrightarrow{0}$-Ext$[μ]$: If $μ$ cannot be represented as the shortest path metric of an orientable modular graph with an orbit-invariant ``directed'' edge-length, then $\overrightarrow{0}$-Ext$[μ]$ is NP-hard. We also show a partial converse: If $μ$ is a directed metric of a modular lattice with an orbit-invariant directed edge-length, then $\overrightarrow{0}$-Ext$[μ]$ is tractable. We further provide a new NP-hardness condition characteristic of $\overrightarrow{0}$-Ext$[μ]$, and establish a dichotomy for the case where $μ$ is a directed metric of a star.
△ Less
Submitted 3 January, 2024; v1 submitted 29 May, 2020;
originally announced June 2020.
-
A combinatorial algorithm for computing the rank of a generic partitioned matrix with $2 \times 2$ submatrices
Authors:
Hiroshi Hirai,
Yuni Iwamasa
Abstract:
In this paper, we consider the problem of computing the rank of a block-structured symbolic matrix (a generic partitioned matrix) $A = (A_{αβ} x_{αβ})$, where $A_{αβ}$ is a $2 \times 2$ matrix over a field $\mathbf{F}$ and $x_{αβ}$ is an indeterminate for $α= 1,2,\dots, μ$ and $β= 1,2, \dots, ν$. This problem can be viewed as an algebraic generalization of the bipartite matching problem and was co…
▽ More
In this paper, we consider the problem of computing the rank of a block-structured symbolic matrix (a generic partitioned matrix) $A = (A_{αβ} x_{αβ})$, where $A_{αβ}$ is a $2 \times 2$ matrix over a field $\mathbf{F}$ and $x_{αβ}$ is an indeterminate for $α= 1,2,\dots, μ$ and $β= 1,2, \dots, ν$. This problem can be viewed as an algebraic generalization of the bipartite matching problem and was considered by Iwata and Murota (1995). Recent interests in this problem lie in the connection with non-commutative Edmonds' problem by Ivanyos, Qiao, and Subrahamanyam (2018) and Garg, Gurvits, Oliveiva, and Wigderson (2019), where a result by Iwata and Murota implicitly states that the rank and non-commutative rank (nc-rank) are the same for this class of symbolic matrices.
The main result of this paper is a simple and combinatorial $O((μν)^2 \min \{ μ, ν\})$-time algorithm for computing the symbolic rank of a $(2 \times 2)$-type generic partitioned matrix of size $2μ\times 2ν$. Our algorithm is inspired by the Wong sequence algorithm by Ivanyos, Qiao, and Subrahamanyam for the nc-rank of a general symbolic matrix, and requires no blow-up operation, no field extension, and no additional care for bounding the bit-size. Moreover it naturally provides a maximum rank completion of $A$ for an arbitrary field $\mathbf{F}$.
△ Less
Submitted 21 June, 2021; v1 submitted 22 April, 2020;
originally announced April 2020.
-
A Cost-Scaling Algorithm for Minimum-Cost Node-Capacitated Multiflow Problem
Authors:
Hiroshi Hirai,
Motoki Ikeda
Abstract:
In this paper, we address the minimum-cost node-capacitated multiflow problem in an undirected network. For this problem, Babenko and Karzanov (2012) showed strongly polynomial-time solvability via the ellipsoid method. Our result is the first combinatorial weakly polynomial-time algorithm for this problem. Our algorithm finds a half-integral minimum-cost maximum multiflow in…
▽ More
In this paper, we address the minimum-cost node-capacitated multiflow problem in an undirected network. For this problem, Babenko and Karzanov (2012) showed strongly polynomial-time solvability via the ellipsoid method. Our result is the first combinatorial weakly polynomial-time algorithm for this problem. Our algorithm finds a half-integral minimum-cost maximum multiflow in $O(m \log(nCD)\mathrm{SF}(kn, m, k))$ time, where $n$ is the number of nodes, $m$ is the number of edges, $k$ is the number of terminals, $C$ is the maximum node capacity, $D$ is the maximum edge cost, and $\mathrm{SF}(n', m', η)$ is the time complexity of solving the submodular flow problem in a network of $n'$ nodes, $m'$ edges, and a submodular function with $η$-time-computable exchange capacity. Our algorithm is built on discrete convex analysis on graph structures and the concept of reducible bisubmodular flows.
△ Less
Submitted 4 September, 2019;
originally announced September 2019.
-
On a weighted linear matroid intersection algorithm by deg-det computation
Authors:
Hiroki Furue,
Hiroshi Hirai
Abstract:
In this paper, we address the weighted linear matroid intersection problem from the computation of the degree of the determinants of a symbolic matrix. We show that a generic algorithm computing the degree of noncommutative determinants, proposed by the second author, becomes an $O(mn^3 \log n)$ time algorithm for the weighted linear matroid intersection problem, where two matroids are given by co…
▽ More
In this paper, we address the weighted linear matroid intersection problem from the computation of the degree of the determinants of a symbolic matrix. We show that a generic algorithm computing the degree of noncommutative determinants, proposed by the second author, becomes an $O(mn^3 \log n)$ time algorithm for the weighted linear matroid intersection problem, where two matroids are given by column vectors $n \times m$ matrices $A,B$. We reveal that our algorithm is viewed as a "nonstandard" implementation of Frank's weight splitting algorithm for linear matroids. This gives a linear algebraic reasoning to Frank's algorithm. Although our algorithm is slower than existing algorithms in the worst case estimate, it has a notable feature: Contrary to existing algorithms, our algorithm works on different matroids represented by another "sparse" matrices $A^0,B^0$, which skips unnecessary Gaussian eliminations for constructing residual graphs.
△ Less
Submitted 4 March, 2020; v1 submitted 30 August, 2019;
originally announced August 2019.
-
Counting Integral Points in Polytopes via Numerical Analysis of Contour Integration
Authors:
Hiroshi Hirai,
Ryunosuke Oshiro,
Ken'ichiro Tanaka
Abstract:
In this paper, we address the problem of counting integer points in a rational polytope described by $P(y) = \{ x \in \mathbb{R}^m \colon Ax = y, x \geq 0\}$, where $A$ is an $n \times m$ integer matrix and $y$ is an $n$-dimensional integer vector. We study the Z-transformation approach initiated by Brion-Vergne, Beck, and Lasserre-Zeron from the numerical analysis point of view, and obtain a new…
▽ More
In this paper, we address the problem of counting integer points in a rational polytope described by $P(y) = \{ x \in \mathbb{R}^m \colon Ax = y, x \geq 0\}$, where $A$ is an $n \times m$ integer matrix and $y$ is an $n$-dimensional integer vector. We study the Z-transformation approach initiated by Brion-Vergne, Beck, and Lasserre-Zeron from the numerical analysis point of view, and obtain a new algorithm on this problem: If $A$ is nonnegative, then the number of integer points in $P(y)$ can be computed in $O(\mathrm{poly} (n,m, \|y\|_\infty) (\|y\|_\infty + 1)^n)$ time and $O(\mathrm{poly} (n,m, \|y\|_\infty))$ space.This improves, in terms of space complexity, a naive DP algorithm with $O((\|y\|_\infty + 1)^n)$-size DP table. Our result is based on the standard error analysis to the numerical contour integration for the inverse Z-transform, and establish a new type of an inclusion-exclusion formula for integer points in $P(y)$. We apply our result to hypergraph $b$-matching, and obtain a $O(\mathrm{poly}( n,m,\|b\|_\infty) (\|b\|_\infty +1)^{(1-1/k)n})$ time algorithm for counting $b$-matchings in a $k$-partite hypergraph with $n$ vertices and $m$ hyperedges. This result is viewed as a $b$-matching generalization of the classical result by Ryser for $k=2$ and its multipartite extension by Bj{ö}rklund-Husfeldt.
△ Less
Submitted 14 July, 2018;
originally announced July 2018.
-
A tractable class of binary VCSPs via M-convex intersection
Authors:
Hiroshi Hirai,
Yuni Iwamasa,
Kazuo Murota,
Stanislav Zivny
Abstract:
A binary VCSP is a general framework for the minimization problem of a function represented as the sum of unary and binary cost functions. An important line of VCSP research is to investigate what functions can be solved in polynomial time. Cooper and Živný classified the tractability of binary VCSP instances according to the concept of "triangle," and showed that the only interesting tractable ca…
▽ More
A binary VCSP is a general framework for the minimization problem of a function represented as the sum of unary and binary cost functions. An important line of VCSP research is to investigate what functions can be solved in polynomial time. Cooper and Živný classified the tractability of binary VCSP instances according to the concept of "triangle," and showed that the only interesting tractable case is the one induced by the joint winner property (JWP). Recently, Iwamasa, Murota, and Živný made a link between VCSP and discrete convex analysis, showing that a function satisfying the JWP can be transformed into a function represented as the sum of two quadratic M-convex functions, which can be minimized in polynomial time via an M-convex intersection algorithm if the value oracle of each M-convex function is given. In this paper, we give an algorithmic answer to a natural question: What binary finite-valued CSP instances can be represented as the sum of two quadratic M-convex functions and can be solved in polynomial time via an M-convex intersection algorithm? We solve this problem by devising a polynomial-time algorithm for obtaining a concrete form of the representation in the representable case. Our result presents a larger tractable class of binary finite-valued CSPs, which properly contains the JWP class.
△ Less
Submitted 11 July, 2019; v1 submitted 7 January, 2018;
originally announced January 2018.
-
Polyhedral Clinching Auctions for Two-sided Markets
Authors:
Hiroshi Hirai,
Ryosuke Sato
Abstract:
In this paper, we present a new model and two mechanisms for auctions in two-sided markets of buyers and sellers, where budget constraints are imposed on buyers. Our model incorporates polymatroidal environments, and is applicable to a wide variety of models that include multiunit auctions, matching markets and reservation exchange markets. Our mechanisms are build on polymatroidal network flow mo…
▽ More
In this paper, we present a new model and two mechanisms for auctions in two-sided markets of buyers and sellers, where budget constraints are imposed on buyers. Our model incorporates polymatroidal environments, and is applicable to a wide variety of models that include multiunit auctions, matching markets and reservation exchange markets. Our mechanisms are build on polymatroidal network flow model by Lawler and Martel, and enjoy various nice properties such as incentive compatibility of buyers, individual rationality, pareto optimality, strong budget balance. The first mechanism is a simple "reduce-to-recover" algorithm that reduces the market to be one-sided, applies the polyhedral clinching auction by Goel et al, and lifts the resulting allocation to the original two-sided market via polymatroidal network flow. The second mechanism is a two-sided generalization of the polyhedral clinching auction, which improves the first mechanism in terms of the fairness of revenue sharing on sellers. Both mechanisms are implemented by polymatroid algorithms. We demonstrate how our framework is applied to internet display ad auctions.
△ Less
Submitted 13 September, 2018; v1 submitted 14 August, 2017;
originally announced August 2017.
-
Shortest (A+B)-path packing via hafnian
Authors:
Hiroshi Hirai,
Hiroyuki Namba
Abstract:
Björklund and Husfeldt developed a randomized polynomial time algorithm to solve the shortest two disjoint paths problem. Their algorithm is based on computation of permanents modulo 4 and the isolation lemma. In this paper, we consider the following generalization of the shortest two disjoint paths problem, and develop a similar algebraic algorithm. The shortest perfect $(A+B)$-path packing probl…
▽ More
Björklund and Husfeldt developed a randomized polynomial time algorithm to solve the shortest two disjoint paths problem. Their algorithm is based on computation of permanents modulo 4 and the isolation lemma. In this paper, we consider the following generalization of the shortest two disjoint paths problem, and develop a similar algebraic algorithm. The shortest perfect $(A+B)$-path packing problem is: given an undirected graph $G$ and two disjoint node subsets $A,B$ with even cardinalities, find a shortest $|A|/2+|B|/2$ disjoint paths whose ends are both in $A$ or both in $B$. Besides its NP-hardness, we prove that this problem can be solved in randomized polynomial time if $|A|+|B|$ is fixed. Our algorithm basically follows the framework of Björklund and Husfeldt but uses a new technique: computation of hafnian modulo $2^k$ combined with Gallai's reduction from $T$-paths to matchings. We also generalize our technique for solving other path packing problems, and discuss its limitation.
△ Less
Submitted 13 June, 2017; v1 submitted 26 March, 2016;
originally announced March 2016.
-
A dual descent algorithm for node-capacitated multiflow problems and its applications
Authors:
Hiroshi Hirai
Abstract:
In this paper, we develop an $O((m \log k) {\rm MSF} (n,m,1))$-time algorithm to find a half-integral node-capacitated multiflow of the maximum total flow-value in a network with $n$ nodes, $m$ edges, and $k$ terminals, where ${\rm MSF} (n',m',γ)$ denotes the time complexity of solving the maximum submodular flow problem in a network with $n'$ nodes, $m'$ edges, and the complexity $γ$ of computing…
▽ More
In this paper, we develop an $O((m \log k) {\rm MSF} (n,m,1))$-time algorithm to find a half-integral node-capacitated multiflow of the maximum total flow-value in a network with $n$ nodes, $m$ edges, and $k$ terminals, where ${\rm MSF} (n',m',γ)$ denotes the time complexity of solving the maximum submodular flow problem in a network with $n'$ nodes, $m'$ edges, and the complexity $γ$ of computing the exchange capacity of the submodular function describing the problem. By using Fujishige-Zhang algorithm for submodular flow, we can find a maximum half-integral multiflow in $O(m n^3 \log k)$ time. This is the first combinatorial strongly polynomial time algorithm for this problem. Our algorithm is built on a developing theory of discrete convex functions on certain graph structures. Applications include "ellipsoid-free" combinatorial implementations of a 2-approximation algorithm for the minimum node-multiway cut problem by Garg, Vazirani, and Yannakakis.
△ Less
Submitted 28 October, 2018; v1 submitted 27 August, 2015;
originally announced August 2015.
-
A representation of antimatroids by Horn rules and its application to educational systems
Authors:
Hiyori Yoshikawa,
Hiroshi Hirai,
Kazuhisa Makino
Abstract:
We study a representation of an antimatroid by Horn rules, motivated by its recent application to computer-aided educational systems. We associate any set $\mathcal{R}$ of Horn rules with the unique maximal antimatroid $\mathcal{A}(\mathcal{R})$ that is contained in the union-closed family $\mathcal{K}(\mathcal{R})$ naturally determined by ${\cal R}$. We address algorithmic and Boolean function th…
▽ More
We study a representation of an antimatroid by Horn rules, motivated by its recent application to computer-aided educational systems. We associate any set $\mathcal{R}$ of Horn rules with the unique maximal antimatroid $\mathcal{A}(\mathcal{R})$ that is contained in the union-closed family $\mathcal{K}(\mathcal{R})$ naturally determined by ${\cal R}$. We address algorithmic and Boolean function theoretic aspects on the association ${\cal R} \mapsto \mathcal{A}(\mathcal{R})$, where ${\cal R}$ is viewed as the input. We present linear time algorithms to solve the membership problem and the inference problem for ${\cal A}({\cal R})$. We also provide efficient algorithms for generating all members and all implicates of ${\cal A}({\cal R})$. We show that this representation is essentially equivalent to the Korte-Lovász representation of antimatroids by rooted sets. Based on the equivalence, we provide a quadratic time algorithm to construct the uniquely-determined minimal representation. % These results have potential applications to computer-aided educational systems, where an antimatroid is used as a model of the space of possible knowledge states of learners, and is constructed by giving Horn queries to a human expert.
△ Less
Submitted 9 September, 2018; v1 submitted 21 August, 2015;
originally announced August 2015.
-
On k-Submodular Relaxation
Authors:
Hiroshi Hirai,
Yuni Iwamasa
Abstract:
$k$-submodular functions, introduced by Huber and Kolmogorov, are functions defined on $\{0, 1, 2, \dots, k\}^n$ satisfying certain submodular-type inequalities. $k$-submodular functions typically arise as relaxations of NP-hard problems, and the relaxations by $k…
▽ More
$k$-submodular functions, introduced by Huber and Kolmogorov, are functions defined on $\{0, 1, 2, \dots, k\}^n$ satisfying certain submodular-type inequalities. $k$-submodular functions typically arise as relaxations of NP-hard problems, and the relaxations by $k$-submodular functions play key roles in design of efficient, approximation, or fixed-parameter tractable algorithms. Motivated by this, we consider the following problem: Given a function $f : \{1, 2, \dots, k\}^n \rightarrow \mathbb{R} \cup \{\infty\}$, determine whether $f$ is extended to a $k$-submodular function $g : \{0, 1, 2, \dots, k\}^n \rightarrow \mathbb{R} \cup \{\infty\}$, where $g$ is called a $k$-submodular relaxation of $f$.
We give a polymorphic characterization of those functions which admit a $k$-submodular relaxation, and also give a combinatorial $O((k^n)^2)$-time algorithm to find a $k$-submodular relaxation or establish that a $k$-submodular relaxation does not exist. Our algorithm has interesting properties: (1) If the input function is integer valued, then our algorithm outputs a half-integral relaxation, and (2) if the input function is binary, then our algorithm outputs the unique optimal relaxation. We present applications of our algorithm to valued constraint satisfaction problems.
△ Less
Submitted 9 September, 2016; v1 submitted 29 April, 2015;
originally announced April 2015.