Simpler Proofs by Symbolic Perturbation

نویسنده

  • Tobias Jacobs
چکیده

In analyses of algorithms, a substantial amount of effort has often to be spent on the discussion of special cases. For example, when the analysis considers the cases X < Y and X > Y separately, one might have to be especially careful about what happens when X = Y . On the other hand, experience tells us that when a yet unregarded special case of this kind is discovered, one nearly always finds a way to handle it. This is typically done by modifying the analysis and/or the algorithm very slightly. In this article we substantiate this observation theoretically. We concentrate on deterministic algorithms for weighted combinatorial optimization problems. A problem instance of this kind is defined by its structure and a vector of weights. The concept of a null case is introduced as set of problem instances whose weight vectors constitute a nowhere open set (or null set) in the space of all possible weight configurations. An algorithm is called robust if any null case can be disregarded in the analysis of both its solution quality and resource requirements. We show that achieving robustness is only a matter of breaking ties the right way. More specifically, we show that the concept of symbolic perturbation known from the area of geometric algorithms guarantees that no surprises will happen in null cases. We argue that for a huge class of combinatorial optimization algorithms it is easy to verify that they implicitly use symbolic perturbation for breaking ties and thus can be analyzed under the assumption that some arbitrary null case never occurs. Finally, we prove that there exists a symbolic perturbation tie breaking policy for any algorithm. ∗This work was supported by a fellowship within the Postdoc-Programme of the German Academic Exchange Service (DAAD).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Qualitative Symbolic Perturbation

In a classical Symbolic Perturbation scheme, degeneracies are handled by substituting some polynomials in ε for the inputs of a predicate. Instead of a single perturbation, we propose to use a sequence of (simpler) perturbations. Moreover, we look at their effects geometrically instead of algebraically; this allows us to tackle cases that were not tractable with the classical algebraic approach...

متن کامل

Calculating adiabatic evolution of the perturbed DNLS/MNLS solitons

Adiabatic evolution equations for parameters of the perturbed DNLS/MNLS solitons obtained by recently developed direct perturbation theory [X.-J. Chen and J. Yang, Phys. Rev. E 65, 066608(2002)] are reformulated in simpler forms for practical use. A symbolic computation technique is developed to calculate them, based on the residue theorem. Effects of the third-order dispersion on the MNLS soli...

متن کامل

Numerical Solution of the Controlled Harmonic Oscillator by Homotopy Perturbation Method

‎The controlled harmonic oscillator with retarded damping‎, ‎is an important class of optimal control problems which has an important role in oscillating phenomena in nonlinear engineering systems‎. ‎In this paper‎, ‎to solve this problem‎, ‎we presented an analytical method‎. ‎This approach is based on the homotopy perturbation method‎. ‎The solution procedure becomes easier‎, ‎simpler and mor...

متن کامل

A General Approach to Removing Degeneracies

We wish to increase the power of an arbitrary algorithm designed for non-degenerate input, by allowing it to execute on all inputs. We concentrate on in nitesimal symbolic perturbations that do not a ect the output for inputs in general position. Otherwise, if the problem mapping is continuous, the input and output space topology are at least as coarse as the real euclidean one and the output s...

متن کامل

Mechanized reasoning in Homological Algebra

We face the problem of obtaining a certified version of a crucial algorithm in the field of Homological Algebra, known as “Perturbation Lemma”. This lemma is intensively used in the software system “Kenzo”, devoted to symbolic computation in Homological Algebra. To this end, we use the proof assistant “Isabelle”. Our main motivations are to increase the knowledge in the algorithmic nature of th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009