combining multiple heuristics in an adversarial online
play

Combining Multiple Heuristics in an Adversarial Online Setting CMU - PowerPoint PPT Presentation

Combining Multiple Heuristics in an Adversarial Online Setting CMU theory lunch 2/14/07 Daniel Golovin Stephen F. Smith Matthew Streeter Why heuristics? Many interesting problems are NP-hard, sometimes even to approximate


  1. Combining Multiple Heuristics in an Adversarial Online Setting CMU theory lunch 2/14/07 Daniel Golovin Stephen F. Smith Matthew Streeter

  2. Why heuristics? • Many interesting problems are NP-hard, sometimes even to approximate • Heuristics can be very effective in practice • SAT solvers handle formulae with 1 0 6 variables, used for hardware and software verification • CPLEX used widely in industry to solve integer programs • Much interest in improving performance of heuristics (e.g., SAT conference holds annual competitions) 2

  3. Pitfalls • Behavior of a heuristic on a particular instance is hard to predict Instance SatELiteGTI MiniSat CPU (s) CPU (s) liveness-unsat-2-01dlx c bp u f liveness 33 15 vliw-sat-2-0/9dlx vliw at b iq6 bug4 376 ≥ 120000 vliw-sat-2-0/9dlx vliw at b iq6 bug9 ≥ 120000 131 • Might do better on average by running several heuristics in parallel 3

  4. Pitfalls • Running time of a randomized heuristic can vary widely across different random seeds satz-rand running on logistics.d 1 Pr[run not finished] 0.8 0.6 0.4 0.2 0 0.1 1 10 100 1000 time (s) • Randomized SAT solvers can exhibit heavy-tailed run length distributions (Gomes et al. 1 998) 4

  5. Previous work R EPORTS ties perpendicular to the magnetic field. The frequen- 713 (1975). A more accurate calculation based on This variance implies that there is an in - cy of the lower hybrid waves is between the gyro- the analysis of the solar wind dynamics, mass- herent risk associated with the use of such frequencies of the electrons ( � ce ) and the ions ( � ci ) loaded by the picked-up cometary ions lead to the an algorithm, a risk that, in analogy with which means that these waves can be in simulta- same formula for the ion density. neous Cherenkov resonance with the relatively slow 10. D. A. Mendis, H. L. F. Houpis, M. L. Marconi, Physics the economic literature, we will identify but unmagnetized ions perpendicular to the magnet- of Comets Fundamentals of Cosmic Physics (1985), with the standard deviation of its perfor - ic field and fast magnetized (hence magnetic field vol. 10. mance distribution ( 10 ). aligned) electrons. Cherenkov resonance occurs 11. L. D. Landau, J. Phys. USSR 10 , 25 (1946); F. F. when the phase velocity of the wave and the particle Chen, Introduction to Plasma Physics and Con- Risk is an important additional charac - velocity are equal; under these conditions strong in- trolled Fusion (Plenum, New York, 1984), vol. 1, p. teristic of algorithms because one may be teraction between the waves and particles is possi- 240. • willing to settle for a lower average perfor - ble and results in energy transfer from the wave to 12. V. D. Shapiro and V. I. Shevchenko, Sov. Sci. Rev. E , mance in exchange for increased certainty the particle or vice versa. The lower hybrid waves Astrophys. Space Phys. 6 , 425 (1988). Algorithm portfolios (Huberman et provide the intermediary step in transferring energy 13. D. F. Post, R. V. Jensen, C. B. Tarter, W. H. Gras- in obtaining a reasonable answer. This situ - between the ions and electrons. berger, W. A. Lokke, Princeton Plasma Physics Lab- ation is often encountered in economics 5. M. J. Mumma et al. , Science 272 , 1310 (1996). oratory Report PPPL-1352 (1977). when trying to maximize a utility that has an 6. D. Krankowsky et al. , Nature 321 , 326 (1986). 14. J. M. Dawson, in Fusion , E. Teller, Ed. (Academic 7. H. S. Hudson, W.-H. Ip, D. A. Mendis, Planet. Space Press, New York, 1981), p. 465. associated risk. It is usually dealt with by Sci. 29 , 1373 (1981). 15. J. W. Chamberlain, Physics of the Aurora and Air- constructing mixed strategies that have de - al. 1 997, Gomes et al. 200 1 , ...) 8. J. B. McBride, E. Ott, P. B. Jay, J. H. Orens, Phys. glow (Academic Press, New York, 1961). sired risk and performance ( 11 ). In analogy Fluids 157 , 2367 (1972). A two stream instability 16. This work was supported in part by NSF grant PH- results when two charged particle populations trav- with this approach, we here present a widely 9319198;003 and NASA NAGW-1502. eling in opposite directions interact. applicable method for constructing “portfo - 9. M. K. Wallis and R. S. B. Ong, Planet. Space Sci. 23 , 21 June 1996; accepted 17 October 1996 lios” that combine different programs in such a way that a whole range of perfor - An Economics Approach to mance and risk characteristics become avail - • able. Significantly, some of these portfolios Hard Computational Problems Assign each heuristic a fixed are unequivocally preferable to any of the individual component algorithms running Bernardo A. Huberman, Rajan M. Lukose, Tad Hogg alone. We verify these results experimental - ly on graph - coloring, a canonical NP - com - plete problem, and by constructing a restart A general method for combining existing algorithms into new programs that are un- proportion of CPU time, plus a strategy for access to pages on the Web. equivocally preferable to any of the component algorithms is presented. This method, To illustrate this method, consider a sim - based on notions of risk in economics, offers a computational portfolio design procedure ple portfolio of two Las Vegas algorithms, that can be used for a wide range of problems. Tested by solving a canonical NP- which, by definition, always produce a cor - complete problem, the method can be used for problems ranging from the combinatorics rect solution to a problem but with a distri - fixed restart threshold of DNA sequencing to the completion of tasks in environments with resource contention, bution of solution times ( 5 ). Let t 1 and t 2 such as the World Wide Web. denote the random variables, which have distributions of solution times p 1 ( t ) and p 2 ( t ). For simplicity, we focus on the case of E xtremely hard computational problems on a single problem instance. discrete distributions, although our method are pervasive in fields ranging from molec - In addition to combinatorial search applies to continuous distributions as well. • ular biology to physics and operations re - problems, there are many other computa - The portfolio is constructed simply by let - Assumed each heuristic has a search. Examples include determining the tional situations where performance varies ting both algorithms run concurrently but most probable arrangement of cloned frag - from one trial to another. For example, independently on a serial computer. Let f 1 ments of a DNA sequence ( 1 ), the global programs operating in large distributed sys - denote the fraction of clock cycles allocat - minima of complicated energy functions in tems or interacting with the physical world ed to algorithm 1 and f 2 � 1 � f 1 be the physical and chemical systems ( 2 ), and the can have unpredictable performance be - fraction allocated to the other. As soon as known run length distribution that shortest path visiting a given set of cities cause of changes in their environment. A one of the algorithms finds a solution, the ( 3 ), to name a few. Because of the combi - familiar example is the action of retrieving run terminates. Thus, the solution time t is natorics involved, their solution times grow a particular page on the World Wide Web. a random variable related to those of the exponentially with the size of the problem In this case, the usual network congestion individual algorithms by (a basic trait of the so - called NP - complete leads to a variability in the time required to does not vary across instances t � min � t 1 f 2 � t 2 problems), making it impossible to solve retrieve the page, raising the dilemma of f 1 , (1) very large instances in reasonable times ( 4 ). whether to restart the process or wait. In response to this difficulty, a number In all of these cases, the unpredictable The resulting portfolio algorithm is charac - of efficient heuristic algorithms have been variation in performance can be character - terized by the probability distribution p ( t ) developed. These algorithms, although not ized by a distribution describing the proba - that it finishes in a particular time t . This always guaranteed to produce a good solu - bility of obtaining each possible perfor - probability is given by the probability that tion or to finish in a reasonable time, often mance value. The mean or expected values both constituent algorithms finish in provide satisfactory answers fairly quickly. of these distributions are usually used as an time � t minus the probability that both In practice, their performance varies greatly overall measure of quality ( 6–9 ). We point algorithms finish in time � t from one problem instance to another. In out, however, that expected performance is p � t � � � � p 1 � t �� �� � p 2 � t �� � many cases, the heuristics involve random - not the only relevant measure of the quality ized algorithms ( 5 ), giving rise to perfor - of an algorithm. The variance of a perfor - t � � f 1 t t � � f 2 t mance variability even across repeated trials mance distribution also affects the quality � � � p 1 � t �� �� � of an algorithm because it determines how p 2 � t �� � (2) likely it is that a particular run’s perfor - Dynamics of Computation Group, Xerox Palo Alto Re- t � � f 1 t t � � f 2 t mance will deviate from the expected one. search Center, Palo Alto, CA 94304, USA. SCIENCE � VOL. 275 � 3 JANUARY 1997 51 5

  6. Previous work • “Combining Multiple Heuristics” (Sayag, Fine & Mansour, STACS 2006) • considered resource-sharing schedules and task-switching schedules • gave offline algorithms + sample complexity bounds • algorithms are exponential in #heuristics 6

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend