skip to main content
review-article
Public Access

Beyond worst-case analysis

Published:21 February 2019Publication History
Skip Abstract Section

Abstract

The need for deeply understanding when algorithms work (or not) has never been greater.

References

  1. Ackerman, M. and Ben-David, S. Clusterability: A theoretical study. In Proceedings of the 12<sup>th</sup> International Conference on Artificial Intelligence and Statistics, 2009, 1--8.Google ScholarGoogle Scholar
  2. Albers, S., Favrholdt, L.M. and Giel, O. On paging with locality of reference. J. Computer and System Sciences 70, 2 (2005), 145--175. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Alon, N., Krivelevich, M. and Sudakov, B. Finding a large hidden clique in a random graph. Random Structures & Algorithms 13, 3--4 (1998), 457--466. Google ScholarGoogle ScholarCross RefCross Ref
  4. Angel, O., Bubeck, S., Peres, Y., and Wai, F. Local MAX-CUT in smoothed polynomial time. In Proceedings of the 49<sup>th</sup> Annual ACM Symposium on Theory of Computing, 2017, 429--437. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Angelidakis, H., Makarychev, K., and Makarychev, Y. Algorithms for stable and perturbation-resilient problems. In Proceedings of the 49<sup>th</sup> Annual ACM Symposium on Theory of Computing, pages 438--451, 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Arora, S., Ge, R., Halpern, Y. Mimno, D.M., Moitra, A., Sontag, D., Wu, Y. and Zhu, M. A practical algorithm for topic modeling with provable guarantees. In Proceedings of the 30<sup>th</sup> International Conference on Machine Learning, 2013, 280--288. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Arthur, D., Manthey, B., and Roglin, H. Smoothed analysis of the k-means method. JACM 58, 5 (2011), Article No. 18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Awasthi, P., Blum, A. and Sheffet, O. Center-based clustering under perturbation stability. Information Processing Letters 112, 1--2 (2012), 49--54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Balcan, M.-F., Blum, A. and Gupta, A. Clustering under approximation stability. JACM 60, 2 (2013), Article No. 8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Balcan, M.-F., Haghtalab, N. and White, C. k-center clustering under perturbation resilience. In Proceedings of the 43<sup>rd</sup> Annual International Colloquium on Automata, Languages, and Programming, 2016, Article No. 68.Google ScholarGoogle Scholar
  11. Barak, B., Hopkins, S.B., Kelner, J.A., Kothari, P., Moitra, A., and Potechin, A. A nearly tight sum-of squares lower bound for the planted clique problem. In Proceedings of the 57<sup>th</sup> Annual IEEE Symposium on Foundations of Computer Science, 2016, 428--437.Google ScholarGoogle ScholarCross RefCross Ref
  12. Bilu, Y. and Linial, N. Are stable instances easy? Combinatorics, Probability & Computing 21, 5 (2012), 643--660. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Blum, A. and Spencer, J.H. Coloring random and semi-random k-colorable graphs. J. Algorithms 19, 2 (1995), 204--234. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Borgwardt, K.H. The Simplex Method: A probabilistic analysis. Springer-Verlag, 1980. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Candes, E.J., Romberg, J.K., and Tao, T. Robust uncertainty principles: Exact signal reconstruction from highly incomplete Fourier information. IEEE Trans. Information Theory 52, 2 (20006), 489--509. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Cygan, M., Fomin, F.V., Kowalik, L., Lokshtanov, D., Marx, D., Pilipczuk, M., Pilipczuk, M, and Saurabh, S. Parameterized Algorithms. Springer, 2015. Google ScholarGoogle ScholarCross RefCross Ref
  17. Dadush, D. and Huiberts, S. A friendly smoothed analysis of the simplex method. In Proceedings of the 50<sup>th</sup> Annual ACM Symposium on Theory of Computing, 2018, 390--403. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Daniely, A., Linial, N. and M. Saks. Clustering is difficult only when it does not matter. arXiv:1205.4891, 2012.Google ScholarGoogle Scholar
  19. Diakonikolas, I., Kamath, G., Kane, D.M., Li, J., Moitra, A, and Stewart, A. Being robust (in high dimensions) can be practical. In Proceedings of the 34<sup>th</sup> International Conference on Machine Learning, 2017, 999--1008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Donoho, D.L. Compressed sensing. IEEE Trans. Information Theory 52, 4 (2006), 1289--1306. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Elsasser, R. and Tscheuschner, T. Settling the complexity of local max-cut (almost) completely. In Proceedings of the 38<sup>th</sup> Annual International Colloquium on Automata, Languages, and Programming, 2011, 171--182. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Etscheid, M. and Roglin, H. Smoothed analysis of local search for the maximum-cut problem. ACM Trans. Algorithms 13, 2 (2017), Article No. 12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Fagin, R., Lotem, A. and Naor, M. Optimal aggregation algorithms for middleware. J. Computer and System Sciences 66, 4 (2003), 614--656. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Feige, U. and Kilian, J. Heuristics for semirandom graph problems. J. Computer and System Sciences 63, 4 (2001), 639--671. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Goodfellow, I., Bengio, Y. and Courville, A. Deep Learning. MIT Press, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Gupta, R. and Roughgarden, T. Application-specific algorithm selection. SIAM J. Computing 46, 3 (2017), 992--1017.Google ScholarGoogle ScholarCross RefCross Ref
  27. Jerrum, M. Large cliques elude the Metropolis process. Random Structures and Algorithms 3, 4 (1992), 347--359.Google ScholarGoogle ScholarCross RefCross Ref
  28. Jin, C, Ge, R., Netrapalli, P., Kakade, S.M. and Jordan, M.I. How to escape saddle points efficiently. In Proceedings of the 34<sup>th</sup> International Conference on Machine Learning, 2017, 1724--1732. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Kumar, A. and Kannan, R. Clustering with spectral norm and the k-means algorithm. In Proceedings of the 51<sup>st</sup> Annual IEEE Symposium on Foundations of Computer Science, 2010, 299--308. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Makarychev, K., Makarychev, Y. and Vijayaraghavan, A. Bilu-Linial stable instances of max cut and minimum multiway cut. In Proceedings of the 25<sup>th</sup> Annual ACM-SIAM Symposium on Discrete Algorithms, 2014, 890--906. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Moitra, A., Perry, W. and Wein, A.S. How robust are reconstruction thresholds for community detection? In Proceedings of the 48<sup>th</sup> Annual ACM Symposium on Theory of Computing, 2016, 828--841. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Moore, C. The computer science and physics of community detection: Landscapes, phase transitions, and hardness. Bulletin of EATCS 121 (2017), 1--37.Google ScholarGoogle Scholar
  33. Neyshabur, B. Implicit Regularization in Deep Learning. Ph.D. thesis, Toyota Technological Institute at Chicago, 2017.Google ScholarGoogle Scholar
  34. Ostrovsky, R., Rabani, Y., Schulman, L.J. and Swamy, C. The effectiveness of Lloyd-type methods for the k-means problem. JACM 59, 6 (2012), Article No. 22. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Papadimitriou, C.H., Raghgavan, P., Tamaki, H. and Vemapala, S. Latent semantic indexing: A probabilistic analysis. J. Computer and System Sciences 61, 2 (2000), 217--235. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Roughgarden, T. CS264 lecture notes on beyond worst-case analysis. Stanford University, 2009--2017. Available at http://www.timroughgarden.org/notes.html.Google ScholarGoogle Scholar
  37. Sleator, D.D. and Tarjan, R.E. Amortized efficiency of list update and paging rules. Commun. ACM 28, 2 (1985), 202--208. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Spielman, D.A. and Teng, S.-H. Smoothed analysis: Why the simplex algorithm usually takes polynomial time. JACM 51, 3 (2004), 385--463. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Trevisan, L. Inapproximability of combinatorial optimization problems. Paradigms of Combinatorial Optimization: Problems and New Approaches. V.T. Paschos, ed. Wiley, 2014.Google ScholarGoogle Scholar
  40. Zhang, C., Bengio, S., Hardt, M., Recht, B. and Vinyals, O. Understanding deep learning requires rethinking generalization. In Proceedings of the 5<sup>th</sup> International Conference on Learning Representations, 2017.Google ScholarGoogle Scholar

Index Terms

  1. Beyond worst-case analysis

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Communications of the ACM
        Communications of the ACM  Volume 62, Issue 3
        March 2019
        109 pages
        ISSN:0001-0782
        EISSN:1557-7317
        DOI:10.1145/3314328
        Issue’s Table of Contents

        Copyright © 2019 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 21 February 2019

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • review-article
        • Popular
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format