14,449 research outputs found

    Graph matching: relax or not?

    Full text link
    We consider the problem of exact and inexact matching of weighted undirected graphs, in which a bijective correspondence is sought to minimize a quadratic weight disagreement. This computationally challenging problem is often relaxed as a convex quadratic program, in which the space of permutations is replaced by the space of doubly-stochastic matrices. However, the applicability of such a relaxation is poorly understood. We define a broad class of friendly graphs characterized by an easily verifiable spectral property. We prove that for friendly graphs, the convex relaxation is guaranteed to find the exact isomorphism or certify its inexistence. This result is further extended to approximately isomorphic graphs, for which we develop an explicit bound on the amount of weight disagreement under which the relaxation is guaranteed to find the globally optimal approximate isomorphism. We also show that in many cases, the graph matching problem can be further harmlessly relaxed to a convex quadratic program with only n separable linear equality constraints, which is substantially more efficient than the standard relaxation involving 2n equality and n^2 inequality constraints. Finally, we show that our results are still valid for unfriendly graphs if additional information in the form of seeds or attributes is allowed, with the latter satisfying an easy to verify spectral characteristic

    Trivial Meet and Join within the Lattice of Monotone Triangles

    Get PDF
    The lattice of monotone triangles (Mn,)(\mathfrak{M}_n,\le) ordered by entry-wise comparisons is studied. Let τmin\tau_{\min} denote the unique minimal element in this lattice, and τmax\tau_{\max} the unique maximum. The number of rr-tuples of monotone triangles (τ1,,τr)(\tau_1,\ldots,\tau_r) with minimal infimum τmin\tau_{\min} (maximal supremum τmax\tau_{\max}, resp.) is shown to asymptotically approach rMnr1r|\mathfrak{M}_n|^{r-1} as nn \to \infty. Thus, with high probability this event implies that one of the τi\tau_i is τmin\tau_{\min} (τmax\tau_{\max}, resp.). Higher-order error terms are also discussed.Comment: 15 page

    The chaining lemma and its application

    Get PDF
    We present a new information-theoretic result which we call the Chaining Lemma. It considers a so-called “chain” of random variables, defined by a source distribution X(0)with high min-entropy and a number (say, t in total) of arbitrary functions (T1,…, Tt) which are applied in succession to that source to generate the chain (Formula presented). Intuitively, the Chaining Lemma guarantees that, if the chain is not too long, then either (i) the entire chain is “highly random”, in that every variable has high min-entropy; or (ii) it is possible to find a point j (1 ≤ j ≤ t) in the chain such that, conditioned on the end of the chain i.e. (Formula presented), the preceding part (Formula presented) remains highly random. We think this is an interesting information-theoretic result which is intuitive but nevertheless requires rigorous case-analysis to prove. We believe that the above lemma will find applications in cryptography. We give an example of this, namely we show an application of the lemma to protect essentially any cryptographic scheme against memory tampering attacks. We allow several tampering requests, the tampering functions can be arbitrary, however, they must be chosen from a bounded size set of functions that is fixed a prior
    corecore