12 results on '"Munagala, Kamesh"'
Search Results
2. Interaction-aware scheduling of report-generation workloads
- Author
-
Ahmad, Mumtaz, Aboulnaga, Ashraf, Babu, Shivnath, and Munagala, Kamesh
- Published
- 2011
- Full Text
- View/download PDF
3. A constant factor approximation algorithm for the fault-tolerant facility location problem
- Author
-
Guha, Sudipto, Meyerson, Adam, and Munagala, Kamesh
- Published
- 2003
- Full Text
- View/download PDF
4. Cancer characterization and feature set extraction by discriminative margin clustering
- Author
-
Brown Patrick O, Tibshirani Robert, and Munagala Kamesh
- Subjects
Computer applications to medicine. Medical informatics ,R858-859.7 ,Biology (General) ,QH301-705.5 - Abstract
Abstract Background A central challenge in the molecular diagnosis and treatment of cancer is to define a set of molecular features that, taken together, distinguish a given cancer, or type of cancer, from all normal cells and tissues. Results Discriminative margin clustering is a new technique for analyzing high dimensional quantitative datasets, specially applicable to gene expression data from microarray experiments related to cancer. The goal of the analysis is find highly specialized sub-types of a tumor type which are similar in having a small combination of genes which together provide a unique molecular portrait for distinguishing the sub-type from any normal cell or tissue. Detection of the products of these genes can then, in principle, provide a basis for detection and diagnosis of a cancer, and a therapy directed specifically at the distinguishing constellation of molecular features can, in principle, provide a way to eliminate the cancer cells, while minimizing toxicity to any normal cell. Conclusions The new methodology yields highly specialized tumor subtypes which are similar in terms of potential diagnostic markers.
- Published
- 2004
- Full Text
- View/download PDF
5. Approximation Algorithms for Restless Bandit Problems.
- Author
-
GUHA, SUDIPTO, MUNAGALA, KAMESH, and PENG SHI
- Subjects
OPERATIONS research ,DECISION theory ,STOCHASTIC processes ,MARKOV processes ,STOCHASTIC systems ,COMPUTATIONAL mathematics ,APPROXIMATION theory ,STOCHASTIC approximation - Abstract
The restless bandit problem is one of the mostwell-studied generalizations of the celebrated stochastic multi-armed bandit (MAB) problem in decision theory. In its ultimate generality, the restless bandit problem is known to be PSPACE-Hard to approximate to any nontrivial factor, and little progress has been made on this problem despite its significance in modeling activity allocation under uncertainty. In this article, we consider the FEEDBACK MAB problem, where the reward obtained by playing each of n independent arms varies according to an underlying on/off Markov process whose exact state is only revealed when the arm is played. The goal is to design a policy for playing the arms in order to maximize the infinite horizon time average expected reward. This problem is also an instance of a Partially Observable Markov Decision Process (POMDP), and is widely studied in wireless scheduling and unmanned aerial vehicle (UAV) routing. Unlike the stochastic MAB problem, the FEEDBACK MAB problem does not admit to greedy index-based optimal policies. We develop a novel duality-based algorithmic technique that yields a surprisingly simple and intuitive (2 + ϵ)-approximate greedy policy to this problem. We show that both in terms of approximation factor and computational efficiency, our policy is closely related to the Whittle index, which is widely used for its simplicity and efficiency of computation. Subsequently we define a multi-state generalization, that we term MONOTONE bandits, which remains subclass of the restless bandit problem. We show that our policy remains a 2-approximation in this setting, and further, our technique is robust enough to incorporate various side-constraints such as blocking plays, switching costs, and even models where determining the state of an arm is a separate operation from playing it. Our technique is also of independent interest for other restless bandit problems, and we provide an example in non-preemptive machine replenishment. Interestingly, in this case, our policy provides a constant factor guarantee, whereas the Whittle index is provably polynomially worse. By presenting the first O(1) approximations for nontrivial instances of restless bandits as well as of POMDPs, our work initiates the study of approximation algorithms in both these contexts. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
6. Iterative Local Voting for Collective Decision-making in Continuous Spaces.
- Author
-
Garg, Nikhil, Kamble, Vijay, Goel, Ashish, Marn, David, and Munagala, Kamesh
- Subjects
VOTING ,ELECTIONS ,ALGORITHMS ,VOTERS ,PARETO analysis - Abstract
Many societal decision problems lie in high-dimensional continuous spaces not amenable to the voting techniques common for their discrete or single-dimensional counterparts. These problems are typically discretized before running an election or decided upon through negotiation by representatives. We propose a algorithm called Iterative Local Voting for collective decision-making in this setting. In this algorithm, voters are sequentially sampled and asked to modify a candidate solution within some local neighborhood of its current value, as defined by a ball in some chosen norm, with the size of the ball shrinking at a specified rate. We first prove the convergence of this algorithm under appropriate choices of neigh- borhoods to Pareto optimal solutions with desirable fairness properties in certain natural settings: when the voters' utilities can be expressed in terms of some form of distance from their ideal solution, and when these utilities are additively decomposable across dimensions. In many of these cases, we obtain convergence to the societal welfare maximizing solution. We then describe an experiment in which we test our algorithm for the decision of the U.S. Federal Budget on Mechanical Turk with over 2,000 workers, employing neighbor- hoods defined by various L-Norm balls. We make several observations that inform future implementations of such a procedure. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
7. Order Matters: Transmission Reordering in Wireless Networks.
- Author
-
Manweiler, Justin, Santhapuri, Naveen, Sen, Souvik, Roy Choudhury, Romit, Nelakuditi, Srihari, and Munagala, Kamesh
- Subjects
WIRELESS LANs ,LOCAL area networks ,WIRELESS communications ,COMPUTER interfaces ,COMPUTER networks ,COMPUTER systems - Abstract
Modern wireless interfaces support a physical-layer capability called Message in Message (MIM). Briefly, MIM allows a receiver to disengage from an ongoing reception and engage onto a stronger incoming signal. Links that otherwise conflict with each other can be made concurrent with MIM. However, the concurrency is not immediate and can be achieved only if conflicting links begin transmission in a specific order. The importance of link order is new in wireless research, motivating MIM-aware revisions to link-scheduling protocols. This paper identifies the opportunity in MIM-aware reordering, characterizes the optimal improvement in throughput, and designs a link-layer protocol for enterprise wireless LANs to achieve it. Testbed and simulation results confirm the performance gains of the proposed system. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
8. Adaptive Uncertainty Resolution in Bayesian Combinatorial Optimization Problems.
- Author
-
Guha, Sudipto and Munagala, Kamesh
- Subjects
UNCERTAINTY (Information theory) ,BAYESIAN analysis ,PROCESS optimization ,SENSOR networks ,STOCHASTIC analysis ,APPROXIMATION theory - Abstract
In several applications such as databases, planning, and sensor networks, parameters such as selectivity, load, or sensed values are known only with some associated uncertainty. The performance of such a system (as captured by some objective function over the parameters) is significantly improved if some of these parameters can be probed or observed. In a resource constrained situation, deciding which parameters to observe in order to optimize system performance, itself becomes an interesting and important optimization problem. This general problem is the focus of this article. One of the most important considerations in this framework is whether adaptivity is required for the observations. Adaptive observations introduce blocking or sequential operations in the system whereas nonadaptive observations can be performed in parallel. One of the important questions in this regard is to characterize the benefit of adaptivity for probes and observation. We present general techniques for designing constant factor approximations to the optimal observation schemes for several widely used scheduling and metric objective functions. We show a unifying technique that relates this optimization problem to the outlier version of the corresponding deterministic optimization. By making this connection, our technique shows constant factor upper bounds for the benefit of adaptivity of the observation schemes. We show that while probing yields significant improvement in the objective function, being adaptive about the probing is not beneficial beyond constant factors. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
9. A CONSTANT FACTOR APPROXIMATION FOR THE SINGLE SINK EDGE INSTALLATION PROBLEM.
- Author
-
GUHA, SUDIPTO, MEYERSON, ADAM, and MUNAGALA, KAMESH
- Subjects
SET (Computer network protocol) ,ALGORITHMS ,COMPUTER networks ,APPROXIMATION theory ,FUNCTIONAL analysis ,POLYNOMIALS ,MATHEMATICAL functions ,NUMERICAL analysis ,NONLINEAR theories - Abstract
We present the first constant approximation to the single sink buy-at-bulk network design problem, where we have to design a network by buying pipes of different costs and capacities per unit length to route demands at a set of sources to a single sink. The distances in the underlying network form a metric. This result improves the previous bound of O(log ∣R∣), where R is the set of sources. We also present a better constant approximation to the related Access Network Design problem. Our algorithms are randomized and combinatorial. As a subroutine in our algorithm, we use an interesting variant of facility location with lower bounds on the amount of demand an open facility needs to serve. We call this variant load balanced facility location and present a constant factor approximation for it, while relaxing the lower bounds by a constant factor. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
10. COST-DISTANCE: TWO METRIC NETWORK DESIGN.
- Author
-
Meyerson, Adam, Munagala, Kamesh, and Plotkin, Serge
- Subjects
- *
ALGORITHMS , *STEINER systems , *BLOCK designs , *APPROXIMATION theory , *METRIC system , *COST - Abstract
We present the Cost-Distance problem: finding a Steiner tree which optimizes the sum of edge costs along one metric and the sum of source-sink distances along an unrelated second metric. We give the first known O(log k) randomized approximation scheme for Cost-Distance, where k is the number of sources. We reduce several common network design problems to Cost- Distance, obtaining (in some cases) the first known logarithmic approximation for them. These problems include single-sink buy-at-bulk with variable pipe types between different sets of nodes, facility location with buy-at-bulk-type costs on edges (integrated logistics), constructing singlesource multicast trees with good cost and delay properties, priority Steiner trees, and multilevel facility location. Our algorithm is also easier to implement and significantly faster than previously known algorithms for buy-at-bulk design problems. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
11. LOCAL SEARCH HEURISTICS FOR k -MEDIAN AND FACILITY LOCATION PROBLEMS.
- Author
-
Arya, Vijay, Garg, Naveen, Khandekar, Rohit, Meyerson, Adam, Munagala, Kamesh, and Pandit, Vinayaka
- Subjects
HEURISTIC ,ALGORITHMS ,LOCATION problems (Programming) ,TRANSPORTATION problems (Programming) ,LINEAR programming ,ALGEBRA - Abstract
We analyze local search heuristics for the metric k-median and facility location problems. We define the locality gap of a local search procedure for a minimization problem as the maximum ratio of a locally optimum solution (obtained using this procedure) to the global optimum. For k-median, we show that local search with swaps has a locality gap of 5. Furthermore, if we permit up to p facilities to be swapped simultaneously, then the locality gap is 3 + 2/p. This is the first analysis of a local search for k-median that provides a bounded performance guarantee with only k medians. This also improves the previous known 4 approximation for this problem. For uncapacitated facility location, we show that local search, which permits adding, dropping, and swapping a facility, has a locality gap of 3. This improves the bound of 5 given by M. Korupolu, C. Plaxton, and R. Rajaraman [Analysis of a Local Search Heuristic for Facility Location Problems, Technical Report 98-30, DIMACS, 1998]. We also consider a capacitated facility location problem where each facility has a capacity and we are allowed to open multiple copies of a facility. For this problem we introduce a new local search operation which opens one or more copies of a facility and drops zero or more facilities. We prove that this local search has a locality gap between 3 and 4. [ABSTRACT FROM AUTHOR]
- Published
- 2004
- Full Text
- View/download PDF
12. Cancer characterization and feature set extraction by discriminative margin clustering.
- Author
-
Munagala, Kamesh, Tibshirani, Robert, and Brown, Patrick O.
- Subjects
- *
MOLECULAR diagnosis of cancer , *CANCER treatment , *CLUSTER analysis (Statistics) , *GENE expression , *DNA microarrays , *BIOMARKERS - Abstract
Background: A central challenge in the molecular diagnosis and treatment of cancer is to define a set of molecular features that, taken together, distinguish a given cancer, or type of cancer, from all normal cells and tissues. Results: Discriminative margin clustering is a new technique for analyzing high dimensional quantitative datasets, specially applicable to gene expression data from microarray experiments related to cancer. The goal of the analysis is find highly specialized sub-types of a tumor type which are similar in having a small combination of genes which together provide a unique molecular portrait for distinguishing the sub-type from any normal cell or tissue. Detection of the products of these genes can then, in principle, provide a basis for detection and diagnosis of a cancer, and a therapy directed specifically at the distinguishing constellation of molecular features can, in principle, provide a way to eliminate the cancer cells, while minimizing toxicity to any normal cell. Conclusions: The new methodology yields highly specialized tumor subtypes which are similar in terms of potential diagnostic markers. [ABSTRACT FROM AUTHOR]
- Published
- 2004
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.