An elementary proof of a theorem of Johnson and Lindenstrauss
- S. Dasgupta, Anupam Gupta
- Mathematics, Computer ScienceRandom Struct. Algorithms
- 1 January 2003
A result of Johnson and Lindenstrauss [13] shows that a set of n points in high dimensional Euclidean space can be mapped into an O(log n/ϵ2)‐dimensional Euclidean space such that the distance…
Robust Submodular Observation Selection
- Andreas Krause, H. B. McMahan, Carlos Guestrin, Anupam Gupta
- Computer Science
- 2008
This paper presents the Submodular Saturation algorithm, a simple and efficient algorithm with strong theoretical approximation guarantees for cases where the possible objective functions exhibit submodularity, an intuitive diminishing returns property, and proves that better approximation algorithms do not exist unless NP-complete problems admit efficient algorithms.
Bounded geometries, fractals, and low-distortion embeddings
- Anupam Gupta, Robert Krauthgamer, James R. Lee
- Mathematics, Computer Science44th Annual IEEE Symposium on Foundations of…
- 11 October 2003
This work considers both general doubling metrics, as well as more restricted families such as those arising from trees, from graphs excluding a fixed minor, and from snowflaked metrics, which contains many families of metrics that occur in applied settings.
Provisioning a virtual private network: a network design problem for multicommodity flow
- Anupam Gupta, J. Kleinberg, Amit Kumar, R. Rastogi, B. Yener
- Computer ScienceSymposium on the Theory of Computing
- 6 July 2001
This work establishes a relation between this collection of network design problems and a variant of the facility location problem introduced by Karger and Minkoff, and provides optimal and approximate algorithms for several variants of this problem, depending on whether the traffic matrix is required to be symmetric.
An elementary proof of the Johnson-Lindenstrauss Lemma
- Anupam Gupta, S. Dasgupta
- Mathematics
- 1999
The Johnson-Lindenstrauss lemma shows that a set of n points in high dimensional Euclidean space can be mapped down into an O(log n== 2) dimensional Euclidean space such that the distance between any…
Better Algorithms for Stochastic Bandits with Adversarial Corruptions
- Anupam Gupta, Tomer Koren, Kunal Talwar
- Computer ScienceAnnual Conference Computational Learning Theory
- 22 February 2019
A new algorithm is presented whose regret is nearly optimal, substantially improving upon previous work and can tolerate a significant amount of corruption with virtually no degradation in performance.
Constrained Non-monotone Submodular Maximization: Offline and Secretary Algorithms
- Anupam Gupta, Aaron Roth, G. Schoenebeck, Kunal Talwar
- Mathematics, Computer ScienceWorkshop on Internet and Network Economics
- 7 March 2010
These ideas are extended to give a simple greedy-based constant factor algorithms for non-monotone submodular maximization subject to a knapsack constraint, and for (online) secretary setting subject to uniform matroid or a partition matroid constraint.
Simpler and better approximation algorithms for network design
- Anupam Gupta, Amit Kumar, T. Roughgarden
- Computer ScienceSymposium on the Theory of Computing
- 9 June 2003
A simple and easy-to-analyze randomized approximation algorithms for several well-studied NP-hard network design problems and a simple constant-factor approximation algorithm for the single-sink buy-at-bulk network design problem.
Approximate clustering without the approximation
- M. Balcan, A. Blum, Anupam Gupta
- Computer ScienceACM-SIAM Symposium on Discrete Algorithms
- 4 January 2009
If any c-approximation to the given clustering objective φ is e-close to the target, then this paper shows that this guarantee can be achieved for any constant c > 1, and for the min-sum objective the authors can do this for any Constant c > 2.
Differentially private combinatorial optimization
- Anupam Gupta, Katrina Ligett, Frank McSherry, Aaron Roth, Kunal Talwar
- Computer Science, MathematicsACM-SIAM Symposium on Discrete Algorithms
- 25 March 2009
It is shown that many such problems indeed have good approximation algorithms that preserve differential privacy, even in cases where it is impossible to preserve cryptographic definitions of privacy while computing any non-trivial approximation to even the value of an optimal solution, let alone the entire solution.
...
...