# CS代考计算机代写 data mining information retrieval scheme GMM data structure computational biology algorithm Bayesian database Center Based Clustering: A Foundational Perspective

Center Based Clustering: A Foundational Perspective
Pranjal Awasthi and Maria-Florina Balcan Princeton University and Carnegie Mellon University
November 10, 2014
Abstract
In the first part of this chapter we detail center based clustering methods, namely methods based on finding a “best” set of center points and then assigning data points to their nearest center. In particular, we focus on k-means and k-median clustering which are two of the most widely used clustering objectives. We describe popular heuristics for these methods and theoretical guarantees associated with them. We also describe how to design worst case approximately optimal algorithms for these problems. In the second part of the chapter we describe recent work on how to improve on these worst case algorithms even further by using insights from the nature of real world clustering problems and data sets. Finally, we also summarize theoretical work on clustering data generated from mixture models such as a mixture of Gaussians.
1 Approximation algorithms for k-means and k-median
One of the most popular approaches to clustering is to define an objective function over the data points and find a partitioning which achieves the optimal solution, or an approximately optimal solution to the given objective function. Common objective functions include center based objective functions such as k-median and k-means where one selects k center points and the clustering is obtained by assigning each data point to its closest center point. Here closeness is measured in terms of a pairwise distance function d(), which the clustering algorithm has access to, encoding how dissimilar two data points are. For instance, the data could be points in Euclidean space with d() measuring Euclidean distance, or it could be strings with d() representing an edit distance, or some other dissimilarity score. For mathematical convenience it is also assumed that the distance function d() is a metric. In k-median clustering the objective is to find center points c1,c2,···ck, and a partitioning of the data so as to minimize Φk−median = 􏰇x mini d(x, ci). This objective is historically very useful and well studied for facility location problems [16, 43]. Similarly the objective in k-means is to minimize Φk−means = 􏰇x mini d(x, ci)2. Optimizing this objective is closely related to fitting the maximum likelihood mixture model for a given dataset. For a given set of centers, the optimal clustering for that set is obtained by assigning each data point to its closest center point. This is known as the Voronoi partitioning of the data. Unfortunately, exactly optimizing the k-median and the k-means objectives is a notoriously hard problem. Intuitively this is expected since the objective function is a non-convex function of the variables involved. This apparent hardness can also be formally justified by appealing to the
1

notion of NP completeness [43, 33, 8]. At a high level the notion of NP completeness identifies a wide class of problems which are in principle equivalent to each other. In other words, an efficient algorithm for exactly optimizing one of the problems in the class on all instances would also lead to algorithms for all the problems in the class. This class contains many optimization problems that are believed to be hard1 to exactly optimize in the worst case and not surprisingly, k-median and k-means also fall into the class. Hence it is unlikely that one would be able to optimize these objectives exactly using efficient algorithms. Naturally, this leads to the question of recovering approximate solutions and a lot of the work in the theoretical community has focused on this direction [16, 11, 29, 34, 43, 47, 48, 57, 20]. Such works typically fall into two categories, a) providing formal worst case guarantees on all instances of the problem, and b) providing better guarantees suited for for nicer, stable instances. In this chapter we discuss several stepping stone results in these directions, focusing our attention on the k-means objective. A lot of the the ideas and techniques mentioned apply in a straightforward manner to the k-median objective as well. We will point out crucial differences between the two objectives as and when they appear. We will additionally discuss several practical implications of these results.
We will begin by describing a very popular heuristic for the k-means problem known as Lloyd’s method. Lloyd’s method [51] is an iterative procedure which starts out with a set of k seed centers and at each step computes a new set of centers with a lower k-means cost. This is achieved by computing the Voronoi partitioning of the current set of centers and replacing each center with the center of the corresponding partition. We will describe the theoretical properties and limitations of Lloyd’s method which will also motivate the need for good worst case approximation algorithms for k-means and k-median. We will see that the method is very sensitive to the choice of the seed centers. Next we will describe a general method based on local search which achieves constant factor approximations for both the k-means and the k-median objectives. Similar to Lloyd’s method, the local search heuristic starts out with a set of k seed centers and at each step swaps one of the centers for a new one resulting in a decrease in the k-means cost. Using a clever analysis it can be shown that this procedure outputs a good approximation to the optimal solution [47]. This is interesting, since as mentioned above, optimizing the k-means is NP-complete, in fact it is NP-complete even for k = 2, for points in the Euclidean space [33]2.
In the second part of the chapter we will describe some of the recent developments in the study of clustering objectives. These works take a non-worst case analysis approach to the problem. The basic theme is to design algorithms which give good solutions to clustering problems only when the underlying optimal solution has a meaningful structure. We will call such clustering instances as stable instances. We would describe in detail two recently studied notions of stability. The first one called separability was proposed by Ostrovsky et. al [57]. According to this notion a k-clustering instance is stable if it is much more expensive to cluster the data using (k − 1) or fewer clusters. For such instances Ostrovsky et. al show that one can design a simple Lloyd’s type algorithm which achieves a constant factor approximation. A different notion called approximation stability was proposed by Balcan et. al [20]. The motivation comes from the fact that often in practice optimizing an objective function acts as a proxy for the real problem of getting close to the correct unknown ground truth clustering. Hence it is only natural to assume that any good approximation to the proxy function such as k-means or k-median will also be close to the ground truth clustering in
1This is the famous P vs NP problem, and there is a whole area called Computational Complexity Theory that studies this and related problems [12].
2If one restricts centers to be data points, then k-means can be solved optimally in time O(nk+1) by trying all possible k-tuples of centers and choosing the best. The difficulty of k-means for k = 2 in Euclidean space comes from the fact that the optimal centers need not be data points.
2

terms of structure. Balcan et. al show that under this assumption one can design algorithms that solve the end goal of getting close to the the ground truth clustering. More surprisingly this is true even in cases where it is NP-hard to achieve a good approximation to the proxy objective.
In the last part of the chapter we briefly review existing theoretical work on clustering data generated from mixture models. We mainly focus on Gaussian Mixture Models (GMM) which are the most widely studied distributional model for clustering. We will study algo- rithms for clustering data from a GMM under the assumption that the mean vectors of the component Gaussians are well separated. We will also see the effectiveness of spectral techniques for GMMs. Finally, we will look at recent work on estimating the parameters of a Gaussian mixture model under minimal assumptions.
2 Lloyd’s method for k-means
Consider a set A of n points in the d-dimensional Euclidean space. We start by formally
defining Voronoi partitions.
Definition1(VoronoiPartition).GivenaclusteringinstanceC⊂Rd andkpointsc1,c2,···ck, a Voronoi partitioning using these centers consists of k disjoint clusters. Cluster i consists of all the points x ∈ C satisfying d(x,ci) ≤ d(x,cj) for all j ̸= i.3
Lloyd’s method, also known as the k-means algorithm is the most popular heuristic for k-means clustering in the Euclidean space which has been shown to be one of the top ten algorithms in data mining [69]. The method is an iterative procedure which is described below.
Algorithm Lloyd’s method
1. Seeding: Choose k seed points c1,c2,···ck. Set Φold = ∞. Compute the current
k-means cost Φ using seed points as centers, i.e. n
4.1 Bounding the cost of a swap
Consider a swap {o, t} output by using the cover graph. We will apply Equation 4.1 to this pair. We will explicitly define a clustering using centers in T −t+o and upper bound its cost.
8

We will then use the lower bound of Φ(T) from Equation 4.1 to get the kind of equations we want to sum up over. Let the clustering given by centers in T be C1,C2,···Ck. Let Co∗ be the cluster corresponding to center o in the optimal clustering given by O. Let ox be the closest point in O to x. Similarly let tx be the closest point in T to x. The key property satisfied by any output pair {o, t} is the following
Fact 7. Let {o, t} be a swap pair output using the cover graph. Then we have that for any x∈Ct either ox =o or tox ̸=t.
Proof. Assume that for some x ∈ Ct, ox = o′ ̸= o. By the procedure used to output swap pairs we have that t has degree 1 or 0 in the cover graph. In addition, if t has degree 1 then to = t. In both the cases we have that to′ ̸= t.
Next we create a new clustering by swapping o for t and assigning all the points in Co∗ to o. Next we reassign points in Ct Co∗. Consider a point x ∈ Ct Co∗. Clearly ox ̸= o. Let tox be the point in T which is connected to ox in the cover graph. We assign x to tox . One needs to ensure here that tox ̸= t which follows from Fact 7. From Equation 4.1 the increase in cost due to this reassignment must be non-negative. In other words we have
􏰕(d(x,o)2−d(x,tx)2)+ 􏰕 (d(x,tox)2−d(x,t)2)≥0 (4.2) x∈Co ∗ x∈Ct Co ∗
We will add up Equation 4.2 over the set of all good swaps.
In order to sum up over all swaps notice that in the first term in Equation 4.2 every point x ∈ C appears exactly once by being in C ∗ for some o ∈ O. Hence the sum over all swaps
􏰇o22
of the first term can be written as x∈C(d(x,ox) − d(x,tx) ). Consider the second term
in Equation 4.2. We have that (d(x, tox )2 − d(x, t)2)) ≥ 0 since x is in Ct . Hence we can replace the second summation over all x ∈ Ct without affecting the inequality. Also every point x ∈ C appears at most twice in the second term by being in C for some t ∈ T. Hence the sum over all swaps of the second term is at most 􏰇 (d(x, t t)2 − d(x, t )2). Adding these up and rearranging we get that x∈C ox x
Here R = 􏰇x∈C d(x, tox )2.
Φ(O) − 3Φ(T) + 2R ≥ 0
(4.3)
In the last part we will upper bound the quantity R. R represents the cost of assigning every point x to a center in T but not necessarily the closest one. Hence, R ≥ Φ(T ) ≥ Φ(O). However we next show that this reassignment cost is not too large.
Notice that R can also be written as 􏰇o∈O 􏰇x∈Co∗ d(x,to)2. Also 􏰇x∈Co∗ d(x,to)2 =
􏰇∗ 2 o∗ o2
􏰇􏰇 2 o2
x∈Co
d(x,o) +|C |d(o,t ) . Hence we have that R = 9
o∈O x∈Co

(d(x,o) +d(o,t ) ).

Also note that d(o, to) ≤ d(o, tx) for any x. Hence
R ≤ 􏰕 􏰕 (d(x,o)2 +d(o,tx)2)
o∈O x∈Co∗
= 􏰕(d(x, ox)2 + d(ox, tx)2)
x∈C
Using triangle inequality we know that d(ox, tx) ≤ d(ox, x) + d(x, tx). Substituting above
and expanding we get that
R ≤ 2Φ(O) + Φ(T ) + 2 􏰕 d(x, ox)d(x, tx) (4.4)
x∈C
The last term in the above equation can be bounded using Cauchy-Schwarz inequal-
ity as 􏰇x∈C d(x, ox)d(x, tx) ≤ 􏰊Φ(O)􏰊Φ(S). So we have that R ≤ 2Φ(O) + Φ(T ) +
2􏰊Φ(O)􏰊Φ(S). Substituting this in Equation 4.3 and solving we get the desired result that Φ(T ) ≤ 25Φ(O). Combining this with Lemma 6 proves Theorem 5.
A natural generalization of Algorithm Local search is to swap more than one centers at each step. This could potentially lead to a much better local optimum. This multi-swap scheme was analyzed by [47] and using a similar analysis as above one can show the following
Theorem 8. Let S be the final set of centers by the local search algorithm which swaps upto p centers at a time. Then we have that Φ(S) ≤ 2(3 + 2 )2OPT, where OPT is the cost of the
p
optimal k-means solution.
For the case of k-median the same algorithm and analysis gives [16]
Theorem 9. Let S be the final set of centers by the local search algorithm which swaps upto p centers at a time. Then we have that Φ(S) ≤ (3 + 2 )OPT, where OPT is the cost of the
p
This approximation factor for k-median has recently been improved to (1 + √3 + ǫ) [50]. For the case of k-means in Euclidean space [48] give an algorithm which achieves a (1 + ǫ) approximation to the k-means objective for any constant ǫ > 0. However the runtime of the algorithm depends exponentially in k and hence it is only suitable for small instances.
5 Clustering of stable instances
In this part of the chapter we delve into some of the more modern research in the theory of clustering. In recent past there has been an increasing interest in designing clustering algorithms that enjoy strong theoretical guarantees on non-worst case instance. This is of significant interest for two reasons: a) From a theoretical point of view, this helps us understand and characterize the class of problems for which one can get optimal or close
10
optimal k-median solution.

to optimal guarantees, b) From a practical point of view, real world instances often have additional structure that could be exploited to get better performance. Compared to worst case analysis, the main challenge here is to formalize well motivated and interesting additional structures of clustering instances under which good algorithms exist. In this section we present two popular interesting notions.
5.1 ǫ-separability
This notion of stability was proposed by Ostrovsky et al.[57]. Given an instance of k-
means clustering, let OPT(k) denote the cost of the optimal k-means solution. We can also decompose OPT(k) as OPT = 􏰇ki=1 OPTi, where OPTi denotes the 1-means cost of cluster Ci , i.e., 􏰇x∈Ci d(x, ci)2. Such an instance is called ǫ-separable if it satisfies OPT(k − 1) >
1 OPT(k). ǫ2
The definition is motivated by the following issue: when approaching a clustering problem, one typically has to decide how many clusters one wants to partition the data in, i.e., the value of k. If the k-means objective is the underlying criteria being used to judge the quality of a clustering, and the optimal (k − 1)-means clustering is comparable to the optimal k- means clustering, then one can in principle also use (k − 1) clusters to describe the data set. In fact this particular method is a very popular heuristic to find out the number of hidden clusters in the data set. In other words choose the value of k at which there is a significant increase in the k-means cost when going from k to k − 1. As an illustrative example consider the case of a mixture of k spherical unit variance Gaussians in d dimensions whose pair wise means are separated by a distance D >> 1. Given n points from each Gaussian, the optimal k-means cost with high probability is nkd. On the other hand, if we try to cluster this data using (k − 1) clusters, the optimal cost will now become n(k − 1)d + n(D2 + d). Hence, taking
the ratio of the two costs, this instance will be ǫ-separable for 1 = (k−1)d+D2+d = 1 + D2 ), D2 −1/2 √ ǫ2 kd kd
so ǫ = (1 + kd ) . Hence, if D ≫ kd, then the instance will be highly separable (the separability parameter ǫ will be o(1)).
It was shown by Ostrovsky et al. [57] that one can design much better approximation algorithms for ǫ-separable instances.
Theorem 10 ( [57]). There is a polynomial time algorithm which given any ǫ-separable 2- means instance returns a clustering of cost at most OP T with probability at least 1 − O(ρ)
22 1−ρ where c2ǫ ≤ ρ ≤ c1ǫ for some constants c1, c2 > 0.
Theorem 11 ( [57]). There is a polynomial time algorithm which given any ǫ-separable k- means instance a clustering of cost at most OPT with probability 1 − O((ρ)1/4) where c2ǫ2 ≤
2 1−ρ ρ ≤ c1ǫ for some constants c1, c2 > 0.
5.2 Proof Sketch and Intuition for Theorem 10
Notice that the above algorithm does not need to know the value of ǫ from the separability of the instance. Define ri to be the radius of cluster Ci in the optimal k-means clustering,
11

i.e., ri2 = OPTi . The main observation is that under the ǫ-separability condition, the optimal |Ci|
k-means clustering is “spread out”. In other words, the radius of any cluster is much smaller than the inter cluster distances. This can be formulated in the following lemma
Lemma 12. ∀i,j, d(c ,c )2 ≥ 1−ǫ2 max(r 2,r 2). ijǫ2 ij
Proof. Given an ǫ-separable instance of k-means, consider any two clusters Ci and Cj in the optimal clustering with centers ci and cj respectively. Consider the (k − 1) clustering obtained by deleting cj and assigning all the points in Cj to Ci. By ǫ-separability, the cost
of this new clustering must be at least OPT . However the increase in the cost will be exactly ǫ2
|Cj|d(ci,cj)2. This follows from the simple observation stated in Fact 2. Hence we have that |C|d(c,c)2>(1−1)OPT.Thisgivesusthatr2=OPT≤ ǫ2 d(c,c)2.Similarly,ifwe
j ij ǫ2 j |Cj| 1−ǫ2 ij deletec andassignallthepointsinC toC wegetthatr2 ≤ ǫ2 d(c,c)2.
i i j i 1−ǫ2 ij
When dealing with the two means problem, if one could find two initial candidate center
points which are close to the corresponding optimal centers, then we could hope to run a
Lloyd’s type step and improve the solution quality. In particular if we could find c ̄ and c ̄ 2222 12
such that d(c ,c ̄) ≤ αr and d(c ,c ̄) ≤ αr , then we know from Fact 2 that using these 111222
center points will give us a (1 + α) approximation to OPT. Lemma 12 suggests the following
approach: pick data points x, y with probability proportional to d(x, y)2. We will show that
this will lead to seed points cˆ and cˆ not too far from the optimal centers. Applying a Lloyd 12
type reseeding step will then lead us to the final centers which will be much closer to the optimal centers. We start by defining the core of a cluster.
Definition3(Coreofacluster).Letρ<1beaconstant. WedefineXi ={x∈Ci : d(x, ci)2 ≤ ri2 }. We call Xi as the core of the cluster Ci . ρ We next show that if we pick initial seeds {cˆ , cˆ } = {x, y} with probability proportional 12 to d(x, y)2 then with high probability the points lie within the core of different clusters. Lemma 13. For sufficiently small ǫ and ρ = 100ǫ2 , we have Pr[{cˆ,cˆ} ∩ X ̸= ∅ and {x,y}∩X2 ̸=∅]=1−O(ρ). 􏰛􏰞 􏰙􏰝􏰚ρ 􏰜􏰞 􏰟􏰝 1−ǫ2 12 1 􏰛􏰝 􏰙􏰝􏰚ρ 􏰜􏰝 Figure 3: An ǫ-separable 2-means instance Proof Sketch. For simplicity assume that the sizes of the two clusters is the same, i.e., |Ci| = |Cj| = n/2. In this case, we have r12 = r22 = 2OPT = r2. Also, let d2(c1,c2) = d2. n 12 From ε-separability, we know that d2 > 1−ǫ2 r2. Also, from the definition of the core, we ǫ2
know that at least (1 − ρ) fraction of the mass of each cluster lies within the core. Hence, the clustering instance looks like the one showed in Figure 3. Let A = 􏰇x∈X1,y∈X2 d(x,y)2
and B = 􏰇 d(x,y)2. Then the probability of the event is exactly A. Let’s analyze x,y⊂C B
quantity B first. The proof goes by arguing that the pairwise distances between X1 and X2 will dominate B. This is because of Lemma 12 which says that d2 is much greater than r2, the average radius of a cluster. More formally, From Corollary 3 and from Fact 4 we can get that B = n∆12(C) = n∆22(C) + n2/4d2. In addition ǫ-separability tells us that
∆ 2(C) > 1/ǫ2∆ 2(C). Hence we get that B ≤ n2 d2. 1 2 4(1−ǫ2)
Let’s analyze A = 􏰇x∈X1,y∈X2 d(x,y)2. From triangle inequality, we have that for any
ρ)2. Hence A ≥ 1(1−ρ)2n2(d−2r/√
x ∈ X1, y ∈ X2, d2(x,y) ≥ (d−2r/√
Using these initial seeds we now show that a single step of a Lloyd’s type method can
yield good a solution. Define r = d(cˆ , cˆ )/3. Define c ̄ as the mean of the points in B(cˆ , r) 1211
and c ̄ as the mean of the points in B(cˆ , r). Notice that instead of taking the mean of the 22
Voronoi partition corresponding to cˆ and cˆ , we take the mean of the points within a small
ρ)2. Substituting these bounds and using the fact that ρO(ǫ2), gives us that A/B ≥ (1 − O(ρ)).
12
Lemma 14. Given cˆ ∈ X and cˆ ∈ X , the clustering obtained using c ̄ and c ̄ as centers
has 2-means cost at most OP T . 1−ρ
1122 12
4
Proof. WewillfirstshowthatX ⊆B(cˆ,r)⊆C . UsingLemma12weknowthatd(cˆ,c )≤
111 11 d(c ,c ) ≤ d(c ,c )/10 for sufficiently small ǫ. Similarly d(cˆ,c ) ≤ d(c ,c )/10. Hence

ρ(1−ǫ2) 1 2 1 2 2 2 1 2
wegetthat4/5≤r≤6/5. Soforanyz∈B(cˆ,r),d(z,c)≤d(c,c)/2. Hencez∈C . 11121
Alsoforanyz∈X,d(z,cˆ)≤2r12 ≤r.SimilarlyonecanshowthatX ⊆B(cˆ,r)⊆C. 11ρ 222
NowapplyingFact4wecanclaimthatd(c ̄,c)≤ ρ r2 andd(c ̄,c)≤ ρ r2. Sousing 1 1 1−ρ 1 2 2 1−ρ 2
c ̄ and c ̄ as centers we get a clustering of cost at most OPT + ρ OPT = OPT.
12
1−ρ 1−ρ
Summarizing the discussion above, we have the following simple algorithm for the 2-means problem.
Algorithm 2-means
1. Seeding: Choose initial seeds x, y with probability proportional to d(x, y)2.
2. Given seeds cˆ,cˆ, let r = d(cˆ,cˆ)/3. Define c ̄ = mean(B(cˆ,r)) and c ̄ = 1212112
mean(B(cˆ , r)). 2
3. Output: c ̄ and c ̄ as the cluster centers. 12
13

5.3 Proof Sketch and Intuition for Theorem 11
In order to generalize the above argument to the case of k clusters, one could follow a similar approach and start with k initial seed centers. Again we start by choosing x,y with probability proportional to d(x,y)2. After choosing a set of U of points, we choose
the next point z with probability proportional to min d(z,cˆ)2. Using a similar analysis cˆ ∈ U i
as in Lemma 13 one can show that if we pick k seeds then with probability (1 − O(ρ))k they will lie with the cores of different clusters. However this probability of success is exponentially small in k and is not good for our purpose. The approach taken in [57] is to sample a larger set of points and argue that with high probability it is going to contain k seed points from the “outer” cores of different clusters. Here we define outer core of a cluster
asXout ={x∈C :d(x,c)2 ≤ri2}–sothisnotionissimilartothecorenotionfork=2 i i i ρ3
except that the radius of the core is bigger by a factor of 1/(ρ) than before. We would like to again point out a similar seeding procedure as the one described above is used in the k-means++ algorithm [15](See Section 2). One can show that using k seed centers in this way gives an O(log(k))-approximation to the k-means objective in the worst case.
Lemma 15 ( [57]). Let N = 2k + 2ln(2/δ), where ρ = √ 1−5ρ (1−5ρ)2
i
ǫ. If we sample N points using the samplingprocedurethenPr[∀j=1···k,thereexistssomexˆ ∈Xout]≥1−δ
Since we sample more than k points in the first step, one needs to extract k good seed points out of this set before running the Lloyd step. This is achieved by the following greedy procedure:
ij
Algorithm Greedy deletion procedure
1. Let S denote the current set of candidate centers. Let Φ(S) denote the k-means cost of the Voronoi partition using S. Similarly, for x ∈ S denote Φ(Sx) be the k-means cost of the Voronoi partition using S {x}.
2. While |S| > k,
• remove a point x from S, such that Φ(Sx) − Φ(S) is minimum.
• For every remaining point x ∈ S, let R(x) denote the Voronoi set corresponding to x. Replace x by mean(R(x)).
• Output: S.
At the end of the greedy procedure we have the following guarantee
Lemma 16. For every optimal center c , there is a point cˆ ∈ S, such that d(c ,cˆ) ≤ Di .
iiii
10
Using the above lemma and applying the same Lloyd step as in the 2-means problem
we get a set of k good final centers. These centers have the property that for each i,
d(c ,c ̄) ≤ ρ r 2. Putting the above argument formally we get the desired result. ii 1−ρi
14
HereDi =minj̸=id(ci,cj).

5.4 Approximation stability
In [20] Balcan et al. introduce and analyze a class of approximation stable instances for which they provide polynomial time algorithms for finding accurate clustering. The starting point of this work, is that for many problems of interest to machine learning, such as as clustering proteins by function, images by subject, or documents by topic, there is some unknown correct target clustering. In such cases the implicit hope when pursuing an objective based clustering approach (k-means or k-median) is that approximately optimizing the objective function will in fact produce a clustering of low clustering error, i.e. a clustering that is point wise close to the target clustering. Balcan et al. have shown that by making this implicit assumption explicit, one can efficiently compute a low-error clustering even in cases when the approximation problem of the objective function is NP-complete! This is quite interesting since it shows that by exploiting the properties of the problem at hand one can solve the desired problem and bypass worst case hardness results. A similar stability assumption, regarding additive approximations, was presented in [54]. The work of [54] studied sufficient conditions under which the stability assumption holds true.
Formally, the approximation stability notion is defined as follows:
Definition 4 (((1 + α, ǫ)-approximation-stability)). Let X be a set of n points residing in a metric space M. Given an objective function Φ (such as k-median, k-means, or min-sum), we say that instance (M, X) satisfies (1+α, ǫ)-approximation-stability for Φ if all clusterings C with Φ(C) ≤ (1 + α) · OPTΦ are ǫ-close to the target clustering CT for (M, S).
Here the term “target” clustering refers to the ground truth clustering of X which one is trying to approximate. It is also important to clarify what we mean by an ǫ-close clustering. Given two k clusterings C and C∗ of n points, the distance between them is measured as
dist(C, C∗) = minσ∈S 1 􏰇k |Ci C ∗σ(i)|. We say that C is ǫ-close to C∗ if the distance kn i=1
between them is at most ǫ. Interestingly, this approximation stability condition implies a lot of structure about the problem instance which could be exploited algorithmically. For example, we can show the following.
Theorem 17. [ [20]] If the given instance (M, S) satisfies (1 + α, ǫ)-approximation-stability for the k-median or the k-means objective, then we can efficiently produce a clustering that is O(ǫ + ǫ/α)-close to the target clustering CT .
Notice that the above theorem is valid even for values of α for which getting a (1 + α)-
approximation to k-median and k-means is NP-hard! In a recent paper, [4] show that
running the kmeans++ algorithm for approximation stable instances of k-means gives a
constant factor approximation with probability Ω(1). In the following we will provide a k
sketch of the proof of Theorem 17 for k-means clustering. 5.5 Proof Sketch and Intuition for Theorem 17
Let C1,C2,··· ,Ck be an optimal k-means clustering of C. Let c1,c2,··· ,ck be the corre- sponding cluster centers. For any point x ∈ C, let w(x) be the distance of x to its cluster center. Similarly let w2(x) be the distance of x to the second closest center. The value of the optimal solution can then we written as OPT = 􏰇x w(x)2. The main implication of
15

approximation stability is that most of the points are much closer to their own center than to the centers of other clusters. Specifically:
Lemma 18. If the instance (M, X ) satisfies (1 + α, ǫ)-approximation-stability then less than 6ǫn points satisfy w2(x)2 − w(x)2 ≤ αOPT .
2ǫn
Proof. Let C∗ be the optimal k-means clustering. First notice that by approximation-stability
dist(C∗, CT ) = ǫ∗ ≤ ǫ. Let B be the set of points that satisfy w2(x)2 − w(x)2 ≤ αOPT . Let us ′ 2ǫn
assume that |B| > 6ǫn. We will create a new clustering C by transferring some of the points in B to their second closest center. In particular it can be shown that there exists a subset of size |B|/3 such that for each point reassigned in this set, the distance of the clustering to C∗ increases by 1/n. Hence we will have a clustering C′ which is 2ǫ away from C∗ and at least ǫ away from CT . However the increase in cost in going from C∗ to C′ is at most αOPT. This contradicts the approximation stability assumption.
Let us define dcrit = 􏰗αOPT as the critical distance. We call a point x good if it satisfies 50ǫn
w(x)2 < dcrit2 and w2(x)2 − w(x)2 > 25dcrit2. Otherwise we call x as a bad point. Let B be the set of all bad points and let Gi be the good points in target cluster i. By Lemma 18 at most 6ǫn points satisfy w2(x)2 − w(x)2 > 25d2crit. Also from Markov’s inequality at most
50ǫn points can have w(x)2 > dcrit2. Hence |B| = O(ǫ/α). α
Given Lemma 18, if we then define the τ -threshold graph Gτ = (S, Eτ ) to be the graph produced by connecting all pairs {x,y} ∈ 􏰑C2􏰒 with d(x,y) < τ, and consider τ = 2dcrit we get the following two properties: (1) For x,y ∈ Ci∗ such that x and y are good points, we have {x,y} ∈ E(Gτ). (2)Forx∈Ci∗ andy∈Cj∗ suchthatxandyaregoodpoints,{x,y}∈/E(Gτ). (3)Forx∈Ci∗ andy∈Cj∗,xandydonothaveanygoodpointasacommonneighbor. Hence the threshold graph has the structure as shown in Figure 4, where each Gi is a clique representing the set of good points in cluster i. This suggests the following algorithm for k-means clustering. Notice that unlike the algorithm for ǫ-separability, the algorithm for approximation stability mentioned below needs to know the values of the stability parameters α and ǫ4. 4This is specifically for the goal of finding a clustering that nearly matches an unknown target clustering, because one may not in general have a way to identify which of two proposed solutions is preferable. On the other hand, if the goal is to find a solution of low cost, then one does not need to know α or ǫ: one can just try all possible values for dcrit in the algorithm and take the solution of least total cost. 16 Algorithm k-means algorithm 1. Initialization: Define dcrit = 􏰗αOPT a Input: ǫ≤1,α>0,k.
2. Construct the τ-threshold graph Gτ with τ = 2dcrit.
50ǫn
3. Forj=1tokdo:
Pick the vertex vj of highest degree in Gτ .
Remove vj and its neighborhood from Gτ and call this cluster C(vj).
4. Output: the k clusters C(v1), . . . , C(vk−1), S − ∪k−1C(vi). i=1
aFor simplicity we assume here that one knows the value of OPT. If not, one can run a constant-factor approximation algorithm to produce a sufficiently good estimate.
G1 G2
Gk−1 Gk
B
Figure 4: The structure of the threshold graph.
The authors in [20] use the properties of the threshold graph to show that the greedy method of Step 3 of the algorithm produces an accurate clustering. In particular, if the vertex vj we pick is a good point in some cluster Ci, then we are guaranteed to extract the whole set Gi of good points in that cluster and potentially some bad points as well (see Figure 5(a)). If on the other hand the vertex vj we pick is a bad point, then we might extract only a part of a good set Gi and miss some good points in Gi, which might lead to some errors. (Note that by property (3) we never extract parts of two different good sets Gi and Gj). However, since vj was picked to be the vertex of the highest degree in Gτ, we are guaranteed to extract at least as many bad points as the number of missed good points in Gi see Figure 5(b). These than implies that overall we can charge the errors to the bad points, so the distance between the target clustering and the resulting clustering is O(ǫ/α)n, as desired.
5.6 Other notions of stability and relations between them
This notion of ǫ-separability, is in fact related to (c, ǫ)-approximation-stability. Indeed, in Theorem 5.1 of their paper, [57] show that their ǫ-separatedness assumption implies that any near-optimal solution to k-means is O(ǫ2)-close to the k-means optimal clustering. However,
17

G1 G2 vj
B
(a)
(b)
Figure 5: If the greedy algorithm chooses a good vertex vj as in (a), we get the entire good set of points from that cluster. If vj is a bad point as in (b), the missed good points can be charged to bad points.
the converse is not necessarily the case: an instance could satisfy approximation-stability without being ǫ-separated.5 [21] presents a specific example of points in Euclidean space with c = 2. In fact, for the case that k is much larger than 1/ǫ, the difference between the two properties can be more substantial. See Figure 6 for an example. In addition, algorithms for approximation stability have been successfully applied in clustering problems arising in computational biology [68] (See Section 5.8 for details).
[17] study center based clustering objectives and define a notion of stability called α-weak deletion stability. A clustering instance is stable under this notion if in the optimal clustering merging any two clusters into one increases the cost by a multiplicative factor of (1 + α). This a broad notion of stability that generalizes both the ǫ-separability notion studied in section 5.1 and the approximation stability in the case of large cluster sizes. Remarkably, [17] show that for such instances of k-median and k-means one can design a (1+ǫ) approximation algorithm for any ǫ > 0. This leads to immediate improvements over the works of [20] (for the case of large clusters) and of [57]. However, the runtime of the resulting algorithm depends polynomially in n and k and exponentially in the parameters 1/α and 1/ǫ, so the simpler algorithms of [17] and [20] are more suitable for scenarios where one expects the stronger properties to hold. See Section 5.8 for further discussion. [3] also study various notions of clusterability of a dataset and present algorithms for such stable instances.
Kumar and Kannan [49] consider the problem of recovering a target clustering under deterministic separation conditions that are motivated by the k-means objective and by Gaussian and related mixture models. They consider the setting of points in Euclidean space, and show that if the projection of any data point onto the line joining the mean of its cluster in the target clustering to the mean of any other cluster of the target is Ω(k) standard deviations closer to its own mean than the other mean, then they can recover the target clusters in polynomial time. This condition was further analyzed and reduced by work of [18]. This separation condition is formally incomparable to approximation-stability (even restricting to the case of k-means with points in Euclidean space). In particular,
5[57] shows an implication in this direction (Theorem 5.2); however, this implication requires a substantially stronger condition, namely that data satisfy (c, ǫ)-approximation-stability for c = 1/ǫ2 (and that target clusters be large). In contrast, the primary interest of [21] in the case where c is below the threshold for existence of worst-case approximation algorithms.
18
vj

􏰠
􏰞
􏰞
􏰞
target consists of k = √
cluster have distance 1 and all points in different clusters have distance D + 1 where D is
n clusters with √
n points each, such that all points in the same
􏰞
Figure 6: Suppose ǫ is a small constant, and consider a clustering instance in which the
a large constant. Then, merging two clusters increases the cost additively by Θ(√
n), since D is a constant. Consequently, the optimal (k − 1)-means/median solution is just a factor
n) more expensive than the optimal k-means/median clustering. However, for 1 + O(1/√
D sufficiently large compared to 1/ǫ, this example satisfies (2, ǫ)-approximation-stability or even (1/ǫ, ǫ)-approximation-stability – see [21] for formal details.
if the dimension is low and k is large compared to 1/ǫ, then this condition can require more separation than approximation-stability (e.g., with k well-spaced clusters of unit radius approximation-stability would require separation only O(1/ǫ) and independent of k – see [21] for an example). On the other hand if the clusters are high-dimensional, then this condition can require less separation than approximation-stability since the ratio of projected distances will be more pronounced than the ratios of distances in the original space.
Bilu and Linial [25] consider inputs satisfying the condition that the optimal solution to the objective remains optimal even after bounded perturbations to the input weight matrix. This condition is known as perturbation resilience. Bilu and Linial [25] give an algorithm for a different clustering objective known as maxcut. The maxcut objective asks for a 2 partitioning of a graph such the total number of edges going between the two pieces is max- imized. The authors show that the maxcut objective is easy under the assumption that the optimal solution is stable to O(n2/3)-factor multiplicative perturbations to the edge weights. The work of Makarychev et al. [52] subsequently reduced the required resilience factor to O(√log n). In [18] the authors study perturbation resilience for center-based clustering ob- jectives such as k-median and k-means, and give an algorithm that finds the optimal solution
when the input is stable to only factor-3 perturbations. This factor is improved to 1 + √2 by [22], who also design algorithms under a relaxed (c,ǫ)-stability to perturbations condi- tion in which the optimal solution need not be identical on the c-perturbed instance, but may change on an ǫ fraction of the points (in this case, the algorithms require c = 4). Note that for the k-median objective, (c,ǫ)-approximation-stability with respect to C∗ im- plies (c, ǫ)-stability to perturbations because an optimal solution in a c-perturbed instance is guaranteed to be a c-approximation on the original instance;6 so, (c,ǫ)-stability to per-
6 ̃ ̃
In particular, a c-perturbed instance d satisfies d(x, y) ≤ d(x, y) ≤ cd(x, y) for all points x, y. So, using Φ to denote cost
in the original instance, Φ ̃ to denote cost in the perturbed instance and using C ̃ to denote the optimal clustering under Φ ̃ , we 19

turbations is a weaker condition. Similarly, for k-means, (c, ǫ)-stability to perturbations is implied by (c2,ǫ)-approximation-stability. However, as noted above, the values of c known to lead to efficient clustering in the case of stability to perturbations are larger than for approximation-stability, where any constant c > 1 suffices.
5.7 Runtime Analysis
Below we provide the run time guarantees of the various algorithms discussed so far. While these may be improved with appropriate data structures, we assume here a straightforward implementation in which computing the distance between two data points takes time O(d), as does adding or averaging two data points. For example, computing a step of Lloyd’s algo- rithm requires assigning each of the n data points to its nearest center, which in turn requires taking the minimum of k distances per data point (so O(nkd) time total), and then resetting each center to the average of all data points assigned to it (so O(nd) time total). This gives Lloyd’s algorithm a running time of O(nkd) per iteration. The k-means++ algorithm has only a seed-selection step, which can be run in time O(nd) per seed by remembering the minimum distances of each point to the previous seeds, so it has a total time of O(nkd).
For the ǫ-separability algorithm, to obtain the sampling probabilities for the first two seeds one can compute all pairwise distances at cost of O(n2d). Obtaining the rest of the seeds is faster since one only needs to compute distances to previous seeds, so this takes time O(ndk). Finally there is a greedy deletion procedure at time O(ndk) per step for O(k) steps. So the overall time is O(n2d + ndk2).
For the approximation-stability algorithm, creating a graph of distances takes time O(n2d), after which creating the threshold graph takes time O(n2) if one knows the value of dcrit. For the rest of the algorithm, each step takes time O(n) to find the highest-degree vertex, and then time proportional to the number of edges examined to remove the vertex and its neighbors. Over the entire remainder of the algorithm this takes time O(n2) total. If the value of dcrit is not known, one can try O(n) values, taking the best solution. This gives an overall time of O(n3 + n2d).
Finally, for local search, one can first create a graph of distances in time O(n2d). Each local swap step has O(nk) pairs (x,y) to try, and for each pair one can compute its cost in time O(nk) by computing the minimum distance of each data point to the proposed k centers. So, the algorithm can be run in time O(n2k2) per iteration. The total number of iterations is at most poly(n) 7 so the overall running time is at most O(n2d + n2k2poly(n)). As can be seen from the table below the algorithms become more and more computationally expensive if one needs formal guarantees on a larger instance space. For example, the local search algorithm provides worst case approximation guarantees on all instances but is very slow. On the other hand Lloyd’s method and k-means++ are very fast but provide bad worst case guarantees, especially when the number of clusters k is large. Algorithms based on stability notions aim to provide the best of both worlds by being fast and provably good on well behaved instances. In the conclusion section 7 we outline a guideline for practitioners when working with the various clustering assumptions.
have Φ(C ̃) ≤ Φ ̃(C ̃) ≤ Φ ̃(C∗) ≤ cΦ(C∗).
7The actual number of iterations depend upon the cost of the initial solution and the stopping condition.
20

Method
Runtime
Lloyd’s
O(nkd)) × (#iterations) O(nkd)
k-means++
ǫ-separability
O(n2d + ndk2)
Approximation stability
O(n3 + n2d)
Local search
O(n2d + n2k2poly(n))
Table 1: A run time analysis of various algorithms discussed in the chapter. The running time degrades as one requires formal guarantees on larger instance spaces.
5.8 Extensions
Variants of the k-means objective
k-means clustering is the most popular methods for vector quantization which is used in en- coding speech signals and data compression [39]. There have been variants of the k-means al- gorithm called fuzzy kmeans which allow each point to have a degree of membership into var- ious clusters [24]. This modified k-means objective is popular for image segmentation [1, 64]. There have also been experiments on speeding up the Lloyd’s method by updating centers at each step by only choosing a random sample of the entire dataset [37]. [26] present an empirical study on the convergence properties of Lloyd’s method. Rasmussen [60] contains a discussion of k-means clustering for information retrieval. [35] present an empirical compar- ison of k-means and spectral clustering methods. [59] study a modified k-means objective with an additional penalty for the number of clusters chosen. They motivate the new ob- jective as a way to solve the cluster selection problem. This approach is inspired by the Bayesian model selection procedures [62]. For further details on the applications of k-means, refer to Chapters 1.2 and 2.3.
k-means++: Streaming and Parallel versions of k-means
As we saw in section 2, careful seeding is crucial in order for the Lloyd’s method to succeed. One such method is proposed in the k-means++ algorithm. Using the seed centers output by k-means++ one can immediately guarantee an O(logk) approximation to the k-means objective. However k-means++ is an iterative method which needs to be repeated k times in order to get a good set of seed points. This makes it undesirable for use in applications involving massive datasets with thousands of clusters. This problem is overcome in [19] where the authors propose a scalable and parallel version of kmeans++. The new algorithm runs in much fewer iterations and chooses more than one seed point at each step. The authors experimentally demonstrate that this leads to much better computational performance in practice without losing out on the solution quality. In [6] the authors design an algorithm for k-means which makes a single pass over the data. This makes it much more suitable for applications where one needs to process data in the streaming model. The authors show that if one is allowed to store a little more than k centers (O(k log k)) then one can also achieve good approximation guarantees and at the same time have an extremely efficient algorithm. They experimentally demonstrate that the proposed method is much faster than known implementations of the Lloyd’s method. There has been subsequent work on improving the approximation factors and making the algorithms more practical [63].
Approximation Stability in practice
Motivated by clustering applications in computational biology, [68] analyze (c,ǫ)-approx- imation-stability in a model with unknown distance information where one can only make a limited number of one versus all queries. [68] design an algorithm that given (c, ǫ)-approx-
21

imation-stability for the k-median objective finds a clustering that is very close to the target by using only O(k) one-versus-all queries in the large cluster case, and in addition is faster than the algorithm we present here. In particular, the algorithm for the large clusters case described in [20] (similar to the one we described in Section 5.4 for the k-means objective) can be implemented in O(|S|3) time, while the one proposed in [68] runs in time O(|S|k(k + log |S|)). [68] use their algorithm to cluster biological datasets in the Pfam [38] and SCOP [56] databases, where the points are proteins and distances are inversely proportional to their sequence similarity. This setting nicely fits the one-versus all queries model because one can use a fast sequence database search program to query a sequence against an entire dataset. The Pfam [38] and SCOP [56] databases are used in biology to observe evolutionary relationships between proteins and to find close relatives of particular proteins. [68] find that for one of these sources they can obtain clusterings that almost exactly match the given classification, and for the other the performance of their algorithm is comparable to that of the best known algorithms using the full distance matrix.
6 Mixture Models
In the previous sections we saw worst case approximation algorithms for various clustering objectives. We also saw examples of how assumptions on the nature of the optimal solution can lead to much better approximation algorithms. In this section we will study a different assumption on how the data is generated in the first place. In the machine learning literature, such assumptions take the form of a probabilistic model for generating a clustering instance. The goal is to cluster correctly (with high probability) an instance generated from the par- ticular model. The most famous and well studied example of this is the Gaussian Mixture Model (GMM)[46]. This will be the main focus of this section. We will illustrate conditions under which datasets arising from such a mixture model can be provably clustered.
Gaussian Mixture Model A univariate Gaussian random variable X, with mean μ and
σ 2π
f(x) = 1 e(−1 (x−μ)T Σ−1(x−μ)).
2 1 −(x−μ)2
has the density function f(x) = √ e σ2 . Similarly, a multivariate Gaussian
variance σ
random variable, X ∈ Rn has the density function
2
|Σ|1/2(2π)n/2
Here μ ∈ Rn is called the mean vector and Σ is the n × n covariance matrix. A spe- cial case is the spherical Gaussian for which Σ = σ2In. Here σ2 refers to the variance of the Gaussian in any given direction. Consider k n-dimensional Gaussian distributions, N (μ1, Σ1), N (μ2, Σ2), · · · , N (μk, Σk). A Gaussian mixture model M refers to the distribu- tion obtained from a convex combination of such Gaussian. More specifically
M = w1N (μ1, Σ1) + w2N (μ2, Σ2) + · · · wkN (μk, Σk).
Here wi ≥ 0, are called the mixing weights and satisfy 􏰇i wi = 1. One can think of a point being generated from M by first choosing a component Gaussian i, with probability wi, and then generating a point from the corresponding Gaussian distribution N(μi,Σi). Given a data set of m points coming from such a mixture model, a fairly natural question
22

is to recover the individual components of the mixture model. This is a clustering problem where one wants to cluster the points into k clusters such that the points drawn from the same Gaussian are in a single partition. Notice that unlike in the previous sections, the algorithms designed for mixture models will have probabilistic guarantees. In other words, we would like the clustering algorithm to recover, with high probability, the individual com- ponents. Here the probability is over the draw of the m sample points. Another problem one could ask is to approximate the parameters (mean, variance) of each individual component Gaussian. This is known as the parameter estimation problem. It is easy to see that if one could solve the clustering problem approximately optimally, then estimating the parameters of each individual component is also easy. Conversely, after doing parameter estimation one can easily compute the Bayes optimal clustering. To study the clustering problem, one typically assumes separation conditions among the component Gaussians which limit the amount of overlap between them. The most common among them is to assume that the mean vectors of the component Gaussians are far apart. However, there are also scenarios when such separation conditions do not hold (consider two Gaussian which are aligned in an ’X’ shape), yet the data can be clustered well. In order to do this, one first does param- eter estimation which needs much weaker assumptions. After estimating the parameters, the optimal clustering can be recovered. This is an important reason to study parameter estimation. In the next section we will see examples of some separation conditions and the corresponding clustering algorithms that one can use. Later, we will also look at recent work on parameter estimation under minimal separation conditions.
6.1 Clustering methods
In this section we will look at distance based clustering algorithms for learning a mixture of Gaussians. For simplicity, we will start with2the case of k spherical Gaussians in Rn with means {μ1, μ2, · · · , μk} and variance Σ = σ In. The algorithms we describe will work under the assumption that the means are far apart. We will call this as the center separation property:
Definition 5 (Center Separation). A mixture of k identical spherical Gaussians satisfies
center separation if ∀i ̸= j,
∆i,j = ||μi − μj|| > βi,jσ
The quantity βi,j typically depends on k the number of clusters, n the dimensionality of the dataset and wmin, the minimum mixing weight. If the spherical Gaussians have different variances σi’s, the R.H.S. is replaced by βi,j(σi + σj). For the case of general Gaussians, σi will denote the maximum variance of Gaussian i in any particular direction. One of the earliest results using center separation for clustering is by Dasgupta [32]. We will start with
a simple condition that βi,j = C√
y from two different Gaussians N(μi,σ2In) and N(μj,σ2In). We have
E[||X −Y||2] = E[||X −μi +μi −μj −(Y −μj)||2]
= E[||X − μi||2] + E[||Y − μj||2] + ||μi − μj||2
≥ 2nσ2+C2σ2n 23
n, for some constant C > 4 and will also assume that wmin = Ω(1/k). Let’s consider a typical point x from a particular Gaussian N(μi,σ2In). We have E[||X − μi||2] = E[􏰇nd=1 |xd − μid|2] = nσ2. Now consider two typical points x and

For C large enough (say C > 4), we will have that for any two typical points x, y in the same cluster, ||x−y||2 ≤ 2σ2n. And for any two points in different clusters ||x−y||2 > 18σ2n. Using standard concentration bounds we can say that for a sample of size poly(n), with high probability, all points from a single Gaussian will be closer to each other, than to points from other Gaussians. In this case one could simply create a graph by connecting any two points x, y such that ||x − y||2 ≤ 2σ2n. It is easy to see that the connected components in this graph will correspond precisely to the individual components of the mixture model. If C is smaller, say 2, one needs a stronger concentration result [10] mentioned below
Lemma 19. If x, y are picked independently from N(μi, σ2In), then with probability 1−1/n3, √
||x − y||2 ∈ [2σ2n(1 − 4 log(n) ), 2σ2n(1 + 5 log(n) )]. n √n
Also, as before, one can show that with high probability, for x and y from two differ- √
ent Gaussians, we have ||x − y||2 > 2σ2n(1 + 4 log(n) ). From this it follows that if r is the n
minimum distance between any two points in the sample, then for any x in Gaussian i and any y in the same Gaussian, we have ||x−y||2 ≤ (1+ 4.5log(n))r. And for a point z in
√n
any other Gaussian we have ||x − z||2 > (1 + 4.5 log(n) )r. This suggests the following algorithm

n
Algorithm Cluster Spherical Gaussians 1. Let D be the set of all sample points.
2. For: i = 1 to k,
(a) Let x0 and y0 be such that ∥x0 − y0∥2 = r = minx,y∈D ∥x − y∥2.
(b) LetT ={y∈D:∥x −y∥2 ≤r(1+4.5logn). 0 √n
(c) Output: T as one of the clusters.
Handling smaller c
For smaller values of C, for example C < 1, one cannot in general say that the above strong concentration will hold true. In fact, in order to correctly classify the points, we might need t√o see points which are much closer to the center of a Gaussain (say at distance less √than 1 σ n). However, most of the mass of a Gaussian lies in a thin shell around radius 2 of σ n. Hence, one might have to see exponentially many samples in order to get a good classification. Dasgupta [32] solves this problem by first projecting the data onto a random d = O(log(k)/ǫ2) dimensional subspace. This has the effect that the center separation property is still preserved up to a factor of (1−ǫ). One can now do distance based clustering in this subspace as the number of samples needed will be proportional to 2d instead of 2n. General Gaussians The results of Dasgupta were extend by Arora and Kannan [10] to the case of general Gaussians. They also managed to reduce the required separation between means. They assumed that βi,j = Ω(log(n))(Ri + Rj)(σi + σj). As mentioned before, σi denotes the maximum variance of Gaussian i in any direction. Ri denotes the median radius of Gaussian i8. For the case of spherical gaussians, this separation becomes Ω(n1/4 log(n)(σi+ 8The radius such that the probability mass within Ri equals 1/2 24 σj)). Arora and Kannan use isoperimetric inequalities to get strong concentration results for such Gaussians. In particular they show that Theorem 20. Given βi,j = Ω(log(n)(Ri + Rj )), there exists a polynomial time algorithm which given at least m = n2k2 samples from a mixture of k general Gaussians, solves the δ2w6min clustering problem exactly with probability (1 − δ). Proof Intuition: The first step is to generalize Lemma 19 for the case of general Gaussians. In particular one can show that for x, y are picked at random from a general Gaussian i, with median radius Ri and maximum variance σi, we have with high probability 2Ri2 − 18 log(n)σiRi ≤ ||x − y||2 ≤ 2(Ri + 20 log(n)σi)2 Similarly, for x, y from different Gaussians i and j, we have with high probability ||x−y||2 >2min(Ri2,Rj2)+120log(n)(σi +σj)(Ri +Rj)+Ω((log(n))2(σi2 +σj2).
The above concentration results imply (w.h.p.) that pairwise distances within points from a Gaussian i lie in an interval Ii and distances between Gaussians Ii,j lie in the interval Ii,j. Furthermore, Ii,j will be disjoint from the interval corresponding to the Gaussian with smaller value of Ri (Need a figure here). In particular, if one looks at balls of increasing radius around a point from the Gaussian with minimum radius, σi, there will be a stage when there exists a gap: i.e., increasing the radius slightly does not include any more points. From the above lemmas, this gap will be roughly Ω(σi). Hence, at this stage, we can remove this Gaussian from the data and recurse. This property suggests the following algorithm outline.
Algorithm Cluster General Gaussians
1. Let r be the smallest radius such that |B(x,r)| > 3wmin|S|, for some x ∈ D.
4
Here |S| is the size of dataset and B(x, r) denotes the ball of radius r around x. 2. Let σ denote the maximum variance of the Gaussian with the least radius.
wminσ). Let γ = O(√
3. While D is non-empty,
(a) Letsbesuchthat|B(x,r+sγ)|∩D=|B(x,r+(s−1)γ)|.
(b) Remove a set T containing all the points from S which are in B(x, r + sγ log(n)).
(c) Output: T as one of the cluster.
One point to mention is that one does not really know beforehand the value of sigma at each iteration. Arora and Kannan [10] get around this by estimating the variance from the data in the ball B(x, r). They then show that this estimate is good enough for the algorithm to work.
25

6.2 Spectral Algorithms
The algorithms mentioned in the above section need the center separation to grow polyno- mially with n. This is prohibitively large especially in cases when k ≪ n. In this section, we look at how spectral techniques can be used to only require the separation to grow with k instead of n.
Algorithmic Intuition In order to remove the dependence on n we would like to project the data such that points from the same Gaussian become much closer while still maintain- ing the large separation between means. One idea is to do a random projection. However, random projections from n to d dimensions scale each squared distance equally (by factor d/n) and will not give us any advantage. However, consider the case of two spherical gaus- sians with means μ1 and μ2 and variance σ2In. Consider projecting all the points to the line joining μ1 and μ2. Now consider any random point x from the first Gaussian. For any unit vector along the line joining μ1 and μ2 we have that (x − μ1).v behaves like a 1- dimensional Gaussian with mean 0 and variance σ2. Hence the expected distance of a point x from its mean becomes σ2. This means that for any two points in the same Gaussian, the expected squared distance becomes 4σ2 (as opposed to 2nσ2). However, the distance between the means remains the same. In fact the above claim is true if we project onto any subspace containing the means. This subspace is exactly characterized by the Singu- lar Value Decomposition (SVD) of the data matrix. This suggests the following algorithm
Such spectral algorithms were proposed by Vempala and Wang [67] who reduced the separation for spherical Gaussians to βi,j = Ω(k1/4(log(n/wmin))1/4). The case of general
1+ min(wi,wj)
In the previous sections we looked at the problem of clustering points from a Gaussian Mixture Model. Another important problem is that of estimating the parameters of the component Gaussians. These parameters refer to the mixture weights wi’s, mean vectors μi’s and the covariance matrices Σi’s. As mentioned before, if one could do efficiently get a good clustering, then the parameter estimation problem is solved by simply producing empirical estimates from the corresponding clusters. However, there could be scenarios when it is not possible to produce a good clustering. For, ex. consider two one dimensional gaussians with mean 0 and variance σ2 and 2σ2. These gaussians have a large overlap and any clustering method will inherently have a large error. On the other hand, let’s look at the statistical distance between the two gaussians, i.e., 􏰘x |f1(x) − f2(x)|dx. This measures
26
Algorithm Spectral Clustering 1. Compute the SVD decomposition of the data.
2. Project the data onto the space of top-k right singular vectors. 3. Run a distance based clustering method in this projected space.
Gaussians was studied in [2] who give efficient clustering algorithms for βi,j = (√ 􏰊k log(kmin(2k , n))). [45] give algorithms for general Gaussians for β = k3/2 .
6.3 Parameter Estimation
i,j wmin 2

how much one distribution dominates the other one. It is easy to see that in this case the Gaussian with the higher variance will dominate the other Gaussian almost everywhere. Hence the statistical distance is close to 1. This suggests that information theoretically, one should be able to estimate the parameters of these two mixtures. In this section, we will look at some recent work of Kalai, Moitra, Valiant [44] and Moitra, Valiant [55] in efficient algorithms for estimating the parameters of a Gaussian mixture model. These works make minimal assumption on the nature of the data, namely, that the component gaussians have noticeable statistical distance. Similar results were proven in [23] who also gave algorithms for more general distributions.
The case of two Gaussians:
We will first look at the case of 2 Gaussians in Rn. We will assume that the statistical distance between the gaussians, D(N1,N2) is noticeable, i.e., 􏰘x |f1(x)−f2(x)|dx > α. Kalai
et. al [44] show the following theorem
Theorem 21. Let M = w1N1(μ1, Σ1)+w2N2(μ2, Σ2) be an isotropic GMM where D(N1, N2) > α. Then, there is an algorithm which outputs M′ = w1′N′1(μ′1,Σ′1)+w2′N′2(μ′2,Σ′2) such that for some permutation π : {0, 1} 􏰍→ {0, 1} we have,
|wi−wπ′(i)| ≤ ǫ ||μi−μ′π(i)|| ≤ ǫ ||Σi−Σ′π(i)|| ≤ ǫ
The algorithm runs in time poly(n, 1/ǫ, 1/α, 1/w1, 1/w2).
The condition on the mixture being isotropic is necessary to recover a good additive approximation for the means and the variances since otherwise, one could just scale the data and the estimates will scale proportionately.
Reduction to a one dimensional problem
In order to estimate the mixture parameters, Kalai et. al, reduce the problem to a series of one dimensional learning problems. Consider an arbitrary unit vector v. Suppose we project the data onto the direction of v and let the means of the Gaussians in this projected space be μ′1 and μ′2. Then we have that μ1 = E[x.v] = E[(x − μ1).v] = μ1.v. Hence, the parameters of the original mean vector are linearly related to the mean in the projected space. Similarly, let’s perturb v to get v′ = v+ǫ(ei+ej). Here ei and ej denote the basis vectors corresponding
to coordinates i and j. Let σ1′ 2 be the variance of the gaussian in the projected space v′. Then writing σ1′ 2 = E[(x.v′)2] and expanding, we get that E[xixj] will be linearly related to
σ1′ 2, σ12 and the μi’s. Hence, by estimating the parameters correctly over a series of n2, one dimensional vectors, one can efficiently recover the original parameters (by solving a system of linear equations).
Solving the one dimensional problem
The one dimensional problem is solved by the method of moments. In particular, define Li[M] to be the ith moment for the mixture model M, i.e., Li[M] = Ex∼M[xiM(x)]. Also
define Lˆi to be the empirical ith moment of the data. The algorithm in [44] does a brute force search over the parameter space for the two Gaussians and for a given candidate model M′ computes the first 6 moments. If all the moments are within ǫ of the empirical moments, then
27

the analysis in [44] shows that the parameters will be ǫ1/67 close to the parameters of the two gaussians. The same claim is also true for learning a mixture of k 1 dimensional gaussians if one goes upto (4k − 2) moments [55]. The search space however will be exponential in k. It is shown in [55] that for learning k one dimensional gaussians, this exponential dependence is unavoidable.
Solving the labeling problem
As noted above, the learning algorithm will solve n2, 1-dimensional problems and get param- eter estimates for the two gaussians for each 1-dimensional problem. In order to solve for the parameters of the original gaussians, we need to identify for each gaussian, the correspond- ing n2 parameters for each of the subproblems. Kalai et. al do this by arguing that if one projects the two gaussians onto a random direction v, with high enough probability, the cor- responding parameters for the two projected gaussians will differ by poly(α). Hence, if one takes small random perturbations of this vector v, the corresponding parameter estimates will be easily distinguishable.
The overall algorithm has the following structure
Algorithm Learning a mixture of two Gaussians
1. Choose a random vector v and choose n2 random perturbations vi,j.
2. For each i,j, project the data onto vi,j and solve the one dimensional problem using the method of moments.
3. Solve the labeling problem to identify the n2 parameter sets corresponding to a single Gaussian.
4. Solve a system of linear equations on this parameter set to obtain the original parame- ters.
Figure 7: The case of 3 Gaussians.
For the case of more than 2 Gaussians, Moitra and Valiant [55] extend the ideas mentioned above to provide an algorithm for estimating the parameters of a mixture of k Gaussians. For the case of k Gaussians, additional complications arise as it is not true anymore that projecting the k Gaussians to a random 1-dimensional subspace, maintains the statistical distance. For example, consider Figure 7. Here, projecting the data onto a random direction,
28

will almost surely collapse components 2 and 3. [55] solve this problem by first running a clustering algorithm to separate components 2 and 3 from component 1 and recursively solving the two sub-instances. Once, 2 and 3 have been separated, one can scale the space to ensure that they remain separated over a random projection. The algorithm from [55] has the sample complexity which depends exponentially on k. They also show that this dependence is necessary. One could use the algorithm from [55] to also cluster the points into component Gaussians under minimal assumptions. The sample complexity however, will depend exponentially in k. In contrast, one could algorithms from previous sections to cluster in polynomial time under stronger separation assumptions. The work of [41, 9] removes the exponential dependence on k and designs polynomial time algorithms for clustering data from a GMM under minimal separation assuming only that the mean vectors span a k dimensional subspace. However, their algorithm which is based on Tensor decompositions only works in the case when all the component Gaussians are spherical. It is an open question to get similar result for general Gaussians. There has also been work on clustering points from a mixture of other distributions. [31, 30] gave algorithms for clustering a mixture of heavy tailed distributions. [27] gave algorithms for clustering a mixture of 2 Gaussians assuming only that the two distributions are separated by a hyperplane. The recent work of [49] studies a deterministic separation condition on a set of points and show that any set of points satisfying this condition can be clustered accurately. Using this they easily derive many previously known results for clustering mixture of Gaussians as a corollary.
7 Conclusion
In this chapter we presented a selection of recent work on clustering problems in the computer science community. As is evident, the focus of all these works is on providing efficient algorithms with rigorous guarantees for various clustering problems. In many cases, these guarantees depend on the specific structure and properties of the instance at hand which are captured by stability assumptions and/or distributional assumptions. The study of different stability assumptions also provide insights into the structural properties of real world data and in some cases also lead to practically useful algorithms [68]. As discussed in Section 5.6 different assumptions are suited for different kinds of data and they relate to each other in interesting ways. For instance, perturbation resilience is a much weaker assumption than both ǫ-separability and approximation stability. However, we have algorithms with much stronger guarantees for the latter two. As a practitioner one is often torn between using algorithms with formal guarantees (which are typically slower) vs. fast heuristics like the Lloyd’s method. When dealing with data which may satisfy any of the stability notions proposed in this chapter, a general rule of thumb we suggest is to run the algorithms proposed in this chapter on a smaller random subset of the data and use the solution obtained to initialize fast heuristics like the Lloyd’s method. Current research on clustering algorithms continues to explore more realistic notions of data stability and their implications for practical clustering scenarios.
References
[1] Gibbs random fields, fuzzy clustering, and the unsupervised segmentation of textured images. CVGIP: Graphical Models and Image Processing, 55(1):1 – 19, 1993.
29

[2] D. Achlioptas and F. McSherry. On spectral learning of mixtures of distributions. In Proceedings of the Eighteenth Annual Conference on Learning Theory, 2005.
[3] Margareta Ackerman and Shai Ben-David. Clusterability: A theoretical study. Journal of Machine Learning Research – Proceedings Track, 5, 2009.
[4] Manu Agarwal, Ragesh Jaiswal, and Arindam Pal. k-means++ under approximation stability. The 10th annual conference on Theory and Applications of Models of Compu- tation, 2013.
[5] Ankit Aggarwal, Amit Deshpande, and Ravi Kannan. Adaptive sampling for k-means clustering. In Proceedings of the 12th International Workshop and 13th International Workshop on Approximation, Randomization, and Combinatorial Optimization. Algo- rithms and Techniques, APPROX ’09 / RANDOM ’09, 2009.
[6] N. Ailon, R. Jaiswal, and C. Monteleoni. Streaming k-means approximation. In Ad- vances in Neural Information Processing Systems, 2009.
[7] Paola Alimonti. Non-oblivious local search for graph and hypergraph coloring problems. In Graph-Theoretic Concepts in Computer Science, Lecture Notes in Computer Science. 1995.
[8] Daniel Aloise, Amit Deshpande, Pierre Hansen, and Preyas Popat. Np-hardness of euclidean sum-of-squares clustering. Mach. Learn.
[9] Anima Anandkumar, Rong Ge, Daniel Hsu, Sham M. Kakade, and Matus Telgar- sky. Tensor decompositions for learning latent variable models. Technical report, http://arxiv.org/abs/1210.7559, 2012.
[10] S. Arora and R. Kannan. Learning mixtures of arbitrary gaussians. In Proceedings of the 37th ACM Symposium on Theory of Computing, 2005.
[11] S. Arora, P. Raghavan, and S. Rao. Approximation schemes for Euclidean k-medians and related problems. In Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing. 1999.
[12] Sanjeev Arora and Boaz Barak. Computational complexity: a modern approach. Cam- bridge University Press, 2009.
[13] David Arthur, Bodo Manthey, and Heiko Ro ̈glin. Smoothed analysis of the k-means method. Journal of the ACM, 58(5), October 2011.
[14] David Arthur and Sergei Vassilvitskii. How slow is the k-means method? In Proceedings of the twenty-second annual symposium on Computational geometry, 2006.
[15] David Arthur and Sergei Vassilvitskii. k-means++: the advantages of careful seeding. In Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms, 2007.
[16] V. Arya, N. Garg, R. Khandekar, A. Meyerson, K. Munagala, and V. Pandit. Local search heuristics for k-median and facility location problems. SIAM Journal on Com- puting, 33(3):544–562, 2004.
[17] Pranjal Awasthi, Avrim Blum, and Or Sheffet. Stability yields a PTAS for k-median and k-means clustering. In Proceedings of the 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, 2010.
[18] Pranjal Awasthi, Avrim Blum, and Or Sheffet. Center-based clustering under pertur- bation stability. Information Processing Letters, 112(1-2), January 2012.
[19] B. Bahmani, B. Moseley, A. Vattani, R. Kumar, and S. Vassilvitskii. Scalable k- means++. In Proceedings of the 38th International Conference on Very Large Databases, 2012.
[20] M.-F. Balcan, A. Blum, and A. Gupta. Approximate clustering without the approxi- mation. In Proceedings of the ACM-SIAM Symposium on Discrete Algorithms, 2009.
[21] M.-F. Balcan, A. Blum, and A. Gupta. Clustering under approximation stability. In Journal of the ACM, 2013.
[22] Maria-Florina Balcan and Yingyu Liang. Clustering under perturbation resilience. Pro- ceedings of the 39th International Colloquium on Automata, Languages and Program-
30

ming, 2012.
[23] Mikhail Belkin and Kaushik Sinha. Polynomial learning of distribution families. In
Proceedings of the 51st Annual IEEE Symposium on Foundations of Computer Science,
2010.
[24] James C. Bezdek. Pattern Recognition with Fuzzy Objective Function Algorithms.
Kluwer Academic Publishers, Norwell, MA, USA, 1981.
[25] Yonatan Bilu and Nathan Linial. Are stable instances easy? In Proceedings of the First
Symposium on Innovations in Computer Science, 2010.
[26] Lon Bottou and Yoshua Bengio. Convergence properties of the k-means algorithms. In
Advances in Neural Information Processing Systems 7, pages 585–592. MIT Press, 1995.
[27] Spencer Charles Brubaker and Santosh Vempala. Isotropic PCA and affine-invariant clustering. In Proceedings of the 2008 49th Annual IEEE Symposium on Foundations
of Computer Science, 2008.
[28] Barun Chandra, Howard Karloff, and Craig Tovey. New results on the old k-opt algo-
rithm for the tsp. In Proceedings of the fifth annual ACM-SIAM symposium on Discrete
algorithms, 1994.
[29] M. Charikar, S. Guha, E. Tardos, and D. B. Shmoy. A constant-factor approximation
algorithm for the k-median problem. In Proceedings of the Thirty-First Annual ACM
Symposium on Theory of Computing, 1999.
[30] Kamalika Chaudhuri and Satish Rao. Beyond gaussians: Spectral methods for learning
mixtures of heavy-tailed distributions. In Proceedings of the 21st Annual Conference on
Learning Theory, 2008.
[31] Kamalika Chaudhuri and Satish Rao. Learning mixtures of product distributions us-
ing correlations and independence. In Proceedings of the 21st Annual Conference on
Learning Theory, 2008.
[32] S. Dasgupta. Learning mixtures of gaussians. In Proceedings of The 40th Annual
Symposium on Foundations of Computer Science, 1999.
[33] S. Dasgupta. The hardness of k-means clustering. Technical report, University of
California, San Diego, 2008.
[34] W. Fernandez de la Vega, Marek Karpinski, Claire Kenyon, and Yuval Rabani. Ap-
proximation schemes for clustering problems. In Proceedins of the Thirty-Fifth Annual
ACM Symposium on Theory of Computing, 2003.
[35] Inderjit S. Dhillon. Co-clustering documents and words using bipartite spectral graph
partitioning. In Proceedings of the seventh ACM SIGKDD international conference on
Knowledge discovery and data mining, 2001.
[36] Doratha E. Drake and Stefan Hougardy. Linear time local improvements for weighted
matchings in graphs. In Proceedings of the 2nd international conference on Experimental
and efficient algorithms, 2003.
[37] Vance Faber. Clustering and the Continuous k-Means Algorithm. 1994.
[38] R.D. Finn, J. Mistry, J. Tate, P. Coggill, A. Heger andJ.E. Pollington, O.L. Gavin,
P. Gunesekaran, G. Ceric, K. Forslund, L. Holm, E.L. Sonnhammer, S.R. Eddy, and A. Bateman. The pfam protein families database. Nucleic Acids Research, 38:D211–222, 2010.
[39] Allen Gersho and Robert M. Gray. Vector quantization and signal compression. Kluwer Academic Publishers, Norwell, MA, USA, 1991.
[40] Pierre Hansen and Brigitte Jaumard. Algorithms for the maximum satisfiability prob- lem. Computing, 1990.
[41] Daniel Hsu and Sham M. Kakade. Learning mixtures of spherical gaussians: moment methods and spectral decompositions. In Proceedings of the 4th Innovations in Theo- retical Computer Science Conference, 2013.
[42] Mary Inaba, Naoki Katoh, and Hiroshi Imai. Applications of weighted voronoi diagrams and randomization to variance-based k-clustering: (extended abstract). In Proceedings
31

of the tenth annual symposium on Computational geometry, 1994.
[43] K. Jain, M. Mahdian, and A. Saberi. A new greedy approach for facility location problems. In Proceedings of the 34th Annual ACM Symposium on Theory of Computing,
2002.
[44] Adam Tauman Kalai, Ankur Moitra, and Gregory Valiant. Efficiently learning mixtures
of two gaussians. In Proceedings of the 42th ACM Symposium on Theory of Computing,
2010.
[45] R. Kannan, H. Salmasian, and S. Vempala. The spectral method for general mixture
models. In Proceedings of The Eighteenth Annual Conference on Learning Theory, 2005.
[46] Ravi Kannan and Santosh Vempala. Spectral algorithms. Foundations and Trends in
Theoretical Computer Science, 4(3-4), 2009.
[47] Tapas Kanungo, David M. Mount, Nathan S. Netanyahu, Christine D. Piatko, Ruth
Silverman, and Angela Y. Wu. A local search approximation algorithm for k-means clustering. In Proceedings of the eighteenth annual symposium on Computational geom- etry, New York, NY, USA, 2002. ACM.
[48] A. Kumar, Y. Sabharwal, and S. Sen. A simple linear time (1 + ǫ)-approximation algorithm for k-means clustering in any dimensions. In Proceedings of the 45th Annual IEEE Symposium on Foundations of Computer Science, Washington, DC, USA, 2004.
[49] Amit Kumar and Ravindran Kannan. Clustering with spectral norm and the k-means algorithm. In Proceedings of the 51st Annual IEEE Symposium on Foundations of Computer Science, 2010.
[50] Shi Li and Ola Svensson. Approximating k-median via pseudo-approximation. In Pro- ceedings of the 45th ACM Symposium on Theory of Computing, 2013.
[51] S.P. Lloyd. Least squares quantization in PCM. IEEE Trans. Inform. Theory, 28(2):129–137, 1982.
[52] Konstantin Makarychev, Yury Makarychev, and Aravindan Vijayaraghavan. Bilu-linial stable instances of max cut and minimum multiway cut. In SODA, pages 890–906. SIAM, 2014.
[53] N. Megiddo and K. Supowit. On the complexity of some common geometric location problems. SIAM Journal on Computing, 13(1):182–196, 1984.
[54] Marina Meila ̆. The uniqueness of a good optimum for K-means. In Proceedings of the International Machine Learning Conference, pages 625–632, 2006.
[55] Ankur Moitra and Gregory Valiant. Settling the polynomial learnability of mixtures of gaussians. In Proceedings of the 51st Annual IEEE Symposium on Foundations of Computer Science, 2010.
[56] A.G. Murzin, S. E. Brenner, T. Hubbard, and C. Chothia. Scop: a structural classifi- cation of proteins database for the investigation of sequences and structures. Journal of Molecular Biology, 247:536–540, 1995.
[57] R. Ostrovsky, Y. Rabani, L. Schulman, and C. Swamy. The effectiveness of lloyd-type methods for the k-means problem. In Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science, 2006.
[58] Christos H. Papadimitriou. On selecting a satisfying truth assignment (extended ab- stract). In Proceedings of the 32nd annual symposium on Foundations of computer science, 1991.
[59] Dan Pelleg and Andrew W. Moore. X-means: Extending k-means with efficient es- timation of the number of clusters. In Proceedings of the Seventeenth International Conference on Machine Learning, 2000.
[60] Edie M. Rasmussen. Clustering algorithms. In Information Retrieval: Data Structures & Algorithms, pages 419–442. 1992.
[61] Petra Schuurman and Tjark Vredeveld. Performance guarantees of local search for multiprocessor scheduling. INFORMS J. on Computing, 2007.
[62] Gideon Schwarz. Estimating the Dimension of a Model. The Annals of Statistics, 32

6(2):461–464, 1978.
[63] Michael Shindler, Alex Wong, and Adam Meyerson. Fast and accurate k-means for
large datasets. In Proceedings of the 25th Annual Conference on Neural Information
Processing Systems, 2011.
[64] A. H S Solberg, T. Taxt, and A.K. Jain. A markov random field model for classification
of multisource satellite imagery. IEEE Transactions on Geoscience and Remote Sensing,
1996.
[65] Daniel A. Spielman and Shang-Hua Teng. Smoothed analysis of algorithms: Why the
simplex algorithm usually takes polynomial time. Journal of the ACM, 51(3), May 2004.
[66] Andrea Vattani. k-means requires exponentially many iterations even in the plane. In
Proceedings of the 25th annual symposium on Computational geometry, 2009.
[67] S. Vempala and G. Wang. A spectral algorithm for learning mixture models. Journal
of Computer and System Sciences, 68(2):841–860, 2004.
[68] K. Voevodski, M. F. Balcan, H. Roeglin, S. Teng, and Y. Xia. Efficient clustering with
limited distance information. In Proceedings of the 26th Conference on Uncertainty in
Artificial Intelligence, 2010.
[69] X. Wu, V. Kumar, J. Ross Quinlan, J. Ghosh, Q. Yang, H. Motoda, G. J. McLachlan,
A. Ng, B. Liu, P. S. Yu, Z.-H. Zhou, M. Steinbach, D. J. Hand, and D. Steinberg. The top ten algorithms in data mining. Knowledge and Information Systems, 2008.
33

Posted in Uncategorized