When Distances Lie: Euclidean Embeddings in the Presence of Outliers and Distance Violations
Abstract
Distance geometry explores the properties of distance spaces that can be exactly represented as the pairwise Euclidean distances between points in (), or equivalently, distance spaces that can be isometrically embedded in . In this work, we investigate whether a distance space can be isometrically embedded in after applying a limited number of modifications. Specifically, we focus on two types of modifications: outlier deletion (removing points) and distance modification (adjusting distances between points). The central problem, Euclidean Embedding Editing, asks whether an input distance space on points can be transformed, using at most modifications, into a space that is isometrically embeddable in .
We present several fixed-parameter tractable (FPT) and approximation algorithms for this problem. Our first result is an algorithm that solves Euclidean Embedding Editing in time . The core subroutine of this algorithm, which is of independent interest, is a polynomial-time method for compressing the input distance space into an equivalent instance of Euclidean Embedding Editing with points.
For the special but important case of Euclidean Embedding Editing where only outlier deletions are allowed, we improve the parameter dependence of the FPT algorithm and obtain a running time of . Additionally, we provide an FPT-approximation algorithm for this problem, which outputs a set of at most outliers in time . This 2-approximation algorithm improves upon the previous -approximation algorithm by Sidiropoulos, Wang, and Wang [SODA ’17]. Furthermore, we complement our algorithms with hardness results motivating our choice of parameterizations.
Keywords and phrases:
Parameterized Complexity, Euclidean Embedding, FPT-approximationFunding:
Matthias Bentert: Supported by the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (grant agreement No. 819416).Copyright and License:
![[Uncaptioned image]](x1.png)
Saket Saurabh; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Mathematics of computing Combinatorial algorithms ; Theory of computation Fixed parameter tractabilityEditors:
Oswin Aichholzer and Haitao WangSeries and Publisher:

1 Introduction
The Euclidean Distance Matrix (EDM) is a matrix containing the squared Euclidean distances between points in a set. A central problem in Distance Geometry is determining whether a given matrix is an EDM [5, 25, 11, 13]. That is, the task is to identify whether a given distance space can be isometrically embedded into -spaces, or equivalently, the pairwise Euclidean distances among points in (). This problem has a rich history, originating with Cayley [7], whose observations were formalized by Menger [28], leading to Cayley-Menger determinants. Schoenberg [30] further advanced the field by characterizing -embeddable distances using negative type inequalities. Blumenthal’s monograph [5] remains a foundational text, documenting the theoretical underpinnings of this area.
This problem has numerous applications, including sensor network localization [29, 14], molecular conformation [21], data visualization [6], statistics [17], psychology [34, 31], learning image manifolds [36], handwriting recognition [24], studying musical rhythms [12], and signal processing [15]. The complexity of determining whether a matrix is an EDM is well understood, and it can be efficiently addressed using Singular Value Decomposition (SVD) [6, 35].
In many practical applications involving EDMs, errors due to noise, missing values, or approximation inaccuracies are common. To address these challenges, several heuristic approaches based on Multidimensional Scaling, Low-Rank Matrix Approximation, and Semidefinite Programming have been developed to reconstruct the matrix and create an embedding that minimizes the impact of these errors. We refer readers to [6, 15] for a comprehensive overview of the extensive literature on this topic.
Despite the importance and numerous practical applications of the EDM recognition problem with noise and errors, little was known about its computational complexity until recently. A notable exception is the work of Sidiropoulos, Wang, and Wang [32], which initiates the study of EDM in the presence of outliers. The work of Sidiropoulos et al. serves as the initial foundation for our studies.
In this paper, we address the algorithmic question of minimizing the number of edits required to transform a given distance matrix into EDM. Specifically, we aim to apply the minimum number of modifications to a given distance space with distance function , such that the resulting distance space can be isometrically embedded into a -dimensional Euclidean space . We consider two types of editing operations.
The first operation is element deletion. In matrix terms, this operation corresponds to deleting the row and column associated with the element we choose to remove. Following Sidiropoulos, Wang, and Wang [32], we refer to the elements removed from the distance space as outliers.
The second operation is distance modification. Let denote the set of unordered pairs of distinct elements in . For a pair of elements , the modification operation alters the distance . In terms of the distance matrix, this operation changes the -th and the -th entries. The problem of minimizing the number of modification operations to embed the resulting distance space in general metric spaces was studied in [18, 9], and embedding into ultrametric spaces was investigated in [9, 8].
Our primary algorithmic question is as follows: given integers and , can a distance space be transformed into a distance space that is embeddable in by removing at most outliers and performing at most modifications? In fact, we address an even more general weighted version of this problem, where each operation (outlier deletion or distance modification) is assigned a specific weight. More precisely, we study:
Two special cases of Euclidean Embedding Editing are of particular importance. The variant of the problem with , that is, of placing all but outlier points of a distance space into a Euclidean space of a given dimension such that the Euclidean distance between any pair of points is equal to , is called Euclidean Embedding with Outliers [32]. For the variant with , that is, without deletion of outliers, following [18], we use the name Euclidean Metric Violation Distance.
EXAMPLE: The distance space with and defined by distance matrix , where the -th entry of is
and , , , all weights equal to one, and , is a yes-instance of Euclidean Embedding Editing. Indeed, the distance space defined by distance matrix in Fig. 1 that can be obtained from by modifying distances between and and deleting outlier , is isometrically embedable in .
Our results.
First, we present a compression for Euclidean Embedding Editing– a polynomial-time algorithm that reduces an instance of the problem to an equivalent instance with the number of points bounded by (Theorem 8), where . As part of this compression, we also propose a -approximation algorithm for Euclidean Embedding with Outliers, which runs in polynomial time (Lemma 10). Using this compression algorithm, we design an FPT algorithm for Euclidean Embedding Editing with a running time of (Theorem 20).
For Euclidean Embedding with Outliers, a particular but important special case of Euclidean Embedding Editing – where the goal is to determine whether the distance space, excluding up to outliers, can be embedded in – we obtain better dependence on the parameters with a running time of (Theorem 21). Furthermore, for this problem, we propose a 2-approximation algorithm (Theorem 22). This randomized algorithm, with a running time of , guarantees a solution with at most outliers. As is common in Computational Geometry, all our algorithms operate under the real RAM computational model, assuming that basic operations over real numbers can be executed in unit time.
We also complement our algorithmic results with lower-bound proofs, establishing that both Euclidean Embedding with Outliers and Euclidean Metric Violation Distance are -hard even when (Theorems 26 and 27). So, FPT algorithms for these problems parameterized by alone appears to be out of reach, motivating our FPT-approximation algorithm. Additionally, we prove that Euclidean Embedding with Outliers is W[1]-hard when parameterized by alone (Theorem 28). These lower bounds indicate that to get an FPT algorithm for Euclidean Embedding Editing, it is important that we parameterize by both and the solution size . Importantly, our lower-bound results remain valid even in the unweighted case.
Related work.
The computational complexity study of Euclidean Embedding with Outliers was initiated by Sidiropoulos, Wang, and Wang [32]. They demonstrated that, assuming the Unique Games Conjecture, the problem of computing a minimum outlier embedding into -dimensional Euclidean space for any is NP-hard to approximate within a factor of for any . On the algorithmic side, they showed that a -approximation can be achieved in time. Additionally, they established that a -approximation is achievable in time. For exact solutions, they noted an algorithm with a runtime of .
They also obtained results related to bicriteria approximation involving nonisomorphic embeddings, approximation of the number of outliers, and distortion. The first result, is -relative outlier embedding in in time . The second result, -relative outlier embedding in time . (They define an algorithm as an -relative outlier embedding of to , for some functions and , if it either correctly decides that no embedding with distortion at most exists after removing outliers, or outputs a set of size such that there is an embedding into of distortion .) Since allowing distortion could significantly decrease the number of outliers, our 2-approximation algorithm for Euclidean Embedding with Outliers, Theorem 22, is incomparable with these results.
We are not aware of any algorithms with guaranteed performance for Euclidean Metric Violation Distance. Parameterized and approximation algorithms for metric violation distance problems for general metric, tree distances and ultrametric could be found in [18, 8, 9, 20]. More generally, embeddings of various metric spaces are a fundamental primitive in the design of algorithms [22, 23, 27, 26, 2, 3], though prior work often focuses on minimizing embedding distortion.
2 Preliminaries
Let be a set. A function is a distance on if: (i) is symmetric, that is, for any , , and (ii) for all . Then, is called a distance space. If, in addition satisfies a triange inequality: , for any , then is called a semimetric on . And if only for , then is called a metric, and a metric space.
More precisely, recall that for two points , the Euclidean distance between and is . We say that distance space is isometrically embeddable into if there is a map, called isometric embedding, such that for all . Notice that we do not require to be injective, that is, several points of may be mapped to the same point of . Throughout the paper, whenever we mention an embedding, we mean an isometric embedding. Moreover, when we use the term -embedding, we are referring to embedding into . A -embeddable distance space is strongly -embeddable if it is not -embeddable. We use to denote the set of unordered pairs of two distinct elements of . As convention, we assume that the empty set of points is -embeddable for every .
Let be a distance space where , and let for all . Then is equivalently defined by the distance matrix , where .
We drop the explicit reference to when it is clear from the context and instead of , simply write . Suppose that is embeddable into . The ordered set of points in is said to be a realization of if there is an embedding such that for all . We use the well-known property (see e.g. [15]) that a realization is unique up to rigid transformations of , that is, distance-preserving transformations of Euclidean space (rotations, reflections, translations).
Proposition 1 ([15]).
Let and be ordered set of points in . Then for all if and only if there is a rigid transformation of mapping to for all .
A realization can be constructed (if it exists) in polynomial time.
Proposition 2 ([1, 33]).
Given a distance space with points and a positive integer , in time, it can be decided whether can be embedded into and, if such an embedding exists, then a realization can be constructed in this running time.
Definition 3 (Metric basis).
Let be a -embeddable distance space. A set is a metric basis if, given an isometric embedding of into , there is a unique way to extend to an isometric embedding of . Equivalently, if a realization of is fixed then the embedding of any point of in a -embedding of is unique.
We will use the well-known characteristic of strong embeddability of a distance space into a Euclidean space. For points of distance space the Cayley-Menger determinant is the determinant of the matrix obtained from the distance matrix by prepending a row and a column whose first element is zero and the other elements are one. Formally, let , . Then the Cayley-Menger determinant is
Proposition 4 ([5, Chapter IV]).
A distance space with points is strongly -embeddable if and only if there exist points, say , such that:
-
1.
for , and
-
2.
for any ,
Equivalently (see, for example, [32]), is strongly -embeddable if and only if there is a set of points such that is strongly -embeddable for all , and for every , is -embeddable.
Thus, the embedding of the distance space into is essentially characterized by “anchor” points of . Note that in a realization of that is strongly -embeddable, the anchor points correspond to a set of points in general position in .
Following [5], we define sets of independent points.
Definition 5.
Let be a distance space. For a nonnegative integer , we say that of size is independent if is strongly -embeddable.
Then our “anchors” are independent sets of size . We use the following fact that the family of independent sets has matroid-like properties (implicit in [5, Chapter IV]).
Proposition 6 ([5, Chapter IV]).
Let be a strongly -embeddable distance space. Then, (i) any single-element set is independent, (ii) if is independent, then any is independent, (iii) if are independent and then there is a such that is independent. Furthermore, the maximum size of an independent set is and any independent set of size is a metric basis.
Lemma 7 ().
Suppose is a -embeddable distance space, is independent and . Then, is -embeddable.
For statements marked with (), the proofs are omitted in this extended abstract and is deferred to the full version.
3 Compression for Euclidean Embedding Editing
In this section, we show that, given an instance of Euclidean Embedding Editing, one can in polynomial time construct an equivalent instance where the number of points is upper-bounded by a polynomial of and and, moreover, the encoding of the weights is also polynomial in these parameters.
Theorem 8.
There is a polynomial-time algorithm that, given an instance of Euclidean Embedding Editing, either solves the problem or constructs an equivalent instance such that , and for , it holds that , , for , and for all .
We remark that Theorem 8 does not provide a kernelization algorithm according to the standard definition [10] as the size of the output instance is not upper-bounded by a function of the parameter – the distances between the points remain the same as in the input instance. Moreover, since Euclidean Embedding Editing is a decision problem, the word “solve” in the statement of Theorem 8 technically only refers to deciding correctly whether the instance is a yes-instance. However, if the instance is determined to be a yes-instance, then our algorithm can also output a solution that witnesses this, i.e., the outlier set and modified new distance values (if any). This additional feature of our compression algorithm will be used later in our FPT algorithm for Euclidean Embedding Editing.
In the proof of Theorem 8, we first design a polynomial-time -approximation algorithm (Section 3.1). This algorithm allows us, given an instance of the problem, either find a set of at most points such that is -embeddable or conclude that we have a no-instance.
In the first case, we iteratively construct a sequence of metric bases for using Proposition 6, where initially and in each iteration, we delete the points of the constructed basis from . If is sufficiently large, then there is a subsequence of bases of the same size with at least elements. We select the first subsequence with this property. The crucial property exploited by our algorithm is that this subsequence uniquely defines embeddings of the majority of the points assuming that we have a yes-instance of the problem. We use this to give a series of reduction rules that identify points in that should be outliers in any solution and irrelevant points of that could be deleted.
3.1 Bootstrapping the Compression through an Approximation
For a distance space , a -outlier set is a set of points such that is -embeddable. In unweighted Euclidean Embedding with Outliers (which we call UEEO), the function assigns unit weight to every point. Sidiropoulos et al. [32] observed that this problem admits a simple greedy -approximation running in . We show that this algorithm can be sped up to run in time, i.e., independent of in the exponent. To do so, we give a polynomial-time subroutine that produces a small hitting set for all minimal solutions. This subroutine will later be used as the first step of our compression algorithm for Euclidean Embedding Editing.
Lemma 9.
There is a polynomial-time algorithm that, given a distance space and an integer , outputs a set of points of size at most such that if is not -embeddable, then intersects every inclusionwise minimal -outlier set of .
Proof.
Assume that the distance space does not admit a -embedding. Note that, in particular, this means that . We then do the following.
-
1.
Set for an arbitrary point .
-
2.
While
, do the following:
-
(a)
If there is a point such that is not -embeddable, then set and return .
-
(b)
If there is a point such that is independent, then set and continue the loop, else exit the loop.
-
(a)
-
3.
If there are two distinct points such that is not -embeddable, then and return .
Clearly, the algorithm runs in polynomial time. Since the while loop has at most iterations, the set when the loop is exited has size at most and so, the returned set has size at most .
We can now use Lemma 9 as a subroutine in the greedy approximation for the minimization variant of unweighted Euclidean Embedding with Outliers.
Lemma 10 ().
There is a polynomial-time algorithm that, given a distance space and an integer , outputs a set of points of size at most such that is embeddable into where is the size of a smallest -outlier set.
3.2 Compression
We are now ready to give the compression algorithm for Euclidean Embedding Editing.
Proof of Theorem 8.
Let be an instance of Euclidean Embedding Editing. First, we preprocess the instance to reduce the number of points and then we explain how to reassign the weights.
Notice that if is a yes-instance, then it is possible to delete points to obtain a distance space embeddable in . In the first step of our algorithm, we call the algorithm from Lemma 10 for the instance of Euclidean Embedding with Outliers without weights. This algorithm outputs a set of points of size at most such that is embeddable into where is the minimum number of outliers. If then we conclude that is a no-instance of Euclidean Embedding Editing and stop. From now on, we assume that .
Let . We first show that if has bounded size, then we can return the original instance of the problem and stop.
Reduction Rule 1.
If then return .
We can apply this rule because if then . From now on, we assume that .
Because is a feasible solution to Euclidean Embedding with Outliers, can be embedded into . In the subsequent steps, we may delete some points in and reduce the parameter . This may result in a trivial instance which we solve by applying the following rule whenever possible.
Reduction Rule 2.
If then return a no-answer and stop. If and then return a yes-answer and stop.
We greedily partition into sets of size at most such that each is an inclusion-maximal independent set of points of , that is, is an inclusion-maximal subset such that is strongly -embeddable.
Assume that and the sets are already constructed. We set . If , then the partition is constructed. If , then we do the following:
-
1.
To initiate the construction of , we set for an arbitrary point and set .
-
2.
While there is a point such that is independent, set and .
Because is -embeddable, is strongly -embeddable for some and contains an independent set of size by Proposition 4. By Proposition 6, the described procedure will construct a set of size such that is strongly -embeddable. Notice that by Proposition 6, is a metric basis for .
Let . We say that for is -compatible if is embeddable in . Otherwise, is -incompatible. Similarly, for two distinct sets for , the pair is -compatible if is embeddable in , and is -incompatible otherwise (see Figure 2).
Notice that if is -incompatible then for each solution to the instance either is an outlier, or contains an outlier, or at least one distance between the points should be modified.
For each , . We partition the family of sets into parts according to their size (some parts may be empty). Formally, for , .
Consider the part for some . For a point , we say that two -compatible sets are -equivalent if the pair is -compatible, that is, is embeddable into . We show the following claim.
Claim 11 ().
-equivalency is an equivalence relation on the family of -compatible sets in . Furthermore, if are -equivalent and the pair for with is -compatible then is -compatible.
The definition of -equivalency implies the following property.
Claim 12.
Let and be two distinct classes of -equivalent -compatible sets. Then for any solution to the considered instance, either (i) , or (ii) for each set in there is a such that or there exists a such that , or (iii) for each set in there is a such that or there exists a such that .
We use this property in the following rule. Because and each is of size at most , there is with being of size at least . Let be the maximum value of with this property.
Reduction Rule 3.
If there is such that each -equivalence class of -compatible sets of has size at most , then set , , and .
After the exhaustive application of Reduction 3, we have that for each , there is an -equivalence class of -compatible sets in that contains at least sets and all other classes in contain at most elements combined. We say that is large. We exhaustively apply the following rule using the fact that contains at least sets.
Reduction Rule 4.
If there is such that there are at least sets for any such that is -incompatible for some , then set , , and .
In the next crucial step of our algorithm, we identify important sets for and delete all other sets that are irrelevant.
We apply the following marking procedure that labels important sets for . For every , we do the following:
-
mark every in for ,
-
for each , mark arbitrary sets of ,
-
for each and each , mark each set such that there is a set such that the pair is -incompatible.
We set and , and define .
Claim 13 ().
The instance of Euclidean Embedding Editing is equivalent to the instance .
We have that the original instance and the obtained instance of Euclidean Embedding Editing are equivalent. We prove that .
Claim 14 ().
.
Claim 15 ().
The overall running time of our algorithm is polynomial.
4 FPT algorithm for Euclidean Embedding Editing parameterized by solution size and dimension
In this section, we give our FPT algorithm for Euclidean Embedding Editing.
We prepare for it by recalling the relevant definitions and facts from [4]. In what follows, let be a real closed field and . Let be a finite set of polynomials each of degree at most .
Definition 16 ([4]).
A -atom is one of ,, , , where is a polynomial in and a quantifier-free -formula is a formula constructed only from -atoms together with the logical connectives , and .
Proposition 17 (Theorem 13.13, [4]).
Let be a sentence, where is a quantifier free -formula. There exists an algorithm to decide the truth of the sentence with complexity111The measure of complexity here is the number of field operations. in where is the ring generated by the coefficients of the polynomials in .
Definition 18.
Consider points of distance space and a set of pairs in . For every , if , then , otherwise where is an indeterminate. Then the -Augmented Cayley-Menger determinant is obtained from the Cayley-Menger determinant by replacing each with .
Observation 19.
Consider points of distance space and a set of pairs in . The -Augmented Cayley-Menger determinant is a multi-variate polynomial with real coefficients, over the set of indeterminates and where each monomial has degree at most .
Theorem 20.
Euclidean Embedding Editing is solvable in time.
Proof.
Our FPT algorithm for Euclidean Embedding Editing works as follows. We begin by running the compression algorithm (Theorem 8). Following this, based on insights from Proposition 4, we reduce the task of solving the resulting instance to the task of testing a bounded number (in terms of ) of sentences with purely existential quantifications as described in Proposition 17, where are all bounded by functions of and .
We now formalize this idea. Let be the given instance of Euclidean Embedding Editing. We run the algorithm of Theorem 8 on this instance. Recall that this algorithm either solves the instance or produces an equivalent instance such that , and for and a bound , we have that . Note that since has size bounded by , we may assume that is bounded by and is bounded by .
Since we now have a bounded number of points in , it is straightforward to guess a set of at most outliers and a subset of pairs from of size at most such that (i) and (ii) if there is a solution to the given instance, then there is a modification of the pairs in such that is embeddable into , where differs from (restricted to ) only among the pairs in . We next guess the embedding dimension of , denoted by . Note that .
By Proposition 4, we know that is -embeddable if and only if there is a subset of such that (i) for , and (ii) for any , , where the matrices are derived from the distance matrix .
We next guess . It remains to verify that there is a modification of the distances between each pair in such that the resulting space is -embeddable, i.e., satisfies the above two properties. To test this, we construct the formula obtained by taking the conjunction of the atoms below and invoke Proposition 17 on the sentence obtained by prepending with existential quantifications for every indeterminate :
-
1.
, where .
-
2.
for every .
-
3.
for every .
-
4.
for each indeterminate defined by .
In the conclusion of the section, we remark that the parameter dependence can be improved for Euclidean Embedding with Outliers.
Theorem 21 ().
Euclidean Embedding with Outliers can be solved in time .
5 FPT-Approximation for Unweighted Euclidean Embedding with Outliers
In this section, we give an FPT-time 2-approximation for Unweighted Euclidean Embedding with Outliers (UEEO) parameterized by the dimension . Recall that in the optmization version of this problem, the input is where is a distance space and the goal is to output a -outlier set of minimum size.
Our main idea is to give a randomized algorithm generating sequences and , where each is a -outlier set that is associated with the independent set of size . The construction of these sequences is roughly as follows, starting from and proceeding iteratively. For each :
-
1.
Any element that cannot be -embedded along with gets added to .
-
2.
We compute those elements that can be added to without increasing its embedding dimension, and associate a graph with these such that every -outlier set disjoint from includes a vertex cover of this graph. We then 2-approximate the minimum vertex cover of this graph and add it to .
-
3.
For the remaining elements (call this set ):
-
(a)
Take all of in (which makes a 2-approximation if at least half of is in the solution),
-
(b)
Uniformly at random add an element of to , resulting in (which gives an independent set with sufficiently high probability if at least half of is not in some fixed minimum -outlier set).
-
(a)
Theorem 22.
Unweighted Euclidean Embedding with Outliers can be -approximated in time by a randomized algorithm with one-sided constant probability of error.
Proof.
Let be a hypothetical minimum sized -outlier set. Let . Let us assume that is strongly -embeddable. Else, it is strongly -embeddable for some , in which case we guess and set . In what follows, we give a randomized algorithm that aims to obtain a metric basis of if certain pre-conditions are satisfied.
Alg-3:
-
1.
Set .
-
2.
For to do as follows.
-
(a)
Construct , the set of elements such that is -embeddable.
-
(b)
Construct , the set of elements such that is not -embeddable.
-
(c)
Construct , the set of elements such that is not -embeddable.
-
(d)
Select an element uniformly at random from .
-
(e)
Set .
-
(a)
Claim 23 ().
For every , the following holds:
-
1.
and are disjoint.
-
2.
Every -outlier set of disjoint from contains .
-
3.
If for all , , then is an independent set of size .
We next argue that for each , the independent set is preserved in , with sufficiently high probability if certain conditions are met.
Claim 24 ().
Let such that for all , . Then, and is an independent set of size .
Next, we build a series of -outlier sets as follows. For each , create an instance of the Vertex Cover problem on the graph , where , and there is an edge between two elements if they is not -embeddable. Using a factor- approximation algorithm for Vertex Cover, obtain a set such that , where is a minimum vertex cover of . Finally, set . Once every is computed, we compute and return .
Claim 25 ().
Let be the least integer such that for all , it holds that
Then, is a factor-2 approximation with probability at least .
Since we compute and return , by Claim 25 we are guaranteed that with probability at least .
Running Time Analysis.
We have already argued that we succeed with probability . Thus, we can boost the success probability by independently running our polynomial-time algorithm times and returning the minimum size solution among these runs. Thus, the probability that the algorithm fails in all of the independent runs is upper bounded by . Moreover, the total running time is upper bounded by .
6 Lower bounds
In this section, we complement our algorithmic results by proving computational lower bounds. These lower bounds also motivate our choice of parameterizations. First, we show that Euclidean Embedding Editing is -hard when parameterized by . More precisely, we show that even the unweighted versions of both Euclidean Embedding with Outliers and Euclidean Metric Violation Distance are -hard even for .
Theorem 26 ().
Euclidean Embedding with Outliers is strongly -hard even for instances with unit weights, integer distances, and .
Theorem 27 ().
Euclidean Metric Violation Distance is strongly -hard for the instances with unit weights, integer distances, and .
Finally, we prove that Euclidean Embedding Editing is -hard when parameterized by only. Moreover, the hardness holds even for the unweighted variant of Euclidean Embedding with Outliers.
Theorem 28 ().
Euclidean Embedding with Outliers parameterized by is -hard for -point instances with unit weights and integer distance matrices with entries in .
References
- [1] Jorge Alencar, Tibérius O. Bonates, Carlile Lavor, and Leo Liberti. An algorithm for realizing euclidean distance matrices. Electron. Notes Discret. Math., 50:397–402, 2015. doi:10.1016/J.ENDM.2015.07.066.
- [2] Sanjeev Arora, James Lee, and Assaf Naor. Euclidean distortion and the sparsest cut. Journal of the American Mathematical Society, 21(1):1–21, 2008.
- [3] Sanjeev Arora, Satish Rao, and Umesh Vazirani. Expander flows, geometric embeddings and graph partitioning. J. ACM, 56(2):5, 2009.
- [4] Saugata Basu, Richard Pollack, and Marie-Françoise Roy. Algorithms in Real Algebraic Geometry (Algorithms and Computation in Mathematics). Springer-Verlag, Berlin, Heidelberg, 2006.
- [5] Leonard Mascot Blumenthal. Theory and applications of distance geometry. Clarendon Press, Oxford, 1953.
- [6] Ingwer Borg and Patrick J.F. Groenen. Modern Multidimensional Scaling: Theory and Applications. Springer, New York, 2005.
- [7] Arthur Cayley. On the theory of determinants. Philosophical Magazine, 19:1–16, 1841.
- [8] Moses Charikar and Ruiquan Gao. Improved approximations for ultrametric violation distance. In Proceedings of the 2024 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 1704–1737. SIAM, 2024. doi:10.1137/1.9781611977912.68.
- [9] Vincent Cohen-Addad, Chenglin Fan, Euiwoong Lee, and Arnaud De Mesmay. Fitting metrics and ultrametrics with minimum disagreements. In Proceedings of the 63rd Annual Symposium on Foundations of Computer Science (FOCS), pages 301–311. IEEE, 2022. doi:10.1109/FOCS54457.2022.00035.
- [10] Marek Cygan, Fedor V. Fomin, Lukasz Kowalik, Daniel Lokshtanov, Dániel Marx, Marcin Pilipczuk, Michał Pilipczuk, and Saket Saurabh. Parameterized Algorithms. Springer, 2015. doi:10.1007/978-3-319-21275-3.
- [11] J. Dattorro. Convex Optimization & Euclidean Distance Geometry. Meboo Publishing USA, 2008.
- [12] E. D. Demaine, F. Gomez-Martin, H. Meijer, D. Rappaport, P. Taslakian, G. T. Toussaint, T. Winograd, and D. R. Wood. The distance geometry of music. Computational Geometry, 42(5):429–454, July 2009. doi:10.1016/J.COMGEO.2008.04.005.
- [13] Michel Deza, Monique Laurent, and Robert Weismantel. Geometry of cuts and metrics, volume 2. Springer, 1997.
- [14] L. Doherty, K. Pister, and L. El Ghaoui. Convex position estimation in wireless sensor networks. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM), volume 3, pages 1655–1663. IEEE, 2001.
- [15] Ivan Dokmanic, Reza Parhizkar, Juri Ranieri, and Martin Vetterli. Euclidean distance matrices: essential theory, algorithms, and applications. IEEE Signal Processing Magazine, 32(6):12–30, 2015. doi:10.1109/MSP.2015.2398954.
- [16] Michael Etscheid, Stefan Kratsch, Matthias Mnich, and Heiko Röglin. Polynomial kernels for weighted problems. Journal of Computer System Sciences, 84:1–10, 2017. doi:10.1016/J.JCSS.2016.06.004.
- [17] B. Everitt and S. Rabe-Hesketh. The Analysis of Proximity Data. Arnold, London, 1997.
- [18] Chenglin Fan, Benjamin Raichel, and Gregory Van Buskirk. Metric violation distance: Hardness and approximation. In Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 196–209. SIAM, 2018. doi:10.1137/1.9781611975031.14.
- [19] András Frank and Éva Tardos. An application of simultaneous diophantine approximation in combinatorial optimization. Combinatorica, 7(1):49–65, 1987. doi:10.1007/BF02579200.
- [20] Anna C. Gilbert and Lalit Jain. If it ain’t broke, don’t fix it: Sparse metric repair. In 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pages 612–619. IEEE, 2017. doi:10.1109/ALLERTON.2017.8262793.
- [21] T. F. Havel and K. Wüthrich. An evaluation of the combined use of nuclear magnetic resonance and distance geometry for the determination of protein conformations in solution. Journal of Molecular Biology, 182(2):281–294, 1985.
- [22] Piotr Indyk. Algorithmic applications of low-distortion geometric embeddings. In Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science (FOCS), pages 10–33. IEEE, 2001. doi:10.1109/SFCS.2001.959878.
- [23] Piotr Indyk and Jiri Matousek. Low-distortion embeddings of finite metric spaces. In in Handbook of Discrete and Computational Geometry, pages 177–196. CRC Press, 2004.
- [24] Viren Jain and Lawrence K. Saul. Exploratory analysis and visualization of speech and music by locally linear embedding. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), volume 3, pages 984–987. IEEE, 2004. doi:10.1109/ICASSP.2004.1326712.
- [25] Leo Liberti and Carlile Lavor. Euclidean distance geometry, volume 3. Springer, 2017.
- [26] Nathan Linial. Finite metric-spaces – combinatorics, geometry and algorithms. In Proceedings of the International Congress of Mathematicians, Vol. III, pages 573–586, Beijing, 2002. Higher Ed. Press.
- [27] Nathan Linial, Eran London, and Yuri Rabinovich. The geometry of graphs and some of its algorithmic applications. Combinatorica, 15(2):215–245, 1995. doi:10.1007/BF01200757.
- [28] Karl Menger. Untersuchungen über allgemeine metrik. Mathematische Annalen, 100:75–163, 1928.
- [29] N. Patwari, J. N. Ash, S. Kyperountas, A. O. Hero, R. L. Moses, and N. S. Correal. Locating the nodes: Cooperative localization in wireless sensor networks. IEEE Signal Processing Magazine, 22(4):54–69, July 2005. doi:10.1109/MSP.2005.1458287.
- [30] Isaac J. Schoenberg. Remarks to maurice frechet’s article “sur la definition axiomatique d’une classe d’espace distances vectoriellement applicable sur l’espace de hilbert”. Annals of Mathematics, 36:724–732, 1935.
- [31] R. Shepard. The analysis of proximities: multidimensional scaling with an unknown distance function, part i. Psychometrika, 27:125–140, 1962.
- [32] Anastasios Sidiropoulos, Dingkang Wang, and Yusu Wang. Metric embeddings with outliers. In Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 670–689. SIAM, 2017. doi:10.1137/1.9781611974782.43.
- [33] Manfred J. Sippl and Harold A. Scheraga. Solution of the embedding problem and decomposition of symmetric matrices. Proc. Nat. Acad. Sci. U.S.A., 82(8):2197–2201, 1985. doi:10.1073/pnas.82.8.2197.
- [34] W. Torgerson. Theory and Methods of Scaling. Wiley, New York, 1958.
- [35] Warren S. Torgerson. Multidimensional scaling: I. theory and method. Psychometrika, 17(4):401–419, 1952.
- [36] Kilian Q. Weinberger and Lawrence K. Saul. Unsupervised learning of image manifolds by semidefinite programming. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), volume 2, pages 988–995. IEEE, 2004. doi:10.1109/CVPR.2004.256.