Algorithms to Live By (Book Review) – Hacker Noon

A book by Brian Christian and Tom Griffiths

Whether you’re a computer science veteran, or just want to dip your toes into the fantastic world of algorithms, this book is for you. Being able to explain complex ideas in simple words is the hallmark of mastery of a subject, and Brian Christian and Tom Griffiths prove every bit of theirs in this book.

Algorithms to Live By takes you on a journey of eleven ideas from computer science, that we, knowingly or not, use in our lives every day. I enjoyed this book a lot, so this review is going to be a long one.

1. Optimal Stopping

Imagine the following scenario: you have to hire a secretary from a pool of fixed applicants. It’s interview day, and you have to interview the candidates in order make a hire/no-hire decision right after each interview. If you pass on someone, you cannot come back to them. If you hire someone, the process stops and they are your new secretary. How do you maximize your chances to find the best secretary in the group? This is the famous Secretary Problem, and it forms the basis for the discussion in this chapter.

You probably don’t want to hire the first person you interview, since you don’t know what the baseline is. You don’t want to hire the last person either: you almost certainly have passed on your best candidate at this point. So the optimal strategy involves interviewing and rejecting the first few candidates no matter how good they are: just to set up the baseline first and then hiring the best you’ve seen so far after. This optimal point turns out to be 1/e or about 37%. Reject 37% of the applicants, and then hire the next best one you see. Variants of this Secretary Problem and the accompanying 37% Rule apply to vast areas of real life too — from dating to parking your car to selling/buying a house: knowing when to stop looking is crucial. Here’s the sobering bit: this optimal strategy fails 63% of the time.

2. Explore/Exploit

It’s Saturday and it’s your cheat day. Do you open Yelp and explore a new restaurant, or do you go back to the sandwich place you’ve been craving all week? Do you put on Spotify’s Daily Mix, or do you just go back to listening to your favorite albums? In other words, do you explore, or do you exploit? From A/B Testing websites to A/B Testing human drugs via clinical trials, software engineers and pharmaceutical companies alike are trying to figure out where the balance lies. In addition to discussing a number of strategies like Win-Stay, Lose-Shift to win the slot machines on a casino floor (formally known as the multi-armed bandit problem), this chapter will help you pick between the latest or the greatest next time you have to make almost any choice.

3. Sorting

Sorting algorithms are usually the first ones that any introductory Computer Science courses cover. Topics covered here go from the Big O notation that serves as a yardstick for measuring the performance of algorithms, to the bouquet of sorting algorithms themselves: the bubble, insertion, merge and quick sorts. Moreover, sorting is prophylaxis for search: if you have your collection sorted, searching becomes a whole lot easier. The chapter ends with a discussion on tournaments of various types: round-robin, ladder, single-elimination and so on. After all, tournaments are another way to sort the teams, and so are pecking orders and dominance hierarchies in the animal (and human) kingdom. Keeping things sorted just makes life easier.

4. Caching

Or, the memory hierarchy — and what to keep on top of your mind, and what to delegate to pen and paper or a Notes app. Any discussion on caching necessitates a look into various strategies for deciding what stays in a cache — strategies like Random Eviction, First-In-First-Out, Least Recently Used and so on help. One thing I really liked here was how the Least Recently Used can be effectively applied to a physical library: instead of putting the returned books back on the shelves, libraries could use them to create a cache section — after all, the books that were most recently borrowed are most likely to get borrowed again!

5. Scheduling

How do you get things done? How do you schedule your day? How do you arrange the tasks so that the most gets done in the least amount of time? Moreover, how do you handle a situation where a low priority task is blocking a higher priority task, and you’re just stuck in a priority inversion? This chapter was almost like revisiting a bunch of old friends from undergrad: you don’t think about Preemption or Thrashing in your day-to-day work much.

6. Bayes’s Rule

I’m assuming you already know Bayes’s Rule, but if you don’t, it’s just a simple way to determine how probable something Ais given something else Bhas happened, usually denoted as P(A|B). It’s assumed you have good information about the priors: how likely those two things are to happen independently, and you know how likely things are things to occur the other way: B|A I’ll just write it out. To get P(A|B), multiply P(B|A)with P(A)and divide by P(B). It’s really that simple. Just make sure your priors are good: a good reminder in this chapter was that exposure to just news and not much else only serves to contaminate them, making us worse predictors of events.

The Copernican Principle, which dictates that a good prediction for how long something will last is to see how long it has already lasted, resurfaced in this chapter: it was also a key topic in Antifragile that I reviewed last month: it applies to things that are antifragile (like books) and not to those that are not (like human lifespans).

On that note, the three basic probability distributions: Additive rule(Erlang prior), Multiplicative rule (Power Law prior), and Average rule(Normal prior) are explained in this chapter in a very elegant and easy-to-read prose. Writing across curriculum should really be mandated, and I was impressed to read about these ideas without a single mathematical equation or graph.

7. Overfitting

This chapter is focussed on the case against complexity, and on keeping your models as simple as possible: not only they work better, but one can argue that simplicity should be a goal in itself. Folks in Machine Learning would love the discussion of ideas around cross-validation (hold some of your data back to test later that your learned model generalizes well, that it doesn’t just overfit your training data), regularization (penalize your models for complexity: so that simplicity is a part of the goal), early stopping and so on.

8. Relaxation

The perfect is the enemy of the good, so it’s okay to just relax and let it slide once in a while. A large class of problems in Computer Science, known as NP-Hard Problems, are basically intractable. For any realistic dataset, we have no way to compute a perfect solution in any reasonable amount of time. The most famous example of this is the Travelling Salesman Problem: figure out a route that a salesman should travel to visit all his stops with the least distance covered: the possibilities here are way too many to consider one by one. Relaxing the constraints and solving a similar, but an easier problem seems to be the solution. Any optimization problem has two parts — the rules and the scorekeeping. You can violate the rules some of the times and take a hit on the score as long as it keeps you moving (Lagrangian Relaxation).

9. Randomness

Randomness is another thing that works when nothing else works. Starting with the Monte Carlo Method, this chapter talks about Randomized Algorithms — and you have to love this part of Computer Science since this is where things stop being so exact. Not only that, Randomness can save you in Optimization, making sure you don’t get trapped in a local minimum while hill climbing your way. I really loved how this chapter ended with a discussion on randomness, evolution, and creativity. After all, you can make a case that all art stems out of some form of randomness.

10. Networking

Packet Switching, ACKnowledgements, triple handshakes, exponential backoff and the algorithms of forgiveness: networking is another topic full of gems. Connecting people is one of the most fundamental and impactful areas of Computer Science — we’re talking about the internet here. How to control the flow, how to avoid congestions (Additive Increase, Multiplicative Decrease), how to establish Backchannels (and the role of white noise and little acknowledgments in everyday real-life conversations!), and how to avoid bufferbloats: these are some of the topics that are part of any Computer Networking class, but it was great to see them in a new light.

11. Game Theory

The Prisoners Dilemma: the paradox where two individuals acting in their own self-interest does not result in the optimal outcome. Succinctly, think of two prisoners being interrogated by a detective: if they rat each other out, they both have to serve time in the prison, but if only one rats the other out, he gets to walk away free while the other one goes behind the bars. If they both stay loyal to each other, both of them walk away scot-free: but this optimal outcome will never be reached if both the prisoners act in their self-interest — which is something you would expect them to do.

This is the core problem used to introduce anyone to Game Theory: the beautiful field of Nash Equilibria, Dominant Strategies, Tragedy of the Commons and infinite recursions of getting into each other’s minds. The panacea: if you’re trapped in a game that lends itself to paradoxical incentives, change the game: set the rules so that there’s no incentive to act any other way. Have the mafia waiting outside the prison so that the one who rats his comrade is found getting eaten by the fish at the bottom of the local lake the next day. From poker to auctions, especially ad auctions that form the basis of the internet economy today (think Google and Facebook), Game Theory is another field of computer science/math that you cannot miss to explore!

read original article here