Scan Scheduling Specification and Analysis

Size: px
Start display at page:

Download "Scan Scheduling Specification and Analysis"

Transcription

1 Scan Scheduling Specification and Analysis Bruno Dutertre System Design Laboratory SRI International Menlo Park, CA May 24, 2000 This work was partially funded by DARPA/AFRL under BAE System subcontract RG2206 under prime contract F C0167

2 Abstract We investigate the construction of fixed schedules for an EW receiver that ensures that Ò disjoint frequency bands are periodically visited for a given time interval Two parameters and Ì, such that ¼ Ì, are given for each frequency band : is the required dwell time and Ì is the required revisit time for band The problem is to compute a global schedule, such that, for all, the receiver covers band for an interval of length in every interval of length Ì We give necessary and sufficient conditions for this problem to have solutions We prove that the problem is NP-complete We present a depth-first search algorithm for obtaining a solution and discuss simplification techniques that reduce the search space Contents 1 Introduction 2 2 Patterns and Schedules 4 3 Greatest Common Divisor 5 4 Feasibility Conditions 7 41 Compatibility of Two Patterns 7 42 Schedule Feasibility 10 5 Algorithms Theoretical Complexity Search-Space Reduction Schedule Construction Algorithm 22 6 Conclusion 23 1

3 Ti τ i 0 a b a b a b a b Introduction Figure 1: Successive Dwells for a Frequency Band We consider the problem of constructing a fixed scan schedule for a single EW receiver The receiver bandwidth is divided into Ò disjoint frequency bands that can be covered only one at a time The receiver must periodically visit each of these Ò bands for a specific duration For each band, two parameters and Ì specify how long and how often band must be revisited, respectively Ì is the revisit time and the dwell time for band We assume that and Ì are real numbers such that ¼ Ì The schedule is required to include, for each frequency band, a sequence of dwell intervals as depicted in Figure 1 The receiver covers band in each interval Ø Ø µ, and other frequency bands between Ø and Ø ½ Globally, a schedule can be described by Ò triples of parameters Ì µ for ½ Ò, where is the dwell time for band, Ì the revisit time for band, and the start time of the first dwell interval covering band These parameters must satisfy the following constraints: ¼ Ì and ¼ Ì These parameters determine the successive dwell intervals for each frequency band However, not all possible values for the parameters Ì are acceptable Since the receiver can cover only a single frequency band at a time, we must ensure that the dwell intervals for distinct bands do not overlap The following figure shows an example of feasible schedule with Ò ¾, ½ ¼, ½ ¼, Ì ½ ¾, ¾ ¼, ¾ ¼, and Ì ¾ On the other hand, it is easy to see that no feasible schedule exists in case ½ ½, Ì ½ ¾, and ¾ ½, Ì ¾ Constructing such a schedule would amount to aligning the two sequences of intervals below in such a way that no two intervals overlap This is clearly impossible In general, we are given Ò pairs of parameters and Ì, such that ¼ Ì The problem is to find whether there exist Ò real numbers ½ Ò such that ¼ Ì for all, and the schedule defined by the parameters,, and Ì is feasible A simple test is to check whether the total resource utilization is no more than 1 Assume a schedule, defined by the above set of parameters, is feasible Let Ì be an arbitrary positive 2

4 number and let Ñ be the number of full dwell intervals for band that occur in the interval ¼ Ì Since the dwell intervals for different bands do not overlap, we have Ò ½ Ñ Ì Now Ñ is equal either to ÌÌ or to ÌÌ ½, and this implies that ÌÌ ½µ Ñ 1 This gives Ò ½ Ì Ì ½µ Ì that is, Ì Ò ½ Ì ½ Ò ½ Since this inequality holds for arbitrary Ì, we must have Ò ½ Ì ½ (1) The sum on the left-hand side of this equation is the total resource utilization If this quantity is more than 1, then no feasible schedule can be obtained Condition (1) is clearly necessary, but as shown by the preceding counterexample, it is not sufficient to ensure feasibility Although ½¾ ½ ½, there is no feasible schedule for ½ ½, Ì ½ ¾, and ¾ ½, Ì ¾ In practice, it is acceptable to reduce the revisit time for any band: spending more time covering band than required does not usually reduce the overall performance In this simple example, we could then solve the problem by changing Ì ¾ to ¾ Under these new conditions, we can construct a feasible schedule However, decreasing the revisit times does not always work For example, take Ò and the following parameters: Ì Although the total resource utilization ½¾ ½ ½is smaller than 1, this set of parameters does not admit a feasible schedule Reducing the revisit times for band ¾ or does not work either To accommodate band ¾, it is necessary to change Ì ¾ to ¾, but once this is done, the resource utilization for the two first bands equals 1, and there is no resource available for band This paper presents necessary and sufficient conditions on dwell times and revisit times to ensure schedule feasibility Section 2 introduces the notations and gives basic definitions 1 ÌÌ denotes the largest integer smaller than or equal to ÌÌ 3

5 and results Section 3 presents the essential mathematical notions used for obtaining feasibility results, namely, a generalization of the notion of greatest common divisor to arbitrary real numbers Section 4 gives the key results of this paper It establishes necessary and sufficient conditions of schedule feasibility Section 5 discusses the algorithmic complexity of the problem and presents an algorithm for computing schedules Section 6 summarizes the results presented in the paper 2 Patterns and Schedules In any schedule, the dwell intervals for a frequency band are characterized by three parameters: the dwell time, the revisit time, and the start of the first dwell interval We call such a triple of parameters a scan pattern or pattern for short Definition 1 A scan pattern is a triple Ì µ of real numbers such that ¼ Ì and ¼ Ì Given a scan pattern Ì µ, the successive dwell intervals Ø Ø µ of (for Ø ¾ Æ) are defined by the following equations 2 : Ø Ø Ì Ø Ø All the dwell intervals are then of length and two successive dwell intervals are separated by a delay Ì We denote by the set of reals that belong to any of these intervals: Ø Ø µ Ø¾Æ If corresponds to frequency band then is the set of times when the receiver covers We denote by Ê the set of nonnegative real numbers A time Ü ¾ Ê belongs to if and only if there exists Ø ¾ Æ such that Ø Ü Ø To obtain a more convenient condition we extend the notion of remainder of a Euclidean division to real numbers as follows Given any real Ù, let Ù denote the largest integer smaller than or equal to Ù: Ù ¾ and Ù Ù Ù ½ Given any real Ù and any positive real Ú, let Ù ÑÓ Ú be defined by Ù ÑÓ Ú Ù Ù Ú Ú The number Ù ÑÓ Ú is to be interpreted as the remainder of the division of Ù by Ú and, similarly, ÙÚ behaves like the usual quotient of an integer division We have Ù ÑÓ Ú Ö µ ¼ Ö Ù and ¾ Ù Ú Ö ÙÚ µ ¾ and Ú Ù Ú ½µ We also say that Ù is divisible by Ú or that Ù is a multiple of Ú if Ù Ú for some integer This is equivalent to Ù ÑÓ Ú ¼ Using these notations, we obtain the following necessary and sufficient condition for Ü to belong to 2 Using intervals closed on the left and open on the right simplifies the analysis but is not crucial 4

6 Lemma 1 If Ì µ then for any Ü ¾ Ê, we have Ü ¾ µ Ü µ ÑÓ Ì Let Ì µ and ¼ ¼ ¼ Ì ¼ µ be two scan patterns These two patterns overlap if ¼ Otherwise, we say that and ¼ are compatible Let Ø Ø µ Ø¾Æ be the dwell intervals of pattern and ¼ Ø ¼ Ø µ Ø¾Æ be the dwell intervals of ¼ To determine whether and ¼ overlap, it is sufficient to consider only the starting points of the dwell intervals Lemma 2 and ¼ overlap if and only if there is Ø ¾ Æ such that Ø ¾ ¼ or there is Ù ¾ Æ such that ¼ Ù ¾ The proof is trivial Since Ø Ø Ì and ¼ Ù ¼ Ù Ì ¼, we obtain the following result by combining Lemma 1 and Lemma 2 Proposition 3 Let Ì µ and ¼ ¼ ¼ Ì µ be two patterns; then and ¼ overlap if and only if one of the two following conditions is satisfied: Ñ ¾ Æ Ñ ¾ Æ ¼ ¼ Ñ Ì µ ÑÓ Ì ¼ ¼ Ñ Ì ¼ µ ÑÓ Ì A schedule Ë is a set of Ò ½ scan patterns Ì µ for ½ Ò The schedule is feasible if all these patterns are pairwise compatible, that is, the dwell intervals for different frequency bands do not overlap Given desired dwell times ½ Ò and desired revisit times Ì ½ Ì Ò, the problem is to determine whether there exist Ò real numbers ½ Ò such that ¼ Ì for ½ Ò, the schedule Ë defined by the patterns Ì µ is feasible We also need an algorithm or a technique for computing the values ½ Ò when they exist 3 Greatest Common Divisor Proposition 3 indicates that the feasibility problem reduces to finding the range of an expression of the form Ü Ñ Ì µ ÑÓ Ì ¼ for Ñ varying over the natural numbers, and for fixed reals Ì ¼ ¼, Ì ¼, and Ü In other words, we must find all the real numbers such that Ü Ñ Ì µ ÑÓ Ì ¼ for some Ñ ¾ Æ This is related to the more general problem of finding the reals such that ¾ ¾ Ü Ì Ì ¼ In case Ì and Ì ¼ are integers, the numbers of the form Ì Ì ¼ are the multiples of the greatest common divisor of Ì and Ì ¼ To solve the general case, we start by extending the gcd to arbitrary non-zero reals Ì and Ì ¼ 5

7 Assume then that Ì and Ì ¼ are two non-zero reals Let be the set of numbers defined by Ý ¾ ¾ Ý Ì Ì ¼ Clearly if Ü and Ý ¼ belong to then Ü ÑÓ Ý also belongs to Also, if Ü ¾ and ¾ then Ü ¾ In the remainder of this section, we show that this set has a smallest positive element provided ÌÌ ¼ is a rational number, and that this is the gcd of Ì and Ì ¼ We then investigate the case when ÌÌ ¼ is irrational Lemma 4 Assume has a smallest positive element ; then we have for all real Ý, Ý ¾ µ ¾ Ý Proof: Since is the smallest positive element of, we have ¾, so any Ý of the form is also an element of Conversely, assume Ý ¾ and let Ö Ý ÑÓ Clearly, Ö also belongs to and we have ¼ Ö Since is the smallest positive element of, Ö must be ¼ This means that Ý is a multiple of ¾ Lemma 5 has a smallest positive element if and only if ÌÌ ¼ is a rational number Proof: Assume has a smallest positive element Since both Ì and Ì ¼ belong to they are both multiples of (by the previous lemma) There are then two non-zero integers and ¼ such that Ì and Ì ¼ ¼, and ÌÌ ¼ ¼ is rational Conversely, assume ÌÌ ¼ is a rational number, that is, there are two integers Ô ¼ and Õ ¼ such that Ì Ì ¼ Ô Õ Let Ù ÌÔ Ì ¼ Õ; then we have Ù ¼, Ì Ô Ù, and Ì ¼ Õ Ù As a consequence, we can write Consider the set Ý ¾ ¾ Ý Ô Õµ Ù ¼ and ¾ ¾ Ô Õ is a set of positive integers; it has then a smallest element ¼ If Ù ¼, let ¼ Ù and otherwise let ¼ Ù; then is the smallest positive element of ¾ Lemma 6 Assume ÌÌ ¼ is rational and let be the smallest positive element of ; then is the greatest common divisor of Ì and Ì ¼ Proof: Since Ì and Ì ¼ belong to, divides both by Lemma 4 Since also belongs to, it is of the form Ì Ì ¼ for some integers and If divides both Ì and Ì ¼ then divides Ì Ì ¼, that is, divides ¾ In case ÌÌ ¼ is not rational, Ì and Ì ¼ do not have any common divisors and then they do not have a gcd By Lemma 5, we also know that the set does not have a smallest positive element We strengthen this result by showing that Ì Ì ¼ can be an arbitrarily small positive number 6

8 Lemma 7 If ÌÌ ¼ is irrational then, for any positive real, there are two integers and such that ¼ Ì Ì ¼ Proof: Let be the set of positive elements of ; then has a greatest lower bound and ¼ By Lemma 5, does not belong to We have then ¼ Ü ¾ Ü Since all elements of are of the form Ì Ì ¼ for some integers and, we just have to show that ¼ Assume this is not the case, that is, ¼ There is then Ü ¾ such that Ü ¾, and there is also Ý ¾ such that Ý Ü Since Ü Ý, ÝÜ ½ Let Ö Ü ÑÓ Ý; then Ö belongs to and we have Ö Ü ÜÝ Ý Ü Ý ¾ This implies Ö and contradicts the assumption that is the greatest lower bound of As a consequence cannot be positive so we have ¼ ¾ In summary, we have established the following results: If ÌÌ ¼ is a rational number then Ì and Ì ¼ have a gcd, and for all Ý ¾ Ê there are integers and such that Ý Ì Ì ¼ if and only if divides Ý If ÌÌ ¼ is not a rational number then Ì and Ì ¼ do not have a gcd and for all positive real, there are integers and such that ¼ Ì Ì ¼ 4 Feasibility Conditions 41 Compatibility of Two Patterns We consider two arbitrary patterns Ì µ and ¼ ¼ ¼ Ì ¼ µ and we study conditions for and ¼ to be compatible By Proposition 3, these two patterns overlap if and only if one or both of the two following properties are satisfied: Ñ ¾ Æ ¼ Ñ Ì µ ÑÓ Ì ¼ ¼ Ñ ¾ Æ ¼ Ñ Ì ¼ µ ÑÓ Ì We consider a slightly more general case and study the existence of integers Ñ that satisfy the inequality Ñ Ì ¼ µ ÑÓ Ì where Ì and Ì ¼ are positive reals, ¼ Ì, and is an arbitrary real Two cases must be considered depending on whether ÌÌ ¼ is rational or not 7

9 Rational Case Lemma 8 Assume ÌÌ ¼ is rational and let be the gcd of Ì and Ì ¼ Let be a real such that ¼ Ì ; then Ñ ¾ Æ Ñ Ì ¼ µ ÑÓ Ì µ µ divides Proof: If Ñ Ì ¼ µñóì with Ñ ¾ Æ then there is ¾ such that Ñ Ì ¼ Ì ; so Ñ Ì ¼ Ì and, by the preceding results, divides Conversely, assume divides There are then ¾ and ¾ such that Ì Ì ¼, and then Ì ¼ Ì Since ¼ Ì, this implies that Ì ¼ µì and then Ì ¼ µ ÑÓ Ì Since divides both Ì and Ì ¼, there are two positive integers Ù and Ú such that Ì Ù and Ì ¼ Ú Hence, we have Ú Ì Ù Ì ¼ Let ¾ Æ be large enough so that Ù ¼ and let Ñ Ù Then Ñ ¾ Æ and we have Ñ Ì ¼ µ ÑÓ Ì Ì ¼ Ù Ì ¼ µ ÑÓ Ì Ì ¼ Ú Ì µ ÑÓ Ì Ì ¼ µ ÑÓ Ì ¾ Assuming that ÌÌ ¼ is rational and that Ì Ì ¼ µ, let be the set of reals of the form Ñ Ì ¼ µ ÑÓ Ì for Ñ ¾ Æ: Ñ ¾ Æ Ñ Ì ¼ µ ÑÓ Ì By Lemma 8, this set can equivalently be defined by ¼ Ì and ¾ is then a nonempty finite set and its smallest element is ¼ ÑÓ This leads to the following proposition Proposition 9 Assume ÌÌ ¼ is rational and let Ì Ì ¼ µ; then Irrational Case Ñ ¾ Æ Ñ Ì ¼ µ ÑÓ Ì µ µ ÑÓ In case ÌÌ ¼ is irrational then Ñ Ì ¼ µ ÑÓ Ì can be arbitrarily small To show this, we first refine Lemma 7 as follows Lemma 10 If ÌÌ ¼ is irrational then for any positive real, the two following properties are satisfied: ¾ ¾ ¼ and ¼ Ì Ì ¼ ¾ ¾ ¼ and ¼ Ì Ì ¼ 8

10 Proof: Let «ÑÒ Ì ¼ µ By Lemma 7, there are two integers and such that ¼ Ì Ì ¼ «Let Ü Ì Ì ¼, Ì ¼ Ü, and Ý Ì ¼ ÑÓÜ Since ¼ Ü «Ì ¼, we have ½ By definition of mod, we have ¼ Ý Ü and since ÌÌ ¼ is not rational, Ý ¼ Furthermore, Ý Ì ¼ Ü, so we obtain It is easy to see that and ½ ¼ Ì Ì ¼ and ¼ Ì ½ µ Ì ¼ cannot be both positive or both negative ¾ Proposition 11 If ÌÌ ¼ is irrational then for any positive real, there is Ñ ¾ Æ such that Ñ Ì ¼ µ ÑÓ Ì Proof: If Ì, the inequality is trivially true for any Ñ, so we can assume Ì Our objective is to obtain a real Ý of the form Ì Ñ Ì ¼ with Ñ ¾ Æ and such that Ý For such a Ý, we get ¼ Ñ Ì ¼ Ì Since Ì this implies that Ñ Ì ¼ µì and then that Ñ Ì ¼ µ ÑÓ Ì To obtain appropriate Ý and Ñ, we consider the two following cases: ¼ By the preceding lemma, there are ¾ and ¾ such that ¼ and ¼ Ì Ì ¼ ¼ By the preceding lemma, there are ¾ and ¾ such that ¼ and ¼ Ì Ì ¼ In both cases, let Ü Ì Ì ¼, Ü ½, and Ý Ü This implies Ý and Ý Ì Ì ¼, so we can take Ñ In the first case, ½ and ¼, and, in the second case, ¼ and ¼ so we have Ñ ¼ in both cases as required ¾ Main Theorem The following theorem gives a necessary and sufficient condition for two scan patterns to be compatible The theorem is an immediate consequence of the preceding propositions Theorem 12 Let Ì µ and ¼ ¼ ¼ Ì ¼ µ be two scan patterns and ¼ are compatible if and only if ÌÌ ¼ is rational and the two following conditions are satisfied: ¼ µ ÑÓ ¼ µ ÑÓ ¼ where is the greatest common divisor of Ì and Ì ¼ In the remainder of this section, we assume that ÌÌ ¼ is a rational number and that Ì Ì ¼ µ Assume and ¼ are compatible Using the theorem, we get ¼ µ ÑÓ ¼ µ ÑÓ ¼ 9

11 For any real Ü that is not a multiple of we have Ü ÑÓ Üµ ÑÓ so the preceding inequality gives ¼ property We have proved the following important Proposition 13 If Ì µ and ¼ ¼ ¼ Ì ¼ µ are compatible then As a consequence, we have and since Ì and Ì ¼, ¼ ¼ ½ Ì ¼ Ì ¼ ½ This confirms a result we already established For two scan patterns to be compatible, their resource utilization must be no more than 1 Proposition 13 shows that the condition ¼ is necessary for two compatible patterns Ì µ and ¼ ¼ ¼ Ì ¼ µ to exist The condition is actually sufficient Proposition 14 Let, ¼, Ì, and Ì ¼ be such that ¼ Ì and ¼ ¼ Ì ¼ There exist and ¼ such that ¼ Ì, ¼ ¼ Ì ¼ ¼, and the patterns Ì µ and ¼ ¼ ¼ Ì ¼ µ are compatible if and only if ¼ Proof: We have already shown that the condition was necessary Now assume ¼ and take ¼ and ¼ Since ¼, we get ¼ µ ÑÓ ÑÓ ¼ µ ÑÓ ÑÓ ¼ We have ¼ Ì ¼ ¼ since ¼ and ¼ Ì, and we also have Ì since ¼ By Theorem 12, the two patterns Ì µ and ¼ ¼ ¼ Ì ¼ µ are compatible ¾ 42 Schedule Feasibility Consider now a schedule Ë that consists of Ò patterns Ì µ for ½ Ò The schedule is feasible if all these patterns are pairwise compatible The results from the previous section settle the case Ò ¾ If Ò ¾, Ë is feasible if and only if all the following conditions are satisfied: Ì ½ Ì ¾ is rational, ¾ ½ µ ÑÓ ½, ½ ¾ µ ÑÓ ¾, 10

12 where Ì ½ Ì ¾ µ Furthermore, given ½, ¾, Ì ½, and Ì ¾ such that Ì ½ Ì ¾ is rational, a corresponding feasible schedule Ë exists if and only if ½ ¾ Theorem 12 and Proposition 13 immediately generalize to arbitrary Ò ¾ Theorem 15 The schedule Ë is feasible if and only if, for all and in ½ Ò such that, the two following conditions are satisfied: Ì Ì is rational µ ÑÓ Ì Ì µ Proposition 16 If the schedule Ë is feasible then for all and in ½ Ò such that, Ì Ì µ On the other hand, Proposition 14 does not generalize The conditions given by Proposition 16 are necessary but not sufficient to ensure the existence of a schedule with revisit times ½ Ò and dwell times Ì ½ Ì Ò, unless Ò ¾ To see this, consider the case where Ò, Ì ½ Ì ¾ Ì ¾, and ½ ¾ ½ Although we have ½ ¾ Ì ½ Ì ¾ µ ½ Ì ½ Ì µ ¾ Ì ¾ Ì µ there is no feasible schedule for these parameters since the total resource utilization is more than 1 Theorem 15 shows that constructing a schedule is equivalent to solving a system of inequalities Assuming all the quotient Ì Ì are rational numbers, schedule feasibility is equivalent to solving a system Ë of Ò ¾ inequalities of the following form: ½ ¾ µ ÑÓ Ì ½ Ì ¾ µ ¾ ½ Ò µ ÑÓ Ì ½ Ì Ò µ Ò ¾ ½ µ ÑÓ Ì ¾ Ì ½ µ ½ ÑÓ ¾ Ò µ Ì ¾ Ì Ò µ Ò Ò ½ µ ÑÓ Ì Ò Ì ½ µ ½ Ò Ò ½ µ ÑÓ Ì Ò Ì Ò ½ µ Ò ½ ¼ ½ Ì ½ ½ ¼ Ò Ì Ò Ò Proposition 16 and the test on resource utilization give two necessary conditions for this system to have solutions The following section gives an algorithm for constructing a feasible schedule by solving the inequalities 11

13 5 Algorithms We explore practical ways of constructing a feasible schedule, given parameters Ì ½ Ì Ò and ½ Ò For this purpose, we restrict our attention to the case where all the parameters are integers and we also search for integer solutions of the system of inequalities This is a reasonable restriction since the temporal quantities (ie, Ì,, ) must be multiples of a common time unit, as an implementation must rely on a base discrete clock Under these assumptions, schedule feasibility can be transformed into a linear integer programming problem that can be solved using standard algorithms [2] However, more specialized algorithms that take into account the peculiarities of the problem are likely to be more efficient in practice We present one such algorithm in Section 53 but, first, we study the theoretical complexity of the problem and we discuss techniques for reducing the size of the solution space 51 Theoretical Complexity The scan-scheduling feasibility problem can be described as follows: Each instance of the problem is given by an integer Ò ½, Ò dwell times Ì ½ Ì Ò and Ò revisit times ½ Ò All the dwell times and revisit times must be positive integers and satisfy Ì The question is to determine whether there exist Ò integers ½ Ò such that the schedule defined by the Ò patterns Ì µ is feasible We denote this problem by SCAN-SCHEDULING The two following propositions show that SCAN-SCHEDULING is NP-complete Proposition 17 SCAN-SCHEDULING belongs to NP Proof: By the preceding results, solving an instance of SCAN-SCHEDULING is equivalent to solving the system of inequalities Ë Because of the constraint ¼ Ì each variable can take a finite number of values There is then a finite number of candidate solutions A nondeterministic algorithm for SCAN-SCHEDULING need only guess Ò values ½ Ò and check whether they satisfy the system Ë This can be done in polynomial time, as there exists a polynomial-time algorithm (Euclid s algorithm [2]) for computing the required greatest common divisors ¾ Proposition 18 SCAN-SCHEDULING is NP-hard Proof: We show this by reducing PARTITION to SCAN-SCHEDULING PARTITION is defined as follows [1]: Each instance of the problem is given by a finite set and a mapping from to Æ The question is to determine whether there exists a subset ¼ of such that ܾ ¼ ܵ ܾ ¼ ܵ 12

14 This problem is NP-complete as shown in [1] Given an instance µ of PARTITION, an instance of SCAN-SCHEDULING can be constructed as follows: Ò ½, We choose an arbitrary value for Ò, say Ò ½, and set Ì Ò Ò È Ü¾ ܵ ¾ Let Ü ½ Ü Ò ½ be the elements of ; then for ½ Ò ½, we define and Ì by The resource utilization is maximal: Ò ½ Ü µ Ì ¾Ì Ò Ì ½ and we have Ì Ì µ Ì Ò if Ò or Ò and Ì Ì µ ¾Ì Ò otherwise If ¼ is a solution of the PARTITION instance, we have ܾ ¼ ܵ ܾ ¼ ܵ We can assume without loss of generality that ¼ Ü ½ Ü Ñ for some index Ñ Ò ½, and then Ñ ½ Ü µ By definition of Ì Ò and ½ Ò ½ this gives Ñ ½ Let ½ Ò be defined as follows: ½ ¼ Ò ½ Ñ ½ ¾ ½ ½ Ò ½ Ñ ½ Ñ Ñ ½ Ñ ½ Ñ ½ Ì Ò Ñ ¾ Ñ ½ Ñ ½ Ò ½ Ò ¾ Ò ¾ Ü µ Ì Ò Ò Ò Ñ Ñ Ì Ò Ò 13

15 It is routine to check that ½ Ò µ satisfies the system of inequalities for this instance of SCAN-SCHEDULING The corresponding schedule is as follows: Tn Tn τ n τ n a a a a a a a m n m+1 n-1 Conversely, given a solution ½ Ò µ to the SCAN-SCHEDULING instance, we obtain a solution of the PARTITION instance by reversing the previous construction We consider the interval Ò Ò ¾Ì Ò µ Since it is of length Ì ¾Ì Ò, this interval must contain a dwell interval Ù Ù µ for all ½ Ò ½ It also contains two dwell intervals for band Ò, namely, the two intervals Ò Ò Ò µ and Ò Ì Ò Ò Ì Ò Ò µ We define the set ¼ as follows: ¼ Ü Ù Ò Ì Ò so that, ܾ ¼ ܵ ÙÒ ÌÒ Since the intervals Ù Ù µ for Ü ¾ ¼ do not overlap and are included in Ò Ò Ò Ì Ò µ, we have ܾ ¼ ܵ Ì Ò Ò (2) Similarly, ܾ ¼ ܵ By construction, we know that ܵ ܵ ܾ ¼ ܾ ¼ Using (2) and (3), we obtain then ܾ ¼ ܵ ÙÒ ÌÒ Ü¾ Ì Ò Ò (3) ܵ ¾ Ì Ò Ò µ ܾ ¼ ܵ Ì Ò Ò that is, ¼ is a solution of the original PARTITION instance We have then shown that the PARTITION instance µ has a solution if and only if the SCAN-SCHEDULING instance constructed from it has a solution Clearly, the construction can be done in polynomial time Since PARTITION is NP-complete, SCAN-SCHEDULING is NP-hard ¾ Propositions 17 and 18 imply that SCAN-SCHEDULING is NP-complete It is then likely that any schedule-construction algorithm has exponential time complexity in the worst case The following section describes an algorithm for constructing a feasible scan schedule and gives some experimental results on its average complexity 14

16 52 Search-Space Reduction The construction of a feasible schedule requires solving the system of inequalities Ë defined previously We are given Ò dwell times ½ Ò and Ò revisit times Ì ½ Ì Ò, and we look for Ò integers ½ Ò that satisfy the two following sets of constraints: Ë ¼ ½ ¾ µ ÑÓ ½¾ ¾ Ò Ò ½ µ ÑÓ ÒÒ ½ Ò ½ Ë ½ ¼ ½ Ì ½ ½ ¼ Ò Ì Ò Ò where Ì Ì µ Because of Ë ½ there are a priori at most Ò ½ Ì ½µ candidate solutions to examine The following results show that the solution space can often be considerably reduced Lemma 19 Let ½ Ò µ be a solution of Ë ¼ Given ¾ ½ Ò, let ¼ ½ ¼ Ò µ be defined by then ¼ ½ ¼ Ò µ is a solution of Ë ¼ µ ÑÓ Ì Proof: For every, ¼ is equal to Ù Ì, for some integer Ù We then have Since divides both Ì and Ì, this gives The tuple ¼ ½ ¼ Ò µ satisfies then Ë ¼ Let Ö and then Ö ¼ ¼ Ù Ì Ù Ì ¼ ¼ µ ÑÓ µ ÑÓ µ ÑÓ Since ½ Ò µ is a solution of Ë ¼, we have µ ÑÓ µ ÑÓ We also have Ì for some positive integer Now is equal to Õ Ö, for some Õ ¾, and Õ can be written Õ Ô 15

17 where ¼ ½ This gives Ô Ö ÔÌ Ö and, as a consequence, ¼ µ ÑÓ Ì Ö ½µ Ì This shows that ¼ ½ ¼ Ò µ satisfies Ë ½ ¾ This lemma says that if Ë has any solution then there exists a solution ¼ ½ ¼ Ò µ with ¼ ¼ Intuitively, this simply amounts to translating the scan schedule so that the first dwell interval for band starts at ¼ When searching for a solution to Ë, we can then pick an arbitrary variable and set it to ¼ We can also reduce the interval of possible values for For ¾ ½ Ò, let Ä be the least common multiple of the numbers ½ ½ ½ Ò Since Ì is a multiple of each of these numbers, Ì is also a multiple of Ä Lemma 20 Assuming ½ Ò µ is a solution of Ë, let ¼ ½ ¼ Ò µ be defined by then ¼ ½ ¼ Ò µ is a solution of Ë ¼ ÑÓ Ä Proof: Every ¼ is of the form Ù Ä for some integer Ù ¾ Then ¼ ¼ Ù Ä Ù Ä, and, since divides both Ä and Ä, ¼ ¼ µ ÑÓ µ ÑÓ Since ¼, ¼ ÑÓ Ä cannot be larger than, so we have Hence, ¼ ½ ¼ Ò µ is a solution of Ë ¾ ¼ ¼ Ì As a consequence of this lemma, it is sufficient to search for solutions ½ Ò µ of Ë ¼ where ¼ Ä It is also easy to see that the solution ¼ ½ ¼ Ò µ as defined in Lemma 20 is such that ¼ ¼ Ä for all This means that we can replace Ë ½ by the following inequalities: ¼ ½ Ä ½ ½ ¼ Ò Ä Ò Ò 16

18 Since Ä divides Ì, the upper bound on can be much smaller than Ì The size of the search space is now reduced to Ò ½ Ä ½µ It is possible to further reduce the search space using the following theorem whose proof is given in the following section Let Å ½ Å Ò be defined as follows: Every Å is then a divisor of Ä Å ½ ½ Å ¾ ½¾ Å ÐÑ ½ ¾ µ Å Ò ÐÑ ½Ò Ò ½Ò µ Theorem 21 If Ë ¼ has solutions, then Ë ¼ has a solution ½ Ò µ such that ¼ ½ Å ½ ¼ Ò Å Ò Since Å ½ ½, this solution is such that ½ ¼ and, as shown in the proof of Lemma 19, ½ Ò µ is also a solution of Ë To solve Ë, it is then sufficient to search for solutions of Ë ¼ where ½ ¼, ¾ Å ¾ Ò Å Ò Since every Å divides Ä, the search space is potentially much smaller than that given by the preceding lemma The theorem also suggests an incremental approach for constructing scan schedules We start by setting ½ to ¼ Then we look for a positive integer ¾ Å ¾ ½¾ such that or, equivalently, ½ ¾ µ ÑÓ ½¾ ¾ and ¾ ½ µ ÑÓ ½¾ ½ ¾ ½ ¾ µ ÑÓ ½¾ ½¾ ½ If such an ¾ is found, we now look for Å such that ½ µ ÑÓ ½ ½ ½ ¾ µ ÑÓ ¾ ¾ ¾ If we can find such an, we proceed incrementally with ; otherwise, we try another value for ¾ Proof of Theorem 21 Theorem 21 relies on the following variant of the Chinese Remainder Theorem Proposition 22 Let ½ and ¾ be two non-zero integers and let ½ and ¾ be two integers There exists an integer Ü such that ½ divides Ü ½ and ¾ divides Ü ¾ if and only if ½ ¾ µ divides ½ ¾ 17

19 Proof: If ½ divides Ü ½ and ¾ divides Ü ¾, then ½ ¾ µ divides both Ü ½ and Ü ¾, and, as a consequence, ½ ¾ µ divides Ü ¾ µ Ü ½ µ ½ ¾ Conversely, let us assume ½ ¾ µ divides ½ ¾ By definition, there are two integers Ù and Ú such that ½ ¾ µ Ù ½ Ú ¾ ; ½ ¾ can then be written ½ ¾ «Ù ½ «Ú ¾ where «¾ Let Ü ½ «Ù ½ ; then we have Ü ½ «Ù ½ Ü ¾ ½ ¾ «Ù ½ «Ú ¾ Hence, ½ divides Ü ½ and ¾ divides Ü ¾ ¾ The Chinese Remainder Theorem is a special case of the previous proposition where ½ and ¾ are mutually prime, that is, ½ ¾ µ ½ The following lemmas are used to generalize Proposition 22 to Ò numbers ½ Ò Lemma 23 Let Ü be an integer such that ½ divides Ü ½ and ¾ divides Ü ¾ For any integer Ý, the two following propositions are equivalent: ½ divides Ý ½ and ¾ divides Ý ¾ ÐÑ ½ ¾ µ divides Ý Ü Proof: If ½ divides Ý ½ and ¾ divides Ý ¾ then ½ divides Ý ½ µ Ü ½ µ Ý Ü and ¾ divides Ý ¾ µ Ü ¾ µ Ý Ü so Ý Ü is a common multiple of ½ and ¾, that is, ÐÑ ½ ¾ µ divides Ý Ü Conversely, if ÐÑ ½ ¾ µ divides Ý Ü then ½ divides Ý Ü and ¾ divides Ý Ü, so ½ divides Ý Üµ Ü ½ µ and ¾ divides Ý Üµ Ü ¾ µ, that is, ½ divides Ý ½ and ¾ divides Ý ¾ ¾ Lemma 24 For all non-zero integers Ü, Ý, and Þ, we have Ü ÐÑ Ý Þµµ ÐÑ Ü Ýµ Ü Þµµ Proof: Let Ô ½ Ô be the prime factors of Ü, Ý, and Þ «½ «, ½, and ½ such that There are natural numbers Ü Ô «½ ½ Ý Ô ½ ½ Þ Ô ½ ½ Ô«Ô Ô Let Æ ÑÒ «ÑÜ µµ and ÑÜ ÑÒ «µ ÑÒ «µµ; then Ü ÐÑ Ý Þµµ Ô Æ½ ½ ÐÑ Ü Ýµ Ü Þµµ Ô ½ ½ ÔÆ Ô It is easy to check that Æ so the left-hand sides of these two equations are equal ¾ The general form of Proposition 22 is the following 18

20 Proposition 25 Let ½ Ò be Ò non-zero integers and ½ Ò be Ò integers If we have µ Ú for all and such that ½ Ò, then there exists an integer Ü such that ½ Ú Ü ½ Ò Ú Ü Ò Proof: We reason by induction on Ò The proposition is trivially true if Ò ½ Now we assume the proposition true for Ò ½ Let ½ Ò ½ and ½ Ò ½ be numbers such that µ divides whenever By Proposition 22, since Ò Ò ½ µ divides Ò Ò ½, there is Ü ¼ ¾ such that Let ¼ ½ ¼ Ò and ¼ ½ ¼ Ò be defined as follows: Ò Ú Ü ¼ Ò (4) Ò ½ Ú Ü ¼ Ò ½ (5) ¼ if Ò ¼ Ò ÐÑ Ò Ò ½ µ ¼ ½ if Ò ¼ Ò Ü ¼ For two indices and such that ½ Ò, ¼ ¼ µ divides ¼ ¼ by assumption For Ò and Ò, Lemma 24 gives ¼ ¼ µ ÐÑ Ò Ò ½ µµ ÐÑ Ò µ Ò ½ µµ By assumption, Ò µ divides Ò By (4), and since Ò µ is a divisor of Ò, Ò µ also divides Ü ¼ Ò It follows that Ò µ divides Ü ¼ ¼ ¼ Ò Using (5), we get by a similar reasoning that Ò ½ µ divides ¼ ¼ Ò Hence, ¼ ¼ Ò is a common multiple of Ò µ and Ò ½ µ so ¼ ¼ Ò µ Ú ¼ ¼ Ò We can then use the induction hypothesis with ¼ ½ ¼ Ò and ¼ ½ ¼ Ò : there is an integer Ü such that ¼ ½ Ú Ü ¼ ½ ¼ Ò Ú Ü ¼ Ò 19

21 Then ¼ Ò ÐÑ Ò Ò ½ µ divides Ü Ü ¼ By Lemma 23, this implies that Ò divides Ü Ò and Ò ½ divides Ü Ò ½ We have then found an integer Ü such that ½ Ú Ü ½ Ò Ú Ü Ò Ò ½ Ú Ü Ò ½ The proposition is then satisfied for Ò ½ By induction it is true for arbitrary Ò ¾ Let Ì ½ Ì Ò be Ò positive integers and let Ì Ì µ To prove Theorem 21, we show that for any tuple of integers ½ Ò µ, there exists a tuple ¼ ½ ¼ Ò µ such that ¼ ¼ ½ Å ½ ¼ ¼ Ò Å Ò and Ú ¼ µ ¼ µ for all ¾ ½ Ò and ¾ ½ Ò The construction is incremental Given an index such that ½ Ò numbers ¼ ½ ¼ µ that satisfy ½ and ¼ ¼ ½ Å ½ ¼ ¼ Å and Ú ¼ µ ¼ µ (6) for all ¾ ½ and ¾ ½ such that ¼ ¼ ½ Å ½ and, we show that there exists an integer ¼ ½ ½ ½ Ú ¼ ½ ½ µ ¼ ½ ½ µ ½ Ú ¼ ½ ½ µ ¼ µ First, given ¾ ½ and ¾ ½ such that, we have ½ ½ µ Ì Ì ½ µ Ì Ì ½ µµ Ì Ì Ì ½ µ Ì ½ µ 20

22 By (6), this implies that ½ ½ µ divides ¼ µ ¼ µ Using Proposition 25, there is then an integer Ü such that ½ ½ Ú Ü ¼ ½ ½ µ ½ Ú Ü ¼ µ Let ¼ ½ ½ ܵ ÑÓ Å ½ We have ¼ ¼ ½ Å ½ and Å ½ divides ¼ ½ ½ Ü By definition, so we have We then obtain Å ½ ÐÑ ½ ½ ½ µ ½ ½ Ú ¼ ½ ½µ Ü ½ Ú ¼ ½ ½ µ Ü ½ ½ Ú ¼ ½ ½µ ¼ ½ ½µ ½ Ú ¼ ½ ½µ ¼ µ as required Starting with ¼ ½ ¼ and iterating this construction for ½ Ò tuple ¼ ½ ¼ Ò µ such that ½, we obtain a Ú ¼ µ ¼ µ whenever ½ Ò Given two such indices and, we get that which is equivalent to Ú ¼ ¼ µ µ ¼ ¼ µ ÑÓ µ ÑÓ Hence, if ½ Ò µ is a solution of the system Ë ¼ of inequalities, ¼ ½ ¼ Ò µ is another solution of Ë ¼ and, by construction, it satisfies This completes the proof of Theorem 21 ¼ ¼ ½ Å ½ ¼ ¼ Ò Å Ò 21

23 53 Schedule Construction Algorithm To perform some experiments, we developed a schedule construction algorithm based on Theorem 21 The algorithm is based on a depth-first search with backtracking A tuple ½ µ is a partial solution of Ë ¼ if the constraints µ ÑÓ are satisfied for all ¾ ½ and ¾ ½ The algorithm attempts to extend such a partial solution by finding a value ½ such that ½ ½ ½ µ ÑÓ ½ ½ ½ ½ ½ ½ ½ µ ÑÓ ½ ½ If such an ½ can be found, then ½ ½ µ is a partial solution of Ë ¼ The algorithm then attempts to extend it incrementally until a full solution ½ Ò µ is obtained If no such ½ can be found, the algorithm backtracks and looks for another partial solution ¼ ½ ¼ µ The algorithm terminates either when a full solution is reached or when all partial solutions have been tried and eliminated As shown by Theorem 21, the search can be limited to ½ Ò such that ¼ Å Pseudo code is given in Figure 2 that describes the recursive search procedure used by the algorithm Given a number and a partial solution ½ µ, the procedure Search(k, a) either returns a full solution that extends ½ µ or nil if no such solution can found It uses an auxiliary function Consistent(a, x) that tests whether ½ ܵ is a partial solution, that is, whether Ü satisfies the constraints ½ ܵ ÑÓ ½ ½ The search is initiated by calling Search(0,[]) Our actual implementation is based on this simple algorithm but uses a more sophisticated approach to detect early that a partial solution ½ µ cannot be extended For this purpose, we associate domains ½ Ò with the remaining variables ½ Ò Each is the set of values for that are consistent with ½ µ: Ü ¼ Ü Å and ܵ ÑÓ If is empty then ½ µ cannot be extended to a full solution In addition, we use a heuristic based on the size of the domains ½ Ò to order the search Initial experiments show that random instances of the scan-scheduling problem are very likely to violate the necessary conditions of the form Ì Ì µ For Ò randomly chosen revisit times, it is very likely that at least one of Ì Ì µ is very small To obtain random instances that do not violate these conditions, we use the following approach First we choose a base number Ì and two integers ¼ and ½ such that ¼ ½ Then we construct randomly Ò revisit times Ì that are all multiples of Ì, and all between 22

24 // The problem is stored in two global arrays // T[1],,T[n]: revisit times // t[1],,t[n]: dwell times Search(k, a): if k=n return a // a full solution has been found else found := false x := 0 while (not found and x<m[k]) if (Consistent(a, x)) b := Search(k+1, add(a, x)) found := b!= nil endif x := x + 1 endwhile if found return b else return nil endif endif Figure 2: Schedule Construction Algorithm Ì ÑÒ ¼ Ì and Ì ÑÜ ½ Ì For any two such Ì and Ì, Ì Ì µ is then a multiple of the base number Ì We then select a maximal dwell time ÑÜ no larger than ̾ and generate randomly Ò dwell times ½ Ò in the range ½ ÑÜ This ensures that Ì and then the necessary conditions are satisfied By choosing appropriate values of Ì, ¼, ½, ÑÜ, and Ò, we can control the average utilization of randomly generated instances Initial experiments show that the practical performance of the search algorithm and the likelihood of an instance being feasible are strongly related to the utilization Table 1 summarizes some of our first experiments with Ì ½¼¼, Ì ÑÒ ½¼¼¼, and Ì ÑÜ ½¼¼ Each row of the table corresponds to a different choice of ÑÜ, and then a different average utilization Í In each case, we generated 100 random instances consisting of ¼ revisit times and ¼ dwell times, and ran the algorithm on each of these instances with a timeout of 60 s (CPU time) The experiments were performed on a PC with a 550 MHz Pentium III, running Linux The last column of Table 1 shows the average search time for the instances that did not cause a timeout 6 Conclusion Determining whether a set of Ò dwell times and a set of Ò revisit times are compatible is a central issue in periodic scan scheduling We have given a mathematical characterization of schedule feasibility as a set of linear inequalities The problem can be solved algorithmically but is NP-complete We proposed an algorithm that searches for a solution in a depth-first manner and defined several simplifications that reduce the search space Initial (and par- 23

25 ÑÜ U Feasible Infeasible Timeout CPU time s s s s s s s s s s Table 1: Algorithm Performance tial) experiment showed that high sensor utilization is hard to reach for randomly generated instances Open issues include a more careful study of the achievable utilization for a given set of Ò revisit times It can be shown that a utilization of ½ can be obtained under certain conditions on the revisit times, for example, if the revisit times are harmonic One such example is used in the proof of Proposition 18 In general, studying instances of the problem with a special structure that make them easier to solve or that ensures some other desirable property remains unexplored References [1] M Garey and D Johnson Computers and Intractability: A Guide to the Theory of NP-Completeness WH Freeman and Company, 1979 [2] A Schrijver Theory of Linear and Integer Programming John Wiley & Sons,

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È.

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. Let Ò Ô Õ. Pick ¾ ½ ³ Òµ ½ so, that ³ Òµµ ½. Let ½ ÑÓ ³ Òµµ. Public key: Ò µ. Secret key Ò µ.

More information

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È.

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. Let Ò Ô Õ. Pick ¾ ½ ³ Òµ ½ so, that ³ Òµµ ½. Let ½ ÑÓ ³ Òµµ. Public key: Ò µ. Secret key Ò µ.

More information

A Modality for Recursion

A Modality for Recursion A Modality for Recursion (Technical Report) March 31, 2001 Hiroshi Nakano Ryukoku University, Japan nakano@mathryukokuacjp Abstract We propose a modal logic that enables us to handle self-referential formulae,

More information

SFU CMPT Lecture: Week 8

SFU CMPT Lecture: Week 8 SFU CMPT-307 2008-2 1 Lecture: Week 8 SFU CMPT-307 2008-2 Lecture: Week 8 Ján Maňuch E-mail: jmanuch@sfu.ca Lecture on June 24, 2008, 5.30pm-8.20pm SFU CMPT-307 2008-2 2 Lecture: Week 8 Universal hashing

More information

Discrete Mathematics Lecture 4. Harper Langston New York University

Discrete Mathematics Lecture 4. Harper Langston New York University Discrete Mathematics Lecture 4 Harper Langston New York University Sequences Sequence is a set of (usually infinite number of) ordered elements: a 1, a 2,, a n, Each individual element a k is called a

More information

CHAPTER 8. Copyright Cengage Learning. All rights reserved.

CHAPTER 8. Copyright Cengage Learning. All rights reserved. CHAPTER 8 RELATIONS Copyright Cengage Learning. All rights reserved. SECTION 8.3 Equivalence Relations Copyright Cengage Learning. All rights reserved. The Relation Induced by a Partition 3 The Relation

More information

Worst-Case Utilization Bound for EDF Scheduling on Real-Time Multiprocessor Systems

Worst-Case Utilization Bound for EDF Scheduling on Real-Time Multiprocessor Systems Worst-Case Utilization Bound for EDF Scheduling on Real-Time Multiprocessor Systems J.M. López, M. García, J.L. Díaz, D.F. García University of Oviedo Department of Computer Science Campus de Viesques,

More information

Optimal Time Bounds for Approximate Clustering

Optimal Time Bounds for Approximate Clustering Optimal Time Bounds for Approximate Clustering Ramgopal R. Mettu C. Greg Plaxton Department of Computer Science University of Texas at Austin Austin, TX 78712, U.S.A. ramgopal, plaxton@cs.utexas.edu Abstract

More information

A General Greedy Approximation Algorithm with Applications

A General Greedy Approximation Algorithm with Applications A General Greedy Approximation Algorithm with Applications Tong Zhang IBM T.J. Watson Research Center Yorktown Heights, NY 10598 tzhang@watson.ibm.com Abstract Greedy approximation algorithms have been

More information

From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols

From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols Christian Scheideler Ý Berthold Vöcking Þ Abstract We investigate how static store-and-forward routing algorithms

More information

On the Performance of Greedy Algorithms in Packet Buffering

On the Performance of Greedy Algorithms in Packet Buffering On the Performance of Greedy Algorithms in Packet Buffering Susanne Albers Ý Markus Schmidt Þ Abstract We study a basic buffer management problem that arises in network switches. Consider input ports,

More information

9.5 Equivalence Relations

9.5 Equivalence Relations 9.5 Equivalence Relations You know from your early study of fractions that each fraction has many equivalent forms. For example, 2, 2 4, 3 6, 2, 3 6, 5 30,... are all different ways to represent the same

More information

Response Time Analysis of Asynchronous Real-Time Systems

Response Time Analysis of Asynchronous Real-Time Systems Response Time Analysis of Asynchronous Real-Time Systems Guillem Bernat Real-Time Systems Research Group Department of Computer Science University of York York, YO10 5DD, UK Technical Report: YCS-2002-340

More information

Theorem 2.9: nearest addition algorithm

Theorem 2.9: nearest addition algorithm There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used

More information

Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms

Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms Roni Khardon Tufts University Medford, MA 02155 roni@eecs.tufts.edu Dan Roth University of Illinois Urbana, IL 61801 danr@cs.uiuc.edu

More information

SEQUENCES, MATHEMATICAL INDUCTION, AND RECURSION

SEQUENCES, MATHEMATICAL INDUCTION, AND RECURSION CHAPTER 5 SEQUENCES, MATHEMATICAL INDUCTION, AND RECURSION Copyright Cengage Learning. All rights reserved. SECTION 5.5 Application: Correctness of Algorithms Copyright Cengage Learning. All rights reserved.

More information

Know the Well-ordering principle: Any set of positive integers which has at least one element contains a smallest element.

Know the Well-ordering principle: Any set of positive integers which has at least one element contains a smallest element. The first exam will be on Wednesday, September 22, 2010. The syllabus will be sections 1.1 and 1.2 in Lax, and the number theory handout found on the class web site, plus the handout on the method of successive

More information

Topology Homework 3. Section Section 3.3. Samuel Otten

Topology Homework 3. Section Section 3.3. Samuel Otten Topology Homework 3 Section 3.1 - Section 3.3 Samuel Otten 3.1 (1) Proposition. The intersection of finitely many open sets is open and the union of finitely many closed sets is closed. Proof. Note that

More information

Parameterized graph separation problems

Parameterized graph separation problems Parameterized graph separation problems Dániel Marx Department of Computer Science and Information Theory, Budapest University of Technology and Economics Budapest, H-1521, Hungary, dmarx@cs.bme.hu Abstract.

More information

Math Introduction to Advanced Mathematics

Math Introduction to Advanced Mathematics Math 215 - Introduction to Advanced Mathematics Number Theory Fall 2017 The following introductory guide to number theory is borrowed from Drew Shulman and is used in a couple of other Math 215 classes.

More information

Probabilistic analysis of algorithms: What s it good for?

Probabilistic analysis of algorithms: What s it good for? Probabilistic analysis of algorithms: What s it good for? Conrado Martínez Univ. Politècnica de Catalunya, Spain February 2008 The goal Given some algorithm taking inputs from some set Á, we would like

More information

Lecture Notes on GRAPH THEORY Tero Harju

Lecture Notes on GRAPH THEORY Tero Harju Lecture Notes on GRAPH THEORY Tero Harju Department of Mathematics University of Turku FIN-20014 Turku, Finland e-mail: harju@utu.fi 2007 Contents 1 Introduction 2 1.1 Graphs and their plane figures.........................................

More information

The Online Median Problem

The Online Median Problem The Online Median Problem Ramgopal R. Mettu C. Greg Plaxton November 1999 Abstract We introduce a natural variant of the (metric uncapacitated) -median problem that we call the online median problem. Whereas

More information

Structure and Complexity in Planning with Unary Operators

Structure and Complexity in Planning with Unary Operators Structure and Complexity in Planning with Unary Operators Carmel Domshlak and Ronen I Brafman ½ Abstract In this paper we study the complexity of STRIPS planning when operators have a single effect In

More information

Math 302 Introduction to Proofs via Number Theory. Robert Jewett (with small modifications by B. Ćurgus)

Math 302 Introduction to Proofs via Number Theory. Robert Jewett (with small modifications by B. Ćurgus) Math 30 Introduction to Proofs via Number Theory Robert Jewett (with small modifications by B. Ćurgus) March 30, 009 Contents 1 The Integers 3 1.1 Axioms of Z...................................... 3 1.

More information

Computing optimal linear layouts of trees in linear time

Computing optimal linear layouts of trees in linear time Computing optimal linear layouts of trees in linear time Konstantin Skodinis University of Passau, 94030 Passau, Germany, e-mail: skodinis@fmi.uni-passau.de Abstract. We present a linear time algorithm

More information

End-to-end bandwidth guarantees through fair local spectrum share in wireless ad-hoc networks

End-to-end bandwidth guarantees through fair local spectrum share in wireless ad-hoc networks End-to-end bandwidth guarantees through fair local spectrum share in wireless ad-hoc networks Saswati Sarkar and Leandros Tassiulas 1 Abstract Sharing the locally common spectrum among the links of the

More information

From Tableaux to Automata for Description Logics

From Tableaux to Automata for Description Logics Fundamenta Informaticae XX (2003) 1 33 1 IOS Press From Tableaux to Automata for Description Logics Franz Baader, Jan Hladik, and Carsten Lutz Theoretical Computer Science, TU Dresden, D-01062 Dresden,

More information

A CSP Search Algorithm with Reduced Branching Factor

A CSP Search Algorithm with Reduced Branching Factor A CSP Search Algorithm with Reduced Branching Factor Igor Razgon and Amnon Meisels Department of Computer Science, Ben-Gurion University of the Negev, Beer-Sheva, 84-105, Israel {irazgon,am}@cs.bgu.ac.il

More information

Tolls for heterogeneous selfish users in multicommodity networks and generalized congestion games

Tolls for heterogeneous selfish users in multicommodity networks and generalized congestion games Tolls for heterogeneous selfish users in multicommodity networks and generalized congestion games Lisa Fleischer Kamal Jain Mohammad Mahdian Abstract We prove the existence of tolls to induce multicommodity,

More information

ELEMENTARY NUMBER THEORY AND METHODS OF PROOF

ELEMENTARY NUMBER THEORY AND METHODS OF PROOF CHAPTER 4 ELEMENTARY NUMBER THEORY AND METHODS OF PROOF Copyright Cengage Learning. All rights reserved. SECTION 4.8 Application: Algorithms Copyright Cengage Learning. All rights reserved. Application:

More information

SEQUENCES, MATHEMATICAL INDUCTION, AND RECURSION

SEQUENCES, MATHEMATICAL INDUCTION, AND RECURSION CHAPTER 5 SEQUENCES, MATHEMATICAL INDUCTION, AND RECURSION Alessandro Artale UniBZ - http://www.inf.unibz.it/ artale/ SECTION 5.5 Application: Correctness of Algorithms Copyright Cengage Learning. All

More information

In this lecture, we ll look at applications of duality to three problems:

In this lecture, we ll look at applications of duality to three problems: Lecture 7 Duality Applications (Part II) In this lecture, we ll look at applications of duality to three problems: 1. Finding maximum spanning trees (MST). We know that Kruskal s algorithm finds this,

More information

Designing Networks Incrementally

Designing Networks Incrementally Designing Networks Incrementally Adam Meyerson Kamesh Munagala Ý Serge Plotkin Þ Abstract We consider the problem of incrementally designing a network to route demand to a single sink on an underlying

More information

Learning to Align Sequences: A Maximum-Margin Approach

Learning to Align Sequences: A Maximum-Margin Approach Learning to Align Sequences: A Maximum-Margin Approach Thorsten Joachims Department of Computer Science Cornell University Ithaca, NY 14853 tj@cs.cornell.edu August 28, 2003 Abstract We propose a discriminative

More information

On Covering a Graph Optimally with Induced Subgraphs

On Covering a Graph Optimally with Induced Subgraphs On Covering a Graph Optimally with Induced Subgraphs Shripad Thite April 1, 006 Abstract We consider the problem of covering a graph with a given number of induced subgraphs so that the maximum number

More information

1 Elementary number theory

1 Elementary number theory Math 215 - Introduction to Advanced Mathematics Spring 2019 1 Elementary number theory We assume the existence of the natural numbers and the integers N = {1, 2, 3,...} Z = {..., 3, 2, 1, 0, 1, 2, 3,...},

More information

6. Lecture notes on matroid intersection

6. Lecture notes on matroid intersection Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans May 2, 2017 6. Lecture notes on matroid intersection One nice feature about matroids is that a simple greedy algorithm

More information

MAT 243 Test 2 SOLUTIONS, FORM A

MAT 243 Test 2 SOLUTIONS, FORM A MAT 243 Test 2 SOLUTIONS, FORM A 1. [15 points] Calculate the following quantities: a. 17 mod 4 Solution: 17 17 4 = 17 4 4 = 1. 4 b. 17 div 4 17 Solution: = 4. 4 c. (( 1) mod 12) mod (27 div 5) Solution:

More information

Summary of Course Coverage

Summary of Course Coverage CS-227, Discrete Structures I Spring 2006 Semester Summary of Course Coverage 1) Propositional Calculus a) Negation (logical NOT) b) Conjunction (logical AND) c) Disjunction (logical inclusive-or) d) Inequalities

More information

[Ch 6] Set Theory. 1. Basic Concepts and Definitions. 400 lecture note #4. 1) Basics

[Ch 6] Set Theory. 1. Basic Concepts and Definitions. 400 lecture note #4. 1) Basics 400 lecture note #4 [Ch 6] Set Theory 1. Basic Concepts and Definitions 1) Basics Element: ; A is a set consisting of elements x which is in a/another set S such that P(x) is true. Empty set: notated {

More information

Lecture notes on the simplex method September We will present an algorithm to solve linear programs of the form. maximize.

Lecture notes on the simplex method September We will present an algorithm to solve linear programs of the form. maximize. Cornell University, Fall 2017 CS 6820: Algorithms Lecture notes on the simplex method September 2017 1 The Simplex Method We will present an algorithm to solve linear programs of the form maximize subject

More information

Complexity Results on Graphs with Few Cliques

Complexity Results on Graphs with Few Cliques Discrete Mathematics and Theoretical Computer Science DMTCS vol. 9, 2007, 127 136 Complexity Results on Graphs with Few Cliques Bill Rosgen 1 and Lorna Stewart 2 1 Institute for Quantum Computing and School

More information

Unifying and extending hybrid tractable classes of CSPs

Unifying and extending hybrid tractable classes of CSPs Journal of Experimental & Theoretical Artificial Intelligence Vol. 00, No. 00, Month-Month 200x, 1 16 Unifying and extending hybrid tractable classes of CSPs Wady Naanaa Faculty of sciences, University

More information

A more efficient algorithm for perfect sorting by reversals

A more efficient algorithm for perfect sorting by reversals A more efficient algorithm for perfect sorting by reversals Sèverine Bérard 1,2, Cedric Chauve 3,4, and Christophe Paul 5 1 Département de Mathématiques et d Informatique Appliquée, INRA, Toulouse, France.

More information

Module 7. Independent sets, coverings. and matchings. Contents

Module 7. Independent sets, coverings. and matchings. Contents Module 7 Independent sets, coverings Contents and matchings 7.1 Introduction.......................... 152 7.2 Independent sets and coverings: basic equations..... 152 7.3 Matchings in bipartite graphs................

More information

Graphs (MTAT , 4 AP / 6 ECTS) Lectures: Fri 12-14, hall 405 Exercises: Mon 14-16, hall 315 või N 12-14, aud. 405

Graphs (MTAT , 4 AP / 6 ECTS) Lectures: Fri 12-14, hall 405 Exercises: Mon 14-16, hall 315 või N 12-14, aud. 405 Graphs (MTAT.05.080, 4 AP / 6 ECTS) Lectures: Fri 12-14, hall 405 Exercises: Mon 14-16, hall 315 või N 12-14, aud. 405 homepage: http://www.ut.ee/~peeter_l/teaching/graafid08s (contains slides) For grade:

More information

Math 5593 Linear Programming Lecture Notes

Math 5593 Linear Programming Lecture Notes Math 5593 Linear Programming Lecture Notes Unit II: Theory & Foundations (Convex Analysis) University of Colorado Denver, Fall 2013 Topics 1 Convex Sets 1 1.1 Basic Properties (Luenberger-Ye Appendix B.1).........................

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

On the Max Coloring Problem

On the Max Coloring Problem On the Max Coloring Problem Leah Epstein Asaf Levin May 22, 2010 Abstract We consider max coloring on hereditary graph classes. The problem is defined as follows. Given a graph G = (V, E) and positive

More information

Lecture 5: Graphs. Rajat Mittal. IIT Kanpur

Lecture 5: Graphs. Rajat Mittal. IIT Kanpur Lecture : Graphs Rajat Mittal IIT Kanpur Combinatorial graphs provide a natural way to model connections between different objects. They are very useful in depicting communication networks, social networks

More information

Integers and Mathematical Induction

Integers and Mathematical Induction IT Program, NTUT, Fall 07 Integers and Mathematical Induction Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology TAIWAN 1 Learning Objectives Learn about

More information

31.6 Powers of an element

31.6 Powers of an element 31.6 Powers of an element Just as we often consider the multiples of a given element, modulo, we consider the sequence of powers of, modulo, where :,,,,. modulo Indexing from 0, the 0th value in this sequence

More information

NP-Hardness. We start by defining types of problem, and then move on to defining the polynomial-time reductions.

NP-Hardness. We start by defining types of problem, and then move on to defining the polynomial-time reductions. CS 787: Advanced Algorithms NP-Hardness Instructor: Dieter van Melkebeek We review the concept of polynomial-time reductions, define various classes of problems including NP-complete, and show that 3-SAT

More information

Faster parameterized algorithms for Minimum Fill-In

Faster parameterized algorithms for Minimum Fill-In Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Technical Report UU-CS-2008-042 December 2008 Department of Information and Computing Sciences Utrecht

More information

Faster parameterized algorithms for Minimum Fill-In

Faster parameterized algorithms for Minimum Fill-In Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Abstract We present two parameterized algorithms for the Minimum Fill-In problem, also known as Chordal

More information

Online Facility Location

Online Facility Location Online Facility Location Adam Meyerson Abstract We consider the online variant of facility location, in which demand points arrive one at a time and we must maintain a set of facilities to service these

More information

CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 14: Combinatorial Problems as Linear Programs I. Instructor: Shaddin Dughmi

CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 14: Combinatorial Problems as Linear Programs I. Instructor: Shaddin Dughmi CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 14: Combinatorial Problems as Linear Programs I Instructor: Shaddin Dughmi Announcements Posted solutions to HW1 Today: Combinatorial problems

More information

Exact Algorithms Lecture 7: FPT Hardness and the ETH

Exact Algorithms Lecture 7: FPT Hardness and the ETH Exact Algorithms Lecture 7: FPT Hardness and the ETH February 12, 2016 Lecturer: Michael Lampis 1 Reminder: FPT algorithms Definition 1. A parameterized problem is a function from (χ, k) {0, 1} N to {0,

More information

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition. 18.433 Combinatorial Optimization Matching Algorithms September 9,14,16 Lecturer: Santosh Vempala Given a graph G = (V, E), a matching M is a set of edges with the property that no two of the edges have

More information

Number Theory and Graph Theory

Number Theory and Graph Theory 1 Number Theory and Graph Theory Chapter 6 Basic concepts and definitions of graph theory By A. Satyanarayana Reddy Department of Mathematics Shiv Nadar University Uttar Pradesh, India E-mail: satya8118@gmail.com

More information

Mathematical and Algorithmic Foundations Linear Programming and Matchings

Mathematical and Algorithmic Foundations Linear Programming and Matchings Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis

More information

Online Scheduling for Sorting Buffers

Online Scheduling for Sorting Buffers Online Scheduling for Sorting Buffers Harald Räcke ½, Christian Sohler ½, and Matthias Westermann ¾ ½ Heinz Nixdorf Institute and Department of Mathematics and Computer Science Paderborn University, D-33102

More information

Lecture 11: Maximum flow and minimum cut

Lecture 11: Maximum flow and minimum cut Optimisation Part IB - Easter 2018 Lecture 11: Maximum flow and minimum cut Lecturer: Quentin Berthet 4.4. The maximum flow problem. We consider in this lecture a particular kind of flow problem, with

More information

ELEMENTARY NUMBER THEORY AND METHODS OF PROOF

ELEMENTARY NUMBER THEORY AND METHODS OF PROOF CHAPTER 4 ELEMENTARY NUMBER THEORY AND METHODS OF PROOF Copyright Cengage Learning. All rights reserved. SECTION 4.3 Direct Proof and Counterexample III: Divisibility Copyright Cengage Learning. All rights

More information

Chordal deletion is fixed-parameter tractable

Chordal deletion is fixed-parameter tractable Chordal deletion is fixed-parameter tractable Dániel Marx Institut für Informatik, Humboldt-Universität zu Berlin, Unter den Linden 6, 10099 Berlin, Germany. dmarx@informatik.hu-berlin.de Abstract. It

More information

arxiv: v1 [math.co] 15 Dec 2009

arxiv: v1 [math.co] 15 Dec 2009 ANOTHER PROOF OF THE FACT THAT POLYHEDRAL CONES ARE FINITELY GENERATED arxiv:092.2927v [math.co] 5 Dec 2009 VOLKER KAIBEL Abstract. In this note, we work out a simple inductive proof showing that every

More information

Framework for Design of Dynamic Programming Algorithms

Framework for Design of Dynamic Programming Algorithms CSE 441T/541T Advanced Algorithms September 22, 2010 Framework for Design of Dynamic Programming Algorithms Dynamic programming algorithms for combinatorial optimization generalize the strategy we studied

More information

Fundamental Properties of Graphs

Fundamental Properties of Graphs Chapter three In many real-life situations we need to know how robust a graph that represents a certain network is, how edges or vertices can be removed without completely destroying the overall connectivity,

More information

Applied Algorithm Design Lecture 3

Applied Algorithm Design Lecture 3 Applied Algorithm Design Lecture 3 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 3 1 / 75 PART I : GREEDY ALGORITHMS Pietro Michiardi (Eurecom) Applied Algorithm

More information

Domination, Independence and Other Numbers Associated With the Intersection Graph of a Set of Half-planes

Domination, Independence and Other Numbers Associated With the Intersection Graph of a Set of Half-planes Domination, Independence and Other Numbers Associated With the Intersection Graph of a Set of Half-planes Leonor Aquino-Ruivivar Mathematics Department, De La Salle University Leonorruivivar@dlsueduph

More information

Matching Theory. Figure 1: Is this graph bipartite?

Matching Theory. Figure 1: Is this graph bipartite? Matching Theory 1 Introduction A matching M of a graph is a subset of E such that no two edges in M share a vertex; edges which have this property are called independent edges. A matching M is said to

More information

Star Decompositions of the Complete Split Graph

Star Decompositions of the Complete Split Graph University of Dayton ecommons Honors Theses University Honors Program 4-016 Star Decompositions of the Complete Split Graph Adam C. Volk Follow this and additional works at: https://ecommons.udayton.edu/uhp_theses

More information

ELEMENTARY NUMBER THEORY AND METHODS OF PROOF

ELEMENTARY NUMBER THEORY AND METHODS OF PROOF CHAPTER 4 ELEMENTARY NUMBER THEORY AND METHODS OF PROOF Copyright Cengage Learning. All rights reserved. SECTION 4.3 Direct Proof and Counterexample III: Divisibility Copyright Cengage Learning. All rights

More information

Disjoint directed cycles

Disjoint directed cycles Disjoint directed cycles Noga Alon Abstract It is shown that there exists a positive ɛ so that for any integer k, every directed graph with minimum outdegree at least k contains at least ɛk vertex disjoint

More information

On-line multiplication in real and complex base

On-line multiplication in real and complex base On-line multiplication in real complex base Christiane Frougny LIAFA, CNRS UMR 7089 2 place Jussieu, 75251 Paris Cedex 05, France Université Paris 8 Christiane.Frougny@liafa.jussieu.fr Athasit Surarerks

More information

Competitive Analysis of On-line Algorithms for On-demand Data Broadcast Scheduling

Competitive Analysis of On-line Algorithms for On-demand Data Broadcast Scheduling Competitive Analysis of On-line Algorithms for On-demand Data Broadcast Scheduling Weizhen Mao Department of Computer Science The College of William and Mary Williamsburg, VA 23187-8795 USA wm@cs.wm.edu

More information

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings On the Relationships between Zero Forcing Numbers and Certain Graph Coverings Fatemeh Alinaghipour Taklimi, Shaun Fallat 1,, Karen Meagher 2 Department of Mathematics and Statistics, University of Regina,

More information

Number System. Introduction. Natural Numbers (N) Whole Numbers (W) Integers (Z) Prime Numbers (P) Face Value. Place Value

Number System. Introduction. Natural Numbers (N) Whole Numbers (W) Integers (Z) Prime Numbers (P) Face Value. Place Value 1 Number System Introduction In this chapter, we will study about the number system and number line. We will also learn about the four fundamental operations on whole numbers and their properties. Natural

More information

Preemptive Scheduling of Equal-Length Jobs in Polynomial Time

Preemptive Scheduling of Equal-Length Jobs in Polynomial Time Preemptive Scheduling of Equal-Length Jobs in Polynomial Time George B. Mertzios and Walter Unger Abstract. We study the preemptive scheduling problem of a set of n jobs with release times and equal processing

More information

Correlation Clustering

Correlation Clustering Correlation Clustering Nikhil Bansal Avrim Blum Shuchi Chawla Abstract We consider the following clustering problem: we have a complete graph on Ò vertices (items), where each edge Ù Úµ is labeled either

More information

Winning Positions in Simplicial Nim

Winning Positions in Simplicial Nim Winning Positions in Simplicial Nim David Horrocks Department of Mathematics and Statistics University of Prince Edward Island Charlottetown, Prince Edward Island, Canada, C1A 4P3 dhorrocks@upei.ca Submitted:

More information

Dynamic Programming Algorithms

Dynamic Programming Algorithms Based on the notes for the U of Toronto course CSC 364 Dynamic Programming Algorithms The setting is as follows. We wish to find a solution to a given problem which optimizes some quantity Q of interest;

More information

Treewidth and graph minors

Treewidth and graph minors Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under

More information

Greedy Algorithms 1 {K(S) K(S) C} For large values of d, brute force search is not feasible because there are 2 d {1,..., d}.

Greedy Algorithms 1 {K(S) K(S) C} For large values of d, brute force search is not feasible because there are 2 d {1,..., d}. Greedy Algorithms 1 Simple Knapsack Problem Greedy Algorithms form an important class of algorithmic techniques. We illustrate the idea by applying it to a simplified version of the Knapsack Problem. Informally,

More information

5.4 Pure Minimal Cost Flow

5.4 Pure Minimal Cost Flow Pure Minimal Cost Flow Problem. Pure Minimal Cost Flow Networks are especially convenient for modeling because of their simple nonmathematical structure that can be easily portrayed with a graph. This

More information

SCHOOL OF ENGINEERING & BUILT ENVIRONMENT. Mathematics. Numbers & Number Systems

SCHOOL OF ENGINEERING & BUILT ENVIRONMENT. Mathematics. Numbers & Number Systems SCHOOL OF ENGINEERING & BUILT ENVIRONMENT Mathematics Numbers & Number Systems Introduction Numbers and Their Properties Multiples and Factors The Division Algorithm Prime and Composite Numbers Prime Factors

More information

Module 11. Directed Graphs. Contents

Module 11. Directed Graphs. Contents Module 11 Directed Graphs Contents 11.1 Basic concepts......................... 256 Underlying graph of a digraph................ 257 Out-degrees and in-degrees.................. 258 Isomorphism..........................

More information

Approximation by NURBS curves with free knots

Approximation by NURBS curves with free knots Approximation by NURBS curves with free knots M Randrianarivony G Brunnett Technical University of Chemnitz, Faculty of Computer Science Computer Graphics and Visualization Straße der Nationen 6, 97 Chemnitz,

More information

Topology 550A Homework 3, Week 3 (Corrections: February 22, 2012)

Topology 550A Homework 3, Week 3 (Corrections: February 22, 2012) Topology 550A Homework 3, Week 3 (Corrections: February 22, 2012) Michael Tagare De Guzman January 31, 2012 4A. The Sorgenfrey Line The following material concerns the Sorgenfrey line, E, introduced in

More information

Solution for Homework set 3

Solution for Homework set 3 TTIC 300 and CMSC 37000 Algorithms Winter 07 Solution for Homework set 3 Question (0 points) We are given a directed graph G = (V, E), with two special vertices s and t, and non-negative integral capacities

More information

Graphs: Introduction. Ali Shokoufandeh, Department of Computer Science, Drexel University

Graphs: Introduction. Ali Shokoufandeh, Department of Computer Science, Drexel University Graphs: Introduction Ali Shokoufandeh, Department of Computer Science, Drexel University Overview of this talk Introduction: Notations and Definitions Graphs and Modeling Algorithmic Graph Theory and Combinatorial

More information

Disjoint, Partition and Intersection Constraints for Set and Multiset Variables

Disjoint, Partition and Intersection Constraints for Set and Multiset Variables Disjoint, Partition and Intersection Constraints for Set and Multiset Variables Christian Bessiere ½, Emmanuel Hebrard ¾, Brahim Hnich ¾, and Toby Walsh ¾ ¾ ½ LIRMM, Montpelier, France. Ö Ð ÖÑÑ Ö Cork

More information

SANDRA SPIROFF AND CAMERON WICKHAM

SANDRA SPIROFF AND CAMERON WICKHAM A ZERO DIVISOR GRAPH DETERMINED BY EQUIVALENCE CLASSES OF ZERO DIVISORS arxiv:0801.0086v2 [math.ac] 17 Aug 2009 SANDRA SPIROFF AND CAMERON WICKHAM Abstract. We study the zero divisor graph determined by

More information

Calculation of extended gcd by normalization

Calculation of extended gcd by normalization SCIREA Journal of Mathematics http://www.scirea.org/journal/mathematics August 2, 2018 Volume 3, Issue 3, June 2018 Calculation of extended gcd by normalization WOLF Marc, WOLF François, LE COZ Corentin

More information

On 2-Subcolourings of Chordal Graphs

On 2-Subcolourings of Chordal Graphs On 2-Subcolourings of Chordal Graphs Juraj Stacho School of Computing Science, Simon Fraser University 8888 University Drive, Burnaby, B.C., Canada V5A 1S6 jstacho@cs.sfu.ca Abstract. A 2-subcolouring

More information

ECE608 - Chapter 16 answers

ECE608 - Chapter 16 answers ¼ À ÈÌ Ê ½ ÈÊÇ Ä ÅË ½µ ½ º½¹ ¾µ ½ º½¹ µ ½ º¾¹½ µ ½ º¾¹¾ µ ½ º¾¹ µ ½ º ¹ µ ½ º ¹ µ ½ ¹½ ½ ECE68 - Chapter 6 answers () CLR 6.-4 Let S be the set of n activities. The obvious solution of using Greedy-Activity-

More information

A New Algorithm for the Reconstruction of Near-Perfect Binary Phylogenetic Trees

A New Algorithm for the Reconstruction of Near-Perfect Binary Phylogenetic Trees A New Algorithm for the Reconstruction of Near-Perfect Binary Phylogenetic Trees Kedar Dhamdhere ½ ¾, Srinath Sridhar ½ ¾, Guy E. Blelloch ¾, Eran Halperin R. Ravi and Russell Schwartz March 17, 2005 CMU-CS-05-119

More information

On the packing chromatic number of some lattices

On the packing chromatic number of some lattices On the packing chromatic number of some lattices Arthur S. Finbow Department of Mathematics and Computing Science Saint Mary s University Halifax, Canada BH C art.finbow@stmarys.ca Douglas F. Rall Department

More information