Brief Announcement: Distributed 3/2-Approximation of the Diameter
|
|
- Kristian Cobb
- 5 years ago
- Views:
Transcription
1 Brief Announcement: Ditributed /2-Approximation of the Diameter Preliminary verion of a brief announcement to appear at DISC 14 Stephan Holzer MIT holzer@mit.edu David Peleg Weizmann Intitute david.peleg@weizmann.ac.il Roger Wattenhofer ETH Zurich wattenhofer@ethz.ch Liam Roditty Bar-Ilan Univerity liamr@mac.biu.ac.il Contact: Stephan Holzer, , Abtract We preent an algorithm that compute a /2-approximation of the diameter of a graph. Thi algorithm take time O( n log n + D) in the CONGEST model, where in each ynchronou round, every node can tranmit a different (but hort) meage to each of it neighbor. Due to a lower bound tated for graph of mall diameter in [2] thi algorithm i optimal. We extend thi algorithm to compute a (/2 + ε)-approximation of the diameter in time O( n Dε log n + D). 1 Introduction The diameter i one of the mot fundamental propertie of a graph. Thi i true epecially in ditributed computing, where it i ued to define which problem are local (a their runtime i independent of the diameter) and problem that are global (a their runtime i lower bounded by the diameter). Independently of each other the author of [] and [7] preented algorithm that compute the diameter in time O(n). Thi runtime matche a lower bound of [2] tated for network of mall diameter. Beide thi algorithm, the author of [] and [7] alo tate algorithm to approximate the diameter. E.g. [] provide a /2-approximation in time O(n /4 + D) that wa later improved by [5] to O( n log n+d). Thi matche a lower bound of Ω( n+d) derived in [2] for any (/2 ε)-approximation in mall diameter network (and contant ε). However, when the (/2 ε)-approximation lower bound of [2] i analyzed in more detail and generalized to network of arbitrary diameter (and arbitrary ε) it turn into a Ω( (n/d)ε + D) lower bound. In thi brief announcement we preent an algorithm to /2-approximate the diameter in time O( n log n + D) that we obtain by combining reult of [, 7] with idea from [8]. Thi olution i a factor log n fater than the one achieved in [5] and ue a different approach. Our different approach i of interet a we how how to extend it to compute a (/2 + ε)-approximation to the diameter in time O( n/(dε) log n + D). Thu we eentially match the Ω( (n/d)ε + D) lower bound (when the approximation factor i allowed to differ by a mall value). Part of thi work ha been done at ETH Zurich. At MIT the author wa upported by the following grant: AFOSR Contract Number FA , NSF Award CCF, NSF Award CCF , NSF Award number CCF-AF Supported in part by grant from the Irael Science Foundation, the United-State - Irael Binational Science Foundation and the Irael Minitry of Science. Work upported by the Irael Science Foundation (grant no. 822/10) 1
2 2 Model and Baic Definition Model: The CONGEST model [6] i a meage paing model with limited bandwidth. In thi model a network i repreented by an undirected unweighted graph G = (V, E) where node V correpond to proceor (computer or router). Two node are connected by an edge from et E if they can communicate directly with each other. Each node in V ha a unique identifier (ID) in the range of {1,..., 2 O(log V ) }. Node initially know the ID of node in their immediate neighborhood. Communication over edge in E i ynchronou. Every node can end B = O(log V ) bit of information over all it edge in one round of communication. A node can end different meage of ize B to each of it neighbor and receive different meage from each of it neighbor in every round. We are intereted in time complexity, i.e., the number of communication round required by a ditributed algorithm to olve a problem. Subequently, internal computation are neglected. We denote the number V of node of a graph by n, and the number E of it edge by m. For implicity, for u V, we ometime ue u alo to refer to u ID, when thi i clear from the context. Let u denote by d(u, v) the (hop-)ditance of node u and v in G, which i the length of a hortet u-v path in G. A k-dominating et for a graph G i a ubet DOM of vertice with the property that for every v V there i ome u DOM at ditance of at mot k to v. Definition 1 (Eccentricity, diameter). The eccentricity of a node u V i ecc(u) := max v V d(u, v), namely, the maximum ditance to any other node in the graph. The diameter D := max u V ecc(u) = max u,v V d(u, v) of a graph G i the maximum ditance between any two node of the graph. Definition 2 (Approximation). Given an optimization problem P, denote by OP T the value of the optimal olution for P and by ol A the value of the olution of an algorithm A for P. Let ρ 1. We ay A compute a ρ-approximation (multiplicative approximation) for P if OP T ol A ρ OP T for any input. Definition (APSP, S-SP). Let G = (V, E) be a graph. The all pair hortet path (APSP) problem i to compute the hortet path between any pair of vertice in V V. In the S-Shortet Path (S-SP) problem, we are given a et S V and need to compute the hortet path between any pair of vertice in S V. A /2-Approximation to the Diameter We decribe an O( n log n + D)-time algorithm that compute a /2-approximation to the diameter. Thi algorithm i baed on a equential algorithm that wa recently preented in [8] which in turn extend an algorithm of Aingworth et al. [1]. Let C k (w) denote the et of k cloet vertice to w viited by a (partial) BFS tarting in w that top after viiting k node (tie are broken arbitrarily, e.g. by lexicographical order in the tree topology). Thi et C k (w) i computed only for a ingle vertex w (e.g. with mallet ID). Algorithm 1 preented below i a ditributed verion of the non-ditributed algorithm of [8]. The author of [8] provide more intuition behind Algorithm 1 and a proof of correctne. Theorem 1. Algorithm 1 compute a /2-approximation of the diameter w.h.p. in O( n log n+ D) time. Proof. In [8], Theorem 1, it i tated that Algorithm 1 of [8] compute the deired approximation. Our Algorithm 1 i Algorithm 1 of [8] adapted to the ditributed etting. We analyze the runtime of our algorithm: The firt tep can be done locally by every node and w.h.p. create a et S of ize Θ((n/) log n). In tep two, we compute S-SP in time O( S + D) = O((n/) log n + D) by uing the S-SP algorithm from Section 6.1. in []. The reult of thi can be ued by each 2
3 Algorithm 1 Ditributed verion of [8] a executed by each node v G. Output: /2-approximation to the diameter of G 1: each node v join et S with probability log n ; 2: compute a BFS from each node in S; : for every v V, compute p S (v) := the cloet node in S to v; 4: w := arg max v V d(v, p S (v)); 5: compute a BFS tree from w a well a C (w); 6: for every v C (w), compute a BFS tree from v; 7: return the maximum depth of any BFS tree that wa computed; node internally to olve tep without communication. The node w in Line 4 can be found by max-aggregation in time O(D). Computing BFS w and C (w) in Line 5 can be done in O(D) a well. To compute C (w) node w eentially aggregate information on how many node are in each level of the BFS w a e.g. done in Algorithm Diam DOM in [4]. From thi information w compute an i uch that N i (w) < N i+1 (w). Next each node at level i tell it parent how many node at level i + 1 are in it ubtree. Accordingly the node in level i 1 proceed in the ame way and o on. Baed on thi information, exactly N i (w) node can be elected in level i + 1 in time O(D). The next line can be realized by computing C (w)-sp in time O( + D). The return value can be found by a max-aggregation in time O(D). Thu the total time complexity i O( + (n/) log n + D). By chooing := n log n we obtain the deired runtime of O( n log n + D). 4 A (/2 + ε)-approximation to the Diameter Theorem 2. ( For any 0 < ε ) 1/, a (/2 + ε)-approximation of the diameter can be computed w.h.p. in O n D ε 1 log n + D time. To how thi reult, we extend and modify Algorithm 1 lightly by uing idea of the algorithm to (1 + ε)-approximate the diameter preented in [], Section 6.2. Firt we compute a 2-approximation D of D by executing a BFS from the node with mallet ID. Next we et ε /2 ε ε ε := and compute a 8 D -dominating et DOM of ize at mot 8n/(ε D ) in Line. To compute thi dominating et we can ue Algorithm Diam DOM preented in [4]. Now we execute Algorithm 1 retricted to the node in DOM in the ene that other node only implicitly participate (mainly by forwarding meage) a decribed below. In more detail, we firt compute a et S DOM by aking each node in DOM to join S with probability log n, where i choen ( ) later. Therefore S i of ize Θ DOM log n = Θ( n log n ε D ) w.h.p.. Next, for each v S, we compute BF S(v) in graph G. Baed on thi information each node v DOM can compute p S (v), a cloet node in S to v. By a max-aggregation convergecat tarted in the node with mallet ID, we can identify a node w DOM of larget ditance to S, that i a node w DOM uch that d(w, p S (w)) d(u, p S (u)) for all node u DOM. Next we compute a et C DOM (w), which i defined to be a et that conit of cloet node in DOM to w. Thi computation i done in a imilar way to the (partial) BFS in previou ection. Then we perform a BF S(u) for each u C DOM (w). The algorithm return 2(1+ε ) time the maximal depth of any BFS that wa computed during the execution. The proof of Theorem 2 can be found in the appendix and will be included in a full verion of thi brief announcement.
4 Reference [1] D. Aingworth, C. Chekuri, P. Indyk, and R. Motwani. Fat etimation of diameter and hortet path (without matrix multiplication). SIAM Journal on Computing, 28(4): , [2] S. Frichknecht, S. Holzer, and R. Wattenhofer. Network Cannot Compute Their Diameter in Sublinear Time. In Y. Rabani, editor, Proceeding of the 2rd annual ACM-SIAM Sympoium on Dicrete Algorithm, SODA 2012, Kyoto, Japan, January 17-19, 2012, page , [] S. Holzer and R. Wattenhofer. Optimal ditributed all pair hortet path and application. In D. Kowalki and A. Panconei, editor, Proceeding of the 1t annual ACM SIGACT-SIGOPS Sympoium on Principle of Ditributed Computing, PODC 2012, Funchal, Madeira, Portugal, July 16-18, 2012, page 55 64, [4] S. Kutten and D. Peleg. Fat ditributed contruction of mall k-dominating et and application. Journal of Algorithm, 28(1):40 66, [5] C. Lenzen and D. Peleg. Efficient ditributed ource detection with limited bandwidth. In P. Fatourou and G. Taubenfeld, editor, Proceeding of the 2nd annual ACM SIGACT- SIGOPS Sympoium on Principle of Ditributed Computing, PODC 201, Montreal, Quebec, Canada, July 22-24, 201, page 75 82, 201. [6] D. Peleg. Ditributed computing: a locality-enitive approach. Society for Indutrial and Applied Mathematic, Philadelphia, Pennylvania, USA, [7] D. Peleg, L. Roditty, and E. Tal. Ditributed algorithm for network diameter and girth. In A. Czumaj, K. Mehlhorn, A. M. Pitt, and R. Wattenhofer, editor, Automata, Language, and Programming - 9th International Colloquium, ICALP 2012, Warwick, UK, July 9-1, 2012, Proceeding, Part II, volume 792 of Lecture Note in Computer Science, page Springer, Berlin & Heidelberg, Germany, [8] L. Roditty and V. V. William. Fat approximation algorithm for the diameter and radiu of pare graph. In D. Boneh, T. Roughgarden, and J. Feigenbaum, editor, Proceeding of the 45th annual ACM Sympoium on Theory of Computing, STOC 201, Palo Alto, California, USA, June 1-4, 201, page ,
5 Appendix A Proof of Theorem 2 Algorithm 2 Ditributed verion of [8] a executed by each node v G. Input: accuracy parameter ε Output: (/2 + ε)-approximation to the diameter of G 1: compute and broadcat D := 2 ecc(id min ); 2: ε := ε /2 ε ; k := ε D /8 ; : compute DOM := k-dominating et of ize at mot max{1, n/(k + 1) }; 4: v join et S with probability log n ; 5: compute a BFS from each node in S; 6: For every v V, compute p S (v) := the cloet node in S to v; 7: w := arg max v V d(v, p S (v)); 8: compute a BFS tree from w a well a C DOM (w); 9: For every v C DOM (w), compute a BFS tree from v; 10: return 2(1+ε ) time the maximum depth of any BFS tree that wa computed; We already know from Theorem 5 in [8] that Algorithm 1 produce a /2-approximation when executed on G. We follow along the line of their proof and adopt it to our modified algorithm to how that it compute a (/2 + ε)-approximation to the diameter. Lemma 1. Let G = (V, E) be a graph with diameter D = h + z, where h 0 and z {0, 1, 2}. The maximal depth of any BFS tree that wa computed in Algorithm 2 i at leat 2h(1 ε ) w.h.p.. Proof. Let a, b V uch that d(a, b) = D. Then there are node a, b DOM uch that d(a, b ) D 2k = D(1 ε 2 ). Let w DOM be a vertex that atifie d(w, p S(w)) d(u, p S (u)) for all node u DOM. Cae 1, (d(w, p S (w)) h): Then d(a, p S (a )) h. A the algorithm compute BF S(v) for every v S, it follow that BF S(p S (a )) i computed a well. Since ecc(a ) i at leat D k = D(1 ε /4), it follow that ecc(p S (a )) ecc(a ) h = 2h + z ε 4 (h + z) 2h(1 ε ) a required. Cae 2, (d(w, p S (w)) > h): We can alo aume that ecc(w) < 2h(1 ε ) ince the algorithm compute BF S(w) and if ecc(w) 2h(1 ε ) then it compute a BFS tree of depth at leat 2h(1 ε ) a required. Since ecc(w) < 2h(1 ε ) it follow that d(w, b ) < 2h(1 ε ). Moreover, ince d(w, p S (w)) > h we can conclude that S hit C DOM (w) w.h.p., that i S C DOM (w). Therefore it mut be the cae that C DOM (w) contain a node at ditance greater h from w, and hence N h (w) C DOM (w). Thi implie that there i a vertex w C DOM (w) on the path from w to b uch that d(w, w ) = h and hence d(w, b ) < 2h(1 ε ) h = h 2ε. Since d(a, b ) D(1 ε ε 2 ) = (h + z)(1 2 ), we alo have that d(a, w ) d(a, b ) d(w, b ) > 2h(1 ε ). The algorithm compute BF S(u) for every u C DOM (w), and in particular, it compute BF S(w ), which ha depth at leat d(a, w ) 2h(1 ε ). Proof. (of Theorem 2). Correctne follow from Lemma 1 combined with the choice of ε and the requirement that ε 1/: By multiplying the depth of the deepet BFS performed with 2(1 ε ), we obtain an etimate ˆD uch that D ˆD ( 2 + ε)d. 5
6 Analyzing the runtime i almot the ame a in Theorem 1. We only need to add O(D) for n computing the k-dominating et in Line 1. The total runtime i O( S ++D) = O( ε D ++D). Chooing := n log n ε D yield the deired runtime. 6
Routing Definition 4.1
4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing
More informationLecture 14: Minimum Spanning Tree I
COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce
More informationAlgorithmic Discrete Mathematics 4. Exercise Sheet
Algorithmic Dicrete Mathematic. Exercie Sheet Department of Mathematic SS 0 PD Dr. Ulf Lorenz 0. and. May 0 Dipl.-Math. David Meffert Verion of May, 0 Groupwork Exercie G (Shortet path I) (a) Calculate
More informationA note on degenerate and spectrally degenerate graphs
A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove
More informationContents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course:
Content Shortet path Algorithm and Network 21/211 The hortet path problem: Statement Verion Application Algorithm (for ingle ource p problem) Reminder: relaxation, Dijktra, Variant of Dijktra, Bellman-Ford,
More informationShortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights
Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two
More informationToday s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is
Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -
More informationMinimum congestion spanning trees in bipartite and random graphs
Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu
More informationGeneric Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline
Generic Travere CS 62, Lecture 9 Jared Saia Univerity of New Mexico Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v) from the bag if (v i unmarked) mark v; parent(v) = p;
More informationFast Approximation Algorithms for the Diameter and Radius of Sparse Graphs
Fat Approximation Algorithm for the Diameter and Radiu of Spare Graph Liam Roditty Bar Ilan Univerity liam.roditty@biu.ac.il Virginia Vailevka William UC Berkeley and Stanford Univerity virgi@eec.berkeley.edu
More informationOptimal Gossip with Direct Addressing
Optimal Goip with Direct Addreing Bernhard Haeupler Microoft Reearch 1065 La Avenida, Mountain View Mountain View, CA 94043 haeupler@c.cmu.edu Dahlia Malkhi Microoft Reearch 1065 La Avenida, Mountain View
More informationLocalized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks
Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de
More informationKaren L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract
Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial
More informationNearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks
Nearly Contant Approximation for Data Aggregation Scheduling in Wirele Senor Network Scott C.-H. Huang, Peng-Jun Wan, Chinh T. Vu, Yinghu Li and France Yao Computer Science Department, City Univerity of
More informationarxiv: v1 [cs.ds] 27 Feb 2018
Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.
More informationMarkov Random Fields in Image Segmentation
Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image
More informationLecture 17: Shortest Paths
Lecture 7: Shortet Path CSE 373: Data Structure and Algorithm CSE 373 9 WI - KASEY CHAMPION Adminitrivia How to Ace the Technical Interview Seion today! - 6-8pm - Sieg 34 No BS CS Career Talk Thurday -
More informationUniversität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.
Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut
More informationScribe from 2014/2015: Jessica Su, Hieu Pham Date: October 6, 2016 Editor: Jimmy Wu
CS 267 Lecture 3 Shortest paths, graph diameter Scribe from 2014/2015: Jessica Su, Hieu Pham Date: October 6, 2016 Editor: Jimmy Wu Today we will talk about algorithms for finding shortest paths in a graph.
More informationxy-monotone path existence queries in a rectilinear environment
CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of
More informationAdvanced Encryption Standard and Modes of Operation
Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES
More information1 The secretary problem
Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.
More informationStochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang
Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,
More informationTouring a Sequence of Polygons
Touring a Sequence of Polygon Mohe Dror (1) Alon Efrat (1) Anna Lubiw (2) Joe Mitchell (3) (1) Univerity of Arizona (2) Univerity of Waterloo (3) Stony Brook Univerity Problem: Given a equence of k polygon
More informationThe Comparison of Neighbourhood Set and Degrees of an Interval Graph G Using an Algorithm
The Comparion of Neighbourhood Set and Degree of an Interval Graph G Uing an Algorithm Dr.A.Sudhakaraiah, K.Narayana Aitant Profeor, Department of Mathematic, S.V. Univerity, Andhra Pradeh, India Reearch
More informationDistributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router
Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To
More informationTouring a Sequence of Polygons
Touring a Sequence of Polygon Mohe Dror (1) Alon Efrat (1) Anna Lubiw (2) Joe Mitchell (3) (1) Univerity of Arizona (2) Univerity of Waterloo (3) Stony Brook Univerity Problem: Given a equence of k polygon
More informationShortest Path Routing in Arbitrary Networks
Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,
More informationPlanning of scooping position and approach path for loading operation by wheel loader
22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader
More informationCERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu
CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,
More informationDelaunay Triangulation: Incremental Construction
Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )
More informationShortest Paths with Single-Point Visibility Constraint
Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet
More informationCS 467/567: Divide and Conquer on the PRAM
CS 467/567: Divide and Conquer on the PRAM Stefan D. Bruda Winter 2017 BINARY SEARCH Problem: Given a equence S 1..n orted in nondecreaing order and a value x, find the ubcript k uch that S i x If n proceor
More information3D SMAP Algorithm. April 11, 2012
3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative
More informationTopics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X
Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term
More informationSee chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM
Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive
More informationPerformance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks
Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity
More informationDistributed Fractional Packing and Maximum Weighted b-matching via Tail-Recursive Duality
Ditributed Fractional Packing and Maximum Weighted b-matching via Tail-Recurive Duality Chrito Koufogiannaki, Neal E. Young Department of Computer Science, Univerity of California, Riveride {ckou, neal}@c.ucr.edu
More informationA Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *
Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm
More informationToday s Outline. CS 362, Lecture 19. DFS and BFS. Generic Traverse. BFS and DFS Wrapup Shortest Paths. Jared Saia University of New Mexico
Today Outline CS 362, Lecture 9 Jared Saia Univerity of New Mexico BFS and DFS Wrapup Shortet Path Generic Travere DFS and BFS Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v)
More informationNew Structural Decomposition Techniques for Constraint Satisfaction Problems
New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.
More informationUninformed Search Complexity. Informed Search. Search Revisited. Day 2/3 of Search
Informed Search ay 2/3 of Search hap. 4, Ruel & Norvig FS IFS US PFS MEM FS IS Uninformed Search omplexity N = Total number of tate = verage number of ucceor (branching factor) L = Length for tart to goal
More informationHassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,
COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)
More informationA SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS
A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt
More informationarxiv: v1 [cs.dc] 13 Oct 2008
A SIMPLE LOCAL 3-APPROXIMATION ALGORITHM FOR VERTEX COVER VALENTIN POLISHCHUK AND JUKKA SUOMELA arxiv:0810.2175v1 [cs.dc] 13 Oct 2008 Abstract. We present a local algorithm (constant-time distributed algorithm)
More informationEdits in Xylia Validity Preserving Editing of XML Documents
dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,
More informationLecture 18 Graph-Based Algorithms. CSE373: Design and Analysis of Algorithms
Lecture 18 Graph-Baed Algorithm CSE: Deign and Anali of Algorithm Shortet Path Problem Modeling problem a graph problem: Road map i a weighted graph: vertice = citie edge = road egment between citie edge
More informationOptimizing Synchronous Systems for Multi-Dimensional. Notre Dame, IN Ames, Iowa computation is an optimization problem (b) circuit
Optimizing Synchronou Sytem for ulti-imenional pplication Nelon L. Pao and Edwin H.-. Sha Liang-Fang hao ept. of omputer Science & Eng. ept. of Electrical & omputer Eng. Univerity of Notre ame Iowa State
More informationThe Data Locality of Work Stealing
The Data Locality of Work Stealing Umut A. Acar School of Computer Science Carnegie Mellon Univerity umut@c.cmu.edu Guy E. Blelloch School of Computer Science Carnegie Mellon Univerity guyb@c.cmu.edu Robert
More informationOperational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz
Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,
More informationShortest-Path Routing in Arbitrary Networks
Ž. Journal of Algorithm 31, 105131 1999 Article ID jagm.1998.0980, available online at http:www.idealibrary.com on Shortet-Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vocking
More informationManeuverable Relays to Improve Energy Efficiency in Sensor Networks
Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov
More informationFloating Point CORDIC Based Power Operation
Floating Point CORDIC Baed Power Operation Kazumi Malhan, Padmaja AVL Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland Univerity, Rocheter, MI e-mail: kmalhan@oakland.edu,
More informationAN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM
RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt
More informationThe Split Domination and Irredundant Number of a Graph
The Split Domination and Irredundant Number of a Graph S. Delbin Prema 1, C. Jayaekaran 2 1 Department of Mathematic, RVS Technical Campu-Coimbatore, Coimbatore - 641402, Tamil Nadu, India 2 Department
More informationLandmark Selection and Greedy Landmark-Descent Routing for Sensor Networks
1 Landmark Selection and Greedy Landmark-Decent Routing for Senor Network An Nguyen Nikola Miloavljević Qing Fang Jie Gao Leonida J. Guiba Department of Computer Science, Stanford Univerity. {anguyen,nikolam,guiba}@c.tanford.edu
More informationParallel MATLAB at FSU: Task Computing
Parallel MATLAB at FSU: Tak John Burkardt Department of Scientific Florida State Univerity... 1:30-2:30 Thurday, 07 April 2011 499 Dirac Science Library... http://people.c.fu.edu/ jburkardt/preentation/...
More informationA Multi-objective Genetic Algorithm for Reliability Optimization Problem
International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR
More informationA System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems
International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem
More information( ) subject to m. e (2) L are 2L+1. = s SEG SEG Las Vegas 2012 Annual Meeting Page 1
A new imultaneou ource eparation algorithm uing frequency-divere filtering Ying Ji*, Ed Kragh, and Phil Chritie, Schlumberger Cambridge Reearch Summary We decribe a new imultaneou ource eparation algorithm
More informationPower Aware Location Aided Routing in Mobile Ad-hoc Networks
International Journal of Scientific and Reearch Publication, Volume, Iue 1, December 01 1 Power Aware Location Aided Routing in Mobile Ad-hoc Network Anamika Computer Science, Inderprataha Engineering
More informationModeling of underwater vehicle s dynamics
Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation
More informationAn Improved Implementation of Elliptic Curve Digital Signature by Using Sparse Elements
The International Arab Journal of Information Technology, Vol. 1, No., July 004 0 An Improved Implementation of Elliptic Curve Digital Signature by Uing Spare Element Eam Al-Daoud Computer Science Department,
More informationStress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling
Stre-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Menter F.R. ANSYS Germany GmbH Introduction It i oberved in many CFD imulation that RANS model how inherent technology limitation
More informationShortest Paths in Directed Graphs
Shortet Path in Direted Graph Jonathan Turner January, 0 Thi note i adapted from Data Struture and Network Algorithm y Tarjan. Let G = (V, E) e a direted graph and let length e a real-valued funtion on
More informationOptimal Multi-Robot Path Planning on Graphs: Complete Algorithms and Effective Heuristics
Optimal Multi-Robot Path Planning on Graph: Complete Algorithm and Effective Heuritic Jingjin Yu Steven M. LaValle Abtract arxiv:507.0390v [c.ro] Jul 05 We tudy the problem of optimal multi-robot path
More informationCutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.
Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization
More informationSIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial
SIMIT 7 Component Type Editor (CTE) Uer manual Siemen Indutrial Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult
More informationShortest Path Problems
Shortet Path Problem How can we find the hortet route between two point on a road map? Model the problem a a graph problem: Road map i a weighted graph: vertice = citie edge = road egment between citie
More informationTrainable Context Model for Multiscale Segmentation
Trainable Context Model for Multicale Segmentation Hui Cheng and Charle A. Bouman School of Electrical and Computer Engineering Purdue Univerity Wet Lafayette, IN 47907-1285 {hui, bouman}@ ecn.purdue.edu
More informationTrading Off Space for Passes in Graph Streaming Problems
Trading Off Space for Pae in Graph Streaming Problem CAMIL DEMETRESCU, IRENE FINOCCHI and ANDREA RIBICHINI Univerità di Roma La Sapienza, Roma, Italy Data tream proceing ha recently received increaing
More informationelse end while End References
621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized
More informationarxiv: v3 [cs.cg] 1 Oct 2018
Improved Time-Space Trade-off for Computing Voronoi Diagram Bahareh Banyaady Matia Korman Wolfgang Mulzer André van Renen Marcel Roeloffzen Paul Seiferth Yannik Stein arxiv:1708.00814v3 [c.cg] 1 Oct 2018
More informationA Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract
A Boyer-Moore Approach for Two-Dimenional Matching Jorma Tarhio Computer Science Diviion Univerity of California Berkeley, CA 94720 Abtract An imple ublinear algorithm i preented for two-dimenional tring
More information/06/$ IEEE 364
006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;
More informationCENTER-POINT MODEL OF DEFORMABLE SURFACE
CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D
More informationApproximating max-min linear programs with local algorithms
Approximating max-min linear programs with local algorithms Patrik Floréen, Marja Hassinen, Petteri Kaski, Topi Musto, Jukka Suomela HIIT seminar 29 February 2008 Max-min linear programs: Example 2 / 24
More informationDistributed Approximation of Minimum Routing Cost Trees
Distributed Approximation of Minimum Routing Cost Trees Alexandra Hochuli ETH Zurich hochulia@ethz.ch Stephan Holzer MIT holzer@mit.edu June 4, 2014 Roger Wattenhofer ETH Zurich wattenhofer@ethz.ch Abstract
More informationMAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc
MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic
More informationThis article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and
Thi article appeared in a journal publihed by Elevier. The attached copy i furnihed to the author for internal non-commercial reearch and education ue, including for intruction at the author intitution
More informationLecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization
Lecture Outline Global flow analyi Global Optimization Global contant propagation Livene analyi Adapted from Lecture by Prof. Alex Aiken and George Necula (UCB) CS781(Praad) L27OP 1 CS781(Praad) L27OP
More informationMidterm 2 March 10, 2014 Name: NetID: # Total Score
CS 3 : Algorithm and Model of Computation, Spring 0 Midterm March 0, 0 Name: NetID: # 3 Total Score Max 0 0 0 0 Grader Don t panic! Pleae print your name and your NetID in the boxe above. Thi i a cloed-book,
More informationDAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications
DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu
More informationIncreasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment
Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in
More informationThe norm Package. November 15, Title Analysis of multivariate normal datasets with missing values
The norm Package November 15, 2003 Verion 1.0-9 Date 2002/05/06 Title Analyi of multivariate normal dataet with miing value Author Ported to R by Alvaro A. Novo . Original by Joeph
More informationDistance oracles for unweighted graphs : breaking the quadratic barrier with constant additive error
Distance oracles for unweighted graphs : breaking the quadratic barrier with constant additive error Surender Baswana, Akshay Gaur, Sandeep Sen, and Jayant Upadhyay Abstract. Thorup and Zwick, in the seminal
More informationUC Berkeley International Conference on GIScience Short Paper Proceedings
UC Berkeley International Conference on GIScience Short Paper Proceeding Title A novel method for probabilitic coverage etimation of enor network baed on 3D vector repreentation in complex urban environment
More informationES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK
ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.
More informationThe Euler Tour Technique and Parallel Rooted Spanning Tree
The Euler Tour Technique and Parallel Rooted Spanning Tree Guojing Cong, David A. Bader Department of Electrical and Computer Engineering Univerity of New Mexico, Albuquerque, NM 87131 USA {cong, dbader}@ece.unm.edu
More informationGraphs: Finding shortest paths
/0/01 Graph: Finding hortet path Tecniche di Programmazione Summary Definition Floyd-Warhall algorithm Bellman-Ford-Moore algorithm Dijktra algorithm 1 /0/01 Definition Graph: Finding hortet path Definition:
More informationFactor Graphs and Inference
Factor Graph and Inerence Sargur Srihari rihari@cedar.bualo.edu 1 Topic 1. Factor Graph 1. Factor in probability ditribution. Deriving them rom graphical model. Eact Inerence Algorithm or Tree graph 1.
More informationDistance Optimal Formation Control on Graphs with a Tight Convergence Time Guarantee
Ditance Optimal Formation Control on Graph with a Tight Convergence Time Guarantee Jingjin Yu Steven M. LaValle Abtract For the tak of moving a et of inditinguihable agent on a connected graph with unit
More informationQuadrilaterals. Learning Objectives. Pre-Activity
Section 3.4 Pre-Activity Preparation Quadrilateral Intereting geometric hape and pattern are all around u when we tart looking for them. Examine a row of fencing or the tiling deign at the wimming pool.
More informationA New Approach to Pipeline FFT Processor
A ew Approach to Pipeline FFT Proceor Shouheng He and Mat Torkelon Department of Applied Electronic, Lund Univerity S- Lund, SWEDE email: he@tde.lth.e; torkel@tde.lth.e Abtract A new VLSI architecture
More informationTemporal Abstract Interpretation. To have a continuum of program analysis techniques ranging from model-checking to static analysis.
Temporal Abtract Interpretation Patrick COUSOT DI, École normale upérieure 45 rue d Ulm 75230 Pari cedex 05, France mailto:patrick.couot@en.fr http://www.di.en.fr/ couot and Radhia COUSOT LIX École polytechnique
More informationKey Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.
Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in
More informationThink Global Act Local
Think Global Act Local Roger Wattenhofer ETH Zurich Distributed Computing www.disco.ethz.ch Town Planning Patrick Geddes Architecture Buckminster Fuller Computer Architecture Caching Robot Gathering e.g.,
More informationComputer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder
Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal
More informationA DISTRIBUTED SYNCHRONOUS ALGORITHM FOR MINIMUM-WEIGHT SPANNING TREES
ISSN: 2778-5795 A DISTRIBUTED SYNCHRONOUS ALGORITHM FOR MINIMUM-WEIGHT SPANNING TREES Md. Mohsin Ali 1, Mst. Shakila Khan Rumi 2 1 Department of Computer Science, The University of Western Ontario, Canada
More informationCompressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit
Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit
More information