The Multiple Unicast Network Coding Conjecture. and a geometric framework for studying it
|
|
- Sydney Holt
- 5 years ago
- Views:
Transcription
1 The Multiple Unicast Network Coding Conjecture and a geometric framework for studying it Tang Xiahou, Chuan Wu, Jiaqing Huang, Zongpeng Li June
2 Multiple Unicast: Network Coding = Routing? Undirected Network. Each link has unit capacity 1 in this example. S 1 S 2 a b S1 S 2 a1 a1 a a+b b a2 b1 b1 b1 a1 b2 a+b a+b a2 a2 T 2 T 1 b2 b2 T 2 T 1 2
3 Multiple Unicast: Network Coding = Routing? Undirected Network. Each link has unit capacity 1 in this example. a a c a b b c a+b a+c a+b a+b b b+c b+c a+b+c b c c b+c a a2 c1 a b c c c1 a1 a1 b1 c2 b1 c2 b1 a2 c2 b1 c1 a1 b2 c1 c2 a2 b1 a2 b a1 b2 b2 c1 b2 c2 b2 a1 a2 a 3
4 The MU-NC Conjecture Network coding = routing, for multiple unicast sessions in an undirected network. Given k independent unicast sessions in an undirected linkcapacitated network, a throughput vector r is feasible with network coding if and only if it is feasible with routing. 4
5 The MU-NC Conjecture For k pairs of independent unicast sessions in an undirected network, a throughput vector r is feasible with network coding if and only if it is feasible with routing. Proposed in 2004, by Harvey et al. and by Li and Li Sounds intuitive and simple Studied extensively, not much progress so far No counter example known yet Mitzenmach, Ho, Sprintson, 2007: a list of 7 open problems in NC: MU-NC conjecture is problem #1 Chekuri: Claiming an equivalence between network coding and routing for all undirected networks is a bold conjecture. A full understanding of the problem is wild open 5
6 The MU-NC Conjecture For k pairs of independent unicast sessions in an undirected network, a throughput vector r is feasible with network coding if and only if it is feasible with routing. Langberg, 2011: the MU-NC conjecture has driven many crazy A growing agreement: probably need new tools, beyond a simple blend of graph theory and information theory Network coding for general multiple sessions(multi-source, multi-destination) is hard, not much known Multiple unicast is the most basic case of multiple session network coding. Good understanding desired. 6
7 known to be true: # of sessions = 1 or 2 The MU-NC Conjecture common sender/receiver location planar network, all terminal nodes on same face star outer planar Okamura-Seymour network (uniform-capacity K 3,2 ) in general: coding advantage O(logk) 7
8 known to be true: # of sessions = 1 or 2 The MU-NC Conjecture common sender/receiver location planar network, all terminal nodes on same face star outer planar Okamura-Seymour network (uniform-capacity K 3,2 ) in general: coding advantage O(logk) 8
9 Space Information Flow: Multiple Unicast Min-costnetworkinformationflow: cost= e (w(e)f(e)) Min-costspaceinformationflow: cost= e ( e f(e)) x D C 1 A B x 1 Unit rate demand: A B, A C, B D 9
10 Space Information Flow: Multiple Unicast x D C 1 A B x 1 Cost = i r i d i Is optimal cost without network coding still optimal with network coding? 10
11 MU-NC conjecture: Network vs. Space true in networks = true in any geometric space with distance trueinnetworks= trueinl 2 (Euclideandistance) true in l 2 = not too far off in networks true in networks true in l (Chebyshev distance) 11
12 The Geometric Framework Step 1. From Throughput to Cost: LP Duality Step 2. From Network to Space: Graph Embedding Step 3. From h-d to 1-D: Projection Step 4. Proof in 1-D: Integrating Cut Inequality 12
13 Example Application: Two Unicast Sessions For two unicast sessions in an undirected network (G, c), network coding is equivalent to routing(mcf). i.e., a throughput vector (r 1,r 2 ) is feasible with network coding if and only if it is feasible with routing. 13
14 Example Application: Two Unicast Sessions Step 1. Transformation: Apply the following result to all network configurations with k = 2, to translate the statement from its throughput version to cost version. [Li and Li, 2004] Given an undirected network G with k pairs of unicast terminals specified, and any desired throughput vector r, the maximum coding advantage in (G,c) over all c Q E +, equals the maximum cost advantage in (G,w) over all w Q E +. 14
15 Example Application: Two Unicast Sessions Step 2. Embedding: Isometric (distance-preserving) embedding of G into l. n ( n )1 p u,v = lim x ui x vi p = max x ui x vi p i i=1 Embed each node u i in G to (x i1 = d i1,x i2 = d i2,...,x ii = d ii = 0,...,x i,n = d i,n ), where d ij is the shortest path length between u i and u j in G No counter example for space information flow problem in l n = no counter example for network information flow problem in G 15
16 Example Application: Two Unicast Sessions Step 3. Projection: (3.a.) from l n to l 2, then (3.b.) from l 2 to l 1 (3.a.) Theorem: If network coding can outperform routing in l n, then it can do so in l k. k = 2 in this case. idea: keep k primary coordinates, truncate the other n k coordinates (3.b.) idea: a unit vector in l 2, when projected to the two diagonal lines, has constant total projected length N 1 y C /4 M D -1 E o 1 x -16
17 Example Application: Two Unicast Sessions Step 4. 1-D Proof: Integrating the cut inequality over the 1-D space s1 t2 s3 t3 t1 s2 x0 x x= f x dx x= Demand((, x) (x, ))dx LFH = e ( e 1 f e ) RHS = i s i t i 1 r i Therefore: e ( e 1f e ) i ( s it i 1 r i ). 17
18 Example Application: The O(log k) Upper-bound For k unicast sessions in an undirected network(g, c), if a throughput vector r can be achieved by network r coding, then routing can achieve at least O(logk). 18
19 Example Application: The O(log k) Upper-bound Step 1. Transformation: Apply the following result to all network configurations with k unicast sessions, to translate the statement from its throughput version to cost version. [Li and Li, 2004] Given an undirected network G with k pairs of unicast terminals specified, and any desired throughput vector r, the maximum coding advantage in (G,c) over all c Q E +, equals the maximum cost advantage in (G,w) over all w Q E +. 19
20 Example Application: The O(log k) Upper-bound Step 2. Embedding: O(log k)-distortion embedding of G into l 2 (Euclidean space). ( n )1 2 u,v 2 = (x ui x vi ) 2 i=1 [Bourgain, 1985] The closure of an edge-weighted graph (G,w) with n nodes can be embedded into l p for any 1 p, with distortion O(logn). No counter example for space information flow problem in l n 2 = Throughput gap for network information flow problem in G upper-bounded by distortion O(log k) 20
21 Example Application: The O(log k) Upper-bound Step 3. Projection: from l n 2 to l 1 Theorem: If network coding can outperform routing in l n 2, then it can do so in l 1 Find good 1-D space for projection onto: enumerate all possible p, by integrating over Φ. Prove: (f e e p )dφ < ( s i t i p r i )dφ Φ e Φ i p 21
22 Example Application: The O(log k) Upper-bound Step 4. 1-D Proof: Integrating the cut inequality over the 1-D space s1 t2 s3 t3 t1 s2 x0 x x= f x dx x= Demand((, x) (x, ))dx LFH = e ( e 1 f e ) RHS = i s i t i 1 r i Therefore: e ( e 1f e ) i ( s it i 1 r i ). 22
23 Example Application: Complete Networks Network Coding is equivalent to routing in a complete network with uniform link weights. Isometrically embed G into l n 2, then project to l 1 : for each vertex i, i = 1,2,,n, let all the coordinates of i be zero, except that the ith coordinate is 2 2 : ( ) 2 0,...,0,x i = 2,0,...,0 23
24 A Possible Proof to the MU-NC Conjecture? Step 1. From Throughput to Cost: translate to cost version. done Step 2. From Network to Space: Graph Embedding. Isometrically embed G into l k. done Step 3. From l k to l 1 (or l 2 ): Projection.??? (l n 2 to l1, done; l 2 to l1, done) Step 4. Proof in 1-D: Integrating Cut Inequality. done 24
A Geometric Framework for Investigating the Multiple Unicast Network Coding Conjecture
A Geometric Framework for Investigating the Multiple Unicast Network Coding Conjecture Tang Xiahou, Chuan Wu, Jiaqing Huang, Zongpeng Li Department of Computer Science, Universit of Calgar, Canada Department
More informationLecture 6: Linear Programming for Sparsest Cut
Lecture 6: Linear Programming for Sparsest Cut Sparsest Cut and SOS The SOS hierarchy captures the algorithms for sparsest cut, but they were discovered directly without thinking about SOS (and this is
More informationLecture Overview. 2 Shortest s t path. 2.1 The LP. 2.2 The Algorithm. COMPSCI 530: Design and Analysis of Algorithms 11/14/2013
COMPCI 530: Design and Analysis of Algorithms 11/14/2013 Lecturer: Debmalya Panigrahi Lecture 22 cribe: Abhinandan Nath 1 Overview In the last class, the primal-dual method was introduced through the metric
More informationMin-Cost Multicast Networks in Euclidean Space
Min-Cost Multicast Networks in Euclidean Space Xunrui Yin, Yan Wang, Xin Wang, Xiangyang Xue School of Computer Science Fudan University {09110240030,11110240029,xinw,xyxue}@fudan.edu.cn Zongpeng Li Dept.
More informationEmbedding Bounded Bandwidth Graphs into l 1
Embedding Bounded Bandwidth Graphs into l 1 Douglas E. Carroll Ashish Goel Adam Meyerson November 2, 2005 Abstract We introduce the first embedding of graphs of low bandwidth into l 1, with distortion
More informationProbabilistic embedding into trees: definitions and applications. Fall 2011 Lecture 4
Probabilistic embedding into trees: definitions and applications. Fall 2011 Lecture 4 Instructor: Mohammad T. Hajiaghayi Scribe: Anshul Sawant September 21, 2011 1 Overview Some problems which are hard
More informationCross-Monotonic Multicast
Cross-Monotonic Multicast Zongpeng Li Department of Computer Science University of Calgary April 17, 2008 1 Multicast Multicast models one-to-many data dissemination in a computer network Example: live
More informationEmbedding Bounded Bandwidth Graphs into l 1
Embedding Bounded Bandwidth Graphs into l 1 Douglas E. Carroll 1, Ashish Goel 2, and Adam Meyerson 1 1 UCLA 2 Stanford University Abstract. We introduce the first embedding of graphs of low bandwidth into
More informationCSC Linear Programming and Combinatorial Optimization Lecture 12: Semidefinite Programming(SDP) Relaxation
CSC411 - Linear Programming and Combinatorial Optimization Lecture 1: Semidefinite Programming(SDP) Relaxation Notes taken by Xinwei Gui May 1, 007 Summary: This lecture introduces the semidefinite programming(sdp)
More informationWHILE traditional information transmission in a data network. Bounding the Coding Advantage of Combination Network Coding in Undirected Networks
570 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 2, FEBRUARY 2012 Bounding the Coding Advantage of Combination Network Coding in Undirected Networks Shreya Maheshwar, Zongpeng Li, Member, IEEE,
More informationSpace Information Flow
Space Information Flow Zongpeng Li Dept. of Computer Science, University of Calgary and Institute of Network Coding, CUHK zongpeng@ucalgary.ca Chuan Wu Department of Computer Science The University of
More informationLecture Online Algorithms and the k-server problem June 14, 2011
Approximation Algorithms Workshop June 13-17, 2011, Princeton Lecture Online Algorithms and the k-server problem June 14, 2011 Joseph (Seffi) Naor Scribe: Mohammad Moharrami 1 Overview In this lecture,
More informationSolutions to Assignment# 4
Solutions to Assignment# 4 Liana Yepremyan 1 Nov.12: Text p. 651 problem 1 Solution: (a) One example is the following. Consider the instance K = 2 and W = {1, 2, 1, 2}. The greedy algorithm would load
More information2D rendering takes a photo of the 2D scene with a virtual camera that selects an axis aligned rectangle from the scene. The photograph is placed into
2D rendering takes a photo of the 2D scene with a virtual camera that selects an axis aligned rectangle from the scene. The photograph is placed into the viewport of the current application window. A pixel
More information15-451/651: Design & Analysis of Algorithms October 11, 2018 Lecture #13: Linear Programming I last changed: October 9, 2018
15-451/651: Design & Analysis of Algorithms October 11, 2018 Lecture #13: Linear Programming I last changed: October 9, 2018 In this lecture, we describe a very general problem called linear programming
More informationEmbedding Bounded Bandwidth Graphs into l p
UCLA Tech Report 070002 Embedding Bounded Bandwidth Graphs into l p Douglas E. Carroll Adam Meyerson February 16, 2007 Abstract We prove that graphs can be embedded randomly into l p (for any p 1) with
More informationNetwork flows and Menger s theorem
Network flows and Menger s theorem Recall... Theorem (max flow, min cut strong duality). Let G be a network. The maximum value of a flow equals the minimum capacity of a cut. We prove this strong duality
More informationThe Design of Approximation Algorithms
The Design of Approximation Algorithms David P. Williamson Cornell University David B. Shmoys Cornell University m Щ0 CAMBRIDGE UNIVERSITY PRESS Contents Preface page ix I An Introduction to the Techniques
More informationGraph Theory and Optimization Approximation Algorithms
Graph Theory and Optimization Approximation Algorithms Nicolas Nisse Université Côte d Azur, Inria, CNRS, I3S, France October 2018 Thank you to F. Giroire for some of the slides N. Nisse Graph Theory and
More informationOn Benefits of Network Coding in Bidirected Networks and Hyper-networks
On Benefits of Network Coding in Bidirected Networks and Hyper-networks Zongpeng Li University of Calgary / INC, CUHK December 1 2011, at UNSW Joint work with: Xunrui Yin, Xin Wang, Jin Zhao, Xiangyang
More informationApproximation Algorithms
Approximation Algorithms Frédéric Giroire FG Simplex 1/11 Motivation Goal: Find good solutions for difficult problems (NP-hard). Be able to quantify the goodness of the given solution. Presentation of
More informationMVE165/MMG630, Applied Optimization Lecture 8 Integer linear programming algorithms. Ann-Brith Strömberg
MVE165/MMG630, Integer linear programming algorithms Ann-Brith Strömberg 2009 04 15 Methods for ILP: Overview (Ch. 14.1) Enumeration Implicit enumeration: Branch and bound Relaxations Decomposition methods:
More informationComputer Science & Engineering 423/823 Design and Analysis of Algorithms
Computer Science & Engineering 423/823 Design and Analysis of Algorithms Lecture 07 Single-Source Shortest Paths (Chapter 24) Stephen Scott and Vinodchandran N. Variyam sscott@cse.unl.edu 1/36 Introduction
More informationNetwork Coding in Planar Networks
Network Coding in Planar Networks Zongpeng Li Department of Computer Science, University of Calgary Institute of Network Coding, CUHK April 30, 2012 @ PolyU 1 joint work with: Tang Xiahou, University of
More informationCS 473: Algorithms. Ruta Mehta. Spring University of Illinois, Urbana-Champaign. Ruta (UIUC) CS473 1 Spring / 36
CS 473: Algorithms Ruta Mehta University of Illinois, Urbana-Champaign Spring 2018 Ruta (UIUC) CS473 1 Spring 2018 1 / 36 CS 473: Algorithms, Spring 2018 LP Duality Lecture 20 April 3, 2018 Some of the
More informationMaterials Voyage 200/TI-92+ calculator with Cabri Geometry Student activity sheet Shortest Distance Problems. Introduction
s (Adapted from T 3 Geometry/C. Vonder Embse) Concepts Triangle inequality Distance between two points Distance between a point and a line Distance between two points and a line Perpendicularity Materials
More informationBounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks
Bounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks Alireza Keshavarz-Haddad Rudolf Riedi Department of Electrical and Computer Engineering and Department of
More informationCMSC 451: Lecture 22 Approximation Algorithms: Vertex Cover and TSP Tuesday, Dec 5, 2017
CMSC 451: Lecture 22 Approximation Algorithms: Vertex Cover and TSP Tuesday, Dec 5, 2017 Reading: Section 9.2 of DPV. Section 11.3 of KT presents a different approximation algorithm for Vertex Cover. Coping
More informationFall CS598CC: Approximation Algorithms. Chandra Chekuri
Fall 2006 CS598CC: Approximation Algorithms Chandra Chekuri Administrivia http://www.cs.uiuc.edu/homes/chekuri/teaching/fall2006/approx.htm Grading: 4 home works (60-70%), 1 take home final (30-40%) Mailing
More informationNotes for Lecture 20
U.C. Berkeley CS170: Intro to CS Theory Handout N20 Professor Luca Trevisan November 13, 2001 Notes for Lecture 20 1 Duality As it turns out, the max-flow min-cut theorem is a special case of a more general
More information1 The Traveling Salesperson Problem (TSP)
CS 598CSC: Approximation Algorithms Lecture date: January 23, 2009 Instructor: Chandra Chekuri Scribe: Sungjin Im In the previous lecture, we had a quick overview of several basic aspects of approximation
More informationHomework 2: Multi-unit combinatorial auctions (due Nov. 7 before class)
CPS 590.1 - Linear and integer programming Homework 2: Multi-unit combinatorial auctions (due Nov. 7 before class) Please read the rules for assignments on the course web page. Contact Vince (conitzer@cs.duke.edu)
More information8 Matroid Intersection
8 Matroid Intersection 8.1 Definition and examples 8.2 Matroid Intersection Algorithm 8.1 Definitions Given two matroids M 1 = (X, I 1 ) and M 2 = (X, I 2 ) on the same set X, their intersection is M 1
More informationThe Encoding Complexity of Network Coding
The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network
More informationI can position figures in the coordinate plane for use in coordinate proofs. I can prove geometric concepts by using coordinate proof.
Page 1 of 14 Attendance Problems. 1. Find the midpoint between (0, x) and (y, z).. One leg of a right triangle has length 1, and the hypotenuse has length 13. What is the length of the other leg? 3. Find
More informationMin-Cost Multicast Networks in Euclidean Space
Xunrui Yin, Yan Wang, Xin Wang, Xiangyang Xue 1 Zongpeng Li 23 1 Fudan University Shanghai, China 2 University of Calgary Alberta, Canada 3 Institute of Network Coding, Chinese University of Hong Kong,
More informationTrees, Trees and More Trees
Trees, Trees and More Trees August 9, 01 Andrew B. Kahng abk@cs.ucsd.edu http://vlsicad.ucsd.edu/~abk/ How You ll See Trees in CS Trees as mathematical objects Trees as data structures Trees as tools for
More informationCPSC 536N: Randomized Algorithms Term 2. Lecture 10
CPSC 536N: Randomized Algorithms 011-1 Term Prof. Nick Harvey Lecture 10 University of British Columbia In the first lecture we discussed the Max Cut problem, which is NP-complete, and we presented a very
More informationCS599: Convex and Combinatorial Optimization Fall 2013 Lecture 14: Combinatorial Problems as Linear Programs I. Instructor: Shaddin Dughmi
CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 14: Combinatorial Problems as Linear Programs I Instructor: Shaddin Dughmi Announcements Posted solutions to HW1 Today: Combinatorial problems
More informationDiscrete Mathematics Course Review 3
21-228 Discrete Mathematics Course Review 3 This document contains a list of the important definitions and theorems that have been covered thus far in the course. It is not a complete listing of what has
More informationExercise set 2 Solutions
Exercise set 2 Solutions Let H and H be the two components of T e and let F E(T ) consist of the edges of T with one endpoint in V (H), the other in V (H ) Since T is connected, F Furthermore, since T
More informationOutline. Combinatorial Optimization 2. Finite Systems of Linear Inequalities. Finite Systems of Linear Inequalities. Theorem (Weyl s theorem :)
Outline Combinatorial Optimization 2 Rumen Andonov Irisa/Symbiose and University of Rennes 1 9 novembre 2009 Finite Systems of Linear Inequalities, variants of Farkas Lemma Duality theory in Linear Programming
More informationGraphs. Pseudograph: multiple edges and loops allowed
Graphs G = (V, E) V - set of vertices, E - set of edges Undirected graphs Simple graph: V - nonempty set of vertices, E - set of unordered pairs of distinct vertices (no multiple edges or loops) Multigraph:
More informationCircular Flows of Graphs
Circular Flows of Graphs Hong-Jian Lai and Cunquan Zhang West Virginia University Rui Xu University of West Georgia Circular Flows of Graphs p. 1/16 Notation: G: = a graph, with vertex set V = V (G) =
More informationLecture 4: Bipartite graphs and planarity
Lecture 4: Bipartite graphs and planarity Anders Johansson 2011-10-22 lör Outline Bipartite graphs A graph G is bipartite with bipartition V1, V2 if V = V1 V2 and all edges ij E has one end in V1 and V2.
More informationOn the Multiple Unicast Network Coding Conjecture
On the Multiple Unicast Networ Coding Conjecture Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel miel@openu.ac.il Muriel Médard Research Laboratory of Electronics
More informationBasic Approximation algorithms
Approximation slides Basic Approximation algorithms Guy Kortsarz Approximation slides 2 A ρ approximation algorithm for problems that we can not solve exactly Given an NP-hard question finding the optimum
More informationGiven a graph, find an embedding s.t. greedy routing works
Given a graph, find an embedding s.t. greedy routing works Greedy embedding of a graph 99 Greedy embedding Given a graph G, find an embedding of the vertices in R d, s.t. for each pair of nodes s, t, there
More informationInsensitive Traffic Splitting in Data Networks
Juha Leino and Jorma Virtamo. 2005. Insensitive traffic splitting in data networs. In: Proceedings of the 9th International Teletraffic Congress (ITC9). Beijing, China, 29 August 2 September 2005, pages
More informationCOT 6936: Topics in Algorithms! Giri Narasimhan. ECS 254A / EC 2443; Phone: x3748
COT 6936: Topics in Algorithms! Giri Narasimhan ECS 254A / EC 2443; Phone: x3748 giri@cs.fiu.edu http://www.cs.fiu.edu/~giri/teach/cot6936_s12.html https://moodle.cis.fiu.edu/v2.1/course/view.php?id=174
More informationAcyclic Subgraphs of Planar Digraphs
Acyclic Subgraphs of Planar Digraphs Noah Golowich Research Science Institute Department of Mathematics Massachusetts Institute of Technology Cambridge, Massachusetts, U.S.A. ngolowich@college.harvard.edu
More informationAlgorithms design under a geometric lens Spring 2014, CSE, OSU Lecture 1: Introduction
5339 - Algorithms design under a geometric lens Spring 2014, CSE, OSU Lecture 1: Introduction Instructor: Anastasios Sidiropoulos January 8, 2014 Geometry & algorithms Geometry in algorithm design Computational
More information2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006
2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,
More informationRandomized Algorithms 2017A - Lecture 10 Metric Embeddings into Random Trees
Randomized Algorithms 2017A - Lecture 10 Metric Embeddings into Random Trees Lior Kamma 1 Introduction Embeddings and Distortion An embedding of a metric space (X, d X ) into a metric space (Y, d Y ) is
More informationThe following is a summary, hand-waving certain things which actually should be proven.
1 Basics of Planar Graphs The following is a summary, hand-waving certain things which actually should be proven. 1.1 Plane Graphs A plane graph is a graph embedded in the plane such that no pair of lines
More informationEuclidean TSP Between Two Nested Convex Obstacles
Euclidean TSP Between Two Nested Convex Obstacles August 11, 2005 Jeff Abrahamson, Dept. of Computer Science, Drexel University, Philadelphia, PA, USA, jeffa@cs.drexel.edu. Ali Shokoufandeh, Dept. of Computer
More informationCombinatorial Optimization
Combinatorial Optimization Frank de Zeeuw EPFL 2012 Today Introduction Graph problems - What combinatorial things will we be optimizing? Algorithms - What kind of solution are we looking for? Linear Programming
More information[Ramalingam, 4(12): December 2017] ISSN DOI /zenodo Impact Factor
GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES FORCING VERTEX TRIANGLE FREE DETOUR NUMBER OF A GRAPH S. Sethu Ramalingam * 1, I. Keerthi Asir 2 and S. Athisayanathan 3 *1,2 & 3 Department of Mathematics,
More informationEulerian disjoint paths problem in grid graphs is NP-complete
Discrete Applied Mathematics 143 (2004) 336 341 Notes Eulerian disjoint paths problem in grid graphs is NP-complete Daniel Marx www.elsevier.com/locate/dam Department of Computer Science and Information
More informationMath 485, Graph Theory: Homework #3
Math 485, Graph Theory: Homework #3 Stephen G Simpson Due Monday, October 26, 2009 The assignment consists of Exercises 2129, 2135, 2137, 2218, 238, 2310, 2313, 2314, 2315 in the West textbook, plus the
More informationLecture 7. s.t. e = (u,v) E x u + x v 1 (2) v V x v 0 (3)
COMPSCI 632: Approximation Algorithms September 18, 2017 Lecturer: Debmalya Panigrahi Lecture 7 Scribe: Xiang Wang 1 Overview In this lecture, we will use Primal-Dual method to design approximation algorithms
More informationLAMC Advanced Circle October 9, Oleg Gleizer. Warm-up
LAMC Advanced Circle October 9, 2016 Oleg Gleizer prof1140g@math.ucla.edu Warm-up Problem 1 Prove that a straight line tangent to a circle is perpendicular to the radius connecting the tangency point to
More informationand 6.855J March 6, Maximum Flows 2
5.08 and.855j March, 00 Maximum Flows Network Reliability Communication Network What is the maximum number of arc disjoint paths from s to t? How can we determine this number? Theorem. Let G = (N,A) be
More informationLecture 11: Clustering and the Spectral Partitioning Algorithm A note on randomized algorithm, Unbiased estimates
CSE 51: Design and Analysis of Algorithms I Spring 016 Lecture 11: Clustering and the Spectral Partitioning Algorithm Lecturer: Shayan Oveis Gharan May nd Scribe: Yueqi Sheng Disclaimer: These notes have
More informationMTH 362 Study Guide Exam 1 System of Euclidean Geometry 1. Describe the building blocks of Euclidean geometry. a. Point, line, and plane - undefined
MTH 362 Study Guide Exam 1 System of Euclidean Geometry 1. Describe the building blocks of Euclidean geometry. a. Point, line, and plane - undefined terms used to create definitions. Definitions are used
More informationA Verification Based Method to Generate Cutting Planes for IPs
A Verification Based Method to Generate Cutting Planes for IPs Santanu S. Dey Sebastian Pokutta Georgia Institute of Technology, USA. Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany. SIAM Conference
More informationDiscrete Wiskunde II. Lecture 6: Planar Graphs
, 2009 Lecture 6: Planar Graphs University of Twente m.uetz@utwente.nl wwwhome.math.utwente.nl/~uetzm/dw/ Planar Graphs Given an undirected graph (or multigraph) G = (V, E). A planar embedding of G is
More informationLinear Programming and its Applications
Linear Programming and its Applications Outline for Today What is linear programming (LP)? Examples Formal definition Geometric intuition Why is LP useful? A first look at LP algorithms Duality Linear
More informationLinear Programming Duality and Algorithms
COMPSCI 330: Design and Analysis of Algorithms 4/5/2016 and 4/7/2016 Linear Programming Duality and Algorithms Lecturer: Debmalya Panigrahi Scribe: Tianqi Song 1 Overview In this lecture, we will cover
More informationLecture 7: Asymmetric K-Center
Advanced Approximation Algorithms (CMU 18-854B, Spring 008) Lecture 7: Asymmetric K-Center February 5, 007 Lecturer: Anupam Gupta Scribe: Jeremiah Blocki In this lecture, we will consider the K-center
More informationThe Encoding Complexity of Network Coding
The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email mikel,spalex,bruck @caltech.edu Abstract In the multicast network
More informationImpact of Network Coding on Combinatorial Optimization
Impact of Network Coding on Combinatorial Optimization Chandra Chekuri Univ. of Illinois, Urbana-Champaign DIMACS Workshop on Network Coding: Next 15 Years December 16, 015 Network Coding [Ahlswede-Cai-Li-Yeung]
More informationLecture 10,11: General Matching Polytope, Maximum Flow. 1 Perfect Matching and Matching Polytope on General Graphs
CMPUT 675: Topics in Algorithms and Combinatorial Optimization (Fall 2009) Lecture 10,11: General Matching Polytope, Maximum Flow Lecturer: Mohammad R Salavatipour Date: Oct 6 and 8, 2009 Scriber: Mohammad
More informationACO Comprehensive Exam October 12 and 13, Computability, Complexity and Algorithms
1. Computability, Complexity and Algorithms Given a simple directed graph G = (V, E), a cycle cover is a set of vertex-disjoint directed cycles that cover all vertices of the graph. 1. Show that there
More informationCONNECTIVITY CHECK IN 3-CONNECTED PLANAR GRAPHS WITH OBSTACLES
CONNECTIVITY CHECK IN 3-CONNECTED PLANAR GRAPHS WITH OBSTACLES M. M. KANTÉ 1 B. COURCELLE 1 C. GAVOILLE 1 A. TWIGG 2 1 Université Bordeaux 1, LaBRI, CNRS. 2 Computer Laboratory, Cambridge University. Topological
More information/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18
601.433/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18 22.1 Introduction We spent the last two lectures proving that for certain problems, we can
More informationDO NOT RE-DISTRIBUTE THIS SOLUTION FILE
Professor Kindred Math 104, Graph Theory Homework 2 Solutions February 7, 2013 Introduction to Graph Theory, West Section 1.2: 26, 38, 42 Section 1.3: 14, 18 Section 2.1: 26, 29, 30 DO NOT RE-DISTRIBUTE
More informationMathematical and Algorithmic Foundations Linear Programming and Matchings
Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis
More informationLecture Overview. 2 The Steiner Tree Problem. 2.1 Steiner tree: a 2-approximation algorithm. COMPSCI 590.1: Graph Algorithms March 22, 2015
COMPCI 590.1: Graph Algorithms March 22, 2015 Lecturer: Debmalya Panigrahi Lecture 16-17 cribe: Yuhao Hu 1 Overview The main topics of this lecture are the offline edge-weighted teiner tree and teiner
More informationMinimum Weight Constrained Forest Problems. Problem Definition
Slide 1 s Xiaoyun Ji, John E. Mitchell Department of Mathematical Sciences Rensselaer Polytechnic Institute Troy, NY, USA jix@rpi.edu, mitchj@rpi.edu 2005 Optimization Days Montreal, Canada May 09, 2005
More informationComputer Science 280 Fall 2002 Homework 10 Solutions
Computer Science 280 Fall 2002 Homework 10 Solutions Part A 1. How many nonisomorphic subgraphs does W 4 have? W 4 is the wheel graph obtained by adding a central vertex and 4 additional "spoke" edges
More informationLight Spanners with Stack and Queue Charging Schemes
Light Spanners with Stack and Queue Charging Schemes Vincent Hung 1 1 Department of Math & CS Emory University The 52nd Midwest Graph Theory Conference, 2012 Outline Motivation Metrical Optimization Problems
More information8 NP-complete problem Hard problems: demo
Ch8 NPC Millennium Prize Problems http://en.wikipedia.org/wiki/millennium_prize_problems 8 NP-complete problem Hard problems: demo NP-hard (Non-deterministic Polynomial-time hard), in computational complexity
More informationIn this lecture, we ll look at applications of duality to three problems:
Lecture 7 Duality Applications (Part II) In this lecture, we ll look at applications of duality to three problems: 1. Finding maximum spanning trees (MST). We know that Kruskal s algorithm finds this,
More informationReductions. Linear Time Reductions. Desiderata. Reduction. Desiderata. Classify problems according to their computational requirements.
Desiderata Reductions Desiderata. Classify problems according to their computational requirements. Frustrating news. Huge number of fundamental problems have defied classification for decades. Desiderata'.
More informationShannon Switching Game
EECS 495: Combinatorial Optimization Lecture 1 Shannon s Switching Game Shannon Switching Game In the Shannon switching game, two players, Join and Cut, alternate choosing edges on a graph G. Join s objective
More information3. Voronoi Diagrams. 3.1 Definitions & Basic Properties. Examples :
3. Voronoi Diagrams Examples : 1. Fire Observation Towers Imagine a vast forest containing a number of fire observation towers. Each ranger is responsible for extinguishing any fire closer to her tower
More informationApproximation slides 1. An optimal polynomial algorithm for the Vertex Cover and matching in Bipartite graphs
Approximation slides 1 An optimal polynomial algorithm for the Vertex Cover and matching in Bipartite graphs Approximation slides 2 Linear independence A collection of row vectors {v T i } are independent
More information6 Randomized rounding of semidefinite programs
6 Randomized rounding of semidefinite programs We now turn to a new tool which gives substantially improved performance guarantees for some problems We now show how nonlinear programming relaxations can
More informationOn the multiple unicast network coding conjecture
On the multiple unicast networ coding conjecture The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Langberg,
More informationDual-fitting analysis of Greedy for Set Cover
Dual-fitting analysis of Greedy for Set Cover We showed earlier that the greedy algorithm for set cover gives a H n approximation We will show that greedy produces a solution of cost at most H n OPT LP
More informationMth 97 Winter 2013 Sections 4.3 and 4.4
Section 4.3 Problem Solving Using Triangle Congruence Isosceles Triangles Theorem 4.5 In an isosceles triangle, the angles opposite the congruent sides are congruent. A Given: ABC with AB AC Prove: B C
More informationMVE165/MMG631 Linear and integer optimization with applications Lecture 9 Discrete optimization: theory and algorithms
MVE165/MMG631 Linear and integer optimization with applications Lecture 9 Discrete optimization: theory and algorithms Ann-Brith Strömberg 2018 04 24 Lecture 9 Linear and integer optimization with applications
More informationTraveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R + Goal: find a tour (Hamiltonian cycle) of minimum cost
Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R + Goal: find a tour (Hamiltonian cycle) of minimum cost Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R
More informationCS 473: Algorithms. Ruta Mehta. Spring University of Illinois, Urbana-Champaign. Ruta (UIUC) CS473 1 Spring / 29
CS 473: Algorithms Ruta Mehta University of Illinois, Urbana-Champaign Spring 2018 Ruta (UIUC) CS473 1 Spring 2018 1 / 29 CS 473: Algorithms, Spring 2018 Simplex and LP Duality Lecture 19 March 29, 2018
More informationCSE 417 Network Flows (pt 3) Modeling with Min Cuts
CSE 417 Network Flows (pt 3) Modeling with Min Cuts Reminders > HW6 is due on Friday start early bug fixed on line 33 of OptimalLineup.java: > change true to false Review of last two lectures > Defined
More informationThe k-center problem Approximation Algorithms 2009 Petros Potikas
Approximation Algorithms 2009 Petros Potikas 1 Definition: Let G=(V,E) be a complete undirected graph with edge costs satisfying the triangle inequality and k be an integer, 0 < k V. For any S V and vertex
More informationV :non-empty vertex ornode set E V V :edge set G (V, E) :directed graph on V, or digraph on V
-93-11. Graph Theory Example: V :non-empty vertex ornode set E V V :edge set G (V, E) :directed graph on V, or digraph on V b e f V={a, b, c, d, e, f, g} a c d f E={(a,b), (b,c), (c,a),... } Note: (a,
More informationPlanarity. 1 Introduction. 2 Topological Results
Planarity 1 Introduction A notion of drawing a graph in the plane has led to some of the most deep results in graph theory. Vaguely speaking by a drawing or embedding of a graph G in the plane we mean
More informationbe a polytope. has such a representation iff it contains the origin in its interior. For a generic, sort the inequalities so that
( Shelling (Bruggesser-Mani 1971) and Ranking Let be a polytope. has such a representation iff it contains the origin in its interior. For a generic, sort the inequalities so that. a ranking of vertices
More information