Constant-Time Distributed Dominating Set Approximation*

Size: px
Start display at page:

Download "Constant-Time Distributed Dominating Set Approximation*"

Transcription

1 Costat-Time Distributed Domiatig Set Approximatio* Fabia Kuh Departmet of Computer Sciece ETH Zurich 8092 Zurich, Switzerlad if.ethz.ch Roger Wattehofer Departmet of Computer Sciece ETH Zurich 8092 Zurich, Switzerlad if.ethz.ch ABSTRACT Fidig a small domiatig set is oe of the most fudametal problems of traditioal graph theory. I this paper, we preset a ew fully distributed approximatio algorithm based o LP relaxatio techiques. For a arbitrary parameter k ad maximum degree A, our algorithm computes a domiatig set of expected size O(kA 2/k log AIDSoPTI) i O(k 2) rouds where each ode has to sed O(k2A) messages of size O(logA). This is the first algorithm which achieves a o-trivial approximatio ratio i a costat umber of rouds. Categories ad Subject ]Descriptors F.2.2 [Aalysis of Algorithms ad Problem Complexity]: Noumerical Algorithms ad Problems--computatios o discrete structures; G.2.2 [Discrete Mathematics[: Graph Theory--graph algorithms; G.2.2 [Discrete Mathematics]: Graph Theory--etwork problems Geeral Terms Algorithms, Theory Keywords Domiatig Sets, Approximatio Algorithms, Distributed Algorithms, Liear Programmig, Ad-Hoc Networks. INTRODUCTION I a graph, a domiatig set is a subset of odes such that for every ode v either a) v is i the domiatig set or b) a direct eighbor of v is i the domiatig set. The miimum domiatig set (MDS) problem asks for a domiatig set of *The work preseted i this paper was supported (i part) by the Natioal Competece Ceter i Research o Mobile Iformatio ad Commuicatio Systems (NCCR-MICS), a ceter supported by the Swiss Natioal Sciece Foudatio uder grat umber Permissio to make digital or hard copies of all or part of this work for persoal or classroom use is grated without f provided that copies arc ot made or distributed for profit or commercial advatage ad that copies bear this otice ad the full citatio o the first page. To copy otherwise, or rcpublish, to post o servers or to redistribute to lists, requires prior specific permissio ad/or a fee. PODC'03, July 3-6, 2003, Bosto, Massachusetts, USA. Copyright 2003 ACM K~3/ $5.00. miimum size. MDS ad the closely related miimum set cover problem are two of the first problems that have bee show to be NP-hard [8, 2]. I this paper, we preset a distributed approximatio algorithm for MDS. I computer etworks it is ofte desirable to have a domiatig set i order to eable a hierarchical structure i which the members of the domiatig set provide a service for their eighbors. A particular applicatio ca be foud i the fast growig field of mobile ad-hoc etworks. I mobile ad-hoc etworks, wireless devices (called odes) commuicate without statioary server ifrastructure. Whe sedig a message from oe ode to aother, itermediate etwork odes have to serve as reuters. Although a umber of iterestig suggestios have bee made, fidig efficiet algorithms for the routig process remais the most importat problem for adhoc etworks. Sice the topology of a ad-hoc etwork is costatly chagig, routig protocols for ad-hoc etworks differ sigificatly from the stadard routig schemes which are used i wired etworks. Oe effective way to improve the performace of routig algorithms is by groupig odes ito clusters. The routig is the doe betwee clusters. The most basic method for clusterig is by calculatig a domiatig set. Oly the odes of the domiatig set (the 'cluster heads') act as reuters, all other odes commuicate via a eighbor i the domiatig set. Betwee traditioal wired etworks ad mobile ad-hoc etworks two mai distictios ca be made: ) typically wireless devices have much lower badwidth tha their wired couterparts ad 2) wireless devices are mobile ad therefore the topology of the etwork chages rather frequetly. As a cosequece, distributed algorithms which ru o such devices should have as little commuicatio as possible ad they should ru as fast as possible. Both goals ca oly be achieved by developig algorithms requirig a small umber of commuicatio rouds oly (ofte called local algorithms). So far, the oly algorithm which achieves a otrivial approximatio ratio--o(a)--i a otrivial umber of rouds--o(diam(g))--for MDS was developed by Jia, Rajarama, ad Suel [0]. I expectatio, their algorithm achieves a O(logA)-approximatio while the umber of rouds is O(loglogA) with high probability. I this paper, we preset the first distributed MDS algorithm which achieves a otrivial approximatio ratio i a costat umber of rouds. Precisely, for a arbitrary parameter k, i O(k 2) rouds, we achieve a expected approximatio ratio of O(kA 2/k log A). All messages are of size O(log A). 25

2 The paper is structured i the followig way. Sectio 2 gives a overview over relevat previous work, Sectio 3 itroduces some otatio as well as some well-kow facts, ad i Sectios 4 ad 5 the domiatig set algorithm is developed. Thereby Sectio 4 itroduces the fractioal domiatig set problem (LP relaxatio) ad presets a algorithm to deduce a domiatig set from a solutio to the fractioal variat of the problem, whereas Sectio 5 shows how to approximate the fractioal domiatig set problem by meas of a distributed algorithm. The paper is cocluded i Sectio RELATED WORK The problem of fidig small domiatig sets i a graph ad the closely related problem of fidig small set covers has extesively bee studied over the last 30 years. The problem of fidig a miimum domiatig set has bee prove to be NP-hard i [8, 2]. The best kow approximatio is achieved by the greedy algorithm [, 4, 8]. As log as there are ucovered odes, the greedy algorithm picks a ode which covers the biggest umber of ucovered odes ad puts it ito the domiatig set. It achieves a approximatio ratio of I A where A is the highest degree i the graph. Uless the problems of NP ca be solved by determiistic 0 gl s ) algorithms, this is the best possible up to lower order terms [6]. For the related problem of fidig small coected domiatig sets, a similar approach is show to be a (l A + O())-approximatio i [9]. For the distributed costructio of domiatig sets, several algorithms have bee developed. I [3] a algorithm which calculates a domiatig set of size at most /2 i O(log*) rouds has bee proposed. [9] presets a (coected) domiatig set algorithm which rus i a costat umber of rouds. Noe of those algorithms achieves a o-trivial asymptotic boud o the approximatio ratio. Note that O(A) is trivial sice the set V of all odes of G forms a domiatig set of size at most (A + ) times the size of a optimal oe. The first algorithm which achieves a otrivial approximatio ratio i less tha O(diam(G)) rouds was preseted i [0]. The expected approximatio ratio is asymptotically optimal--o(log A)--ad the algorithm termiates after O(loglog A) rouds with high probability. The algorithm of [0] is related to the parallel set cover algorithms i [3, 6], which achieve O(log A) approximatios i polylogarithmic time. For the coected domiatig set problem, a distributed algorithm which also achieves a approximatio ratio of O(log A) i a polylogarithmic umber of rouds has bee preseted i [5], recetly. I our algorithm, we first solve the LP relaxatio--a positive liear program---of MDS. Parallel ad distributed algorithms for positive liear programmig have bee studied i [5] ad [2], respectively. I polylogarithmic time they both achieve a ( + e)-approximatio for the liear program. For ad-hoc etworks, the (coected) domiatig set problem has also bee studied for special graphs. I particular for the uit disk graph a umber of publicatios have bee writte (e.g. [, 7]). For the uit disk graph the problem is kow to remai NP-hard; however, costat factor approximatios are possible i this case. For a recet survey o ad-hoc routig ad related problems, we refer to [7]. 3. NOTATION AND PRELIMINARIES I this sectio we itroduce otatios as well as some mathematical theorems which are used i the paper. The subject of this paper is the distributed costructio of domiatig sets of a etwork graph G = (V, E). For coveiece, we assume that V = {vl, v2,..., v~}, i.e. we assume that the etwork odes are labeled from to. These labels are ot used i our algorithms, but they simplify some proofs. By Ni, we deote the closed eighborhood of v~, i.e. Ni icludes v~ as well as all direct eighbors of vi. Where appropriate, Ni also deotes the set of the idices of the odes i N~. The degree of a ode v~ is called 5~ whereas A deotes the maximum degree i the etwork graph G. We will ofte make use of the maximum degree i a certai rage aroud a ode vi. For this purpose we defie 5~ ) ad 5~ 2) :,,~) :-~- maxsj, 5~2) := maxs!). jen i jen~ 3 Thus 5~) is the maximum degree of all odes i the closed eighborhood Ni of v~ whereas 5~2) is the maximum degree amog all odes at distace at most 2 from vi. For our algorithms, we use a purely sychroous model for commuicatio. That is, i every commuicatio roud, each ode is allowed to sed a message to each of its direct eighbors i G. I priciple, those messages ca be of arbitrary size; however, our algorithms oly use messages of size O(log A). We coclude this sectio by givig two facts which will the be used i subsequet sectios. Proofs are omitted ad ca be foud i stadard mathematical text books. FACT 3.. (Meas Iequality) Le.,4 C R + be a set of positive real umbers. The product of the values i.,4 ca be upper bouded by replacig each factor with the arithmetic mea of the elemets of A: ri -< x ~4 FACT 3.2. For > x >, we have 4. APPROXIMATING MDS BY LP RELAX- ATION The Miimum Domiatig Set (MDS) problem has bee itroduced i Sectio. I this sectio, we show how to obtai a I A approximatio by usig LP relaxatio techiques. For a itroductio to liear programmig see e.g. [4]. We first derive the iteger program which describes the MDS problem. Let S C V deote a subset of the odes of G. To each vi E V, we assig a bit xl such that x~ = ~ vi E S. For S to be a domiatig set, we have to demad that for each ode vi E V, at least oe of the odes i N~ is i S. Therefore, S is a domiatig set of G if ad oly if Vi E [,] : ~,eg.xj >. We defie the eighborhood matrix N to be the sum of the adjacecy matrix of G ad the <_ 26

3 idetity matrix (N is the adjacecy matrix with oes i the diagoal). The MDS problem ca the be formulated as a iteger program: subject to mi ~ xl i=l N - _x >_._ ~e {0,F. (IPMDs) By relaxig the coditio x E {0, } ~ to x > 0, we get the followig liear program: mi ~ xi i= subject to N x > x>o. (LPMDs) I the literature, the LP form of the domiatig set problem has also bee amed fractioal domiatig set problem. The correspodig dual liear program looks very similar to LPMDs: max ~ Yi i---- subject to N - y _<! _y _>_0. (DLPMDS) We have to assig a positive value yi to each ode vl. The sum of the y-values of the odes i the eighborhood Ni of a ode vi has to be less tha or equal to (for the correspodig x-values, this sum has to be greater tha or equal to ) ad the sum of all y-values, i.e. the objective fuctio has to be maximized. As a cosequece we get the followig lower boud o the size of a miimum domiatig set. LEMMA 4.. Let ~) be the maximum of the degrees of all odes i Ni as defied i Sectio 3. For ay domiatig set DS (i. e. also for a optimal oe), we have ~}a----y----- <-IDSI. i=l "- PROOF. Assigig yi := /(5~)+ ) yields a feasible solutio to the dual liear program DLPMDs. By the weak duality theorem, the value of the objective fuctio for ay feasible solutio for DLPMDs is smaller or equal to the value of the objective fuctio for ay feasible solutio for LPMDs. Hece, the objective fuctio for the DLPMDs-solutio is also smaller or equal to the size of ay domiatig set because ay feasible solutio for the iteger program IPMDs is feasible for LPMDs too. [] Let x* be a optimal solutio for LPMDs. Further let x (=) be a a-approximatio for LPMD$, i.e. x (=) is a feasible solutio for which _(4) < ~. ~ xt. (i) i=i i= I order to get a approximate solutio XDS for IPMDs from a a-approximatio x (s) for LPMDs, each ode applies the distributed Algorithm. Algorithm LPMDs ~ IPMDs Iput: feasible solutio _x (~) for LPMDs Output: IPMDs-Solutio X_D s (dom. set) : calculate 5~2) 2: pi := mi{, xi'(~), l(5~2)+ )} 0 with probability pl 3: XDS,i := otherwise 4: sed XDS# to all eighbors 5: if XDSj = 0 for all j E Ni the 6: XDS,i :---- 7: fi Remark: I lie 2, ~2) is calculated as follows. I a first roud, each ode vi seds its degree 5j to all eighbors. Afterwards 3~) (:= maxj~g~ ~k) is set to all eighbors i a secod roud. ~i~ 2) ca the be computed as maxj~ni ~). THEOREM 4.2. Let DSOPT be a miimum domiatig set ad let ~ be the greatest degree of the etwork graph G. ~'~) is a a-approximatio for LPMDs ad _XDs is the IPMDssolutio calculated by Algorithm with _x (~) as its iput. For the expected value of the size of the correspodig domiatig set DS (vi E DS ==~ xds,i = ), we have E [IDS[] < ( + al(a + ))-[DSoPT[. PROOF. A ode ca become a member of the domiatig set i lies 3 ad 6 of Algorithm. Let the radom variables X ad Y deote the umbers of odes which are selected i lies 3 ad 6, respectively. For the the expected value of X, we have IX] ---- Zpi <_ ~'~"~x!~) ) l(5~2)+, i=l i=0 <_ l(a + ) ~ ~i-(~) (zx_>6} 2)) i=i Eq. () i=o < a l(,~ + ). [DSoPT[. I order to compute the expected value of Y, we look at the probability ql that o ode i the direct eighborhood of ode vi (i.e. o ode i Ni) has bee selected. If ~j -(~) l(5~ 2)) ~_ for a vj E Ni, the correspodigpj = ad therefore qi = 0. Thus, we oly have to cosider the case 27

4 where all pj <. We obtai q~ = H(-pj) <_ H (- xj-(~)l(5})+ )) jeni jeni _< (l_~jen-(odl(5}l)-bl)) 5'+axiS~ + _< 5 + <_ e- ~(~?)+) 5} ) + The first iequality follows from 5} ) _< 5J 2), the secod iequality follows from Fact 3., the third iequality holds because _x (~) is feasible ad therefore the sum ~jen~ xj-('~) _>, ad the fourth iequality follows from Fact 3.2. For E [Y], we the have E[Y] = Eqi < () <- I DS PTI' ~= i= 5i + The last iequality follows from Lemma 4.. Addig E IX] ad E [Y] cocludes the proof. [] Remark : I lie 3 of Algorithm we could multiply xi with (l(5~(~) + ) - ll(5,(~ ) + )) istead of l(5~(~ ) + ). We would the obtai qi _< l(a + )/(5~ ) + ) ad the expected total size of the resultig domiatig set would be less tha or equal to 2a(l(A + ) - ll(a + )) IDSoPT [. Remark 2: Note that for regular graphs, Algorithm provides a very simple distributed algorithm to approximate MDS. Let the degree of each ode of a regular graph be 5. Assigig x~ := /(~ + ) for all odes vi yields a optimal solutio for LPMDs- Applyig Algorithm the results i a ( + l(5 + ))-approximatio for the MDS problem. I [6], Feige has prove that the domiatig set problem caot be approximated better tha by a approximatio ratio of la uless NP E DTIME( 0 gl g'~)) (up to lower order terms). Hece, uless NP almost equals P, the above algorithm is optimal whe applied to a optimal solutio of the LP relaxatio LPMDs of the domiatig set problem. However, the stregth of the approach of Algorithm lies i the potetial of distributig the calculatio over the odes of the etwork graph. Whe applied o a sigle computer, the greedy algorithm achieves the same approximatio ratio i time O(A) [8] while computig the liear program LPMDs with a iterior poit method would take sigificatly loger. I the ext sectio, we will show how to compute a approximatio of the liear program LPMDs usig a distributed algorithm. 5. APPROXIMATING THE LINEAR PRO- GRAM I this sectio, we preset the mai algorithm of this paper. We show how to fid a O(kA2/k)-approximatio of LPMDs i O(k 2) rouds. We will preset the algorithm i two variats. For the sake Of simplicity ad clarity, we will first preset a algorithm for the case that all odes kow the highest degree A i the etwork. I a secod step, we will the geeralize this algorithm such that the kowledge of A is ot ecessary ay more. Durig the algorithms, the odes icrease their x-values over time. I accordace with other domiatig set papers (e.g. [9, 0]), we say that a ode vl is colored gray as soo as the sum of the weights xj for vj E N~ exceeds, i.e. as soo as the ode is covered. Iitially all odes are colored white. The umber of white odes vj E N/at a give time is called the dyamic degree of vi ad deoted by 5(vi). Whe startig the algorithms, all odes are white, thus 5(vi) = 5/+. Assume ow that all odes kow A, the maximum degree of the etwork. Algorithm 2 is sychroously executed by all odes (a(vl) ad zi are auxiliary variables which are explaied later). Algorithm 2 LPMDs approximatio (A kow) : xi := 0; 2: for g := k- l to 0 by -l do 3: (* 5(v~) _< (A-.~....) (~+~)/k, z~ :=: 0 *) 4: form:=k- to0by- do 5: (, a(v~) < (zx + ) ('~+~)/~,) 6: sed color/ to all eighbors; 7: 5(vi) := [{j e Ni I colorj = 'white'}l; 8: if 5(vi) >_ (A + ) e/k the 9: ~ := max {~. ~x;~7=r~ ) 0: fi; : sed x/ to all eighbors; 2: if ~egxj > the colorl := 'gray' fi; 3: od 4: (. z./, < /(A + ) (~-j)/~ *) 5: od Before comig to a detailed aalysis of Algorithm 2, we give a geeral overview. Durig the algorithm, each ode v~ calculates the correspodig compoet xl of the solutio for LPMDs. Iitially all xi are set to 0, they are the gradually icreased as the algorithm progresses. The algorithm cosists of two ested loops. The purpose of the outer loop is to gradually reduce the highest dyamic degree i the etwork. As idicated by the ivariat i lie 3, 5(vl) is reduced by a factor (A + ) /k i every iteratio of the outer loop. I the ier loop, the x-values are icreased stepwise. By this we ca guaratee that the total weight is ot too high. Lemma 5. explais the ivariat of lie 3. LEMMA 5.. At the begiig of each iteratio of the outer loop off Algorithm 2, i.e. at lie 3, the dyamic degree 5(vl) of each ode vi is 5(vi) <_ (A + ) (e+l)/k. PROOF. For = k - the coditio reduces to 5(v/) < A + ad therefore follows from the defiitio of A. For all other iteratios the lemma is true because i the very last step of the precedig iteratio ( + ), all odes with 28

5 5(vi) >_ (A + ) (e+~)/~ have set x~ := i lie 9. By this all odes i Ni have tured gray ad therefore 5(vl) has become 0. Thus all degrees exceedig (zh + ) (~+l)/a have bee set to 0, for all others the ivariat already held beforehad. [] I a sigle iteratio of the outer loop, oly odes with ~(vi) > (A + ) e/~ icrease their x-value (lies 8-0). We call those odes active. The umber of active odes i the closed eighborhood Ni of a white ode vi at the begiig of a ier-loop iteratio (lie 5) is called a(vi). We defie a(vi) := 0 if vi is a gray ode. The purpose of the ier loop is to gradually reduce the maximum a(v) i the graph (ivariat i lie 5): LEMMA 5.2. At the begiig of each iteratio of the ier loop of Algorithm 2, i.e. at lie 5, a(vi) < (A+I) (m+l)/k for all odes v~ ~ V. PROOF. For m = k - we have a(vl) _< (zx + ) which is always true. For the other, cases, we prove that all odes vi with a(vi) too high have bee covered i the previous iteratio of the ier loop (i.e. they have become gray ad therefore a(vi) has become 0). We show that all odes vi for which a(vi) > (A + ) m/k at lie 5 are colored gray at the ed of the ier-loop iteratio (i.e. after lie 4). All active odes vj icrease xj such that xj _> /(zx+ ) m/k (lies 8-0 of Algorithm 2). If a(vi) > (A + ) m/~ there are more tha (A + ) m/k active odes i N~;. Therefore the sum of the x-values i N~ is greater or equal to after lie 0. [] I order to cout the weights assiged durig the iteratios of the ier loop, we assig a w~riable zi to each ode vi. I lie 3 all zi are set to 0. Wheever a ode vi icreases x~, the additioal weight is equally distributed amog the zj of all the odes vj i Ni which are white before the icrease of xi.. Hece the sum of the z-values is always equal to the sum of the x-icreases durig the curret iteratio of the outer loop. We ca show that at the ed of every iteratio of the outer loop, i.e. at lie 4, all zi < /(,~+ ) (~-l)/k. Together with the ivariat i lie 3, this eables us to prove a boud o the total weight of the additioal x-values i each iteratio of the outer loop. LEMMA 5.3. At the ed of a iteratio of the outer loop of Algorithm 2, i.e. at lie 4, for all odes vl E V. (A +-) PROOF. Because zi is set to 0 i lie 3, we oly have to cosider a sigle iteratio of the outer loop, i.e. a period i which g remais costat, zi ca oly be icreased as log as vi is a white ode. The icreases all happe i lie 9 because oly there the x-values are icreased. For each white ode vi, we divide the iteratio of the outer loop ito two phases. The first phase cosists of all ier-loop iteratios where vi remais white. The secod phase cosist of the remaiig ier-loop iteratios where vi becomes or is gray. Durig ~ the whole first phase ~jen~ xj <. Because all icreases of x-values are distributed amog at least (A + ) ~/k z-values we therefore get Zi < ~jen i Xj < (2) for phase. I lie 9 of the first ier-loop iteratio of the secod phase, z~ gets its fial value because oly z- values of white odes are icreased. All active odes have already bee active i the precedig ier-loop iteratio because 5(vj) ca oly become smaller over time. Thus from the precedig iteratio, all active odes vj E Ni have xj > /(A + ) (m+l)/k. I lie 9 they are ow icreased to /(A + ) '~/k. The differece of this value is distributed amog at least (~ + ) ~/k z-values ad because the umber of active odes i Ni is a(vl), the icrease of zi is at most (~+)'~ (a+l)z'~ a(vi). (3) (zh + )~: To obtai a boud o z~, we have to add its value before the icrease which is give by Equatio (2). From Lemma 5.2 we kow that a(v,) < (A + ) (m+l)/k. Pluggig this ito the sum of (2) ad (3), we obtai z~ _< (A + ) ¼ _... (A + )~- (A+ )~ (A + )~ z' which cocludes the proof. [] We are ow ready to cosider the overall approximatioff ratio of Algorithm 2. THEOREM 5.4. For all etwork graphs G, Algorithm 2 computes a feasible solutio x for the liear program LPMDs such that x is a k(a + )2~k-approximatio of LPMDs. Further Algorithm 2 termiates after 2k 2 rouds. PROOF. For the umber of rouds, we see that each iteratio of the ier loop ivolves the sedig of two messages ad therefore takes two rouds. The umber of such iteratios is k 2. Further, the calculated x-values form a feasible solutio of LPMDs because i the very last iteratio of the ier loop (g = 0, m = 0) all odes vl with 5(vi) > set xi :=. This icludes all remaiig white odes. We prove the approximatio ratio of k(a + ) 2/k by showig that the additioal weight (i.e. sum of x-values) is upper-bouded by (A + ) 2/k i each iteratio of the outer loop. From Lemma 5., we kow that at lie 3, i.e. whe the iteratio starts, the dyamic degree 5(vl) of each ode vl is 5(vi) < (A + ) (t+l)/k. Hece there are at most (A + ) (t+l)/k o-zero z-values i the closed eighborhood of every ode v~ at the ed of a outer-loop iteratio at lie 4. Further Lemma 5.3 implies that all z-values are less tha or equal to (A + ) -(~-l)/k at lie 4. The sum of the z-values i the direct eighborhood of a ode vi durig each iteratio of the outer loop is 29

6 therefore upper-bouded by E z~ < (A+ )-~-- = (A+I)~. ~en, -- (ZX + ) -~-~ If we assig Yi := z~/(a + ) 2/k, the y-values form a feasible solutio for the dual LP DLPMDs because Vi : ~jen. Y~ <--. Hece the sum of all y-values is a lower boud o'the size of DSoPT ad therefore ~ z~ <_ (A + )u/aldsopw I for every iteratio of the outer loop. Because z is defied such that the sum over all z-values is equal to the sum over all icreases of the x-values, ad because there are k iteratios of the outer loop, we have i= _ < + ) ~ I DSoPTI. at the ed of Algorithm 2. [] The oly thig which caot be calculated locally i Algorithm 2 is the maximum degree ZX. Algorithm 3 is a adaptatio of Algorithm 2 where odes do ot eed to kow A. I each iteratio, Algorithm 3 assigs a xi which is greater or equal to the xi assiged i the correspodig iteratio of Algorithm 2. However, the xi are chose such that the approximatio ratio of k(a + ) 2/~ is preserved. Algorithm 3 LPMDs approximatio (A ot kow) : xi := 0; 2: calculate-i ~(2)., (. 2 corr.uicatio rouds *) := 5} 2) + ; 5(vi):= 5i + ; 4:for :=k- to0by-ldo 5: (* ~(vd < (~ + ) (~+~)I~, z~ := 0.) 6: form:=k- to0by- do 7: 2 if ~(vl) > 3 `()(vi) t+~ the 8: sed 'active ode' to all eighbors 9: fi; 0: a(vi) := I{J E Nilvj is 'active ode'}l; : if colori = 'gray' the a(vi) := 0 fi; 2: sed a(vi) to all eighbors; 3: a()(vi) := maxjen,{a(vj)}; 4: (, o.(,,d~ (~.(:~)(~) _< (~ + ) (m+~)/~ *) 5: 2 -Z-- if 5(vi) > 3`()(vi) ~+~ the 6: Xi := rax {xi,a()(vl) -~-f } 7: fi; 8: sed xi to all eighbors; 9: if ~je~v x~ >_ the colors := 'gray' fi; 20: sed colori to all eighbors; 2: 5(vi) := I{J e Ni I colors = 'white'} I 22: od; 23: (. zl _< (. ~- (zx -t-.):~/k)/@a)(v~) ~/(~+~) *) 24: sed 5(vi) to all eighbors; := maxjeg,{5(vj)}; 26: to all eighbors; := max3en,{@~)(vj)} 28: od As for Algorithm 2, we first itroduce some otatio. 3`(d)(vi) deotes the maximum dyamic degree of all odes with distace at most d from vi at the begiig of the outer-loop iteratio. We use the istead of 5(a)(vi) because 3`(d)(vi) remais costat durig a iteratio of the outer loop while 5(vi) potetially chages after every iteratio of the ier loop. I each ier-loop iteratio, all odes which assig a ew x-value i lie 6 of Algorithm 3 are called active. As before, a(vi) deotes the umber of active odes i the direct eighborhood Ni of a white ode vi; for gray odes a(vi) := 0. a()(vi) is the maximum a(vj) amog all j E Ni. 5(v~) ad zi are used as i the previous algorithm. We are ow showig that Lemma 5. ad Lemma 5.2 (cf. Lemma 5.5 ad 5.6) also hold for Algorithm 3. LEMMA 5.5. At the begiig of each iteratio of the outer loop of Algorithm 3, i.e. at lie 5, the dyamic degree 5(v~) of each ode vi is 5(v~) <_ (A + ) (~+l)/k. PROOF. We use iductio to prove the lemma. Aalogously to Lemma 5., for the first iteratio (~ = k - ), the lemma follows from the defiitio of A. To prove the lemma for subsequet iteratios (iteratio step), we show that as for Algorithm 2, all odes with 5(v~) >_ (A+ ) t/k set x~ := i the last iteratio (m = 0) of the ier loop. Accordig to lies 5-7 of the algorithm, we see that all odes with 5(vi) > 3`(2)(vl)e/(e+l) set xi := for m = 0. Hece we have to show that Vi :@2)(vi)e/(e+l) < (2~ + ) e/k. By the iductio hypothesis, we kow that Vi :5(vl) _< (A + ) (e+l)/k at the begiig of the outer-loop iteratio. Because 3`(2)(vi) represets 5(vj) of some ode vj i the two-hop eighborhood of v~, we also have Vi < (A + ) (e+l)/k ad therefore 3`(2)(vi)d-~ < (zx + ) ~ '-~ = (~ + ) ~. LEMMA 5.6. Before assigig a ew value xi to vi i lies 5-7 of Algorithm 3, a(vi) _< (~ + ) (m+l)/k for all odes vi EV. PROOF. As for Lemma 5.2, we prove that all odes v/ for which a(vi) > (A + ) m/k at lie 4 are colored gray at the ed of the ier-loop iteratio (i.e. after lie 2). We use iductio over the iteratios of the ier loop. By the defiitio of A for every first iteratio of the ier loop (a(v~) < A + ) ad by the iductio hypothesis for all other iteratios, we have Vi : a(v~) < (A + ) (m+l)/k at lie 4. Therefore the weight each active ode vj assigs i lie 6 is xj >,. -- a()(vj),,,.+l -- (ZX + )"L:",:;' (A + ) ~' Because odes vl with a(vi) _> (A + ) m/k have at least (~+ ) talk active odes i the direct eighborhood, they are covered after each of their a(vi) eighbor odes vj assigs a weight xj > /(A + ) m/k. [] Lemma 5.7 is the aalogue to Lemma 5.3. [] 30

7 LEMMA 5.7. At lie 23 of Algorithm 3, for all odes vi ~ V. zi + (~x + ) PROOF. As i Algorithm 2, z~ is set to 0 at lie 5. Therefore, we oly have to cosider a sigle iteratio of the outer loop. Agai we cosider two phases. I the iteratios of the first phase vi remais white, the secod phase cosists of the iteratios where vi becomes or is gray. While the algorithm is i the first phase ~jen i Xj <. Further, all icreases of values xj are distributed amog at least 7(2)(Vj) e/oe+l) ~ "~()(Vi) /( +) z-values. Therefore, i aalogy to (2), we have (4) xj z~ < ~ 7(~)(~,~ < ~ (5 ~en~ 70)(vi) r~r for phase. I lie 6 of the first ier-loop iteratio of the secod phase, zi is chaged for the last time because oly z-values of white odes are icreased. There each active eighbor xj cotributes at most._l_ to the values zi. Because a(vl) _< ao)(v~) ad because vi has a(v~) active odes i the closed eighborhood N~ the total icrease of z~ is at most,,, e.a(vi) = a(vi) m+l ~. (6) a(vi)~z~ 7 ()(vi) ~. ~- 7()(Vl) TM By Lemma 5.6, we have a(v~) < (A + ) (m+~)/k durig a iteratio of the ier loop. Pluggig this ito (6) ad addig the value of z~ from the precedig iteratios (5) cocludes the proof: ((A + ):"~-"~-) "y+' + (A+ )¼ + Zi ~ [] As for the other algorithm, we aalyze each outer-loop iteratio separately to determie the approximatio ratio of Algorithm 3. By the defiitio of z, the sum of the x-values of a outer-loop iteratio is equal to the sum of the correspodig z-values. By Lemma 5.7 the sum of the z-values i the closed eighborhood of a ode v~ i a sigle iteratio of the outer loop is E zj < - I+(A+I)~ ~ _L_.~(~). (7) 3eg~ 7()(v~) ~+ Because 70)(vi) is the maximum dyamic degree i N~, 5(vl) < 70)(vi). Equatio (7) ca thus be formulated as Ezj~(l+(A+l)~)7('>(vi)~ --~. (8) jeni By Lemma 5.5 we kow that 7()(v~) < (A + ) (e+l)/k ad therefore 7()(vi)T-~ -f < (z~x"-b ) /k. Pluggig this ito Equatio (8) yields E zj <_ (LX+i) /k+(~+) 2/k. jeni By dividig all zi by the right had side of the above iequality, we obtai a feasible solutio for DLPMDs: Zi Yi:= (A+i)~+(A+i) ~ ~ Eyi_<l. jen~ The sum of the z-values of a outer-loop iteratio is therefore at most by a factor (A + ) /k + (A + ) 2/k larger tha the size of a optimal domiatig set. At the ed of the algorithm the sum over all xi (objective fuctio of LPMDs) is equal to the sum over the sums of the z~ for each outer loop iteratio. Therefore EXi ~k ((~ + j.)l/k..~ (z~ --~ )Z/k) IDSoPT[. i= [] THEOREM 5.8. For all etwork graphs G, Algorithm 3 computes a feasible solutio x with approximatio ratio k ((~X -l- ) /k -F (A + ) z/k) for the liear program LPMDs Further Algorithm 3 termiates after 4k z + O(k) rouds. PROOF. The ruig time (i.e. umber of rouds) ca be determied as for Algorithm 2. I each iteratio of the ier loop, 4 messages have to be set. This yields 4k 2 rouds for the totally k 2 ier-loop iteratios. There is a costat umber of additioal rouds i each outer-loop iteratio as well as at the begiig of the algorithm. Together, we get the claimed 4k 2 + O(k) rouds. Aalogously to Algorithm 2 x is feasible because i the very last iteratio of the ier loop (~ = 0, m = 0), all white odes vi set xi :=. Combiig Algorithms 3 ad i we obtai a distributed domiatig set algorithm. THEOREM 5.9. Applyig Algorithm 3 to obtai a LPMDsapproximatio ad Algorithm to covert this approximatio ito a domiatig set yields a distributed algorithm for the miimum domiatig problem which achieves a approximatio ratio of O(k~2/k log ~x) i O(k 2) rouds. PROOF. Theorem 5.9 directly follows from Theorems 4.2 ad 5.8. [] Remark: By settig k = e(log~x), we obtai a algorithm which computes a O(log 2 ~) approximatio for MDS i O(log z ~x) rouds. 3

8 6. CONCLUSION I this paper, we preseted a distributed approximatio algorithm for the miimum domiatig set problem. By computig a O(kA 2/k log A)-approximatio i O(k 2) rouds it is the first algorithm which achieves a o-trivial approximatio ratio i a costat umber of rouds. Particularly i the cotext of mobile ad-hoc etworks but also i more geeral etwork settigs, we believe that it is ofte advatageous to deploy algorithms which are very fast eve whe the calculated solutio is ot as good as the solutio of a less local algorithm. 7. ACKNOWLEDGMENTS We would like to thak Maurice Cochad, Juraj Hromkovi~, David Peleg, Peter Widmayer, ad Aaro Zolliger for fruitful discussios about the subject. 8. REFERENCES [] K. Alzoubi, P.-J. Wa, ad O. Frieder. Message-Optimal Coected Domiatig Sets i Mobile Ad Hoc Networks. I Proc. of the 3rd A CM It. Symposium o Mobile Ad Hoc Networkig ad Computig (MobiHOC), pages 57-64, EPFL Lausae, Switzerlad, [2] Y. Bartal, J. W. Byers, ad D. Raz. Global Optimizatio Usig Local Iformatio with Applicatios to Flow Cotrol. I Proc. of the 38th IEEE Symposium o the Foudatios of Computer Sciece (FOCS), pages , 997. [3] B. Berger, J. Rompel, ad P. Shor. Efficiet NC Algorithms for Set Cover with Applicatios to Learig ad Geometry. Joural of Computer ad System Scieces, 49: , 994. [4] V. ChvAtal. Liear Programmig. W. H. Freema ad Compay, 983. [5] D. Dubhashi, A. Mei, A. Pacoesi, J. Radhakrisha, ad A. Sriivasa. Fast Distributed Algorithms for (Weakly) Coected Domiatig Sets ad Liear-Size Skeletos. I Proc. of the ACM-SIAM Symposium o Discrete Algorithms (SODA), pages , [0] L. Jia, R. Rajarama, ad R. Suel. A Efficiet Distributed Algorithm for Costructig Small Domiatig Sets. I Proc. of the 20th A CM Symposium o Priciples of Distributed Computig (PODC), pages 33-42, 200. [] D. S. Johso. Approximatio Algorithms for Combiatorial Problems. Joural of Computer ad System Scieces, 9: , 974. [2] R. M. Karp. Reducibility Amog Combiatorial Problems. I Proc. of a Symposium o the Complezity of Computer Computatios, pages 85-03, 972. [3] S. Kutte ad D. Peleg. Fast Distributed Costructio of Small k-domiatig Sets ad Applicatios. Joural of Algorithms, 28:40-66, 998. [4] L. Lovasz. O the Ratio of Optimal Itegral ad Fractioal Covers. Discrete Mathematics, 3: , 975. [5] M. Luby ad N. Nisa. A Parallel Approximatio Algorithm for Positive Liear Programmig. I Proc. of the 25th ACM Symposium o Theory of Computig (STOC), pages , 993. [6] S. Rajagopala ad V. Vazirai. Primal-Dual RNC Approximatio Algorithms for Set Cover ad Coverig Iteger Programs. SIAM Joural o Computig, 28: , 998. [7] R. Rajarama. Topology Cotrol ad Routig i Ad hoc Networks: A Survey. SIGACT News, 33:60-73, Jue [8] P. Slav[k. A Tight Aalysis of the Greedy Algorithm for Set Cover. I Proc. of the 28th A CM Symposium o Theory of Computig (STOC), pages , 996. [9] J. Wu ad H. Li. O Calculatig Coected Domiatig Set for Efficiet Routig i Ad Hoc Wireless Networks. I Proc. of the 3rd It. Workshop o Discrete Algorithms ad Methods for Mobile Computig ad Commuicatios (DialM), pages 7-4, 999. [6] U. Feige. A Threshold of I for Approximatig Set Cover. Joural of the ACM (JACM), 45(4): , 998. [7] J. Gao, L. Guibas, J. Hershberger, L. Zhag, ad A. Zhu. Discrete Mobile Ceters. I Proc. of the 7th aual symposium o Computatioal geometry (SCG), pages ACM Press, 200. [8] M. R. Garey ad D. S. Johso. Computers ad Itractability, A Guide to the Theory of NP-Completeess. W. H. Freema ad Compay, 979. [9] S. Guha ad S. Khuller. Approximatio Algorithms for Coected Domiatig Sets. I Proc. of the ~th Aual Europea Symposium o Algorithms (ESA), volume 36 of Lecture Notes i Computer Sciece, pages 79-93,

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations Applied Mathematical Scieces, Vol. 1, 2007, o. 25, 1203-1215 A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045, Oe

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

Counting the Number of Minimum Roman Dominating Functions of a Graph

Counting the Number of Minimum Roman Dominating Functions of a Graph Coutig the Number of Miimum Roma Domiatig Fuctios of a Graph SHI ZHENG ad KOH KHEE MENG, Natioal Uiversity of Sigapore We provide two algorithms coutig the umber of miimum Roma domiatig fuctios of a graph

More information

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured

More information

CSC165H1 Worksheet: Tutorial 8 Algorithm analysis (SOLUTIONS)

CSC165H1 Worksheet: Tutorial 8 Algorithm analysis (SOLUTIONS) CSC165H1, Witer 018 Learig Objectives By the ed of this worksheet, you will: Aalyse the ruig time of fuctios cotaiig ested loops. 1. Nested loop variatios. Each of the followig fuctios takes as iput a

More information

condition w i B i S maximum u i

condition w i B i S maximum u i ecture 10 Dyamic Programmig 10.1 Kapsack Problem November 1, 2004 ecturer: Kamal Jai Notes: Tobias Holgers We are give a set of items U = {a 1, a 2,..., a }. Each item has a weight w i Z + ad a utility

More information

Lecture 1: Introduction and Strassen s Algorithm

Lecture 1: Introduction and Strassen s Algorithm 5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access

More information

arxiv: v2 [cs.ds] 24 Mar 2018

arxiv: v2 [cs.ds] 24 Mar 2018 Similar Elemets ad Metric Labelig o Complete Graphs arxiv:1803.08037v [cs.ds] 4 Mar 018 Pedro F. Felzeszwalb Brow Uiversity Providece, RI, USA pff@brow.edu March 8, 018 We cosider a problem that ivolves

More information

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute

More information

Lecture 2: Spectra of Graphs

Lecture 2: Spectra of Graphs Spectral Graph Theory ad Applicatios WS 20/202 Lecture 2: Spectra of Graphs Lecturer: Thomas Sauerwald & He Su Our goal is to use the properties of the adjacecy/laplacia matrix of graphs to first uderstad

More information

Improved Random Graph Isomorphism

Improved Random Graph Isomorphism Improved Radom Graph Isomorphism Tomek Czajka Gopal Paduraga Abstract Caoical labelig of a graph cosists of assigig a uique label to each vertex such that the labels are ivariat uder isomorphism. Such

More information

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects. The

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

Outline and Reading. Analysis of Algorithms. Running Time. Experimental Studies. Limitations of Experiments. Theoretical Analysis

Outline and Reading. Analysis of Algorithms. Running Time. Experimental Studies. Limitations of Experiments. Theoretical Analysis Outlie ad Readig Aalysis of Algorithms Iput Algorithm Output Ruig time ( 3.) Pseudo-code ( 3.2) Coutig primitive operatios ( 3.3-3.) Asymptotic otatio ( 3.6) Asymptotic aalysis ( 3.7) Case study Aalysis

More information

Characterizing graphs of maximum principal ratio

Characterizing graphs of maximum principal ratio Characterizig graphs of maximum pricipal ratio Michael Tait ad Josh Tobi November 9, 05 Abstract The pricipal ratio of a coected graph, deoted γg, is the ratio of the maximum ad miimum etries of its first

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time ( 3.1) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step- by- step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

Analysis of Algorithms

Analysis of Algorithms Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Ruig Time Most algorithms trasform iput objects ito output objects. The

More information

1 Graph Sparsfication

1 Graph Sparsfication CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider

More information

Data Structures and Algorithms. Analysis of Algorithms

Data Structures and Algorithms. Analysis of Algorithms Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output

More information

15-859E: Advanced Algorithms CMU, Spring 2015 Lecture #2: Randomized MST and MST Verification January 14, 2015

15-859E: Advanced Algorithms CMU, Spring 2015 Lecture #2: Randomized MST and MST Verification January 14, 2015 15-859E: Advaced Algorithms CMU, Sprig 2015 Lecture #2: Radomized MST ad MST Verificatio Jauary 14, 2015 Lecturer: Aupam Gupta Scribe: Yu Zhao 1 Prelimiaries I this lecture we are talkig about two cotets:

More information

Lecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein

Lecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein 068.670 Subliear Time Algorithms November, 0 Lecture 6 Lecturer: Roitt Rubifeld Scribes: Che Ziv, Eliav Buchik, Ophir Arie, Joatha Gradstei Lesso overview. Usig the oracle reductio framework for approximatig

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

c-dominating Sets for Families of Graphs

c-dominating Sets for Families of Graphs c-domiatig Sets for Families of Graphs Kelsie Syder Mathematics Uiversity of Mary Washigto April 6, 011 1 Abstract The topic of domiatio i graphs has a rich history, begiig with chess ethusiasts i the

More information

1.2 Binomial Coefficients and Subsets

1.2 Binomial Coefficients and Subsets 1.2. BINOMIAL COEFFICIENTS AND SUBSETS 13 1.2 Biomial Coefficiets ad Subsets 1.2-1 The loop below is part of a program to determie the umber of triagles formed by poits i the plae. for i =1 to for j =

More information

New Results on Energy of Graphs of Small Order

New Results on Energy of Graphs of Small Order Global Joural of Pure ad Applied Mathematics. ISSN 0973-1768 Volume 13, Number 7 (2017), pp. 2837-2848 Research Idia Publicatios http://www.ripublicatio.com New Results o Eergy of Graphs of Small Order

More information

The Adjacency Matrix and The nth Eigenvalue

The Adjacency Matrix and The nth Eigenvalue Spectral Graph Theory Lecture 3 The Adjacecy Matrix ad The th Eigevalue Daiel A. Spielma September 5, 2012 3.1 About these otes These otes are ot ecessarily a accurate represetatio of what happeed i class.

More information

Homework 1 Solutions MA 522 Fall 2017

Homework 1 Solutions MA 522 Fall 2017 Homework 1 Solutios MA 5 Fall 017 1. Cosider the searchig problem: Iput A sequece of umbers A = [a 1,..., a ] ad a value v. Output A idex i such that v = A[i] or the special value NIL if v does ot appear

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

CHAPTER IV: GRAPH THEORY. Section 1: Introduction to Graphs

CHAPTER IV: GRAPH THEORY. Section 1: Introduction to Graphs CHAPTER IV: GRAPH THEORY Sectio : Itroductio to Graphs Sice this class is called Number-Theoretic ad Discrete Structures, it would be a crime to oly focus o umber theory regardless how woderful those topics

More information

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs What are we goig to lear? CSC316-003 Data Structures Aalysis of Algorithms Computer Sciece North Carolia State Uiversity Need to say that some algorithms are better tha others Criteria for evaluatio Structure

More information

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8)

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8) CIS 11 Data Structures ad Algorithms with Java Fall 017 Big-Oh Notatio Tuesday, September 5 (Make-up Friday, September 8) Learig Goals Review Big-Oh ad lear big/small omega/theta otatios Practice solvig

More information

Arithmetic Sequences

Arithmetic Sequences . Arithmetic Sequeces COMMON CORE Learig Stadards HSF-IF.A. HSF-BF.A.1a HSF-BF.A. HSF-LE.A. Essetial Questio How ca you use a arithmetic sequece to describe a patter? A arithmetic sequece is a ordered

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems

More information

Random Graphs and Complex Networks T

Random Graphs and Complex Networks T Radom Graphs ad Complex Networks T-79.7003 Charalampos E. Tsourakakis Aalto Uiversity Lecture 3 7 September 013 Aoucemet Homework 1 is out, due i two weeks from ow. Exercises: Probabilistic iequalities

More information

Lecture 18. Optimization in n dimensions

Lecture 18. Optimization in n dimensions Lecture 8 Optimizatio i dimesios Itroductio We ow cosider the problem of miimizig a sigle scalar fuctio of variables, f x, where x=[ x, x,, x ]T. The D case ca be visualized as fidig the lowest poit of

More information

Lecture 5. Counting Sort / Radix Sort

Lecture 5. Counting Sort / Radix Sort Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018

More information

On (K t e)-saturated Graphs

On (K t e)-saturated Graphs Noame mauscript No. (will be iserted by the editor O (K t e-saturated Graphs Jessica Fuller Roald J. Gould the date of receipt ad acceptace should be iserted later Abstract Give a graph H, we say a graph

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

Project 2.5 Improved Euler Implementation

Project 2.5 Improved Euler Implementation Project 2.5 Improved Euler Implemetatio Figure 2.5.10 i the text lists TI-85 ad BASIC programs implemetig the improved Euler method to approximate the solutio of the iitial value problem dy dx = x+ y,

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information

Combination Labelings Of Graphs

Combination Labelings Of Graphs Applied Mathematics E-Notes, (0), - c ISSN 0-0 Available free at mirror sites of http://wwwmaththuedutw/ame/ Combiatio Labeligs Of Graphs Pak Chig Li y Received February 0 Abstract Suppose G = (V; E) is

More information

A NOTE ON COARSE GRAINED PARALLEL INTEGER SORTING

A NOTE ON COARSE GRAINED PARALLEL INTEGER SORTING Chater 26 A NOTE ON COARSE GRAINED PARALLEL INTEGER SORTING A. Cha ad F. Dehe School of Comuter Sciece Carleto Uiversity Ottawa, Caada K1S 5B6 æ {acha,dehe}@scs.carleto.ca Abstract Keywords: We observe

More information

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y

More information

Sum-connectivity indices of trees and unicyclic graphs of fixed maximum degree

Sum-connectivity indices of trees and unicyclic graphs of fixed maximum degree 1 Sum-coectivity idices of trees ad uicyclic graphs of fixed maximum degree Zhibi Du a, Bo Zhou a *, Nead Triajstić b a Departmet of Mathematics, South Chia Normal Uiversity, uagzhou 510631, Chia email:

More information

Algorithms Chapter 3 Growth of Functions

Algorithms Chapter 3 Growth of Functions Algorithms Chapter 3 Growth of Fuctios Istructor: Chig Chi Li 林清池助理教授 chigchi.li@gmail.com Departmet of Computer Sciece ad Egieerig Natioal Taiwa Ocea Uiversity Outlie Asymptotic otatio Stadard otatios

More information

Big-O Analysis. Asymptotics

Big-O Analysis. Asymptotics Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses

More information

Relationship between augmented eccentric connectivity index and some other graph invariants

Relationship between augmented eccentric connectivity index and some other graph invariants Iteratioal Joural of Advaced Mathematical Scieces, () (03) 6-3 Sciece Publishig Corporatio wwwsciecepubcocom/idexphp/ijams Relatioship betwee augmeted eccetric coectivity idex ad some other graph ivariats

More information

Perhaps the method will give that for every e > U f() > p - 3/+e There is o o-trivial upper boud for f() ad ot eve f() < Z - e. seems to be kow, where

Perhaps the method will give that for every e > U f() > p - 3/+e There is o o-trivial upper boud for f() ad ot eve f() < Z - e. seems to be kow, where ON MAXIMUM CHORDAL SUBGRAPH * Paul Erdos Mathematical Istitute of the Hugaria Academy of Scieces ad Reu Laskar Clemso Uiversity 1. Let G() deote a udirected graph, with vertices ad V(G) deote the vertex

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

EVALUATION OF TRIGONOMETRIC FUNCTIONS

EVALUATION OF TRIGONOMETRIC FUNCTIONS EVALUATION OF TRIGONOMETRIC FUNCTIONS Whe first exposed to trigoometric fuctios i high school studets are expected to memorize the values of the trigoometric fuctios of sie cosie taget for the special

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

LU Decomposition Method

LU Decomposition Method SOLUTION OF SIMULTANEOUS LINEAR EQUATIONS LU Decompositio Method Jamie Traha, Autar Kaw, Kevi Marti Uiversity of South Florida Uited States of America kaw@eg.usf.edu http://umericalmethods.eg.usf.edu Itroductio

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

CMPT 125 Assignment 2 Solutions

CMPT 125 Assignment 2 Solutions CMPT 25 Assigmet 2 Solutios Questio (20 marks total) a) Let s cosider a iteger array of size 0. (0 marks, each part is 2 marks) it a[0]; I. How would you assig a poiter, called pa, to store the address

More information

Optimum Solution of Quadratic Programming Problem: By Wolfe s Modified Simplex Method

Optimum Solution of Quadratic Programming Problem: By Wolfe s Modified Simplex Method Volume VI, Issue III, March 7 ISSN 78-5 Optimum Solutio of Quadratic Programmig Problem: By Wolfe s Modified Simple Method Kalpaa Lokhade, P. G. Khot & N. W. Khobragade, Departmet of Mathematics, MJP Educatioal

More information

A Note on Chromatic Transversal Weak Domination in Graphs

A Note on Chromatic Transversal Weak Domination in Graphs Iteratioal Joural of Mathematics Treds ad Techology Volume 17 Number 2 Ja 2015 A Note o Chromatic Trasversal Weak Domiatio i Graphs S Balamuruga 1, P Selvalakshmi 2 ad A Arivalaga 1 Assistat Professor,

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

n n B. How many subsets of C are there of cardinality n. We are selecting elements for such a

n n B. How many subsets of C are there of cardinality n. We are selecting elements for such a 4. [10] Usig a combiatorial argumet, prove that for 1: = 0 = Let A ad B be disjoit sets of cardiality each ad C = A B. How may subsets of C are there of cardiality. We are selectig elemets for such a subset

More information

Analysis of Algorithms

Analysis of Algorithms Aalysis of Algorithms Ruig Time of a algorithm Ruig Time Upper Bouds Lower Bouds Examples Mathematical facts Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite

More information

the beginning of the program in order for it to work correctly. Similarly, a Confirm

the beginning of the program in order for it to work correctly. Similarly, a Confirm I our sytax, a Assume statemet will be used to record what must be true at the begiig of the program i order for it to work correctly. Similarly, a Cofirm statemet is used to record what should be true

More information

How do we evaluate algorithms?

How do we evaluate algorithms? F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

Lecture Notes on Integer Linear Programming

Lecture Notes on Integer Linear Programming Lecture Notes o Iteger Liear Programmig Roel va de Broek October 15, 2018 These otes supplemet the material o (iteger) liear programmig covered by the lectures i the course Algorithms for Decisio Support.

More information

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme Improvig Iformatio Retrieval System Security via a Optimal Maximal Codig Scheme Dogyag Log Departmet of Computer Sciece, City Uiversity of Hog Kog, 8 Tat Chee Aveue Kowloo, Hog Kog SAR, PRC dylog@cs.cityu.edu.hk

More information

MAXIMUM MATCHINGS IN COMPLETE MULTIPARTITE GRAPHS

MAXIMUM MATCHINGS IN COMPLETE MULTIPARTITE GRAPHS Fura Uiversity Electroic Joural of Udergraduate Matheatics Volue 00, 1996 6-16 MAXIMUM MATCHINGS IN COMPLETE MULTIPARTITE GRAPHS DAVID SITTON Abstract. How ay edges ca there be i a axiu atchig i a coplete

More information

Ch 9.3 Geometric Sequences and Series Lessons

Ch 9.3 Geometric Sequences and Series Lessons Ch 9.3 Geometric Sequeces ad Series Lessos SKILLS OBJECTIVES Recogize a geometric sequece. Fid the geeral, th term of a geometric sequece. Evaluate a fiite geometric series. Evaluate a ifiite geometric

More information

Strong Complementary Acyclic Domination of a Graph

Strong Complementary Acyclic Domination of a Graph Aals of Pure ad Applied Mathematics Vol 8, No, 04, 83-89 ISSN: 79-087X (P), 79-0888(olie) Published o 7 December 04 wwwresearchmathsciorg Aals of Strog Complemetary Acyclic Domiatio of a Graph NSaradha

More information

On Nonblocking Folded-Clos Networks in Computer Communication Environments

On Nonblocking Folded-Clos Networks in Computer Communication Environments O Noblockig Folded-Clos Networks i Computer Commuicatio Eviromets Xi Yua Departmet of Computer Sciece, Florida State Uiversity, Tallahassee, FL 3306 xyua@cs.fsu.edu Abstract Folded-Clos etworks, also referred

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

Protected points in ordered trees

Protected points in ordered trees Applied Mathematics Letters 008 56 50 www.elsevier.com/locate/aml Protected poits i ordered trees Gi-Sag Cheo a, Louis W. Shapiro b, a Departmet of Mathematics, Sugkyukwa Uiversity, Suwo 440-746, Republic

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:

More information

A study on Interior Domination in Graphs

A study on Interior Domination in Graphs IOSR Joural of Mathematics (IOSR-JM) e-issn: 2278-5728, p-issn: 219-765X. Volume 12, Issue 2 Ver. VI (Mar. - Apr. 2016), PP 55-59 www.iosrjourals.org A study o Iterior Domiatio i Graphs A. Ato Kisley 1,

More information

Civil Engineering Computation

Civil Engineering Computation Civil Egieerig Computatio Fidig Roots of No-Liear Equatios March 14, 1945 World War II The R.A.F. first operatioal use of the Grad Slam bomb, Bielefeld, Germay. Cotets 2 Root basics Excel solver Newto-Raphso

More information

Intro to Scientific Computing: Solutions

Intro to Scientific Computing: Solutions Itro to Scietific Computig: Solutios Dr. David M. Goulet. How may steps does it take to separate 3 objects ito groups of 4? We start with 5 objects ad apply 3 steps of the algorithm to reduce the pile

More information

Accuracy Improvement in Camera Calibration

Accuracy Improvement in Camera Calibration Accuracy Improvemet i Camera Calibratio FaJie L Qi Zag ad Reihard Klette CITR, Computer Sciece Departmet The Uiversity of Aucklad Tamaki Campus, Aucklad, New Zealad fli006, qza001@ec.aucklad.ac.z r.klette@aucklad.ac.z

More information

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers * Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13 CIS Data Structures ad Algorithms with Java Sprig 08 Stacks ad Queues Moday, February / Tuesday, February Learig Goals Durig this lab, you will: Review stacks ad queues. Lear amortized ruig time aalysis

More information

Computational Geometry

Computational Geometry Computatioal Geometry Chapter 4 Liear programmig Duality Smallest eclosig disk O the Ageda Liear Programmig Slides courtesy of Craig Gotsma 4. 4. Liear Programmig - Example Defie: (amout amout cosumed

More information

Analysis of Algorithms

Analysis of Algorithms Presetatio for use with the textbook, Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Aalysis of Algorithms Iput 2015 Goodrich ad Tamassia Algorithm Aalysis of Algorithms

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets Throughput-Delay Scalig i Wireless Networks with Costat-Size Packets Abbas El Gamal, James Mamme, Balaji Prabhakar, Devavrat Shah Departmets of EE ad CS Staford Uiversity, CA 94305 Email: {abbas, jmamme,

More information

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical

More information

Xiaozhou (Steve) Li, Atri Rudra, Ram Swaminathan. HP Laboratories HPL Keyword(s): graph coloring; hardness of approximation

Xiaozhou (Steve) Li, Atri Rudra, Ram Swaminathan. HP Laboratories HPL Keyword(s): graph coloring; hardness of approximation Flexible Colorig Xiaozhou (Steve) Li, Atri Rudra, Ram Swamiatha HP Laboratories HPL-2010-177 Keyword(s): graph colorig; hardess of approximatio Abstract: Motivated b y reliability cosideratios i data deduplicatio

More information

Fast Fourier Transform (FFT) Algorithms

Fast Fourier Transform (FFT) Algorithms Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform

More information

BOOLEAN MATHEMATICS: GENERAL THEORY

BOOLEAN MATHEMATICS: GENERAL THEORY CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.

More information

A Study on the Performance of Cholesky-Factorization using MPI

A Study on the Performance of Cholesky-Factorization using MPI A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio

More information

Thompson s Group F (p + 1) is not Minimally Almost Convex

Thompson s Group F (p + 1) is not Minimally Almost Convex Thompso s Group F (p + ) is ot Miimally Almost Covex Claire Wladis Thompso s Group F (p + ). A Descriptio of F (p + ) Thompso s group F (p + ) ca be defied as the group of piecewiseliear orietatio-preservig

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Octahedral Graph Scaling

Octahedral Graph Scaling Octahedral Graph Scalig Peter Russell Jauary 1, 2015 Abstract There is presetly o strog iterpretatio for the otio of -vertex graph scalig. This paper presets a ew defiitio for the term i the cotext of

More information

Some non-existence results on Leech trees

Some non-existence results on Leech trees Some o-existece results o Leech trees László A.Székely Hua Wag Yog Zhag Uiversity of South Carolia This paper is dedicated to the memory of Domiique de Cae, who itroduced LAS to Leech trees.. Abstract

More information

Examples and Applications of Binary Search

Examples and Applications of Binary Search Toy Gog ITEE Uiersity of Queeslad I the secod lecture last week we studied the biary search algorithm that soles the problem of determiig if a particular alue appears i a sorted list of iteger or ot. We

More information