Allocation of copies of a file in an information network

Size: px
Start display at page:

Download "Allocation of copies of a file in an information network"

Transcription

1 Allocatio of copies of a file i a iformatio etwork by R. G. CASEY IBM Research Laboratory Sa Jose, Califoria INTRODUCTION We cosider a mathematical model of a iformatio etwork of odes, some of which cotai copies of a give data file. Withi this etwork, every ode is able to commuicate with every other ode over commuicatio liks (a process which may etail routig through itermediate odes). I particular, we are cocered with trasactios with the multiply-located file. Such trasactios fall ito oe of two classes: (1) query traffic betwee a ode ad the file, ad (2) update traffic. A update message is assumed to be trasmitted to every copy of the file, whereas a query is commuicated oly to a sigle copy. We proceed to demostrate, withi a simple liear cost model for the etwork, several properties of the optimal assigmet of files to odes. Oe set of results expresses bouds o the umber of copies of the file that should be icluded i the etwork, as a fuctio of the relative volume of query ad update traffic. Secodly, a test useful i determiig the optimum cofiguratio is derived. The problem of allocatig resources i a etwork first arose withi the cotext of determiig the most ecoomical locatio for maufacturig plats ad warehouses. 1,2,3 I some studies, the model of the etwork is made i such a way that a efficiet algorithm yieldig the optimal allocatio is ot readily obtaiable, ad heuristic or approximate techiques are tried istead. Frazer,4 for example, has developed a method for allocatig productio facilities whe the cost of deployig a resource at a give ode cosists of a fixed overhead expediture plus a amout proportioal to the total demad o the facility. These maufacturig models are coceptually differet from the file allocatio problem, whe updatig traffic is cosidered i the latter. Sice all copies of a file are modified by each update message, the total volume of data trasmitted i the etwork is ot idepedet of the allocatio policy, as is the total volume of goods shipped i a maufacturig eviromet, but rather icreases with the umber of file copies allocated. Yet, as will be show, the models are mathematically equivalet to the file model aalyzed here. Chu 5 has ivestigated a liear programmig solutio to the file allocatio problem. His model icludes storage costs ad queuig delays, but the umber of copies of each file i the system is assumed to be kow. Whitey6 has formulated a similar model, ad applied it to the task of desigig etwork topology, as well as that of allocatig copies of the file. THE MODEL The fixed cost (maily for storage) of locatig a copy of the file at the kth ode (k = 1, 2,..., ) will be deoted by a amout Uk, measured i, say, dollars per moth. The symbols Aj ad tf;j will be used to represet the volume of query traffic ad of update traffic, respectively, emaatig from ode j(j=l, 2,..., ). The quatities djk ad d jk' are the costs of a uit of commuicatio from ode j to ode k for a query ad a update trasactio, respectively. Thus, djk ad djk' might be measured i dollars per megabit trasmitted, ad Aj ad tf;j expressed i megabits per moth. The possibility of a differece i cost rates is icluded i the model o the premise that i may applicatios updates ca be accumulated ad trasmitted either via a cheaper medium (e.g., by mailig magetic tapes), or at a time whe commuicatios rates are lower (e.g., at ight usig switched lies). * Queries are assumed to be etered o-lie, at a higher commuicatio rate. If the kth ode cotais a copy of the file, the commuicatios from the jth ode produce a cost term of Ajdjk for query trasactios ad a amout tf;jdj/ for update * The author is idebted to Dr. W. D. Frazer of IBM Research for poitig out this geeralizatio. 617 From the collectio of the Computer History Museum (

2 618 Sprig Joit Computer Coferece, 1972 trasactios. Actually, i much of the discussio that follows, ad i the experimets carried out, we assume equal cost rates for iquiry ad update. I practice, the cost of shippig iformatio may ot be liear with the amout set; the assumptio is oetheless of theoretical iterest i order to obtai a first-order approximatio to a rather complex mootoically icreasig fuctio. Weare cocered with the problem of determiig at which odes of the etwork copies of the file shall reside. We shall assume that this allocatio is to be doe i such a way as to miimize the total cost of commuicatio betwee users ad files. I geeral, the cost of queryig is reduced as we icrease the umber of file odes i the etwork (users ear a ew file ode fid their queryig more ecoomical; the other users are o worse off). O the other had, storage costs ad the cost of updatig go up as ew copies of the file are itroduced, sice every copy must be updated. I the limitig cases, if o updatig is doe, ad if storage costs are low, a copy of the file should be kept at every ode (ad etwork commuicatio ot used), whereas if oly updatig is doe, ad o queryig, a sigle copy of the file should be maitaied at some optimal ode of the etwork. By a assigmet of the file we shall mea a choice of odes at which to locate the file. Let I deote a set of ode idexes represetig a give assigmet. The total commuicatio cost resultig from this choice of file locatios is a sum over idividual user odes. I the case of query traffic, we assume that the user accesses that copy of the file which miimizes his commuicatio cost. His updates, of course, must be trasmitted to all the file odes. The geeral expressio for total cost is therefore: C(I)= L[L~jdjk'+AjmidjkJ+ LUk 1=1 kei kei kei The problem of file allocatio i this cotext is to choos_e the idex set, I, so as to miimize C (I). This cost fuctio ca be writte i the form where C (I) = L Uk+ 2: Gj(I) kei 1=1 Uk=Uk+ L ~jdjk' 1=1 Gj(I) = Aj mi djk kei With C (I) expressed i this form the problem of miimizig cost is see to be exactly the problem ivestigated by Efroymso ad Ray,! Feldma, et al.,2 Frazer,4 ad others. The update costs of the file model are aalogous to the fixed costs of the plat locatio model, while query costs are aalogous to the trasportatio costs. Previous researchers tried mixed iteger-liear programmi,g techiques for obtaiig solutios to the miimizatio problem. Geerally, the true miimum of C (1) is computatioally very expesive to obtai by such methods, ad heuristics are developed that sacrifice optimality i order to arrive at "good" solutios quickly. Here, we take a alterative approach. We shall first exhibit several mathematical properties of the cost fuctio. We shall use these to costruct a search procedure which is guarateed to produce the miimum of C (1). Fially, we suggest heuristic modificatios to the geeral agorithm for use i cases where it is too expesive to be applied. Thus, both attempts to solve the problem, by meas of iteger programmig ad by exploitig the properties of the cost fuctio, tur to ad hoc adjustmets i order to obtai relief from the expese of guarateeig a optimum solutio. It would be of iterest to compare the performace of the two approaches o the same problems. The iitial examiatio of the properties of C (I) yields bouds o the umber of elemets i the optimal file ode set I, whe storage costs do ot vary. This will be show by meas of the followig theorem. Let the cost of update commuicatio be equal to the cost of query commuicatio (d jk = djk'). Theorem 1: If for some iteger r~ ~j>aj/(r-l) for each j = 1, 2,..., the ay r-ode file assigmet is more costly tha the optimal oe-ode assigmet. We prove the theorem by meas of the followig lemma: Lemma: If ~j= PAj for j = 1,2,..., the, a r-ode assigmet caot be less costly tha the optimal oe-ode assigmet if p?l/ (r-l). Proof of Lemma: Cosider a arbitrary assigmet 1= {I, 2,..., r}. Let the elemets of I be ordered such that ode 1 is the lowest cost sigle-ode assigmet. We have r r C(I) =PL LAjdjk+ L mi Ajdjk+ L Uk k=1 1=1 1=1 kei k=1 From the collectio of the Computer History Museum (

3 Allocatio of Copies of a File i a Iformatio Network 619 ad C( {k}) = (1+p) L Ajdjk+Uk k= 1,2,..., r i=1 By the optimality of ode 1 there are oegative umbers a2,..., at such that Substitutig the above, we ca write k=2,3,...,r. C(/) -C( {I}) = [pr-p-1] L Ajdj1+ L pak i=1 k=2 + ~. "\ d + p(r-1)ul... mi I\j jk i=1 k l+p 1 r +-LUk l+p k=2 which is certaily oegative if (pr- p-1) is oegative. That is, p~ 1/ (r-1) implies that C (1) ~ C({l}). If the optimal sigle ode assigmet is i I, the it is ode 1 ad the lemma is proved. If the optimal ode, say k', is ot i I, the we have p~ 1/ (r-1) implies C(/) ~C( {I}) >C({k'}) ad so the lemma is true i this case as well. Proof of Theorem 1 The lemma cocers the case where each user geerates the same proportio of update traffic to query traffic. Suppose ow that the proportios vary from ode to ode, but always exceed a give amout p. The, there are oegative quatities Ej such that j=1,2,..., The cost fuctios ca ow be writte: C'( {I}) = L (1+P+Ej)Ajd J1 +u=c( {I}) +L EjAjdjl i=1 i=1 C' (/) = L (P+Ej) Aj L djk i=1 k=1 + L mi (P+Ej) djk+rou i=1 k T r = C (/) + L EjAj L djk+ L Ej mi djk i=1 k=1 i=1 k where the uprimed costs are those give i the lemma. T But clearly C' (/) ~ C' ( {I}) wheever C (/) ~ C ( {I} ). The applyig the lemma, the coditio p~ 1/ (r-1) is sufficiet to esure that the r-ode assigmet is ot optimal. I additio, if at least oe of the E/S is greater tha zero, we must have the strict iequality C (/) > C({I}). Corollary 1 If the update/query traffic ratio satisfies p~ 1/ (r-l) (r a iteger) the the optimal allocatio cosists of o more tha r odes. Proof If 1/1 j ~ Ail (r -1) for each j the certaily for ay iteger l ad so theorem 1 rules out the optimality of a (r+l) ode assigmet. Corollary 2 If each user geerates at least 50 percet of his traffic i the form of updates, the the optimal assigmet policy is to locate oly a sigle copy of the file i the etwork. The corollary follows directly from the theorem by settig r = 2, but is worth statig separately sice it sets a boud beyod which multiple copies of the file should ot be cosidered. Furthermore, it is easy to show that for equal proportios of update ad query traffic the two-ode assigmet is o more costly tha a oe-ode assigmet of the file oly if storage costs are eglected, ad the rows ad colums of the cost matrix ca be permuted to yield the form: where [: al a2... am ] b2... b l (rest of matrix) m m L aiaa = L biab, i=1 i=1 Aa ad Ab beig the respective traffic volumes for the first two rows (query or update). From the collectio of the Computer History Museum (

4 620 Sprig Joit Computer Coferece, 1972 A PROPERTY OF THE OPTIMAL FILE ALLOCATION I this sectio, we examie the behavior of the cost fuctio as additioal file odes are added. I particular, we cosider a graph such as Figure 1, where each vertex is idetified with a file assigmet (deoted by a biary vector havig l's i those positios correspodig to file odes, O's elsewhere). Associated with each vertex is the correspodig value of the cost fuctio (ot show i Figure 1). For mathematical coveiece the ull vertex is assiged ifiite cost. The edges of the graph are directed paths correspodig to the additio of a sigle file ode to the previous assigmet. The graph is coveietly arraged i levels where the vertices at the kth level represet all k-ode file assigmets. We demostrate the sigificat property of this graph (which we shall call the "cost" graph) that if a give vertex has a cost less tha the cost of ay vertex alog the paths leadig to it, the the sequece of costs ecoutered alog ayoe of these paths decreases mootoically. Thus, i order to fid the optimal allocatio policy, it is sufficiet to follow every path of the cost graph util the cost icreases, ad o further. Because of this property, oly a small subset of the possible assigmets eed be tested, compared with the exhaustive search procedure i which 2 differet file allocatios must be evaluated. The mootoicity will be exhibited i two stages: first, for the case of two steps through the graph, ad the for the geeral case. Let I'""X, where XCI, deote the idex set I with the elemets of set X removed. Cosider a arbitrary file assigmet correspodig to idex set I, ad assume the odes are so umbered that 1= [1,2,...,r]. We proceed to show: Lemma: If C(I) ~C(I'""{k}) for k= 1,2, the C (I'"" {k} ~ C(I'""{l, 2}) fork=l, 2. Proof of Lemma: The cost fuctio ca be writte, i geeral, Thus where Also where C(I'""X) = L: Uk+ L: Aj mi djk kei,...,x i=i kei,...,x C(I) -C(I'""{l}) = U 1 - dj = mi d jk - mi d jk kei,...,{ I} kei C(I,",,{2}) -C(I'""{l, 2}) = U 1 - Cosider the differece L: Ajdj i=i d/ = mi d jk - mi d jk kei,...,{ I,2} kei,...,{ 2} L Ajd/ i=i d/-dj= mi d jk+ midjk - mi d jk - mi djk kei,...,{ I,2} kei kei,...,{ 2} kei,...,{ I} We have Therefore ad so thus, mi d jk= mie mi d jk, mi d jk) kei kei,...,{ I} kei,...,{ 2} mi djk~ max (mi d jk, mi d jk) kei,...,{ I,2} kei,...,{ I} kei,...,{ 2} d/-dj~o, that is d/~dh C (I'"" { 2 } ) - C (I'"" { 1, 2} ) ~ C (I) - C (I'" { 1 } ) implies that / Figure 1-Graph of the allocatio process By a mere permutatio of idexes we may likewise prove that From the collectio of the Computer History Museum (

5 Allocatio of Copies of a File i a Iformatio Network 621 implies that C(lrv{l}) :::;C(1rv{l, 2}) ad so the lemma is true. By meas of this lemma, we ca ow prove the geeral theorem: Theorem 2: Give a idex set X CI cotaiig r elemets, ad havig the property C(l) :::;C(lrv{x}) for each xex the for every sequece RCI), R ( 2),...,RCT) of subsets of X such that RCk) has k elemets, ad RCk)CRCHI) it is true that C(l) :::;C(lrvR(l) :::;C(lrvRC2) Proof: (by iductio) :::;C(lrvRC3):::; :::;C(1rvRCT) The first iequality above is give i the hypothesis. Sice R(2) has two elemets the secod iequality follows from the lemma. I t may thus be take as hypothesis to prove the third, ad so o. Each iequality proved ca be used together with the lemma to prove the iequality to its right. Observatios: If we take X = I i the theorem, the it states that alog ay path i the cost graph from the ull vertex (which we have assiged ifiite cost) to the vertex correspodig to I, cost decreases mootoically from oe vertex to the ext, providig of course that idex set I satisfies the hypothesis of the theorem. The mootoic decreasig property ca also be show to hold i the reverse directio; i.e., for paths from the vertex {1, 2,...,} to the optimum.* APPLICATION TO FILE ALLOCATION The theorem just proved provides a test that is useful i determiig the miimum cost allocatio of file copies to odes of the etwork. Referrig to the cost graph (Figure 1), let us defie a '''atecedet'' of a arbitrary vertex v as a vertex which has a coectio to v from the ext lower level, ad a "successor" of v as a vertex coected to v at the ext higher level. A * A reviewer poited out this geeralizatio. atecedet cotais the file odes of v less oe ode, while each successor cotais the odes of v plus oe additioal ode. A vertex at the rth level of the graph has r atecedets, ad (-r) successors, where is the umber of odes i the etwork. (Note that, for clarity, we use the term "ode" i referrig to the computer etwork, ad the term "vertex" with respect to the cost graph.) We shall also defie a "local optimum" of the cost graph as a vertex which is less costly tha all of its atecedets ad successors. Clearly, the global optimum we seek belogs to the set of local optima of the graph. The theorem permits us to discover all the local optima without computig the cost of every vertex, for each path leadig from the 0 level to a local optimum must give rise to a mootoically decreasig sequece cj costs. Wheever a icrease is ecoutered i a step forward through the graph, that path ca be abadoed sice it caot lead to a local (or global) optimum. A "path-tracig" routie which evaluates each possible sequece of ode additios i this way is certai to produce the miimum value of C (1). The amout of computatio eeded to extract the miimum will icrease with the umber of local optima, ad with the umber of odes i the optimal cofiguratio. A computer algorithm ca be implemeted i several differet ways to select file odes oe at a time up to the optimum cofiguratio. Oe approach is to follow all paths i parallel through the cost graph, steppig INPUT PARAMETERS COST PER MEGABYTE SHIPPED QUERY UPDATE FILE NODES TRAFFIC TRAFFIC U S E R S QUERYING COSTS UPDATE COSTS Figure 2-A five-ode example From the collectio of the Computer History Museum (

6 622 Sprig Joit,; Computer Coferece, 1972 "%\ Figure 3-The cost graph for the example. J.Jocal optima are circled oe level per iteratio. This method is computatioally efficiet, but may require a great deal of storage i a large problem. Alteratively, a program ca be writte to trace systematically oe path at a time. Such a techique uses less storage, but may require redudat calculatios sice may differet paths itersect each vertex. EXAMPLES We cosider a five-ode etwork with query ad update parameters, ad cost matrix as i Figure 2. Figure 3 shows the file ode cost graph, ad idicates the optimal allocatios. This small-scale example illustrates the mootoicity of the cost fuctio alog paths leadig to a local optimum. Note that the matrix {d jk } is symmetric ad has zero elemets alog the mai diagoal. This is a plausible coditio i a practical case, but is ot required i ay way by the theorems prove here. As a secod example, we postulate the ARP A computer etwork ad its traffic matrix as give by Kleirock. 7 I order to treat this case, which is ot iitially posed as a cetralized data base cofiguratio, we make the followig rather arbitrary assumptios: (1) All the resources of the etwork represeted i the traffic matrix are gathered ito oe large file, copies of which are to be allocated to a subset of the odes. (2) The query traffic (Figure 4) from each user to the file is as give uder the "ode output" colum i Kleirock's table. If the user is accessig a program, we may thik of this "query" traffic as comprisig the commad messages he must sed i order to ru the program, plus the program output set back to him. (Note: Kleirock does ot give figures for each ode's use of its ow facilities.) (3) "Update" traffic, which causes modificatio of programs ad data i all copies of the file, is a fixed percetage of the query traffic defied i (2). The update/query ratio is the same for each user, ad is varied as a parameter i the computer rus described below. (4) The "cost" of commuicatig betwee two etwork odes is as show i Figure 4. The quatities give here are roughly the straightlie distaces betwee odes. Thus, the cost fuctio to be miimized is the total amout of "flow" i the etwork, i.e., the product of message legth i bits, multiplied by the distace through which the message must travel o a direct path to its destiatio, summed over all messages. I this view a update message is assumed to be set separately to each file locatio, rather tha relayed. Assumptios (1)-(4) igore the etwork commuicatio liks as cofigured by Kleirock. Ordiarily these would determie the cost matrix. Substitutig "distace" for "cost," as doe here, might be expediet i a prelimiary aalysis to allocate resources prior to a topological desig of the etwork. We employ the ARPA data primarily because it tests our model o a problem ivolvig may odes. I additio, we should like to ecourage speculatio o the cocept of multiple copies of a resource (data or programs), ad whether such a facility is attractive i future ARPA-like etworks. Figure 5 summarizes the file allocatio experimets coducted usig this data, i which the proportio of update traffic to query traffic was varied from 100 percet to 10 percet i steps. As expected, oly sigle ode allocatios are idicated whe the two types of traffic are equal. As a smaller volume of update traffic is geerated, multiple ode solutios begi to appear. The copies of the file are widely distributed geographically, ad the sigle ode solutio is cetrally located. However, such features result from the particular traffic distributio assumed, ad are ot geeralizatios valid for every case. I t is iterestig to ote the large umber of local optima geerated (see Figure 5). Because certai ARPA sites, e.g., MIT, BBN, Harvard, ad Licol Laboratories, are very ear oe aother, if oe occurs i a local optimum oe of its eighbors may be substituted for it to produce a secod cofiguratio that From the collectio of the Computer History Museum (

7 Allocatio of Copies of a File i a Iformatio Network 623 COST PER MEGABYTE SHIPPED QUERY FILE NODES TRAFFIC U S E R S ' o Figure 4-The ARPA example. The locatios of the odes (from Kleirock 7 ) are: (1) Haover, N.H., (2)-(5) Bosto Area, (6) Murray Hill, N.J., (7) Washigto, D.C., (8) Pittsburgh, Pa., (9) A Arbor, Michiga, (10) Urbaa, Illiois, (11) St. Louis, Mo., (12) Salt Lake City, Utah, (13)-(15) Sa Fracisco Bay Area, (16) Sata Barbara, Califoria, (17)-(19) Los Ageles Area is also locally optimum. Most of the local optima are due to this pheomeom, suggestig that greater computatioal efficiecy would have resulted from lumpig eighborig sites ito a sigle etwork ode for a iitial applicatio of the algorithm, followed by a stage of fier calculatios. Such artifices are hardly ecessary i problems of this size, however. The sequece of six rus depicted i Figure 5 was carried out o a IBM 360/91 i less tha te secods, icludig Fortra compilatio. EXTENSIONS Path tracig o a related problem Oe feature of the path-tracig techique is its versatility. It ca be applied to problems that do ot Update/Query Optimal Allocatio Percet 10 2,10, , , , Cost #Local Miima 117, , , , , Figure 5-Results for the ARPA example fit the liear programmig framework. As oe example cosider the followig modificatio of the file allocatio model. The cost fuctio as defied i the text assumes that the expese of trasmittig a update message to all copies of the file is the sum of the costs of commuicatig with each copy separately, as if a distict message had to be set from the up dater to every file ode. Actually, the preferred mode of operatio would be to relay the message through the etwork i the most ecoomical maer. The resultig cost is less tha that icurred by sedig duplicate messages. It is the cost associated with the most ecoomical subtree of the etwork that cotais the origiatig ode ad the file odes (see Figure 6). This ew cost fuctio defied whe update costs are calculated i this way is oliear i a very complex way. Yet the path-tracig algorithm ca still be applied to the allocatio problem. We o loger have the assurace provided by Theorem 2, which guaratees that the method will geerate the optimal allocatio. However, the cost fuctio behaves i much the same maer as before. It still cosists of two parts: a update (ad fixed cost) term that icreases as additioal file copies are allocated, ad a query term that decreases with additioal copies. The algorithm may be heuristic i the ew framework, but with oly slight modificatio it ca be programmed to determie at least allocatios of the type we have called "local optima," of which the true optimum is oe. From the collectio of the Computer History Museum (

8 624 Sprig Joit Computer Coferece, 1972 Give Network: ~ file odes, Q ode origiatig a update. Liear cost of update as per cei) = (8 + 5) + 7 = 33. Figure 6. Most ecoomical subtree. Cost of relayig update = 23. Figure 6-Most ecoomical subtree for relayig a update message Heuristic modificatio of the path-tracig routie If the optimal solutio to the allocatio problem cosists of may etwork odes the the geeral rule of followig every mootoically decreasig path i the cost graph may be computatioally too expesive. For example, if the optimum cotais 40 odes the at least 2 40 == values of the cost fuctio must be evaluated. I order to decrease the amout of computatio, it is ecessary to sacrifice optimality for speed. We suggest several methods by which this may be doe i a reasoable maer. Assume that the cost graph is beig searched levelby-level (i.e., i parallel). At each level, the vertices which are lower i cost tha their atecedets are recorded. We call these vertices "admissible" ad deote them by the set Ak at the kth level. We wish to carry oly a limited umber of the members of Ak ito the (k+1)th stage. Oe plausible selectio rule is to keep the vertices havig the lowest cost. Alteratively, we may reaso that if two assigmets are similar (i.e., differ i oly a few file odes) the probably their uio will also lie o a mootoic cost path, ad it would' be redudat to trace paths through both. I 4 this view, we wat to select the most "dissimilar" vertices from A k Several techiques are available to do this selectio. Oe method, previously used i patter recogitio, is the followig. Order the members of Ak arbitrarily, specify a threshold T (a parameter), ad examie the members of Ak i order. Deote by Ak' the subset beig formed. The first member of Ak' is the first member of A k, say al. The ext member of Ak' (deoted a2) is the first member of Ak which differs from al by at least T uits. Next, test for a aa which differs from both al ad a2 by at least T ad so o. If Ak' has too may members, or too few, the routie may be repeated with T larger, or smaller, respectively. The set Ak' is used to geerate A k+ l, which is i tur thied dow to A k+l '. A third method has actually bee programmed ad compared with the geeral search techique. The procedure is to do complete path-tracig (applyig Theorem 2) up to a level of the cost graph at which set Ak begis to get too large. From this level o, oly the most "promisig" paths are followed. For example, as programmed the cost graph is completely evaluated through the secod level (2-file odes per vertex). From each admissible secod level vertex oly a sigle path is followed; amely, that path which gives miimal cost at each succeedig level. Sice this program oly has oe-step look ahead, the optimum may be missed. I sample rus o the ARPA problem, the optimum was always foud (for each value of the update/query parameter), although local optima were sometimes overlooked. This heuristic program was also tested o the ARP A cofiguratio usig the revised cost fuctio described above, i.e., a fuctio which assumes that updates are relayed betwee file otes i the most ecoomical maer. Use of a simplified program is called for i this case; the heuristic program required 12 miutes to repeat the five rus of Figure 5, which were performed i uder te secods usig the liear cost relatioship. Figure 7 shows the allocatios produced by this experimet. These assigmets may ot be global optima. They do satisfy our defiitio of a local optimum. Note that, as expected, for the same traffic more copies of the Update/Query Percet Optimal Allocatio (Nodes) 2, 6, 8, 9, 10, 12, 13, 14, 16, 18 2, 8, 10, 12, 14 2, 8, 10, 12, 14 8, 10, Cost 38, , , , ,460 Figure 7-Allocatio results usig the oliear cost model CARP A etwork) From the collectio of the Computer History Museum (

9 Allocatio of Copies of a File i a Iformatio Network 625 file are assiged if updates are relayed. I additio, total cost is reduced markedly uder coditios of low update traffic, idicatig the importace of icludig the more complex cost relatios i the model. CONCLUSION The aalytical properties of a liear-cost model of a iformatio etwork have bee ivestigated. The proportios of update traffic to query traffic geerated by the users of a give file i the etwork were show to determie a upper boud o the umber of copies of the file preset i the least-cost etwork. I additio, a basic property of the cost fuctio was demostrated ad show to justify a path-tracig procedure for determiig the optimal assigmet of copies of the file to odes of the etwork. The model, while simple, expresses relevat features of the tradeoff betwee the costs of queryig ad updatig i the etwork. Presumably, the geeral properties derived apply at least approximately whe more complex models are cosidered. ACKNOWLEDGMENT Dr. M. E. Seko first poited out to the author the eed for a allocatio model which would distiguish betwee the query ad update activity i a etwork. The work reported here owes additioal debts to the ecouragemet ad commetary of Drs. C. P. Wag, H. Lig ad V. Lum. REFERENCES 1 M A EFROYMSON T L RAY A brach-boud algorithm for plat locatio Operatios Research Vol 14 No 3 pp May-Jue E FELDMAN et al Warehouse locatio uder cotiuous ecoomies of scale Maagemet Sciece Vol 12 No 9 pp May K SPIELBERG Algorithm for the simple plat-locatio problem with some side coditios Operatios Research Vol pp W D FRAZER A approximate algorithm for plat locatio uder piecewise liear cocave costs IBM Research Report RC 1875 IBM Watso Research Ceter Yorktow Heights N Y July WWCHU Optimal file allocatio i a multiple computer system IEEE Tras o Computers Vol C-18 No 10 October V K M WHITNEY A study of optimal file assigmet ad commuicatio etwork cofiguratio i remote-access computer message processig ad commuicatio systems SEL Techical Report No 48 Systems Egrg La Dept of Elect Egrg Uiversity of Michiga September 1970 (PhD Dissertatio) 7 L KLEINROCK Models for computer etworks Proc Iteratioal Coferece o Comm Boulder Colorado pp Jue 1969 From the collectio of the Computer History Museum (

10 From the collectio of the Computer History Museum (

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

1 Graph Sparsfication

1 Graph Sparsfication CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence _9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

condition w i B i S maximum u i

condition w i B i S maximum u i ecture 10 Dyamic Programmig 10.1 Kapsack Problem November 1, 2004 ecturer: Kamal Jai Notes: Tobias Holgers We are give a set of items U = {a 1, a 2,..., a }. Each item has a weight w i Z + ad a utility

More information

Big-O Analysis. Asymptotics

Big-O Analysis. Asymptotics Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

The Adjacency Matrix and The nth Eigenvalue

The Adjacency Matrix and The nth Eigenvalue Spectral Graph Theory Lecture 3 The Adjacecy Matrix ad The th Eigevalue Daiel A. Spielma September 5, 2012 3.1 About these otes These otes are ot ecessarily a accurate represetatio of what happeed i class.

More information

Lecture 18. Optimization in n dimensions

Lecture 18. Optimization in n dimensions Lecture 8 Optimizatio i dimesios Itroductio We ow cosider the problem of miimizig a sigle scalar fuctio of variables, f x, where x=[ x, x,, x ]T. The D case ca be visualized as fidig the lowest poit of

More information

Alpha Individual Solutions MAΘ National Convention 2013

Alpha Individual Solutions MAΘ National Convention 2013 Alpha Idividual Solutios MAΘ Natioal Covetio 0 Aswers:. D. A. C 4. D 5. C 6. B 7. A 8. C 9. D 0. B. B. A. D 4. C 5. A 6. C 7. B 8. A 9. A 0. C. E. B. D 4. C 5. A 6. D 7. B 8. C 9. D 0. B TB. 570 TB. 5

More information

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8)

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8) CIS 11 Data Structures ad Algorithms with Java Fall 017 Big-Oh Notatio Tuesday, September 5 (Make-up Friday, September 8) Learig Goals Review Big-Oh ad lear big/small omega/theta otatios Practice solvig

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

n n B. How many subsets of C are there of cardinality n. We are selecting elements for such a

n n B. How many subsets of C are there of cardinality n. We are selecting elements for such a 4. [10] Usig a combiatorial argumet, prove that for 1: = 0 = Let A ad B be disjoit sets of cardiality each ad C = A B. How may subsets of C are there of cardiality. We are selectig elemets for such a subset

More information

Big-O Analysis. Asymptotics

Big-O Analysis. Asymptotics Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

Solving Fuzzy Assignment Problem Using Fourier Elimination Method

Solving Fuzzy Assignment Problem Using Fourier Elimination Method Global Joural of Pure ad Applied Mathematics. ISSN 0973-768 Volume 3, Number 2 (207), pp. 453-462 Research Idia Publicatios http://www.ripublicatio.com Solvig Fuzzy Assigmet Problem Usig Fourier Elimiatio

More information

Σ P(i) ( depth T (K i ) + 1),

Σ P(i) ( depth T (K i ) + 1), EECS 3101 York Uiversity Istructor: Ady Mirzaia DYNAMIC PROGRAMMING: OPIMAL SAIC BINARY SEARCH REES his lecture ote describes a applicatio of the dyamic programmig paradigm o computig the optimal static

More information

Lecture 1: Introduction and Strassen s Algorithm

Lecture 1: Introduction and Strassen s Algorithm 5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access

More information

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio

More information

Lecture 5. Counting Sort / Radix Sort

Lecture 5. Counting Sort / Radix Sort Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018

More information

Combination Labelings Of Graphs

Combination Labelings Of Graphs Applied Mathematics E-Notes, (0), - c ISSN 0-0 Available free at mirror sites of http://wwwmaththuedutw/ame/ Combiatio Labeligs Of Graphs Pak Chig Li y Received February 0 Abstract Suppose G = (V; E) is

More information

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

Consider the following population data for the state of California. Year Population

Consider the following population data for the state of California. Year Population Assigmets for Bradie Fall 2016 for Chapter 5 Assigmet sheet for Sectios 5.1, 5.3, 5.5, 5.6, 5.7, 5.8 Read Pages 341-349 Exercises for Sectio 5.1 Lagrage Iterpolatio #1, #4, #7, #13, #14 For #1 use MATLAB

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

arxiv: v2 [cs.ds] 24 Mar 2018

arxiv: v2 [cs.ds] 24 Mar 2018 Similar Elemets ad Metric Labelig o Complete Graphs arxiv:1803.08037v [cs.ds] 4 Mar 018 Pedro F. Felzeszwalb Brow Uiversity Providece, RI, USA pff@brow.edu March 8, 018 We cosider a problem that ivolves

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

An Algorithm to Solve Fuzzy Trapezoidal Transshipment Problem

An Algorithm to Solve Fuzzy Trapezoidal Transshipment Problem Iteratioal Joural of Systems Sciece ad Applied Mathematics 206; (4): 58-62 http://www.sciecepublishiggroup.com/j/ssam doi: 0.648/j.ssam.206004.4 A Algorithm to Solve Fuzzy Trapezoidal Trasshipmet Problem

More information

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:

More information

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved.

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved. Chapter 11 Frieds, Overloaded Operators, ad Arrays i Classes Copyright 2014 Pearso Addiso-Wesley. All rights reserved. Overview 11.1 Fried Fuctios 11.2 Overloadig Operators 11.3 Arrays ad Classes 11.4

More information

c-dominating Sets for Families of Graphs

c-dominating Sets for Families of Graphs c-domiatig Sets for Families of Graphs Kelsie Syder Mathematics Uiversity of Mary Washigto April 6, 011 1 Abstract The topic of domiatio i graphs has a rich history, begiig with chess ethusiasts i the

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Lecture 2: Spectra of Graphs

Lecture 2: Spectra of Graphs Spectral Graph Theory ad Applicatios WS 20/202 Lecture 2: Spectra of Graphs Lecturer: Thomas Sauerwald & He Su Our goal is to use the properties of the adjacecy/laplacia matrix of graphs to first uderstad

More information

Lecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions

Lecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions U.C. Berkeley CS170 : Algorithms Midterm 1 Solutios Lecturers: Sajam Garg ad Prasad Raghavedra Feb 1, 017 Midterm 1 Solutios 1. (4 poits) For the directed graph below, fid all the strogly coected compoets

More information

On Infinite Groups that are Isomorphic to its Proper Infinite Subgroup. Jaymar Talledo Balihon. Abstract

On Infinite Groups that are Isomorphic to its Proper Infinite Subgroup. Jaymar Talledo Balihon. Abstract O Ifiite Groups that are Isomorphic to its Proper Ifiite Subgroup Jaymar Talledo Baliho Abstract Two groups are isomorphic if there exists a isomorphism betwee them Lagrage Theorem states that the order

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu

More information

Lecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein

Lecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein 068.670 Subliear Time Algorithms November, 0 Lecture 6 Lecturer: Roitt Rubifeld Scribes: Che Ziv, Eliav Buchik, Ophir Arie, Joatha Gradstei Lesso overview. Usig the oracle reductio framework for approximatig

More information

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le Fudametals of Media Processig Shi'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dih Le Today's topics Noparametric Methods Parze Widow k-nearest Neighbor Estimatio Clusterig Techiques k-meas Agglomerative Hierarchical

More information

Accuracy Improvement in Camera Calibration

Accuracy Improvement in Camera Calibration Accuracy Improvemet i Camera Calibratio FaJie L Qi Zag ad Reihard Klette CITR, Computer Sciece Departmet The Uiversity of Aucklad Tamaki Campus, Aucklad, New Zealad fli006, qza001@ec.aucklad.ac.z r.klette@aucklad.ac.z

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers * Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of

More information

On Nonblocking Folded-Clos Networks in Computer Communication Environments

On Nonblocking Folded-Clos Networks in Computer Communication Environments O Noblockig Folded-Clos Networks i Computer Commuicatio Eviromets Xi Yua Departmet of Computer Sciece, Florida State Uiversity, Tallahassee, FL 3306 xyua@cs.fsu.edu Abstract Folded-Clos etworks, also referred

More information

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets Throughput-Delay Scalig i Wireless Networks with Costat-Size Packets Abbas El Gamal, James Mamme, Balaji Prabhakar, Devavrat Shah Departmets of EE ad CS Staford Uiversity, CA 94305 Email: {abbas, jmamme,

More information

Data Structures and Algorithms. Analysis of Algorithms

Data Structures and Algorithms. Analysis of Algorithms Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output

More information

On (K t e)-saturated Graphs

On (K t e)-saturated Graphs Noame mauscript No. (will be iserted by the editor O (K t e-saturated Graphs Jessica Fuller Roald J. Gould the date of receipt ad acceptace should be iserted later Abstract Give a graph H, we say a graph

More information

Protected points in ordered trees

Protected points in ordered trees Applied Mathematics Letters 008 56 50 www.elsevier.com/locate/aml Protected poits i ordered trees Gi-Sag Cheo a, Louis W. Shapiro b, a Departmet of Mathematics, Sugkyukwa Uiversity, Suwo 440-746, Republic

More information

Counting the Number of Minimum Roman Dominating Functions of a Graph

Counting the Number of Minimum Roman Dominating Functions of a Graph Coutig the Number of Miimum Roma Domiatig Fuctios of a Graph SHI ZHENG ad KOH KHEE MENG, Natioal Uiversity of Sigapore We provide two algorithms coutig the umber of miimum Roma domiatig fuctios of a graph

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

New Results on Energy of Graphs of Small Order

New Results on Energy of Graphs of Small Order Global Joural of Pure ad Applied Mathematics. ISSN 0973-1768 Volume 13, Number 7 (2017), pp. 2837-2848 Research Idia Publicatios http://www.ripublicatio.com New Results o Eergy of Graphs of Small Order

More information

the beginning of the program in order for it to work correctly. Similarly, a Confirm

the beginning of the program in order for it to work correctly. Similarly, a Confirm I our sytax, a Assume statemet will be used to record what must be true at the begiig of the program i order for it to work correctly. Similarly, a Cofirm statemet is used to record what should be true

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations Applied Mathematical Scieces, Vol. 1, 2007, o. 25, 1203-1215 A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045, Oe

More information

1.2 Binomial Coefficients and Subsets

1.2 Binomial Coefficients and Subsets 1.2. BINOMIAL COEFFICIENTS AND SUBSETS 13 1.2 Biomial Coefficiets ad Subsets 1.2-1 The loop below is part of a program to determie the umber of triagles formed by poits i the plae. for i =1 to for j =

More information

A Polynomial Interval Shortest-Route Algorithm for Acyclic Network

A Polynomial Interval Shortest-Route Algorithm for Acyclic Network A Polyomial Iterval Shortest-Route Algorithm for Acyclic Network Hossai M Akter Key words: Iterval; iterval shortest-route problem; iterval algorithm; ucertaity Abstract A method ad algorithm is preseted

More information

BOOLEAN MATHEMATICS: GENERAL THEORY

BOOLEAN MATHEMATICS: GENERAL THEORY CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.

More information

Computers and Scientific Thinking

Computers and Scientific Thinking Computers ad Scietific Thikig David Reed, Creighto Uiversity Chapter 15 JavaScript Strigs 1 Strigs as Objects so far, your iteractive Web pages have maipulated strigs i simple ways use text box to iput

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

Polynomial Functions and Models. Learning Objectives. Polynomials. P (x) = a n x n + a n 1 x n a 1 x + a 0, a n 0

Polynomial Functions and Models. Learning Objectives. Polynomials. P (x) = a n x n + a n 1 x n a 1 x + a 0, a n 0 Polyomial Fuctios ad Models 1 Learig Objectives 1. Idetify polyomial fuctios ad their degree 2. Graph polyomial fuctios usig trasformatios 3. Idetify the real zeros of a polyomial fuctio ad their multiplicity

More information

Graphs. Minimum Spanning Trees. Slides by Rose Hoberman (CMU)

Graphs. Minimum Spanning Trees. Slides by Rose Hoberman (CMU) Graphs Miimum Spaig Trees Slides by Rose Hoberma (CMU) Problem: Layig Telephoe Wire Cetral office 2 Wirig: Naïve Approach Cetral office Expesive! 3 Wirig: Better Approach Cetral office Miimize the total

More information

Lower Bounds for Sorting

Lower Bounds for Sorting Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only Edited: Yeh-Liag Hsu (998--; recommeded: Yeh-Liag Hsu (--9; last updated: Yeh-Liag Hsu (9--7. Note: This is the course material for ME55 Geometric modelig ad computer graphics, Yua Ze Uiversity. art of

More information

How do we evaluate algorithms?

How do we evaluate algorithms? F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:

More information

Fast Fourier Transform (FFT) Algorithms

Fast Fourier Transform (FFT) Algorithms Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform

More information

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical

More information

Examples and Applications of Binary Search

Examples and Applications of Binary Search Toy Gog ITEE Uiersity of Queeslad I the secod lecture last week we studied the biary search algorithm that soles the problem of determiig if a particular alue appears i a sorted list of iteger or ot. We

More information

MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fitting)

MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fitting) MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fittig) I this chapter, we will eamie some methods of aalysis ad data processig; data obtaied as a result of a give

More information

Recursive Procedures. How can you model the relationship between consecutive terms of a sequence?

Recursive Procedures. How can you model the relationship between consecutive terms of a sequence? 6. Recursive Procedures I Sectio 6.1, you used fuctio otatio to write a explicit formula to determie the value of ay term i a Sometimes it is easier to calculate oe term i a sequece usig the previous terms.

More information

Thompson s Group F (p + 1) is not Minimally Almost Convex

Thompson s Group F (p + 1) is not Minimally Almost Convex Thompso s Group F (p + ) is ot Miimally Almost Covex Claire Wladis Thompso s Group F (p + ). A Descriptio of F (p + ) Thompso s group F (p + ) ca be defied as the group of piecewiseliear orietatio-preservig

More information

Optimum Solution of Quadratic Programming Problem: By Wolfe s Modified Simplex Method

Optimum Solution of Quadratic Programming Problem: By Wolfe s Modified Simplex Method Volume VI, Issue III, March 7 ISSN 78-5 Optimum Solutio of Quadratic Programmig Problem: By Wolfe s Modified Simple Method Kalpaa Lokhade, P. G. Khot & N. W. Khobragade, Departmet of Mathematics, MJP Educatioal

More information

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs What are we goig to lear? CSC316-003 Data Structures Aalysis of Algorithms Computer Sciece North Carolia State Uiversity Need to say that some algorithms are better tha others Criteria for evaluatio Structure

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects. The

More information

Ch 9.3 Geometric Sequences and Series Lessons

Ch 9.3 Geometric Sequences and Series Lessons Ch 9.3 Geometric Sequeces ad Series Lessos SKILLS OBJECTIVES Recogize a geometric sequece. Fid the geeral, th term of a geometric sequece. Evaluate a fiite geometric series. Evaluate a ifiite geometric

More information

Chapter 8. Strings and Vectors. Copyright 2014 Pearson Addison-Wesley. All rights reserved.

Chapter 8. Strings and Vectors. Copyright 2014 Pearson Addison-Wesley. All rights reserved. Chapter 8 Strigs ad Vectors Overview 8.1 A Array Type for Strigs 8.2 The Stadard strig Class 8.3 Vectors Slide 8-3 8.1 A Array Type for Strigs A Array Type for Strigs C-strigs ca be used to represet strigs

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time ( 3.1) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step- by- step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

Analysis of Algorithms

Analysis of Algorithms Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Ruig Time Most algorithms trasform iput objects ito output objects. The

More information

Perhaps the method will give that for every e > U f() > p - 3/+e There is o o-trivial upper boud for f() ad ot eve f() < Z - e. seems to be kow, where

Perhaps the method will give that for every e > U f() > p - 3/+e There is o o-trivial upper boud for f() ad ot eve f() < Z - e. seems to be kow, where ON MAXIMUM CHORDAL SUBGRAPH * Paul Erdos Mathematical Istitute of the Hugaria Academy of Scieces ad Reu Laskar Clemso Uiversity 1. Let G() deote a udirected graph, with vertices ad V(G) deote the vertex

More information

Improved Random Graph Isomorphism

Improved Random Graph Isomorphism Improved Radom Graph Isomorphism Tomek Czajka Gopal Paduraga Abstract Caoical labelig of a graph cosists of assigig a uique label to each vertex such that the labels are ivariat uder isomorphism. Such

More information

CS200: Hash Tables. Prichard Ch CS200 - Hash Tables 1

CS200: Hash Tables. Prichard Ch CS200 - Hash Tables 1 CS200: Hash Tables Prichard Ch. 13.2 CS200 - Hash Tables 1 Table Implemetatios: average cases Search Add Remove Sorted array-based Usorted array-based Balaced Search Trees O(log ) O() O() O() O(1) O()

More information

Massachusetts Institute of Technology Lecture : Theory of Parallel Systems Feb. 25, Lecture 6: List contraction, tree contraction, and

Massachusetts Institute of Technology Lecture : Theory of Parallel Systems Feb. 25, Lecture 6: List contraction, tree contraction, and Massachusetts Istitute of Techology Lecture.89: Theory of Parallel Systems Feb. 5, 997 Professor Charles E. Leiserso Scribe: Guag-Ie Cheg Lecture : List cotractio, tree cotractio, ad symmetry breakig Work-eciet

More information

Lecture Notes on Integer Linear Programming

Lecture Notes on Integer Linear Programming Lecture Notes o Iteger Liear Programmig Roel va de Broek October 15, 2018 These otes supplemet the material o (iteger) liear programmig covered by the lectures i the course Algorithms for Decisio Support.

More information

The golden search method: Question 1

The golden search method: Question 1 1. Golde Sectio Search for the Mode of a Fuctio The golde search method: Questio 1 Suppose the last pair of poits at which we have a fuctio evaluatio is x(), y(). The accordig to the method, If f(x())

More information