arxiv: v1 [math.co] 10 Aug 2016

Size: px
Start display at page:

Download "arxiv: v1 [math.co] 10 Aug 2016"

Transcription

1 LOWER BOUNDS FOR ON-LINE INTERVAL COLORING WITH VECTOR AND CARDINALITY CONSTRAINTS GRZEGORZ GUTOWSKI AND PATRYK MIKOS arxiv: v1 [ath.co] 10 Aug 2016 Abstract. We propose two strategies for Presenter in the on-line interval graph coloring gaes. Specifically, we consier a setting in which each interval is associate with a -iensional vector of weights an the coloring nees to satisfy the -iensional banwith constraint, an the k-carinality constraint. Such a variant was first introuce by Epstein an Levy an it is a natural oel for resource-aware task scheuling with ifferent share resources where at ost k tasks can be scheule siultaneously on a single achine. The first strategy forces any on-line interval coloring algorith to use at least (5 3) log+3 ifferent colors on an ( k +log+3) -colorable set of intervals. The secon strategy forces any on-line interval coloring algorith to use at least 5 2 log+3 ifferentcolorsonan( k +log+3) -colorablesetofunitintervals. 1. Introuction A proper coloring of a graph G is an assignent of colors to the vertices of the graph such that ajacent vertices receive istinct colors. A k-boune coloring of G is a proper coloring of G such that the nuber of vertices that receive any single color is at ost k. For a graph G, let χ(g) enote the chroatic nuber of G, that is the iniu nuber of colors in a proper coloring of G, an let ω(g) enote the clique nuber of G, that is, the axiu size of a subset of vertices such that any two vertices in the subset are ajacent. An on-line graph coloring gae is a two-person gae, playe by Presenter an Algorith. In each roun Presenter introuces a new vertex of a graph with its ajacency status to all vertices presente earlier. Algorith assigns a color to the incoing vertex in such a way that the coloring of the presente graph is proper. The color of the new vertex is assigne before Presenter introuces the next vertex an the assignent is irrevocable. The goal of Algorith is to iniize the nuber of ifferent colors use uring the gae. In the k-boune variant of the gae, the coloring constructe by Algorith nees to be a k-boune coloring of the presente graph. For an interval I = [l,r] on the real line, we say that l is the left enpoint, an r is the right enpoint of I. The length of interval I is the ifference between its right enpoint an its left enpoint. A set of intervals on the real line represents a graph in the following way. Each interval represents a vertex an any two vertices 1

2 are joine by an ege whenever the corresponing intervals intersect. A graph which aits such a representation is an interval graph. An on-line interval coloring gae is a two-person gae, again playe by Presenter an Algorith. In each roun Presenter introuces a new interval on the real line. Algorith assigns a color to the incoing interval in such a way that the coloring of the presente interval graph is proper, i.e. all intervals of the sae color are pairwise isjoint. The color of the new interval is assigne before Presenter introuces the next interval an the assignent is irrevocable. The goal of Algorith is to iniize the nuber of ifferent colors use uring the gae. We consier a few variants of the on-line interval coloring gae. In the unit variant of the gae, all intervals presente by Presenter are of length exactly 1. In the -iensional variant of the gae, Presenter associates a -iensional vector of weights fro [0, 1] with each presente interval. Moreover, the coloring constructe by Algorith nees to satisfy a ifferent conition. The conition is that for each color γ an any point p on the real line, the su of weights of intervals containing p an colore γ oes not excee 1 in any of the coorinates. In the k-carinality variant of the gae, the coloring constructe by Algorith nees to satisfy that for each color γ an any point p on the real line, the nuber of intervals containing p an colore γ oes not excee k. We are ost intereste in the on-line (k,) interval coloring, a variant in which each interval has a -iensional vector of weights an the coloring ust satisfy constraints of both -iensional an k-carinality variant. That is, for each color γ an any point p, the nuber of intervals containing p an colore γ oes not excee k, an the su of weights of those intervals oes not excee 1 in any coorinate. In the context of various on-line coloring gaes, the easure of the quality of a strategy for Algorith is given by copetitive analysis. A coloring strategy for Algorith is r-copetitive if it uses at ost r c colors for any c-colorable graph, or set of intervals, presente by Presenter. The copetitive ratio for a proble is the infiu of all values r such that there exists an r-copetitive strategy for Algorith for this proble. In this paper we give lower bouns on copetitive ratios for ifferent probles. We obtain these results by presenting explicit strategies for Presenter that force any Algorith strategy to use any colors while the presente graph, or set of intervals, is colorable with a saller nuber of colors. We say that a strategy for Presenter in an on-line coloring proble is transparent if after each tie Algorith assigns a color to a vertex, or interval, Presenter colors the vertex with his own color an reveals that color to Algorith. The coloring constructe by Presenter ust satisfy the sae conitions as the coloring constructe by Algorith. The nuber of colors use by a transparent strategy for Presenter gives an upper boun on the iniu nuber of colors that can be use in a coloring. 2

3 1.1. Previous work. There is a siple strategy for Presenter in on-line graph coloring gae that forces Algorith to use any nuber of colors while the constructe graph is 2-colorable. Thus, the copetitive ratio for this proble is unboune. Nevertheless, it is an interesting question what is the copetitive ratio when the on-line gae is playe only for at ost n rouns. Hallórsson an Szegey [4] presente a transparent strategy for Presenter that forces Algorith to use at least 2 n (1+o(1)) ifferent colors in n rouns of the gae while the constructe logn ( graph is logn(1+o(1))-colorable. The best known upper boun of O n log n the copetitive ratio for the n-roun on-line graph coloring proble was given by Lovasz, Saks an Trotter [6]. The copetitive ratio for the on-line interval coloring proble was establishe by Kierstea an Trotter [5]. They constructe a strategy for Algorith that uses at ost 3ω 2 colors while the clique size of the constructe graph is ω. They also presente a atching lower boun a strategy for Presenter that forces Algorith to use at least 3ω 2 colors. Unit variant of the on-line interval coloring proble was stuie by Epstein an Levy [2]. They presente a strategy for Presenter that forces Algorith to use at least 3ω 2 colors while the clique size of the constructe graph is ω. Moreover, they showe that First-Fit algorith uses at ost 2ω 1 colors. Epstein an Levy [3] introuce any variants of the on-line interval coloring proble. The best known lower boun on the copetitive ratio for the on-line (k,) interval coloring is 3 for sall k an 24 for large k. For unit 7 variant of this proble the best known lower boun is 3. 2 Hallórsson an Szegey ieas were aopte by Azar et al. [1] to show lower bouns on copetitive ratio for on-line -vector bin packing. This proble is equivalent to a variant of -iensional on-line interval coloring where all presente intervals are the interval [0, 1] with ifferent vectors of weights. Their strategy for Presenter shows that the copetitive ratio for the on-line -iensional unit interval coloring proble is at least 2 (1+o(1)). log Our results. We generalize Hallórsson an Szegey [4] strategy into the setting of the k-boune coloring, an using the technique siilar to the one by Azar et al. [1] we aopt it to the on-line (k,) interval coloring proble. We present how to cobine this technique with classical results by Kierstea an Trotter [5], an by Epstein an Levy [2, 3] to obtain a new lower boun of 5 log( +log)(1+o(1)) on the copetitive ratio for the on-line (k,) interval coloring, an a lower boun of 5 k 2 +log)(1+o(1)) for unit variant of this proble. log( k 2. Graph coloring Theore 1. For every n 2 an k N +, there is a transparent strategy for n Presenter that forces Algorith to use at least 2 ifferent colors in the n- logn+3 roun, k-boune on-line graph coloring gae an uses n +logn+3 colors. k 3 ) on

4 Proof. Let b = logn +3. The state of a k-boune on-line graph coloring gae is represente by a progress atrix M. Each cell M[i,j] is either epty or it contains exactly one vertex. At the beginning of the gae, all cells are epty. A vertex in M[i,j] is colore by Algorith with color j an by Presenter with color i. Each player can use a single color γ to color at ost k vertices, so there are at ost k vertices in any colun, an in any row of the progress atrix. We say that a row with k vertices is eplete. Presenter can no longer use colors corresponing to eplete rows. Presenter aintains a set of exactly b active rows, enote A, that contains all nonepty non-eplete rows an aitionally soe epty rows ({i : 1 j M[i,j] < k} A an A = b). At the beginning of the gae there are no eplete rows an A = {1,...,b}. When soe row becoes eplete then it is reove fro A an a new epty row is ae to A. A pattern is a subset of rows. We say that a pattern p represents a colun j if i : i p M[i,j]. A pattern p is active if it is a nonepty subset of A such that p b 2. An active pattern p is present in M if at least one colun of M is represente by p v 1 v 3 v 5 v 7 2 v 2 v 10 v 12 3 v 15 v 4 v 9 v 13 4 v 6 v 11 5 v 8 v Table 1. Exaple of a progress atrix after 15 rouns Table 1 shows a possible state of the progress atrix M after 15 rouns of the 4-boune on-line graph coloring gae with n = 4 an b = 4. In this exaple, the last introuce vertex v 15 is colore by Algorith with color 2 an by Presenter withcolor3. Rows1an3areepleteanthesetofactiverowsisA = {2,4,5,6}. There are10 ifferent active patterns, but only2of the arepresent inm: pattern {2,5} in colun 6, an pattern {5} in colun 9. The transparent strategy for Presenter for roun t is as follows: (1) Choose an active pattern p t that is not present in M. (2) Introuceanewvertexv t thatisajacenttoallverticescolorebypresenter with colors not in p t. (3) Algorith colors v t with color γ. (4) Color v t with any color such that p t an M[,γ] =. We clai that Presenter can follow this strategy as long as there is an active pattern not present in the progress atrix. To prove that, we nee to show that in 4

5 step (4) Presenter always can choose an appropriate color, an that the coloring constructe by Presenter is a k-boune coloring of the constructe graph. Let q be a pattern that represents colun M[,γ] of the progress atrix before roun t. We clai that q p t. Assue to the contrary that i q p t. It follows, that there is a vertex v in cell M[i,γ] an by rule (2) v is ajacent to v t. Thus, Algorith cannot color vertex v t with color γ. Pattern q is present in M before roun t an by rule (1) pattern p t is not present in M before roun t. It follows that q is a strict subset of p t an Presenter has at least one choice for color in step (4). When Presenter assigns color to vertex v t, we have that p t ; p t is an active pattern; is an active row, an there are less than k vertices colore by Presenter with. Rule (2) asserts that none of the vertices ajacent to v t is colore with any of the colors in p t. Thus, we have that Presenter can follow the strategy as long as there is a choice of an appropriate pattern in step (1). ( b ) clai that the gae can be playe for at least n rouns. Inee, there are xwe ifferent patterns of size x an each one of the ust represent a colun of the progress atrix with exactly x vertices. Thus, when all active patterns represent soe colun of the progress atrix, the gae has been playe for at least 1 x 2 x( b x) n rouns. b After n rouns, Presenter use colors corresponing to eplete an active rows. There are at ost n k eplete rows an exactly logn + 3 active rows. Thus, Presenter uses at ost n +logn+3 colors in the first n rouns. k Let q j be a pattern representing colun M[,j] after n rouns. Let t be the last roun when a vertex was ae to colun j. We have that q j is a subset of pattern p t which was an active pattern before roun t, an the size of q j is at ost b 2. Thus, there are at least 2 n nonepty coluns after n rouns. logn+3 For fixe paraeters n an k, enote a generalize Hallórsson an Szegey strategy by HS k,n. Note that for k = +, there are no eplete rows in atrix M an k-boune coloring is siply a proper coloring. In this case we get the original Hallórsson an Szegey result for the on-line graph coloring proble. Theore 2 (Hallórsson, Szegey [4]). For every integer n 2, there is a transparent strategy for Presenter that forces Algorith to use at least 2 colors in n logn+3 the n-roun on-line graph coloring gae an uses logn+3 colors. 3. Interval coloring In the proof of the following theore, we use strategy HS k, to show a lower boun on the copetitive ratio for the on-line (k, ) interval coloring proble. Theore 3. For every 2 an k, N +, there is a strategy for Presenter that forces Algorith to use at least (5 3) ifferent colors in the on-line (k,) log+3 5

6 interval coloring gae while the constructe set of intervals is ( k +log+3) - colorable. Proof. For any fixe paraeters k N +, 2, L < R, ε (0, 1 ) we escribe an auxiliary strategy HS k, (ε,l,r). Let α = 1 1ε, δ = 1 ε. In the t-th roun of the 2 2 on-line (k,) interval coloring gae, Presenter uses HS k, strategy to get a new vertexv t. Then, presentsaninterval[l,r]withweightsw t,wherew t = (x 1,...,x ) is a -iensional vector with x t = α, x i = ε for all i < t such that v i is ajacent to v t, an x i = δ in every other coorinate. Figure 1 shows an exaple of w 6 for a vertex v 6 that is ajacent to v 2 an v 5. α ε ε δ δ δ δ δ δ Figure 1. Encoing of v 6 in a -iensional vector of weights ([L,R],w t ) is colore by Algorith with color γ t. Then, γ t is forware to HS k, as the color of v t. HS k, colors v t with t, but Presenter iscars that inforation. See Figure 2 for a iagra of the strategy HS k, (ε,l,r), an Figure 3 for an exaple encoing of a graph. Algorith [L,R],w t encoe γ t v t t HS k, Figure 2. Encoing of HS k, strategy We clai that the encoing strategy ensures that any intervals I i an I j can get the sae color iff vertices v i an v j are not ajacent. First, assue that i < j an v i is ajacent to v j. Vector w i has α in the i-th coorinate, vector w j has ε in the i-th coorinate, an α + ε > 1. Thus, intervals I i an I j ust be colore with ifferent colors. Let J {I 1,...,I t 1 } be the set of intervals colore with γ before roun t. Assue that v t is not ajacent to any of the vertices in J. Denote the l-th coorinate of the su of vectors of weights of intervals in J by W l. For any 1 l, if I l J then W l = α+δ( J 1) < 1 δ. In this case we have that v t is not ajacent to v l, an that the l-th coorinate of the vector of weights 6

7 of v t is δ. If I l / J then W l ε J < 1 ε. For l = t, we have W l δ J 1 α. Thus, the su of vector of weights of the intervals in the set J {I t } oes not excee 1 in any coorinate an I t can be colore with γ. w 1 α δ δ δ δ δ v 4 w 2 ε α δ δ δ δ w v 1 v 3 v 3 δ ε α δ δ δ 6 w 4 ε δ ε α δ δ v 2 v w 5 δ ε ε δ α δ 5 w 6 δ δ δ ε ε α Figure 3. Exaple of a graph an vectors of weights corresponing to the vertices Consier a sequence of paraeters {ε i } i N+ efine as ε i := ( 1 2) i. See that for every i N + we have ε i (0, 1 ) an we can use HS k,(ε i,l,r) strategy. Let α i = ε i an δ i = 1 2 ε i = ε i+1. Let J i be a set of intervals constructe by HS k, (ε i,l i,r i ) strategy an J j be a set of intervals constructe by HS k, (ε j,l j,r j ) strategy. Assue that i < j, [L i,r i ] [L j,r j ] an that the construction of J i is finishe before the construction of J j starts. Any interval I J j has weight α j in one of the coorinates an every interval in J i has weight either α i,ε i or δ i in that coorinate. In any case, su of those weights excees 1 an no two intervals, one in J i, other in J j can be colore with the sae color. The rest of the proof uses a technique siilar to the one by Kierstea an Trotter [5]. For N +, let c = (5 3) log+3, an o = ( k +log+3). By inuction on, we show a strategy S for Presenter such that: all introuce intervals are containe in a fixe region [A, B]; all intervals coe fro calls of strategies HS k, (ε,l,r) with ε in {ε 1,...,ε 3 }; Algorith uses at least c ifferent colors; constructe set ofintervals iso -colorable. For = 1anafixe region [A,B], Presenter uses strategy HS k, (ε 1,A,B). This strategy forces Algorith to use at least c 1 ifferent colors, an the constructe set of intervals is o 1 -colorable. Thus, in this case we are one. Let c = 3 ( c +1 c ) + 1. Presenter splits the fixe region [A,B] into c isjoint regions [l 1,r 1 ],...,[l c,r c ]. By inuction, in each region Presenter can use strategy S inepenently. As a result, in each region [l i,r i ], we get a set of intervals J i. If uring the construction Algorith uses at least c +1 colors, we are one. Otherwise, let C i be a c -eleent subset of colors use by Algorith to color J i. Soe c -eleent set of colors C appears on the list (C 1,...,C c ) at least 4 ties. Let a,b,c, {1,..., c}, a < b < c < be inices such that C a = C b = C c = C = C. Define p i = 1 2 (r i +l i+1 ) for i = a,b,c. Presenter uses strategy HS k, (ε 3+1,l a,p a ) to get a set of intervals K 1 an then strategy HS k, (ε 3+1, rc+pc 2,r ) to get a set of intervals K 2. Let D 1 be a c 1 -eleent 7

8 subset of colors use by Algorith to color K 1, an D 2 be a c 1 -eleent subset of colors use to color K 2. The construction of J a an J is finishe before the construction [ of K 1 an K 2 starte an region [l a,p a ] covers [l a,r a ], an region rc+p c ],r 2 covers [l,r ]. Thus, none of the colors in C can be use to color any interval in K 1 or K 2. Now, the strategy splits into two cases: we either have D 1 D 2 1c 2 1 or D 1 D 2 > 1c 2 1. Case 1. D 1 D 2 1c 2 1. Presenter uses strategy HS k, (ε 3+2, ra+pa,p 2 c ) to get a set of intervals K 3. Let D 3 be the set of colors use to color K 3. See Figure 4 for a iagra of the construction. Region [ r a+p a ],p 2 c covers [lb,r b ] an we get C D 3 =. Moreover, any interval in K 3 intersects any interval in K 1, an any interval in K 2. Thus, D 3 D 1 =, D 3 D 2 =, an Algorith uses at least C D 1 D 2 D 3 c + c c c 1 = c +1 colors. Each set of intervals J 1,...,J c intersects with intervals in at ost one of the sets K 1, K 2, or K 3. Thus, all presente intervals can be colore with ax{2, + 1}( + log + 3) = o k +1 colors an in this case we are one. l a r a p a p b C a C b C c C l b r b l c r c l r D 1 D 2 D 3 p c Figure 4. Construction in case D 1 D c 1 Case 2. D 1 D 2 > 1 c 2 1. Presenter uses strategy HS k, (ε 3+2, r b+p b,p 2 c ) to get a set of intervals K 4 an then strategy HS k, (ε 3+3, ra+pa,p 2 b ) to get K 5. Let D 4 be a c 1 -eleent subset of colors use by Algorith to color K 4, an D 5 be the set of colors use to color K 5. See Figure 5 for a iagra of the construction. Siilar arguent as in the previous case gives C D 4 =, C D 5 =, D 2 D 4 =, D 1 D 5 =,and 4 D 5 =. SetD 2 containsatleast 1c 2 1 eleentsfrothesetd 1. Thus, we have D 4 D 1 1c 2 1. Algorith uses at least C D 1 D 4 D 5 c +c c c 1 = c +1 colors. Each set of intervals J 1,...,J c intersects with intervals in at ost one of the sets K 1, K 2, K 4, or K 5. Thus, all intervals can be colore with ax{2,+1}( +log+3) = o k +1 colors. l a r a p a p b C a C b C c C l b r b l c r c l r D 1 D 2 D 5 D 4 p c Figure 5. Construction in case D 1 D c 1 8

9 4. Unit interval coloring Theore 4. For every 2 an k, N +, there is a strategy for Presenter that forces Algorith to use at least 5 ifferent colors in the on-line (k,) unit 2 log+3 interval coloring gae while the constructe set of intervals is ( +log+3) - k colorable. Proof. The proof cobines strategy HS k, (ε,l,r) introuce in the proof of Theore 3 with technique siilar to the one by Epstein an Levy [2, 3]. Assue that the sequence of encoing paraeters {ε i } i N+ is efine the sae way as in the proof of Theore 3. The strategy consists of 3 phases. In the initial phase Presenter uses strategy HS k, (ε i,0,1) for i = 1,..., 2 sequentially. There is a coloring of all intervals introuce in the initial phase using ( +log+3) colors, but Algorith uses 2 k at least 2 colors. Let C 2 log+3 init be a 2 -eleent subset of colors use 2 log+3 by Algorith in the initial phase. For L < R < L + 1, let Sep(L,R) be the separation strategy that introuces unit intervals in the following way. Initialize l = L, an r = R. To get next interval, calculate p = 1 (l +r) an introuce interval I = [p,p+1]. If Algorith 2 colors I with color in C init, then upate r = p. Otherwise, ark interval I an upate l = p. Observe that to the left of p there are only left enpoints of arke intervals. Moreover, all introuce intervals have nonepty intersection. The separation phase consists of 2 2 subphases. We fix L1 = 3 an R 2 1 = 2. For i = 2,...,2 2, points Li an R i are establishe after the (i 1)-th subphase. Denote by Sub i, the strategy for the i-th subphase being a cobination of the HS k, (ε i,0,1) strategy an the Sep(L i,r i ) strategy. Strategy Sub i introuces intervals. The position of each interval is eterine using Sep(L i,r i ) strategy, an the -iensional vector of weights associate with each interval is eterine accoring to HS k, (ε i,0,1). See Figure 6 for a iagra of the strategy Sub i. At the en of each subphase, Presenter ecies whether the subphase is arke or not. The set of arke subphases is enote by M. Let C i be the set of colors use by Algorith in the i-th subphase an not present in the set C init. Subphase i is arke if an only if one of the following conitions hols: (1) the nuber of reaining subphases incluing the i-th is 2 M. (2) C i an M < log+3 2, Observe that at the en of the separation phase we have exactly 2 arke subphases. 9

10 Algorith I t,w t γt cobine I t γ t [0,1],w t Sep(Li, Ri) HSk,(εi, 0, 1) Figure 6. Strategy Sub i for a single subphase Let L be the left enpoint of the leftost interval introuce in the i-th subphase. Let L be the left enpoint of the rightost interval introuce in the i-th subphase an colore by Algorith with a color c / C init. Set L = L i if such an interval oes not exist. Let R be the left enpoint of the leftost interval introuce in the i-th subphase an colore by Algorith with a color c C init. Set R = R i if such an interval oes not exist. If subphase i is arke then L i+1 = L an R i+1 = R. Otherwise, L i+1 = L i an R i+1 = L. This copletes the efinition of the separation phase. Let = 2 2 an P = 1 (L R +1). Observe that every interval introuce in the separation phase with the left enpoint to the left of P belongs to a arke subphase an is colore with a color c / C init. Let C sep be the set of colors use in the separation phase to color intervals with the left enpoint to the left of P. 2 In each subphase Algorith uses at least ifferent colors, so in the separation phase Algorith uses at least 2 log+3 2 colors in total. Because C 2 log+3 init = 2, Algorith, in the separation phase, uses at least 2 colors not 2 log+3 2 log+3 in C init. The set of arke subphases M contains x subphases in which Algorith use at least such colors an log+3 2 x last subphases. Fro the first 2 +x subphases only x subphases are arke. By the efinition, in an unarke subphase i for i 2 +x, Algorith uses less than colors not in C log+3 init. Thus, at ost such colors fro subphases 1 up to 2 log+3 2 +x are not in the set C sep. All colors not in C init use in the subphase i for i > 2 +x are in the set C sep. Thus, C sep. 2 log+3 In the final phase, Presenter uses strategy HS k, (ε i,p 1,P) for i = + 1,...,+ 2 sequentially. Every interval introuce in the final phase intersects with every interval fro the initial phase an every interval fro the separation phase with the left enpoint to the left of P. Thus, each color use in the final phase belongs neither to C init nor to C sep. In the final phase, Algorith uses at least 2 2 log+3 colors. 10

11 In total, Algorith uses at least ( ) = 5 ifferent colors. On the other han, the presente set of intervals can be easily colore 2 log+3 2 log+3 using ( 2 + )( ) ( 2 k +log+3 = ) k +log+3 colors. Notethatfork = +, thestrategyhs, becoes inepenent ofk-carinality constraint. This gives two new bouns on the copetitive ratio for on-line - iensional interval coloring probles. Theore 5. For every 2 an n N +, there is a strategy for Presenter that forces Algorith to use at least (5 3) ifferent colors in the online -iensional interval coloring gae while the constructe set of intervals is log+3 (log+3)-colorable. Theore 6. For every 2 an n N +, there is a strategy for Presenter that forces Algorith to use at least 5 ifferent colors in the on-line - 2 log+3 iensional unit interval coloring gae while the constructe set of intervals is (log+3)-colorable. References [1] Yossi Azar, Ilan Reuven Cohen, Seny Kaara, an Bruce Shepher. Tight bouns for online vector bin packing. In STOC 2013: 45th Annual ACM Syposiu on Theory of Coputing, Palo Alto, CA, USA, June Proceeings, pages , [2] Leah Epstein an Meital Levy. Online interval coloring an variants. In ICALP 2005: 32n International Colloqui on Autoata, Languages an Prograing, Lisbon, Portugal, July Proceeings, volue 3580 of Lecture Notes in Coputer Science, pages , [3] Leah Epstein an Meital Levy. Online interval coloring with packing constraints. In MFCS 2005: 30th International Syposiu on Matheatical Founations of Coputer Science, Gańsk, Polan, August Proceeings, volue 3618 of Lecture Notes in Coputer Science, pages , [4] Magnús M. Hallórsson an Mario Szegey. Lower bouns for on-line graph coloring. Theoretical Coputer Science, 130(1): , [5] Henry A. Kierstea an Willia T. Trotter. An extreal proble in recursive cobinatorics. In 12th Southeastern Conference on Cobinatorics, Graph Theory an Coputing, Baton Rouge, LA, USA, March Proceeings, vol. II, volue 33 of Congressus Nuerantiu, pages , [6] Laszlo Lovasz, Michael Saks, an W.T. Trotter. An on-line graph coloring algorith with sublinear perforance ratio. Discrete Matheatics, 75(1): , Theoretical Coputer Science Departent,, Faculty of Matheatics an Coputer Science,, Jagiellonian University, Kraków, Polan E-ail aress: {gutowski,ikos}@tcs.uj.eu.pl 11

λ-harmonious Graph Colouring Lauren DeDieu

λ-harmonious Graph Colouring Lauren DeDieu λ-haronious Graph Colouring Lauren DeDieu June 12, 2012 ABSTRACT In 198, Hopcroft and Krishnaoorthy defined a new type of graph colouring called haronious colouring. Haronious colouring is a proper vertex

More information

Gromov-Hausdorff Distance Between Metric Graphs

Gromov-Hausdorff Distance Between Metric Graphs Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value

More information

Fair Resource Allocation for Heterogeneous Tasks

Fair Resource Allocation for Heterogeneous Tasks Fair Resource Allocation for Heterogeneous Tasks Koyel Mukherjee, Partha utta, Gurulingesh Raravi, Thangaraj Balasubraania, Koustuv asgupta, Atul Singh Xerox Research Center India, Bangalore, India 560105

More information

WAVE OPTICS. Conceptual Questions Because ym

WAVE OPTICS. Conceptual Questions Because ym WAVE OPTICS Conceptual Questions.. The initial light pattern is a ouble-slit interference pattern. It is centere behin the ipoint of the slits. The slight ecrease in intensity going outwar fro the ile

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

Geometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem.

Geometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem. Noveber 13, 2016 Geoetry. The Method of the enter of Mass (ass points): Solving probles using the Law of Lever (ass points). Menelaus theore. Pappus theore. M d Theore (Law of Lever). Masses (weights)

More information

CS 361 Meeting 8 9/24/18

CS 361 Meeting 8 9/24/18 CS 36 Meeting 8 9/4/8 Announceents. Hoework 3 due Friday. Review. The closure properties of regular languages provide a way to describe regular languages by building the out of sipler regular languages

More information

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem Theoretical Analysis of Local Search and Siple Evolutionary Algoriths for the Generalized Travelling Salesperson Proble Mojgan Pourhassan ojgan.pourhassan@adelaide.edu.au Optiisation and Logistics, The

More information

L Destructive interference:

L Destructive interference: SPH3UW/SPH4UI Unit 9.3 Interference of Light in Two Diensions Page 1 of 11 Notes Physics Tool box A pair of ientical point sources operating in phase prouces a syetrical pattern of constructive an estructive

More information

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl. Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable

More information

The Internal Conflict of a Belief Function

The Internal Conflict of a Belief Function The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of

More information

Artifacts Reduction in Image Rendering of the Focused Plenoptic Camera Peng Liu 1, Rumin Zhang 2

Artifacts Reduction in Image Rendering of the Focused Plenoptic Camera Peng Liu 1, Rumin Zhang 2 International Conference on Intelligent Systes Research an Mechatronics Engineering (ISRME 2015) Artifacts Reuction in Iage Renering of the Focuse Plenoptic Caera Peng Liu 1, Ruin Zhang 2 School of Electronic

More information

The Unit Bar Visibility Number of a Graph

The Unit Bar Visibility Number of a Graph The Unit Bar Visibility Nuber of a Graph Eily Gaub 1,4, Michelle Rose 2,4, and Paul S. Wenger,4 August 20, 2015 Abstract A t-unit-bar representation of a graph G is an assignent of sets of at ost t horizontal

More information

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT

More information

arxiv: v1 [math.co] 15 Dec 2017

arxiv: v1 [math.co] 15 Dec 2017 Rectilinear Crossings in Complete Balance -Partite -Uniform Hypergraphs Rahul Gangopahyay Saswata Shannigrahi arxiv:171.05539v1 [math.co] 15 Dec 017 December 18, 017 Abstract In this paper, we stuy the

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

ABC: Analyzing Loop Bounds and Complexities

ABC: Analyzing Loop Bounds and Complexities ABC: Analyzing Loop Bouns an Coplexities Régis Blanc, Thoas A. Henzinger, Thibau Hottelier, an Laura Kovács EPFL, Switzerlan Abstract. We present ABC, a software tool for autoatically coputing sybolic

More information

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13 Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical

More information

Construction of a regular hendecagon by two-fold origami

Construction of a regular hendecagon by two-fold origami J. C. LUCERO /207 Construction of a regular hendecagon by two-fold origai Jorge C. Lucero 1 Introduction Single-fold origai refers to geoetric constructions on a sheet of paper by perforing a sequence

More information

AN ATTRIBUTE DRIVEN APPROACH FOR IMAGE REGISTRATION USING ROAD NETWORKS

AN ATTRIBUTE DRIVEN APPROACH FOR IMAGE REGISTRATION USING ROAD NETWORKS AN ATTRIBUTE DRIVEN APPROACH FOR IMAGE REGISTRATION USING ROAD NETWORKS Caixia Wang, Peggy Agouris, Anthony Stefaniis Center for Earth Observing an Space Research Departent of Earth Systes an Geoinforation

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

P NP. Approximation Algorithms. Computational hardness. Vertex cover. Vertex cover. Vertex cover. Plan: Vertex Cover Metric TSP 3SAT

P NP. Approximation Algorithms. Computational hardness. Vertex cover. Vertex cover. Vertex cover. Plan: Vertex Cover Metric TSP 3SAT Great Theoretical Ideas In Coputer Science Victor Adachi CS - Carnegie Mellon University Approxiation Algoriths P NP Plan: Vertex Cover 3SAT Coputational hardness Suppose we are given an NP-coplete proble

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

Ranking Spatial Data by Quality Preferences

Ranking Spatial Data by Quality Preferences 1 Ranking Spatial Data by Quality Preferences Man Lung Yiu, Hua Lu, Nikos Maoulis, and Michail Vaitis Abstract A spatial preference query ranks objects based on the qualities of features in their spatial

More information

Optimal Oblivious Path Selection on the Mesh

Optimal Oblivious Path Selection on the Mesh Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract

More information

Design and Implementation of an Acyclic Stable Matching Scheduler

Design and Implementation of an Acyclic Stable Matching Scheduler Design and Ipleentation of an Acyclic Stable Matching Scheduler Enyue Lu Mei Yang Yi Zhang ands.q.zheng Dept. of Coputer Science Dept. of Coputer Science Dept. of Electrical Engineering University of Texas

More information

Optimal Route Queries with Arbitrary Order Constraints

Optimal Route Queries with Arbitrary Order Constraints IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL.?, NO.?,? 20?? 1 Optial Route Queries with Arbitrary Order Constraints Jing Li, Yin Yang, Nikos Maoulis Abstract Given a set of spatial points DS,

More information

Reconstruction of Time Series using Optimal Ordering of ICA Components

Reconstruction of Time Series using Optimal Ordering of ICA Components Reconstruction of Tie Series using Optial Ordering of ICA Coponents Ar Goneid and Abear Kael Departent of Coputer Science & Engineering, The Aerican University in Cairo, Cairo, Egypt e-ail: goneid@aucegypt.edu

More information

1 Extended Boolean Model

1 Extended Boolean Model 1 EXTENDED BOOLEAN MODEL It has been well-known that the Boolean odel is too inflexible, requiring skilful use of Boolean operators to obtain good results. On the other hand, the vector space odel is flexible

More information

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada

More information

3 Conference on Inforation Sciences and Systes, The Johns Hopkins University, March, 3 Sensitivity Characteristics of Cross-Correlation Distance Metric and Model Function F. Porikli Mitsubishi Electric

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

Guillotine subdivisions approximate polygonal subdivisions: Part III { Faster polynomial-time approximation schemes for

Guillotine subdivisions approximate polygonal subdivisions: Part III { Faster polynomial-time approximation schemes for Guillotine subdivisions approxiate polygonal subdivisions: Part III { Faster polynoial-tie approxiation schees for geoetric network optiization Joseph S. B. Mitchell y April 19, 1997; Last revision: May

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information

A simplified approach to merging partial plane images

A simplified approach to merging partial plane images A siplified approach to erging partial plane iages Mária Kruláková 1 This paper introduces a ethod of iage recognition based on the gradual generating and analysis of data structure consisting of the 2D

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

Data Caching for Enhancing Anonymity

Data Caching for Enhancing Anonymity Data Caching for Enhancing Anonyity Rajiv Bagai and Bin Tang Departent of Electrical Engineering and Coputer Science Wichita State University Wichita, Kansas 67260 0083, USA Eail: {rajiv.bagai, bin.tang}@wichita.edu

More information

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We

More information

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

6.1 Topological relations between two simple geometric objects

6.1 Topological relations between two simple geometric objects Chapter 5 proposed a spatial odel to represent the spatial extent of objects in urban areas. The purpose of the odel, as was clarified in Chapter 3, is ultifunctional, i.e. it has to be capable of supplying

More information

Efficient Learning of Generalized Linear and Single Index Models with Isotonic Regression

Efficient Learning of Generalized Linear and Single Index Models with Isotonic Regression Efficient Learning of Generalized Linear and Single Index Models with Isotonic Regression Sha M. Kakade Microsoft Research and Wharton, U Penn skakade@icrosoft.co Varun Kanade SEAS, Harvard University

More information

Visual Analysis of Vehicle Voice Navigation with Parallel Coordinates

Visual Analysis of Vehicle Voice Navigation with Parallel Coordinates Visual Analysis of Vehicle Voice Navigation with Parallel Coorinates Miao Wang Nanyang Institute of Technology. Henan. China Corresponing E-ail:Wang@126.co Abstract - In the fiel of vehicle voice navigation,

More information

Solutions to Tutorial 1 (Week 8)

Solutions to Tutorial 1 (Week 8) The University of Syney School of Mathematics an Statistics Solutions to Tutorial 1 (Week 8) MATH2069/2969: Discrete Mathematics an Graph Theory Semester 1, 2018 1. In each part, etermine whether the two

More information

Data & Knowledge Engineering

Data & Knowledge Engineering Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID

More information

A 2-Chain Can Interlock With an Open 10-Chain

A 2-Chain Can Interlock With an Open 10-Chain Sith ScholarWorks Coputer Science: Faculty Publications Coputer Science 8-19-2013 2-Chain Can Interlock With an Open 10-Chain in Lu California State University, Sacraento Joseph O'Rourke Sith College,

More information

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer Departent of Coputer Science and Engineering University of South Florida Tapa, FL 33620 Abstract -- The

More information

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones Advance Access publication on 24 February 2017 The British Coputer Society 2017. All rights reserved. For Perissions, please eail: journals.perissions@oup.co doi:10.1093/cojnl/bxx015 Fair Energy-Efficient

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Grid Minors in Damaged Grids

Grid Minors in Damaged Grids Grid Minors in Daaged Grids David Eppstein Departent of Coputer Science University of California, Irvine Irvine, California, U.S.A. eppstein@uci.edu Subitted: Nov 7, 2013; Accepted: Jul 24, 2014; Published:

More information

A Periodic Dynamic Load Balancing Method

A Periodic Dynamic Load Balancing Method 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

A Study of the Relationship Between Support Vector Machine and Gabriel Graph

A Study of the Relationship Between Support Vector Machine and Gabriel Graph A Study of the Relationship Between Support Vector Machine and Gabriel Graph Wan Zhang and Irwin King {wzhang, king}@cse.cuhk.edu.hk Departent of Coputer Science & Engineering The Chinese University of

More information

Automatic Graph Drawing Algorithms

Automatic Graph Drawing Algorithms Autoatic Graph Drawing Algoriths Susan Si sisuz@turing.utoronto.ca Deceber 7, 996. Ebeddings of graphs have been of interest to theoreticians for soe tie, in particular those of planar graphs and graphs

More information

Recognition and Rejection Performance in Wordspotting Systems Using Support Vector Machines

Recognition and Rejection Performance in Wordspotting Systems Using Support Vector Machines Recognition an Rejection Perforance in Worspotting Systes Using Support Vector Machines Yassine Ben Aye, Doinique Fohr, Jean Paul Haton, Gérar Chollet ENST, CNRS-LTCI, 46 rue Barrault, F75634 Paris ceex

More information

Approximate String Matching with Reduced Alphabet

Approximate String Matching with Reduced Alphabet Approxiate String Matching with Reduced Alphabet Leena Salela 1 and Jora Tarhio 2 1 University of Helsinki, Departent of Coputer Science leena.salela@cs.helsinki.fi 2 Aalto University Deptartent of Coputer

More information

MGS-SIFT: A New Illumination Invariant Feature Based on SIFT Descriptor

MGS-SIFT: A New Illumination Invariant Feature Based on SIFT Descriptor International Journal of Coputer Theory and Engineering, Vol 5, No, February 0 MGS-SIFT: A New Illuination Invariant Feature Based on SIFT Descriptor Reza Javanard Alitappeh and Fariborz Mahoudi Abstract

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

arxiv: v2 [math.co] 5 Jun 2018

arxiv: v2 [math.co] 5 Jun 2018 Some useful lemmas on the ege Szege inex arxiv:1805.06578v [math.co] 5 Jun 018 Shengjie He 1 1. Department of Mathematics, Beijing Jiaotong University, Beijing, 100044, China Abstract The ege Szege inex

More information

MATRIX CALCULATION BACKWARD CHAINING IN RULE BASED EXPERT SYSTEM

MATRIX CALCULATION BACKWARD CHAINING IN RULE BASED EXPERT SYSTEM 4 th Research/Expert Conference with International Participation QUAITY 5, Fojnica, B&H, Noveber 9 -, 5 ATRIX CACUATION BACKWARD CHAINING IN RUE BASED EXPERT SYSTE sc aro Hell Universit of Split, Facult

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

A Learning Framework for Nearest Neighbor Search

A Learning Framework for Nearest Neighbor Search A Learning Fraework for Nearest Neighbor Search Lawrence Cayton Departent of Coputer Science University of California, San Diego lcayton@cs.ucsd.edu Sanjoy Dasgupta Departent of Coputer Science University

More information

Real-Time Detection of Invisible Spreaders

Real-Time Detection of Invisible Spreaders Real-Tie Detection of Invisible Spreaders MyungKeun Yoon Shigang Chen Departent of Coputer & Inforation Science & Engineering University of Florida, Gainesville, FL 3, USA {yoon, sgchen}@cise.ufl.edu Abstract

More information

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

Privacy-preserving String-Matching With PRAM Algorithms

Privacy-preserving String-Matching With PRAM Algorithms Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,

More information

Regular and Irreguar m-polar Fuzzy Graphs

Regular and Irreguar m-polar Fuzzy Graphs Global Journal of Matheatical Sciences: Theory and Practical. ISSN 0974-300 Volue 9, Nuber 07, pp. 39-5 International Research Publication House http://www.irphouse.co Regular and Irreguar -polar Fuzzy

More information

Polynomial-Time Isomorphism of 1-L-Complete Sets

Polynomial-Time Isomorphism of 1-L-Complete Sets journal of coputer and syste sciences 53, 155160 (1996) article no. 0057 Polynoial-Tie Isoorphis of 1-L-Coplete Sets anindra Agrawal* and Soenath Biswas - epartent of Coputer Science and Engineering, Indian

More information

Homework 1. An Introduction to Neural Networks

Homework 1. An Introduction to Neural Networks Hoework An Introduction to Neural Networks -785: Introduction to Deep Learning Spring 09 OUT: January 4, 09 DUE: February 6, 09, :59 PM Start Here Collaboration policy: You are expected to coply with the

More information

Keyword Search in Spatial Databases: Towards Searching by Document

Keyword Search in Spatial Databases: Towards Searching by Document IEEE International Conference on Data Engineering Keyword Search in Spatial Databases: Towards Searching by Docuent Dongxiang Zhang #1, Yeow Meng Chee 2, Anirban Mondal 3, Anthony K. H. Tung #4, Masaru

More information

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH V. Atienza; J.M. Valiente and G. Andreu Departaento de Ingeniería de Sisteas, Coputadores y Autoática Universidad Politécnica de Valencia.

More information

A Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem

A Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem IE Vol. 7, No. 2, pp. 84-92, Septeber 2008. A Coparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Proble Ji Ung Sun School of Industrial and Managent Engineering Hankuk University

More information

Survivability Function A Measure of Disaster-Based Routing Performance

Survivability Function A Measure of Disaster-Based Routing Performance Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected

More information

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San

More information

INSERTION SORT is O(n log n)

INSERTION SORT is O(n log n) INSERTION SORT is On log n) Michael A. Bender Martín Farach-Colton Miguel A. Mosteiro Abstract Traditional INSERTION SORT runs in On 2 ) tie because each insertion takes On) tie. When people run INSERTION

More information

Colorado School of Mines. Computer Vision. Professor William Hoff Dept of Electrical Engineering &Computer Science.

Colorado School of Mines. Computer Vision. Professor William Hoff Dept of Electrical Engineering &Computer Science. Professor Willia Hoff Dept of Electrical Engineering &Coputer Science http://inside.ines.edu/~whoff/ 1 Caera Calibration 2 Caera Calibration Needed for ost achine vision and photograetry tasks (object

More information

@FMI c Kyung Moon Sa Co.

@FMI c Kyung Moon Sa Co. Annals of Fuzzy Matheatics and Inforatics Volue 1, No. 1, (January 2011), pp. 55-70 ISSN 2093-9310 http://www.afi.or.kr @FMI c Kyung Moon Sa Co. http://www.kyungoon.co Multi-granulation rough set: fro

More information

Ascending order sort Descending order sort

Ascending order sort Descending order sort Scalable Binary Sorting Architecture Based on Rank Ordering With Linear Area-Tie Coplexity. Hatrnaz and Y. Leblebici Departent of Electrical and Coputer Engineering Worcester Polytechnic Institute Abstract

More information

QoS and Sensible Routing Decisions

QoS and Sensible Routing Decisions QoS and Sensible Routing Decisions Erol Gelenbe Dept. of Electrical & Electronic Engineering Iperial College London SW7 2BT e.gelenbe@iperial.ac.uk Abstract Network Quality of Service (QoS) criteria of

More information

A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER

A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER VIOLETA TOMAŠEVIĆ, SLOBODAN BOJANIĆ 2 and OCTAVIO NIETO-TALADRIZ 2 The Mihajlo Pupin Institute, Volgina 5, 000 Belgrade, SERBIA AND MONTENEGRO 2 Technical University

More information

Contour is the shape or format of an object and can be either bi- or multidimensional. In

Contour is the shape or format of an object and can be either bi- or multidimensional. In Contour Algoriths Review arcos da Silva Sapaio Universidade Federal da Bahia (UFBA) arcos@sapaio.e Pedro Kroger Universidade Federal da Bahia (UFBA) kroger@pedrokroger.net Abstract: In this paper, we present

More information

An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured from Different Viewpoints

An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured from Different Viewpoints 519 An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured fro Different Viewpoints Yousuke Kawauchi 1, Shin Usuki, Kenjiro T. Miura 3, Hiroshi Masuda 4 and Ichiro Tanaka 5 1 Shizuoka

More information

On the Computation and Application of Prototype Point Patterns

On the Computation and Application of Prototype Point Patterns On the Coputation and Application of Prototype Point Patterns Katherine E. Tranbarger Freier 1 and Frederic Paik Schoenberg 2 Abstract This work addresses coputational probles related to the ipleentation

More information

HKBU Institutional Repository

HKBU Institutional Repository Hong Kong Baptist University HKBU Institutional Repository HKBU Staff Publication 18 Towards why-not spatial keyword top-k ueries: A direction-aware approach Lei Chen Hong Kong Baptist University, psuanle@gail.co

More information

The Henryk Niewodniczański INSTITUTE OF NUCLEAR PHYSICS Polish Academy of Sciences ul. Radzikowskiego 152, Kraków

The Henryk Niewodniczański INSTITUTE OF NUCLEAR PHYSICS Polish Academy of Sciences ul. Radzikowskiego 152, Kraków The Henryk Niewodniczański INSTITUT OF NUCLAR PHYSICS Polish Acadey of Sciences ul. Radzikowskiego 152, 31-342 Kraków www.ifj.edu.pl/reports/2005.htl Kraków, October 2005 Report No. 1968/D The theroluinescence

More information

A GRAPH-PLANARIZATION ALGORITHM AND ITS APPLICATION TO RANDOM GRAPHS

A GRAPH-PLANARIZATION ALGORITHM AND ITS APPLICATION TO RANDOM GRAPHS A GRAPH-PLANARIZATION ALGORITHM AND ITS APPLICATION TO RANDOM GRAPHS T. Ozawa and H. Takahashi Departent of Electrical Engineering Faculty of Engineering, Kyoto University Kyoto, Japan 606 Abstract. In

More information

2-connected graphs with small 2-connected dominating sets

2-connected graphs with small 2-connected dominating sets 2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A

More information

Efficient and Strategyproof Spectrum Allocations in Multi-Channel Wireless Networks

Efficient and Strategyproof Spectrum Allocations in Multi-Channel Wireless Networks Efficient and Strategyproof Spectru Allocations in Multi-Channel Wireless Networks Ping Xu, Xiang-Yang Li, Senior Meber, IEEE, ShaoJie Tang, and JiZhong Zhao Abstract In this paper, we study the spectru

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

MAC schemes - Fixed-assignment schemes

MAC schemes - Fixed-assignment schemes MAC schees - Fixed-assignent schees M. Veeraraghavan, April 6, 04 Mediu Access Control (MAC) schees are echaniss for sharing a single link. MAC schees are essentially ultiplexing schees. For exaple, on

More information

MAXIMUM MATCHINGS IN COMPLETE MULTIPARTITE GRAPHS

MAXIMUM MATCHINGS IN COMPLETE MULTIPARTITE GRAPHS Fura Uiversity Electroic Joural of Udergraduate Matheatics Volue 00, 1996 6-16 MAXIMUM MATCHINGS IN COMPLETE MULTIPARTITE GRAPHS DAVID SITTON Abstract. How ay edges ca there be i a axiu atchig i a coplete

More information

Image compression predicated on recurrent iterated function systems

Image compression predicated on recurrent iterated function systems 2n International Conference on Mathematics & Statistics 16-19 June, 2008, Athens, Greece Image compression preicate on recurrent iterate function systems Chol-Hui Yun *, Metzler W. a an Barski M. a * Faculty

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Affine Invariant Texture Analysis Based on Structural Properties 1

Affine Invariant Texture Analysis Based on Structural Properties 1 ACCV: The 5th Asian Conference on Coputer Vision, --5 January, Melbourne, Australia Affine Invariant Texture Analysis Based on tructural Properties Jianguo Zhang, Tieniu Tan National Laboratory of Pattern

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm roceedings of the 7th International Conference on Innovation & Manageent 893 Research on a Kind of QoS-Sensitive Seantic Web Services Coposition Method Based on Genetic Algorith Cao Hongjiang, Nie Guihua,

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses International Journal of Industrial Engineering & Production Research Septeber 03, Volue 4, Nuber 3 pp. 9-35 ISSN: 008-4889 http://ijiepr.iust.ac.ir/ Using Iperialist Copetitive Algorith in Optiization

More information