Routing Definition 4.1

Size: px
Start display at page:

Download "Routing Definition 4.1"

Transcription

1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing Routing involve two baic activitie: The determination of routing path, and the tranport of information group (typically called packet) along the path The firt item i uually referred to a path election, and the econd item i uually called packet witching In thi ection we only concentrate on the problem of electing good path Strategie for ending packet along the path will be dicued in the next ection Certainly, if there i only one ource-detination pair in the network that want to exchange information (and all the edge in the network have the ame capacity), then the bet olution would be to connect them via a hortet path But what about multiple ource-detination pair? Chooing a hortet path for each of them may lead to a high congetion and therefore a poor routing performance For example, conider a complete binary tree in which the leave are connected o that they form an n n-meh Then for mot pair of node the hortet path would lead via the root of the binary tree, but if many node want to exchange information, it i much better to ue the meh-edge intead becaue otherwie the root would become a highly congeted point So it appear that a certain degree of coordination i neceary among the node to arrive at good path A naive trategy would be to imply collect information about all the meage that the node want to end out, and then to compute a bet poible collection of path for them But thi i certainly not practical in a large network Ideally, we would like to have a path election trategy that allow the node to decide locally, ie without conulting other node, along which path (rep edge) to forward a packet There are baically two approache to that: obliviou routing and adaptive routing In obliviou routing, a fixed ytem of optional path i computed in advance for every ource-detination pair, and every packet for that pair mut travel along one of thee optional path (ee Figure 1) Thu, the path a packet take only depend on it ource-detination pair (and maybe a random choice to elect one of the option) Formally, thi can be expreed a follow: Definition 41 An obliviou routing trategy i pecified by a path ytem P and a weight function w : P IR + with the property that for every ource-detination pair (, t), the ytem of flow path P,t for (, t) in P fulfill q P,t w(q) = 1 In the cae of a flow problem, the weight indicate how a flow from to t ha to be plit among the path in P,t, and in the cae of a packet routing problem, the weight indicate the probability that a packet from a ource to a detination t chooe ome particular path p P,t In adaptive routing, the path taken by a packet may alo depend on other packet or event taking place in the network during it travel However, in thi ection we will only concentrate on obliviou routing We tart with an example of how to elect a good path ytem in a meh, followed by a general lower bound on the congetion if every ource-detination pair i jut given a ingle path Afterward, we how how to get around thi lower bound for the hypercube At the end we refine the path election problem for the meh to be more competitive with bet poible olution than the path election rule in the following ubection, which will demontrate that depite the retrictive nature of obliviou routing it i a quite powerful concept 1

2 1/8 1/4 1/8 1/2 t Figure 1: A ytem of optional path for the pair (, t) A can be eaily checked, q P,t w(q) = 1, ie the weight condition in Definition 41 i atified 41 Routing in a meh Conider the two-dimenional n n-meh Every node in thi meh ha a number (x, y) [n] 2 where x repreent it number in the x-dimenion and y repreent it number in the y-dimenion The x y routing trategy work a follow: Given a packet with ource-detination pair ((x 1, y 1 ), (x 2, y 2 )), firt route the packet along the x- dimenion from (x 1, y 1 ) to (x 2, y 1 ) and then along the y-dimenion from (x 2, y 1 ) to (x 2, y 2 ) Thi i certainly an obliviou routing trategy, ince the path of a packet only depend on it ource and detination How well can thi trategy now route arbitrary permutation routing problem? A permutation routing problem i a problem in which every node i the ource of exactly one ourcedetination pair and the detination of exactly one ource-detination pair and all demand are equal to 1 Thu, a permutation routing problem can be pecified by a permutation π : V V on the et of node V Theorem 42 The x y routing trategy can route arbitrary permutation in an n n-meh of unitcapacity edge with congetion at mot 2d and dilation at mot d, where d i the maximum ditance of a ource-detination pair in the permutation Proof We only prove the theorem for the wort cae, namely, that path can have a length of up to 2n The general cae will be an aignment Recall that in a permutation routing problem every node i the ource and detination of a demand of exactly 1 Thu, every x-dimenional line in the meh inject a total demand of at mot n, and every y-dimenional line in the meh ha to aborb a total demand of at mot n When uing the x y routing trategy, a total demand of at mot n can therefore overlap at an edge in x-direction, and a total demand of at mot n can overlap at an edge in y-direction Hence, the maximum fraction of each demand that can be atified o that we obtain a feaible flow i at leat 1/n, and therefore the congetion i at mot n Since the x y routing trategy ue hortet path and the diameter of the n n-meh i equal to 2(n 1), the dilation of the x y routing trategy can be at mot 2n 2

3 Thu, when uing the objective function behind the flow number, ie to minimize max{c(s), D(S)} over all feaible olution S, then the x y routing trategy i optimal up to a factor of 2 becaue the congetion never exceed the dilation by more than a factor of 2 42 The Borodin-Hopcroft lower bound The nice property of the x y routing trategy i that it jut ha to pecify one path for each ourcedetination pair Doe thi uffice to obtain good obliviou routing trategie for arbitrary network? The next theorem how that there i a limit to thi Theorem 43 ([1]) For every graph G of ize n and degree d and every obliviou routing trategy uing only a ingle path for every ource-detination pair, there i a permutation π in which a node i travered by at leat n/d path Proof Let [n] = {0,, n 1} repreent the et of all node in G and let P = {p i,j : i, j [n]} be any path ytem with exactly one path for every ource-detination pair A node i called a ource for node i wrt t if p,t move through i In Figure 2, for example, 3 i a ource for i wrt t G 2 1 i t 3 4 Figure 2: Illutration of the path to k In the following, we will contruct a permutation π with a high congetion Firt we how that for every node t there are many node that have many ource wrt t Let A(t, z) = {i [n] : i ha wrt t at leat z ource} be the et of all node that are contained in at leat z different path of P that lead to t Then the following lemma hold Lemma 44 For every t [n], A(t, z) n d z Proof For any fixed t [n], let L = {p,t : [n] and A(t, z)}, or in word, the number of path that tart outide of A(t, z), and let B L be the et of all direct neighbor of node in A(t, z) that are not in A(t, z) Obviouly, L = n A(t, z) Since the maximum degree of G i d, it further hold that B A(t, z) d Becaue B A(t, z) =, every node in B ha at mot z 1 path that lead to t Hence, 3

4 G B t A( t, z ) Figure 3: Illutration of A(t, z) and B B (z 1) L and therefore A(t, z) d (z 1) B (z 1) L A(t, z) d (z 1) n A(t, z) A(t, z) (d (z 1) + 1) n n A(t, z) d (z 1) + 1 n d z Now, let X(z) = {(i, t) : i, t [n] and i A(t, z)} = t [n](a(t, z) {t}) Then it hold X(z) = A(t, z) t [n] Lemma 44 n n d z = n2 d z For every node i let T i = {t : (i, t) X(z)} be the et of all detination for which at leat z path move through i Since T i = X(z) n2 d z i [n] but on the other hand there are only n et T i, there mut exit a node i with T i n Chooe z o d z that z and T i are of the ame ize Thi i the cae for z = n/d n or z = d z Thu, there mut be a node i for which there are at leat n/d detination that have at leat n/d path through i Simply chooing for all of thee detination one after the other any ource that ha not been choen by a previou detination reult in a partial permutation with an overlap of at leat n/d path at i Thu, for contant degree network with unit-capacity edge, the theorem implie that the congetion for routing a permutation can be a high a Θ( n) Wherea thi i fine for the 2-dimenional meh, for network with flow number O(log n) uch a the butterfly thi i unacceptably high, ince we know from Section 3 that every BMFP and therefore alo every permutation routing problem can be olved in the butterfly with congetion and dilation at mot O(log n) 4

5 43 Valiant Trick We aw in Section 42 that obliviou routing trategie with only a ingle path for each ourcedetination pair can have an extremely high congetion But what about multiple path? Let S be the bet poible olution for the multicommodity flow problem underlying the definition of F, ie F = max{c(s), D(S)} From Theorem 312 we know that by applying S twice we can olve every BMFP with congetion and dilation at mot 2F Thi work in a way that for every ource-detination pair (, t) we firt branch off the demand from to all other node in the ytem and afterward reunite it at the detination t Uing S twice till give an obliviou path ytem, but now we have many optional path for a flow In the cae of actually ending packet, thi boil down to the following trategy, which i a generalization of a well-known trick by Valiant [4]: For every packet with ource-detination pair (, t), chooe a random intermediate detination v [n] with probability c(v)/c(v ) and end the packet firt along a flow path in S from to v and then along a flow path in S from v to t (If there i more than one path from to v rep v to t in S, then there will be another random experiment for picking one of thee optional path baed on their flow value) For the imple cae that S only ha a ingle path for every ource-detination pair and c(v) i the ame for all node v, thi boil down to: For every packet with ource-detination pair (, t), chooe an intermediate detination v [n] uniformly at random and end the packet firt along the path in S from to v and then along the path in S from v to t To demontrate the effect of thi trick, let u conider routing in the d-dimenional hypercube Suppoe that for every ource-detination pair ( d 1,, 0 ), (t d 1,, t 0 ) {0, 1} d we ue the path that firt adjut 0 to t 0, then 1 to t 1, and o on, until all bit have been et to the detination value Let thee path form our path ytem S Becaue S ha exactly one path for every ource-detination pair, it follow from Theorem 43 that there mut be a permutation with at leat 2 d /d path travering a node and therefore a congetion of at leat ( 2 d /d)/d at an edge when uing S directly However, if we ue Valiant trick, we arrive at the following reult Theorem 45 Uing Valiant trick in the d-dimenional hypercube, any BMFP can be routed with congetion at mot 2d and dilation at mot 2d Proof Since the d-dimenional hypercube ha a diameter of d and S ue hortet path, the dilation of Valiant trick mut certainly be at mot 2d Thu, it remain to bound the congetion Firt, we determine the number of path S croing any edge of the hypercube Conider ome fixed edge e, and uppoe that e fixe dimenion i for ome i {0,, d 1}, ie it connect two node v and w in the hypercube that only differ at dimenion i When uing the bit adjutment trategy, then there are 2 i poible ource that can reach v before croing e in the direction of w, and 2 d i 1 poible detination can be reached after croing e Alo, there are 2 i poible ource that can reach w before croing e in the direction of v, and 2 d i 1 poible detination can be reached after croing e Hence, the number of all poible ource-detination pair whoe path cro e i equal to 2 2 i 2 d i 1 = 2 d (1) 5

6 Now, it follow from the definition of the pecial BMFP B that the demand of every ource-detination pair i equal to d d d 2 d = d 2 d (2) So the total demand croing an edge i equal to (1) (2) = d, but every edge can only upport a flow of 1 Hence, the maximum concurrent flow value f for S i 1/d Thi give a congetion of d for S and therefore a congetion of 2d for Valiant trick, becaue it double the overlap In general, it follow from Theorem 312: Theorem 46 For any network G with flow number F it hold: when uing Valiant trick on an optimal path collection for F, any BMFP can be routed in G with congetion and dilation at mot 2F In the cae of actually ending packet intead of flow, 2F i an upper bound on the expected congetion caued by the packet in the network 44 Obliviou routing for the meh reviited A we aw earlier, it i not really neceary to ue Valiant trick for the meh to be good for all BMFP in a ene that the congetion and dilation i alway cloe to the flow number However, if we are more picky here, then the x y routing trategy i till not really atifying, ince there are routing problem (other than BMFP) where the x y routing trategy would perform very poorly Imagine, for example, that we have a multicommodity flow problem for the n n-meh with ource-detination pair ((i, 0), (m, i)) for all i {0,, m 1}, where each pair i ha a demand of d i = m When uing the x y routing trategy, then all path for the pair would go though the edge {(m 1, 0), (m, 0)}, cauing a congetion of m 2 If, however, all pair would have ued a y x routing trategy, the congetion would have only been m (ee Figure 4) In the firt cae it would take Θ(m 2 ) time tep to end a flow of m for every ource-detination pair, wherea in the econd cae it would only take O(m) tep to do thi Hence, there would be a large difference between what the x y trategy can achieve and what can be achieved in the bet cae A imilar counterexample can alo be found for the y x trategy Alo, Valiant trick doe not help, becaue it would create a dilation of Θ(n), cauing a time of Ω(n) to deliver all flow, wherea for the cae that m = n thi can already be achieved in O( n) time tep So we need a different approach Fortunately, there i a better approach For implicity, we aume that we have an n n-meh of unit-capacity edge where n i a power of 2 For every ource-detination pair (, t), a ytem of flow path from to t i recurively contructed in the following way: Let M,t be the mallet poible 2 k 2 k -meh that ha in a corner and that contain t (if thi i not poible, M,t repreent the whole n n-meh) The flow path are contructed recurively a hown in Figure 5 Initially, all the flow tart at Then, it i evenly ditributed among all node in M 0 uing a mixed x y and y x routing trategy a ketched in Figure 5(b) That i, each node in M 0 receive a quarter of the flow, and the flow for the node at the oppoite corner of in M 0 come in equal part from the other two node in M 0 Afterward, the flow in M 0 i evenly ditributed among all node in M 4 Finally, the flow in M 4 i evenly ditributed among all node in M,t The ame i done from t Thu, the beginning and endpoint of the flow path from and t meet in M,t, reulting in a legal flow from to t 6

7 x-y routing trategy y-x routing trategy Figure 4: x y routing v y x routing on a meh It i clear that thi trategy i obliviou, but how good i it? For thi we need ome notation For any multicommodity flow problem P in the n n-meh let C P OPT be the bet poible congetion and and D P OPT be the bet poible dilation achievable for P (by poibly different olution) Theorem 47 For any multicommodity flow problem P our recurive routing cheme ha a congetion of O(C P OPT log n) and a dilation of O(D P OPT) Proof Suppoe that M,t i a 2 k 2 k -meh Then and t mut have a ditance of at leat 2 k 1 On the other ide, the longet poible path our routing trategy would contruct from ome node to ome node t in M,t i k 1 2 i=0 2(2 i 1) + 2(2 k 1) 4 2 k k = 6 2 k Thu, the dilation of our routing trategy i at mot a contant time the maximum ditance between a ource-detination pair in P and therefore bounded by O(D P OPT) Hence, it remain to bound the congetion Our aim will be to how that for every k, the congetion caued by all 2 k 2 k -mehe ued by ource-detination pair i at mot O(C P OPT) Since there are only log n different k, thi reult in a total congetion of O(C P OPT log n) So conider ome fixed k Given a ource-detination pair (, t) with demand d, let M be a 2 k 2 k -meh that i ued by (, t) to pread it demand to all node in M a hown in Figure 5(b) In thi cae, M ha a 2 k 1 2 k 1 -meh M in which the demand wa initially evenly ditributed among all of it node That i, every node in M had a demand of d/2 2(k 1) When uing a mixed x y and y x routing trategy for preading it out to M, every edge i croed by a demand of at mot 3 8 d 2 2(k 1) 2k 1 d 2 (3) k 7

8 M 6 M 8 M10 M 11 t M 9 M 7 3/8 1/8 M 2 M 3 1/8 M 4 M 5 1/4 remain 3/8 M 1 M 0 (a) (b) Figure 5: Recurive routing trategy from to t (a) illutrate the recurive decompoition into ubmehe and (b) illutrate the ditribution of flow from the haded ub-meh to the three other ubmehe in it next higher meh Now conider an edge e that i contained in m different 2 k 2 k -mehe M 1,, M m that belong to ource-detination pair ( 1, t 1 ),, ( m, t m ) with demand d 1,, d m Then it follow from (3) that e i croed by a total demand of at mot 2 k m i=1 d i On the other hand, one can draw a 2 k+1 2 k+1 - meh M around e that contain all ub-mehe M i Suppoe that of the total demand d = m i=1 d i a demand of d i routed completely inide of M from ource to detination, and a demand of d i leaving or entering M at ome point Since the ditance between i and t i mut be at leat 2 k 1 for every i, the average amount of the demand d croing an edge in M mut be at leat 2 k 1 d d = 2 22(k+1) 2 k+4 Furthermore, the average amount of demand croing an edge in (M, M) mut be at leat d d = 4 2k+1 2 k+3 Since either d or d mut be at leat d/2, every routing trategy mut therefore have an edge that i croed by a total demand of Ω(d/2 k ), ie COPT P = Ω(d/2 k ) On the other hand, we calculated that edge e i croed by a demand of O(d/2 k ) Hence, the congetion caued by our recurive cheme i O(COPT), P which complete the proof Thi reult i optimal, ince it i known that for every obliviou routing trategy on the n n-meh there i a routing problem P for which the trategy ha a congetion of Ω(C P OPT log n) [2] One may ak whether our upper bound for obliviou routing on a meh can alo be extended to other network Surpriingly, Räcke recently howed that when only looking at the congetion thi i poible: Theorem 48 ([3]) For every network with non-negative capacitie there i an obliviou routing trategy that achieve for every multicommodity flow problem P a congetion of O(C P OPT polylog(n)) 8

9 Hence, obliviou routing i a urpriingly powerful concept Reference [1] A Borodin and J Hopcroft Routing, merging, and orting on parallel model of computation Journal of Computer and Sytem Science, 30: , 1985 [2] B Magg, F M auf der Heide, B Vöcking, and M Wetermann Exploiting locality for network of limited bandwidth In Proc of the 38th IEEE Symp on Foundation of Computer Science (FOCS), page , 1997 [3] H Räcke Minimizing congetion in general network In Proc of the 43rd IEEE Symp on Foundation of Computer Science (FOCS), 2002 [4] L Valiant A cheme for fat parallel communication SIAM Journal on Computing, 2(11): ,

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

Shortest Path Routing in Arbitrary Networks

Shortest Path Routing in Arbitrary Networks Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

Shortest-Path Routing in Arbitrary Networks

Shortest-Path Routing in Arbitrary Networks Ž. Journal of Algorithm 31, 105131 1999 Article ID jagm.1998.0980, available online at http:www.idealibrary.com on Shortet-Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vocking

More information

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial

More information

Algorithmic Discrete Mathematics 4. Exercise Sheet

Algorithmic Discrete Mathematics 4. Exercise Sheet Algorithmic Dicrete Mathematic. Exercie Sheet Department of Mathematic SS 0 PD Dr. Ulf Lorenz 0. and. May 0 Dipl.-Math. David Meffert Verion of May, 0 Groupwork Exercie G (Shortet path I) (a) Calculate

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

Shortest Paths with Single-Point Visibility Constraint

Shortest Paths with Single-Point Visibility Constraint Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet

More information

xy-monotone path existence queries in a rectilinear environment

xy-monotone path existence queries in a rectilinear environment CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of

More information

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de

More information

Touring a Sequence of Polygons

Touring a Sequence of Polygons Touring a Sequence of Polygon Mohe Dror (1) Alon Efrat (1) Anna Lubiw (2) Joe Mitchell (3) (1) Univerity of Arizona (2) Univerity of Waterloo (3) Stony Brook Univerity Problem: Given a equence of k polygon

More information

Touring a Sequence of Polygons

Touring a Sequence of Polygons Touring a Sequence of Polygon Mohe Dror (1) Alon Efrat (1) Anna Lubiw (2) Joe Mitchell (3) (1) Univerity of Arizona (2) Univerity of Waterloo (3) Stony Brook Univerity Problem: Given a equence of k polygon

More information

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline Generic Travere CS 62, Lecture 9 Jared Saia Univerity of New Mexico Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v) from the bag if (v i unmarked) mark v; parent(v) = p;

More information

A note on degenerate and spectrally degenerate graphs

A note on degenerate and spectrally degenerate graphs A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove

More information

Brief Announcement: Distributed 3/2-Approximation of the Diameter

Brief Announcement: Distributed 3/2-Approximation of the Diameter Brief Announcement: Ditributed /2-Approximation of the Diameter Preliminary verion of a brief announcement to appear at DISC 14 Stephan Holzer MIT holzer@mit.edu David Peleg Weizmann Intitute david.peleg@weizmann.ac.il

More information

3D SMAP Algorithm. April 11, 2012

3D SMAP Algorithm. April 11, 2012 3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative

More information

An Intro to LP and the Simplex Algorithm. Primal Simplex

An Intro to LP and the Simplex Algorithm. Primal Simplex An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n

More information

New Structural Decomposition Techniques for Constraint Satisfaction Problems

New Structural Decomposition Techniques for Constraint Satisfaction Problems New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.

More information

Lecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization

Lecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization Lecture Outline Global flow analyi Global Optimization Global contant propagation Livene analyi Adapted from Lecture by Prof. Alex Aiken and George Necula (UCB) CS781(Praad) L27OP 1 CS781(Praad) L27OP

More information

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two

More information

Minimum Energy Reliable Paths Using Unreliable Wireless Links

Minimum Energy Reliable Paths Using Unreliable Wireless Links Minimum Energy Reliable Path Uing Unreliable Wirele Link Qunfeng Dong Department of Computer Science Univerity of Wiconin-Madion Madion, Wiconin 53706 qunfeng@c.wic.edu Micah Adler Department of Computer

More information

Delaunay Triangulation: Incremental Construction

Delaunay Triangulation: Incremental Construction Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

Contents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course:

Contents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course: Content Shortet path Algorithm and Network 21/211 The hortet path problem: Statement Verion Application Algorithm (for ingle ource p problem) Reminder: relaxation, Dijktra, Variant of Dijktra, Bellman-Ford,

More information

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -

More information

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,

More information

Chapter S:II (continued)

Chapter S:II (continued) Chapter S:II (continued) II. Baic Search Algorithm Sytematic Search Graph Theory Baic State Space Search Depth-Firt Search Backtracking Breadth-Firt Search Uniform-Cot Search AND-OR Graph Baic Depth-Firt

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

IMPLEMENTATION OF AREA, VOLUME AND LINE SOURCES

IMPLEMENTATION OF AREA, VOLUME AND LINE SOURCES December 01 ADMS 5 P503I1 IMPEMENTATION OF AREA, VOUME AND INE SOURCES The Met. Office (D J Thomon) and CERC 1. INTRODUCTION ADMS model line ource, and area and volume ource with conve polgon bae area.

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

AVL Tree. The height of the BST be as small as possible

AVL Tree. The height of the BST be as small as possible 1 AVL Tree re and Algorithm The height of the BST be a mall a poible The firt balanced BST. Alo called height-balanced tree. Introduced by Adel on-vel kii and Landi in 1962. BST with the following condition:

More information

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in

More information

Research Article Longest Path Reroute to Optimize the Optical Multicast Routing in Sparse Splitting WDM Networks

Research Article Longest Path Reroute to Optimize the Optical Multicast Routing in Sparse Splitting WDM Networks International Optic Volume 0, Article ID 9, page http://dxdoiorg/0/0/9 Reearch Article Longet Path Reroute to Optimize the Optical Multicat Routing in Spare Splitting WDM Network Huanlin Liu, Hongyue Dai,

More information

Laboratory Exercise 2

Laboratory Exercise 2 Laoratory Exercie Numer and Diplay Thi i an exercie in deigning cominational circuit that can perform inary-to-decimal numer converion and inary-coded-decimal (BCD) addition. Part I We wih to diplay on

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information

Quadrilaterals. Learning Objectives. Pre-Activity

Quadrilaterals. Learning Objectives. Pre-Activity Section 3.4 Pre-Activity Preparation Quadrilateral Intereting geometric hape and pattern are all around u when we tart looking for them. Examine a row of fencing or the tiling deign at the wimming pool.

More information

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov

More information

Drawing Lines in 2 Dimensions

Drawing Lines in 2 Dimensions Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional

More information

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck. Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization

More information

Optimal Gossip with Direct Addressing

Optimal Gossip with Direct Addressing Optimal Goip with Direct Addreing Bernhard Haeupler Microoft Reearch 1065 La Avenida, Mountain View Mountain View, CA 94043 haeupler@c.cmu.edu Dahlia Malkhi Microoft Reearch 1065 La Avenida, Mountain View

More information

A Practical Model for Minimizing Waiting Time in a Transit Network

A Practical Model for Minimizing Waiting Time in a Transit Network A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,

More information

Multicast with Network Coding in Application-Layer Overlay Networks

Multicast with Network Coding in Application-Layer Overlay Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 1, JANUARY 2004 1 Multicat with Network Coding in Application-Layer Overlay Network Ying Zhu, Baochun Li, Member, IEEE, and Jiang Guo Abtract

More information

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt

More information

Exploring Simple Grid Polygons

Exploring Simple Grid Polygons Exploring Simple Grid Polygon Chritian Icking 1, Tom Kamphan 2, Rolf Klein 2, and Elmar Langetepe 2 1 Univerity of Hagen, Praktiche Informatik VI, 58084 Hagen, Germany. 2 Univerity of Bonn, Computer Science

More information

SIMIT 7. Profinet IO Gateway. User Manual

SIMIT 7. Profinet IO Gateway. User Manual SIMIT 7 Profinet IO Gateway Uer Manual Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult are only non-binding uggetion

More information

9 Distributed Data Management II Caching

9 Distributed Data Management II Caching 9 Distributed Data Management II Caching In this section we will study the approach of using caching for the management of data in distributed systems. Caching always tries to keep data at the place where

More information

Representations and Transformations. Objectives

Representations and Transformations. Objectives Repreentation and Tranformation Objective Derive homogeneou coordinate tranformation matrice Introduce tandard tranformation - Rotation - Tranlation - Scaling - Shear Scalar, Point, Vector Three baic element

More information

Bottom Up parsing. Bottom-up parsing. Steps in a shift-reduce parse. 1. s. 2. np. john. john. john. walks. walks.

Bottom Up parsing. Bottom-up parsing. Steps in a shift-reduce parse. 1. s. 2. np. john. john. john. walks. walks. Paring Technologie Outline Paring Technologie Outline Bottom Up paring Paring Technologie Paring Technologie Bottom-up paring Step in a hift-reduce pare top-down: try to grow a tree down from a category

More information

A Novel Feature Line Segment Approach for Pattern Classification

A Novel Feature Line Segment Approach for Pattern Classification 12th International Conference on Information Fuion Seattle, WA, USA, July 6-9, 2009 A Novel Feature Line Segment Approach for Pattern Claification Yi Yang Intitute of Integrated Automation Xi an Jiaotong

More information

New Structural Decomposition Techniques for Constraint Satisfaction Problems

New Structural Decomposition Techniques for Constraint Satisfaction Problems 113 New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory, Univerity of Nebraka-Lincoln {yzheng,choueiry}@ce.unl.edu Abtract.

More information

CSE 250B Assignment 4 Report

CSE 250B Assignment 4 Report CSE 250B Aignment 4 Report March 24, 2012 Yuncong Chen yuncong@c.ucd.edu Pengfei Chen pec008@ucd.edu Yang Liu yal060@c.ucd.edu Abtract In thi project, we implemented the recurive autoencoder (RAE) a decribed

More information

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.

More information

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds * Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm

More information

Optimal Peer-to-Peer Technique for Massive Content Distribution

Optimal Peer-to-Peer Technique for Massive Content Distribution 1 Optimal Peer-to-Peer Technique for Maive Content Ditribution Xiaoying Zheng, Chunglae Cho and Ye Xia Computer and Information Science and Engineering Department Univerity of Florida Email: {xiazheng,

More information

Modeling and Analysis of Slow CW Decrease for IEEE WLAN

Modeling and Analysis of Slow CW Decrease for IEEE WLAN Modeling and Analyi of Slow CW Decreae for IEEE 82. WLAN Qiang Ni, Imad Aad 2, Chadi Barakat, and Thierry Turletti Planete Group 2 Planete Group INRIA Sophia Antipoli INRIA Rhône-Alpe Sophia Antipoli,

More information

Diverse: Application-Layer Service Differentiation in Peer-to-Peer Communications

Diverse: Application-Layer Service Differentiation in Peer-to-Peer Communications Divere: Application-Layer Service Differentiation in Peer-to-Peer Communication Chuan Wu, Student Member, IEEE, Baochun Li, Senior Member, IEEE Department of Electrical and Computer Engineering Univerity

More information

Joint Congestion Control and Media Access Control Design for Ad Hoc Wireless Networks

Joint Congestion Control and Media Access Control Design for Ad Hoc Wireless Networks Joint Congetion Control and Media Acce Control Deign for Ad Hoc Wirele Network Lijun Chen, Steven H. Low and John C. Doyle Engineering & Applied Science Diviion, California Intitute of Technology Paadena,

More information

Floating Point CORDIC Based Power Operation

Floating Point CORDIC Based Power Operation Floating Point CORDIC Baed Power Operation Kazumi Malhan, Padmaja AVL Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland Univerity, Rocheter, MI e-mail: kmalhan@oakland.edu,

More information

7 Distributed Data Management II Caching

7 Distributed Data Management II Caching 7 Distributed Data Management II Caching In this section we will study the approach of using caching for the management of data in distributed systems. Caching always tries to keep data at the place where

More information

Distance Optimal Formation Control on Graphs with a Tight Convergence Time Guarantee

Distance Optimal Formation Control on Graphs with a Tight Convergence Time Guarantee Ditance Optimal Formation Control on Graph with a Tight Convergence Time Guarantee Jingjin Yu Steven M. LaValle Abtract For the tak of moving a et of inditinguihable agent on a connected graph with unit

More information

Embedding Service Function Tree with Minimum Cost for NFV Enabled Multicast

Embedding Service Function Tree with Minimum Cost for NFV Enabled Multicast 1 Embedding Service Function Tree with Minimum ot for NFV Enabled Multicat angbang Ren, Student Member, IEEE, eke Guo, Senior Member, IEEE, Yulong Shen, Member, IEEE, Guoming Tang, Member, IEEE, Xu Lin,

More information

Optimizing Synchronous Systems for Multi-Dimensional. Notre Dame, IN Ames, Iowa computation is an optimization problem (b) circuit

Optimizing Synchronous Systems for Multi-Dimensional. Notre Dame, IN Ames, Iowa computation is an optimization problem (b) circuit Optimizing Synchronou Sytem for ulti-imenional pplication Nelon L. Pao and Edwin H.-. Sha Liang-Fang hao ept. of omputer Science & Eng. ept. of Electrical & omputer Eng. Univerity of Notre ame Iowa State

More information

Connected Placement of Disaster Shelters in Modern Cities

Connected Placement of Disaster Shelters in Modern Cities Connected Placement of Diater Shelter in Modern Citie Huanyang Zheng and Jie Wu Department of Computer and Information Science Temple Univerity, USA {huanyang.zheng, jiewu}@temple.edu ABSTRACT Thi paper

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring

An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring ABSTRACT Overlay network monitoring enable ditributed Internet application to detect and recover from path outage and period of degraded

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

Distributed Fractional Packing and Maximum Weighted b-matching via Tail-Recursive Duality

Distributed Fractional Packing and Maximum Weighted b-matching via Tail-Recursive Duality Ditributed Fractional Packing and Maximum Weighted b-matching via Tail-Recurive Duality Chrito Koufogiannaki, Neal E. Young Department of Computer Science, Univerity of California, Riveride {ckou, neal}@c.ucr.edu

More information

Handling Degenerate Cases in Exact Geodesic Computation on Triangle Meshes

Handling Degenerate Cases in Exact Geodesic Computation on Triangle Meshes The Viual Computer manucript. (will be inerted b the editor) Yong-Jin Liu Qian-Yi Zhou Shi-Min Hu Degenerate Cae in Eact Geodeic Computation on Triangle Mehe Abtract The computation of eact geodeic on

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

Distribution-based Microdata Anonymization

Distribution-based Microdata Anonymization Ditribution-baed Microdata Anonymization Nick Kouda niverity of Toronto kouda@c.toronto.edu Ting Yu North Carolina State niverity yu@cc.ncu.edu Diveh Srivatava AT&T Lab Reearch diveh@reearch.att.com Qing

More information

The Data Locality of Work Stealing

The Data Locality of Work Stealing The Data Locality of Work Stealing Umut A. Acar School of Computer Science Carnegie Mellon Univerity umut@c.cmu.edu Guy E. Blelloch School of Computer Science Carnegie Mellon Univerity guyb@c.cmu.edu Robert

More information

Today s Outline. CS 362, Lecture 19. DFS and BFS. Generic Traverse. BFS and DFS Wrapup Shortest Paths. Jared Saia University of New Mexico

Today s Outline. CS 362, Lecture 19. DFS and BFS. Generic Traverse. BFS and DFS Wrapup Shortest Paths. Jared Saia University of New Mexico Today Outline CS 362, Lecture 9 Jared Saia Univerity of New Mexico BFS and DFS Wrapup Shortet Path Generic Travere DFS and BFS Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v)

More information

On the Use of Shadows in Stance Recovery

On the Use of Shadows in Stance Recovery On the Ue of Shadow in Stance Recovery Alfred M. Brucktein, 1 Robert J. Holt, 1 Yve D. Jean, 2 Arun N. Netravali 1 1 Bell Laboratorie, Lucent Technologie, Murray Hill, NJ 094 2 Avaya Communication, Murray

More information

Lemma 1. A 3-connected maximal generalized outerplanar graph is a wheel.

Lemma 1. A 3-connected maximal generalized outerplanar graph is a wheel. 122 (1997) MATHEMATICA BOHEMICA No. 3, 225{230 A LINEAR ALGORITHM TO RECOGNIZE MAXIMAL GENERALIZED OUTERPLANAR GRAPHS Jo C cere, Almer a, Alberto M rquez, Sevilla (Received November 16, 1994, revied May

More information

Interface Tracking in Eulerian and MMALE Calculations

Interface Tracking in Eulerian and MMALE Calculations Interface Tracking in Eulerian and MMALE Calculation Gabi Luttwak Rafael P.O.Box 2250, Haifa 31021,Irael Interface Tracking in Eulerian and MMALE Calculation 3D Volume of Fluid (VOF) baed recontruction

More information

Parity-constrained Triangulations with Steiner points

Parity-constrained Triangulations with Steiner points Parity-contrained Triangulation with Steiner point Victor Alarez October 31, 2012 Abtract Let P R 2 be a et of n point, of which k lie in the interior of the conex hull CH(P) of P. Let u call a triangulation

More information

IMPLEMENTATION OF CHORD LENGTH SAMPLING FOR TRANSPORT THROUGH A BINARY STOCHASTIC MIXTURE

IMPLEMENTATION OF CHORD LENGTH SAMPLING FOR TRANSPORT THROUGH A BINARY STOCHASTIC MIXTURE Nuclear Mathematical and Computational Science: A Century in Review, A Century Anew Gatlinburg, Tenneee, April 6-, 003, on CD-ROM, American Nuclear Society, LaGrange Park, IL (003) IMPLEMENTATION OF CHORD

More information

Attack-Resilient Multitree Data Distribution Topologies

Attack-Resilient Multitree Data Distribution Topologies Attack-Reilient Multitree Data Ditribution Topologie Sacha Grau acha.grau@tu-ilmenau.de Techniche Univerität Ilmenau, Germany Abtract. We conider a cenario of information broadcat where a ource node ditribute

More information

Motion Control (wheeled robots)

Motion Control (wheeled robots) 3 Motion Control (wheeled robot) Requirement for Motion Control Kinematic / dynamic model of the robot Model of the interaction between the wheel and the ground Definition of required motion -> peed control,

More information

Announcements. CSE332: Data Abstractions Lecture 19: Parallel Prefix and Sorting. The prefix-sum problem. Outline. Parallel prefix-sum

Announcements. CSE332: Data Abstractions Lecture 19: Parallel Prefix and Sorting. The prefix-sum problem. Outline. Parallel prefix-sum Announcement Homework 6 due Friday Feb 25 th at the BEGINNING o lecture CSE332: Data Abtraction Lecture 19: Parallel Preix and Sorting Project 3 the lat programming project! Verion 1 & 2 - Tue March 1,

More information

Uninformed Search Complexity. Informed Search. Search Revisited. Day 2/3 of Search

Uninformed Search Complexity. Informed Search. Search Revisited. Day 2/3 of Search Informed Search ay 2/3 of Search hap. 4, Ruel & Norvig FS IFS US PFS MEM FS IS Uninformed Search omplexity N = Total number of tate = verage number of ucceor (branching factor) L = Length for tart to goal

More information

/06/$ IEEE 364

/06/$ IEEE 364 006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;

More information

Exercise 4: Markov Processes, Cellular Automata and Fuzzy Logic

Exercise 4: Markov Processes, Cellular Automata and Fuzzy Logic Exercie 4: Marko rocee, Cellular Automata and Fuzzy Logic Formal Method II, Fall Semeter 203 Solution Sheet Marko rocee Theoretical Exercie. (a) ( point) 0.2 0.7 0.3 tanding 0.25 lying 0.5 0.4 0.2 0.05

More information

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance A Hybrid Deployable Dynamic Traffic Aignment Framework for Robut Online Route Guidance Sriniva Peeta School of Civil Engineering, Purdue Univerity Chao Zhou Sabre, Inc. Sriniva Peeta School of Civil Engineering

More information

Diff-Max: Separation of Routing and Scheduling in Backpressure-Based Wireless Networks

Diff-Max: Separation of Routing and Scheduling in Backpressure-Based Wireless Networks Diff-Max: Separation of Routing and Scheduling in -Baed Wirele Network Hulya Seferoglu and Eytan Modiano Laboratory For Information and Deciion Sytem Maachuett Intitute of Technology {heferog, modiano}@mit.edu

More information

Motivation: Level Sets. Input Data Noisy. Easy Case Use Marching Cubes. Intensity Varies. Non-uniform Exposure. Roger Crawfis

Motivation: Level Sets. Input Data Noisy. Easy Case Use Marching Cubes. Intensity Varies. Non-uniform Exposure. Roger Crawfis Level Set Motivation: Roger Crawfi Slide collected from: Fan Ding, Charle Dyer, Donald Tanguay and Roger Crawfi 4/24/2003 R. Crawfi, Ohio State Univ. 109 Eay Cae Ue Marching Cube Input Data Noiy 4/24/2003

More information

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks Nearly Contant Approximation for Data Aggregation Scheduling in Wirele Senor Network Scott C.-H. Huang, Peng-Jun Wan, Chinh T. Vu, Yinghu Li and France Yao Computer Science Department, City Univerity of

More information

A Multi-objective Genetic Algorithm for Reliability Optimization Problem

A Multi-objective Genetic Algorithm for Reliability Optimization Problem International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR

More information