Directed File Transfer Scheduling

Size: px
Start display at page:

Download "Directed File Transfer Scheduling"

Transcription

1 Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia Abstract The file transfer scheduling roblem was introduced and studied by Coffman, Garey, Johnson, and LaPaugh. We extend their model to directed networks and study the comlexity of the roblem under different conditions. We discover that even though the general roblem is still NP-comlete, adding directions in the file transfer grah makes the roblem easy in the sense that the roblem in some secial cases is solvable in olynomial time while its undirected counterart was roved NPcomlete. Introduction The roblem of scheduling file transfers in a network so as to minimize the makesan of the schedule was first introduced by Coffman et al. []. In their model, an instance of the roblem consists of a weighted undirected multigrah G = (V, E), called a file transfer grah. The vertices of G corresond to the nodes in the network, and the edges corresond to the files to be transferred between the nodes. Each vertex v in V is labeled with a ositive integer (v), which denotes the maximum number of file transfers that v can engage in simultaneously. Each edge e in E is labeled with a ositive real t(e), which denotes the amount of time needed to transfer that file. Under the assumtions that each file is transferred directly between the vertices that are its endoints, i.e. forwarding is not allowed, and that once the transfer of a file begins, it continues until it comletes, i.e. reemtion is not allowed, we are asked to schedule the file transfers in G so that the makesan, which is the time interval between the beginning of the first transfer and the comletion of the last transfer, is minimized. This roblem is called File Transfer Scheduling (F T S). In this aer, we extend their model to directed file transfer grahs. Let G = (V, A) be a digrah with multi-arcs allowed. For each vertex v in V, s(v) reresents the maximum number of file transfers that v can engage in as a sender, and r(v) reresents the maximum number of file transfers that v can engage in as a receiver. For each arc a in A, denoted by (u, v) if it goes from vertex u to vertex v, t(a) reresents the amount of time needed to transfer the file from the source u to the destination v. We also assume that forwarding and reemtion are not allowed. The Directed File Transfer Scheduling (DF T S) is to find a schedule of the file transfers such that the sending and receiving constraints are resected and the makesan is minimized. We organize this aer as follows. In Section, we will resent a olynomial-time algorithm for the roblem when all file transfers require the equal amount of time. In Section 3, we will study the case when the file transfer time is arbitrary. And finally, we make the conclusion in Section 4. Without confusion, we shall also use F T S and DF T S to denote the corresonding decision roblems. Equal file transfer time Permission to coy without fee all or art of this material is granted rovided that the coies are not made or distributed for direct commercial advantage, the ACM coyright notice and the title of the ublication and its date aear, and notice is given that coying is by ermission of the Association for Comuting Machinery. To coy otherwise, or to reublish, requires a fee and/or secific ermission. c ACM /93/0003/99 $.50 In this section, we assume that all files in the file transfer grah require the same amount of time to be transferred from their sources to their destinations. Without loss of generality, we assume t(a) =, a A. We define the following grah coloring roblem: Given a digrah G = (V, A), with each vertex v being weighted by two osi- 99

2 tive integers s(v) and r(v). We are asked to use the minimum number of colors to color the arcs in G such that for any vertex v, at most s(v) outgoing arcs have the same color and at most r(v) incoming arcs have the same color. It is obvious that there is a direct reduction from DF T S with equal file transfer time to this roblem, which indicates that if there is a olynomial-time algorithm for the grah coloring roblem, then there is a olynomialtime algorithm for DF T S with equal file transfer time. Lemma Given a digrah G = (V, A). For any v V, let in(v) be the number of arcs that end at v, and out(v) be the number of arcs that start at v. Let D(G) = max v V { in(v)/r(v), out(v)/s(v) }. Then the minimum number of colors needed to color G is D(G). Proof Mao [4] has roved the lemma for s(v) = r(v) =. We are going to generalize the roof to arbitrary s(v) and r(v). It is clear that in order to color G we have to use at least D(G) colors. To rove the lemma, we need to show that D(G) colors are enough, i.e. G is D(G)-colorable. We rove this by induction on the number of arcs. When A =, D(G) =. G is obviously -colorable. Assume that G is D(G)-colorable when A = n. Suose A = n. Define G to be G with one arc removed. Without loss of generality, we assume the arc is (, ). Therefore, G = (V, A ), where A = A {(, )}. Because A = n, G is D(G )- colorable by inductive hyothesis. After we color G using D(G ) colors, (, ) is the only uncolored arc in G. We will study the following cases and show that there is always a way to color (, ) such that only D(G) colors are used for G. Case. If D(G) = D(G ) +, then we can color (, ) with a new color. Therefore, G is D(G)- colorable. Case. If D(G) = D(G ), we need to rove that (, ) can be colored without using a new color. Let C be the set of colors used in G. Let C k be the set of colors used r(k) times for the arcs coming in to vertex k and C k+ be the set of colors used s(k + ) times for the arcs going out from vertex k +. Consider the following coloring rocedure. Ste i. C C and C C, otherwise case haens. If (C C ) (C C ) φ, then there exists some color in C, but not in C and C, which can be used to color (, ). Therefore G is D(G)- colorable. If (C C ) (C C ) = φ, then there exists a color, not in C (since C C), but in C (otherwise (C C ) (C C ) φ). Let (3, ) be the arc which comes in to vertex and is colored with. Uncolor (3, ), and color (, ) with. The situation is now as deicted in Figure. We need to modify C such that it includes if is used s() times at vertex, and modify C 3 such that it excludes. It is clear that C is unchanged. Figure Ste ii. C C (since C is unchanged in ste i) and C 3 C (since C 3 ). If (C C ) (C C 3 ) φ, then there exists some color in C, but not in C and C 3, which can be used to color (3, ). Therefore, G is D(G)-colorable. If (C C ) (C C 3 ) = φ, then there exists a color, not in C (since C C), but in C 3 (otherwise (C C ) (C C 3 ) φ), and (since C 3, C 3 ). Let (3, 4) be the arc which goes out from vertex 3 and is colored with. Uncolor (3, 4), and color (3, ) with. See Figure for this situation. Before we go to next ste, modify C such that it includes if is used r() times at vertex, and modify C 4 such that it excludes. C 3 is unchanged in this ste. 4 Figure Ste iii. Similar to ste i, if (C C 3 ) (C C 4 ) φ, then G is D(G)-colorable. If (C C 3 ) (C C 4 ) = φ, then C 3, but C 4. Let (5, 4) be the arc which comes in to vertex 4 and is colored with. Uncolor (5, 4), and color (3, 4) with. Finally, modify C 3 and C 5. Ste iv. Similar to ste ii, if (C C 4 ) (C C 5 ) φ, then G is D(G)-colorable. If (C C 4 ) (C C 5 ) =

3 φ, then C 4, but C 5. Let (5, 6) be the arc which goes out from vertex 5 and is colored with. Uncolor (5, 6), and color (5, 4) with. Finally, modify C 4 and C 6. Reeat the rocedure described in ste iii and ste iv and in each ste always uncolor the arc that has never been uncolored before, until either G is D(G)-colorable due to the fact that the two endoints of the uncolored arc have a common usable color or all the available arcs have been uncolored before. We claim that in the second case G is still D(G)-colorable. k According to Coffman et al. [] and later Choi et al. [], F T S with equal file transfer time is NPcomlete even though it becomes olynomial when the file transfer grah is a biartite grah, tree, ath or cycle. From the above discussion, we find that DF T S with equal file transfer time is solvable in olynomial-time for arbitrary directed file transfer grahs. Intuitively, this is because that the direction constraint imosed on the grah and the relaxed constraint of dual vertex caacities eliminate many of the ossible cases that need to be considered in the exhaustive search of the otimal schedule, which as a result changes the roblem from NP-comlete to olynomial. k+ k 3 Arbitrary file transfer time Figure 3 Without loss of generality, we assume as shown in Figure 3 that we come to a oint to color (k, k + ) which was colored with and was later uncolored because was given to (k, k ). Define A to be the set of the arcs that end at k + and are colored with. According to the coloring rocedure, we intend to uncolor one arc in A, and color (k, k+) with. Since all arcs in A have been uncolored before, the old color of them must be. It is clear that the old color of (k, k + ) is also. So we have r(k + ) A +. Therefore, C k+, and C k. We can color (k, k + ) with. This comletes the roof. Theorem DF T S with equal file transfer time is solvable in time O( A ). Proof First, let us consider the corresonding grah coloring roblem. Define G = (V, A ), where A = {(a, b)} for some (a, b) in A, and G i = (V, A i ), where A i = A i {(a, b)} for some (a, b) in A but not in A i. Obviously, G A = G. Using the method described in the roof of the lemma, we can color G, G,..., G A in the order given. Assume T (n) is the time required to color a grah with n arcs. We have T () =, and T (n) = T (n ) + n. So T (n) = O(n ). Therefore, any digrah G = (V, A) can be colored in time O( A ). In DF T S, if G is the file transfer grah, then the minimum makesan is D(G), and the schedule can be constructed in time O( A ). Let us consider DF T S with arbitrary file transfer time. We use the aroach similar to that in [] to discuss the comlexity of the roblem for different grah structures, such as cycle, ath, tree, biartite grah, and general grah. Theorem in time O( A ) if the file transfer grah is a directed cycle, and either s(v) = r(v) = for any v V or no multi-arcs are resent. Proof Let V = {,,..., n} and A = {(, ), (, 3),..., (n, n), (n, )}. If s(v) = r(v) = for any v V, and multi-arcs may resent in G, the files between any two adjacent vertices in the cycle have to be transferred sequentially, and files not sharing sources and destinations can be transferred simultaneously. For (u, v) A, let T (u, v) be the sum of the transfer time of files from u to v. Then, the minimum makesan is max (u,v) A {T (u, v)}. If s(v) and r(v) are arbitrary ositive integers, and multi-arcs are not allowed, then the minimum makesan is max a A {t(a)}. In both cases, the schedule can be easily constructed in time O( A ). Corollary. in time O( A ) if the file transfer grah is a directed ath, and either s(v) = r(v) = for any v V or no multi-arcs are resent. Proof If s(v) = r(v) = for any v V, the minimum makesan is obviously max (u,v) A {T (u, v)}. If s(v) and r(v) are arbitrary ositive integers, and 0

4 multi-arcs are not allowed, the minimum makesan is max a A {t(a)}. Theorem 3 DF T S with arbitrary file transfer time is NPcomlete if the file transfer grah is a directed cycle with multi-arcs and arbitrary s(v) and r(v). Proof Consider the NP-comlete Multirocessor Scheduling (MS) [3], in which we are given n indeendent tasks with rocessing time,..., n, resectively, and are asked to schedule the tasks on m( ) identical rocessors so that the makesan of the schedule is minimized. We can define a olynomial transformation from MS to DF T S as follows. Let V = {,,..., k} and (i, i+) A with t(i, i+) = for i =,,..., k. From k to, add an arc for each task in MS and label the arc with the rocessing time of the task. Let r() = m and s(k) = m. Files (, ),..., (k, k) can be transferred simultaneously, and at any time m of the n files from k to can be transferred. It is not hard to see that MS has a schedule with makesan B or less if and only if DF T S of the grah in Figure 4 has a schedule with makesan B or less. r()=m.... n k Figure 4 k s(k)=m Since DF T S is in NP and there is a olynomial transformation from an NP-comlete roblem to it, DF T S in this secial case is NP-comlete. Corollary 3. DF T S with arbitrary file transfer time is NPcomlete if the file transfer grah is a directed ath with multi-arcs and arbitrary s(v) and r(v). Proof Similar to the roof of Theorem 3 excet that the file transfer grah is the grah in Figure 4 with the arcs (, ), (, 3),..., (k, k) being removed. Theorem 4 in time O( A ) if the file transfer grah is a directed tree and s(v) = r(v) = for any v V. Proof Without loss of generality, assume that the directions of arcs are from arents to children. Files sharing the source have to be transferred sequentially, and files not sharing the source can be transferred simultaneously. Let T (v) be the sum of the transfer time of files to be transferred from v, then the minimum makesan is max v V {T (v)}. Theorem 5 DF T S is NP-comlete if the file transfer grah is a directed tree with arbitrary s(v) and r(v). Proof Consider the transformation from MS. Assume that n tasks have to be scheduled on m( ) rocessors. Define G = ({,..., n + }, {(n +, i) : i =,..., n}), where t(n +, i) = i for i =,..., n, and let s(n + ) = m. Since at any time only m of n files can be transferred out from n +, MS has a schedule with makesan B or less if and only if DF T S of the grah in Figure 5 has a schedule with makesan B or less. Theorem 6 n+ s(n+)=m... n n n Figure 5 DF T S with arbitrary file transfer time is NPcomlete if the file transfer grah is a directed biartite grah. Proof According to Coffman et al. [], F T S of a biartite grah with single orts ((v) =, v), single edges, and arbitrary file transfer time is NPcomlete. Given a biartite grah G = (V V, E), where each edge has one vertex in V and one vertex in V, consider the corresonding directed biartite grah G by adding direction from u to v if (u, v) E, and u V, v V. Assume that in G s(v) = r(v) = for any v V V. We notice that in the schedule for G when file (u, v) is being transferred no file from source u or to destination v can be transferred, which haens to be the exactly same case in the schedule for G. Therefore, G has a schedule with makesan B or less if and only if G has a schedule with makesan B or less. Corollary 6. DF T S with arbitrary file transfer time is NPcomlete. To summarize, Table and Table show the comlexity results for F T S [] and DF T S, resec- n 0

5 tively, when the file transfer time is arbitrary. To kee the tables small, we use the following abbreviations: G =general grah or digrah, B =biartite grah or digrah, T =tree, P =ath, E =evenlength cycle, O =odd-length cycle, and finally, Single means that the file transfer grah has only single edges or arcs, and Multile means that multi-edges or multi-arcs are allowed. (v) = Arbitrary (v) Single Multile Single Multile G NPC NPC NPC NPC B NPC NPC NPC NPC T NPC NPC NPC NPC P O( E ) O( E ) O( E ) NPC E O( E ) O( E ) O( E ) NPC O O( E ) NPC O( E ) NPC Table s(v) = r(v) = Arbitrary s(v), r(v) Singles Multile Single Multile G NPC NPC NPC NPC B NPC NPC NPC NPC T O( A ) O( A ) NPC NPC P O( A ) O( A ) O( A ) NPC O O( A ) O( A ) O( A ) NPC E O( A ) O( A ) O( A ) NPC 4 Conclusion Table In this aer, we have studied the comlexity of the Directed File Transfer Scheduling under different conditions. We have roved that if all files have the same transfer time the roblem can be reduced to a grah coloring roblem which has a olynomial solution, and that if files have arbitrary transfer time the roblem is NP-comlete for general digrahs, biartite digrahs, directed trees with arbitrary s(v) and r(v), directed aths or cycles with multi-arcs and arbitrary s(v) and r(v). In comarison with the results of undirected File Transfer Scheduling, we have found that adding directions to the file transfer grah sometimes makes the roblem easy. As its undirected counterart, there are a wide variety of directions for future research in Directed File Transfer Scheduling. Coffman et al. [] roved for F T S that the List Scheduling (LS) heuristic gives a schedule of makesan at most 3 times that of the otimal schedule and that Decreasing List Scheduling (DLS) heuristic gives a schedule of makesan at most.5 times that of the otimal schedule. Within our model, an interesting question we see is to analyze the worst-case erformance bounds of LS and DLS when they are alied to DF T S with arbitrary file transfer time for general digrahs and see whether they can achieve better bounds on DF T S than on F T S. Whitehead [5] studied the comlexity issue of F T S with forwarding. An imortant extension of our model is to relace the s(v) and r(v) constraints with a network grah which contains ossible routes from sources to destinations via intermediate nodes. In this modified model, in order for a file in the file transfer grah to be transferred from u to v, we must find a ath from u to v in the network grah for it. Acknowledgement I wish to thank Rahul Simha for bringing the original file transfer scheduling roblem to my attention, Adam Rifkin for heling me with the L A TEX format, and the three anonymous reviewers for their valuable suggestions. References [] H.A. Choi and S.L. Hakimi, Scheduling File Transfers for Trees and Odd Cycles, SIAM J. on Comut., 6 (987), [] E.G. Coffman, Jr., M.R. Garey, D.S. Johnson and A.S. LaPaugh, Scheduling File Transfer, SIAM J. on Comut., 4 (985), [3] M.R. Garey and D.S. Johnson, Comuters and Intractability: A Guide to the Theory of NP- Comleteness, W. H. Freeman and Comany, San Francisco, 979. [4] W. Mao, Arc-Coloring of a Digrah is Polynomial, Technical Reort, Deartment of Comuter Science, College of William and Mary, 99. [5] J. Whitehead, The Comlexity of File Transfer Scheduling With Forwarding, SIAM J. on Comut., 9 (990),

Randomized algorithms: Two examples and Yao s Minimax Principle

Randomized algorithms: Two examples and Yao s Minimax Principle Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum

More information

AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS

AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS Philie LACOMME, Christian PRINS, Wahiba RAMDANE-CHERIF Université de Technologie de Troyes, Laboratoire d Otimisation des Systèmes Industriels (LOSI)

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

An Efficient Video Program Delivery algorithm in Tree Networks*

An Efficient Video Program Delivery algorithm in Tree Networks* 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,

More information

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION Yugoslav Journal of Oerations Research (00), umber, 5- A BICRITERIO STEIER TREE PROBLEM O GRAPH Mirko VUJO[EVI], Milan STAOJEVI] Laboratory for Oerational Research, Faculty of Organizational Sciences University

More information

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical

More information

Label-Guided Graph Exploration by a Finite Automaton

Label-Guided Graph Exploration by a Finite Automaton Label-Guided Grah Exloration by a Finite Automaton REUVEN COHEN Boston University, USA PIERRE FRAIGNIAUD CNRS and Université Paris Diderot - Paris 7, France DAVID ILCINKAS CNRS and Université Bordeaux

More information

Introduction to Parallel Algorithms

Introduction to Parallel Algorithms CS 1762 Fall, 2011 1 Introduction to Parallel Algorithms Introduction to Parallel Algorithms ECE 1762 Algorithms and Data Structures Fall Semester, 2011 1 Preliminaries Since the early 1990s, there has

More information

Constrained Empty-Rectangle Delaunay Graphs

Constrained Empty-Rectangle Delaunay Graphs CCCG 2015, Kingston, Ontario, August 10 12, 2015 Constrained Emty-Rectangle Delaunay Grahs Prosenjit Bose Jean-Lou De Carufel André van Renssen Abstract Given an arbitrary convex shae C, a set P of oints

More information

split split (a) (b) split split (c) (d)

split split (a) (b) split split (c) (d) International Journal of Foundations of Comuter Science c World Scientic Publishing Comany ON COST-OPTIMAL MERGE OF TWO INTRANSITIVE SORTED SEQUENCES JIE WU Deartment of Comuter Science and Engineering

More information

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal

More information

Lecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model.

Lecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model. U.C. Berkeley CS273: Parallel and Distributed Theory Lecture 18 Professor Satish Rao Lecturer: Satish Rao Last revised Scribe so far: Satish Rao (following revious lecture notes quite closely. Lecture

More information

Theoretical Analysis of Graphcut Textures

Theoretical Analysis of Graphcut Textures Theoretical Analysis o Grahcut Textures Xuejie Qin Yee-Hong Yang {xu yang}@cs.ualberta.ca Deartment o omuting Science University o Alberta Abstract Since the aer was ublished in SIGGRAPH 2003 the grahcut

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

Improving Trust Estimates in Planning Domains with Rare Failure Events

Improving Trust Estimates in Planning Domains with Rare Failure Events Imroving Trust Estimates in Planning Domains with Rare Failure Events Colin M. Potts and Kurt D. Krebsbach Det. of Mathematics and Comuter Science Lawrence University Aleton, Wisconsin 54911 USA {colin.m.otts,

More information

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1 Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and

More information

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University.

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University. Relations with Relation Names as Arguments: Algebra and Calculus Kenneth A. Ross Columbia University kar@cs.columbia.edu Abstract We consider a version of the relational model in which relation names may

More information

I ACCEPT NO RESPONSIBILITY FOR ERRORS ON THIS SHEET. I assume that E = (V ).

I ACCEPT NO RESPONSIBILITY FOR ERRORS ON THIS SHEET. I assume that E = (V ). 1 I ACCEPT NO RESPONSIBILITY FOR ERRORS ON THIS SHEET. I assume that E = (V ). Data structures Sorting Binary heas are imlemented using a hea-ordered balanced binary tree. Binomial heas use a collection

More information

arxiv: v1 [math.gt] 1 May 2018

arxiv: v1 [math.gt] 1 May 2018 CIRCUIT PRESENTATION AND LATTICE STICK NUMBER WITH EXACTLY 4 z-sticks HYOUNGJUN KIM AND SUNGJONG NO arxiv:805.0023v [math.gt] May 208 Abstract. The lattice stick number s L(L) of a link L is defined to

More information

The Spatial Skyline Queries

The Spatial Skyline Queries The Satial Skyline Queries Mehdi Sharifzadeh Comuter Science Deartment University of Southern California Los Angeles, CA 90089-078 sharifza@usc.edu Cyrus Shahabi Comuter Science Deartment University of

More information

NP Completeness. Andreas Klappenecker [partially based on slides by Jennifer Welch]

NP Completeness. Andreas Klappenecker [partially based on slides by Jennifer Welch] NP Completeness Andreas Klappenecker [partially based on slides by Jennifer Welch] Overview We already know the following examples of NPC problems: SAT 3SAT We are going to show that the following are

More information

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model Ad Hoc Networks (4) 5 68 Contents lists available at SciVerse ScienceDirect Ad Hoc Networks journal homeage: www.elsevier.com/locate/adhoc Latency-minimizing data aggregation in wireless sensor networks

More information

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu

More information

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.)

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.) Advanced Algorithms Fall 2015 Lecture 3: Geometric Algorithms(Convex sets, Divide & Conuer Algo.) Faculty: K.R. Chowdhary : Professor of CS Disclaimer: These notes have not been subjected to the usual

More information

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,

More information

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture

More information

Taut ideal triangulations of 3-manifolds

Taut ideal triangulations of 3-manifolds Abstract Taut ideal triangulations of 3-manifolds Marc Lackenby Mathematical Institute, Oxford University, 24-29 St Giles, Oxford OX1 3LB, UK Email: lackenby@maths.ox.ac.uk A taut ideal triangulation of

More information

Elementary Proof that an Infinite Number of Factorial Primes Exist

Elementary Proof that an Infinite Number of Factorial Primes Exist Elementary Proof that an Infinite Number of Factorial Primes Exist Stehen Marshall 22 February 2017 Abstract This aer resents a comlete roof of the Factorial Primes are infinite, even though only 16 of

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

RESEARCH ARTICLE. Simple Memory Machine Models for GPUs

RESEARCH ARTICLE. Simple Memory Machine Models for GPUs The International Journal of Parallel, Emergent and Distributed Systems Vol. 00, No. 00, Month 2011, 1 22 RESEARCH ARTICLE Simle Memory Machine Models for GPUs Koji Nakano a a Deartment of Information

More information

The Edge-flipping Distance of Triangulations

The Edge-flipping Distance of Triangulations The Edge-fliing Distance of Triangulations Sabine Hanke (Institut für Informatik, Universität Freiburg, Germany hanke@informatik.uni-freiburg.de) Thomas Ottmann (Institut für Informatik, Universität Freiburg,

More information

Randomized Selection on the Hypercube 1

Randomized Selection on the Hypercube 1 Randomized Selection on the Hyercube 1 Sanguthevar Rajasekaran Det. of Com. and Info. Science and Engg. University of Florida Gainesville, FL 32611 ABSTRACT In this aer we resent randomized algorithms

More information

Classes of K-Regular Semi ring

Classes of K-Regular Semi ring Secial Issue on Comutational Science, Mathematics and Biology Classes of K-Regular Semi ring M.Amala 1, T.Vasanthi 2 ABSTRACT: In this aer, it was roved that, If S is a K-regular semi ring and (S, +) is

More information

Multicommodity Network Flow - Methods and Applications

Multicommodity Network Flow - Methods and Applications Multicommodity Network Flow - Methods and Alications Joe Lindström Linköing University joeli89@student.liu.se Abstract This survey describes the Multicommodity Network Flow roblem, a network flow roblem

More information

Coarse grained gather and scatter operations with applications

Coarse grained gather and scatter operations with applications Available online at www.sciencedirect.com J. Parallel Distrib. Comut. 64 (2004) 1297 1310 www.elsevier.com/locate/jdc Coarse grained gather and scatter oerations with alications Laurence Boxer a,b,, Russ

More information

An improved algorithm for Hausdorff Voronoi diagram for non-crossing sets

An improved algorithm for Hausdorff Voronoi diagram for non-crossing sets An imroved algorithm for Hausdorff Voronoi diagram for non-crossing sets Frank Dehne, Anil Maheshwari and Ryan Taylor May 26, 2006 Abstract We resent an imroved algorithm for building a Hausdorff Voronoi

More information

NEW STRATEGIES FOR HIGH PERFORMANCE VLSI PHYSICAL DESIGN HUA XIANG

NEW STRATEGIES FOR HIGH PERFORMANCE VLSI PHYSICAL DESIGN HUA XIANG NEW STRATEGIES FOR HIGH PERFORMANCE VLSI PHYSICAL DESIGN BY HUA XIANG B.S., Peking University, 1997 M.S., Peking University, 2000 M.S., University of Texas at Austin, 2002 DISSERTATION Submitted in artial

More information

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,

More information

Near-Optimal Routing Lookups with Bounded Worst Case Performance

Near-Optimal Routing Lookups with Bounded Worst Case Performance Near-Otimal Routing Lookus with Bounded Worst Case Performance Pankaj Guta Balaji Prabhakar Stehen Boyd Deartments of Electrical Engineering and Comuter Science Stanford University CA 9430 ankaj@stanfordedu

More information

Grouping of Patches in Progressive Radiosity

Grouping of Patches in Progressive Radiosity Grouing of Patches in Progressive Radiosity Arjan J.F. Kok * Abstract The radiosity method can be imroved by (adatively) grouing small neighboring atches into grous. Comutations normally done for searate

More information

A Petri net-based Approach to QoS-aware Configuration for Web Services

A Petri net-based Approach to QoS-aware Configuration for Web Services A Petri net-based Aroach to QoS-aware Configuration for Web s PengCheng Xiong, YuShun Fan and MengChu Zhou, Fellow, IEEE Abstract With the develoment of enterrise-wide and cross-enterrise alication integration

More information

Equality-Based Translation Validator for LLVM

Equality-Based Translation Validator for LLVM Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented

More information

MULTI-STEP TRAJECTORY OPTIMIZATION FOR ATM BASED ON APPROXIMATED OPTIMAL PATH

MULTI-STEP TRAJECTORY OPTIMIZATION FOR ATM BASED ON APPROXIMATED OPTIMAL PATH MULTI-STEP TRAJECTORY OPTIMIZATION FOR ATM BASED ON APPROXIMATED OPTIMAL PATH Sangjun Bae*, Hyo-Sang Shin* and Antonios Tsourdos* * School of Aerosace, Transort and Manufacturing, Cranfield University

More information

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems Matlab Virtual Reality Simulations for otimizations and raid rototying of flexible lines systems VAMVU PETRE, BARBU CAMELIA, POP MARIA Deartment of Automation, Comuters, Electrical Engineering and Energetics

More information

An Indexing Framework for Structured P2P Systems

An Indexing Framework for Structured P2P Systems An Indexing Framework for Structured P2P Systems Adina Crainiceanu Prakash Linga Ashwin Machanavajjhala Johannes Gehrke Carl Lagoze Jayavel Shanmugasundaram Deartment of Comuter Science, Cornell University

More information

On Spectrum Sharing Games

On Spectrum Sharing Games On Sectrum Sharing Games Magnús M. Halldórsson Det. of Comuter Science University of Iceland IS-07 Reykjavik mmh@hi.is Li (Erran) Li Center for Networking Research Lucent Bell Labs Holmdel, NJ 07733 erranlli@dnrc.bell-labs.com

More information

Brief Contributions. A Geometric Theorem for Network Design 1 INTRODUCTION

Brief Contributions. A Geometric Theorem for Network Design 1 INTRODUCTION IEEE TRANSACTIONS ON COMPUTERS, VOL. 53, NO., APRIL 00 83 Brief Contributions A Geometric Theorem for Network Design Massimo Franceschetti, Member, IEEE, Matthew Cook, and Jehoshua Bruck, Fellow, IEEE

More information

The degree constrained k-cardinality minimum spanning tree problem: a lexisearch

The degree constrained k-cardinality minimum spanning tree problem: a lexisearch Decision Science Letters 7 (2018) 301 310 Contents lists available at GrowingScience Decision Science Letters homeage: www.growingscience.com/dsl The degree constrained k-cardinality minimum sanning tree

More information

Experimental Comparison of Shortest Path Approaches for Timetable Information

Experimental Comparison of Shortest Path Approaches for Timetable Information Exerimental Comarison of Shortest Path roaches for Timetable Information Evangelia Pyrga Frank Schulz Dorothea Wagner Christos Zaroliagis bstract We consider two aroaches that model timetable information

More information

These, and closely related, roblems has been extensively studied for the sequential [1, 16] and the shared memory (PRAM) arallel [5, 6, 12, 13, 14, 15

These, and closely related, roblems has been extensively studied for the sequential [1, 16] and the shared memory (PRAM) arallel [5, 6, 12, 13, 14, 15 Coarse Grained Parallel Algorithms for Detecting Convex Biartite Grahs Extended Abstract E. Caceres y A. Chan z F. Dehne x G. Prencie { Abstract In this aer, we resent arallel algorithms for the coarse

More information

Computing the Convex Hull of. W. Hochstattler, S. Kromberg, C. Moll

Computing the Convex Hull of. W. Hochstattler, S. Kromberg, C. Moll Reort No. 94.60 A new Linear Time Algorithm for Comuting the Convex Hull of a Simle Polygon in the Plane by W. Hochstattler, S. Kromberg, C. Moll 994 W. Hochstattler, S. Kromberg, C. Moll Universitat zu

More information

search(i): Returns an element in the data structure associated with key i

search(i): Returns an element in the data structure associated with key i CS161 Lecture 7 inary Search Trees Scribes: Ilan Goodman, Vishnu Sundaresan (2015), Date: October 17, 2017 Virginia Williams (2016), and Wilbur Yang (2016), G. Valiant Adated From Virginia Williams lecture

More information

Object and Native Code Thread Mobility Among Heterogeneous Computers

Object and Native Code Thread Mobility Among Heterogeneous Computers Object and Native Code Thread Mobility Among Heterogeneous Comuters Bjarne Steensgaard Eric Jul Microsoft Research DIKU (Det. of Comuter Science) One Microsoft Way University of Coenhagen Redmond, WA 98052

More information

Value-Update Rules for Real-Time Search

Value-Update Rules for Real-Time Search From: AAAI-99 Proceedings. Coyright 999, AAAI (www.aaai.org). All rights reserved. Value-Udate Rules for Real-Time Search Sven Koenig College of Comuting Georgia Institute of Technology skoenig@cc.gatech.edu

More information

Distributed Estimation from Relative Measurements in Sensor Networks

Distributed Estimation from Relative Measurements in Sensor Networks Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.

More information

STRONG / WEAK EDGE VERTEX MIXED DOMINATION NUMBER OF A GRAPH

STRONG / WEAK EDGE VERTEX MIXED DOMINATION NUMBER OF A GRAPH IJMS, Vol. 11, No. 3-4, (July-December 2012),. 433-444 Serials Publications ISSN: 0972-754X STRONG / WEAK EDGE VERTEX MIXED DOMINATION NUMBER OF A GRAPH R. S. Bhat, S. S. Kamath & Surekha R. Bhat Abstract:

More information

Parallel Construction of Multidimensional Binary Search Trees. Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka

Parallel Construction of Multidimensional Binary Search Trees. Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka Parallel Construction of Multidimensional Binary Search Trees Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka School of CIS and School of CISE Northeast Parallel Architectures Center Syracuse

More information

Swift Template Matching Based on Equivalent Histogram

Swift Template Matching Based on Equivalent Histogram Swift emlate Matching ased on Equivalent istogram Wangsheng Yu, Xiaohua ian, Zhiqiang ou * elecommunications Engineering Institute Air Force Engineering University Xi an, PR China *corresonding author:

More information

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

A Model-Adaptable MOSFET Parameter Extraction System

A Model-Adaptable MOSFET Parameter Extraction System A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313

More information

Deformable Free Space Tilings for Kinetic Collision Detection

Deformable Free Space Tilings for Kinetic Collision Detection Deformable Free Sace Tilings for Kinetic Collision Detection Pankaj K. Agarwal Julien Basch Leonidas J. Guibas John Hershberger Li Zhang Abstract We resent kinetic data structures for detecting collisions

More information

Continuous Visible k Nearest Neighbor Query on Moving Objects

Continuous Visible k Nearest Neighbor Query on Moving Objects Continuous Visible k Nearest Neighbor Query on Moving Objects Yaniu Wang a, Rui Zhang b, Chuanfei Xu a, Jianzhong Qi b, Yu Gu a, Ge Yu a, a Deartment of Comuter Software and Theory, Northeastern University,

More information

Constrained Path Optimisation for Underground Mine Layout

Constrained Path Optimisation for Underground Mine Layout Constrained Path Otimisation for Underground Mine Layout M. Brazil P.A. Grossman D.H. Lee J.H. Rubinstein D.A. Thomas N.C. Wormald Abstract The major infrastructure comonent reuired to develo an underground

More information

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Weimin Chen, Volker Turau TR-93-047 August, 1993 Abstract This aer introduces a new technique for source-to-source code

More information

CMSC 425: Lecture 16 Motion Planning: Basic Concepts

CMSC 425: Lecture 16 Motion Planning: Basic Concepts : Lecture 16 Motion lanning: Basic Concets eading: Today s material comes from various sources, including AI Game rogramming Wisdom 2 by S. abin and lanning Algorithms by S. M. LaValle (Chats. 4 and 5).

More information

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism Erlin Yao, Mingyu Chen, Rui Wang, Wenli Zhang, Guangming Tan Key Laboratory of Comuter System and Architecture Institute

More information

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical

More information

We will then introduce the DT, discuss some of its fundamental properties and show how to compute a DT directly from a given set of points.

We will then introduce the DT, discuss some of its fundamental properties and show how to compute a DT directly from a given set of points. Voronoi Diagram and Delaunay Triangulation 1 Introduction The Voronoi Diagram (VD, for short) is a ubiquitious structure that aears in a variety of discilines - biology, geograhy, ecology, crystallograhy,

More information

Ad hoc networks beyond unit disk graphs

Ad hoc networks beyond unit disk graphs Wireless Netw (008) 14:715 79 DOI 10.1007/s1176-007-0045-6 Ad hoc networks beyond unit disk grahs Fabian Kuhn Æ Roger Wattenhofer Æ Aaron Zollinger Published online: 13 July 007 Ó Sringer Science+Business

More information

REAL NUMBERS. 1.1 Introduction

REAL NUMBERS. 1.1 Introduction REAL NUMBERS 1 REAL NUMBERS 1 1.1 Introduction In Class IX, you began your exloration of the world of real numbers and encountered irrational numbers. We continue our discussion on real numbers in this

More information

Graph Cut Matching In Computer Vision

Graph Cut Matching In Computer Vision Grah Cut Matching In Comuter Vision Toby Collins (s0455374@sms.ed.ac.uk) February 2004 Introduction Many of the roblems that arise in early vision can be naturally exressed in terms of energy minimization.

More information

NP-Completeness. Algorithms

NP-Completeness. Algorithms NP-Completeness Algorithms The NP-Completeness Theory Objective: Identify a class of problems that are hard to solve. Exponential time is hard. Polynomial time is easy. Why: Do not try to find efficient

More information

This version of the software

This version of the software Sage Estimating (SQL) (formerly Sage Timberline Estimating) SQL Server Guide Version 16.11 This is a ublication of Sage Software, Inc. 2015 The Sage Grou lc or its licensors. All rights reserved. Sage,

More information

Signature File Hierarchies and Signature Graphs: a New Index Method for Object-Oriented Databases

Signature File Hierarchies and Signature Graphs: a New Index Method for Object-Oriented Databases Signature File Hierarchies and Signature Grahs: a New Index Method for Object-Oriented Databases Yangjun Chen* and Yibin Chen Det. of Business Comuting University of Winnieg, Manitoba, Canada R3B 2E9 ABSTRACT

More information

arxiv: v5 [cs.cc] 6 Jun 2017

arxiv: v5 [cs.cc] 6 Jun 2017 On the Comlexity of Barrier Resilience for Fat Regions and Bounded Ply arxiv:1302.4707v5 [cs.cc] 6 Jun 2017 Matias Korman Maarten Löffler Rodrigo I. Silveira Darren Strash Abstract In the barrier resilience

More information

Lecture 8: Orthogonal Range Searching

Lecture 8: Orthogonal Range Searching CPS234 Comutational Geometry Setember 22nd, 2005 Lecture 8: Orthogonal Range Searching Lecturer: Pankaj K. Agarwal Scribe: Mason F. Matthews 8.1 Range Searching The general roblem of range searching is

More information

Real Time Compression of Triangle Mesh Connectivity

Real Time Compression of Triangle Mesh Connectivity Real Time Comression of Triangle Mesh Connectivity Stefan Gumhold, Wolfgang Straßer WSI/GRIS University of Tübingen Abstract In this aer we introduce a new comressed reresentation for the connectivity

More information

O(log 2 n) Reachability Queries

O(log 2 n) Reachability Queries Finding Strongly Connected Comonents in Parallel using O(log 2 n) Reachability Queries Warren Schudy Brown University 115 Waterman Street Providence, RI ws@cs.brown.edu ABSTRACT We give a randomized (Las-Vegas)

More information

A Metaheuristic Scheduler for Time Division Multiplexed Network-on-Chip

A Metaheuristic Scheduler for Time Division Multiplexed Network-on-Chip Downloaded from orbit.dtu.dk on: Jan 25, 2019 A Metaheuristic Scheduler for Time Division Multilexed Network-on-Chi Sørensen, Rasmus Bo; Sarsø, Jens; Pedersen, Mark Ruvald; Højgaard, Jasur Publication

More information

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions

More information

Hardware-Accelerated Formal Verification

Hardware-Accelerated Formal Verification Hardare-Accelerated Formal Verification Hiroaki Yoshida, Satoshi Morishita 3 Masahiro Fujita,. VLSI Design and Education Center (VDEC), University of Tokyo. CREST, Jaan Science and Technology Agency 3.

More information

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment

More information

GRAPH CUT OPTIMIZATION FOR THE MUMFORD-SHAH MODEL

GRAPH CUT OPTIMIZATION FOR THE MUMFORD-SHAH MODEL GRAPH CUT OPTIMIZATION FOR THE MUMFORD-SHAH MODEL Noha El Zehiry 1,2, Steve Xu 2, Prasanna Sahoo 2 and Adel Elmaghraby 1 1 Deartment of Comuter Engineering and Comuter Science, University of Louisville,

More information

Record Route IP Traceback: Combating DoS Attacks and the Variants

Record Route IP Traceback: Combating DoS Attacks and the Variants Record Route IP Traceback: Combating DoS Attacks and the Variants Abdullah Yasin Nur, Mehmet Engin Tozal University of Louisiana at Lafayette, Lafayette, LA, US ayasinnur@louisiana.edu, metozal@louisiana.edu

More information

Cross products. p 2 p. p p1 p2. p 1. Line segments The convex combination of two distinct points p1 ( x1, such that for some real number with 0 1,

Cross products. p 2 p. p p1 p2. p 1. Line segments The convex combination of two distinct points p1 ( x1, such that for some real number with 0 1, CHAPTER 33 Comutational Geometry Is the branch of comuter science that studies algorithms for solving geometric roblems. Has alications in many fields, including comuter grahics robotics, VLSI design comuter

More information

Distributed Basis Pursuit

Distributed Basis Pursuit Distributed Basis Pursuit João F. C. Mota, João M. F. Xavier, Pedro M. Q. Aguiar, and Markus Püschel arxiv:009.28v3 [math.oc] 4 Mar 202 Abstract We roose a distributed algorithm for solving the otimization

More information

An Ecient Approximation Algorithm for the. File Redistribution Scheduling Problem in. Fully Connected Networks. Abstract

An Ecient Approximation Algorithm for the. File Redistribution Scheduling Problem in. Fully Connected Networks. Abstract An Ecient Approximation Algorithm for the File Redistribution Scheduling Problem in Fully Connected Networks Ravi Varadarajan Pedro I. Rivera-Vega y Abstract We consider the problem of transferring a set

More information

Construction of Irregular QC-LDPC Codes in Near-Earth Communications

Construction of Irregular QC-LDPC Codes in Near-Earth Communications Journal of Communications Vol. 9, No. 7, July 24 Construction of Irregular QC-LDPC Codes in Near-Earth Communications Hui Zhao, Xiaoxiao Bao, Liang Qin, Ruyan Wang, and Hong Zhang Chongqing University

More information

Privacy Preserving Moving KNN Queries

Privacy Preserving Moving KNN Queries Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,

More information

Efficient Parallel Hierarchical Clustering

Efficient Parallel Hierarchical Clustering Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore

More information

Figure 8.1: Home age taken from the examle health education site (htt:// Setember 14, 2001). 201

Figure 8.1: Home age taken from the examle health education site (htt://  Setember 14, 2001). 201 200 Chater 8 Alying the Web Interface Profiles: Examle Web Site Assessment 8.1 Introduction This chater describes the use of the rofiles develoed in Chater 6 to assess and imrove the quality of an examle

More information

Efficient Selection and Sorting Schemes for Processing Large Distributed Files in de Bruijn Networks and Hypercubes

Efficient Selection and Sorting Schemes for Processing Large Distributed Files in de Bruijn Networks and Hypercubes Efficient Selection and Sorting Schemes for Processing Large Distributed Files in de Bruijn Networks and Hyercubes DavidS.L.Wei Deartment of Comuter and Information Sciences Fordham University New York,

More information

12) United States Patent 10) Patent No.: US 6,321,328 B1

12) United States Patent 10) Patent No.: US 6,321,328 B1 USOO6321328B1 12) United States Patent 10) Patent No.: 9 9 Kar et al. (45) Date of Patent: Nov. 20, 2001 (54) PROCESSOR HAVING DATA FOR 5,961,615 10/1999 Zaid... 710/54 SPECULATIVE LOADS 6,006,317 * 12/1999

More information

Improving Parallel-Disk Buffer Management using Randomized Writeback æ

Improving Parallel-Disk Buffer Management using Randomized Writeback æ Aears in Proceedings of ICPP 98 1 Imroving Parallel-Disk Buffer Management using Randomized Writeback æ Mahesh Kallahalla Peter J Varman Detartment of Electrical and Comuter Engineering Rice University

More information

Skip List Based Authenticated Data Structure in DAS Paradigm

Skip List Based Authenticated Data Structure in DAS Paradigm 009 Eighth International Conference on Grid and Cooerative Comuting Ski List Based Authenticated Data Structure in DAS Paradigm Jieing Wang,, Xiaoyong Du,. Key Laboratory of Data Engineering and Knowledge

More information

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China

More information

Empty Region Graphs. Computer Science Department, Université Libre de Bruxelles, CP212, Boulevard du Triomphe, 1050 Bruxelles, Belgium

Empty Region Graphs. Computer Science Department, Université Libre de Bruxelles, CP212, Boulevard du Triomphe, 1050 Bruxelles, Belgium Emty Region Grahs Jean Cardinal 1 Sébastien Collette 2 Stefan Langerman 3 Comuter Science Deartment, Université Libre de Bruxelles, CP212, Boulevard du Triomhe, 1050 Bruxelles, Belgium Abstract A family

More information

Submission. Verifying Properties Using Sequential ATPG

Submission. Verifying Properties Using Sequential ATPG Verifying Proerties Using Sequential ATPG Jacob A. Abraham and Vivekananda M. Vedula Comuter Engineering Research Center The University of Texas at Austin Austin, TX 78712 jaa, vivek @cerc.utexas.edu Daniel

More information