An Exponential Time 2-Approximation Algorithm for Bandwidth

Size: px
Start display at page:

Download "An Exponential Time 2-Approximation Algorithm for Bandwidth"

Transcription

1 An Exponentia Time 2-Approximation Agorithm for Bandwidth Martin Fürer 1, Serge Gaspers 2, Shiva Prasad Kasiviswanathan 3 1 Computer Science and Engineering, Pennsyvania State University, furer@cse.psu.edu 2 CMM, Universidad de Chie, sgaspers@dim.uchie.c 3 Los Aamos Nationa Laboratory, kasivisw@gmai.com Abstract. The bandwidth of a graph G on n vertices is the minimum b such that the vertices of G can be abeed from 1 to n such that the abes of every pair of adjacent vertices differ by at most b. In this paper, we present a 2-approximation agorithm for the Bandwidth probem that takes worst-case O( n = O( n time and uses poynomia space. This improves both the previous best 2- and 3-approximation agorithms of Cygan et a. which have an O (3 n and O (2 n worst-case time bounds, respectivey. Our agorithm is based on constructing bucket decompositions of the input graph. A bucket decomposition partitions the vertex set of a graph into ordered sets (caed buckets of (amost equa sizes such that a edges are either incident on vertices in the same bucket or on vertices in two consecutive buckets. The idea is to find the smaest bucket size for which there exists a bucket decomposition. The agorithm uses a simpe divide-and-conquer strategy aong with dynamic programming to achieve this improved time bound. 1 Introduction Let G = (V, E be a graph on n vertices and b be an integer. The Bandwidth probem asks whether the vertices of G can be abeed from 1 to n such that the abes of every pair of adjacent vertices differ by at most b. The Bandwidth probem is a specia case of the Subgraph Isomorphism probem, as it can be formuated as foows: Is G isomorphic to a subgraph of P b n? Here, P b n denotes the graph obtained from P n (the path on n vertices by adding an edge between every pair of vertices at distance at most b in P n. A typica scenario in which the Bandwidth probem arises is that of minimizing the bandwidth of a symmetric matrix M to aow for more efficient storing and manipuating procedures [11]. The bandwidth of M is b if a its non-zero entries are at a distance of at most b from the diagona. Appying permutations on the rows and coumns to reduce the bandwidth of M corresponds then to reordering the vertices of a graph whose adjacency matrix corresponds to M by repacing a non-zero entries by 1. Visiting EPFL Lausanne and Universität Zürich. Research supported in part by NSF Grant CCF Partiay supported by the Research Counci of Norway (NFR and by the GRAAL project ANR-06-BLAN-0148 of the French Nationa Research Agency (ANR.

2 The Bandwidth probem is NP-hard [19], even for trees of maximum degree at most three [14] and caterpiars with hair ength at most three [17]. Even worse, approximating the bandwidth within a constant factor is NP-hard, even for caterpiars of degree three [21]. Further, it is known that the probem is hard for every fixed eve of the W-hierarchy [3] and unikey to be sovabe in f(bn o(b time [4]. Faced with this immense intractabiity, severa approaches have been proposed in the iterature for the Bandwidth probem. The first (poynomia time approximation agorithm with a poyogarithmic approximation factor was provided by Feige [10]. Later, Dunagan and Vempaa gave an O(og 3 n og og n-approximation agorithm. The current best approximation agorithm achieves an O(og 3 n(og og n 1/4 -approximation factor [16]. For arge b, the best approximation agorithm is the probabiistic agorithm of Bum et a. [2] which has an O( n/b og n-approximation factor. Super-poynomia time approximation agorithms for the Bandwidth probem have aso been widey investigated [5,8,9,12]. Feige and Tawar [12], and Cygan and Piipczuk [8] provided subexponentia time approximation schemes for approximating the bandwidth of graphs with sma treewidth. For genera graphs, a 2-approximation agorithm with a running time of O (3 n 4 is easiy obtained by combining ideas from [11] and [12] (as noted in [5]. Further, Cygan et a. [5] provide a 3-approximation agorithm with a running time of O (2 n, which they generaize to a (4r 1-approximation agorithm (for any positive integer r with a running time of O (2 n/r. Concerning exact exponentia time agorithms, the fastest poynomia space agorithm is sti the eegant O (10 n time agorithm of Feige [11]. When aowing exponentia space, this bound is improved in a sequence of agorithms by Cygan and Piipczuk; their O (5 n time agorithm uses O (2 n space [6], their O(4.83 n time agorithm uses O (4 n space [7], and their O(4.473 n time agorithm uses O(4.473 n space [8]. The most practica of these agorithms is probaby the O (5 n time agorithm as the space requirements of the other ones seems forbiddingy arge for practica appications. The Bandwidth probem can aso be soved exacty in O(n b time using dynamic programming [20,18]. Another recent approach to cope with the intractabiity of Bandwidth is through the concept of hybrid agorithms, introduced by Vassievska et a. [22]. They gave an agorithm that after a poynomia time test, either computes the minimum bandwidth of a graph in O (4 n+o(n time, or provides a poyogarithmic approximation ratio in poynomia time. This resut was recenty improved by Amini et a. [1] who give an agorithm which, after a poynomia time test, either computes the minimum bandwidth of a graph in O (4 n time, or provides an O(og 3/2 n-approximation in poynomia time. Our Resuts. Our main resut is a 2-approximation agorithm for the Bandwidth probem that takes worst-case O( n time (Theorem 1. This improves the O (3 n time bound achieved by Cygan et a. [5] for the same approximation ratio. Aso, the previous best 3-approximation agorithm of Cygan and Piipczuk [8] has an O (2 n time bound. Therefore, our 2-approximation agorithm is aso faster than the previous best 3-approximation agorithm. 4 O (f(n denotes n O(1 O(f(n.

3 Our agorithm is based on constructing bucket decompositions of the input graph. A bucket decomposition partitions the vertex set of a graph into ordered sets (caed buckets of (amost equa sizes such that a edges are either incident on vertices in the same bucket or on vertices in two consecutive buckets. The idea is to find the smaest bucket size for which there exists a bucket decomposition. This gives a 2-approximation for the Bandwidth probem (Lemmas 2 and 1. The agorithm uses a simpe divideand-conquer strategy aong with dynamic programming to achieve this improved time bound. 2 Preiminaries Let G = (V, E be a graph on n vertices. A inear arrangement of G is a bijective function L : V [n] = {1,..., n}, that is a numbering of its vertices from 1 to n. The stretch of an edge (u, v is the absoute difference between the numbers assigned to its endpoints L(u L(v. The bandwidth of a inear arrangement is the maximum stretch over a the edges of G and the bandwidth of a graph is the minimum bandwidth over a inear arrangements of G. A bucket arrangement of G is a pacement of its vertices into buckets such that for each edge, its endpoints are either in the same bucket or in two consecutive buckets [12]. The buckets are ineary ordered and numbered from eft to right. A capacity vector C is a vector of positive integers. The ength of a capacity vector C = (C[1],..., C[k] is k and its size is k i=1 C[i]. Given a capacity vector C of size n, a C-bucket arrangement of G is a bucket arrangement in which exacty C[i] vertices are paced in bucket i, for each i. For integers n and with < n/2, an (n, -capacity vector is a capacity vector (a,,,...,, b }{{} n 2 times of size n such that a, b. We say that an (n, -capacity vector is eft-packed if a = and baanced if a b = 1. Let X V be a subset of the vertices of G. We denote by G[X] the subgraph of G induced on X, and by G \ X the subgraph of G induced on V \ X. The open neighborhood of a vertex v is denoted by N G (v and the open neighborhood of X is N G (X := ( v X N G(v \ X. 3 Exponentia Time Agorithms for Approximating Bandwidth We first estabish two simpe emmas that show that constructing a bucket arrangement can approximate the bandwidth of a graph. Lemma 1. Let G be a graph on n vertices, and et C be an (n, -capacity vector. If there exists a C-bucket arrangement for G then the bandwidth of G is at most 2 1. Proof. Given a C-bucket arrangement for G, create a inear arrangement respecting the bucket arrangement (if u appears in a smaer numbered bucket than v, then L(u <

4 L(v, where vertices in the same bucket are numbered in an arbitrary order. As the capacity of each bucket is at most and each edge spans at most two consecutive buckets, the maximum edge stretch in the constructed inear arrangement is at most 2 1. Lemma 2. Let G be a graph on n vertices, and et C be an (n, -capacity vector. If there exists no C-bucket arrangement for G then the bandwidth of G is at east + 1. Proof. Suppose there exists a inear arrangement L of G of bandwidth at most. Construct a bucket arrangement pacing the first C[1] vertices of L into the first bucket, the next C[2] vertices of L into the second bucket, and so on. In the resuting bucket arrangement, no edge spans more than two consecutive buckets. Therefore, a C-bucket arrangement exists for G, a contradiction. We wi use the previous fastest 2-approximation agorithm of Cygan et a. [5] as a subroutine. For competeness, we describe this simpe agorithm here. Proposition 1 ([5]. There is a poynomia space 2-approximation agorithm for the Bandwidth probem that takes O (3 n time on connected graphs with n vertices. Proof. Let G be a connected graph on n vertices. For increasing from 1 to n/2, the agorithm does the foowing. Let C be an (n, -capacity vector. The agorithm goes over a the k = n choices for assigning the first vertex to some bucket. The agorithm then chooses an unassigned vertex u which has at east one neighbor that has aready been assigned to some bucket. Assume that a neighbor of u is assigned to the bucket i. Now there are at most three choices of buckets (i 1, i, and i + 1 for assigning vertex u. Some of these choices may be invaid either because of the capacity constraints of the bucket or because of the previous assignments of (other neighbors of u. If the choice is vaid, the agorithm recurses by assigning u to that bucket. Let be the smaest integer for which the agorithm succeeds, in some branch, to pace a vertices of G into buckets in this way. Then, by Lemma 1, G has bandwidth at most 2 1 and by Lemma 2, G has bandwidth at east. Thus, the agorithm outputs 2 1, which is a 2-approximation for the bandwidth of G. As the agorithm branches into at most 3 cases for each of the n vertices (except the first one, and a other computations ony contribute poynomiay to the running time of the agorithm, this agorithm runs in worst-case O (3 n time using ony poynomia space. We now show another simpe agorithm based on a divide-and-conquer strategy that given an (n, -capacity vector C, decides whether a C-bucket arrangement exists for a connected graph G. Proposition 2. Let G be a connected graph on n vertices and C be an (n, -capacity vector with < n/2. ( There exists an agorithm that can decide if G has a C-bucket (n ( arrangement in O n/ n/4 time. Proof. Let k = n be the number of buckets in the C-bucket arrangement. Number the buckets from 1 to k from eft to right according to the bucket arrangement. Seect a bucket index i such that the sum of the capacities of the buckets numbered stricty

5 smaer than i and the one for the buckets numbered stricty arger than i are both at most n/2. The agorithm goes over a possibe ( n choices of fiing bucket i with vertices. Let X be a set of vertices assigned to the bucket i. Given a connected component of G \ X, note that a the vertices of this connected component must be paced either ony in buckets 1 to i 1 or buckets i + 1 to k. Note that each connected component of G \ X contains at east one vertex that is adjacent to a vertex in X (as G is connected. Therefore, for each connected component of G \ X, at east one vertex is paced into the bucket i 1 or i + 1. As the capacity of each bucket is at most, G \ X has at most 2 connected components, otherwise there is no C-bucket arrangement where X is assigned to the bucket i. Thus, there are at most 2 2 choices for assigning connected components of G\X to the buckets 1 to i 1 and i+1 to k. Some of these assignments might be invaid as they might vioate the capacity constraints of the buckets. We discard these invaid assignments. For each choice of X and each vaid assignment of the connected components of G\ X to the eft or right of bucket i, we have now obtained two independent subprobems: one subprobem for the buckets {1,..., i 1} and one subprobem for the buckets {i + 1,..., k}. These subprobems have sizes at most n/2. Consider the subprobem for the buckets {1,..., i 1} (the other one is symmetric and et Y be the set of vertices associated to these buckets. Let Z Y be the set of vertices in Y that have at east one neighbor in X. Now, add edges to the subgraph G[Y ] such that Z becomes a cique. This does not change the probem, as a the vertices in Z must be assigned to the bucket i 1, and G[Y ] becomes connected. This subprobem can be soved recursivey, ignoring those soutions where vertices in Z are not a assigned to the bucket i 1. The agorithm performs the above recursion unti it reaches subprobems of size at most n/4, which corresponds to two eves in the corresponding search tree. On instances of size at most n/4, the agorithm invokes the agorithm of Proposition 1, which takes worst-case O (3 n/4 time. Let T (n be the running time needed for the above procedure to check whether a graph with n vertices has a bucket arrangement for an (n, -capacity vector. Then, T (n ( n 2 2 ( n/2 (( n n/4 n O(1 = O ( n/ n/4. This competes the proof of the proposition. Combining Proposition 2 with Lemmas 1 and 2, we have the foowing coroary for 2-approximating the bandwidth of a graph. Coroary 1. There is an agorithm that, for a connected graph G on n vertices and an integer( n can decide whether the bandwidth of G is at east + 1 or at most 2 1 (n ( in O n/ n/4 time. Proof. If n/2, the bandwidth of G is at most 2 1. Otherwise, use Proposition 2 with G and some (n, -capacity vector C to decide if there exists a C-bucket arrangement for G. If so, then the bandwidth of G is at most 2 1 by Lemma 1. If not, then the bandwidth of G is at east + 1 by Lemma 2.

6 The running time of the agorithm of Coroary 1 is interesting for sma vaues of. Namey, if n/26, the running time is O( n. In the remainder of this section, we improve Proposition 2. We now concentrate on the cases where k = n/ 26. Let C be an (n, -capacity vector. A partia C-bucket arrangement of an induced subgraph G of G is a pacement of vertices of G into buckets such that: (a each vertex in G is assigned to a bucket or to a union of two consecutive buckets, (b the endpoints of each edge in G are either in the same bucket or in two consecutive buckets, and (c at most C[i] vertices are paced in each bucket i. Let B be a partia C-bucket arrangement of an induced subgraph G. We say that a bucket i is fu in B if the number of vertices that have been assigned to it equas its capacity (= C[i]. We say that two consecutive buckets i and i + 1 are jointy fu in B if a vertex subset Y of cardinaity equa to the sum of the capacities of i and i+1 have been assigned to these buckets (i.e., each vertex v Y is restricted to beong to the union of buckets i or i + 1, but which among these two buckets v beongs is not fixed. We say that a bucket is empty in B if no vertices have been assigned to it. Proposition 3. Let G be a graph on n vertices and C be a capacity vector of size n and ength k, where k is an integer constant. Let B = B(G be a partia C-bucket arrangement of some induced subgraph G of G such that in B some buckets are fu, some pairs of consecutive buckets are jointy fu, and a other buckets are empty. If in B no 3 consecutive buckets are empty, then it can be decided if B can be extended to a C-bucket arrangement in poynomia time. Proof Outine. Let G = (V, E and G = (V, E. Let r be the number of connected components of G \ V (the graph induced on V \ V, and et V represent the set of vertices in the th connected component of G \ V. If the bucket i is fu in B, et X i denote the set of vertices assigned to it. If the buckets i and i + 1 are jointy fu in B, et X i,i+1 denote the set of vertices assigned to the union of buckets i and i+1. We use dynamic programming to start from a partia bucket arrangement satisfying the above conditions to construct a C-bucket arrangement. During its execution, the agorithm assigns vertices to the buckets which are empty in B. We ony present an outine of the dynamic programming agorithm here. The dynamic programming agorithm constructs a tabe T [... ], which has the foowing indices. An index p, representing the subprobem on the first p connected components of G \ V. For every empty bucket i in B such that both the buckets i 1 and i + 1 are fu, it has an index s i, representing the number of vertices assigned to the bucket i. For every two consecutive empty buckets i and i + 1 in B, it has indices t i,i+1, x i, and x i+1. The index t i,i+1 represents the tota number of vertices assigned to the buckets i and i + 1. The index x i represents the number of vertices assigned to the buckets i and i + 1 that have at east one neighbor in the bucket i 1. The index x i+1 represents the number of vertices assigned to the buckets i and i + 1 that have at east one neighbor in the bucket i + 2. For every two consecutive buckets i, i + 1 which are jointy fu in B, it has indices f i and f i+1 representing the number of vertices assigned to these buckets that have at east one neighbor in the bucket i 1 (f i or in the bucket i + 2 (f i+1.

7 Tabe T [...] is initiaized to fase everywhere, except for the entry corresponding to a-zero indices, which is initiaized to true. The rest of the tabe is buit by increasing vaues of p as described beow. Here, we ony write those indices that differ in the ooked-up tabe entries and the computed tabe entry (i.e., indices in the tabe that pay no roe in a given recursion are omitted. We aso ignore the expicit checking of the invaid indices in the foowing description. The agorithm ooks at the vertices which are neighbors (in G of the vertices in V p and have aready been assigned. If the vertices in V p have at east one neighbor in each of the fu buckets i 1 and i + 1, have no neighbors in any other buckets, and bucket i is empty in B, then T [p, s i,...] = T [p 1, s i V p,...]. If the vertices in V p have at east one neighbor in the fu buckets i 1 and i + 2, have no neighbors in any other buckets, and the buckets i and i + 1 are both empty in B, then T [p, t i,i+1, x i, x i+1,...] = fase if N G (X i 1 N G (X i+2, T [p 1, t i,i+1 V p, x i V p N G (X i 1, x i+1 V p N G (X i+2,...] otherwise. If the vertices in V p have at east one neighbor in the jointy fu buckets i 2 and i 1, and at east one neighbor in the jointy fu buckets i + 1 and i + 2, but have no neighbors in any other buckets, and bucket i is empty in B, then T [p, s i, f i 1, f i+1,... ] = T [p 1, s i V p, f i 1 N G (V p X i 2,i 1, f i+1 N G (V p X i+1,i+2,... ]. The recursion for the other possibiities where V p has neighbors in two distinct buckets can now easiy be deduced. We now consider the cases where V p has ony neighbors in one bucket. Again, we ony describe some key-cases, from which a other cases can easiy be deduced. If the vertices in V p have ony neighbors in the fu bucket i 1, and the buckets i 2 and i are both empty in B, but the buckets i 3 and i + 1 are either fu or non-existing, then T [p, s i 2, s i,...] = T [p 1, s i 2 V p, s i,...] T [p 1, s i 2, s i V p,...]. If the vertices in V p have ony neighbors in the fu bucket i 1, and the buckets i 3, i 2, i, and i + 1 are a empty in B, then T [p, t i 3,i 2, x i 2, t i,i+1, x i,...] = T [p 1, t i 3,i 2 V p, x i 2 V p N G (X i 1, t i,i+1, x i,...] T [p 1, t i 3,i 2, x i 2, t i,i+1 V p, x i V p N G (X i 1,...]. If the vertices in V p have ony neighbors in the jointy fu buckets i and i + 1, and the buckets i 1 and i + 2 are both empty in B, but the buckets i 2 and i + 3 are either

8 fu in B or non-existing, then T [p, s i 1, s i+2, f i, f i+1,...] = T [p 1, s i 1 V p, s i+2, f i N G (V p X i,i+1, f i+1,...] T [p 1, s i 1, s i+2 V p, f i, f i+1 N G (V p X i,i+1,...]. The fina answer (true or fase produced by the agorithm is a disjunction over a tabe entries whose indices are as foows: p = r, s i = C[i] for every index s i, t i,i+1 = C[i] + C[i + 1] for every index t i,i+1, x i C[i] for every index x i, and f i C[i] for every index f i. Remark 1. The dynamic programming agorithm in Proposition 3 can easiy be modified to construct a C-bucket arrangement (from any partia bucket arrangement B satisfying the stated conditions, if one exists. If the number of buckets is a constant, the foowing proposition wi be crucia in speeding up the procedure for assigning connected components to the right or the eft of a bucket fied with a vertex set X. Denote by sc(g the set of a connected components of G with at most n vertices and by c(g the set of a connected components of G with more than n vertices. Let V (sc(g and V (c(g denote the set of a vertices which are in the connected components beonging to sc(g and c(g, respectivey. We now make use of the fact that if there are many sma components in G \ X, severa of the assignments of the vertices in V (sc(g \ X to the buckets are equivaent. Let C be a capacity vector of size n (i.e., i C[i] = n and et B be a partia C- bucket arrangement of an induced subgraph G of G. Let C be the capacity vector obtained from C by decreasing the capacity C[i] of each bucket i by the number of vertices assigned to the bucket i in B. We say that B produces the capacity vector C. Proposition 4. Let G = (V, E be a graph on n vertices. Let C be a capacity vector of size n and ength k, where k is an integer constant. Let j be a bucket and X V be a subset of C[j] vertices. Consider a capacity vectors which are produced by the partia C-bucket arrangements of G[V (sc(g \ X X] where the vertices in X are aways assigned to the bucket j. Then, there exists an agorithm which runs in O (3 n time and takes poynomia space, and enumerates a (distinct capacity vectors produced by these partia C-bucket arrangements. Proof. Let V be the vertex set of the th connected component in sc(g \ X. Let L p denote the ist of a capacity vectors produced by the partia C-bucket arrangements of G[ 1 p V X] where the vertices in X are aways assigned to the bucket j. Note that since k is a constant, the number of distinct vectors in L p is poynomia (at most n k. Then, L 1 can be obtained by executing the agorithm of Proposition 1 on the graph G[V 1 ] with a capacity vector C which is the same as C except that C [i] = 0. In genera, L p can be obtained from L p 1 by executing the agorithm of Proposition 1 on the graph G[V p ] for every capacity vector in L p 1. As the size of each connected component in sc(g \ X is at most n, the resuting running time is O (3 n.

9 3.1 Exponentia Time 2-Approximation Agorithm for Bandwidth Let G = (V, E be the input graph. Our agorithm tests a bucket sizes from 1 to n/2 unti it finds an (n, -capacity vector C such that G has a C-bucket arrangement. For a given, et k = n denote the number of buckets. Our agorithm uses various strategies depending on the vaue of k. The case of k = 1 is trivia. If = n/2, we have at most two buckets and any partition of the vertex set of G into sets of sizes and n is a vaid C-bucket arrangement. If k 27, Coroary 1 gives a running time of O( n. For a other vaues of k, we wi obtain running times in O( n. Let I k be the set of a integers ying between n/(k 1 and n/k. The basic idea (as iustrated in Proposition 2 is quite simpe. The agorithm tries a possibe ways of assigning vertices to the midde bucket. Once the vertex set X assigned to the midde bucket is fixed and the agorithm has decided for each connected component of G \ X if the connected component is to be assigned to the buckets to the eft or to the right of the midde bucket, the probem breaks into two independent subprobems on buckets which are to the eft and to right of the midde bucket. To get the caimed running time, we buid upon this idea to design individuaized techniques for different ks (between 3 and 26. For each case, if G has at east one C-bucket arrangement for an (n, -capacity vector C, then one such arrangement is constructed. We know that if G has no C-bucket arrangement for an (n, -capacity vector C then the bandwidth of G is at east + 1 (Lemma 2, and if it has one then its bandwidth is at most 2 1 (Lemma 1. If k = 8, 10, or 12, the agorithm uses a eft-packed (n, -capacity vector C, and otherwise, the agorithm uses a baanced (n, -capacity vector C. k = 3. The agorithm goes over a subsets X V of cardinaity X = C[3] (n /2 with I 3. X is assigned to the bucket 3. If the remaining vertices can be assigned to the buckets 1 and 2 in a way such that a vertices which are neighbors of the vertices in X (in G are assigned to the bucket 2, then G has a C-bucket arrangement where C has ength 3. The worst-case running time for this case is max I3 O ( ( n X. k = 4 or k = 5. The agorithm goes over a subsets X V with X = and I k. X is assigned to the bucket 3. Then, we can concude using the dynamic programming agorithm outined in Proposition 3 (see aso the remark foowing it. The worst-case running time for these cases are max Ik O ( ( n. k = 6. If k = 6, the agorithm goes through a subsets X V with X = 2 and I 6. X is assigned to the union of buckets 3 and 4 (i.e., some non-specified vertices from X are assigned to the bucket 3, and the remaining vertices of X are assigned to the bucket 4. Then, we can again concude by the agorithm outined in Proposition 3. The worst-case running time for this case is max I6 O (( n 2. k = 7. The agorithm goes through a subsets X V with X = and I 7. X is assigned to the bucket 4. For each such X, the agorithm uses Proposition 4 to enumerate a possibe capacity vectors produced by the partia C-bucket arrangements of G[V (sc(g \ X X] (with X assigned to the bucket 4. This step can be done in O (3 n time. There are ony poynomiay many such (distinct capacity vectors. For

10 each of these capacity vector C, the agorithm goes through a choices of assigning each connected component in c(g \ X to the buckets 1 to 3 or to the buckets 5 to 7. Thus, we obtain two independent subprobems on the buckets 1 to 3 and on the buckets 5 to 7. As the number of number of components in c(g \ X is at most n (as each connected component has at east n vertices, going through a possibe ways of assigning each connected component in c(g \ X to the buckets numbered smaer or arger than 4 takes O (2 n time. Some of these assignments may turn out to be invaid. For each vaid assignment, et V 1 denote the vertex set assigned to the buckets 1 to 3. Then, the vertices of V 1 are assigned to the buckets 1 to 3 as described in the case with 3 buckets with the capacity vector (C [1], C [2], C [3] and with the additiona restriction that a vertices in V 1 which are neighbors of the vertices in X need to be assigned to the bucket 3. The number of vertices in V 1 is at most (n /2 (as C is baanced. Now the size of bucket 1 is C [1] (n 5/2. Let n 1 = (n /2 and 1 = (n 5/2. If V 1 has at east one vaid bucket arrangement into 3 buckets (with vertices in V 1 neighboring the vertices in X assigned to the bucket 3, then the above step wi construct one in worst-case O ( ( n 1 1 time. The agorithm uses a simiar approach for V 2 = V \ (V 1 X with the buckets 5 to 7. Since, the agorithm tries out every subset X for bucket 4, the worst-case running time for this case is max O I 7 (( n ( 3 n + 2 n ( n1 1 = max O I 7 (( n 2 O( n k = 8. The agorithm uses a eft-packed (n, -capacity vector C for this case. The agorithm goes through a subsets X V with X = and I 8. X is assigned to the bucket 4. The remaining anaysis is simiar to the case with 7 buckets. Buckets 1 to 3 have a joint capacity of 3 (as C is eft-packed and the buckets 5 to 8 have a joint capacity of n 4. The worst-case running time for this case is max O I 8 (( n 2 O( n max {( 3, ( n 4 }. The terms in the max expression come from the cases with 3 and 4 buckets. k = 9 or k = 11. The agorithm goes through a subsets X V with X = and I k. X is assigned to the bucket k/2. As in the previous two cases, Proposition 4 is invoked for G[V (sc(g \ X X] (with X assigned to the bucket k/2. For each capacity vector generated by Proposition 4, the agorithm ooks at every possibe way of assigning each connected component in c(g\x to the buckets 1 to k/2 1 or to the buckets k/2 + 1 to k. Each assignment gives rise to two independent subprobems one on vertices V 1 assigned to the buckets 1 to (k 1/2, and one on vertices V 2 assigned to the buckets (k + 3/2 to k (with vertices in V 1 and V 2 neighboring the vertices in X assigned to the buckets (k 1/2 and (k + 3/2, respectivey. The agorithm soves these subprobems recursivey as in the cases with 4 or 5 buckets. Let n 1 = (n /2. Then, the worst-case running times are max Ik O ( ( n 2 O( n (n 1. k = 10 or k = 12. The agorithm uses a eft-packed (n, -capacity vector C for these cases. The agorithm goes through a subsets X V with X = and I k. X is ( n1 1.

11 assigned to the bucket k/2. The remaining anaysis is simiar to the previous cases. For k = 10, the worst-case running time is max I10 O ( ( n 2 O( n (n/2. For k = 12, the worst-case running time is max I12 O ( ( n 2 O( n max{ ( ( 5, n 6 }. 13 k 26. The agorithm enumerates a subsets X V with X = and I k. X is assigned to the bucket k/2. As in the previous cases, Proposition 4 is invoked for G[V (sc(g \ X X]. For each capacity vector generated by Proposition 4, the agorithm ooks at every possibe way of assigning each connected component in c(g\ X to the buckets 1 to k/2 1 or to the buckets k/2 + 1 to k. Each assignment gives rise to two independent subprobems. For each of these two subprobems, the agorithm proceeds recursivey unti reaching subprobems with at most 2 consecutive empty buckets, which can be soved by Proposition 3 in poynomia time. If k 23, this recursion has depth 3, giving a running time of (( ( ( n max O 2 O( n n/2 2 O( n n/4 2 O( n. I k If 24 k 26, the recursion has depth 4, giving a running time of (( ( ( ( n max O 2 O( n n/2 2 O( n n/4 2 O( n n/8 2 O( n I k k 27. By Proposition 2 the running time of the agorithm is bounded in this case by (( ( n n/2 max O n/4. I k Main Resut. Putting together a the above arguments and using numerica vaues (see [13] for the compete detais we get our main resut (Theorem 1. The running time is dominated by the cases where k = 7 and k = 8. The agorithm outputs 2 1, where is the smaest integer such that G has a bucket arrangement with an (n, - capacity vector. The agorithm requires ony poynomia space. If G is disconnected, the agorithm finds for each connected component G i = (V i, E i the smaest i such that G i has a bucket arrangement corresponding to a ( V i, i -capacity vector and outputs 2 m 1, where m = max i { i }. Theorem 1 (Main Theorem. There is a poynomia space 2-approximation agorithm for the Bandwidth probem that takes O( n time on graphs with n vertices. 4 Concusion For finding exact soutions, it is known that many probems (by subexponentia time preserving reductions do not admit subexponentia time agorithms under the Exponentia Time Hypothesis [15] (a stronger hypothesis than P NP. The Exponentia Time Hypothesis supposes that there is a constant c such that 3-SAT cannot be soved in time O(2 cn, where n is the number of variabes of the input formua. We conjecture that the Bandwidth probem has no subexponentia time 2-approximation agorithm, uness the Exponentia Time Hypothesis fais. 2.

12 References 1. O. Amini, F. V. Fomin, and S. Saurabh, Counting Subgraphs via Homomorphisms, Proceedings of ICALP 2009, ( A. Bum, G. Konjevod, R. Ravi, and S. Vempaa, Semi-Definite Reaxations for Minimum Bandwidth and other Vertex-Ordering probems, Theor. Comput. Sci. 235(1, ( H. L. Bodaender, M. R. Feows, and M. T. Haett, Beyond NP-competeness for Probems of Bounded Width: Hardness for the W-hierarchy, Proceedings of STOC 1994, ( J. Chen, X. Huang, I. A. Kanj, and G. Xia, Linear FPT Reductions and Computationa Lower Bounds, Proceedings of STOC 2004, ( M. Cygan, L. Kowaik, M. Piipczuk, and M. Wykurz, Exponentia-time Approximation of Hard Probems, Technica Report abs/ , arxiv, CoRR ( M. Cygan and M. Piipczuk, Faster Exact Bandwidth, Proceedings of WG 2008, ( M. Cygan and M. Piipczuk, Even Faster Exact Bandwidth, Technica Report abs/ , arxiv, CoRR ( M. Cygan and M. Piipczuk, Exact and approximate Bandwidth, Proceedings of ICALP 2009, ( J. Dunagan and S. Vempaa, On Eucidean Embeddings and Bandwidth Minimization, Proceedings of RANDOM-APPROX 2001, ( U. Feige, Approximating the Bandwidth via Voume Respecting Embeddings, J. Comput. Syst. Sci. 60(3, ( U. Feige, Coping with the NP-Hardness of the Graph Bandwidth Probem, Proceedings of SWAT 2000, ( U. Feige and K. Tawar, Approximating the Bandwidth of Caterpiars, Proceedings of APPROX-RANDOM 2005, ( M. Fürer, S. Gaspers, and S. P. Kasiviswanathan, An Exponentia Time 2-Approximation Agorithm for Bandwidth, Technica Report abs/ , arxiv, CoRR ( M. R. Garey, R. L. Graham, D. S. Johnson, and D. E. Knuth, Compexity Resuts for Bandwidth Minimization, SIAM J. App. Math. 34(3, ( R. Impagiazzo and R. Paturi, On the Compexity of k-sat, J. Comput. Syst. Sci. 62(2, ( J. R. Lee, Voume Distortion for subsets of Eucidean Spaces, Discrete Comput. Geom. 41(4, ( B. Monien, The Bandwidth Minimization Probem for Caterpiars with Hair Length 3 is NP-compete, SIAM J. Ag. Disc. Meth. 7(4, ( B. Monien and I. H. Sudborough, Bandwidth Probems in Graphs, Proceedings of Aerton Conference on Communication, Contro, and Computing 1980, ( C. Papadimitriou, The NP-competeness of the Bandwidth Minimization Probem, Computing 16, ( J. Saxe, Dynamic Programming Agorithms for Recognizing Sma-bandwidth Graphs in Poynomia Time, SIAM J. Ag. Disc. Meth. 1, ( W. Unger, The Compexity of the Approximation of the Bandwidth Probem, Proceedings of FOCS 1998, ( V. Vassievska, R. Wiiams, and S. L. M. Woo, Confronting Hardness using a Hybrid Approach, Proceedings of SODA 2006, 1-10 (2006.

Alpha labelings of straight simple polyominal caterpillars

Alpha labelings of straight simple polyominal caterpillars Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.

More information

Solutions to the Final Exam

Solutions to the Final Exam CS/Math 24: Intro to Discrete Math 5//2 Instructor: Dieter van Mekebeek Soutions to the Fina Exam Probem Let D be the set of a peope. From the definition of R we see that (x, y) R if and ony if x is a

More information

Planar Graphs of Bounded Degree have Constant Queue Number

Planar Graphs of Bounded Degree have Constant Queue Number Panar Graphs of Bounded Degree have Constant Queue Number Michae A. Bekos, Henry Förster, Martin Gronemann, Tamara Mchedidze 3 Fabrizio Montecchiani 4, Chrysanthi Raftopouou 5, Torsten Ueckerdt 3 Institute

More information

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

M. Badent 1, E. Di Giacomo 2, G. Liotta 2

M. Badent 1, E. Di Giacomo 2, G. Liotta 2 DIEI Dipartimento di Ingegneria Eettronica e de informazione RT 005-06 Drawing Coored Graphs on Coored Points M. Badent 1, E. Di Giacomo 2, G. Liotta 2 1 University of Konstanz 2 Università di Perugia

More information

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae

More information

An Exponential Time 2-Approximation Algorithm for Bandwidth

An Exponential Time 2-Approximation Algorithm for Bandwidth A Expoetia Time -Approximatio Agorithm for Badwidth Marti Fürer Serge Gaspers Shiva Prasad Kasiviswaatha Abstract The badwidth of a graph G o vertices is the miimum b such that the vertices of G ca be

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Space-Time Trade-offs.

Space-Time Trade-offs. Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe

More information

Searching, Sorting & Analysis

Searching, Sorting & Analysis Searching, Sorting & Anaysis Unit 2 Chapter 8 CS 2308 Fa 2018 Ji Seaman 1 Definitions of Search and Sort Search: find a given item in an array, return the index of the item, or -1 if not found. Sort: rearrange

More information

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models On Upper Bounds for Assortment Optimization under the Mixture of Mutinomia Logit Modes Sumit Kunnumka September 30, 2014 Abstract The assortment optimization probem under the mixture of mutinomia ogit

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

l Tree: set of nodes and directed edges l Parent: source node of directed edge l Child: terminal node of directed edge

l Tree: set of nodes and directed edges l Parent: source node of directed edge l Child: terminal node of directed edge Trees & Heaps Week 12 Gaddis: 20 Weiss: 21.1-3 CS 5301 Fa 2016 Ji Seaman 1 Tree: non-recursive definition Tree: set of nodes and directed edges - root: one node is distinguished as the root - Every node

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

and its spectrum 1. Notation and preliminaries ~~~(AI-A(G)) of A(G) by G{\), and refer to

and its spectrum 1. Notation and preliminaries ~~~(AI-A(G)) of A(G) by G{\), and refer to BULL. AUSTRAL. MATH. SOC. VOL. 18 (1978), 21-28. A new graph product and its spectrum C.D. Godsi and B.D. McKay A new graph product is introduced, and the characteristic poynomia of a graph so-formed is

More information

Linearity of Saturation for Berge Hypergraphs

Linearity of Saturation for Berge Hypergraphs Linearity of Saturation for Berge Hypergraphs Sean Engish Dánie Gerbner Abhishek Methuku Michae Tait Juy 18, 2018 Abstract For a graph F, we say a hypergraph H is Berge-F if it can be obtained from F be

More information

Binarized support vector machines

Binarized support vector machines Universidad Caros III de Madrid Repositorio instituciona e-archivo Departamento de Estadística http://e-archivo.uc3m.es DES - Working Papers. Statistics and Econometrics. WS 2007-11 Binarized support vector

More information

Chapter Multidimensional Direct Search Method

Chapter Multidimensional Direct Search Method Chapter 09.03 Mutidimensiona Direct Search Method After reading this chapter, you shoud be abe to:. Understand the fundamentas of the mutidimensiona direct search methods. Understand how the coordinate

More information

On Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture

On Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture On inding the est Partia Muticast Protection Tree under ua-homing rchitecture Mei Yang, Jianping Wang, Xiangtong Qi, Yingtao Jiang epartment of ectrica and omputer ngineering, University of Nevada Las

More information

Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters

Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters Crossing Minimiation Probems o Drawing Bipartite Graphs in Two Custers Lanbo Zheng, Le Song, and Peter Eades Nationa ICT Austraia, and Schoo o Inormation Technoogies, University o Sydney,Austraia Emai:

More information

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information

arxiv: v1 [cs.cg] 3 Dec 2013

arxiv: v1 [cs.cg] 3 Dec 2013 Linear transformation distance for bichromatic matchings Oswin Aichhozer Luis Barba Thomas Hack Aexander Piz Birgit Vogtenhuber arxiv:1312.0884v1 [cs.cg] 3 Dec 2013 Abstract Let P = B R be a set of 2n

More information

CERIAS Tech Report Replicated Parallel I/O without Additional Scheduling Costs by Mikhail J. Atallah Center for Education and Research

CERIAS Tech Report Replicated Parallel I/O without Additional Scheduling Costs by Mikhail J. Atallah Center for Education and Research CERIAS Tech Report 2003-50 Repicated Parae I/O without Additiona Scheduing Costs by Mikhai J. Ataah Center for Education and Research Information Assurance and Security Purdue University, West Lafayette,

More information

Enumeration of MSO Queries on Strings with Constant Delay and Logarithmic Updates

Enumeration of MSO Queries on Strings with Constant Delay and Logarithmic Updates Enumeration of MSO Queries on Strings with Constant Deay and Logarithmic Updates ABSTRACT Matthias Niewerth University of Bayreuth We consider the enumeration of MSO queries over strings under updates.

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

Privacy Preserving Subgraph Matching on Large Graphs in Cloud

Privacy Preserving Subgraph Matching on Large Graphs in Cloud Privacy Preserving Subgraph Matching on Large Graphs in Coud Zhao Chang,#, Lei Zou, Feifei Li # Peing University, China; # University of Utah, USA; {changzhao,zouei}@pu.edu.cn; {zchang,ifeifei}@cs.utah.edu

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

Faster parameterized algorithms for Minimum Fill-In

Faster parameterized algorithms for Minimum Fill-In Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Technical Report UU-CS-2008-042 December 2008 Department of Information and Computing Sciences Utrecht

More information

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed

More information

DISTANCE TRANSFORMATION FOR NETWORK DESIGN PROBLEMS

DISTANCE TRANSFORMATION FOR NETWORK DESIGN PROBLEMS DISTANCE TRANSFORMATION FOR NETWORK DESIGN PROBLEMS A Ridha Mahjoub, Michae Poss, Luidi Simonetti, Eduardo Uchoa To cite this version: A Ridha Mahjoub, Michae Poss, Luidi Simonetti, Eduardo Uchoa. DISTANCE

More information

Branching Algorithms

Branching Algorithms Lecture 01 05.10.01 Branching Algorithms Author: Arkadiusz Soca la 1 Motivation Definition 1. Decision problem L Σ is called NP problem if there exists a predicate ψ P computable in polynomial time such

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions 2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing

More information

Parameterized Algorithm for Eternal Vertex Cover

Parameterized Algorithm for Eternal Vertex Cover Parameterized Algorithm for Eternal Vertex Cover Fedor V. Fomin a,1, Serge Gaspers b, Petr A. Golovach c, Dieter Kratsch d, Saket Saurabh e, a Department of Informatics, University of Bergen, N-5020 Bergen,

More information

Priority Queueing for Packets with Two Characteristics

Priority Queueing for Packets with Two Characteristics 1 Priority Queueing for Packets with Two Characteristics Pave Chuprikov, Sergey I. Nikoenko, Aex Davydow, Kiri Kogan Abstract Modern network eements are increasingy required to dea with heterogeneous traffic.

More information

Approximation schemes for Euclidean k-medians and related problems

Approximation schemes for Euclidean k-medians and related problems Approximation schemes for Eucidean k-medians and reated probems Sanjeev Arora* Princeton University Prabhakar Raghavant IBM Research Satish Rae* NEC Research Abstract In t.he k-median probem we are given

More information

A Local Optimal Method on DSA Guiding Template Assignment with Redundant/Dummy Via Insertion

A Local Optimal Method on DSA Guiding Template Assignment with Redundant/Dummy Via Insertion A Loca Optima Method on DSA Guiding Tempate Assignment with Redundant/Dummy Via Insertion Xingquan Li 1, Bei Yu 2, Jiani Chen 1, Wenxing Zhu 1, 24th Asia and South Pacific Design T h e p i c Automation

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

Distinct Sampling on Streaming Data with Near-Duplicates*

Distinct Sampling on Streaming Data with Near-Duplicates* Distinct Samping on Streaming Data with Near-Dupicates* ABSTRACT Jiecao Chen Indiana University Boomington Boomington, IN, USA jiecchen@umai.iu.edu In this paper we study how to perform distinct samping

More information

Faster parameterized algorithms for Minimum Fill-In

Faster parameterized algorithms for Minimum Fill-In Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Abstract We present two parameterized algorithms for the Minimum Fill-In problem, also known as Chordal

More information

Analysis of Random. Processes via And-Or Tree Evaluation. Michael Mitzenmachert M. Amin Shokrollahiz

Analysis of Random. Processes via And-Or Tree Evaluation. Michael Mitzenmachert M. Amin Shokrollahiz Anaysis of Random Processes via And-Or Tree Evauation Michae G. Luby* Michae Mitzenmachert M. Amin Shokroahiz Abstract distributions not considered by previous anayses. We introduce a new set of probabiistic

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

Discrete elastica model for shape design of grid shells

Discrete elastica model for shape design of grid shells Abstracts for IASS Annua Symposium 017 5 8th September, 017, Hamburg, Germany Annette Böge, Manfred Grohmann (eds.) Discrete eastica mode for shape design of grid shes Yusuke SAKAI* and Makoto OHSAKI a

More information

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Register Aocation Consider the foowing assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Assume that two registers are avaiabe. Starting from the eft a compier woud generate

More information

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line American J. of Engineering and Appied Sciences 3 (): 5-24, 200 ISSN 94-7020 200 Science Pubications Appication of Inteigence Based Genetic Agorithm for Job Sequencing Probem on Parae Mixed-Mode Assemby

More information

Fastest-Path Computation

Fastest-Path Computation Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods

More information

Faster parameterized algorithm for Cluster Vertex Deletion

Faster parameterized algorithm for Cluster Vertex Deletion Faster parameterized algorithm for Cluster Vertex Deletion Dekel Tsur arxiv:1901.07609v1 [cs.ds] 22 Jan 2019 Abstract In the Cluster Vertex Deletion problem the input is a graph G and an integer k. The

More information

Further Concepts in Geometry

Further Concepts in Geometry ppendix F Further oncepts in Geometry F. Exporing ongruence and Simiarity Identifying ongruent Figures Identifying Simiar Figures Reading and Using Definitions ongruent Trianges assifying Trianges Identifying

More information

An Exponential Time 2-Approximation Algorithm for Bandwidth

An Exponential Time 2-Approximation Algorithm for Bandwidth A Expoetia Time -Approximatio Agorithm for Badwidth Marti Fürer Serge Gaspers Shiva Prasad Kasiviswaatha Abstract The badwidth of a graph G o vertices is the miimum b such that the vertices of G ca be

More information

Response Surface Model Updating for Nonlinear Structures

Response Surface Model Updating for Nonlinear Structures Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,

More information

NCH Software Spin 3D Mesh Converter

NCH Software Spin 3D Mesh Converter NCH Software Spin 3D Mesh Converter This user guide has been created for use with Spin 3D Mesh Converter Version 1.xx NCH Software Technica Support If you have difficuties using Spin 3D Mesh Converter

More information

Treewidth and graph minors

Treewidth and graph minors Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under

More information

Exact Algorithms Lecture 7: FPT Hardness and the ETH

Exact Algorithms Lecture 7: FPT Hardness and the ETH Exact Algorithms Lecture 7: FPT Hardness and the ETH February 12, 2016 Lecturer: Michael Lampis 1 Reminder: FPT algorithms Definition 1. A parameterized problem is a function from (χ, k) {0, 1} N to {0,

More information

Distributed Approximation of k-service Assignment

Distributed Approximation of k-service Assignment Distributed Approximation of k-service Assignment Magnús M. Hadórsson, Sven Köher 2, and Dror Rawitz 3 Reykjavik University, Iceand, mmh@ru.is 2 University of Freiburg, koehers@informatik.uni-freiburg.de

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

Math 776 Graph Theory Lecture Note 1 Basic concepts

Math 776 Graph Theory Lecture Note 1 Basic concepts Math 776 Graph Theory Lecture Note 1 Basic concepts Lectured by Lincoln Lu Transcribed by Lincoln Lu Graph theory was founded by the great Swiss mathematician Leonhard Euler (1707-178) after he solved

More information

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University Arithmetic Coding Prof. Ja-Ling Wu Department of Computer Science and Information Engineering Nationa Taiwan University F(X) Shannon-Fano-Eias Coding W..o.g. we can take X={,,,m}. Assume p()>0 for a. The

More information

l A set is a collection of objects of the same l {6,9,11,-5} and {11,9,6,-5} are equivalent. l There is no first element, and no successor of 9.

l A set is a collection of objects of the same l {6,9,11,-5} and {11,9,6,-5} are equivalent. l There is no first element, and no successor of 9. Sets & Hash Tabes Week 13 Weiss: chapter 20 CS 5301 Spring 2018 What are sets? A set is a coection of objects of the same type that has the foowing two properties: - there are no dupicates in the coection

More information

Massively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks.

Massively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks. assivey Parae Part of Speech Tagging Using in-ax oduar Neura Networks Bao-Liang Lu y, Qing a z, ichinori Ichikawa y, & Hitoshi Isahara z y Lab. for Brain-Operative Device, Brain Science Institute, RIEN

More information

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department

More information

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802.

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802. A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irreguar LDPC Codes in the IEEE 82.16e Standards Yeong-Luh Ueng and Chung-Chao Cheng Dept. of Eectrica Engineering,

More information

Succinct Indices for Path Minimum, with Applications to Path Reporting

Succinct Indices for Path Minimum, with Applications to Path Reporting Succinct Indices for Path Minimum, with Appications to Path Reporting Timothy M. Chan 1, Meng He 2, J. Ian Munro 1, and Gein Zhou 1 1 David R. Cheriton Schoo of Computer Science, University of Wateroo,

More information

Pattern Matching. a b a c a a b. a b a c a b. a b a c a b

Pattern Matching. a b a c a a b. a b a c a b. a b a c a b Pattern Matching a b a c a a b 1 a b a c a b 4 3 2 a b a c a b Strings A string is a seuence of characters Exampes of strings: n Python program n HTML document n DNA seuence n Digitized image An aphabet

More information

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162 oward Efficient Spatia Variation Decomposition via Sparse Regression Wangyang Zhang, Karthik Baakrishnan, Xin Li, Duane Boning and Rob Rutenbar 3 Carnegie Meon University, Pittsburgh, PA 53, wangyan@ece.cmu.edu,

More information

NP-Completeness of Some Tree-Clustering Problems

NP-Completeness of Some Tree-Clustering Problems NP-Competeness of Some Tree-Custering Probems Fak Schreiber and Konstantinos Skodinis Universit of Passau, 94032 Passau, German {schreiber,skodinis}@informatik.uni-passau.de Abstract A graph is a tree

More information

A 2k-Kernelization Algorithm for Vertex Cover Based on Crown Decomposition

A 2k-Kernelization Algorithm for Vertex Cover Based on Crown Decomposition A 2k-Kernelization Algorithm for Vertex Cover Based on Crown Decomposition Wenjun Li a, Binhai Zhu b, a Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation, Changsha

More information

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Nattawut Thepayasuwan, Member, IEEE and Aex Doboi, Member, IEEE Abstract

More information

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations Formuation of Loss minimization Probem Using Genetic Agorithm and Line-Fow-based Equations Sharanya Jaganathan, Student Member, IEEE, Arun Sekar, Senior Member, IEEE, and Wenzhong Gao, Senior member, IEEE

More information

3.1 The cin Object. Expressions & I/O. Console Input. Example program using cin. Unit 2. Sections 2.14, , 5.1, CS 1428 Spring 2018

3.1 The cin Object. Expressions & I/O. Console Input. Example program using cin. Unit 2. Sections 2.14, , 5.1, CS 1428 Spring 2018 Expressions & I/O Unit 2 Sections 2.14, 3.1-10, 5.1, 5.11 CS 1428 Spring 2018 Ji Seaman 1 3.1 The cin Object cin: short for consoe input a stream object: represents the contents of the screen that are

More information

MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY

MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY R.D. FALGOUT, T.A. MANTEUFFEL, B. O NEILL, AND J.B. SCHRODER Abstract. The need for paraeism in the time dimension is being driven

More information

Dynamic Symbolic Execution of Distributed Concurrent Objects

Dynamic Symbolic Execution of Distributed Concurrent Objects Dynamic Symboic Execution of Distributed Concurrent Objects Andreas Griesmayer 1, Bernhard Aichernig 1,2, Einar Broch Johnsen 3, and Rudof Schatte 1,2 1 Internationa Institute for Software Technoogy, United

More information

FOUR EDGE-INDEPENDENT SPANNING TREES 1

FOUR EDGE-INDEPENDENT SPANNING TREES 1 FOUR EDGE-INDEPENDENT SPANNING TREES 1 Alexander Hoyer and Robin Thomas School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332-0160, USA ABSTRACT We prove an ear-decomposition theorem

More information

Timing-Driven Hierarchical Global Routing with Wire-Sizing and Buffer-Insertion for VLSI with Multi-Routing-Layer

Timing-Driven Hierarchical Global Routing with Wire-Sizing and Buffer-Insertion for VLSI with Multi-Routing-Layer Timing-Driven Hierarchica Goba Routing with Wire-Sizing and Buffer-Insertion for VLSI with Muti-Routing-Layer Takahiro DEGUCHI y Tetsushi KOIDE z Shin ichi WAKABAYASHI y yfacuty of Engineering, Hiroshima

More information

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002* RDF Objects 1 Aex Barne Information Infrastructure Laboratory HP Laboratories Bristo HPL-2002-315 November 27 th, 2002* E-mai: Andy_Seaborne@hp.hp.com RDF, semantic web, ontoogy, object-oriented datastructures

More information

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y. FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four

More information

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs Repication of Virtua Network Functions: Optimizing Link Utiization and Resource Costs Francisco Carpio, Wogang Bziuk and Admea Jukan Technische Universität Braunschweig, Germany Emai:{f.carpio, w.bziuk,

More information

On the subgraphs of the (2 )-grid

On the subgraphs of the (2 )-grid R u t c o r Research R e p o r t On the subgraphs of the (2 )-grid Josep Díaz a Marcin Kamiński b Dimitrios M. Thilikos c RRR 18 2007, May 2007 RUTCOR Rutgers Center for Operations Research Rutgers University

More information

Reference trajectory tracking for a multi-dof robot arm

Reference trajectory tracking for a multi-dof robot arm Archives of Contro Sciences Voume 5LXI, 5 No. 4, pages 53 57 Reference trajectory tracking for a muti-dof robot arm RÓBERT KRASŇANSKÝ, PETER VALACH, DÁVID SOÓS, JAVAD ZARBAKHSH This paper presents the

More information

Parameterized graph separation problems

Parameterized graph separation problems Parameterized graph separation problems Dániel Marx Department of Computer Science and Information Theory, Budapest University of Technology and Economics Budapest, H-1521, Hungary, dmarx@cs.bme.hu Abstract.

More information

On Covering a Graph Optimally with Induced Subgraphs

On Covering a Graph Optimally with Induced Subgraphs On Covering a Graph Optimally with Induced Subgraphs Shripad Thite April 1, 006 Abstract We consider the problem of covering a graph with a given number of induced subgraphs so that the maximum number

More information

Algorithm and Complexity of Disjointed Connected Dominating Set Problem on Trees

Algorithm and Complexity of Disjointed Connected Dominating Set Problem on Trees Algorithm and Complexity of Disjointed Connected Dominating Set Problem on Trees Wei Wang joint with Zishen Yang, Xianliang Liu School of Mathematics and Statistics, Xi an Jiaotong University Dec 20, 2016

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Fa 2017 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program instructions

More information

Image Segmentation Using Semi-Supervised k-means

Image Segmentation Using Semi-Supervised k-means I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging

More information

Chordal deletion is fixed-parameter tractable

Chordal deletion is fixed-parameter tractable Chordal deletion is fixed-parameter tractable Dániel Marx Institut für Informatik, Humboldt-Universität zu Berlin, Unter den Linden 6, 10099 Berlin, Germany. dmarx@informatik.hu-berlin.de Abstract. It

More information

FIRST BEZIER POINT (SS) R LE LE. φ LE FIRST BEZIER POINT (PS)

FIRST BEZIER POINT (SS) R LE LE. φ LE FIRST BEZIER POINT (PS) Singe- and Muti-Objective Airfoi Design Using Genetic Agorithms and Articia Inteigence A.P. Giotis K.C. Giannakogou y Nationa Technica University of Athens, Greece Abstract Transonic airfoi design probems

More information

A Column Generation Approach for Support Vector Machines

A Column Generation Approach for Support Vector Machines A Coumn Generation Approach for Support Vector Machines Emiio Carrizosa Universidad de Sevia (Spain). ecarrizosa@us.es Beén Martín-Barragán Universidad de Sevia (Spain). bemart@us.es Doores Romero Moraes

More information

Approximate Closest Community Search in Networks

Approximate Closest Community Search in Networks Approximate Cosest Community Search in Networks Xin Huang, Laks V.S. Lakshmanan, Jeffrey Xu Yu, Hong Cheng University of British Coumbia, The Chinese University of Hong Kong {xin,aks}@cs.ubc.ca, {yu, hcheng}@se.cuhk.edu.hk

More information

Automatic Hidden Web Database Classification

Automatic Hidden Web Database Classification Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,

More information

Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation

Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation Patrice Y. Simard, 1 Yann A. Le Cun, 2 John S. Denker, 2 Bernard Victorri 3 1 Microsoft Research, 1 Microsoft Way, Redmond,

More information

Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, January 1997, pp. 777{ Partial Matching of Planar Polylines

Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, January 1997, pp. 777{ Partial Matching of Planar Polylines Eighth Annua ACM-SIAM Symposium on Discrete Agorithm January 997, pp. 777{786 Partia Matching of Panar Poyines Under Simiarity Transformations Scott D. Cohen Leonidas J. Guibas fscohen,guibasg@cs.stanford.edu

More information