v e v 1 C 2 b) Completely assigned T v a) Partially assigned Tv e T v 2 p k

Size: px
Start display at page:

Download "v e v 1 C 2 b) Completely assigned T v a) Partially assigned Tv e T v 2 p k"

Transcription

1 Approximation Algorithms for a Capacitated Network Design Problem R. Hassin 1? and R. Rai 2?? and F. S. Salman 3??? 1 Department of Statistics and Operations Research, Tel-Ai Uniersity, Tel Ai 69978, Israel. hassin@math.ta.ac.il 2 GSIA, Carnegie Mellon Uniersity, Pittsbrgh, PA rai@cm.ed 3 GSIA, Carnegie Mellon Uniersity, Pittsbrgh, PA fs2c@andrew.cm.ed Abstract. We stdy a network loading problem with applications in local access network design. Gien a network, the problem is to rote ow from seeral sorces to a sink and to install capacity on the edges to spport ows at minimm cost. Capacity can be prchased only in mltiples of a xed qantity. All the ow from a sorce mst be roted in a single path to the sink. This NP-hard problem generalizes the Steiner tree problem and also more eectiely models the applications traditionally formlated as capacitated tree problems. We present an approximation algorithm with performance ratio ( ST +2) where ST is the performance ratio of any approximation algorithm for minimm Steiner tree. When all sorces hae the same demand ale, the ratio improes to ( ST + 1) and in particlar, to 2 when all nodes in the graph are sorces. 1 Introdction We consider a single-sink mltiple-sorce roting and capacity installation problem where capacity can be prchased in mltiples of a xed qantity. In telecommnication network design this corresponds to installing transmission facilities sch as ber-optic cables on the edges of a network, and in transportation networks this applies to assigning ehicles of xed capacity to rotes. Topological design of commnication networks is sally carried in stages de to the complexity of the problem. One of the fndamental stages is the design of a local access network which links the sers to a switching center. The problem we stdy models this stage of the planning process. Problem statement. We are gien an nderlying ndirected graph G = (V; E); jv j = n. A sbset S of nodes is specied as sorces of trac and a single sink t is specied. Each sorce node s i 2 S has a positie integer-aled demand? This work was done when this athor isited GSIA, Carnegie Mellon Uniersity.?? Spported by an NSF CAREER grant CCR ??? Spported by an IBM Corporate Fellowship.

2 dem i. All the trac of each sorce mst be roted to t ia a single path, that is ow cannot be bifrcated. The edges of G hae lengths ` : E! < +. Withot loss of generality, we may assme that for eery pair of nodes ; w, we can se the shortest-path distance dist(; w) as the length of the edge between and w; Therefore, we take the metric completion of the gien graph and assme all edges from the complete graph are aailable. Capacity mst be installed on the edges of the network by prchasing one or more copies of a facility, which we refer to as the \cable" based on the telecommnication application. The cable has per nit length cost c and capacity. Withot loss of generality we can assme c = 1. The problem is to specify for each sorce s i, a path to t to rote demand dem i sch that cables installed on each edge of the network proide scient capacity for the ow on the edge, and total cost of cables installed is minimized. Notice that we allow paths from dierent sorces to share the capacity on the installed cables, the only restriction being that the capacity installed on an edge is at least as mch as the total demand roted throgh this edge. The problem is NP-hard since the problem with cable capacity large enogh to hold all of the demand is eqialent to a Steiner tree problem with the sorces and the sink as the terminal nodes. Preios Work. This problem has been stdied in the literatre as the network loading problem, together with its ariations sch as the mlticommodity and mltiple facility cases. For a srey on exact soltion methods see the chapter on mlticommodity capacitated network design by Gendron, Crainic and Frangioni in [SS99]. In spite of the recent comptational progress, the size of the instances that can be soled to optimality in reasonable time is still far from the size of real-life instances. In this paper we focs on obtaining approximation algorithms. A constant factor approximation for this problem was obtained by Salman et al. in [SCR+97] by applying the method of Mansor and Peleg [MP 94] to the case of single sink, and single cable type. The main algorithm of Mansor and Peleg applies to the mltiple-sorce mltiple-sink single cable problem with approximation ratio O(log n) in an n-node graph. By sing a Light Approximate Shortest-Path Tree (LAST) [KRY 93] instead of a more general-prpose spanner in this algorithm, Salman et al. obtained a 7-approximation algorithm for the single-sink ersion. When all the nodes in the inpt network except the sink node are sorce nodes, the approximation ratio in [SCR+97] redces to (2 p 2 + 2). Another constant factor approximation algorithm for this problem also follows from the work of Andrews and Zhang [AZ98] who gae an O(k 2 )-approximation algorithm for the single sink problem with k cable types, bt the reslting constant factor is rather high. Reslts. In this paper, we improe the approximation ratio to ( ST + 2) by roting throgh a network that is bilt on an approximate Steiner tree, with performance ratio ST. The idea is to tilize the Steiner tree when demand is low compared to the cable capacity and when demand accmlates to a ale close to the cable capacity, it is sent directly to the sink. For the special case

3 when demand of each sorce is niform, the approximation ratio improes to ( ST + 1). When all the nodes in the inpt network except the sink node are sorce nodes, the approximation ratio redces to 3 with non-niform demands, and to 2, for niform demands. Or stdy was also motiated by obtaining better approximation algorithms for the capacitated MST problem [Pap78,AG88,KB83,CL83,S83]: Gien an ndirected edge-weighted graph with a root node and a positie integer, the problem is to nd the minimm weight tree sch that eery sbtree hanging o the root node has at most nodes in it. This problem has been cited [KR98,AG88] to model the local access network design problem when eery non-sink node is reqired to rote a single nit of demand to the sink ia cables each of capacity at most. The reqirement that eery demand has to send its nit ow ia a single path is modeled as reqiring a tree as the soltion. Howeer, if roting these demands at nodes is not a concern, we can still enforce the nonbifrcating reqirement for the demands withot reqiring that the soltion be a tree. This reformlation leads exactly to or single cable problem in the niform case with all nodes being sorces. Or 2-approximation algorithm for this problem is then a better soltion than the best-known 3-approximation [AG88] for the corresponding capacitated MST formlation. In the nonniform demand case, or ( ST +2)-approximation is better than the best known 4-approximation presented in [AG88] in addition to handling the Steiner ersion that does not reqire all non-sink nodes be sorce nodes. In the next two sections, we present the algorithms for the case of niform and non-niform demands, respectiely. We close with an extension of the local access design problem. 2 Uniform Demand We rst present an approximation algorithm for the case when eery sorce has the same demand. Withot loss of generality, we assme demand eqals one for each sorce. We can otline the algorithm as follows. First we constrct an approximate Steiner tree with terminal set S[ftg and cost dist(e) on each edge e in polynomial time. Let T be the approximate Steiner tree with worst-case ratio ST 1. Let the tree T be rooted at the sink node t. Next, we identify sbtrees of T sch that total demand in a sbtree eqals the cable capacity. We then rote the total demand within a sbtree directly to the sink from the node of the sbtree closest to the sink. The sbtrees collected by the algorithm may contain common nodes bt hae disjoint sorce sets. For a formal statement of the algorithm, we need the following denitions. Let the leel of a node be the nmber of tree edges on its path to the root. The parent of a node is the node adjacent to it on the path from to t. For each node, let T denote the sbtree of T rooted at and D(T ) denote the total 1 The MST is a 2-approximate soltion. Better approximation ratios are known, e.g., a 1.55-approximation was gien recently in [RZ00].

4 nprocessed P demand in T. Let R be the set of nprocessed sorce nodes. Then, D(T ) = s i2r\t dem i = jr \ T j. The Algorithm Uniform below otpts a roting for the demand from each sorce to the sink, and the nmber of cables that are installed to spport the roting. Algorithm Uniform: Initialize: R = S Main step: Pick a node sch that D(T ) and leel of is maximm. If = t or D(T t ) <, then go to the nal step. Pick a node, say w in R \ T sch that dist(w; t) is minimm, as a \hb" node. Let C = fwg. Collect sorce nodes in C (Details gien below). Add edge (w; t) to the network and install one copy of the cable on (w; t). Rote demand of each sorce in C to the hb node w ia the niqe paths in T Rote demand of C at the hb directly to the sink on (w; t). Remoe C from R, and set C = ;. If R is not empty, repeat the main step. If R is empty, go to the nal step. Final step: If R 6= ;, then rote all the demand in R to t ia their path in T. For all edges e of T, Cancel the maximal possible amont of ow of eqal ale in opposite directions sch that total ow will not exceed. Install one copy of cable on the edges of T which hae positie ow. Collect sorce nodes: Add to C, if 2 R. Let 1 ; : : : ; k be the children of. If w 6=, then Let p be the child of sch that the hb node w is in T p. Add T p \ R to C. While jcj <, Pick an nprocessed child of, say i. If D(T i ) + jcj, then Add T i \ R to C. Else, (T i is collected partially) Scan T i depth-rst. Add sorces in R \ T i to C ntil jcj =. Retrn C. Lemma 1. The algorithm rotes demand sch that ow on any edge of the tree T is at most the cable capacity. Proof. Consider an edge e of T. Let be the incident node on e with higher leel (see Figre 1). Flow on e is determined by the total ow coming ot of T and

5 t 1 e p k w T Fig. 1. Sbtree T and its children. going into T. Or proof is based on these two claims: Claim 1: Total ow going ot of T is at most 1. Claim 2: Total ow coming into T is at most 1. To proe claims 1 and 2, we consider two cases based on how the sorces in T are assigned to hb nodes by the algorithm. A partially assigned sbtree has at least one of its sorce nodes collected in a set C and has at least one sorce node not in C. t C1 e C T 2 C 1 e T t C 2 a) Partially assigned T b) Completely assigned T Fig. 2. Examples of partially and completely assigned sbtrees. Sppose T is partially assigned (see Figre 2). The rst time ow goes ot of T, a sbtree T with at a smaller leel than is being processed by the algorithm. De to the sbtree selection rle, we can conclde that T has remaining demand strictly less than. Therefore, total otow from T will be at most 1. Hence, Claim 1 holds in this case.

6 The reason Claim 2 holds is as follows. When there exists an inow into T, ow is accmlated at a hb node in T. Since the algorithm accmlates a ow of exactly at any hb node, a ow of at most 1 will go into T. The algorithm rst picks a sbtree and a hb node in it, and collects demand starting with the sbtrees of T. Therefore, the algorithm will not collect sorces ot of T, nless all the sorces in T hae already been collected. This implies that once ow enters T, none of the nodes in T will become a hb node again and hence ow will not enter T again. Now let s assme that T is not partially assigned. Then all the sorces in T are collected in the same set by the algorithm. If these sorces are roted to a hb node ot of the sbtree, then otow is at most 1. If the sorces are roted to a hb node in the sbtree, then inow is at most 1. Inow or otow occrs only once. Ths, Claims 1 and 2 hold in this case, too. For any edge of T, ow in one direction does not exceed, by Claims 1 and 2. When there exists ow in both directions in an edge with total ale greater than, we cancel ow of eqal ale in opposite directions sch that total ow will not exceed. Cancelling ow will lead to reassigning some of the sorce nodes to hbs. See Figre 3 for an example. C 1 : C 2 : t C 1 : C : t f in(e)=7 01 f 01 in(e)=2 01 e e f ot(e)=5 f ot(e)= w w w2 01 w a) On edge e, sm of flow in both b) Sorces are reassigned to hbs after directions exceeds, where =10. flow of ale 5 is cancelled on edge e. Fig. 3. An example of cancelling ow and reassigning sorces to hb nodes. Here w 1 and w 2 are hb nodes chosen in the order of their indices. Theorem 1. There is a (1 + ST )-approximation algorithm for the single-sink capacity installation problem with a single cable type and niform demand. Proof. Consider Algorithm Uniform. Let C OP T be the cost of an optimal soltion and C HEUR be the cost of a soltion otpt by the algorithm. Let C ST denote the cost of the cables installed on the edges of the approximate Steiner tree

7 T. Let C DR be the cost of cables installed on the direct edges added by the algorithm. By Lemma 1, at most one copy of cable is scient to accomodate ow on the edges of the approximate Steiner tree T. The cost of a Steiner tree with terminal set S [ ftg is a lower bond on the optimal cost becase we mst connect the nodes in S to t and install at least one copy of the cable on each connecting edge. Therefore, C ST ST C OP T. For a sorce set C k collected at iteration k, since jc k j =, the algorithm installs one copy of the cable on the shortest direct edge from the sbtree T, dem i P which contains C k, to t. The term s i2s dist(s i ; t) is a lower bond on C OP T, since dem i mst be roted a distance of at least dist(s i ; t) and be charged at least at the rate 1= per nit length. (In the niform demand case, dem i = 1 for all i.) Since sorce sets collected by the algorithm are disjoint, P dem i k P P dist(s i;t) is a lower bond on C OP T, P dist(s i ; t) = k as well. As demand of a set C k is sent ia the sorce in C k that is closest to t (the hb node w k ), we get X Ps dist(w k ; t) = min dist(s i ; t) i2c k dist(s i ; t) dist(s i ; t) = : (1) P 1 Ths, we nally hae C DR = X k dist(w k ; t) X k X dist(s i ; t) C OP T : (2) Therefore, C HEUR = C ST + C DR (1 + ST )C OP T : 3 Non-niform Demand When sorce nodes hae arbitrary demand, dem i for sorce s i, it is no longer possible to collect sorces with total demand exactly eqal to the capacity. If we were allowed to split the (integral) demand for any sorce into single integral nits each of which can be roted in separate paths to the sink, notice that the algorithm of the preios section can be sed by expanding each sorce s i to dem i sorces connected by zero-length edges in the tree. Howeer, in the more general case, all the ow of a sorce mst se the same path to the sink. In this case, we modify Algorithm Uniform so that we send demand directly to the sink when it accmlates to an amont between =2 and. To garantee that we don't exceed while collecting demand, we send all sorces with demand at least =2 directly at the beginning of the algorithm. For a sorce set C, let dem(c) be the total demand of sorces in C. Recall that D(C) is the total remaining (nprocessed) demand of C, as dened for the niform demand case. The modied algorithm, which we call Algorithm Non-niform, is as follows.

8 Algorithm Non-niform: Initialize: R = S. Preprocessing: (send large demands directly) For all sorces s i sch that dem i =2, Rote the demand on (s i ; t). Install d dem i e copies of cable on (s i; t). Remoe s i from R. Main step: Pick a node sch that D(T ) =2 and leel of is maximm. If = t, or D(T t ) < =2, then go to the nal step. Pick a node, say w in R \ T sch that dist(w; t) is minimm, as a \hb" node. Let C = fwg. Collect sorce nodes in C (Details gien below). Add edge (w; t) to the network and install one copy of the cable on (w; t). Rote demand of each sorce in C to the hb node ia the niqe path in T. Rote demand of C at the hb directly to the sink on (w; t). Remoe C from R and set C = ;. If R is not empty, repeat the main step. If R is empty, go to the nal step. Final step: If R 6= ;, then rote all the demand in R to t ia the niqe paths in T. Install one copy of cable on the edges of T which hae positie ow. Collect sorce nodes: Add to C, if 2 R. Let 1 ; : : : ; k be the children of. If w 6=, then Let p be the child of sch that the hb node w is in T p. Add T p \ R to C. While dem(c) < =2, Pick an nprocessed child of, say i. Add T i \ R to C. Retrn C. Lemma 2. The algorithm rotes demand sch that: 1) ow on any edge of the tree T is at most, and 2) ow on a direct edge added by the algorithm is at least =2 and at most. Proof. The proof is simpler compared to the niform-demand case becase the algorithm does not assign any sbtree partially. Consider an edge e of T. Let be incident on e sch that e is not in T. Since all the sorces in T are collected in the same set by the algorithm, demand of these sorces is roted to a hb node either ot of the sbtree, or in the sbtree, bt not both. Ths, ow exists only in one direction. If the demand of sorces is roted to a hb node ot of

9 T, then otow is at most 1. If the demand is roted to a hb node in the sbtree, then inow is at most 1. Ths, for any edge of T, ow does not exceed. De to the sbtree selection rle in the algorithm, if a sbtree T is selected, then all the sbtrees rooted at its children hae remaining demand strictly less than =2. Therefore, the rst time dem(c) exceeds =2, it will be at most so that total ow on the direct edges added by the algorithm is in the range [=2; ]. Theorem 2. There is a (2 + ST )-approximation algorithm for the single-sink edge installation problem with a single cable type and non-niform demand. Proof. We se the same denitions of C OP T, C HEUR, C DR and C ST as in the proof of Theorem 1. By Lemma 2, at most one copy of the cable is scient to accommodate ow on the edges of the approximate Steiner tree T. Therefore, C ST ST C OP T. For a sorce set C k collected at iteration k, the algorithm installs one copy of the cable on the shortest direct edge from the sbtree T, which encloses C k, to t. By Lemma 2, at most one copy of cable is scient to accommodate ow on the direct edges from hb nodes to t and dem(c k ) =2. The term P dem i s i2s dist(s i; t) is a lower bond on C OP T as in the niform demand case. Since sorce sets collected by the algorithm hae disjoint sorces and demand from a set C k is sent ia the sorce in C k that is closest to t (the hb node w k ), C OP T X k X X dem i dist(s i; t) k X dem i ( min dist(s i ; t)): (3) P Since dem i and min 2 X dist(s i ; t) = dist(w k ; t), we hae C OP T X 1 2 dist(w k; t) = 1 2 C DR: (4) k Therefore, C HEUR = C ST + C DR (2 + ST )C OP T : 4 Extensions Or methods apply to the following extension of the local access network design problem: Instead of specifying a single sink node, any node in the graph can be sed as a node that sinks nits of demand at a cost of f. A node is allowed to sink more than nits of demand by paying d dem e f cost to sink dem nits of ow. The problem is to open scient nmber of sinks and rote all the demands to these sinks at minimm cable pls sink opening costs. To model this extension, we extend the metric in two steps: 1) create a new sink node t with edges to eery ertex of cost f, 2) take the metric completion of this agmented network. Notice that the second step may decrease some of the costs on the edges incident on the new sink t (e.g., if f i + dist(j; i) < f j,

10 then the cost of the edge (j; t) can be redced from f j to f i + dist(j; i)), or between any pair of original nodes (e.g., if dist(i; j) > f i + f j, then we may replace the former by the latter). Bearing this in mind, it is not hard to see that any soltion in the new graph to the single cable problem with t as the sink and with the modied costs can be conerted to a soltion to the original problem of the same cost. Ths, or algorithms in the preios sections apply to gie the same performance garantees. References [AG88] K. Altinkemer and B. Gaish, \Heristics with constant error garantees for the design of tree networks," Management Science, 34, (1988) 331{341 [AZ98] M. Andrews and L. Zhang, \The access network design problem," In Proc. of the 39th Ann. IEEE Symp. on Fondations of Compter Science, (1998) 42{49 [CL83] K. M. Chandy and T. Lo, \The capacitated minimm tree," Networks, 3, (1973) 173{182 [KR98] Kawatra, R. and D. L. Bricker, "A mltiperiod planning model for the capacitated minimal spanning tree problem", to appear in Eropean Jornal of Operational Research (1998) [KB83] A. Kershenbam and R. Boorstyn, \Centralized teleprocessing network design," Networks, 13, (1983) 279{293 [KRY 93] S. Khller, B. Raghaachari and N. E. Yong, \Balancing minimm spanning and shortest path trees," Algorithmica, 14, (1993) 305{322 [MP 94] Y. Mansor and D. Peleg, \An approximation algorithm for minimm-cost network design," The Weizman Institte of Science, Rehoot, Israel, Tech. Report CS94-22, 1994; Also presented at the DIMACS workshop on Robst Commnication Networks, [Pap78] C. H. Papadimitrio, \The complexity of the capacitated tree problem," Networks, 8, (1978) 217{230 [RZ00] G. Robins and A. Zelikosky, \Improed steiner tree approximation in graphs", Proc. of the 10th Ann. ACM-SIAM Symp. on Discrete Algorithms, (2000) 770{779 [SCR+97] F.S. Salman, J. Cheriyan, R. Rai and S. Sbramanian, \By-at-blk network design: Approximating the single-sink edge installation problem," Proc. of the 8th Ann. ACM-SIAM Symposim on Discrete Algorithms, (1997) 619{628 [S83] R. L. Sharma, \Design of an economical mltidrop network topology with capacity constraints," IEEE Trans. Comm., 31, (1983) [SS99] B. Sanso and P. Soriano, Editors, \Telecommnications Network Planning," Klwer Academic Pblishers, 1999.

[1] Hopcroft, J., D. Joseph and S. Whitesides, Movement problems for twodimensional

[1] Hopcroft, J., D. Joseph and S. Whitesides, Movement problems for twodimensional Acknoledgement. The athors thank Bill Lenhart for interesting discssions on the recongration of rlers. References [1] Hopcroft, J., D. Joseph and S. Whitesides, Moement problems for todimensional linkages,

More information

On Plane Constrained Bounded-Degree Spanners

On Plane Constrained Bounded-Degree Spanners On Plane Constrained Bonded-Degree Spanners Prosenjit Bose 1, Rolf Fagerberg 2, André an Renssen 1, Sander Verdonschot 1 1 School of Compter Science, Carleton Uniersity, Ottaa, Canada. Email: jit@scs.carleton.ca,

More information

Lemma 1 Let the components of, Suppose. Trees. A tree is a graph which is. (a) Connected and. (b) has no cycles (acyclic). (b)

Lemma 1 Let the components of, Suppose. Trees. A tree is a graph which is. (a) Connected and. (b) has no cycles (acyclic). (b) Trees Lemma Let the components of ppose "! be (a) $&%('*)+ - )+ / A tree is a graph which is (b) 0 %(')+ - 3)+ / 6 (a) (a) Connected and (b) has no cycles (acyclic) (b) roof Eery path 8 in which is not

More information

The Disciplined Flood Protocol in Sensor Networks

The Disciplined Flood Protocol in Sensor Networks The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab

More information

Improving Network Connectivity Using Trusted Nodes and Edges

Improving Network Connectivity Using Trusted Nodes and Edges Improing Network Connectiity Using Trsted Nodes and Edges Waseem Abbas, Aron Laszka, Yegeniy Vorobeychik, and Xenofon Kotsokos Abstract Network connectiity is a primary attribte and a characteristic phenomenon

More information

Constructing Multiple Light Multicast Trees in WDM Optical Networks

Constructing Multiple Light Multicast Trees in WDM Optical Networks Constrcting Mltiple Light Mlticast Trees in WDM Optical Networks Weifa Liang Department of Compter Science Astralian National University Canberra ACT 0200 Astralia wliang@csaneda Abstract Mlticast roting

More information

Multiple Source Shortest Paths in a Genus g Graph

Multiple Source Shortest Paths in a Genus g Graph Mltiple Sorce Shortest Paths in a Gens g Graph Sergio Cabello Erin W. Chambers Abstract We gie an O(g n log n) algorithm to represent the shortest path tree from all the ertices on a single specified face

More information

COMPOSITION OF STABLE SET POLYHEDRA

COMPOSITION OF STABLE SET POLYHEDRA COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining

More information

Chapter 7 TOPOLOGY CONTROL

Chapter 7 TOPOLOGY CONTROL Chapter TOPOLOGY CONTROL Oeriew Topology Control Gabriel Graph et al. XTC Interference SINR & Schedling Complexity Distribted Compting Grop Mobile Compting Winter 00 / 00 Distribted Compting Grop MOBILE

More information

On Plane Constrained Bounded-Degree Spanners

On Plane Constrained Bounded-Degree Spanners Algorithmica manscript No. (ill be inserted by the editor) 1 On Plane Constrained Bonded-Degree Spanners 2 3 Prosenjit Bose Rolf Fagerberg André an Renssen Sander Verdonschot 4 5 Receied: date / Accepted:

More information

Planarity-Preserving Clustering and Embedding for Large Planar Graphs

Planarity-Preserving Clustering and Embedding for Large Planar Graphs Planarity-Presering Clstering and Embedding for Large Planar Graphs Christian A. Dncan, Michael T. Goodrich, and Stephen G. Koboro Center for Geometric Compting The Johns Hopkins Uniersity Baltimore, MD

More information

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

(2, 4) Tree Example (2, 4) Tree: Insertion

(2, 4) Tree Example (2, 4) Tree: Insertion Presentation for se with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 B-Trees and External Memory (2, 4) Trees Each internal node has 2 to 4 children:

More information

Reconstructing Generalized Staircase Polygons with Uniform Step Length

Reconstructing Generalized Staircase Polygons with Uniform Step Length Jornal of Graph Algorithms and Applications http://jgaa.info/ ol. 22, no. 3, pp. 431 459 (2018) DOI: 10.7155/jgaa.00466 Reconstrcting Generalized Staircase Polygons with Uniform Step Length Nodari Sitchinaa

More information

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley,

More information

Chapter 5 Network Layer

Chapter 5 Network Layer Chapter Network Layer Network layer Physical layer: moe bit seqence between two adjacent nodes Data link: reliable transmission between two adjacent nodes Network: gides packets from the sorce to destination,

More information

A Unified Energy-Efficient Topology for Unicast and Broadcast

A Unified Energy-Efficient Topology for Unicast and Broadcast A Unified Energy-Efficient Topology for Unicast and Broadcast Xiang-Yang Li Dept. of Compter Science Illinois Institte of Technology, Chicago, IL, USA xli@cs.iit.ed Wen-Zhan Song School of Eng. & Comp.

More information

circuit simulation NP-complete? backward retiming forward retiming f(x)

circuit simulation NP-complete? backward retiming forward retiming f(x) Optimal FPGA Mapping and Retiming with Ecient Initial State Comptation Jason Cong and Chang W Department of Compter Science Uniersity of California, Los Angeles, CA 995 Abstract For seqential circits with

More information

Vertex Guarding in Weak Visibility Polygons

Vertex Guarding in Weak Visibility Polygons Vertex Garding in Weak Visibility Polygons Pritam Bhattacharya, Sbir Kmar Ghosh*, Bodhayan Roy School of Technology and Compter Science Tata Institte of Fndamental Research Mmbai 400005, India arxi:1409.46212

More information

Minimum Spanning Trees Outline: MST

Minimum Spanning Trees Outline: MST Minimm Spanning Trees Otline: MST Minimm Spanning Tree Generic MST Algorithm Krskal s Algorithm (Edge Based) Prim s Algorithm (Vertex Based) Spanning Tree A spanning tree of G is a sbgraph which is tree

More information

Pushing squares around

Pushing squares around Pshing sqares arond Adrian Dmitresc János Pach Ý Abstract We stdy dynamic self-reconfigration of modlar metamorphic systems. We garantee the feasibility of motion planning in a rectanglar model consisting

More information

Fault Tolerance in Hypercubes

Fault Tolerance in Hypercubes Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different

More information

Localized Delaunay Triangulation with Application in Ad Hoc Wireless Networks

Localized Delaunay Triangulation with Application in Ad Hoc Wireless Networks 1 Localized Delanay Trianglation with Application in Ad Hoc Wireless Networks Xiang-Yang Li Gria Călinesc Peng-Jn Wan Y Wang Department of Compter Science, Illinois Institte of Technology, Chicago, IL

More information

On shortest-path all-optical networks without wavelength conversion requirements

On shortest-path all-optical networks without wavelength conversion requirements Research Collection Working Paper On shortest-path all-optical networks withot waelength conersion reqirements Athor(s): Erlebach, Thomas; Stefanakos, Stamatis Pblication Date: 2002 Permanent Link: https://doi.org/10.3929/ethz-a-004446054

More information

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un Dynamic Maintenance of Majority Information in Constant Time per Update? Gdmnd S. Frandsen and Sven Skym BRICS 1 Department of Compter Science, University of arhs, Ny Mnkegade, DK-8000 arhs C, Denmark

More information

An Extended Fault-Tolerant Link-State Routing Protocol in the Internet

An Extended Fault-Tolerant Link-State Routing Protocol in the Internet An Extended Falt-Tolerant Link-State Roting Protocol in the Internet Jie W, Xiaola Lin, Jiannong Cao z, and Weijia Jia x Department of Compter Science and Engineering Florida Atlantic Uniersit Boca Raton,

More information

Fixed-Parameter Algorithms for Cluster Vertex Deletion

Fixed-Parameter Algorithms for Cluster Vertex Deletion Fixed-Parameter Algorithms for Clster Vertex Deletion Falk Hüffner Christian Komsieicz Hannes Moser Rolf Niedermeier Institt für Informatik, Friedrich-Schiller-Uniersität Jena, Ernst-Abbe-Platz 2, D-07743

More information

Augmenting the edge connectivity of planar straight line graphs to three

Augmenting the edge connectivity of planar straight line graphs to three Agmenting the edge connectivity of planar straight line graphs to three Marwan Al-Jbeh Mashhood Ishaqe Kristóf Rédei Diane L. Sovaine Csaba D. Tóth Pavel Valtr Abstract We characterize the planar straight

More information

Friend of My Friend: Network Formation with Two-Hop Benefit

Friend of My Friend: Network Formation with Two-Hop Benefit Friend of My Friend: Network Formation with Two-Hop Benefit Elliot Ansheleich, Onkar Bhardwaj, and Michael Usher Rensselaer Polytechnic Institte, Troy NY, USA Abstract. How and why people form ties is

More information

Adaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model

Adaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model International Jornal of Knowledge Engineering, Vol. 1, No. 2, September 215 Adaptie Inflence Maximization in Microblog nder the Competitie Independent Cascade Model Zheng Ding, Kai Ni, and Zhiqiang He

More information

Multi-Way Search Tree ( ) (2,4) Trees. Multi-Way Inorder Traversal. Multi-Way Search Tree ( ) Multi-Way Searching. Multi-Way Searching

Multi-Way Search Tree ( ) (2,4) Trees. Multi-Way Inorder Traversal. Multi-Way Search Tree ( ) Multi-Way Searching. Multi-Way Searching Mlti-Way Search Tree ( 0..) (,) Trees 9 5 7 0 (,) Trees (,) Trees Mlti-Way Search Tree ( 0..) A mlti-ay search tree is an ordered tree sch that Each internal node has at least to children and stores d

More information

A sufficient condition for spiral cone beam long object imaging via backprojection

A sufficient condition for spiral cone beam long object imaging via backprojection A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral

More information

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,

More information

Queries. Inf 2B: Ranking Queries on the WWW. Suppose we have an Inverted Index for a set of webpages. Disclaimer. Kyriakos Kalorkoti

Queries. Inf 2B: Ranking Queries on the WWW. Suppose we have an Inverted Index for a set of webpages. Disclaimer. Kyriakos Kalorkoti Qeries Inf B: Ranking Qeries on the WWW Kyriakos Kalorkoti School of Informatics Uniersity of Edinbrgh Sppose e hae an Inerted Index for a set of ebpages. Disclaimer I Not really the scenario of Lectre.

More information

CS 557 Lecture IX. Drexel University Dept. of Computer Science

CS 557 Lecture IX. Drexel University Dept. of Computer Science CS 7 Lectre IX Dreel Uniersity Dept. of Compter Science Fall 00 Shortest Paths Finding the Shortest Paths in a graph arises in many different application: Transportation Problems: Finding the cheapest

More information

Multi-Way Search Tree

Multi-Way Search Tree Presentation for se with the textbook Data Strctres and Algorithms in Jaa, 6 th edition, by M. T. Goodrich, R. Tamassia, and M. H. Goldwasser, Wiley, 204 (2,4) Trees 9 2 5 7 0 4 204 Goodrich, Tamassia,

More information

Digital Image Processing Chapter 5: Image Restoration

Digital Image Processing Chapter 5: Image Restoration Digital Image Processing Chapter 5: Image Restoration Concept of Image Restoration Image restoration is to restore a degraded image back to the original image while image enhancement is to maniplate the

More information

Mobility Control and Its Applications in Mobile Ad Hoc Networks

Mobility Control and Its Applications in Mobile Ad Hoc Networks Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai Department of Compter Science and Engineering Florida Atlantic Uniersity Boca Raton, FL 3331 Abstract Most existing localized

More information

Faster Random Walks By Rewiring Online Social Networks On-The-Fly

Faster Random Walks By Rewiring Online Social Networks On-The-Fly 1 Faster Random Walks By Rewiring Online ocial Networks On-The-Fly Zhojie Zho 1, Nan Zhang 2, Zhigo Gong 3, Gatam Das 4 1,2 Compter cience Department, George Washington Uniersity 1 rexzho@gw.ed 2 nzhang10@gw.ed

More information

Tri-Edge-Connectivity Augmentation for Planar Straight Line Graphs

Tri-Edge-Connectivity Augmentation for Planar Straight Line Graphs Tri-Edge-Connectivity Agmentation for Planar Straight Line Graphs Marwan Al-Jbeh 1, Mashhood Ishaqe 1, Kristóf Rédei 1, Diane L. Sovaine 1, and Csaba D. Tóth 1,2 1 Department of Compter Science, Tfts University,

More information

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS Proceedings th FIG Symposim on Deformation Measrements Santorini Greece 00. ABSOUTE DEFORMATION PROFIE MEASUREMENT IN TUNNES USING REATIVE CONVERGENCE MEASUREMENTS Mahdi Moosai and Saeid Khazaei Mining

More information

Alliances and Bisection Width for Planar Graphs

Alliances and Bisection Width for Planar Graphs Alliances and Bisection Width for Planar Graphs Martin Olsen 1 and Morten Revsbæk 1 AU Herning Aarhs University, Denmark. martino@hih.a.dk MADAGO, Department of Compter Science Aarhs University, Denmark.

More information

Constrained Routing Between Non-Visible Vertices

Constrained Routing Between Non-Visible Vertices Constrained Roting Between Non-Visible Vertices Prosenjit Bose 1, Matias Korman 2, André van Renssen 3,4, and Sander Verdonschot 1 1 School of Compter Science, Carleton University, Ottawa, Canada. jit@scs.carleton.ca,

More information

Rectangle-of-influence triangulations

Rectangle-of-influence triangulations CCCG 2016, Vancoer, British Colmbia, Ag 3 5, 2016 Rectangle-of-inflence trianglations Therese Biedl Anna Lbi Saeed Mehrabi Sander Verdonschot 1 Backgrond The concept of rectangle-of-inflence (RI) draings

More information

Faster Random Walks By Rewiring Online Social Networks On-The-Fly

Faster Random Walks By Rewiring Online Social Networks On-The-Fly Faster Random Walks By Rewiring Online ocial Networks On-The-Fly Zhojie Zho 1, Nan Zhang 2, Zhigo Gong 3, Gatam Das 4 1,2 Compter cience Department, George Washington Uniersity 1 rexzho@gw.ed 2 nzhang10@gw.ed

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information

Topological Drawings of Complete Bipartite Graphs

Topological Drawings of Complete Bipartite Graphs Topological Drawings of Complete Bipartite Graphs Jean Cardinal Stefan Felsner y Febrary 017 Abstract Topological drawings are natral representations of graphs in the plane, where vertices are represented

More information

Mathematical model for storing and effective processing of directed graphs in semistructured data management systems

Mathematical model for storing and effective processing of directed graphs in semistructured data management systems Mathematical model for storing and effectie processing of directed graphs in semistrctred data management MALIKOV A, GULEVSKIY Y, PARKHOMENKO D Information Systems and Technologies Department North Cacass

More information

UPWARD PLANAR DRAWING OF SINGLE SOURCE ACYCLIC DIGRAPHS. MICHAEL D. HUTTON y AND ANNA LUBIW z

UPWARD PLANAR DRAWING OF SINGLE SOURCE ACYCLIC DIGRAPHS. MICHAEL D. HUTTON y AND ANNA LUBIW z UPWARD PLANAR DRAWING OF SINGLE SOURCE ACYCLIC DIGRAPHS MICHAEL D. HUTTON y AND ANNA LUBIW z Abstract. An pward plane drawing of a directed acyclic graph is a plane drawing of the digraph in which each

More information

CS 153 Design of Operating Systems

CS 153 Design of Operating Systems CS 53 Design of Operating Systems Spring 8 Lectre 9: Locality and Cache Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Some slides modified from originals

More information

Resolving Linkage Anomalies in Extracted Software System Models

Resolving Linkage Anomalies in Extracted Software System Models Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program

More information

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods Annals of Operations Research 106, 19 46, 2001 2002 Klwer Academic Pblishers. Manfactred in The Netherlands. Discrete Cost Mlticommodity Network Optimization Problems and Exact Soltion Methods MICHEL MINOUX

More information

Towards applications based on measuring the orbital angular momentum of light

Towards applications based on measuring the orbital angular momentum of light CHAPTER 8 Towards applications based on measring the orbital anglar momentm of light Efficient measrement of the orbital anglar momentm (OAM) of light has been a longstanding problem in both classical

More information

Minimal Edge Addition for Network Controllability

Minimal Edge Addition for Network Controllability This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,

More information

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET Mltiple-Choice Test Chapter 09.0 Golden Section Search Method Optimization COMPLETE SOLUTION SET. Which o the ollowing statements is incorrect regarding the Eqal Interval Search and Golden Section Search

More information

Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks

Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks 1 Efficient Schedling for Periodic Aggregation Qeries in Mltihop Sensor Networks XiaoHa X, Shaojie Tang, Member, IEEE, XiangYang Li, Senior Member, IEEE Abstract In this work, we stdy periodic qery schedling

More information

Triangle-Free Planar Graphs as Segments Intersection Graphs

Triangle-Free Planar Graphs as Segments Intersection Graphs Triangle-ree Planar Graphs as Segments Intersection Graphs N. de Castro 1,.J.Cobos 1, J.C. Dana 1,A.Márqez 1, and M. Noy 2 1 Departamento de Matemática Aplicada I Universidad de Sevilla, Spain {natalia,cobos,dana,almar}@cica.es

More information

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introdction (forarding and roting) Reie of qeeing theor Roting algorithms Link state, Distance Vector Roter design and operation IP: Internet Protocol IP4 (datagram format, addressing, ICMP,

More information

Constraint-Driven Communication Synthesis

Constraint-Driven Communication Synthesis Constraint-Drien Commnication Synthesis Alessandro Pinto Goqiang Wang Lca P. Carloni Abstract Constraint-drien Commnication Synthesis enables the atomatic design of the commnication architectre of a complex

More information

Submodule construction for systems of I/O automata*

Submodule construction for systems of I/O automata* Sbmodle constrction for systems of I/O atomata* J. Drissi 1, G. v. Bochmann 2 1 Dept. d'iro, Université de Montréal, CP. 6128, Scc. Centre-Ville, Montréal, H3C 3J7, Canada, Phone: (514) 343-6161, Fax:

More information

Fast Ray Tetrahedron Intersection using Plücker Coordinates

Fast Ray Tetrahedron Intersection using Plücker Coordinates Fast Ray Tetrahedron Intersection sing Plücker Coordinates Nikos Platis and Theoharis Theoharis Department of Informatics & Telecommnications University of Athens Panepistemiopolis, GR 157 84 Ilissia,

More information

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands

More information

On Bichromatic Triangle Game

On Bichromatic Triangle Game On Bichromatic Triangle Game Gordana Manić Daniel M. Martin Miloš Stojakoić Agst 16, 2012 Abstract We stdy a combinatorial game called Bichromatic Triangle Game, defined as follows. Two players R and B

More information

This chapter is based on the following sources, which are all recommended reading:

This chapter is based on the following sources, which are all recommended reading: Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter

More information

Optimization and Translation of Tableau-Proofs. Abstract: Dierent kinds of logical calculi have dierent advantages and disadvantages.

Optimization and Translation of Tableau-Proofs. Abstract: Dierent kinds of logical calculi have dierent advantages and disadvantages. J. Inform. Process. Cybernet. EIK?? (199?), (formerly: Elektron. Inform.verarb. Kybernet.) Optimization and Translation of Tablea-Proofs into Resoltion By Andreas Wolf, Berlin Abstract: Dierent kinds of

More information

arxiv: v3 [math.co] 7 Sep 2018

arxiv: v3 [math.co] 7 Sep 2018 Cts in matchings of 3-connected cbic graphs Kolja Knaer Petr Valicov arxiv:1712.06143v3 [math.co] 7 Sep 2018 September 10, 2018 Abstract We discss conjectres on Hamiltonicity in cbic graphs (Tait, Barnette,

More information

h-vectors of PS ear-decomposable graphs

h-vectors of PS ear-decomposable graphs h-vectors of PS ear-decomposable graphs Nima Imani 2, Lee Johnson 1, Mckenzie Keeling-Garcia 1, Steven Klee 1 and Casey Pinckney 1 1 Seattle University Department of Mathematics, 901 12th Avene, Seattle,

More information

Partha Sarathi Mandal

Partha Sarathi Mandal MA 5: Data Strctres and Algorithms Lectre http://www.iitg.ernet.in/psm/indexing_ma5/y1/index.html Partha Sarathi Mandal Dept. of Mathematics, IIT Gwahati Idea of Prim s Algorithm Instead of growing the

More information

The Domination and Competition Graphs of a Tournament. University of Colorado at Denver, Denver, CO K. Brooks Reid 3

The Domination and Competition Graphs of a Tournament. University of Colorado at Denver, Denver, CO K. Brooks Reid 3 The omination and Competition Graphs of a Tornament avid C. Fisher, J. Richard Lndgren 1, Sarah K. Merz University of Colorado at enver, enver, CO 817 K. rooks Reid California State University, San Marcos,

More information

POWER-OF-2 BOUNDARIES

POWER-OF-2 BOUNDARIES Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of

More information

Assigning AS Relationships to Satisfy the Gao-Rexford Conditions

Assigning AS Relationships to Satisfy the Gao-Rexford Conditions Assigning AS Relationships to Satisfy the Gao-Rexford Conditions Lca Cittadini, Giseppe Di Battista, Thomas Erlebach, Marizio Patrignani, and Massimo Rimondini Dept. of Compter Science and Atomation, Roma

More information

The single-cycle design from last time

The single-cycle design from last time lticycle path Last time we saw a single-cycle path and control nit for or simple IPS-based instrction set. A mlticycle processor fies some shortcomings in the single-cycle CPU. Faster instrctions are not

More information

A Fast Derandomization Scheme and Its Applications. Yijie Han. University of Kentucky. Lexington, KY 40506

A Fast Derandomization Scheme and Its Applications. Yijie Han. University of Kentucky. Lexington, KY 40506 A Fast Derandomization Scheme and Its Applications Yijie Han Department of Compter Science University of Kentcky Lexington, KY 456 Abstract We present a fast derandomization scheme for the PROFIT/COST

More information

ECE250: Algorithms and Data Structures Single Source Shortest Paths Dijkstra s Algorithm

ECE250: Algorithms and Data Structures Single Source Shortest Paths Dijkstra s Algorithm ECE0: Algorithms and Data Strctres Single Sorce Shortest Paths Dijkstra s Algorithm Ladan Tahildari, PEng, SMIEEE Associate Professor Software Technologies Applied Research (STAR) Grop Dept. of Elect.

More information

Chapter 5. Plane Graphs and the DCEL

Chapter 5. Plane Graphs and the DCEL Chapter 5 Plane Graphs and the DCEL So far we hae been talking abot geometric strctres sch as trianglations of polygons and arrangements of line segments withot paying mch attention to how to represent

More information

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code:

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code: EE8 Winter 25 Homework #2 Soltions De Thrsday, Feb 2, 5 P. ( points) Consider the following fragment of Java code: for (i=; i

More information

Introduction to Algorithms. Minimum Spanning Tree. Chapter 23: Minimum Spanning Trees

Introduction to Algorithms. Minimum Spanning Tree. Chapter 23: Minimum Spanning Trees Introdction to lgorithms oncrete example Imagine: Yo wish to connect all the compters in an office bilding sing the least amont of cable - ach vertex in a graph G represents a compter - ach edge represents

More information

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

Visibility-Graph-based Shortest-Path Geographic Routing in Sensor Networks

Visibility-Graph-based Shortest-Path Geographic Routing in Sensor Networks Athor manscript, pblished in "INFOCOM 2009 (2009)" Visibility-Graph-based Shortest-Path Geographic Roting in Sensor Networks Gang Tan Marin Bertier Anne-Marie Kermarrec INRIA/IRISA, Rennes, France. Email:

More information

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems Congestion-adaptive Data Collection with Accracy Garantee in Cyber-Physical Systems Nematollah Iri, Lei Y, Haiying Shen, Gregori Calfield Department of Electrical and Compter Engineering, Clemson University,

More information

Available online: 25 Oct To link to this article:

Available online: 25 Oct To link to this article: This article was downloaded by: [Whan Uniersity] On: 5 Febrary 202, At: 9:06 Pblisher: Taylor & Francis Informa Ltd Registered in England and Wales Registered Nmber: 072954 Registered office: Mortimer

More information

Picking and Curves Week 6

Picking and Curves Week 6 CS 48/68 INTERACTIVE COMPUTER GRAPHICS Picking and Crves Week 6 David Breen Department of Compter Science Drexel University Based on material from Ed Angel, University of New Mexico Objectives Picking

More information

Representing a Cubic Graph as the Intersection Graph of Axis-parallel Boxes in Three Dimensions

Representing a Cubic Graph as the Intersection Graph of Axis-parallel Boxes in Three Dimensions Representing a Cbic Graph as the Intersection Graph of Axis-parallel Boxes in Three Dimensions ABSTRACT Abhijin Adiga Network Dynamics and Simlation Science Laboratory Virginia Bioinformatics Institte,

More information

Today. B-splines. B-splines. B-splines. Computergrafik. Curves NURBS Surfaces. Bilinear patch Bicubic Bézier patch Advanced surface modeling

Today. B-splines. B-splines. B-splines. Computergrafik. Curves NURBS Surfaces. Bilinear patch Bicubic Bézier patch Advanced surface modeling Comptergrafik Matthias Zwicker Uniersität Bern Herbst 29 Cres Srfaces Parametric srfaces Bicbic Bézier patch Adanced srface modeling Piecewise Bézier cres Each segment spans for control points Each segment

More information

Functions of Combinational Logic

Functions of Combinational Logic CHPTER 6 Fnctions of Combinational Logic CHPTER OUTLINE 6 6 6 6 6 5 6 6 6 7 6 8 6 9 6 6 Half and Fll dders Parallel inary dders Ripple Carry and Look-head Carry dders Comparators Decoders Encoders Code

More information

A Robust Video Watermarking Scheme using DWT and DCT Aditi Agarwal 1, Ruchika Bhadana 2 and Satishkumar Chavan 3

A Robust Video Watermarking Scheme using DWT and DCT Aditi Agarwal 1, Ruchika Bhadana 2 and Satishkumar Chavan 3 A Robst Video Watermarking Scheme sing DWT and DCT Aditi Agarwal 1, Rchika Bhadana and Satishkmar Chaan 3 1, Department of Compter Engineering, 3 Department of Electronics & Telecommnication Engineering,

More information

Cutting Cycles of Rods in Space: Hardness and Approximation

Cutting Cycles of Rods in Space: Hardness and Approximation Ctting Cycles of Rods in Space: Hardness and pproximation oris rono ark de erg Chris Gray Elena mford bstract We stdy the problem of ctting a set of rods (line segments in R 3 ) into fragments, sing a

More information

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment

More information

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read. The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5

More information

Non-convex Representations of Graphs

Non-convex Representations of Graphs Non-conex Representations of Graphs Giseppe Di Battista, Fabrizio Frati, and Marizio Patrignani Dip. di Informatica e Atomazione Roma Tre Uniersity Abstract. We sho that eery plane graph admits a planar

More information

[13] D. Karger, \Using randomized sparsication to approximate minimum cuts" Proc. 5th Annual

[13] D. Karger, \Using randomized sparsication to approximate minimum cuts Proc. 5th Annual [12] F. Harary, \Graph Theory", Addison-Wesley, Reading, MA, 1969. [13] D. Karger, \Using randomized sparsication to approximate minimum cuts" Proc. 5th Annual ACM-SIAM Symposium on Discrete Algorithms,

More information

Real-Time Robot Path Planning via a Distance-Propagating Dynamic System with Obstacle Clearance

Real-Time Robot Path Planning via a Distance-Propagating Dynamic System with Obstacle Clearance POSTPRINT OF: IEEE TRANS. SYST., MAN, CYBERN., B, 383), 28, 884 893. 1 Real-Time Robot Path Planning ia a Distance-Propagating Dynamic System with Obstacle Clearance Allan R. Willms, Simon X. Yang Member,

More information

PART I: Adding Instructions to the Datapath. (2 nd Edition):

PART I: Adding Instructions to the Datapath. (2 nd Edition): EE57 Instrctor: G. Pvvada ===================================================================== Homework #5b De: check on the blackboard =====================================================================

More information

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,

More information

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003 From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information

More information

On the Existence of Subliminal Channel in Instant Messaging Systems

On the Existence of Subliminal Channel in Instant Messaging Systems , pp. 353-362 http://dx.doi.org/10.14257/ijsia.2015.9.3.27 On the Existence of Sbliminal Channel in Instant Messaging Systems Lingyn Xiang 1, Yha Xie 2, Gang Lo 3 and Weizheng Wang 1 1 School of Compter

More information

Subgraph Matching with Set Similarity in a Large Graph Database

Subgraph Matching with Set Similarity in a Large Graph Database 1 Sbgraph Matching with Set Similarity in a Large Graph Database Liang Hong, Lei Zo, Xiang Lian, Philip S. Y Abstract In real-world graphs sch as social networks, Semantic Web and biological networks,

More information

Master for Co-Simulation Using FMI

Master for Co-Simulation Using FMI Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany

More information

CS 251, Winter 2019, Assignment % of course mark

CS 251, Winter 2019, Assignment % of course mark CS 25, Winter 29, Assignment.. 3% of corse mark De Wednesday, arch 3th, 5:3P Lates accepted ntil Thrsday arch th, pm with a 5% penalty. (7 points) In the diagram below, the mlticycle compter from the corse

More information