HEAPS: A Concept in Optimization

Size: px
Start display at page:

Download "HEAPS: A Concept in Optimization"

Transcription

1 J. Inst. Maths Applies (1974) 13, HEAPS: A Concept in Optimization P. J. BURVILLE University of Sussex f [Received 21 June 1973 and in revised form 19 August 1973] Information storage and retrieval systems have considerable importance in the world of telecommunications and computers. This paper describes a simple system which can be used to optimize such processes and offers guidance on its quantitative analysis. 1. Introduction THIS PAPER provides a basis on which some aspects of a well tried optimization technique can be quantified. The term HEAPS, which identifies one member of a family of information storage and retrieval configurations, is used as it has appropriate graphic connotations. It is also amenable to the acronym treatment e.g. Heuristically Evaluated Access Probability System. General In its most simple form the HEAPS concept, which has wide potential application, has (a) a primary source set of all the items of information to which many references are to be made; (b) a secondary sub-set of these items held in a heap; the heap is generally organized so that the last used item is placed on the top of the heap, and if the capacity of the heap is exceeded the item at the bottom of the heap is returned to the primary source (or destroyed if a copy was taken); (c) when an item is required a search is first made serially through the heap (starting at the top); only if the item is not in the heap is it necessary to obtain it from the primary source. A single item transfer process is assumed. The simple philosophy underlying the structure of the configuration is that the heap will tend to be made up of the items with the highest probability of being required. There are many situations where this philosophy would not be appropriate. Such a one is where once an item is called its probability of being called again within an interval of item demands is greatly reduced (perhaps to zero). Similarly one may be able to exploit the heap more efficiently in some situations by anticipating the items for which there will be a demand. Expressions for some of the heap parameters are given in the Appendix. For the calculations quoted in this paper no attempt has been made to correct for rounding errors. t Now at The London Graduate School of Business Studies

2 264 P. J. BURVILLE 2. Examples of Application The HEAPS optimization technique has the potential of wide and diverse deployment in many spheres of activity such as those of telecommunications and computers. It has been successfully deployed in a computer system where frequent access was required to a large file of item and equipment codes which could only be accommodated in a slow access-time store resulting in processing delay had there not been such a data access optimization technique available. In the context of computer usage of HEAPS due regard must be given in evaluating the expected accessing and processing time to any autonomous operation of the computer. Thus, if the accessing and processing time for the core-store is being evaluated it may be appropriate to regard retrieval from a backing store as having zero elapse time if such activity is autonomous and multi-programming is in operation. As the control system structure of the telephone network becomes more flexible, as it is with the introduction of electronic exchanges and eventually Stored Programme Control exchanges, information retrieval will be a task of significant size where optimization techniques may be used. An example of such a possible task is the translation process from the telephone number dialled by the customer to the actual routing data required to direct the call to the required destination. Wherever a call is made from in the United Kingdom the same Subscriber Trunk Dialling number is used where there are automatic facilities and the call is not a local one. Obviously the physical routing of the call through telephone exchanges and transmission links can be very different from one exchange to another and the probability of any given translation being required will vary with location and time. HEAPS is designed to accommodate such variations Terms and Definitions Let t n be the access time to (and including) cell n of the heap (e.g. t a is the time required to access cell H of the heap). tf be the access time to a given item or location in the primary source. T t be the (to be evaluated random) access time to item / wherever it is located. T a (k) be the calculation time of the algorithm (for the input parameter k). T p access time to the primary store (this does not include any time required to gain access to a particular item in the store). T s be the total travel time from one end of a store to the other. H be the number of cells in the heap (each item requires one cell). N be the number of (unique) items of information in the HEAPS. pr{e) be the probability of the event E; where the event is represented by a single character, e.g. B, p(b) may be used. Pi = pr {at any realization of the system item i is required}. Note that ^ipi = hpi> 0, for i = 1, 2,..., N. p(i, n) = pr {item / is resident in cell n of the heap}. Note that,/>(*,«) = 1, for n = 1,2,...,H /, n) = 1, for / = 1,2 N, and H = N.

3 HEAPS 265 E{X) be the expectation of the random variable Z(Kingman & Taylor, 1966). ~ u and v depend on a parameter which tends to a limit; then "u ~ v" if u/v approaches 1 as the parameter tends to the limit. Unless stated otherwise natural logarithms (to base e) will be used Evaluation of Examples In dimensioning the HEAPS and its performance there are two variables of primary interest (a) the expected processing time, which is normally in terms of the expected item access time; (b) the storage capacity required which can be desk accommodation, computer core store etc. For the three examples only the timing aspect of the dimensioning will be considered. For random item requirement probability distributions the completely random case (Pi = l/n, for all i) offers the least prospect of benefit arising from the use of HEAPS, hence evaluations of the completely random case are given as examples. Algorithm Example. The expected access time (T t ) to item i is given by: T t = i ^O,n)+(f fl +r fl (i))ri-s p(i,n)\. n=l L»=1 J If the algorithm is to determine the factorial of the number /(/!), the time for the evaluation T a (i) will not be constant with i and this may well influence the heap strategy; e.g. there may be an integer k such that ifi<k then the heap is not deployed and the algorithm is used. In this situation the access time is given by n=l _ n=l i = k, fc+1 N. The expected access time (for the situation where all the items are liable to be in the heap) is given by 1} = I pit {PV> n)(t n -t H -T a (i))}]+t B + E p t TJS). 1=1 Ln=l J «=1 Assuming that the demand for items is completely random and letting T it = 2" + 2N' then /»(/, n) = p, l/n (see the Appendix, part (f)), for i = 1,2,..., N, and n = 1, 2,..., #, and lfh(l-h) Hr(3N+l)- r(3n+l) E{Tl] " NI^ ' 4NJ +H ' +

4 266 P. J. BURVILLE Serial Primary Source. The primary source is a serially structured store (such as a normal magnetic tape) in which the items of information are stored with the location of each item known. If the item retrieval device stays at the last required item and moves linearly directly to the next required item, then for a completely random requirement probability the average travel time to the required item is TJ3 (where T s is the time to traverse the whole store end to end). The expected access time to item I is given by = t tj(i,n)ht B +T p +TJ3) J3)\l- n=l Then the expected access time for the completely random item requirement probability case, with t tt = nt, and letting T = T p +TJ3, is given by L n=l +Ht+T. Composite Heap and Primary Source. The primary source is serially structured such that (a) it is effectively an extension of the heap and hence has N H cells; (b) the reordering philosophy of the heap is extended so that an item being discarded from the bottom cell of the heap is accommodated in the top cell of the primary source, with the appropriate adjustments to the other cells to facilitate the change. The expected access time to item / is given by With / = t f, for n > H Ti= t np (i,n)+ n=l n=l The expected access time is given by Let t n = nt, then But /=ff+l E{T,} = * E Pi np(i, n). i=l n=l t,p(i,f). E "I**.») =!+ -X-. n = l (see the Appendix, part (d)). Hence j*ipi + Pj * = 1, 2 AT,

5 Letp t = (l-0)0'"-\ 0 < 0 < 1, N = oo, then HEAPS 267 fc. 4 Let 0 = e~", a > 0. Then which becomes Since e* -* 1, as a -> 0, as 0 -> 1. Thus thus log 2 " 0 * *** ^ 1 i aft a e-* x dx 0" Iog2 Iog2 -log0 1-0 ' From the Appendix, part (e), it will be seen that for this example E{T,} = tfi, Suppose that for a given 0 an approximation for E{T t } is required, which has an accuracy of say d, that is the approximation E{T t } must lie in the interval E{Tf}+d. Now, Let GO Qk oo nk y J. y (_n»-i_l_ i^i+0* jt 1 ;! 1-0** and l tr k=1 S n = E (-I)*' 1 ",, forn = l,2,...

6 {"YlilllYITI K*t\J total TABLE 1 Exact evaluation ofthepq, n), with the approximation shown in parenthesis (H = N = 10). System A (0-1) (0-1) Oil ( ) (010738) (010579) (010394) ( ) (009894) (009523) (008968) (007857) (009123) (009262) (009421) (009606) (009828) ( ) (010477) ( ) (012143) (010438) (010369) (010290) (010197) ( ) (009947) (009762) (009484) (008928) (009562) (009631) (009711) ( ) (009914) (010053) ( ) (010516) ( ) (010088) ( ) (010058) (010039) (010027) (009989) (009952) (009897) (009786) (009912) (009926) (009942) (009961) (009983) (010011) ( ) (010103) (010214) ( ) (010040) (010029) (010020) (010009) (009995) (009976) (009948) (009893) ( (009963) (009971) (009980) (009991) ( ) ( ) (010052) (010107) Row total

7 HEAPS 269 Then it will be seen that since the (finite) u k decrease and tend to zero as n approaches infinity, the series converges and the sum S will lie between S tt and S a+u for n = 1,2,... Thus the series can be summed to a given accuracy, say ± d/t, by summing the terms until 5 n -5 n+1 < d/t. Let * = S n +S tt+1 then 5 will lie in the interval S±d/2t. Let E{T,} = t(l+2s), * then E{T,} will lie in the interval E{T t }±d, as required. I o 12 on 009 -/=3 -/ Cell n of heap FIG. 1. A plot of the figures from Table 1 for items 3, 4, 5, 6, 7, and 8 for the exact evaluation. System A.

8 n\' Column total 1 TABLE 2 Exact evaluation ofthep{i, n), with the approximation shown in parenthesis (H = N= 10). System B ( ) (018765) (014383) ( ) (017377) (013688) ( ) ( ) ( ) (019844) (013937) (011969) (014288) (011715) (010858) (007343) (008937) (009469) ( ) (005234) (007617) ( )( ) (004839) (-O-43583X-O-11433X-O-O0716) (0-1) (o-d (008247) (008525) (008842) (009213) (009657) (010213) (010953) (012064) ( ) (005617) (006312) (007105) (008031) (009142) (010531) ( ) (015161) ( ) (004653) (005500) (006469) (007598) (008954) (010648) (012908) (016296) ( ) (002988) (004099) (005369) (006850) (008628) (010850) (013813) (018258) ( ) (002111) (003361) (004790) (006456) (008456) (010956) (014290) (019290) ( ) (001322) (002697) (004269) (006102) (008302) (011052) (014719) ( ) ( ) Row total

9 HEAPS Heap Probabilities Implicit in most evaluations of a HEAPS configuration is a quantification of the probabihty that item i is in cell n of the heap [p(i, n)] for all the items and cells. In the Appendix exact and approximate methods of determining these probabilities are obtained. As an indication of the form of the results which can be expected the probabilities are determined for two ten item systems with System A the probability of item requirement independent and approximately equal (see Table 1 and Fig. 1). System B the probability of item requirement independent and disparate (see Table 2 and Fig. 2). The probability that item i is required (p t ) is given by p(i, 1) in Tables 1 and r O I 0 5 S O Cell nof heap FIG. 2. A plot of the figures from Table 2 for items 1, 2, 3, 4, 6, 8, and 10 for the exact evaluation. System B.

10 272 P. J. BURVILLE For both evaluations the exact and approximate probabilities are given in the tables. In the figures only exact evaluations are used, and these for only some items, in the interests of clarity. The results in these tables andfiguresillustrate that (a) the approximation for p(i,ri)is quite accurate for System A (Table 1) in which the item requirement probabilities are near to the completely random value (l/n). For System B (Table 2), where the item requirement probabilities are disparate the approximation can be very inaccurate (see items 1, 2 and 3 where negative probabilities are offered!); (b) the approximation for p(i,ri)is a function of the probability p t only and takes no account of the distribution of item requirement probabilities (compare the accuracy of item 1 in Table 1 with item 4 in Table 2); (c) the monotonic character of p(i, ri) in Fig. 1 (the approximation for p(i, ri) is a monotonic function); (d) the p(i,ri) in Fig. 1 are nearly equal (to I IN) in cells 6 and 7 of the heap as is expected from the approximation determined in part (b) of the Appendix. For the disparate probabilities plotted on Fig. 2 no such tendency is detectable. The expected position of the items in the heap for the two systems are given in Table 3. TABLE 3 Expected position of the items in the heap System A Item System B The expected position of the general item in the heap is for System A and for System B. It is left as an exercise for the interested reader to compare these values with the boundary values obtained in the Appendix. The evaluation of the expected item access time for the Serial Primary Source example given above is recorded in Table 4 for the item systems A and B. This evaluation is obtained from = Pi\t i=l Ln=l

11 HEAPS 273 with t n = nt. Plots of the expected access times for systems A and B for various values of T (with t set to unity) with the full range of heap sizes are given in Figs 3 and 4 respectively. lot r=io I s o 7 o c a 5 8 4'f 0 I Number of cells In the heap (H) FIG. 3. The expected item access time for System A. The results in Table 4, and Figs 3 and 4 illustrate (a) the greater potential advantage to be obtained from the deployment of a heap with system B than with system A; (b) that for the completely random case if Nt < T, then the expected access time is a monotonically decreasing function with increasing heap size; (c) that if advantage is gained from the use of a heap, then greater advantage can be realized using a heap up to size N.

12 274 P. J. BURVILLE Number of cells In the heap IH) FIG. 4. The expected item access time for System B TABLE 4 Serial Primary Source, expected item access time evaluation System A 10/ l-899/ r 2-699/ r 3-399f r 3-998/+0-499ir 4-497f T 4-896f T 5-195H T 5-394f r 5-494/+00r Heap size (cells) System B l-0f T l-794/ r 2-405f r 2-856r r 3-173/ T 3-380/ r 3-503/+00615r 3-565f T 3-587/ r 3-590/+00r

13 HEAPS Conclusion In this article some simple HEAPS examples have been evaluated and some results of a general nature derived which may at least offer a guide in assessing many further configurations constructed to meet particular needs. A configuration of particular interest is that with a dynamic heap size. The decision function determining the heap size could produce benefit, in terms of item access time and storage capacity, both in the initial setting-up phase from an empty heap and in the longer term steady state. Such a dynamic configuration is (potentially) more accommodating where the storage capacity available varies, and to the situation frequently met where the item access probabilities, at least in the short term, are very variable perhaps with a large percentage of the items having zero access probability. W. J. Hendricks (1972) obtains the stationary probability distribution for a Markov chain based on a model having similarities to HEAPS. In his article Hendricks poses certain problems whose solutions are offered in this article and in a paper by Professor J. F. C. Kingman and the author (1973). The author wishes to thank Professor J. F. C. Kingman for his help and encouragement. The author also wishes to acknowledge the British Post Office with whose sponsorship he was able to attend the University of Sussex. REFERENCES BURVILLE, P. J. & KINGMAN, J. F. C /. appl. Prob. 10, Cox, D. R. & MILLER, H. D The theory of stochastic processes. London: Methuen. HENDRICKS, W. J /. appl. Prob. 9, KINGMAN, J. F. C. & TAYLOR, S. J Introduction to measure and probability. Cambridge University Press. Appendix The properties of the system determined in this paper are based on the existence of the limiting occupation probability that item i is in cell n of the heap [p(i,«)]. This probability exists for an irreducible ergodic Markov chain (Cox & Miller, 1968), which requires that the following conditions exist (i) the chain is irreducible that is all states intercommunicate; this is so since all permutations of item orders in the heap can be transformed into any other by the normal action of the system; and (ii) the chain is aperiodic. Both the above conditions are met and hence there are a unique set of limiting occupation probabilities. It is readily seen that the sequence of states of the heap is a Markov chain with N(N 1)(...)(N H+1), possible states, each state transforming in one realization of the system into one of N states (including no change). For the results given in the Appendix where no derivation is given the reader is referred to the Kingman & Burville paper. (a) Probability that item i is in cell n of the heap [p{i,«)] t P(i,n) = pt (-)'( N 7 + / ) (p,+p h + +p Jm _ m J = 0 \ * / t where the pj, are distinct; j x # /; N is the number of items.

14 276 P. J. BURVILLE Note that the summation is being carried out over the set of distinct items i,j\,j 2,..,,j N - n+l, in which change of item order does not alter the set. It will be seen that in all cases p{i, 1) = p h i= 1,2,..., N. The general result for p(i,ri)is not very amenable to rapid evaluation since N can be very large (even infinitely so) and it would be of interest to have the result in a form in which N does not appear explicitly. The approximation given below is easier to evaluate and by its structure can be readily built into an iterative procedure. Let then to the first order in S t, Note that Pi = jj+s t, N "~ 1 1 I N r n " 1 (b) Cell location for equal p(i, n),for all the items Consider the approximation then the condition for/>0', n) = l/n, is that either S t, or its coefficient, is equal to zero. The latter situation arises when n-l 1 V 1 Now or n-2 1 n-l I t>n-l Letting n = N(l e ), and taking limits iv -* oo, for the bounds N and Thus as the number of items in the system approaches infinity the probability of any item occupying cell A^l-e" 1 ) tends to be equal (to l/n). This characteristic is

15 HEAPS 277 illustrated in Fig. 1 where the monotonic character of the p(i, n) is also shown for the situation where the <5 f are not large. [N(\-e~ l ) = 6-32, in Fig. 1]. (c) The probability that item i is in the first m cells of the heap An approximation for this is obtained below using the approximation for p(i, n) given in part (a) of this Appendix.,., m S,mN 8 ( N " "- 1 1 and n=l " ^ l J Y - i n=lk=o m n 1 -i m 1,*»^ f'^-m, "Z^j-m C m ~ 2 x-m, Thus the lower bound for the approximation is ^+^ZTL 1 " (JV " m)l and the upper bound for the approximation is The smaller 5, is the more accurate in this approximation, (d) Mean position of item i in the heap \ji t ] Let Now and This gives an upper limit for n,. = 2-p,.

16 278 P. J. BURVILLE Thus p ' ^ **' "" Pi' It will be noted that the upper bound is only of interest if/?,- ^ l/n. (e) Expected position of the general item in the heap [ {/ij] Let \i = Efai}, then 1 AJ = 2 J i=l j = Let /7j ^ /> 2 ^ > p N. Then ^; > ^, and It will be seen that in addition to the completely random case n is equal to the lower bound when the items are allocated to the heap cells in an order based on the ordering of the respective p t (that is the item with the fcth highest probability is allocated to cell k of the heap). Thus the maximum expected position (or travel down the heap to the required item) is only twice the least possible which to be realized requires the ordering mechanism described. (f) Results for the equal probability completely random case For this case 7^ = 1/Af, i = 1, 2,..., N, and the item requirement probabilities are independent. As one might expect p(i, ri) = p h In the almost all equal case with PJPJ i = 1,2,..., N n=l,2,...,h. Pi = PI Pi = P3 = ' " " = PN = JV-1 ' n, (JV-i)(N-2X...)(N->... / P(1 ' H) = (N-2+pXJV-3+2pX..)(N-«+(n-r- P(1 ~ P) Thus, as iv -> CXD p(l,n)->xl- J P) B " 1, which is a geometric distribution. (ii) ft JV n=l (iii) H As for /ij, JV+1

CSE 548: Analysis of Algorithms. Lecture 13 ( Approximation Algorithms )

CSE 548: Analysis of Algorithms. Lecture 13 ( Approximation Algorithms ) CSE 548: Analysis of Algorithms Lecture 13 ( Approximation Algorithms ) Rezaul A. Chowdhury Department of Computer Science SUNY Stony Brook Fall 2017 Approximation Ratio Consider an optimization problem

More information

Analytic Performance Models for Bounded Queueing Systems

Analytic Performance Models for Bounded Queueing Systems Analytic Performance Models for Bounded Queueing Systems Praveen Krishnamurthy Roger D. Chamberlain Praveen Krishnamurthy and Roger D. Chamberlain, Analytic Performance Models for Bounded Queueing Systems,

More information

Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES

Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES DESIGN AND ANALYSIS OF ALGORITHMS Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES http://milanvachhani.blogspot.in USE OF LOOPS As we break down algorithm into sub-algorithms, sooner or later we shall

More information

Lecture 4: Principles of Parallel Algorithm Design (part 4)

Lecture 4: Principles of Parallel Algorithm Design (part 4) Lecture 4: Principles of Parallel Algorithm Design (part 4) 1 Mapping Technique for Load Balancing Minimize execution time Reduce overheads of execution Sources of overheads: Inter-process interaction

More information

THE NUMBER OF LINEARLY INDUCIBLE ORDERINGS OF POINTS IN d-space* THOMAS M. COVERt

THE NUMBER OF LINEARLY INDUCIBLE ORDERINGS OF POINTS IN d-space* THOMAS M. COVERt SIAM J. APPL. MATH. Vol. 15, No. 2, March, 1967 Pn'nted in U.S.A. THE NUMBER OF LINEARLY INDUCIBLE ORDERINGS OF POINTS IN d-space* THOMAS M. COVERt 1. Introduction and summary. Consider a collection of

More information

OPERATIONS RESEARCH. Transportation and Assignment Problems

OPERATIONS RESEARCH. Transportation and Assignment Problems OPERATIONS RESEARCH Chapter 2 Transportation and Assignment Problems Prof Bibhas C Giri Professor of Mathematics Jadavpur University West Bengal, India E-mail : bcgirijumath@gmailcom MODULE-3: Assignment

More information

Link Analysis and Web Search

Link Analysis and Web Search Link Analysis and Web Search Moreno Marzolla Dip. di Informatica Scienza e Ingegneria (DISI) Università di Bologna http://www.moreno.marzolla.name/ based on material by prof. Bing Liu http://www.cs.uic.edu/~liub/webminingbook.html

More information

4. Simplicial Complexes and Simplicial Homology

4. Simplicial Complexes and Simplicial Homology MATH41071/MATH61071 Algebraic topology Autumn Semester 2017 2018 4. Simplicial Complexes and Simplicial Homology Geometric simplicial complexes 4.1 Definition. A finite subset { v 0, v 1,..., v r } R n

More information

STATE UNIVERSITY OF NEW YORK AT STONY BROOK. CEASTECHNICAL REPe. Multiclass Information Based Deflection Strategies for the Manhattan Street Network

STATE UNIVERSITY OF NEW YORK AT STONY BROOK. CEASTECHNICAL REPe. Multiclass Information Based Deflection Strategies for the Manhattan Street Network ; STATE UNIVERSITY OF NEW YORK AT STONY BROOK CEASTECHNICAL REPe Multiclass Information Based Deflection Strategies for the Manhattan Street Network J.-W. Jeng and T.G. Robertazzi June 19, 1992 Multiclass

More information

CS6200 Information Retreival. The WebGraph. July 13, 2015

CS6200 Information Retreival. The WebGraph. July 13, 2015 CS6200 Information Retreival The WebGraph The WebGraph July 13, 2015 1 Web Graph: pages and links The WebGraph describes the directed links between pages of the World Wide Web. A directed edge connects

More information

Chapter 1. Math review. 1.1 Some sets

Chapter 1. Math review. 1.1 Some sets Chapter 1 Math review This book assumes that you understood precalculus when you took it. So you used to know how to do things like factoring polynomials, solving high school geometry problems, using trigonometric

More information

H. W. Kuhn. Bryn Mawr College

H. W. Kuhn. Bryn Mawr College VARIANTS OF THE HUNGARIAN METHOD FOR ASSIGNMENT PROBLEMS' H. W. Kuhn Bryn Mawr College The author presents a geometrical modelwhich illuminates variants of the Hungarian method for the solution of the

More information

Introduction: Two motivating examples for the analytical approach

Introduction: Two motivating examples for the analytical approach Introduction: Two motivating examples for the analytical approach Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath Outline

More information

A TESSELLATION FOR ALGEBRAIC SURFACES IN CP 3

A TESSELLATION FOR ALGEBRAIC SURFACES IN CP 3 A TESSELLATION FOR ALGEBRAIC SURFACES IN CP 3 ANDREW J. HANSON AND JI-PING SHA In this paper we present a systematic and explicit algorithm for tessellating the algebraic surfaces (real 4-manifolds) F

More information

DESIGN AND ANALYSIS OF ALGORITHMS. Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES

DESIGN AND ANALYSIS OF ALGORITHMS. Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES DESIGN AND ANALYSIS OF ALGORITHMS Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES http://milanvachhani.blogspot.in USE OF LOOPS As we break down algorithm into sub-algorithms, sooner or later we shall

More information

6th Bay Area Mathematical Olympiad

6th Bay Area Mathematical Olympiad 6th Bay Area Mathematical Olympiad February 4, 004 Problems and Solutions 1 A tiling of the plane with polygons consists of placing the polygons in the plane so that interiors of polygons do not overlap,

More information

Discrete Cubic Interpolatory Splines

Discrete Cubic Interpolatory Splines Publ RIMS, Kyoto Univ. 28 (1992), 825-832 Discrete Cubic Interpolatory Splines By Manjulata SHRIVASTAVA* Abstract In the present paper, existence, uniqueness and convergence properties of a discrete cubic

More information

DOWNLOAD PDF BIG IDEAS MATH VERTICAL SHRINK OF A PARABOLA

DOWNLOAD PDF BIG IDEAS MATH VERTICAL SHRINK OF A PARABOLA Chapter 1 : BioMath: Transformation of Graphs Use the results in part (a) to identify the vertex of the parabola. c. Find a vertical line on your graph paper so that when you fold the paper, the left portion

More information

Arithmetic in a Finite Field

Arithmetic in a Finite Field MATHEMATICS OF COMPUTATION, VOLUME 35, NUMBER 152 OCTOBER 198, PAGES 1353-1359 Arithmetic in a Finite Field By Michael Willett * Abstract. An algorithm for realizing finite field arithmetic is presented.

More information

Math 443/543 Graph Theory Notes 10: Small world phenomenon and decentralized search

Math 443/543 Graph Theory Notes 10: Small world phenomenon and decentralized search Math 443/543 Graph Theory Notes 0: Small world phenomenon and decentralized search David Glickenstein November 0, 008 Small world phenomenon The small world phenomenon is the principle that all people

More information

Cut-o theorems for deadlocks and serializability

Cut-o theorems for deadlocks and serializability Cut-o theorems for deadlocks and serializability Lisbeth Fajstrup Department of Mathematics alborg University CT in Bremen, 2013 Lisbeth Fajstrup (U) Cut-o theorems for deadlocks and serializability July

More information

Notes for Lecture 24

Notes for Lecture 24 U.C. Berkeley CS170: Intro to CS Theory Handout N24 Professor Luca Trevisan December 4, 2001 Notes for Lecture 24 1 Some NP-complete Numerical Problems 1.1 Subset Sum The Subset Sum problem is defined

More information

Generalized Network Flow Programming

Generalized Network Flow Programming Appendix C Page Generalized Network Flow Programming This chapter adapts the bounded variable primal simplex method to the generalized minimum cost flow problem. Generalized networks are far more useful

More information

The Dynamic Hungarian Algorithm for the Assignment Problem with Changing Costs

The Dynamic Hungarian Algorithm for the Assignment Problem with Changing Costs The Dynamic Hungarian Algorithm for the Assignment Problem with Changing Costs G. Ayorkor Mills-Tettey Anthony Stentz M. Bernardine Dias CMU-RI-TR-07-7 July 007 Robotics Institute Carnegie Mellon University

More information

STANLEY S SIMPLICIAL POSET CONJECTURE, AFTER M. MASUDA

STANLEY S SIMPLICIAL POSET CONJECTURE, AFTER M. MASUDA Communications in Algebra, 34: 1049 1053, 2006 Copyright Taylor & Francis Group, LLC ISSN: 0092-7872 print/1532-4125 online DOI: 10.1080/00927870500442005 STANLEY S SIMPLICIAL POSET CONJECTURE, AFTER M.

More information

Part II. Graph Theory. Year

Part II. Graph Theory. Year Part II Year 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2017 53 Paper 3, Section II 15H Define the Ramsey numbers R(s, t) for integers s, t 2. Show that R(s, t) exists for all s,

More information

On the Average Activity of a Spanning Tree of a Rooted Map

On the Average Activity of a Spanning Tree of a Rooted Map JOURNAL OF COMBINATORIAL THEORY 3, 103-121 (1967) On the Average Activity of a Spanning Tree of a Rooted Map R. C. MULLIN Department of Mathematics, University of Waterloo, Waterloo, Ontario, Canada Communicated

More information

Figure 1: An example of a hypercube 1: Given that the source and destination addresses are n-bit vectors, consider the following simple choice of rout

Figure 1: An example of a hypercube 1: Given that the source and destination addresses are n-bit vectors, consider the following simple choice of rout Tail Inequalities Wafi AlBalawi and Ashraf Osman Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV fwafi,osman@csee.wvu.edug 1 Routing in a Parallel Computer

More information

An Adaptive Eigenshape Model

An Adaptive Eigenshape Model An Adaptive Eigenshape Model Adam Baumberg and David Hogg School of Computer Studies University of Leeds, Leeds LS2 9JT, U.K. amb@scs.leeds.ac.uk Abstract There has been a great deal of recent interest

More information

Algorithms and Data Structures

Algorithms and Data Structures Lesson 4: Sets, Dictionaries and Hash Tables Luciano Bononi http://www.cs.unibo.it/~bononi/ (slide credits: these slides are a revised version of slides created by Dr. Gabriele D Angelo)

More information

Filling Space with Random Line Segments

Filling Space with Random Line Segments Filling Space with Random Line Segments John Shier Abstract. The use of a nonintersecting random search algorithm with objects having zero width ("measure zero") is explored. The line length in the units

More information

Box-Cox Transformation for Simple Linear Regression

Box-Cox Transformation for Simple Linear Regression Chapter 192 Box-Cox Transformation for Simple Linear Regression Introduction This procedure finds the appropriate Box-Cox power transformation (1964) for a dataset containing a pair of variables that are

More information

Limits and Derivatives (Review of Math 249 or 251)

Limits and Derivatives (Review of Math 249 or 251) Chapter 3 Limits and Derivatives (Review of Math 249 or 251) 3.1 Overview This is the first of two chapters reviewing material from calculus; its and derivatives are discussed in this chapter, and integrals

More information

Lecture: Simulation. of Manufacturing Systems. Sivakumar AI. Simulation. SMA6304 M2 ---Factory Planning and scheduling. Simulation - A Predictive Tool

Lecture: Simulation. of Manufacturing Systems. Sivakumar AI. Simulation. SMA6304 M2 ---Factory Planning and scheduling. Simulation - A Predictive Tool SMA6304 M2 ---Factory Planning and scheduling Lecture Discrete Event of Manufacturing Systems Simulation Sivakumar AI Lecture: 12 copyright 2002 Sivakumar 1 Simulation Simulation - A Predictive Tool Next

More information

AN ALGORITHM WHICH GENERATES THE HAMILTONIAN CIRCUITS OF A CUBIC PLANAR MAP

AN ALGORITHM WHICH GENERATES THE HAMILTONIAN CIRCUITS OF A CUBIC PLANAR MAP AN ALGORITHM WHICH GENERATES THE HAMILTONIAN CIRCUITS OF A CUBIC PLANAR MAP W. L. PRICE ABSTRACT The paper describes an algorithm which generates those Hamiltonian circuits of a given cubic planar map

More information

Probabilistic Modeling of Leach Protocol and Computing Sensor Energy Consumption Rate in Sensor Networks

Probabilistic Modeling of Leach Protocol and Computing Sensor Energy Consumption Rate in Sensor Networks Probabilistic Modeling of Leach Protocol and Computing Sensor Energy Consumption Rate in Sensor Networks Dezhen Song CS Department, Texas A&M University Technical Report: TR 2005-2-2 Email: dzsong@cs.tamu.edu

More information

LECTURE NOTES OF ALGORITHMS: DESIGN TECHNIQUES AND ANALYSIS

LECTURE NOTES OF ALGORITHMS: DESIGN TECHNIQUES AND ANALYSIS Department of Computer Science University of Babylon LECTURE NOTES OF ALGORITHMS: DESIGN TECHNIQUES AND ANALYSIS By Faculty of Science for Women( SCIW), University of Babylon, Iraq Samaher@uobabylon.edu.iq

More information

Fault Tolerant Domain Decomposition for Parabolic Problems

Fault Tolerant Domain Decomposition for Parabolic Problems Fault Tolerant Domain Decomposition for Parabolic Problems Marc Garbey and Hatem Ltaief Department of Computer Science, University of Houston, Houston, TX 77204 USA garbey@cs.uh.edu, ltaief@cs.uh.edu 1

More information

MAXIMAL FLOW THROUGH A NETWORK

MAXIMAL FLOW THROUGH A NETWORK MAXIMAL FLOW THROUGH A NETWORK L. R. FORD, JR. AND D. R. FULKERSON Introduction. The problem discussed in this paper was formulated by T. Harris as follows: "Consider a rail network connecting two cities

More information

Simulation. Lecture O1 Optimization: Linear Programming. Saeed Bastani April 2016

Simulation. Lecture O1 Optimization: Linear Programming. Saeed Bastani April 2016 Simulation Lecture O Optimization: Linear Programming Saeed Bastani April 06 Outline of the course Linear Programming ( lecture) Integer Programming ( lecture) Heuristics and Metaheursitics (3 lectures)

More information

1 Motivation for Improving Matrix Multiplication

1 Motivation for Improving Matrix Multiplication CS170 Spring 2007 Lecture 7 Feb 6 1 Motivation for Improving Matrix Multiplication Now we will just consider the best way to implement the usual algorithm for matrix multiplication, the one that take 2n

More information

Suffix Array Construction

Suffix Array Construction Suffix Array Construction Suffix array construction means simply sorting the set of all suffixes. Using standard sorting or string sorting the time complexity is Ω(DP (T [0..n] )). Another possibility

More information

9/24/ Hash functions

9/24/ Hash functions 11.3 Hash functions A good hash function satis es (approximately) the assumption of SUH: each key is equally likely to hash to any of the slots, independently of the other keys We typically have no way

More information

COMPUTER THE DESIGN AND ANALYSIS OF ALGO R ITH M S. John E H opm Cornell University Jeffrey D. Ulhn Princeton University. Ahd V. Ah0 Bell Laboratories

COMPUTER THE DESIGN AND ANALYSIS OF ALGO R ITH M S. John E H opm Cornell University Jeffrey D. Ulhn Princeton University. Ahd V. Ah0 Bell Laboratories THE DESIGN AND ANALYSIS OF COMPUTER ALGO R ITH M S Ahd V. Ah0 Bell Laboratories John E H opm Cornell University Jeffrey D. Ulhn Princeton University A W Addison-Wesley Publishing Company Reading, Massachusetts

More information

Performance of ARQ Go-Back-N protocol in Markov channels with unreliable feedback: Delay analysis

Performance of ARQ Go-Back-N protocol in Markov channels with unreliable feedback: Delay analysis ICUPC 95, TOKYO, JAPAN, NOV. 1995 1 Performance of ARQ Go-Back-N protocol in Markov channels with unreliable feedback: Delay analysis Michele Zorzi y and Ramesh R. Rao z y Dipartimento di Elettronica e

More information

Module 1 Lecture Notes 2. Optimization Problem and Model Formulation

Module 1 Lecture Notes 2. Optimization Problem and Model Formulation Optimization Methods: Introduction and Basic concepts 1 Module 1 Lecture Notes 2 Optimization Problem and Model Formulation Introduction In the previous lecture we studied the evolution of optimization

More information

Worst-case running time for RANDOMIZED-SELECT

Worst-case running time for RANDOMIZED-SELECT Worst-case running time for RANDOMIZED-SELECT is ), even to nd the minimum The algorithm has a linear expected running time, though, and because it is randomized, no particular input elicits the worst-case

More information

Question Bank Subject: Advanced Data Structures Class: SE Computer

Question Bank Subject: Advanced Data Structures Class: SE Computer Question Bank Subject: Advanced Data Structures Class: SE Computer Question1: Write a non recursive pseudo code for post order traversal of binary tree Answer: Pseudo Code: 1. Push root into Stack_One.

More information

Stability Analysis of a Window-based Flow Control Mechanism for TCP Connections with Different Propagation Delays

Stability Analysis of a Window-based Flow Control Mechanism for TCP Connections with Different Propagation Delays Stability Analysis of a Window-based Flow Control Mechanism for TCP Connections with Different Propagation Delays Keiichi Takagaki Hiroyuki Ohsaki Masayuki Murata Graduate School of Engineering Science,

More information

MAC 1147 Exam #6 Review

MAC 1147 Exam #6 Review MAC 1147 Exam #6 Review Instructions: Exam #6 will consist of 8 questions plus a bonus problem. Some questions will have multiple parts and others will not. Some questions will be multiple choice and some

More information

Operating system Dr. Shroouq J.

Operating system Dr. Shroouq J. 2.2.2 DMA Structure In a simple terminal-input driver, when a line is to be read from the terminal, the first character typed is sent to the computer. When that character is received, the asynchronous-communication

More information

Lecture notes on Transportation and Assignment Problem (BBE (H) QTM paper of Delhi University)

Lecture notes on Transportation and Assignment Problem (BBE (H) QTM paper of Delhi University) Transportation and Assignment Problems The transportation model is a special class of linear programs. It received this name because many of its applications involve determining how to optimally transport

More information

Unit 6 Chapter 15 EXAMPLES OF COMPLEXITY CALCULATION

Unit 6 Chapter 15 EXAMPLES OF COMPLEXITY CALCULATION DESIGN AND ANALYSIS OF ALGORITHMS Unit 6 Chapter 15 EXAMPLES OF COMPLEXITY CALCULATION http://milanvachhani.blogspot.in EXAMPLES FROM THE SORTING WORLD Sorting provides a good set of examples for analyzing

More information

Link Structure Analysis

Link Structure Analysis Link Structure Analysis Kira Radinsky All of the following slides are courtesy of Ronny Lempel (Yahoo!) Link Analysis In the Lecture HITS: topic-specific algorithm Assigns each page two scores a hub score

More information

Math 221 Final Exam Review

Math 221 Final Exam Review Math 221 Final Exam Review Preliminary comment: Some of these problems a formulated using language and structures from graph theory. However they are generally self contained; no theorems from graph theory

More information

Mesh segmentation. Florent Lafarge Inria Sophia Antipolis - Mediterranee

Mesh segmentation. Florent Lafarge Inria Sophia Antipolis - Mediterranee Mesh segmentation Florent Lafarge Inria Sophia Antipolis - Mediterranee Outline What is mesh segmentation? M = {V,E,F} is a mesh S is either V, E or F (usually F) A Segmentation is a set of sub-meshes

More information

MATH 51: MATLAB HOMEWORK 3

MATH 51: MATLAB HOMEWORK 3 MATH 5: MATLAB HOMEWORK Experimental data generally suffers from imprecision, though frequently one can predict how data should behave by graphing results collected from experiments. For instance, suppose

More information

Wu, Y.-Q., The reducibility of surgered 3-manifolds, Topology and its Applications 43 (1992)

Wu, Y.-Q., The reducibility of surgered 3-manifolds, Topology and its Applications 43 (1992) Topology and its Applications 43 (1992) 213-218 North-Holland 213 The reducibility Smanifolds of surgered Ying-Qing Wu Department of Mathematics, University of Texas at Austin, Austin, TX 78712, USA; and

More information

EFFICIENT ATTACKS ON HOMOPHONIC SUBSTITUTION CIPHERS

EFFICIENT ATTACKS ON HOMOPHONIC SUBSTITUTION CIPHERS EFFICIENT ATTACKS ON HOMOPHONIC SUBSTITUTION CIPHERS A Project Report Presented to The faculty of the Department of Computer Science San Jose State University In Partial Fulfillment of the Requirements

More information

MAT 275 Laboratory 3 Numerical Solutions by Euler and Improved Euler Methods (scalar equations)

MAT 275 Laboratory 3 Numerical Solutions by Euler and Improved Euler Methods (scalar equations) MAT 275 Laboratory 3 Numerical Solutions by Euler and Improved Euler Methods (scalar equations) In this session we look at basic numerical methods to help us understand the fundamentals of numerical approximations.

More information

Page rank computation HPC course project a.y Compute efficient and scalable Pagerank

Page rank computation HPC course project a.y Compute efficient and scalable Pagerank Page rank computation HPC course project a.y. 2012-13 Compute efficient and scalable Pagerank 1 PageRank PageRank is a link analysis algorithm, named after Brin & Page [1], and used by the Google Internet

More information

Bipartite Perfect Matching in O(n log n) Randomized Time. Nikhil Bhargava and Elliot Marx

Bipartite Perfect Matching in O(n log n) Randomized Time. Nikhil Bhargava and Elliot Marx Bipartite Perfect Matching in O(n log n) Randomized Time Nikhil Bhargava and Elliot Marx Background Matching in bipartite graphs is a problem that has many distinct applications. Many problems can be reduced

More information

Number Portability Task Force - PT1 : Service Description Number Portability for Geographic Numbers BIPT

Number Portability Task Force - PT1 : Service Description Number Portability for Geographic Numbers BIPT Number Portability Task Force - PT1 : Service Description Number Portability for Geographic Numbers BIPT Contents 1.Scope... 3 2. Regulatory Requirements... 3 3. References... 3 4. Definitions and Abbreviations...

More information

NG NPTF PT1. Non-Geographic Number Portability Task Force PT1 : Service Description BIPT. Final Version NPNG2v1F 13/04/1999

NG NPTF PT1. Non-Geographic Number Portability Task Force PT1 : Service Description BIPT. Final Version NPNG2v1F 13/04/1999 Final Version NPNG2v1F 13/04/1999 Non-Geographic Number Portability Task Force PT1 : Service Description BIPT Table Of Contents Table Of Contents... 2 1. Scope... 3 2. Regulatory Requirements... 3 3. References...

More information

THE GROWTH OF LIMITS OF VERTEX REPLACEMENT RULES

THE GROWTH OF LIMITS OF VERTEX REPLACEMENT RULES THE GROWTH OF LIMITS OF VERTEX REPLACEMENT RULES JOSEPH PREVITE, MICHELLE PREVITE, AND MARY VANDERSCHOOT Abstract. In this paper, we give conditions to distinguish whether a vertex replacement rule given

More information

AD0A STANFORD UNIV CA DEPT OP COMPUTER SCIENCE F/6 12/1 VERIFICATION OF LINK-LEVEL PROTOCOLS,(U) JAN 81 D E KNUTH. N0R11476-C0330 UNCLASSIFIED

AD0A STANFORD UNIV CA DEPT OP COMPUTER SCIENCE F/6 12/1 VERIFICATION OF LINK-LEVEL PROTOCOLS,(U) JAN 81 D E KNUTH. N0R11476-C0330 UNCLASSIFIED AD0A099 140 STANFORD UNIV CA DEPT OP COMPUTER SCIENCE F/6 12/1 VERIFICATION OF LINK-LEVEL PROTOCOLS,(U) JAN 81 D E KNUTH. N0R11476-C0330 UNCLASSIFIED STANCS-81-84 NL Report. N STAN I [EVEV iv Verification

More information

A Singular Example for the Averaged Mean Curvature Flow

A Singular Example for the Averaged Mean Curvature Flow To appear in Experimental Mathematics Preprint Vol. No. () pp. 3 7 February 9, A Singular Example for the Averaged Mean Curvature Flow Uwe F. Mayer Abstract An embedded curve is presented which under numerical

More information

Roundoff Errors and Computer Arithmetic

Roundoff Errors and Computer Arithmetic Jim Lambers Math 105A Summer Session I 2003-04 Lecture 2 Notes These notes correspond to Section 1.2 in the text. Roundoff Errors and Computer Arithmetic In computing the solution to any mathematical problem,

More information

Math 126 Winter CHECK that your exam contains 8 problems.

Math 126 Winter CHECK that your exam contains 8 problems. Math 126 Winter 2016 Your Name Your Signature Student ID # Quiz Section Professor s Name TA s Name CHECK that your exam contains 8 problems. This exam is closed book. You may use one 8 1 11 sheet of hand-written

More information

Answers to Sample Questions on Transport Layer

Answers to Sample Questions on Transport Layer Answers to Sample Questions on Transport Layer 1) Which protocol Go-Back-N or Selective-Repeat - makes more efficient use of network bandwidth? Why? Answer: Selective repeat makes more efficient use of

More information

Chapter 3. Set Theory. 3.1 What is a Set?

Chapter 3. Set Theory. 3.1 What is a Set? Chapter 3 Set Theory 3.1 What is a Set? A set is a well-defined collection of objects called elements or members of the set. Here, well-defined means accurately and unambiguously stated or described. Any

More information

For q»p, a similar expression can be given replacing C:.t(i) by C:.t(i). The coefficients C:.t(i) and

For q»p, a similar expression can be given replacing C:.t(i) by C:.t(i). The coefficients C:.t(i) and Exact calculation of computer network reliability by E. HANSLER IBM Research Laboratory Ruschlikon, Switzerland G. K. McAULIFFE IBM Corporation Dublin, Ireland and R. S. WILKOV IBM Corporation Armonk,

More information

THE GROWTH DEGREE OF VERTEX REPLACEMENT RULES

THE GROWTH DEGREE OF VERTEX REPLACEMENT RULES THE GROWTH DEGREE OF VERTEX REPLACEMENT RULES JOSEPH P. PREVITE AND MICHELLE PREVITE 1. Introduction. 2. Vertex Replacement Rules. 3. Marked Graphs Definition 3.1. A marked graph (G, p) is a graph with

More information

An NP-complete Problem for the Abelian Sandpile Model

An NP-complete Problem for the Abelian Sandpile Model An NP-complete Problem for the Abelian Sandpile Model Matthias Schulz Department for Computer Sciences, University of Karlsruhe, Am Fasanengarten 5, 76128 Karlsruhe, Germany A configuration of the Abelian

More information

Box-Cox Transformation

Box-Cox Transformation Chapter 190 Box-Cox Transformation Introduction This procedure finds the appropriate Box-Cox power transformation (1964) for a single batch of data. It is used to modify the distributional shape of a set

More information

Clustering. (Part 2)

Clustering. (Part 2) Clustering (Part 2) 1 k-means clustering 2 General Observations on k-means clustering In essence, k-means clustering aims at minimizing cluster variance. It is typically used in Euclidean spaces and works

More information

Assignment /2.090 Spring Instructions. Released: Thursday, 7 February, at 5 PM. Due: Friday, 22 February, at 5 PM.

Assignment /2.090 Spring Instructions. Released: Thursday, 7 February, at 5 PM. Due: Friday, 22 February, at 5 PM. Assignment 1 2.086/2.090 Spring 2013 Released: Thursday, 7 February, at 5 PM. Due: Friday, 22 February, at 5 PM. Upload your solution as a zip file YOURNAME_ASSIGNMENT_1 which includes the script for each

More information

Probabilistic Graphical Models

Probabilistic Graphical Models Overview of Part Two Probabilistic Graphical Models Part Two: Inference and Learning Christopher M. Bishop Exact inference and the junction tree MCMC Variational methods and EM Example General variational

More information

The Fast Fourier Transform

The Fast Fourier Transform Chapter 7 7.1 INTRODUCTION The Fast Fourier Transform In Chap. 6 we saw that the discrete Fourier transform (DFT) could be used to perform convolutions. In this chapter we look at the computational requirements

More information

Metaheuristic Optimization with Evolver, Genocop and OptQuest

Metaheuristic Optimization with Evolver, Genocop and OptQuest Metaheuristic Optimization with Evolver, Genocop and OptQuest MANUEL LAGUNA Graduate School of Business Administration University of Colorado, Boulder, CO 80309-0419 Manuel.Laguna@Colorado.EDU Last revision:

More information

PASS Sample Size Software. Randomization Lists

PASS Sample Size Software. Randomization Lists Chapter 880 Introduction This module is used to create a randomization list for assigning subjects to one of up to eight groups or treatments. Six randomization algorithms are available. Four of the algorithms

More information

vsansparse Tech Note First Published On: Last Updated On:

vsansparse Tech Note First Published On: Last Updated On: First Published On: 02-09-2017 Last Updated On: 02-09-2017 1 Table of Contents 1. Introduction 1.1.Introduction 1.2.Virtual Machine Snapshot Overview 2. Introducing vsansparse Snapshots 2.1.Introducing

More information

MAS212 Assignment #1 (2018): Rational approximations

MAS212 Assignment #1 (2018): Rational approximations MAS212 Assignment #1 (2018): Rational approximations Dr Sam Dolan (sdolan@sheffieldacuk) In this assignment you will use Python to find rational approximations to real numbers such as π, 2 and the golden

More information

* Department of Computer Science, University of Pisa, Pisa, Italy Department of Elect. Engineering, University of Roma Tor Vergata, Rome, Italy

* Department of Computer Science, University of Pisa, Pisa, Italy Department of Elect. Engineering, University of Roma Tor Vergata, Rome, Italy A SURVEY OF PRODUCT-FORM QUEUEING NETWORKS WITH BLOCKING AND THEIR EQUIVALENCES Simonetta BALSAMO * and Vittoria DE NITTO PERSONE' * Department of Computer Science, University of Pisa, Pisa, Italy Department

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction A Monte Carlo method is a compuational method that uses random numbers to compute (estimate) some quantity of interest. Very often the quantity we want to compute is the mean of

More information

An Ecient Approximation Algorithm for the. File Redistribution Scheduling Problem in. Fully Connected Networks. Abstract

An Ecient Approximation Algorithm for the. File Redistribution Scheduling Problem in. Fully Connected Networks. Abstract An Ecient Approximation Algorithm for the File Redistribution Scheduling Problem in Fully Connected Networks Ravi Varadarajan Pedro I. Rivera-Vega y Abstract We consider the problem of transferring a set

More information

CS 3114 Data Structures and Algorithms READ THIS NOW!

CS 3114 Data Structures and Algorithms READ THIS NOW! READ THIS NOW! Print your name in the space provided below. There are 9 short-answer questions, priced as marked. The maximum score is 100. When you have finished, sign the pledge at the bottom of this

More information

Joint Entity Resolution

Joint Entity Resolution Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute

More information

An Investigation into Iterative Methods for Solving Elliptic PDE s Andrew M Brown Computer Science/Maths Session (2000/2001)

An Investigation into Iterative Methods for Solving Elliptic PDE s Andrew M Brown Computer Science/Maths Session (2000/2001) An Investigation into Iterative Methods for Solving Elliptic PDE s Andrew M Brown Computer Science/Maths Session (000/001) Summary The objectives of this project were as follows: 1) Investigate iterative

More information

Bindel, Fall 2016 Matrix Computations (CS 6210) Notes for

Bindel, Fall 2016 Matrix Computations (CS 6210) Notes for 1 Logistics Notes for 2016-09-07 1. We are still at 50. If you are still waiting and are not interested in knowing if a slot frees up, let me know. 2. There is a correction to HW 1, problem 4; the condition

More information

Web consists of web pages and hyperlinks between pages. A page receiving many links from other pages may be a hint of the authority of the page

Web consists of web pages and hyperlinks between pages. A page receiving many links from other pages may be a hint of the authority of the page Link Analysis Links Web consists of web pages and hyperlinks between pages A page receiving many links from other pages may be a hint of the authority of the page Links are also popular in some other information

More information

Replication in Mirrored Disk Systems

Replication in Mirrored Disk Systems Replication in Mirrored Disk Systems Athena Vakali and Yannis Manolopoulos Department of Informatics, Aristotle University 54006 Thessaloniki, Greece {avakali,manolopo}@athena.auth.gr Abstract. In this

More information

PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS

PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS PAUL BALISTER Abstract It has been shown [Balister, 2001] that if n is odd and m 1,, m t are integers with m i 3 and t i=1 m i = E(K n) then K n can be decomposed

More information

1 Probabilistic analysis and randomized algorithms

1 Probabilistic analysis and randomized algorithms 1 Probabilistic analysis and randomized algorithms Consider the problem of hiring an office assistant. We interview candidates on a rolling basis, and at any given point we want to hire the best candidate

More information

COMPUTER ORGANISATION CHAPTER 1 BASIC STRUCTURE OF COMPUTERS

COMPUTER ORGANISATION CHAPTER 1 BASIC STRUCTURE OF COMPUTERS Computer types: - COMPUTER ORGANISATION CHAPTER 1 BASIC STRUCTURE OF COMPUTERS A computer can be defined as a fast electronic calculating machine that accepts the (data) digitized input information process

More information

SENSITIVITY ANALYSIS OF CRITICAL PATH AND ITS VISUALIZATION IN JOB SHOP SCHEDULING

SENSITIVITY ANALYSIS OF CRITICAL PATH AND ITS VISUALIZATION IN JOB SHOP SCHEDULING SENSITIVITY ANALYSIS OF CRITICAL PATH AND ITS VISUALIZATION IN JOB SHOP SCHEDULING Ryosuke Tsutsumi and Yasutaka Fujimoto Department of Electrical and Computer Engineering, Yokohama National University,

More information

Lecture 25: Bezier Subdivision. And he took unto him all these, and divided them in the midst, and laid each piece one against another: Genesis 15:10

Lecture 25: Bezier Subdivision. And he took unto him all these, and divided them in the midst, and laid each piece one against another: Genesis 15:10 Lecture 25: Bezier Subdivision And he took unto him all these, and divided them in the midst, and laid each piece one against another: Genesis 15:10 1. Divide and Conquer If we are going to build useful

More information

Constructing arbitrarily large graphs with a specified number of Hamiltonian cycles

Constructing arbitrarily large graphs with a specified number of Hamiltonian cycles Electronic Journal of Graph Theory and Applications 4 (1) (2016), 18 25 Constructing arbitrarily large graphs with a specified number of Hamiltonian cycles Michael School of Computer Science, Engineering

More information

A Synchronization Algorithm for Distributed Systems

A Synchronization Algorithm for Distributed Systems A Synchronization Algorithm for Distributed Systems Tai-Kuo Woo Department of Computer Science Jacksonville University Jacksonville, FL 32211 Kenneth Block Department of Computer and Information Science

More information

Burrows Wheeler Transform

Burrows Wheeler Transform Burrows Wheeler Transform The Burrows Wheeler transform (BWT) is an important technique for text compression, text indexing, and their combination compressed text indexing. Let T [0..n] be the text with

More information