Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets

Size: px
Start display at page:

Download "Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets"

Transcription

1 Throughput-Delay Scalig i Wireless Networks with Costat-Size Packets Abbas El Gamal, James Mamme, Balaji Prabhakar, Devavrat Shah Departmets of EE ad CS Staford Uiversity, CA {abbas, jmamme, balaji, devavrat}@staford.edu Abstract I previous work 2004), we characterized the optimal throughput-delay trade-off i static wireless etworks as D) = ΘT )), where D) ad T ) are the average packet delay ad throughput i a etwork of odes, respectively. While this trade-off captured the essetial etwork dyamics, packets eeded to scale dow with the etwork size. I this fluid model, o buffers were required. Due to this packet scalig, D) did ot correspod to the average delay per bit. That led to the questio whether the trade-off remais the same whe the packet size is kept costat, which ecessitates buffers ad packet schedulig i the etwork. I this paper, we aswer this questio i the affirmative by showig that the optimal throughput-delay trade-off is still D) = ΘT )), where ow D) is the average delay per bit. Packets of costat size ecessitate the use of buffers i the etwork, which i tur requires schedulig packet trasmissios i a discrete-time queueig etwork ad aalyzig the correspodig delay. Our method cosists of derivig packet schedules i the discrete-time etwork by lookig at a correspodig cotiuous-time etwork ad the aalyzig the delay iduced i the actual discrete etwork usig results from queueig theory for cotiuous-time etworks. packet size remais costat, the throughput-delay trade-off ca be o better tha that i the fluid model. However, a priori, it is ot clear whether the same throughput-delay tradeoff as i the fluid case ca be achieved, sice ow, routig packets through the etwork also ivolves the additioal task of schedulig i the etwork. I [7], it was show that i a mobile etwork model with i.i.d. mobility each ode is distributed uiformly at radom i each time-slot idepedet of others ad the past), a two-hop scheme like the oe i [2] achieves the optimal trade-off usig packets of costat size. However, this method does ot exted to static etworks or mobile etworks with o-i.i.d. mobility. I this paper, we exted our previous work to the case of wireless etworks with buffers ad costat-size packets ad show that the optimal trade-off is still D) = ΘT )) as show i Figure ) where ow D) is the average delay per bit. D) I. INTRODUCTION PSfrag replacemets Gupta ad Kumar, i their semial work [3], itroduced / log a radom etwork model for studyig throughput scalig i a static wireless etwork, i.e., whe the odes do ot move. They showed that the throughput per source-destiatio pair scales as Θ / log ). They implicitly used a fluid model ad later work by Kulkari ad Viswaath [5] cosolidated the result with a explicit costat packet size model. I previous work [], we studied the throughput-delay tradeoff i wireless etworks. The optimal throughput-delay tradeoff was established to be D) = ΘT )), which is graphically preseted i Figure. I this work, packet size eeded to scale dow with the umber of odes i the etwork. This led to a fluid model for trasmittig packets ad allowed us to obtai the essetial trade-off by skirtig the issue of bufferig ad the resultat queueig delay at the odes. The delay that was cosidered i [] was the average packet delay ad sice the packet size was allowed to scale dow with, it did ot correspod to the average delay per bit. This paper ivestigates the throughput-delay trade-off whe the packet size remais costat, i.e., does ot scale dow with. This is a importat questio, sice i real etworks, packet size does ot chage whe more odes are added to the etwork. Note that with the additioal costrait that the / / log T ) Fig.. Throughput-delay scalig trade-off i the static radom etwork model. The scales of the axes are i terms of orders i. The mai cotributio of this paper is to determie the exact order of delay by couplig the evolutio of a discrete-time queueig etwork with that of a cotiuous-time queueig etwork. This provides both a packet schedulig policy see item 6 of Policy Σ i Sectio II) ad a method for aalyzig the delay. Packets i a wireless etwork have fixed routes depedig o the source-destiatio pair to which they belog. The etire wireless etwork the correspods to a discretetime, ope queueig etwork with geeral customer routes, i the termiology of queueig theory e.g. see [4], [8]). I the case of cotiuous-time queueig etworks, these are

2 also kow as Kelly or BCMP etworks ad the equilibrium distributio is kow to have a product form. Based o packet arrival times i a cotiuous-time queueig etwork with a Preemptive LIFO queue maagemet at each server, we derive a schedulig policy for the wireless etwork. Fially, usig product form equilibrium results for cotiuous-time etworks, we determie the exact order of queueig delay i the discrete-time wireless etwork. A. Model ad Defiitios We first preset the static radom etwork model, the model for successful wireless trasmissio ad the the defiitios of the performace metrics throughput ad delay. Defiitio Static radom etwork model): The static radom etwork cosists of a uit torus i which odes are distributed uiformly at radom. These odes are split ito distict source-destiatio S-D) pairs at radom. Time is slotted for packetized trasmissio. For simplicity, we assume that the time-slots are of uit legth. Defiitio 2 Model for successful trasmissio): Uder our Relaxed Protocol model, a trasmissio from ode i to ode j i a time-slot is successful if for ay other ode k that is trasmittig simultaeously, dk, j) + )di, j) for > 0 where di, j) is the distace betwee odes i ad j. Durig a successful trasmissio, odes sed data at a costat rate of W bits per secod. With time-slots of uit legth, this meas that the size of packets trasmitted i each slot is W bits. Defiitio 3 Scheme): A scheme Π, for a radom etwork, is a sequece of commuicatio policies, Π ), where policy Π determies how commuicatio occurs i a etwork of odes. Defiitio 4 Throughput of a scheme): Let B Π i, t) be the umber of bits of S-D pair i, i, trasferred i t time-slots uder policy Π. Note that this could be a radom quatity for a give realizatio of the etwork. Scheme Π is said to have throughput T Π ) if there exists a sequece of sets A Π ) such that { } A Π ) = ω : mi lim if i t t B Π i, t) T Π ) ad P A Π )) as. We use the term whp with high probability) to deote this. Defiitio 5 Delay of a scheme): The delay of a bit is the time it takes for the bit to reach its destiatio after it leaves the source. Let DΠ i j) deote the delay of bit j of S-D pair i uder policy Π, the the sample mea of delay for S-D pair i is D i Π = lim sup k k k DΠ i j). j= The average delay over all S-D pairs for a particular realizatio of the radom etwork is the D Π = 2 D i Π. The delay for a scheme Π is the expectatio of the average delay over all S-D pairs, i.e., D Π ) = E[ D Π ] = 2 E[ D Π i ]. Defiitio 6 Throughput-delay optimality): A pair T ), D)) is said to be Throughput-Delay T-D) optimal if there exists a scheme Π with T Π ) = ΘT )) ad D Π ) = ΘD)) ad scheme Π with T Π ) = ΩT )), DΠ )) = ΩD)). Regardig delay, we would like to ote that i the defiitio we used bit delay whereas i the schemes we preset later we refer to packet delay sice commuicatio is packetized. But sice the packet size is costat, these quatities are of the same order. Our mai result is as follows. Theorem : The optimal throughput-delay trade-off i the static radom etwork model is give by T ) = Θ D)/), for T ) = O / log ). The above result says that uder a delay scalig costrait of D) the optimal throughput scalig is ΘD)/). Ad this holds for T ) = O / log ), that is, the etire rage of achievable throughputs i the static radom etwork model. The rest of this paper is orgaized as follows. I Sectio II, we itroduce Scheme Π ad show that it achieves the throughput-delay trade-off stated i Theorem. Fially we preset a coverse that shows that o scheme ca provide a better throughput-delay trade-off tha Scheme Π, thus establishig Theorem. II. THROUGHPUT-DELAY TRADE-OFF IN STATIC NETWORKS Our trade-off scheme is a multi-hop, time-divisiomultiplexed TDM), cellular scheme with square cells of area a) so that the uit torus cosists of /a) cells as show i Figure 2. I the followig aalysis, we igore the edge effects due to /a) ot beig a perfect square. Before presetig the trade-off scheme, we preset three lemmas about the geometry of the odes o the torus divided ito square cells of area a). See [] for the proofs. Lemma : If a) 2 log /, the each cell has at least oe ode whp. We say that cell B iterferes with aother cell A if a trasmissio by a ode i cell B ca affect the success of a simultaeous trasmissio by a ode i cell A. Lemma 2: Uder the Relaxed Protocol model, the umber of cells that iterfere with ay give cell is bouded above by a costat c, idepedet of.

3 ag replacemets S S Cell of size a) S-D lies Fig. 2. The uit torus is divided ito cells of size a) for Scheme Π. The S-D lies passig through the shaded cell i the ceter are show. We say that a cell is active i a time-slot if ay of it odes trasmits i that time-slot. A cosequece of Lemma 2 is that, there exists a iterferece-free schedule where each cell becomes active regularly, oce i +c time-slots ad o cell iterferes with ay other simultaeously trasmittig cell. Let the straight lie coectig a source S to its destiatio D be called a S-D lie. Lemma 3: The umber of S-D lies passig through each cell is O ) a), whp. The above lemma shows that the umber of S-D lies passig through each cell is c 2 a) whp, for a appropriate choice of the costat c 2. Now we are ready to describe Scheme Π, which is parameterized by the cell area a) where a) = Ωlog /) ad a). Recall that by defiitio, Scheme Π is a sequece of commuicatio policies Π ). For ay particular realizatio of the radom etwork with odes, policy Π differs based o the followig two coditios. Coditio : No cell is empty. Coditio 2: The umber of S-D lies through each cell is at most c 2 a). If both the above coditios above are satisfied the Π is the policy Σ, described below. Otherwise, Π is a time-divisio policy where each of the sources trasmits directly to its destiatio i a roud-robi fashio. Policy Σ : ) Divide the uit torus usig a square grid ito square cells, each of area a) see Figure 2). 2) Each ode geerates packets accordig to a Poisso D D process of rate T ) = Θ / ) a). The radom etwork is a discrete-time system whereas the packet geeratio is a cotiuous-time process. So if a packet is geerated at time t, it is available for trasmissio from time-slot t owards. 3) Each cell becomes active at a regular iterval of + c time-slots see Lemma 2). Several cells which are sufficietly far apart become active simultaeously. Thus the scheme uses TDM betwee earby cells. 4) A source S seds packets to its destiatio D by relayig or hoppig alog the adjacet cells lyig o its S- D lie as show i Figure 2. Thus, i this scheme, direct trasmissio of packets is oly betwee odes i adjacet cells. 5) Oe of the odes i a cell acts as a relay by maitaiig a buffer for the packets of all the S-D lies passig through that cell. I each time-slot oly oe packet ca be trasmitted. However, a relay ode may receive up to four packets from its adjacet cells before it gets a chace to relay them. Moreover multiple packets may be geerated withi the cell which will be available for trasmissio i the ext time-slot. Hece a virtual queue is formed i each cell which cosists of packets geerated withi the cell as well as the packets to be relayed through the cell. 6) Whe the cell becomes active, oe packet from this queue if ot empty) is trasmitted to a adjacet cell accordig to a Last-I-First-Out LIFO) type of queue service policy. However, the arrival times cosidered by this policy are ot the actual arrival times of the packets, but the arrival times that would occur i a cotiuous-time etwork with the same arrivals ad a PL Preemptive LIFO) queue maagemet at each server. This is elaborated later i this sectio durig the aalysis of delay. The trade-off achieved by Scheme Π is give by the followig theorem. Theorem 2: Scheme Π with a) = Ωlog /) has T ) = Θ / a) ) ad D) = Θ / a) ), i.e., it achieves the trade-off T ) = Θ D)/). Throughput aalysis: If the time-divisio policy with direct trasmissio is used, the the throughput is 2W/ ad delay of. But sice it happes with a vaishigly low probability, as show by Lemmas ad 3, the throughput ad delay for Scheme Π are determied by that of policy Σ. Whe policy Σ is used, sice Coditio is satisfied, each cell has at least oe ode. This guaratees that each source ca sed data to its destiatio by hops alog adjacet cells o its S-D lie. From Lemma 2, it follows that each cell gets to trasmit a packet every + c time-slots, or equivaletly, the cell throughput is Θ). The total traffic through each cell is that due to all the S-D lies passig through the cell, which is O ) a) sice Coditio 2 is also satisfied. This suggests

4 that T ) = Θ ) a) is achievable, if the average delay is fiite. Fig. 3. The torus o the left with has 6 cells ad each cell cotais at least oe ode. The circled ode i each cell acts as a relay. The correspodig queueig etwork of 6 servers, with each server correspodig to a cell i the wireless etwork, is show o the right. Delay Aalysis: Next we aalyze the packet delay i the wireless etwork whe policy Σ is used. Dividig the uit torus ito square cells of area a) results i /a) cells. Oe of the odes i each cell maitais a buffer ad acts as a relay for all the S-D lies passig through that cell. These relay odes are the circled odes i Figure 3. The buffer i each cell correspods to a queue ad the cell itself correspods to a server that ca trasmit oe packet from this queue oce i + c time-slots. This is because each cell becomes active oce i + c time-slots as described earlier. Sice policy Σ restricts direct trasmissios to be betwee adjacet cells, each cell ca receive from or trasmit to ay four of its adjacet cells. This determies the coectivity betwee the servers so that the etire wireless etwork correspods to a discretetime queueig etwork of /a) servers, where each server is coected to four others as show i Figure 3. Note that the TDM betwee cells is such that i the c slots before each cell becomes active agai each of its eighbors becomes active exactly oce. Hece we ca igore the effect of cells becomig active at regular itervals ad istead cosider a discrete-time etwork of queues N D where D sigifies the discrete time ature of this etwork. The actual delay i the wireless etwork would the be +c times the delay i N D. Queueig etwork N D : The discrete-time queueig etwork N D cosists of /a) servers, each of which ca service oe packet from its queue i a time-slot if it is ot empty. Moreover, each server is coected to four others as explaied above. I the wireless etwork, packets travel from their sources to their destiatios by hops alog adjacet cells o their S-D lies. Thus the route of a packet depeds o the S-D pair to which it belogs. This meas that i N D there are customer routes correspodig to the S- D pairs. Recall that packets arrive i the wireless etwork at the sources accordig to idepedet Poisso processes of rate T ). These correspod to exogeous arrivals at the queues i N D. The remaiig arrivals at the queues are due to the departures from other queues. I the termiology of queueig theory, N D is a discrete-time, ope etwork of queues with geeral customer routes see Chapter 6.6 of [8]). Delay aalysis for such discrete-time etworks with geeral customer routes is ot kow, which prevets us from usig a simple First-I-First-Out FIFO) order of service i N D. We leverage results kow about cotiuous-time etworks to obtai the queue maagemet policy for N D i such a way that the average delay ca be computed. Queueig etwork N C : Cosider a cotiuous-time ope etwork of /a) servers havig the same coectivity structure as N D ad the same customer routes see Figure 3). Let this etwork be called N C. Further, let the exogeous arrivals i both the etworks N C ad N D are the same. Ad let the service requiremet of each packet at each server be determiistically equal to uit time. From the descriptio util ow, it is clear that N C is the cotiuous-time aalog of the discrete-time etwork N D. A Preemptive LIFO PL) queue maagemet is used at each server i N C see Chapter 6.8 of [8] for more details). The queue size distributio for the cotiuous time etwork N C with PL queue maagemet at each server has a product form i equilibrium as show i [4] see Theorems 3.7 ad 3.8 of Chapter 3) provided that the followig two coditios are satisfied. First, the service time distributio should be either phase-type or the limit of a sequece of phase-type distributios. I our case the service time is costat ad equal to. The secod coditio is that, the total traffic at each server is less tha its capacity, which is oe i our case. Cosider the sum of expoetial radom variables each with mea /. This sum has a phase-type distributio ad i the limit as teds to ifiity, its distributio coverges to that of a costat radom variable. Thus the first coditio is satisfied. I the wireless etwork the umber of S-D lies passig through each cell is O ) a) ad the arrival process for each S-D pair is a idepedet Poisso process with rate T ) = Θ / ) a). Therefore a appropriate choice of costats guaratees that the total traffic at each server is less tha, its service capacity, due to Coditio 2 beig satisfied. Usig the product form for the queue size distributio i equilibrium, it follows that the average queue size at a queue with total traffic λ < ad uit mea service is of the form c 3 λ/ λ) where c 3 is some costat. By Little s law this implies that the average delay at each server is bouded above by a costat idepedet of. We summarize the above discussio i the lemma below. Lemma 4: For the cotiuous-time ope etwork N C with customer routes as described above the average delay at each server is bouded above by a costat idepedet of. Packet Schedulig i N D usig N C : However we caot use this PL policy i the discrete time etwork N D because of the followig reasos: ) Due to the discrete time ature of the etwork N D, a packet that is geerated at time t becomes eligible for service i.e. ext hop trasmissio) oly at time t.

5 2) A complete packet has to be trasmitted i a time-slot, i.e. fractios of the packets caot be trasmitted. This meas that a preemptive type of service like PL is ot allowed. To address these problems for N D, we preset a cetralized schedulig policy derived from emulatig i parallel, the cotiuous-time etwork N C with PL queue maagemet at each server. The exogeous arrivals i both N C ad N D are the same. Let a packet arrive i N C at some server at time a C ad i N D at the same server at time a D. The it is served i N D usig a LIFO policy with the arrival time cosidered to be a C istead of a D. Clearly such a policy ca be implemeted if ad oly if a D a C for every packet at each server, i.e., each packet arrives before its scheduled departure time. Let d C ad d D be the departure times of a packet from some server i N C ad N D respectively. The this is the same as sayig that d D d C for each packet i every busy cycle of each server i N C. I what follows, we show that for all packets i ay busy cycle of ay server, the departures i N D occur at or before the departures i N C. Lemma 5: Let a packet depart i N C from some server at time d C ad i N D at time d D, the d D d C. Proof: Fix a server ad a particular busy cycle of N C. Let it cosist of packets umbered,..., k with arrivals at times a... a k ad departures at times d,..., d k. Let the arrival times of these packets i N D be A,..., A k ad departures be at times D,..., D k. By assumig that A i a i for i =,..., k, we eed to show that D i d i for i =,..., k. Clearly this holds for k = sice D = A + a i + = d. Now suppose it holds for all busy cycles of legth k ad cosider ay busy cycle of k + packets. If a < a 2, the because of the LIFO policy i N D based o times a i, we have D = a + a + k + = d. The last equality holds sice i N C, the PL service policy dictates that the first packet of the busy cycle is the last to depart. Ad the remaiig packets would have departures times as for a busy cycle of legth k. Otherwise if a = a 2 the the LIFO policy i N D based o arrival times a i results i D = a + k + = d ad the packets umbered 2,..., k depart exactly as if they belog to a busy cycle of legth k. This completes the proof by iductio. Thus we have show that it is possible to use LIFO i N D based o the arrival times i N C istead of the actual arrival times i N D. We are ow ready to prove Theorem 2. Proof: of Theorem 2) Packets reach their destiatio with fiite average delay, which shows that the throughput is just the rate at which each source seds its data. This proves that the throughput T ) = Θ / ) a). Next we compute the average packet delay D). Lemma 5 also holds for the fial departure of each packet from the etwork. Therefore if DD i is the delay of a packet of route i i N D i.e. S-D pair i i the wireless etwork) ad DC i is the delay of the correspodig packet i N C the D i D Di C +. Hece takig expectatios it follows that E[D i D ] E[Di C ] +, i. Therefore delay averaged over all routes is give by D) = 2 E[D i D] 2 E[D i C] +. ) Sice each hop i the wireless etwork covers a distace of a) ) Θ, the umber of hops per packet for S-D pair i is Θ d i / ) a) where d i is the legth of S-D lie i. Now D i C is the delay for a packet of route i, which is equal to the sum of the delays alog all queues o its route. But from Lemma 4, the average delay at each server is bouded above by some costat idepedet of. Therefore from ), we obtai that D) 2 E[d i ] c 2 + = Θ / ) a) a) sice 2 E[d i]/ = Θ). The followig theorem shows that the trade-off provided by Scheme Π is optimal. The proof follows easily from the coverse for the fluid model Theorem 2 i []). Theorem 3: Let the average delay be bouded above by D). The the achievable throughput T ) for ay scheme scales as O D)/). III. CONCLUSION The optimal throughput-delay trade-off for static radom wireless etworks was determied i [] usig a fluid model where the packet size eeded to scale dow with the umber of odes i the etwork. I this paper, we imposed the costrait that the packet size remais costat ad established that the throughput-delay trade-off remais uchaged. This also provides a justificatio for the simplifyig fluid assumptio made i [] sice it does ot affect the essetial etwork dyamics. The ext atural issue to address would be the mobile radom etwork model, itroduced i [2], for which the trade-off was studied usig a fluid model i []. REFERENCES [] A. El Gamal, J. Mamme, B. Prabhakar, D. Shah, Throughput-Delay Trade-off i Wireless Networks, IEEE INFOCOM, Hog Kog, [2] M. Grossglauser ad D. Tse, Mobility Icreases the Capacity of Adhoc Wireless Networks, IEEE INFOCOM, Achorage, Alaska, pp , 200. [3] P. Gupta ad P. R. Kumar, The Capacity of Wireless Networks, IEEE Tras. o Iformatio Theory, 462), pp , March [4] F. P. Kelly, Reversibility ad Stochastic Networks, Wiley, 979. [5] S. R. Kulkari ad P. Viswaath, A Determiistic Approach to Throughput Scalig i Wireless Networks, IEEE Tras. o Iformatio Theory, 506), pp , [6] R. Motwai ad P. Raghava, Radomized algorithms, Cambridge Uiv. Press, 995. [7] M. J. Neely ad E. Modiao, Capacity ad Delay Tradeoffs for Ad-Hoc Mobile Networks, IEEE Trasactios o Iformatio Theory, vol. 5, o. 6, pp , Jue [8] R. W. Wolff, Stochastic Modelig ad the Theory of Queues, Pretice- Hall, 988.

1 Graph Sparsfication

1 Graph Sparsfication CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

Oblivious Routing with Mobile Fusion Centers over a Sensor Network

Oblivious Routing with Mobile Fusion Centers over a Sensor Network Oblivious Routig with Mobile Fusio Ceters over a Sesor Network Devavrat Shah Departmet of Electrical Eg. ad Computer Sciece Massachusetts Istitute of Techology devavrat@mit.edu Sajay Shakkottai ECE Departmet

More information

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio

More information

Improved Random Graph Isomorphism

Improved Random Graph Isomorphism Improved Radom Graph Isomorphism Tomek Czajka Gopal Paduraga Abstract Caoical labelig of a graph cosists of assigig a uique label to each vertex such that the labels are ivariat uder isomorphism. Such

More information

Lecture 2: Spectra of Graphs

Lecture 2: Spectra of Graphs Spectral Graph Theory ad Applicatios WS 20/202 Lecture 2: Spectra of Graphs Lecturer: Thomas Sauerwald & He Su Our goal is to use the properties of the adjacecy/laplacia matrix of graphs to first uderstad

More information

Combination Labelings Of Graphs

Combination Labelings Of Graphs Applied Mathematics E-Notes, (0), - c ISSN 0-0 Available free at mirror sites of http://wwwmaththuedutw/ame/ Combiatio Labeligs Of Graphs Pak Chig Li y Received February 0 Abstract Suppose G = (V; E) is

More information

Throughput-Delay Tradeoffs in Large-Scale MANETs with Network Coding

Throughput-Delay Tradeoffs in Large-Scale MANETs with Network Coding Throughput-Delay Tradeoffs i Large-Scale MANETs with Network Codig Chi Zhag ad Yuguag Fag Departmet of Electrical ad Computer Egieerig Uiversity of Florida, Gaiesville, FL 326 Email: {zhagchi@, fag@ece.}ufl.edu

More information

Lower Bounds for Sorting

Lower Bounds for Sorting Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig

More information

condition w i B i S maximum u i

condition w i B i S maximum u i ecture 10 Dyamic Programmig 10.1 Kapsack Problem November 1, 2004 ecturer: Kamal Jai Notes: Tobias Holgers We are give a set of items U = {a 1, a 2,..., a }. Each item has a weight w i Z + ad a utility

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

On (K t e)-saturated Graphs

On (K t e)-saturated Graphs Noame mauscript No. (will be iserted by the editor O (K t e-saturated Graphs Jessica Fuller Roald J. Gould the date of receipt ad acceptace should be iserted later Abstract Give a graph H, we say a graph

More information

Big-O Analysis. Asymptotics

Big-O Analysis. Asymptotics Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses

More information

Random Graphs and Complex Networks T

Random Graphs and Complex Networks T Radom Graphs ad Complex Networks T-79.7003 Charalampos E. Tsourakakis Aalto Uiversity Lecture 3 7 September 013 Aoucemet Homework 1 is out, due i two weeks from ow. Exercises: Probabilistic iequalities

More information

On Infinite Groups that are Isomorphic to its Proper Infinite Subgroup. Jaymar Talledo Balihon. Abstract

On Infinite Groups that are Isomorphic to its Proper Infinite Subgroup. Jaymar Talledo Balihon. Abstract O Ifiite Groups that are Isomorphic to its Proper Ifiite Subgroup Jaymar Talledo Baliho Abstract Two groups are isomorphic if there exists a isomorphism betwee them Lagrage Theorem states that the order

More information

Recursive Procedures. How can you model the relationship between consecutive terms of a sequence?

Recursive Procedures. How can you model the relationship between consecutive terms of a sequence? 6. Recursive Procedures I Sectio 6.1, you used fuctio otatio to write a explicit formula to determie the value of ay term i a Sometimes it is easier to calculate oe term i a sequece usig the previous terms.

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

On Nonblocking Folded-Clos Networks in Computer Communication Environments

On Nonblocking Folded-Clos Networks in Computer Communication Environments O Noblockig Folded-Clos Networks i Computer Commuicatio Eviromets Xi Yua Departmet of Computer Sciece, Florida State Uiversity, Tallahassee, FL 3306 xyua@cs.fsu.edu Abstract Folded-Clos etworks, also referred

More information

On the Throughput-Delay Trade-off in Georouting Networks

On the Throughput-Delay Trade-off in Georouting Networks 22 Proceedigs IEEE INFOCOM O the Throughput-Delay Trade-off i Georoutig Networks Philippe Jacquet Alcatel Lucet Bell Labs Villarceaux, Frace philippe.jacquet@alcatel-lucet.com Salma Malik INRIA Rocquecourt,

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information

Graphs. Minimum Spanning Trees. Slides by Rose Hoberman (CMU)

Graphs. Minimum Spanning Trees. Slides by Rose Hoberman (CMU) Graphs Miimum Spaig Trees Slides by Rose Hoberma (CMU) Problem: Layig Telephoe Wire Cetral office 2 Wirig: Naïve Approach Cetral office Expesive! 3 Wirig: Better Approach Cetral office Miimize the total

More information

Lecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein

Lecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein 068.670 Subliear Time Algorithms November, 0 Lecture 6 Lecturer: Roitt Rubifeld Scribes: Che Ziv, Eliav Buchik, Ophir Arie, Joatha Gradstei Lesso overview. Usig the oracle reductio framework for approximatig

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Convergence results for conditional expectations

Convergence results for conditional expectations Beroulli 11(4), 2005, 737 745 Covergece results for coditioal expectatios IRENE CRIMALDI 1 ad LUCA PRATELLI 2 1 Departmet of Mathematics, Uiversity of Bologa, Piazza di Porta Sa Doato 5, 40126 Bologa,

More information

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1 Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)

More information

1.2 Binomial Coefficients and Subsets

1.2 Binomial Coefficients and Subsets 1.2. BINOMIAL COEFFICIENTS AND SUBSETS 13 1.2 Biomial Coefficiets ad Subsets 1.2-1 The loop below is part of a program to determie the umber of triagles formed by poits i the plae. for i =1 to for j =

More information

Counting Regions in the Plane and More 1

Counting Regions in the Plane and More 1 Coutig Regios i the Plae ad More 1 by Zvezdelia Stakova Berkeley Math Circle Itermediate I Group September 016 1. Overarchig Problem Problem 1 Regios i a Circle. The vertices of a polygos are arraged o

More information

Lecture 10 Collision resolution. Collision resolution

Lecture 10 Collision resolution. Collision resolution Lecture 10 Collisio resolutio Collisio resolutio May applicatios ivolve a iquiry over a shared chael, which ca be ivoked for: discovery of eighborig devices i ad hoc etworks, coutig the umber of RFID tags

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

CHAPTER IV: GRAPH THEORY. Section 1: Introduction to Graphs

CHAPTER IV: GRAPH THEORY. Section 1: Introduction to Graphs CHAPTER IV: GRAPH THEORY Sectio : Itroductio to Graphs Sice this class is called Number-Theoretic ad Discrete Structures, it would be a crime to oly focus o umber theory regardless how woderful those topics

More information

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8)

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8) CIS 11 Data Structures ad Algorithms with Java Fall 017 Big-Oh Notatio Tuesday, September 5 (Make-up Friday, September 8) Learig Goals Review Big-Oh ad lear big/small omega/theta otatios Practice solvig

More information

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology

More information

Visualization of Gauss-Bonnet Theorem

Visualization of Gauss-Bonnet Theorem Visualizatio of Gauss-Boet Theorem Yoichi Maeda maeda@keyaki.cc.u-tokai.ac.jp Departmet of Mathematics Tokai Uiversity Japa Abstract: The sum of exteral agles of a polygo is always costat, π. There are

More information

CSC165H1 Worksheet: Tutorial 8 Algorithm analysis (SOLUTIONS)

CSC165H1 Worksheet: Tutorial 8 Algorithm analysis (SOLUTIONS) CSC165H1, Witer 018 Learig Objectives By the ed of this worksheet, you will: Aalyse the ruig time of fuctios cotaiig ested loops. 1. Nested loop variatios. Each of the followig fuctios takes as iput a

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

A RELATIONSHIP BETWEEN BOUNDS ON THE SUM OF SQUARES OF DEGREES OF A GRAPH

A RELATIONSHIP BETWEEN BOUNDS ON THE SUM OF SQUARES OF DEGREES OF A GRAPH J. Appl. Math. & Computig Vol. 21(2006), No. 1-2, pp. 233-238 Website: http://jamc.et A RELATIONSHIP BETWEEN BOUNDS ON THE SUM OF SQUARES OF DEGREES OF A GRAPH YEON SOO YOON AND JU KYUNG KIM Abstract.

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

New Results on Energy of Graphs of Small Order

New Results on Energy of Graphs of Small Order Global Joural of Pure ad Applied Mathematics. ISSN 0973-1768 Volume 13, Number 7 (2017), pp. 2837-2848 Research Idia Publicatios http://www.ripublicatio.com New Results o Eergy of Graphs of Small Order

More information

15-859E: Advanced Algorithms CMU, Spring 2015 Lecture #2: Randomized MST and MST Verification January 14, 2015

15-859E: Advanced Algorithms CMU, Spring 2015 Lecture #2: Randomized MST and MST Verification January 14, 2015 15-859E: Advaced Algorithms CMU, Sprig 2015 Lecture #2: Radomized MST ad MST Verificatio Jauary 14, 2015 Lecturer: Aupam Gupta Scribe: Yu Zhao 1 Prelimiaries I this lecture we are talkig about two cotets:

More information

A Note on Chromatic Transversal Weak Domination in Graphs

A Note on Chromatic Transversal Weak Domination in Graphs Iteratioal Joural of Mathematics Treds ad Techology Volume 17 Number 2 Ja 2015 A Note o Chromatic Trasversal Weak Domiatio i Graphs S Balamuruga 1, P Selvalakshmi 2 ad A Arivalaga 1 Assistat Professor,

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach Performace Aalysis of Multiclass FIFO: Motivatio, Difficulty ad a Network alculus Approach Yumig Jiag Norwegia Uiversity of Sciece ad Techology (NTNU) 1 19 March 2014, 2d Workshop o Network alculus, Bamberg,

More information

Lecture 1: Introduction and Strassen s Algorithm

Lecture 1: Introduction and Strassen s Algorithm 5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access

More information

Big-O Analysis. Asymptotics

Big-O Analysis. Asymptotics Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses

More information

Strong Complementary Acyclic Domination of a Graph

Strong Complementary Acyclic Domination of a Graph Aals of Pure ad Applied Mathematics Vol 8, No, 04, 83-89 ISSN: 79-087X (P), 79-0888(olie) Published o 7 December 04 wwwresearchmathsciorg Aals of Strog Complemetary Acyclic Domiatio of a Graph NSaradha

More information

Sum-connectivity indices of trees and unicyclic graphs of fixed maximum degree

Sum-connectivity indices of trees and unicyclic graphs of fixed maximum degree 1 Sum-coectivity idices of trees ad uicyclic graphs of fixed maximum degree Zhibi Du a, Bo Zhou a *, Nead Triajstić b a Departmet of Mathematics, South Chia Normal Uiversity, uagzhou 510631, Chia email:

More information

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers * Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of

More information

Symmetric Class 0 subgraphs of complete graphs

Symmetric Class 0 subgraphs of complete graphs DIMACS Techical Report 0-0 November 0 Symmetric Class 0 subgraphs of complete graphs Vi de Silva Departmet of Mathematics Pomoa College Claremot, CA, USA Chaig Verbec, Jr. Becer Friedma Istitute Booth

More information

EVALUATION OF TRIGONOMETRIC FUNCTIONS

EVALUATION OF TRIGONOMETRIC FUNCTIONS EVALUATION OF TRIGONOMETRIC FUNCTIONS Whe first exposed to trigoometric fuctios i high school studets are expected to memorize the values of the trigoometric fuctios of sie cosie taget for the special

More information

Massachusetts Institute of Technology Lecture : Theory of Parallel Systems Feb. 25, Lecture 6: List contraction, tree contraction, and

Massachusetts Institute of Technology Lecture : Theory of Parallel Systems Feb. 25, Lecture 6: List contraction, tree contraction, and Massachusetts Istitute of Techology Lecture.89: Theory of Parallel Systems Feb. 5, 997 Professor Charles E. Leiserso Scribe: Guag-Ie Cheg Lecture : List cotractio, tree cotractio, ad symmetry breakig Work-eciet

More information

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only Edited: Yeh-Liag Hsu (998--; recommeded: Yeh-Liag Hsu (--9; last updated: Yeh-Liag Hsu (9--7. Note: This is the course material for ME55 Geometric modelig ad computer graphics, Yua Ze Uiversity. art of

More information

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET WYSE Academic Challege Sectioal Computer Sciece 2005 SOLUTION SET 1. Correct aswer: a. Hz = cycle / secod. CPI = 2, therefore, CPI*I = 2 * 28 X 10 8 istructios = 56 X 10 8 cycles. The clock rate is 56

More information

COMP 558 lecture 6 Sept. 27, 2010

COMP 558 lecture 6 Sept. 27, 2010 Radiometry We have discussed how light travels i straight lies through space. We would like to be able to talk about how bright differet light rays are. Imagie a thi cylidrical tube ad cosider the amout

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

Alpha Individual Solutions MAΘ National Convention 2013

Alpha Individual Solutions MAΘ National Convention 2013 Alpha Idividual Solutios MAΘ Natioal Covetio 0 Aswers:. D. A. C 4. D 5. C 6. B 7. A 8. C 9. D 0. B. B. A. D 4. C 5. A 6. C 7. B 8. A 9. A 0. C. E. B. D 4. C 5. A 6. D 7. B 8. C 9. D 0. B TB. 570 TB. 5

More information

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme Improvig Iformatio Retrieval System Security via a Optimal Maximal Codig Scheme Dogyag Log Departmet of Computer Sciece, City Uiversity of Hog Kog, 8 Tat Chee Aveue Kowloo, Hog Kog SAR, PRC dylog@cs.cityu.edu.hk

More information

Perhaps the method will give that for every e > U f() > p - 3/+e There is o o-trivial upper boud for f() ad ot eve f() < Z - e. seems to be kow, where

Perhaps the method will give that for every e > U f() > p - 3/+e There is o o-trivial upper boud for f() ad ot eve f() < Z - e. seems to be kow, where ON MAXIMUM CHORDAL SUBGRAPH * Paul Erdos Mathematical Istitute of the Hugaria Academy of Scieces ad Reu Laskar Clemso Uiversity 1. Let G() deote a udirected graph, with vertices ad V(G) deote the vertex

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

University of Waterloo Department of Electrical and Computer Engineering ECE 250 Algorithms and Data Structures

University of Waterloo Department of Electrical and Computer Engineering ECE 250 Algorithms and Data Structures Uiversity of Waterloo Departmet of Electrical ad Computer Egieerig ECE 250 Algorithms ad Data Structures Midterm Examiatio ( pages) Istructor: Douglas Harder February 7, 2004 7:30-9:00 Name (last, first)

More information

( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb

( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb Chapter 3 Descriptive Measures Measures of Ceter (Cetral Tedecy) These measures will tell us where is the ceter of our data or where most typical value of a data set lies Mode the value that occurs most

More information

Thompson s Group F (p + 1) is not Minimally Almost Convex

Thompson s Group F (p + 1) is not Minimally Almost Convex Thompso s Group F (p + ) is ot Miimally Almost Covex Claire Wladis Thompso s Group F (p + ). A Descriptio of F (p + ) Thompso s group F (p + ) ca be defied as the group of piecewiseliear orietatio-preservig

More information

The Adjacency Matrix and The nth Eigenvalue

The Adjacency Matrix and The nth Eigenvalue Spectral Graph Theory Lecture 3 The Adjacecy Matrix ad The th Eigevalue Daiel A. Spielma September 5, 2012 3.1 About these otes These otes are ot ecessarily a accurate represetatio of what happeed i class.

More information

Average Connectivity and Average Edge-connectivity in Graphs

Average Connectivity and Average Edge-connectivity in Graphs Average Coectivity ad Average Edge-coectivity i Graphs Jaehoo Kim, Suil O July 1, 01 Abstract Coectivity ad edge-coectivity of a graph measure the difficulty of breakig the graph apart, but they are very

More information

End Semester Examination CSE, III Yr. (I Sem), 30002: Computer Organization

End Semester Examination CSE, III Yr. (I Sem), 30002: Computer Organization Ed Semester Examiatio 2013-14 CSE, III Yr. (I Sem), 30002: Computer Orgaizatio Istructios: GROUP -A 1. Write the questio paper group (A, B, C, D), o frot page top of aswer book, as per what is metioed

More information

Protected points in ordered trees

Protected points in ordered trees Applied Mathematics Letters 008 56 50 www.elsevier.com/locate/aml Protected poits i ordered trees Gi-Sag Cheo a, Louis W. Shapiro b, a Departmet of Mathematics, Sugkyukwa Uiversity, Suwo 440-746, Republic

More information

Hash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015.

Hash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015. Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Hash Tables xkcd. http://xkcd.com/221/. Radom Number. Used with permissio uder Creative

More information

Xiaozhou (Steve) Li, Atri Rudra, Ram Swaminathan. HP Laboratories HPL Keyword(s): graph coloring; hardness of approximation

Xiaozhou (Steve) Li, Atri Rudra, Ram Swaminathan. HP Laboratories HPL Keyword(s): graph coloring; hardness of approximation Flexible Colorig Xiaozhou (Steve) Li, Atri Rudra, Ram Swamiatha HP Laboratories HPL-2010-177 Keyword(s): graph colorig; hardess of approximatio Abstract: Motivated b y reliability cosideratios i data deduplicatio

More information

APPLICATION NOTE. Automated Gain Flattening. 1. Experimental Setup. Scope and Overview

APPLICATION NOTE. Automated Gain Flattening. 1. Experimental Setup. Scope and Overview APPLICATION NOTE Automated Gai Flatteig Scope ad Overview A flat optical power spectrum is essetial for optical telecommuicatio sigals. This stems from a eed to balace the chael powers across large distaces.

More information

Ch 9.3 Geometric Sequences and Series Lessons

Ch 9.3 Geometric Sequences and Series Lessons Ch 9.3 Geometric Sequeces ad Series Lessos SKILLS OBJECTIVES Recogize a geometric sequece. Fid the geeral, th term of a geometric sequece. Evaluate a fiite geometric series. Evaluate a ifiite geometric

More information

2. ALGORITHM ANALYSIS

2. ALGORITHM ANALYSIS 2. ALGORITHM ANALYSIS computatioal tractability survey of commo ruig times 2. ALGORITHM ANALYSIS computatioal tractability survey of commo ruig times Lecture slides by Kevi Waye Copyright 2005 Pearso-Addiso

More information

Subtrees of a random tree

Subtrees of a random tree Subtrees of a radom tree Bogumi l Kamiński Pawe l Pra lat November 21, 2018 Abstract Let T be a radom tree take uiformly at radom from the family of labelled trees o vertices. I this ote, we provide bouds

More information

n n B. How many subsets of C are there of cardinality n. We are selecting elements for such a

n n B. How many subsets of C are there of cardinality n. We are selecting elements for such a 4. [10] Usig a combiatorial argumet, prove that for 1: = 0 = Let A ad B be disjoit sets of cardiality each ad C = A B. How may subsets of C are there of cardiality. We are selectig elemets for such a subset

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

The Platonic solids The five regular polyhedra

The Platonic solids The five regular polyhedra The Platoic solids The five regular polyhedra Ole Witt-Hase jauary 7 www.olewitthase.dk Cotets. Polygos.... Topologically cosideratios.... Euler s polyhedro theorem.... Regular ets o a sphere.... The dihedral

More information

UNIT 4 Section 8 Estimating Population Parameters using Confidence Intervals

UNIT 4 Section 8 Estimating Population Parameters using Confidence Intervals UNIT 4 Sectio 8 Estimatig Populatio Parameters usig Cofidece Itervals To make ifereces about a populatio that caot be surveyed etirely, sample statistics ca be take from a SRS of the populatio ad used

More information

Relationship between augmented eccentric connectivity index and some other graph invariants

Relationship between augmented eccentric connectivity index and some other graph invariants Iteratioal Joural of Advaced Mathematical Scieces, () (03) 6-3 Sciece Publishig Corporatio wwwsciecepubcocom/idexphp/ijams Relatioship betwee augmeted eccetric coectivity idex ad some other graph ivariats

More information

Module 8-7: Pascal s Triangle and the Binomial Theorem

Module 8-7: Pascal s Triangle and the Binomial Theorem Module 8-7: Pascal s Triagle ad the Biomial Theorem Gregory V. Bard April 5, 017 A Note about Notatio Just to recall, all of the followig mea the same thig: ( 7 7C 4 C4 7 7C4 5 4 ad they are (all proouced

More information

Optimal Mapped Mesh on the Circle

Optimal Mapped Mesh on the Circle Koferece ANSYS 009 Optimal Mapped Mesh o the Circle doc. Ig. Jaroslav Štigler, Ph.D. Bro Uiversity of Techology, aculty of Mechaical gieerig, ergy Istitut, Abstract: This paper brigs out some ideas ad

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,

More information

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved. Itroductio to Wireless & Mobile Systems Chapter 6 Multiple Radio Access 1 Outlie Itroductio Multiple Radio Access Protocols Cotetio-based Protocols Pure ALOHA Slotted ALOHA CSMA (Carrier Sese Multiple

More information

Force Network Analysis using Complementary Energy

Force Network Analysis using Complementary Energy orce Network Aalysis usig Complemetary Eergy Adrew BORGART Assistat Professor Delft Uiversity of Techology Delft, The Netherlads A.Borgart@tudelft.l Yaick LIEM Studet Delft Uiversity of Techology Delft,

More information

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute

More information

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana The Closest Lie to a Data Set i the Plae David Gurey Southeaster Louisiaa Uiversity Hammod, Louisiaa ABSTRACT This paper looks at three differet measures of distace betwee a lie ad a data set i the plae:

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

Matrix Partitions of Split Graphs

Matrix Partitions of Split Graphs Matrix Partitios of Split Graphs Tomás Feder, Pavol Hell, Ore Shklarsky Abstract arxiv:1306.1967v2 [cs.dm] 20 Ju 2013 Matrix partitio problems geeralize a umber of atural graph partitio problems, ad have

More information

Computational Geometry

Computational Geometry Computatioal Geometry Chapter 4 Liear programmig Duality Smallest eclosig disk O the Ageda Liear Programmig Slides courtesy of Craig Gotsma 4. 4. Liear Programmig - Example Defie: (amout amout cosumed

More information

Solution printed. Do not start the test until instructed to do so! CS 2604 Data Structures Midterm Spring, Instructions:

Solution printed. Do not start the test until instructed to do so! CS 2604 Data Structures Midterm Spring, Instructions: CS 604 Data Structures Midterm Sprig, 00 VIRG INIA POLYTECHNIC INSTITUTE AND STATE U T PROSI M UNI VERSI TY Istructios: Prit your ame i the space provided below. This examiatio is closed book ad closed

More information

Recursive Estimation

Recursive Estimation Recursive Estimatio Raffaello D Adrea Sprig 2 Problem Set: Probability Review Last updated: February 28, 2 Notes: Notatio: Uless otherwise oted, x, y, ad z deote radom variables, f x (x) (or the short

More information

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le Fudametals of Media Processig Shi'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dih Le Today's topics Noparametric Methods Parze Widow k-nearest Neighbor Estimatio Clusterig Techiques k-meas Agglomerative Hierarchical

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

Optimal Geographic Routing for Wireless Networks with Near-Arbitrary Holes and Traffic

Optimal Geographic Routing for Wireless Networks with Near-Arbitrary Holes and Traffic Optimal Geographic Routig for Wireless Networks with Near-Arbitrary Holes ad Traffic Sudar Subramaia ad Sajay Shakkottai Departmet of ECE The Uiversity of Texas at Austi Email: {ssubrama, shakkott}@ece.utexas.edu

More information

Traditional queuing behaviour in routers. Scheduling and queue management. Questions. Scheduling mechanisms. Scheduling [1] Scheduling [2]

Traditional queuing behaviour in routers. Scheduling and queue management. Questions. Scheduling mechanisms. Scheduling [1] Scheduling [2] Traditioal queuig behaviour i routers Schedulig ad queue maagemet Data trasfer: datagrams: idividual packets o recogitio of flows coectioless: o sigallig Forwardig: based o per-datagram, forwardig table

More information

Lecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions

Lecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions U.C. Berkeley CS170 : Algorithms Midterm 1 Solutios Lecturers: Sajam Garg ad Prasad Raghavedra Feb 1, 017 Midterm 1 Solutios 1. (4 poits) For the directed graph below, fid all the strogly coected compoets

More information

Assignment 5; Due Friday, February 10

Assignment 5; Due Friday, February 10 Assigmet 5; Due Friday, February 10 17.9b The set X is just two circles joied at a poit, ad the set X is a grid i the plae, without the iteriors of the small squares. The picture below shows that the iteriors

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

K-NET bus. When several turrets are connected to the K-Bus, the structure of the system is as showns

K-NET bus. When several turrets are connected to the K-Bus, the structure of the system is as showns K-NET bus The K-Net bus is based o the SPI bus but it allows to addressig may differet turrets like the I 2 C bus. The K-Net is 6 a wires bus (4 for SPI wires ad 2 additioal wires for request ad ackowledge

More information

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1 Media Access Protocols Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 Where are We? you are here 00010001 11001001 00011101 A midterm is here Sprig 2018 CS 438 Staff, Uiversity of Illiois 2 Multiple Access

More information