Phase-based algorithms for file migration
|
|
- Beatrix Lawrence
- 5 years ago
- Views:
Transcription
1 Phase-based algorithms for file migration Marcin Bieńkowski Jarek Byrka Marcin Mucha University of Wrocław University of Warsaw HALG 2018 (previously on ICALP 2017)
2 File migration Weighted graph "2
3 File migration Weighted graph One shared file of size D "2
4 File migration Weighted graph One shared file of size D One step of input: "2
5 File migration Weighted graph One shared file of size D I want to access a part of the file One step of input: Request to file at v i. "2
6 File migration Request cost = distance Weighted graph One shared file of size D I want to access a part of the file One step of input: Request to file at v i. "2
7 File migration Request cost = distance Weighted graph One shared file of size D Migration cost = D * distance I want to access a part of the file One step of input: Request to file at v i. Optional migration. "2
8 File migration Request cost = distance One step of input: Request to file at vi. Optional migration. Weighted graph One shared file of size D I want to access a part of the file Migration cost = D * distance "2 Online problem Competitive ratio: maxi ALG(I) / OPT(I)
9 What is known (deterministic algorithms and large D) Trees 3-competitive algorithm exists It is optimal "3
10 What is known (deterministic algorithms and large D) Trees 3-competitive algorithm exists It is optimal General graphs Best lower bound = Best algorithm (Move-To-Local-Min) is competitive [Bartal, Charikar, Indyk 97] "3
11 Move-To-Local-Min (4.086-competitive) Works in phases of length c D = Θ(D). A 0 "4
12 Move-To-Local-Min (4.086-competitive) Works in phases of length c D = Θ(D). Within a phase: pay for requests r 1, r 2,,r cd A 0 "4
13 Move-To-Local-Min (4.086-competitive) Works in phases of length c D = Θ(D). Within a phase: pay for requests r 1, r 2,,r cd A 0 "4
14 Move-To-Local-Min (4.086-competitive) Works in phases of length c D = Θ(D). Within a phase: pay for requests r 1, r 2,,r cd A 0 "4
15 Move-To-Local-Min (4.086-competitive) Works in phases of length c D = Θ(D). Within a phase: pay for requests r 1, r 2,,r cd A 0 "4
16 Move-To-Local-Min (4.086-competitive) Works in phases of length c D = Θ(D). Within a phase: pay for requests r 1, r 2,,r cd A 0 "4
17 Move-To-Local-Min (4.086-competitive) Works in phases of length c D = Θ(D). Within a phase: pay for requests r 1, r 2,,r cd A 0 "4
18 Move-To-Local-Min (4.086-competitive) Works in phases of length c D = Θ(D). Within a phase: pay for requests r 1, r 2,,r cd At the end of a phase: migrate the file to node x minimizing D d(a 0, x) + X c D i=1 d(x, r i) A 0 "4
19 Move-To-Local-Min (4.086-competitive) Works in phases of length c D = Θ(D). Within a phase: pay for requests r 1, r 2,,r cd At the end of a phase: migrate the file to node x minimizing D d(a 0, x) + X c D i=1 d(x, r i) A 0 Make close migrations Migrate towards requests "4
20 Proof for MTLM? A piece of proof: Creative applications of TRIANGLE INEQUALITY "5
21 Can we do better?
22 Can we do better? > "6
23 Can we do better? > "6
24 Recreating MTLM proof Parameters c and α for MTLM "7
25 Recreating MTLM proof Parameters c and α for MTLM LP black box "7
26 Recreating MTLM proof Parameters c and α for MTLM LP black box instance maximizing the comp. ratio "7
27 Recreating MTLM proof Parameters c and α for MTLM LP black box Not an exact description! instance maximizing the comp. ratio "7
28 Recreating MTLM proof Parameters c and α for MTLM LP black box instance maximizing the comp. ratio "7
29 Recreating MTLM proof Parameters c and α for MTLM Optimize numerically LP black box instance maximizing the comp. ratio "7
30 Recreating MTLM proof Parameters c and α for MTLM Optimize numerically LP black box instance maximizing the comp. ratio Comp. ratio = "7
31 Our approach Parameters c and α for MTLM LP black box "8
32 Our approach Parameters c and α for MTLM LP black box "8
33 Our approach Parameters c and α for MTLM LP black box "8
34 Our approach Parameters c and α for MTLM LP black box "8
35 Our approach Parameters c and α for MTLM LP black box "8
36 Our approach Parameters c and α for MTLM LP black box "8
37 Our approach Parameters α, β, γ, δ, ε, λ, for variable-length phase algorithms LP black box "8
38 Our approach Parameters α, β, γ, δ, ε, λ, for variable-length phase algorithms LP black box instance maximizing the comp. ratio "8
39 Our approach Parameters α, β, γ, δ, ε, λ, for variable-length phase algorithms LP black box Optimize by a local search instance maximizing the comp. ratio "8
40 Our approach Parameters α, β, γ, δ, ε, λ, for variable-length phase algorithms LP black box Optimize by a local search instance maximizing the comp. ratio Competitive ratio = 4 "8
41 Thank you! Icons made by Freepik from
Welcome to the course Algorithm Design
Welcome to the course Algorithm Design Summer Term 2011 Friedhelm Meyer auf der Heide Lecture 12, 8.7.2011 Friedhelm Meyer auf der Heide 1 Randomised Algorithms Friedhelm Meyer auf der Heide 2 Topics -
More informationPage migration in dynamic networks
Page migration in dynamic networks Friedhelm Meyer auf der Heide Data management in networks Friedhelm Meyer auf der Heide How to store data items in a network, so that arbitrary sequences of accesses
More informationNP Completeness. Andreas Klappenecker [partially based on slides by Jennifer Welch]
NP Completeness Andreas Klappenecker [partially based on slides by Jennifer Welch] Dealing with NP-Complete Problems Dealing with NP-Completeness Suppose the problem you need to solve is NP-complete. What
More informationCompetitive analysis of aggregate max in windowed streaming. July 9, 2009
Competitive analysis of aggregate max in windowed streaming Elias Koutsoupias University of Athens Luca Becchetti University of Rome July 9, 2009 The streaming model Streaming A stream is a sequence of
More informationCompact Data Representations and their Applications. Moses Charikar Princeton University
Compact Data Representations and their Applications Moses Charikar Princeton University Lots and lots of data AT&T Information about who calls whom What information can be got from this data? Network router
More informationLower-Bounded Facility Location
Lower-Bounded Facility Location Zoya Svitkina Abstract We study the lower-bounded facility location problem, which generalizes the classical uncapacitated facility location problem in that it comes with
More information/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18
601.433/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/27/18 22.1 Introduction We spent the last two lectures proving that for certain problems, we can
More informationORIE 6300 Mathematical Programming I September 2, Lecture 3
ORIE 6300 Mathematical Programming I September 2, 2014 Lecturer: David P. Williamson Lecture 3 Scribe: Divya Singhvi Last time we discussed how to take dual of an LP in two different ways. Today we will
More informationRandomized Optimization Problems on Hierarchically Separated Trees
Randomized Optimization Problems on Hierarchically Separated Trees Béla Csaba, Tom Plick and Ali Shokoufandeh May 14, 2011 Overview Some combinatorial optimization problems Randomized versions history
More information15.082J and 6.855J. Lagrangian Relaxation 2 Algorithms Application to LPs
15.082J and 6.855J Lagrangian Relaxation 2 Algorithms Application to LPs 1 The Constrained Shortest Path Problem (1,10) 2 (1,1) 4 (2,3) (1,7) 1 (10,3) (1,2) (10,1) (5,7) 3 (12,3) 5 (2,2) 6 Find the shortest
More informationCOMP Online Algorithms. k-server Problem & Advice. Shahin Kamali. Lecture 13 - Oct. 24, 2017 University of Manitoba
COMP 7720 - Online Algorithms k-server Problem & Advice Shahin Kamali Lecture 13 - Oct. 24, 2017 University of Manitoba COMP 7720 - Online Algorithms k-server Problem & Advice 1 / 20 Review & Plan COMP
More informationApproximation Algorithms
Approximation Algorithms Lecture 14 01/25/11 1 - Again Problem: Steiner Tree. Given an undirected graph G=(V,E) with non-negative edge costs c : E Q + whose vertex set is partitioned into required vertices
More information1 Metric spaces. d(x, x) = 0 for all x M, d(x, y) = d(y, x) for all x, y M,
1 Metric spaces For completeness, we recall the definition of metric spaces and the notions relating to measures on metric spaces. A metric space is a pair (M, d) where M is a set and d is a function from
More informationTraveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R + Goal: find a tour (Hamiltonian cycle) of minimum cost
Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R + Goal: find a tour (Hamiltonian cycle) of minimum cost Traveling Salesman Problem (TSP) Input: undirected graph G=(V,E), c: E R
More informationLecture Overview. 2 Shortest s t path. 2.1 The LP. 2.2 The Algorithm. COMPSCI 530: Design and Analysis of Algorithms 11/14/2013
COMPCI 530: Design and Analysis of Algorithms 11/14/2013 Lecturer: Debmalya Panigrahi Lecture 22 cribe: Abhinandan Nath 1 Overview In the last class, the primal-dual method was introduced through the metric
More informationImproved approximation algorithms for the facility location problems with linear/submodular penalty
Improved approximation algorithms for the facility location problems with linear/submodular penalty Yu Li 1,2, Donglei Du 2, Naihua Xiu 1, and Dachuan Xu 3 1 Department of Mathematics, School of Science,
More informationOnline Algorithms. Lecture 11
Online Algorithms Lecture 11 Today DC on trees DC on arbitrary metrics DC on circle Scheduling K-server on trees Theorem The DC Algorithm is k-competitive for the k server problem on arbitrary tree metrics.
More informationGreedy algorithms Or Do the right thing
Greedy algorithms Or Do the right thing March 1, 2005 1 Greedy Algorithm Basic idea: When solving a problem do locally the right thing. Problem: Usually does not work. VertexCover (Optimization Version)
More informationScribe from 2014/2015: Jessica Su, Hieu Pham Date: October 6, 2016 Editor: Jimmy Wu
CS 267 Lecture 3 Shortest paths, graph diameter Scribe from 2014/2015: Jessica Su, Hieu Pham Date: October 6, 2016 Editor: Jimmy Wu Today we will talk about algorithms for finding shortest paths in a graph.
More informationOnline file caching with rejection penalties
Online file caching with rejection penalties Leah Epstein Csanád Imreh Asaf Levin Judit Nagy-György Abstract In the file caching problem, the input is a sequence of requests for files out of a slow memory.
More informationarxiv: v1 [cs.ma] 8 May 2018
Ordinal Approximation for Social Choice, Matching, and Facility Location Problems given Candidate Positions Elliot Anshelevich and Wennan Zhu arxiv:1805.03103v1 [cs.ma] 8 May 2018 May 9, 2018 Abstract
More informationLecture 3. Corner Polyhedron, Intersection Cuts, Maximal Lattice-Free Convex Sets. Tepper School of Business Carnegie Mellon University, Pittsburgh
Lecture 3 Corner Polyhedron, Intersection Cuts, Maximal Lattice-Free Convex Sets Gérard Cornuéjols Tepper School of Business Carnegie Mellon University, Pittsburgh January 2016 Mixed Integer Linear Programming
More informationSketching Asynchronous Streams Over a Sliding Window
Sketching Asynchronous Streams Over a Sliding Window Srikanta Tirthapura (Iowa State University) Bojian Xu (Iowa State University) Costas Busch (Rensselaer Polytechnic Institute) 1/32 Data Stream Processing
More informationNumerical Optimization
Convex Sets Computer Science and Automation Indian Institute of Science Bangalore 560 012, India. NPTEL Course on Let x 1, x 2 R n, x 1 x 2. Line and line segment Line passing through x 1 and x 2 : {y
More informationAn experimental evaluation of incremental and hierarchical k-median algorithms
An experimental evaluation of incremental and hierarchical k-median algorithms Chandrashekhar Nagarajan David P. Williamson January 2, 20 Abstract In this paper, we consider different incremental and hierarchical
More informationGraduate Algorithms CS F-07 Red/Black Trees
Graduate Algorithms CS673-2016F-07 Red/lack Trees David Galles Department of Computer Science University of San Francisco 07-0: inary Search Trees inary Trees For each node n, (value stored at node n)
More informationOnline algorithms for clustering problems
University of Szeged Department of Computer Algorithms and Artificial Intelligence Online algorithms for clustering problems Ph.D. Thesis Gabriella Divéki Supervisor: Dr. Csanád Imreh University of Szeged
More informationAlgorithms for multiflows
Department of Computer Science, Cornell University September 29, 2008, Ithaca Definition of a multiflow We are given an undirected graph G = (V, E) and a set of terminals A V. A multiflow, denoted by x
More informationarxiv: v2 [cs.ds] 8 May 2018
Approximating Node-Weighted k-mst on Planar Graphs Jaros law Byrka 1, Mateusz Lewandowski 2, and Joachim Spoerhase 3 arxiv:1801.00313v2 [cs.ds] 8 May 2018 1 Institute of Computer Science, University of
More informationApproximation Algorithms: The Primal-Dual Method. My T. Thai
Approximation Algorithms: The Primal-Dual Method My T. Thai 1 Overview of the Primal-Dual Method Consider the following primal program, called P: min st n c j x j j=1 n a ij x j b i j=1 x j 0 Then the
More informationTopology Control in Wireless Networks 4/24/06
Topology Control in Wireless Networks 4/4/06 1 Topology control Choose the transmission power of the nodes so as to satisfy some properties Connectivity Minimize power consumption, etc. Last class Percolation:
More informationAn O(log n/ log log n)-approximation Algorithm for the Asymmetric Traveling Salesman Problem
An O(log n/ log log n)-approximation Algorithm for the Asymmetric Traveling Salesman Problem and more recent developments CATS @ UMD April 22, 2016 The Asymmetric Traveling Salesman Problem (ATSP) Problem
More informationROUGH MEMBERSHIP FUNCTIONS: A TOOL FOR REASONING WITH UNCERTAINTY
ALGEBRAIC METHODS IN LOGIC AND IN COMPUTER SCIENCE BANACH CENTER PUBLICATIONS, VOLUME 28 INSTITUTE OF MATHEMATICS POLISH ACADEMY OF SCIENCES WARSZAWA 1993 ROUGH MEMBERSHIP FUNCTIONS: A TOOL FOR REASONING
More informationUNIVERSIDAD CARLOS III DE MADRID Escuela Politécnica Superior Departamento de Matemáticas
UNIVERSIDAD CARLOS III DE MADRID Escuela Politécnica Superior Departamento de Matemáticas a t e a t i c a s PROBLEMS, CALCULUS I, st COURSE. FUNCTIONS OF A REAL VARIABLE BACHELOR IN: Audiovisual System
More informationIntroduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/18/14
600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Approximation algorithms Date: 11/18/14 23.1 Introduction We spent last week proving that for certain problems,
More informationAdvanced Operations Research Techniques IE316. Quiz 1 Review. Dr. Ted Ralphs
Advanced Operations Research Techniques IE316 Quiz 1 Review Dr. Ted Ralphs IE316 Quiz 1 Review 1 Reading for The Quiz Material covered in detail in lecture. 1.1, 1.4, 2.1-2.6, 3.1-3.3, 3.5 Background material
More information11. APPROXIMATION ALGORITHMS
11. APPROXIMATION ALGORITHMS load balancing center selection pricing method: vertex cover LP rounding: vertex cover generalized load balancing knapsack problem Lecture slides by Kevin Wayne Copyright 2005
More informationNon-Preemptive Buffer Management for Latency Sensitive Packets
Non-Preemptive Buffer Management for Latency Sensitive Packets Moran Feldman Technion Haifa, Israel Email: moranfe@cs.technion.ac.il Joseph (Seffi) Naor Technion Haifa, Israel Email: naor@cs.technion.ac.il
More informationCOMP Online Algorithms. Online Graph Problems. Shahin Kamali. Lecture 23 - Nov. 28th, 2017 University of Manitoba
COMP 7720 - Online Algorithms Online Graph Problems Shahin Kamali Lecture 23 - Nov. 28th, 2017 University of Manitoba COMP 7720 - Online Algorithms Online Graph Problems 1 / 13 Review & Plan COMP 7720
More informationOn Finding Dense Subgraphs
On Finding Dense Subgraphs Barna Saha (Joint work with Samir Khuller) Department of Computer Science University of Maryland, College Park, MD 20742 36th ICALP, 2009 Density for Undirected Graphs Given
More informationA Primal-Dual Approximation Algorithm for Partial Vertex Cover: Making Educated Guesses
A Primal-Dual Approximation Algorithm for Partial Vertex Cover: Making Educated Guesses Julián Mestre Department of Computer Science University of Maryland, College Park, MD 20742 jmestre@cs.umd.edu Abstract
More informationval(y, I) α (9.0.2) α (9.0.3)
CS787: Advanced Algorithms Lecture 9: Approximation Algorithms In this lecture we will discuss some NP-complete optimization problems and give algorithms for solving them that produce a nearly optimal,
More informationLagrangian Relaxation: An overview
Discrete Math for Bioinformatics WS 11/12:, by A. Bockmayr/K. Reinert, 22. Januar 2013, 13:27 4001 Lagrangian Relaxation: An overview Sources for this lecture: D. Bertsimas and J. Tsitsiklis: Introduction
More informationAPPROXIMATION ALGORITHMS FOR GEOMETRIC PROBLEMS
APPROXIMATION ALGORITHMS FOR GEOMETRIC PROBLEMS Subhas C. Nandy (nandysc@isical.ac.in) Advanced Computing and Microelectronics Unit Indian Statistical Institute Kolkata 70010, India. Organization Introduction
More informationSymbolic Buffer Sizing for Throughput-Optimal Scheduling of Dataflow Graphs
Symbolic Buffer Sizing for Throughput-Optimal Scheduling of Dataflow Graphs Anan Bouakaz Pascal Fradet Alain Girault Real-Time and Embedded Technology and Applications Symposium, Vienna April 14th, 2016
More informationRobust Combinatorial Optimization with Exponential Scenarios
Robust Combinatorial Optimization with Exponential Scenarios Uriel Feige Kamal Jain Mohammad Mahdian Vahab Mirrokni November 15, 2006 Abstract Following the well-studied two-stage optimization framework
More informationLecture Online Algorithms and the k-server problem June 14, 2011
Approximation Algorithms Workshop June 13-17, 2011, Princeton Lecture Online Algorithms and the k-server problem June 14, 2011 Joseph (Seffi) Naor Scribe: Mohammad Moharrami 1 Overview In this lecture,
More informationWelcome to the course Algorithm Design
Welcome to the course Algorithm Design Summer Term 2011 Friedhelm Meyer auf der Heide Lecture 13, 15.7.2011 Friedhelm Meyer auf der Heide 1 Topics - Divide & conquer - Dynamic programming - Greedy Algorithms
More informationBetter approximations for max TSP
Information Processing Letters 75 (2000) 181 186 Better approximations for max TSP Refael Hassin,1, Shlomi Rubinstein Department of Statistics and Operations Research, School of Mathematical Sciences,
More informationApproximation Algorithms for Clustering Uncertain Data
Approximation Algorithms for Clustering Uncertain Data Graham Cormode AT&T Labs - Research graham@research.att.com Andrew McGregor UCSD / MSR / UMass Amherst andrewm@ucsd.edu Introduction Many applications
More informationOnline Algorithms. - Lecture 4 -
Online Algorithms - Lecture 4 - Outline Quick recap.. The Cashing Problem Randomization in Online Algorithms Other views to Online Algorithms The Ski-rental problem The Parking Permit Problem 2 The Caching
More informationComputing Aggregate Functions in Sensor Networks
Computing Aggregate Functions in Sensor Networks Antonio Fernández Anta 1 Miguel A. Mosteiro 1,2 Christopher Thraves 3 1 LADyR, GSyC,Universidad Rey Juan Carlos 2 Dept. of Computer Science, Rutgers University
More informationCoping with NP-Completeness
Coping with NP-Completeness Siddhartha Sen Questions: sssix@cs.princeton.edu Some figures obtained from Introduction to Algorithms, nd ed., by CLRS Coping with intractability Many NPC problems are important
More informationVertex Cover Approximations
CS124 Lecture 20 Heuristics can be useful in practice, but sometimes we would like to have guarantees. Approximation algorithms give guarantees. It is worth keeping in mind that sometimes approximation
More informationModel Manifolds for Surface Groups
Model Manifolds for Surface Groups Talk by Jeff Brock August 22, 2007 One of the themes of this course has been to emphasize how the combinatorial structure of Teichmüller space can be used to understand
More informationOnline Algorithms with Advice
Online Algorithms with Advice Marc Renault Supervisor: Adi Rosén, Algorithms and Complexity LRI August 21, 2010 This report is written in English as the maternal language of Marc Renault is English and
More informationOn-line End-to-End Congestion Control
On-line End-to-End Congestion Control Naveen Garg IIT Delhi Neal Young UC Riverside the Internet hard to predict dynamic large End-to-end (design principle of Internet) server end user Routers provide
More informationMATH 1A MIDTERM 1 (8 AM VERSION) SOLUTION. (Last edited October 18, 2013 at 5:06pm.) lim
MATH A MIDTERM (8 AM VERSION) SOLUTION (Last edited October 8, 03 at 5:06pm.) Problem. (i) State the Squeeze Theorem. (ii) Prove the Squeeze Theorem. (iii) Using a carefully justified application of the
More informationDesign of High-Performance Filter Banks for Image Coding
Design of High-Performance Filter Banks for Image Coding Di Xu Michael D. Adams Dept. of Elec. and Comp. Engineering University of Victoria, Canada IEEE Symposium on Signal Processing and Information Technology,
More information1 The Traveling Salesperson Problem (TSP)
CS 598CSC: Approximation Algorithms Lecture date: January 23, 2009 Instructor: Chandra Chekuri Scribe: Sungjin Im In the previous lecture, we had a quick overview of several basic aspects of approximation
More information4. Definition: topological space, open set, topology, trivial topology, discrete topology.
Topology Summary Note to the reader. If a statement is marked with [Not proved in the lecture], then the statement was stated but not proved in the lecture. Of course, you don t need to know the proof.
More informationLecture 7: Asymmetric K-Center
Advanced Approximation Algorithms (CMU 18-854B, Spring 008) Lecture 7: Asymmetric K-Center February 5, 007 Lecturer: Anupam Gupta Scribe: Jeremiah Blocki In this lecture, we will consider the K-center
More informationOnline Strategies for Intra and Inter Provider Service Migration in Virtual Networks
Online Strategies for Intra and Inter Provider Service Migration in Virtual Networks or/and: How to migrate / allocate resources when you don t know the future? Co-authors: Dushyant Arora Marcin Bienkowski
More informationLecture 19: Convex Non-Smooth Optimization. April 2, 2007
: Convex Non-Smooth Optimization April 2, 2007 Outline Lecture 19 Convex non-smooth problems Examples Subgradients and subdifferentials Subgradient properties Operations with subgradients and subdifferentials
More informationThe k-center problem Approximation Algorithms 2009 Petros Potikas
Approximation Algorithms 2009 Petros Potikas 1 Definition: Let G=(V,E) be a complete undirected graph with edge costs satisfying the triangle inequality and k be an integer, 0 < k V. For any S V and vertex
More informationBroadcast Scheduling: Algorithms and Complexity
Broadcast Scheduling: Algorithms and Complexity JESSICA CHANG Department of Computer Science and Engineering University of Washington, Seattle THOMAS ERLEBACH Department of Computer Science University
More information2. Metric and Topological Spaces
2 Metric and Topological Spaces Topology begins where sets are implemented with some cohesive properties enabling one to define continuity Solomon Lefschetz In order to forge a language of continuity,
More informationEnclosures of Roundoff Errors using SDP
Enclosures of Roundoff Errors using SDP Victor Magron, CNRS Jointly Certified Upper Bounds with G. Constantinides and A. Donaldson Metalibm workshop: Elementary functions, digital filters and beyond 12-13
More informationPartha Sarathi Mandal
MA 515: Introduction to Algorithms & MA353 : Design and Analysis of Algorithms [3-0-0-6] Lecture 39 http://www.iitg.ernet.in/psm/indexing_ma353/y09/index.html Partha Sarathi Mandal psm@iitg.ernet.in Dept.
More informationApproximation Techniques for Utilitarian Mechanism Design
Approximation Techniques for Utilitarian Mechanism Design Department of Computer Science RWTH Aachen Germany joint work with Patrick Briest and Piotr Krysta 05/16/2006 1 Introduction to Utilitarian Mechanism
More informationTripod Configurations
Tripod Configurations Eric Chen, Nick Lourie, Nakul Luthra Summer@ICERM 2013 August 8, 2013 Eric Chen, Nick Lourie, Nakul Luthra (S@I) Tripod Configurations August 8, 2013 1 / 33 Overview 1 Introduction
More informationThe Prices of Packets: End-to-end delay Guarantees in Unreliable Networks
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License. See http://creativecommons.org/licenses/by-nc-nd/3.0/ The Prices of Packets: End-to-end
More informationOnline Computation with Advice
Online Computation with Advice Yuval Emek Pierre Fraigniaud Amos Korman Adi Rosén Abstract We consider a model for online computation in which the online algorithm receives, together with each request,
More informationThe Wide-Area Virtual Service Migration Problem: A Competitive Analysis Approach
1 The Wide-Area Virtual Service Migration Problem: A Competitive Analysis Approach Marcin Bienkowski 1, Anja Feldmann 2, Johannes Grassler 2, Gregor Schaffrath 2, Stefan Schmid 2 1 Institute of Computer
More informationDefinition A metric space is proper if all closed balls are compact. The length pseudo metric of a metric space X is given by.
Chapter 1 Geometry: Nuts and Bolts 1.1 Metric Spaces Definition 1.1.1. A metric space is proper if all closed balls are compact. The length pseudo metric of a metric space X is given by (x, y) inf p. p:x
More informationOptimality Bounds for a Variational Relaxation of the Image Partitioning Problem
Optimality Bounds for a Variational Relaxation of the Image Partitioning Problem Jan Lellmann, Frank Lenzen, Christoph Schnörr Image and Pattern Analysis Group Universität Heidelberg EMMCVPR 2011 St. Petersburg,
More informationSimpler Approximation of the Maximum Asymmetric Traveling Salesman Problem
Simpler Approximation of the Maximum Asymmetric Traveling Salesman Problem Katarzyna Paluch 1, Khaled Elbassioni 2, and Anke van Zuylen 2 1 Institute of Computer Science, University of Wroclaw ul. Joliot-Curie
More informationLower Bounds for. Local Approximation. Mika Göös, Juho Hirvonen & Jukka Suomela (HIIT) Göös et al. (HIIT) Local Approximation 2nd April / 19
Lower Bounds for Local Approximation Mika Göös, Juho Hirvonen & Jukka Suomela (HIIT) Göös et al. (HIIT) Local Approximation nd April 0 / 9 Lower Bounds for Local Approximation We prove: Local algorithms
More informationCOMPUTING MINIMUM SPANNING TREES WITH UNCERTAINTY
Symposium on Theoretical Aspects of Computer Science 2008 (Bordeaux), pp. 277-288 www.stacs-conf.org COMPUTING MINIMUM SPANNING TREES WITH UNCERTAINTY THOMAS ERLEBACH 1, MICHAEL HOFFMANN 1, DANNY KRIZANC
More informationTwo person zero-sum fuzzy matrix games and extensions
Two person zero-sum fuzzy matrix games and extensions Rajani Singh Institute of Applied Mathematics and Mechanics, Universit of Warsaw, Poland Abstract June 6, 2015 In this work, fuzzy Linear programming
More informationMetric Techniques and Approximation Algorithms. Anupam Gupta Carnegie Mellon University
Metric Techniques and Approximation Algorithms Anupam Gupta Carnegie Mellon University Metric space M = (V, d) set Vof points y z distances d(x,y) triangle inequality d(x,y) d(x,z) + d(z,y) x why metric
More informationElementary Topology. Note: This problem list was written primarily by Phil Bowers and John Bryant. It has been edited by a few others along the way.
Elementary Topology Note: This problem list was written primarily by Phil Bowers and John Bryant. It has been edited by a few others along the way. Definition. properties: (i) T and X T, A topology on
More informationCOMP 355 Advanced Algorithms Approximation Algorithms: VC and TSP Chapter 11 (KT) Section (CLRS)
COMP 355 Advanced Algorithms Approximation Algorithms: VC and TSP Chapter 11 (KT) Section 35.1-35.2(CLRS) 1 Coping with NP-Completeness Brute-force search: This is usually only a viable option for small
More informationRandomized Algorithms 2017A - Lecture 10 Metric Embeddings into Random Trees
Randomized Algorithms 2017A - Lecture 10 Metric Embeddings into Random Trees Lior Kamma 1 Introduction Embeddings and Distortion An embedding of a metric space (X, d X ) into a metric space (Y, d Y ) is
More informationLinear Programming in Small Dimensions
Linear Programming in Small Dimensions Lekcija 7 sergio.cabello@fmf.uni-lj.si FMF Univerza v Ljubljani Edited from slides by Antoine Vigneron Outline linear programming, motivation and definition one dimensional
More informationAlgorithms for Nearest Neighbors
Algorithms for Nearest Neighbors Classic Ideas, New Ideas Yury Lifshits Steklov Institute of Mathematics at St.Petersburg http://logic.pdmi.ras.ru/~yura University of Toronto, July 2007 1 / 39 Outline
More informationPrivately Solving Linear Programs
Privately Solving Linear Programs Justin Hsu 1 Aaron Roth 1 Tim Roughgarden 2 Jonathan Ullman 3 1 University of Pennsylvania 2 Stanford University 3 Harvard University July 8th, 2014 A motivating example
More information15.083J Integer Programming and Combinatorial Optimization Fall Enumerative Methods
5.8J Integer Programming and Combinatorial Optimization Fall 9 A knapsack problem Enumerative Methods Let s focus on maximization integer linear programs with only binary variables For example: a knapsack
More informationLecture 19 Subgradient Methods. November 5, 2008
Subgradient Methods November 5, 2008 Outline Lecture 19 Subgradients and Level Sets Subgradient Method Convergence and Convergence Rate Convex Optimization 1 Subgradients and Level Sets A vector s is a
More informationThe black-box complexity of nearest neighbor search
The black-box complexity of nearest neighbor search Robert Krauthgamer James R. Lee January 25, 2005 Abstract We define a natural notion of efficiency for approximate nearest-neighbor (ANN) search in general
More informationOn the Max Coloring Problem
On the Max Coloring Problem Leah Epstein Asaf Levin May 22, 2010 Abstract We consider max coloring on hereditary graph classes. The problem is defined as follows. Given a graph G = (V, E) and positive
More informationAutomated Lookahead Data Migration in SSD-enabled Multi-tiered Storage Systems
Automated Lookahead Data Migration in SSD-enabled Multi-tiered Storage Systems Gong Zhang, Ling Liu Georgia Institute of Technology Lawrence Chiu, Clem Dickey, Paul Muench IBM Almaden Research Center 2010/5/6
More informationAnalytical Solid Geometry
Analytical Solid Geometry Distance formula(without proof) Division Formula Direction cosines Direction ratios Planes Straight lines Books Higher Engineering Mathematics by B S Grewal Higher Engineering
More informationMVE165/MMG630, Applied Optimization Lecture 8 Integer linear programming algorithms. Ann-Brith Strömberg
MVE165/MMG630, Integer linear programming algorithms Ann-Brith Strömberg 2009 04 15 Methods for ILP: Overview (Ch. 14.1) Enumeration Implicit enumeration: Branch and bound Relaxations Decomposition methods:
More informationCollege of Computer & Information Science Fall 2007 Northeastern University 14 September 2007
College of Computer & Information Science Fall 2007 Northeastern University 14 September 2007 CS G399: Algorithmic Power Tools I Scribe: Eric Robinson Lecture Outline: Linear Programming: Vertex Definitions
More informationLecture 1: An Introduction to Online Algorithms
Algoritmos e Incerteza (PUC-Rio INF979, 017.1) Lecture 1: An Introduction to Online Algorithms Mar 1, 017 Lecturer: Marco Molinaro Scribe: Joao Pedro T. Brandao Online algorithms differ from traditional
More information/ Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang
600.469 / 600.669 Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang 9.1 Linear Programming Suppose we are trying to approximate a minimization
More information12 Introduction to LP-Duality
12 Introduction to LP-Duality A large fraction of the theory of approximation algorithms, as we know it today, is built around linear programming (LP). In Section 12.1 we will review some key concepts
More informationPi at School. Arindama Singh Department of Mathematics Indian Institute of Technology Madras Chennai , India
Pi at School rindama Singh epartment of Mathematics Indian Institute of Technology Madras Chennai-600036, India Email: asingh@iitm.ac.in bstract: In this paper, an attempt has been made to define π by
More informationCertification of Roundoff Errors with SDP Relaxations and Formal Interval Methods
Certification of Roundoff Errors with SDP Relaxations and Formal Interval Methods Victor Magron, CNRS VERIMAG Jointly Certified Upper Bounds with G. Constantinides and A. Donaldson Jointly Certified Lower
More information