Revisiting Connected Dominating Sets: An Optimal Local Algorithm?

Size: px
Start display at page:

Download "Revisiting Connected Dominating Sets: An Optimal Local Algorithm?"

Transcription

1 Reisiting Connected Dominating Sets: An Otimal Local Algorithm? Samir Khller Deartment of Comter Science Uniersity of Maryland College Park, MD 0740, USA Sheng Yang Deartment of Comter Science Uniersity of Maryland College Park, MD 0740, USA Abstract In this aer we consider the classical Connected Dominating Set (CDS) roblem. Twenty years ago, Gha and Khller deeloed two algorithms for this roblem - a centralized greedy aroach with an aroximation garantee of +, and a local greedy aroach with an aroximation garantee of ( + ) (where H() is the harmonic fnction, and is the maximm degree in the grah). A local greedy algorithm ses significantly less information abot the grah, and can be sefl in a ariety of contexts. Howeer, a fndamental qestion remained - can we get a local greedy algorithm with the same erformance garantee as the global greedy algorithm withot the enalty of the mltilicatie factor of in the aroximation factor? In this aer, we answer that qestion in the affirmatie. I. INTRODUCTION A connected dominating set (CDS) in a grah is a sbset of ertices that indces a connected sbgrah, and is also a dominating set at the same time. A dominating set is a sbset of ertices sch that eery node in the grah, is either in the dominating set, or adjacent to a node in the dominating set. Finding a minimm connected dominating set is NP-hard, and ths for the last twenty years, researchers hae exlored aroximation algorithms for this roblem starting with the work of Gha and Khller [7]. One of the original motiations for the roblem was in bilding a backbone for roting in the context of wireless ad hoc networks. Oer time many other alications hae been exlored in the context of social networks and AI [], []. See other alications and reslts in the book by D and Wan [4]. In their aer, Gha and Khller [7] deeloed two simle aroaches - the first one is a local aroach, where we start from a single ertex in the soltion, and incrementally (greedily) add neighboring nodes while maintaining a connected sbset of nodes at all times. It is temting to imagine that adding one node at a time, maintaining connectiity might work well. Howeer, this does not work and there are instances where we might end with a soltion with (n) nodes, while the otimm soltion has only O() nodes! Interestingly, a simle modification of this algorithm that exlores a -ho neighborhood making greedy choices at each ste that inoles selecting to two nodes at each ste, works mch better and This work was recently awarded the ESA Test of Time Award. they show that a ( + ) aroximation can be obtained for this roblem (H(n) = P n i= i is harmonic fnction, and is the largest degree in the grah). The main benefits of the local algorithm are that no knowledge of the entire grah is needed at each ste, and only the art of the exlored grah sffices to select the next node. This may not be a sefl for a static grah, as yo can calclate it once and foreer. Bt to get a CDS for a grah that changes dynamically, like social networks or wireless ad hoc networks, limiting the amont of information reqired can be both imortant and challenging. They also deeloed an imroed global algorithm that is again a greedy algorithm, and constrcts a soltion that does not maintain any connectiity roerty, and is only connected at the ery end. This centralized greedy algorithm yields a bond of + O(), eliminating the factor of, and gets s close to the lower bond on this roblem of ( ) de to set coer hardness [6]. Desite mch interest (see book by D and Wan [4]), the key qestion remained oen for two decades - is there a local algorithm that gies s the same bond as the global algorithm? In this aer, we answer this qestion in the affirmatie. We deelo a ery simle local algorithm, and are able to show that it matches the bond of the global algorithm. Sch a reslt is esecially srrising de to its simlicity. Connected Dominating Sets became a central toic in the context of wireless ad hoc networks, where the CDS acts as a roting backbone for acket roting. Often it is exensie to connect all the nodes, as the cost can become rohibitie, and in this case it is fine to connect most of the nodes (or a gien fraction). Li and Liang [0] formalized the roblem of artial connected dominating sets (PCDS) and roided heristics withot erformance garantees. Arachenko et al. [] defined the bdgeted connected dominating set roblem (BCDS) where we hae a bdget of k nodes and we wish to find a connected set of at most k nodes that maximizes the nmber of nodes it can coer. Insired by alications in social networks, they deeloed ractical heristics sing only local information. Khller et al. [9] deeloed the first algorithms with theoretical garantees for both these roblems with aroximation factors of O(ln ) for PCDS and 3 e for BCDS. Extensions to node weighted ersions were considered

2 by Gha and Khller [] as well. Extensie research was sbseqently done on this toic with the deeloment of distribted algorithms [], as well as for many secial classes of grahs [4]. A. Or Contribtions Or reslts can be smmarized as follows - In Section III, for the Connected Dominating Set roblem, we obtain the first local information algorithm whose aroximation ratio is within additie constant to global algorithm, i.e. + O(). To be recise, or aroximation garantee is H( + ) +. This algorithm reqires -ho local information (see Section II for definition). - In Section IV, with -ho local information, we obtain an + + aroximation algorithm. In addition to better aroximation ratio, it also rns faster than the Randomized CDS algorithm [7] (Section II-C), becase it exlores fewer nodes. II. BACKGROUND We first reiew existing aroaches [7], []. A. Global Algorithm for CDS The global algorithm rns in two hases. Initially, all nodes are colored white. In the first hase, the algorithm iteratiely adds a node to the soltion, colors it black and all its adjacent white nodes gray. A iece is defined as a white node or a black connected comonent. A new node is chosen to be colored black to get maximm redction in the nmber of ieces. This hase ends when no sch node exists that can gie non-zero redctions. At this time, there are no white nodes left. Intitiely seaking, black nodes are selected nodes, gray nodes are nodes that are dominated, i.e. adjacent to black nodes. In the second hase, we start with a dominating set that consists of seeral black comonents that we need to connect. The connection is done by recrsiely connecting airs of black comonents with a chain of ertices, ntil there is only one black comonent, which will be or final soltion. The aroximation ratio for this algorithm is +, where H(n) is harmonic fnction. B. -ho Local Information Algorithm for CDS The same aer roosed another algorithm, sing only local information. Instead of sing information abot the entire grah, it only relies on information within -hos to the nodes chosen in the soltion. The formal definition of local information is as follows. Before we define what local information is, we first define the distance between a node and a set of nodes. Definition (Distance): In an ndirected grah, denote the distance between and in a grah as d(, ). It is the length of shortest ath from to. d(, S) is defined to be min S d(, ) We now define the local neighborhood of some node, or a set of nodes. Definition (Local Neighborhood): Gien a set of nodes S in grah G, the r-ho neighborhood arond S is the indced sbgrah of G containing all nodes sch that d(, S) ale r. We denote the r-ho neighborhood as N r (S). When there is no confsion, we se the same notation to denote the set N r (S) ={ d(, S) ale r}. An algorithm with local information ses information only within the local neighborhood of the nodes it has chosen. To be secific, if at some ste, the set of nodes that an algorithm has chosen is S, and we hae r-ho local information, then we know the indced grah of N r (S), as well as the degree of nodes in N r (S)/N r (S). From an arbitrary starting node, nodes are added iteratiely. For each loo in this algorithm, one chooses a node, or a node and one of its neighbors. This means we need knowledge of - ho neighborhood to maximize the nmber of newly coered nodes, which exlains why it ses -hos of local information. Algorithm : CDS with -ho Local Information Data: Grah G =(V,E) Reslt: A connected dominating set S s an arbitrary node; S {s}; 3 while S is not a dominating set do 4 S a node in N (S) or a node in N (S) and one of its neighbors in N () (which also lies in N (S)) that maximize the nmber of newly coered nodes; S S [ S; The aroximation ratio for this algorithm is ( + ). We can imroe it in ractice by maximizing the nmber of newly coered nodes for each new node selected, which is sed in [], bt the theoretical worst case bond is the same. C. -ho Local Information Algorithm for CDS Borgs et al. [] first came with this algorithm, which is based on the reios one. Instead of choosing a node or a air of adjacent nodes greedily, it chooses only one gray node to maximize the nmber of newly coered nodes, and in addition selects one of the newly coered nodes niformly at random. The maximization rocess only reqires -ho neighborhood information, and we do not worry abot the random node we are abot to choose. Not only does this algorithm reqire less information, it rns mch faster. The aroximation ratio is nchanged. D. Insiration Comaring the two algorithms sing global information and local information, we find a ga of factor in the aroximation ratio: () + O() for a local algorithm erss + O() for global algorithm. This looks reasonable: we are always better off when offered more information. Bt is it really the case? Is this ga the rice we aid for lack of information essential, or the same aroximation

3 Algorithm : Randomized CDS with -ho Local Information Data: Grah G =(V,E) Reslt: A connected dominating set S s an arbitrary node; S {s}; 3 while S is not a dominating set do 4 a node in N (S) that maximize the nmber of newly coered nodes; a niformly randomly chosen node from N () N (S), i.e. the newly coered nodes; 6 S S [{, }; Algorithm 3: CDS with -ho Local Information Data: Grah G =(V,E) Reslt: A connected dominating set S s an arbitrary node; S {s}; 3 V N (S); 4 while 9 V, s.t. w + c > 0 do argmax V w + c ; 6 S S [{}; 7 V N (N ()); for all nodes in V, date c,w ; ratio can be achieed regardless of limited information. Or answer is affirmatie: with local information, we can still get +O() aroximation. To be secific, an H( +)+ aroximation. III. IMPROVED -HOP LOCAL INFORMATION ALGORITHM A. Algorithm S is initially any node. Iteratiely add nodes within N (S) to S. When new nodes are added to S, the -ho neighborhood of S exands, and we reeat this rocess. By the end of the rocess, we hae colored all the nodes. Initially, all nodes are white. When a node is added to S, we color it black, and all its white neighbors gray. The selected black nodes will form comonents, and these comonents may merge when additional nodes are selected. At each ste, we look within a -ho neighborhood of S, i.e., among the nodes that are either gray or adjacent to gray nodes. Add the node that maximizes w +c, where c is the nmber of different black comonents connected to, and w is the nmber of white nodes in N (). Or knowledge of the grah is enriched when we add nodes to or soltion. The algorithm ends when there is no sch that w +c > 0. Note that if was gray before the selection, c is garanteed to be greater or eqal to. If it was white, c =0. Fig.. Consider and as otential choices. For node, c =, as there is only adjacent comonent. Note that w =4, it has for white neighbors, and itself is not white, hence w + c =. For node, since it is white, there is no adjacent black comonent, so c =0. Note w eqals 3, since both node itself and two of its neighbors are white. So the ale is w + c =6+0 =. For comleteness, here is the sedo code. ) Correctness: First we roe that what we get is a dominating set. If not, then there exists a node that is not dominated, i.e. a white node. Bt w +c =w +0 > 0, we wold hae added this node to or soltion, a contradiction. Next, we roe the following theorem that this dominating set is indeed connected. Theorem 3: The soltion retrned by Algorithm 3 is connected. We hae the following obseration: Obseration 4: When a node is added to or soltion, it is within -hos of some black node. It is tre becase otherwise, this node wold be beyond or knowledge and wold not be considered at this ste. This ensres the following corollary: Corollary : Each newly added node can be connected to existing comonents at the cost of at most one additional node. Proof: [Proof of Theorem 3] We roe this by contradiction. Sose the algorithm gies a dominating set that is not connected, i.e. has more than one comonent. Exactly one of these comonents will contain the starting node, call it starting comonent. Consider the first time when a node otside the starting comonent joins or soltion. According to Corollary, there mst exist another node that can join to the starting comonent. Since is disconnected from the starting comonent, is not in or soltion. Bt at the end of the algorithm, w +c 0+ > 0, which means that can be added to or algorithm. This gies a contradiction. So or algorithm will indeed gie a connected dominating set. B. Analysis We are going to se a charging scheme to charge the cost of each selected node and bond the total charge, which in trn bonds the nmber of nodes we select. Before that, we define an ncharged black node as: Definition 6: An ncharged black node is a node that was charged once when it trned directly from white to black, and has not been charged afterwards. For ncharged black nodes, the following lemma holds. Lemma 7: Each comonent contains exactly one ncharged black node. The roof of this lemma will come later. Recall in the algorithm, we select a node that maximizes w + c, where w is the nmber of white nodes in

4 N (), and c is the nmber of black comonents adjacent to. We charge for selecting this node, and slit this charge into w + c shares. For eery white neighbor of, it takes two shares, i.e. gets /(w + c ) charge. For all bt one adjacent comonents, a share of charge is laced on the ncharged black node of this comonent (assming the correctness of Lemma 7). Notice may be white or gray before the selection. If it was white, it means that is not adjacent to any black nodes, so c =0, and it is charged one share, i.e. /(w +c ). If it was gray, then nothing needs to be done. In conclsion, if the node was white, the nmber of shares eqals (w )+0+ = w +c ; if the node was gray, the nmber of shares eqals w +(c ) = w +c. This means we are not oer or nder conting charges. A isal exlanation is in Figre. Fig.. Consider the charging for and if they were selected at this ste. For, w + c =, each white neighbor of gets shares. For node, w + c =6+0 =. Each white neighbor gets shares, bt since node goes from white directly to black, it only gets one share, and become an ncharged black node. We now roe the correctness of Lemma 7. Proof: [Proof of Lemma 7] An ncharged black node comes into existence when a white node is chosen and added to or soltion. According to the charging scheme, this node itself forms a comonent, and it has exactly one ncharged black node. Comonents are connected when a gray node is chosen which connects seeral comonents. Since all bt one comonent was charged, assming all existing comonents hae exactly one ncharged black node, the reslting comonent also has exactly one ncharged black node. A isal exlanation is in Figre 3. w Fig. 3. Sose the black nodes are already chosen, and we are adding node to the soltion. There are two black comonents adjacent to, so c =. Ths w +c =4+ =. Each white neighbor of gets shares. For the two comonents, all bt one comonent will get a share. This share is charged against the ncharged black node (node w for the left comonent and node for the right comonent) of the comonent, which may not be the node adjacent to. After charging, the two comonents are merged, and the merged comonent still has exactly one ncharged black node, i.e. node. Note there is no charge against node. Eerything reared, we state the main theorem and roe it by bonding the total charge. Theorem (Main Theorem for -ho Local Information Algorithm): The imroed -ho local information greedy algorithm gies H( + ) + aroximation. Proof: [Proof of Theorem ] Sose the otimal soltion is OPT, OPT = k, with ertices OPT, OPT,..., OPTk. We artition all nodes into S OPT, S OPT,...,S OPTk. Withot loss of generality, we reorder the nodes, and se i to denote ertex OPTi. So S i contains ertex i and its neighbors. Ties are broken arbitrarily as long as i S i. Withot loss of generality, we assme that the charge in S i changes at each ste. To describe the total nmber of charges that nodes in S i can receie, we define i as the following ale for S i in ste: w j i + bj i where w j i is the nmber of white nodes in S i at ste, b j i is the nmber of ncharged black nodes at ste in S i. A symbol (e.g. w i,b i ) with an er scrit j, i.e. w j i,bj i,cj i, denotes the corresonding ale at ste. Then i = (i)+ ( (i) is the degree of node i). A white node can receie two charges (in fact all white nodes will receie two charges, excet for one, which is the only ncharged black node when the algorithm ends). Either it will receie two charges when it first becomes gray, and neer receie any more charge. Or it receies one charge when it becomes a ncharged black node, and receies another one to become a charged black node. We hae the following lemma: Lemma 9: When the total charge inside S i changes, i decreases by at least one. Proof: [Proof of Lemma 9] Total charge changes when at least one node in S i receies charges. There can be three cases: this node was white, gray, or black. If this node was white before charging, either it is now gray, which means it receies two charges, or it is now black, meaning one charge. Therefore this node will case i to decrease by or (or more since there can be more than one sch node, i may decreases more than that). If it was gray, it mst hae been flly charged and will not receie any more charge. If it was black, it mst hae been an ncharged black node to receies one charge. In this case, i also decrease one. For all three cases, either there is no charge change in S i, or there is a decrease on i of at least. We se instead of i when there is no confsion. Notice b j i ale cj i, since eery ncharged black node corresonds to a comonent, bt the ncharged black node may not be in S i. Consider each ste. Sose the selected node is. Since node i is also a alid choice, we hae w j + c j w j i + cj i w j i + bj i = The nmber of charges that S i receies at ste is +, so the total charge in this ste is: + w j + c j ale j +

5 This holds when w j i + cj i > 0, which is garanteed to be tre when i > 0. The ineqality will break down when w j =0and c j =, i.e. when w j i + cj i =0. To fix it, we notice S i, 9k i,s.t. ki i > 0, t >k i, t i ale 0. Ths we can take ot the last term and bond it searately. So the total charge ntil ste k i (inclding ste k i ) is er bonded by: k i j= k i = + j= t=+ + k i ale j= t=+ + 0 k i j= j= t=+ + 0 t t + max{ k i + +,} = j + =H( )+(0 k i + + ki+ i ) max{ k i + +,} k i + + k i t=max{ k i + +,} + A + t k i t=max{ k i + +,} max{ k i + +,} k i + + where H(n) = P n i= i is harmonic sm. The last eqality ses the fact that w + c. Using ki+ i ale 0, t i, combined with or assmtion that i decreases at each ste, there is at most one more ste before the whole algorithm stos. So the total amont of charge is er bonded by: ( ki+ i Adding together, we hae, H( )+(0 ki+ i ) ale ( ki+ i + ) ki+ i )+( ki+ i + ) = H( )+ As =w i +b i =w i ale +, the total charge in S i is bonded by H( +)+. Since there are OPT different S i, the total charge is bonded by OPT (H( + ) + ), which is also the er bond for the nmber of nodes we choose. IV. IMPROVED -HOP LOCAL INFORMATION ALGORITHM A. Intition Recall that the algorithm by Borgs et al. [], which selects a random neighbor when a gray node is chosen. It is too exensie to select a random node eery time. If instead of icking a random neighbor eery time, we can ick it with some robability. The total aroximation ratio will be (this is only an intition, detailed roof is in Section IV-C) ( + )( + ) that can be minimized when =. This works gien the assmtion that which is not always the case. is known before hand, B. Algorithm Instead of sing the largest degree in the grah, eery time when calclating, we se the largest degree in the exlored grah. In another world, the largest degree in N (S). Below is the sedocode. Algorithm 4: Imroed Algorithm for CDS with -ho Local Information Data: Grah G =(V,E) Reslt: A connected dominating set S s an arbitrary node; S {s}; 3 while S is not a dominating set do 4 A d the largest degree in N (S); t ; 6 a node in N (S) that maximizes the nmber of newly coered nodes; 7 S S [{}; if with robability then 9 a node from the newly coered nodes niformly at random; 0 S S [{}; C. Analysis Like the reios analysis, we do charging, and artition all the nodes into S,S,...,S OPT in the same manner. We bond the total charge inside S i, and the total nmber of nodes chosen in or soltion that corresonds to these charges. Theorem 0 (Main Theorem for -ho Local Information Algorithm): The imroed -ho local information greedy algorithm gies + + aroximation. Proof: [Proof of Theorem 0] When a node is selected in line 6 in Algorithm 4, we charge, and the charge is niformly diided among all the newly coered nodes. In line 9, another node is chosen with robability =, where d is the largest degree we crrently know. Ths wheneer S i receies charge c at some ste, the exected nmber of nodes in or soltion increases by c( + ). Note that this changes oer time. The analysis for each S i is diided into two hases. The first hase ends when one of the nodes in S i gets chosen. In other words, we come to the second hase when i is within the - ho neighborhood of some chosen node. We first consider the first hase. Let j be a random ariable indicating whether a node in S i is chosen at ste ( ale j ale n). If we denote the total charge S i receied at this ste as, and the corresonding robability of choosing another random neighbor as 0 j, then E[ j] = ( + 0 j ). The first hase will end at ste if j is the first to be. Ths we need to define a stoing time T to bond the total increase in exected nmber of nodes. Definition : Let T be the random ariable denoting the smallest j sch that j =(or n if j =0for all j).

6 With the stoing time T in hand, we can write ot the total increase h in exected nmber of nodes in the first hase PT as E T j= ( + 0 j i, ) which is bonded by the following lemma, Lemma : T E T [ ( + 0 j)] ale + j= Proof: [Proof] We roe it by indction on n. If n =, the left side is + 0 ale + = + H() < +, which is triial. Sose it holds for n = k, we roe it holds for n = k 3 T 4 ( + 0 j) E T j= 3 T = ( + 0 )+Pr[ = 0]E T 4 ( + 0 j) = j= 3 T = ( + 0 )+( 0 )E T 4 ( + 0 j) = j= ale ( + 0 )+( 0 ) + = ale+ + = + + = + The first ineqality is alying indction hyothesis on,, n, and the second ineqality ses the fact that 0 j = for some node, and () ale. So 0 H( ()) j. As for the second hase, wheneer S i receies charge c, the exected nmber of nodes increases by c( + ), =, where d is the largest degree we crrently know. Since d i = ( i ) is already known, we hae d d i. So = ale H(di), which imlies that the increase in exected nmber of nodes in S i is bonded by c. H(di) The total charge is bonded by H(d i ). This can be done sing the standard techniqe in set coer roof [3]. Ths the total nmber of nodes chosen in hase is bonded by H(d i )(+) aleh(d i ) + H(di )! This directly means that exected the size of soltion is bonded by OPT ( + + ), imlying + + aroximation. V. FUTURE WORK With only local information, we get the same aroximation ratio as when we hae global information, for connected dominating set roblem. Is it also the case for other roblems? Or does the lack of information roe to be a hge obstacle for designing algorithms? Or first algorithm reqires information within -hos. When only -ho local information is aailable, we cannot get the same reslt. Comared with reios reslt, the seed and aroximation ratio is imroed, i.e. (+ +). Bt a ga still ersists. Can we do better? Or is this the rice we ay for lack of information? REFERENCES [] Konstantin Arachenko, Prithwish Bas, Gioanni Neglia, Bernardete Ribeiro, and Don Towsley. Pay few, inflence most: Online myoic network coering. In Comter Commnications Workshos (INFOCOM WKSHPS), 04 IEEE Conference on, ages 3. IEEE, 04. [] Christian Borgs, Michael Bratbar, Jennifer Chayes, Sanjee Khanna, and Brendan Lcier. The ower of local information in social networks. In Internet and Network Economics, ages Sringer, 0. [3] Thomas H Cormen. Introdction to algorithms. MIT ress, 009. [4] Ding-Zh D and Peng-Jn Wan. Connected dominating set: theory and alications, olme 77. Sringer Science & Bsiness Media, 0. [] Dedatt Dbhashi, Alessandro Mei, Alessandro Panconesi, Jaikmar Radhakrishnan, and Araind Sriniasan. Fast distribted algorithms for (weakly) connected dominating sets and linear-size skeletons. In Proceedings of the forteenth annal ACM-SIAM symosim on Discrete algorithms, ages Society for Indstrial and Alied Mathematics, 003. [6] Uriel Feige. A threshold of ln n for aroximating set coer. Jornal of the ACM (JACM), 4(4):634 6, 99. [7] Sdito Gha and Samir Khller. Aroximation algorithms for connected dominating sets. Algorithmica, 0(4):374 37, 99. [] Sdito Gha and Samir Khller. Imroed methods for aroximating node weighted steiner trees and connected dominating sets. Information and comtation, 0():7 74, 999. [9] Samir Khller, Manish Prohit, and Kanthi K Saratwar. Analyzing the otimal neighborhood: algorithms for bdgeted and artial connected dominating set roblems. In Proceedings of the Twenty-Fifth Annal ACM-SIAM Symosim on Discrete Algorithms, ages SIAM, 04. [0] Yzhen Li and Weifa Liang. Aroximate coerage in wireless sensor networks. In Local Comter Networks, th Anniersary. The IEEE Conference on, ages 6 7. IEEE, 00. [] Adish Singla, Eric Horitz, Pshmeet Kohli, Ryen White, and Andreas Krase. Information gathering in networks ia actie exloration. In Proceedings of the 4th International Conference on Artificial Intelligence, ages 9 9. AAAI Press, 0. =H(d i )+ H(d i) H(di ) =H(d i )+ H(d i ) ale + Combining the charge from both hases, the exected nmber of nodes chosen in S i is bonded by + +.

Revisiting Connected Dominating Sets: An Optimal Local Algorithm?

Revisiting Connected Dominating Sets: An Optimal Local Algorithm? Revisiting Connected Dominating Sets: An Optimal Local Algorithm? Samir Khuller and Sheng Yang Dept. of Computer Science University of Maryland, College Park, USA samir@cs.umd.edu Dept. of Computer Science

More information

Point Location. The Slab Method. Optimal Schemes. The Slab Method. Preprocess a planar, polygonal subdivision for point location queries.

Point Location. The Slab Method. Optimal Schemes. The Slab Method. Preprocess a planar, polygonal subdivision for point location queries. Point Location The Slab Method Prerocess a lanar, olygonal sbdiision for oint location qeries. = (18, 11) raw a ertical line throgh each ertex. This decomoses the lane into slabs. In each slab, the ertical

More information

EFFICIENT SOLUTION OF SYSTEMS OF ORIENTATION CONSTRAINTS

EFFICIENT SOLUTION OF SYSTEMS OF ORIENTATION CONSTRAINTS EFFICIENT SOLUTION OF SSTEMS OF OIENTATION CONSTAINTS Joseh L. Ganley Cadence Design Systems, Inc. ganley@cadence.com ABSTACT One sbtask in constraint-drien lacement is enforcing a set of orientation constraints

More information

A Distributed Algorithm for Deadlock Detection and Resolution

A Distributed Algorithm for Deadlock Detection and Resolution A Distribted Algorithm for Deadlock Detection and Resoltion Don P. Mitchell Michael J. Merritt AT&T Bell Laboratories ABSTRACT This aer resents two distribted algorithms for detecting and resoling deadlocks.

More information

Lemma 1 Let the components of, Suppose. Trees. A tree is a graph which is. (a) Connected and. (b) has no cycles (acyclic). (b)

Lemma 1 Let the components of, Suppose. Trees. A tree is a graph which is. (a) Connected and. (b) has no cycles (acyclic). (b) Trees Lemma Let the components of ppose "! be (a) $&%('*)+ - )+ / A tree is a graph which is (b) 0 %(')+ - 3)+ / 6 (a) (a) Connected and (b) has no cycles (acyclic) (b) roof Eery path 8 in which is not

More information

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley,

More information

Chapter 7 TOPOLOGY CONTROL

Chapter 7 TOPOLOGY CONTROL Chapter TOPOLOGY CONTROL Oeriew Topology Control Gabriel Graph et al. XTC Interference SINR & Schedling Complexity Distribted Compting Grop Mobile Compting Winter 00 / 00 Distribted Compting Grop MOBILE

More information

COMPOSITION OF STABLE SET POLYHEDRA

COMPOSITION OF STABLE SET POLYHEDRA COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining

More information

Locating and Bypassing Routing Holes in Sensor Networks

Locating and Bypassing Routing Holes in Sensor Networks Locating and Byassing Roting Holes in Sensor Networks Qing Fang Deartment of Electrical Engineering Stanford Uniersity Stanford, A 94305 E-mail: jqfang@stanford.ed Jie Gao Deartment of omter Science Stanford

More information

Minimum Spanning Trees Outline: MST

Minimum Spanning Trees Outline: MST Minimm Spanning Trees Otline: MST Minimm Spanning Tree Generic MST Algorithm Krskal s Algorithm (Edge Based) Prim s Algorithm (Vertex Based) Spanning Tree A spanning tree of G is a sbgraph which is tree

More information

Improving Network Connectivity Using Trusted Nodes and Edges

Improving Network Connectivity Using Trusted Nodes and Edges Improing Network Connectiity Using Trsted Nodes and Edges Waseem Abbas, Aron Laszka, Yegeniy Vorobeychik, and Xenofon Kotsokos Abstract Network connectiity is a primary attribte and a characteristic phenomenon

More information

v e v 1 C 2 b) Completely assigned T v a) Partially assigned Tv e T v 2 p k

v e v 1 C 2 b) Completely assigned T v a) Partially assigned Tv e T v 2 p k Approximation Algorithms for a Capacitated Network Design Problem R. Hassin 1? and R. Rai 2?? and F. S. Salman 3??? 1 Department of Statistics and Operations Research, Tel-Ai Uniersity, Tel Ai 69978, Israel.

More information

Integrated control of RTUs and refrigeration equipment in convenience stores

Integrated control of RTUs and refrigeration equipment in convenience stores Prde University Prde e-pbs International High Performance Bildings Conference School of Mechanical Engineering 2016 Integrated control of RTUs and refrigeration eqiment in convenience stores Donghn Kim

More information

Chapter 5 Network Layer

Chapter 5 Network Layer Chapter Network Layer Network layer Physical layer: moe bit seqence between two adjacent nodes Data link: reliable transmission between two adjacent nodes Network: gides packets from the sorce to destination,

More information

Alliances and Bisection Width for Planar Graphs

Alliances and Bisection Width for Planar Graphs Alliances and Bisection Width for Planar Graphs Martin Olsen 1 and Morten Revsbæk 1 AU Herning Aarhs University, Denmark. martino@hih.a.dk MADAGO, Department of Compter Science Aarhs University, Denmark.

More information

The Disciplined Flood Protocol in Sensor Networks

The Disciplined Flood Protocol in Sensor Networks The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab

More information

Vertex Guarding in Weak Visibility Polygons

Vertex Guarding in Weak Visibility Polygons Vertex Garding in Weak Visibility Polygons Pritam Bhattacharya, Sbir Kmar Ghosh*, Bodhayan Roy School of Technology and Compter Science Tata Institte of Fndamental Research Mmbai 400005, India arxi:1409.46212

More information

Localized Delaunay Triangulation with Application in Ad Hoc Wireless Networks

Localized Delaunay Triangulation with Application in Ad Hoc Wireless Networks 1 Localized Delanay Trianglation with Application in Ad Hoc Wireless Networks Xiang-Yang Li Gria Călinesc Peng-Jn Wan Y Wang Department of Compter Science, Illinois Institte of Technology, Chicago, IL

More information

On shortest-path all-optical networks without wavelength conversion requirements

On shortest-path all-optical networks without wavelength conversion requirements Research Collection Working Paper On shortest-path all-optical networks withot waelength conersion reqirements Athor(s): Erlebach, Thomas; Stefanakos, Stamatis Pblication Date: 2002 Permanent Link: https://doi.org/10.3929/ethz-a-004446054

More information

Randomized algorithms: Two examples and Yao s Minimax Principle

Randomized algorithms: Two examples and Yao s Minimax Principle Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum

More information

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

On Plane Constrained Bounded-Degree Spanners

On Plane Constrained Bounded-Degree Spanners Algorithmica manscript No. (ill be inserted by the editor) 1 On Plane Constrained Bonded-Degree Spanners 2 3 Prosenjit Bose Rolf Fagerberg André an Renssen Sander Verdonschot 4 5 Receied: date / Accepted:

More information

Adaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model

Adaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model International Jornal of Knowledge Engineering, Vol. 1, No. 2, September 215 Adaptie Inflence Maximization in Microblog nder the Competitie Independent Cascade Model Zheng Ding, Kai Ni, and Zhiqiang He

More information

[1] Hopcroft, J., D. Joseph and S. Whitesides, Movement problems for twodimensional

[1] Hopcroft, J., D. Joseph and S. Whitesides, Movement problems for twodimensional Acknoledgement. The athors thank Bill Lenhart for interesting discssions on the recongration of rlers. References [1] Hopcroft, J., D. Joseph and S. Whitesides, Moement problems for todimensional linkages,

More information

POWER-OF-2 BOUNDARIES

POWER-OF-2 BOUNDARIES Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of

More information

Mobility Control and Its Applications in Mobile Ad Hoc Networks

Mobility Control and Its Applications in Mobile Ad Hoc Networks Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai Department of Compter Science and Engineering Florida Atlantic Uniersity Boca Raton, FL 3331 Abstract Most existing localized

More information

Planarity-Preserving Clustering and Embedding for Large Planar Graphs

Planarity-Preserving Clustering and Embedding for Large Planar Graphs Planarity-Presering Clstering and Embedding for Large Planar Graphs Christian A. Dncan, Michael T. Goodrich, and Stephen G. Koboro Center for Geometric Compting The Johns Hopkins Uniersity Baltimore, MD

More information

Fixed-Parameter Algorithms for Cluster Vertex Deletion

Fixed-Parameter Algorithms for Cluster Vertex Deletion Fixed-Parameter Algorithms for Clster Vertex Deletion Falk Hüffner Christian Komsieicz Hannes Moser Rolf Niedermeier Institt für Informatik, Friedrich-Schiller-Uniersität Jena, Ernst-Abbe-Platz 2, D-07743

More information

On Plane Constrained Bounded-Degree Spanners

On Plane Constrained Bounded-Degree Spanners On Plane Constrained Bonded-Degree Spanners Prosenjit Bose 1, Rolf Fagerberg 2, André an Renssen 1, Sander Verdonschot 1 1 School of Compter Science, Carleton Uniersity, Ottaa, Canada. Email: jit@scs.carleton.ca,

More information

An Efficient Video Program Delivery algorithm in Tree Networks*

An Efficient Video Program Delivery algorithm in Tree Networks* 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,

More information

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET Mltiple-Choice Test Chapter 09.0 Golden Section Search Method Optimization COMPLETE SOLUTION SET. Which o the ollowing statements is incorrect regarding the Eqal Interval Search and Golden Section Search

More information

Maximizing the Lifetime of Dominating Sets

Maximizing the Lifetime of Dominating Sets Maximizing the Lifetime of Dominating Sets Thomas Moscibroda and Roger Wattenhofer {moscitho, wattenhofer}@tik.ee.ethz.ch Computer Engineering and Networks Laboratory, ETH Zurich 892 Zurich, Switzerland

More information

SPACE-SCALE DIAGRAMS: UNDERSTANDING MULTISCALE INTERFACES

SPACE-SCALE DIAGRAMS: UNDERSTANDING MULTISCALE INTERFACES SPACE-SCALE DIAGRAMS: UNDERSTANDING MULTISCALE INTERFACES George W. Frnas Bellcore, 445 Soth Street Morristown, NJ 07962-1910 (201) 829-4289 gwf@bellcore.com Benjamin B. Bederson* Bellcore, 445 Soth Street

More information

Friend of My Friend: Network Formation with Two-Hop Benefit

Friend of My Friend: Network Formation with Two-Hop Benefit Friend of My Friend: Network Formation with Two-Hop Benefit Elliot Ansheleich, Onkar Bhardwaj, and Michael Usher Rensselaer Polytechnic Institte, Troy NY, USA Abstract. How and why people form ties is

More information

Assigning AS Relationships to Satisfy the Gao-Rexford Conditions

Assigning AS Relationships to Satisfy the Gao-Rexford Conditions Assigning AS Relationships to Satisfy the Gao-Rexford Conditions Lca Cittadini, Giseppe Di Battista, Thomas Erlebach, Marizio Patrignani, and Massimo Rimondini Dept. of Compter Science and Atomation, Roma

More information

Multiple Source Shortest Paths in a Genus g Graph

Multiple Source Shortest Paths in a Genus g Graph Mltiple Sorce Shortest Paths in a Gens g Graph Sergio Cabello Erin W. Chambers Abstract We gie an O(g n log n) algorithm to represent the shortest path tree from all the ertices on a single specified face

More information

ECE250: Algorithms and Data Structures Single Source Shortest Paths Dijkstra s Algorithm

ECE250: Algorithms and Data Structures Single Source Shortest Paths Dijkstra s Algorithm ECE0: Algorithms and Data Strctres Single Sorce Shortest Paths Dijkstra s Algorithm Ladan Tahildari, PEng, SMIEEE Associate Professor Software Technologies Applied Research (STAR) Grop Dept. of Elect.

More information

Pushing squares around

Pushing squares around Pshing sqares arond Adrian Dmitresc János Pach Ý Abstract We stdy dynamic self-reconfigration of modlar metamorphic systems. We garantee the feasibility of motion planning in a rectanglar model consisting

More information

Directed File Transfer Scheduling

Directed File Transfer Scheduling Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was

More information

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

Complete Information Pursuit Evasion in Polygonal Environments

Complete Information Pursuit Evasion in Polygonal Environments Complete Information Prsit Easion in Polygonal Enironments Kyle Klein and Sbhash Sri Department of Compter Science Uniersity of California Santa Barbara, CA 9306 Abstract Sppose an npredictable eader is

More information

On Bichromatic Triangle Game

On Bichromatic Triangle Game On Bichromatic Triangle Game Gordana Manić Daniel M. Martin Miloš Stojakoić Agst 16, 2012 Abstract We stdy a combinatorial game called Bichromatic Triangle Game, defined as follows. Two players R and B

More information

CS 557 Lecture IX. Drexel University Dept. of Computer Science

CS 557 Lecture IX. Drexel University Dept. of Computer Science CS 7 Lectre IX Dreel Uniersity Dept. of Compter Science Fall 00 Shortest Paths Finding the Shortest Paths in a graph arises in many different application: Transportation Problems: Finding the cheapest

More information

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un Dynamic Maintenance of Majority Information in Constant Time per Update? Gdmnd S. Frandsen and Sven Skym BRICS 1 Department of Compter Science, University of arhs, Ny Mnkegade, DK-8000 arhs C, Denmark

More information

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS Proceedings th FIG Symposim on Deformation Measrements Santorini Greece 00. ABSOUTE DEFORMATION PROFIE MEASUREMENT IN TUNNES USING REATIVE CONVERGENCE MEASUREMENTS Mahdi Moosai and Saeid Khazaei Mining

More information

A Unified Energy-Efficient Topology for Unicast and Broadcast

A Unified Energy-Efficient Topology for Unicast and Broadcast A Unified Energy-Efficient Topology for Unicast and Broadcast Xiang-Yang Li Dept. of Compter Science Illinois Institte of Technology, Chicago, IL, USA xli@cs.iit.ed Wen-Zhan Song School of Eng. & Comp.

More information

Theoretical Analysis of Graphcut Textures

Theoretical Analysis of Graphcut Textures Theoretical Analysis o Grahcut Textures Xuejie Qin Yee-Hong Yang {xu yang}@cs.ualberta.ca Deartment o omuting Science University o Alberta Abstract Since the aer was ublished in SIGGRAPH 2003 the grahcut

More information

Optimal Sampling in Compressed Sensing

Optimal Sampling in Compressed Sensing Optimal Sampling in Compressed Sensing Joyita Dtta Introdction Compressed sensing allows s to recover objects reasonably well from highly ndersampled data, in spite of violating the Nyqist criterion. In

More information

Motivation: Art gallery problem. Polygon decomposition. Art gallery problem: upper bound. Art gallery problem: lower bound

Motivation: Art gallery problem. Polygon decomposition. Art gallery problem: upper bound. Art gallery problem: lower bound CG Lecture 3 Polygon decomposition 1. Polygon triangulation Triangulation theory Monotone polygon triangulation 2. Polygon decomposition into monotone pieces 3. Trapezoidal decomposition 4. Conex decomposition

More information

Constructing Multiple Light Multicast Trees in WDM Optical Networks

Constructing Multiple Light Multicast Trees in WDM Optical Networks Constrcting Mltiple Light Mlticast Trees in WDM Optical Networks Weifa Liang Department of Compter Science Astralian National University Canberra ACT 0200 Astralia wliang@csaneda Abstract Mlticast roting

More information

Reconstructing Generalized Staircase Polygons with Uniform Step Length

Reconstructing Generalized Staircase Polygons with Uniform Step Length Jornal of Graph Algorithms and Applications http://jgaa.info/ ol. 22, no. 3, pp. 431 459 (2018) DOI: 10.7155/jgaa.00466 Reconstrcting Generalized Staircase Polygons with Uniform Step Length Nodari Sitchinaa

More information

Chapter 5. Plane Graphs and the DCEL

Chapter 5. Plane Graphs and the DCEL Chapter 5 Plane Graphs and the DCEL So far we hae been talking abot geometric strctres sch as trianglations of polygons and arrangements of line segments withot paying mch attention to how to represent

More information

Rectangle-of-influence triangulations

Rectangle-of-influence triangulations CCCG 2016, Vancoer, British Colmbia, Ag 3 5, 2016 Rectangle-of-inflence trianglations Therese Biedl Anna Lbi Saeed Mehrabi Sander Verdonschot 1 Backgrond The concept of rectangle-of-inflence (RI) draings

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 9: Synchronization (1) Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Cooperation between Threads

More information

C Puzzles The course that gives CMU its Zip! Integer Arithmetic Operations Jan. 25, Unsigned Addition. Visualizing Integer Addition

C Puzzles The course that gives CMU its Zip! Integer Arithmetic Operations Jan. 25, Unsigned Addition. Visualizing Integer Addition 1513 The corse that gies CMU its Zip! Integer Arithmetic Operations Jan. 5, 1 Topics Basic operations Addition, negation, mltiplication Programming Implications Conseqences of oerflow Using shifts to perform

More information

Faster Random Walks By Rewiring Online Social Networks On-The-Fly

Faster Random Walks By Rewiring Online Social Networks On-The-Fly 1 Faster Random Walks By Rewiring Online ocial Networks On-The-Fly Zhojie Zho 1, Nan Zhang 2, Zhigo Gong 3, Gatam Das 4 1,2 Compter cience Department, George Washington Uniersity 1 rexzho@gw.ed 2 nzhang10@gw.ed

More information

Towards applications based on measuring the orbital angular momentum of light

Towards applications based on measuring the orbital angular momentum of light CHAPTER 8 Towards applications based on measring the orbital anglar momentm of light Efficient measrement of the orbital anglar momentm (OAM) of light has been a longstanding problem in both classical

More information

Faster Random Walks By Rewiring Online Social Networks On-The-Fly

Faster Random Walks By Rewiring Online Social Networks On-The-Fly Faster Random Walks By Rewiring Online ocial Networks On-The-Fly Zhojie Zho 1, Nan Zhang 2, Zhigo Gong 3, Gatam Das 4 1,2 Compter cience Department, George Washington Uniersity 1 rexzho@gw.ed 2 nzhang10@gw.ed

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introdction (forarding and roting) Reie of qeeing theor Roting algorithms Link state, Distance Vector Roter design and operation IP: Internet Protocol IP4 (datagram format, addressing, ICMP,

More information

Bounded Partial-Order Reduction

Bounded Partial-Order Reduction Bonded Partial-Order Redction Katherine E. Coons Madanlal Msathi Kathryn S. McKinley The Uniersity of Texas at Astin Microsoft Research Abstract Eliminating concrrency errors is increasingly important

More information

Mathematical model for storing and effective processing of directed graphs in semistructured data management systems

Mathematical model for storing and effective processing of directed graphs in semistructured data management systems Mathematical model for storing and effectie processing of directed graphs in semistrctred data management MALIKOV A, GULEVSKIY Y, PARKHOMENKO D Information Systems and Technologies Department North Cacass

More information

C Puzzles! Taken from old exams. Integers Sep 3, Encoding Integers Unsigned. Encoding Example (Cont.) The course that gives CMU its Zip!

C Puzzles! Taken from old exams. Integers Sep 3, Encoding Integers Unsigned. Encoding Example (Cont.) The course that gives CMU its Zip! 15-13 The corse that gies CMU its Zip! Topics class3.ppt Integers Sep 3,! Nmeric Encodings " Unsigned & Two s complement! Programming Implications " C promotion rles! Basic operations " Addition, negation,

More information

Visibility-Graph-based Shortest-Path Geographic Routing in Sensor Networks

Visibility-Graph-based Shortest-Path Geographic Routing in Sensor Networks Athor manscript, pblished in "INFOCOM 2009 (2009)" Visibility-Graph-based Shortest-Path Geographic Roting in Sensor Networks Gang Tan Marin Bertier Anne-Marie Kermarrec INRIA/IRISA, Rennes, France. Email:

More information

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical

More information

An Extended Fault-Tolerant Link-State Routing Protocol in the Internet

An Extended Fault-Tolerant Link-State Routing Protocol in the Internet An Extended Falt-Tolerant Link-State Roting Protocol in the Internet Jie W, Xiaola Lin, Jiannong Cao z, and Weijia Jia x Department of Compter Science and Engineering Florida Atlantic Uniersit Boca Raton,

More information

Queries. Inf 2B: Ranking Queries on the WWW. Suppose we have an Inverted Index for a set of webpages. Disclaimer. Kyriakos Kalorkoti

Queries. Inf 2B: Ranking Queries on the WWW. Suppose we have an Inverted Index for a set of webpages. Disclaimer. Kyriakos Kalorkoti Qeries Inf B: Ranking Qeries on the WWW Kyriakos Kalorkoti School of Informatics Uniersity of Edinbrgh Sppose e hae an Inerted Index for a set of ebpages. Disclaimer I Not really the scenario of Lectre.

More information

Image Restoration Image Degradation and Restoration

Image Restoration Image Degradation and Restoration Image Degradation and Restoration hxy Image Degradation Model: Spatial domain representation can be modeled by: g x y h x y f x y x y Freqency domain representation can be modeled by: G F N Prepared By:

More information

A sufficient condition for spiral cone beam long object imaging via backprojection

A sufficient condition for spiral cone beam long object imaging via backprojection A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral

More information

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,

More information

Real-Time Robot Path Planning via a Distance-Propagating Dynamic System with Obstacle Clearance

Real-Time Robot Path Planning via a Distance-Propagating Dynamic System with Obstacle Clearance POSTPRINT OF: IEEE TRANS. SYST., MAN, CYBERN., B, 383), 28, 884 893. 1 Real-Time Robot Path Planning ia a Distance-Propagating Dynamic System with Obstacle Clearance Allan R. Willms, Simon X. Yang Member,

More information

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu

More information

MTL 776: Graph Algorithms. B S Panda MZ 194

MTL 776: Graph Algorithms. B S Panda MZ 194 MTL 776: Graph Algorithms B S Panda MZ 194 bspanda@maths.iitd.ac.in bspanda1@gmail.com Lectre-1: Plan Definitions Types Terminology Sb-graphs Special types of Graphs Representations Graph Isomorphism Definitions

More information

Select-and-Protest-based Beaconless Georouting with Guaranteed Delivery in Wireless Sensor Networks

Select-and-Protest-based Beaconless Georouting with Guaranteed Delivery in Wireless Sensor Networks Select-and-Protest-based Beaconless Georoting ith Garanteed Deliery in Wireless Sensor Netorks Hanna Kalosha, Amiya Nayak, Stefan Rührp, Ian Stojmenoić School of Information Technology and Engineering

More information

Mobility Control and Its Applications in Mobile Ad Hoc Networks

Mobility Control and Its Applications in Mobile Ad Hoc Networks Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai, Florida Atlantic Uniersity Abstract Most eisting localized protocols in mobile ad hoc netorks, sch as data commnication

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

Modeling Reliable Broadcast of Data Buffer over Wireless Networks

Modeling Reliable Broadcast of Data Buffer over Wireless Networks JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 3, 799-810 (016) Short Paer Modeling Reliable Broadcast of Data Buffer over Wireless Networs Deartment of Comuter Engineering Yeditee University Kayışdağı,

More information

Constrained Empty-Rectangle Delaunay Graphs

Constrained Empty-Rectangle Delaunay Graphs CCCG 2015, Kingston, Ontario, August 10 12, 2015 Constrained Emty-Rectangle Delaunay Grahs Prosenjit Bose Jean-Lou De Carufel André van Renssen Abstract Given an arbitrary convex shae C, a set P of oints

More information

Cutting Cycles of Rods in Space: Hardness and Approximation

Cutting Cycles of Rods in Space: Hardness and Approximation Ctting Cycles of Rods in Space: Hardness and pproximation oris rono ark de erg Chris Gray Elena mford bstract We stdy the problem of ctting a set of rods (line segments in R 3 ) into fragments, sing a

More information

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna

More information

Ma Lesson 18 Section 1.7

Ma Lesson 18 Section 1.7 Ma 15200 Lesson 18 Section 1.7 I Representing an Ineqality There are 3 ways to represent an ineqality. (1) Using the ineqality symbol (sometime within set-bilder notation), (2) sing interval notation,

More information

arxiv: v1 [cs.cg] 27 Nov 2015

arxiv: v1 [cs.cg] 27 Nov 2015 On Visibility Representations of Non-planar Graphs Therese Biedl 1, Giseppe Liotta 2, Fabrizio Montecchiani 2 David R. Cheriton School of Compter Science, University of Waterloo, Canada biedl@waterloo.ca

More information

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands

More information

Statistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem

Statistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem Statistical Methods in fnctional MRI Lectre 7: Mltiple Comparisons 04/3/13 Martin Lindqist Department of Biostatistics Johns Hopkins University Data Processing Pipeline Standard Analysis Data Acqisition

More information

Classes of K-Regular Semi ring

Classes of K-Regular Semi ring Secial Issue on Comutational Science, Mathematics and Biology Classes of K-Regular Semi ring M.Amala 1, T.Vasanthi 2 ABSTRACT: In this aer, it was roved that, If S is a K-regular semi ring and (S, +) is

More information

Path Planning in Partially-Known Environments. Prof. Brian Williams (help from Ihsiang Shu) /6.834 Cognitive Robotics February 17 th, 2004

Path Planning in Partially-Known Environments. Prof. Brian Williams (help from Ihsiang Shu) /6.834 Cognitive Robotics February 17 th, 2004 Path Planning in Partially-Known Enironments Prof. Brian Williams (help from Ihsiang Sh) 16.41/6.834 Cognitie Robotics Febrary 17 th, 004 Otline Path Planning in Partially Known Enironments. Finding the

More information

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng

More information

Math 365 Wednesday 4/10/ & 10.2 Graphs

Math 365 Wednesday 4/10/ & 10.2 Graphs Math 365 Wednesda 4/10/19 10.1 & 10.2 Graphs Eercise 44. (Relations and digraphs) For each the relations in Eercise 43(a), dra the corresponding directed graph here V = {0, 1, 2, 3} and a! b if a b. What

More information

Network layer. Two Key Network-Layer Functions. Datagram Forwarding table. IP datagram format. IP Addressing: introduction

Network layer. Two Key Network-Layer Functions. Datagram Forwarding table. IP datagram format. IP Addressing: introduction Netork laer transport segment sending to receiing host on sending side encapslates segments into grams on rcing side, deliers segments to transport laer laer protocols in eer host, roter roter eamines

More information

Finite Domain Cuts for Minimum Bandwidth

Finite Domain Cuts for Minimum Bandwidth Finite Domain Cts for Minimm Bandwidth J. N. Hooker Carnegie Mellon University, USA Joint work with Alexandre Friere, Cid de Soza State University of Campinas, Brazil INFORMS 2013 Two Related Problems

More information

Chapter 8 DOMINATING SETS

Chapter 8 DOMINATING SETS Chapter 8 DOMINATING SETS Distributed Computing Group Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking

More information

Topic Continuity for Web Document Categorization and Ranking

Topic Continuity for Web Document Categorization and Ranking Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information

Lecture 10. Diffraction. incident

Lecture 10. Diffraction. incident 1 Introdction Lectre 1 Diffraction It is qite often the case that no line-of-sight path exists between a cell phone and a basestation. In other words there are no basestations that the cstomer can see

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 11: Semaphores Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Last time Worked throgh software implementation

More information

Fast Ray Tetrahedron Intersection using Plücker Coordinates

Fast Ray Tetrahedron Intersection using Plücker Coordinates Fast Ray Tetrahedron Intersection sing Plücker Coordinates Nikos Platis and Theoharis Theoharis Department of Informatics & Telecommnications University of Athens Panepistemiopolis, GR 157 84 Ilissia,

More information

Minimal Edge Addition for Network Controllability

Minimal Edge Addition for Network Controllability This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,

More information

Chapter 8 DOMINATING SETS

Chapter 8 DOMINATING SETS Distributed Computing Group Chapter 8 DOMINATING SETS Mobile Computing Summer 2004 Overview Motivation Dominating Set Connected Dominating Set The Greedy Algorithm The Tree Growing Algorithm The Marking

More information

TAKING THE PULSE OF ICT IN HEALTHCARE

TAKING THE PULSE OF ICT IN HEALTHCARE ICT TODAY THE OFFICIAL TRADE JOURNAL OF BICSI Janary/Febrary 2016 Volme 37, Nmber 1 TAKING THE PULSE OF ICT IN HEALTHCARE + PLUS + High-Power PoE + Using HDBaseT in AV Design for Schools + Focs on Wireless

More information

Chapter 4: Network Layer. TDTS06 Computer networks. Chapter 4: Network Layer. Network layer. Two Key Network-Layer Functions

Chapter 4: Network Layer. TDTS06 Computer networks. Chapter 4: Network Layer. Network layer. Two Key Network-Layer Functions Chapter : Netork Laer TDTS06 Compter s Lectre : Netork laer II Roting algorithms Jose M. Peña, jospe@ida.li.se ID/DIT, LiU 009-09- Chapter goals: nderstand principles behind laer serices: laer serice models

More information

Tri-Edge-Connectivity Augmentation for Planar Straight Line Graphs

Tri-Edge-Connectivity Augmentation for Planar Straight Line Graphs Tri-Edge-Connectivity Agmentation for Planar Straight Line Graphs Marwan Al-Jbeh 1, Mashhood Ishaqe 1, Kristóf Rédei 1, Diane L. Sovaine 1, and Csaba D. Tóth 1,2 1 Department of Compter Science, Tfts University,

More information