Minimizing Interference in Wireless Networks. Yves Brise, ETH Zürich, Joint work with Marek, Michael, and Tobias.
|
|
- Gilbert Glenn
- 5 years ago
- Views:
Transcription
1 Minimizing Interference in Wireless Networks Yves Brise, ETH Zürich, Joint work with Marek, Michael, and Tobias.
2 The Problem
3 The Problem
4 Formal Description Input: Output: Set V of n vertices in R d Assignment of radii r v, v V Communication Network: Graph G =(V, E) symmetric E := {{v, w} r v v w and r w v w } E := {(v, w) r v v w } asymmetric Interference: Conditions: I(v) := {w V \{v} r w v w } 1. G is (strongly) connected 2. Minimize max v V I(v)
5 Summary 1D, symmetric Exponential Node Chain: For d = 1 and some n N, setv := {2 i } n 1 i=0. (log scale) v 1... v 2 v n von Rickenbach, Schmid, Wattenhofer, Zollinger, 2005: For d = 1, I n is a worst-case lower bound, and I O( n) is an upper bound. Haldórsson, Tokuyama, 2008: For d = 2, there is an algorithm, achieving I O( n)
6 Upper Bound C V ; while ( C > 1) { c C connect to nearest component from sink(c); update C; } The sink of a component is the set of vertices that can be reached from anywhere in the component. The number of rounds is at most log n, andineach round the interference is increased by 2 at most.
7 Sink Algorithm Remarks 1. In the end, we just increase the radius of one vertex in the final sink (adding one more interference). 2. Works in any dimension. The bound depends on the Kissing number, K d. It is something like log n + K d The Kissing number is the number of unit spheres that can simultaneously touch another unit sphere without intersecting.
8 Sink Alg is not Optimal Alternating Exponential Node Chain: For d = 1 and some n N, setv := {( 2) i } n 1 i=1 {0} i 2 i 2 i Delay the activation of group i until we are ready to draw the arc from i 1. Sink Alg produces Ω(log n) interferencevs.o(1).
9 Upper Bound is tight Cantor Construction: Repeatedly delete middle third of all intervals After k iterations there are n =2 k+1 vertices. Lemma: For d 1 there exist point sets of size n that require Ω(log(n)) interference to be connected.
10 For d>1 the Problem is hard Theorem (Buchin, 2008): Deciding whether a set of vertices in the plane allows for a symmetric network with interference at most 3 is NP-complete. Theorem: Deciding whether a set of vertices in the plane allows for an asymmetric network with interference at most 4 is NP-complete.
11 NP-completeness Grid graph G =(V, E) with V Z Z and (v, w) E iff v w = 1. Maximum degree (G) 3. Find Hamilton path! Lemma (Papadimitriou, Vazirani, 1984): In a grid graph G with (G) 3, it is NP-hard to decide whether there exists a Hamilton path.
12 NP-completeness Vertex gadget: Nearest neighbors gives interference 3. Theorem (Buchin, 2008): Deciding whether a set of vertices in the plane allows for a network with interference at most 3 is NP-complete.
13 NP-completeness If there is a Hamilton path interference at most 3 Connect along the path using satellites. If the interference is at most 3 Hamilton path 1. Gadgets may not connect other than through partners. 2. A gadget may connect to at most two neighbors.
14 NP-completeness Problem: Blowing up the radius of main vertices to 3/4 gives a connected network with interference 3. Solution: More complicated gadget! Inhibitor Essentially the same result, but basic interference is 4.
15 Summary & Open Problems d =1 Worst-case: n Algorithm: O( n) Approximation: O( 4 n) Worst-case: log n 1 Algorithm: log n + 4 Approximation: O(log n) d 2 NP-complete Algorithm: O( n) (only d = 2) Hard to approximate in 4/3 NP-complete Algorithm: O(log n + K d + 2) Hard to approximate in 5/4 Complexity of the 1d problem Proper approximation algorithm
16 This is the end!
17 Naive Approach Exponential Node Chain: For d = 1 and some n N, setv := {2 i } n 1 i=0. Try connecting linearly! v 1... v 2 v n (log scale) We call this approach, the linearly connected network, or LIN for short. I(v 1 )=I(LIN) =n 2
18 Hub Based Approach G =(V, E) :=(V, ); h v 1 ; for (i = 2; i n; ++i) { E E {{h, v i }}; if (I(G) increased){ h v i ; } } return G; A hub is any vertex that has an incident edge to the right in the resulting graph. All hubs interfere with v 1. Each new hub connects to one more vertices that are to the right of it. h v i v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8 v 9 v 10 v 11 I v 12
19 Hub Based Approach Lemma (von Rickenbach, Schmid, Wattenhofer, Zollinger, 2005): For the exponential node chain, the hub based approach results in an interference I(HUB) O( n). Proof Let the current graph have interference I, then,immediately after the determination of a new hub, this hub can be connected to I 1 vertices to its right, before increasing the interference again. n = I 1 i=1 i +2= 1 2 I2 1 2 I +2 I O( n)
20 Hub is Optimal Lemma (von Rickenbach, Schmid, Wattenhofer, Zollinger, 2005): For the exponential node chain, with V = n, n is a lower bound for the interference. Proof Partition V = H S into hubs and non-hubs. Property 1: I(G) H 1 Property 2: I(G) (G) Assume G with I(G) n 1 H n. Also, S n( n 3) + 2 H + S n 2 n + 2. Contradiction to H + S = n.
21 Restraining the Radii Theorem (von Rickenbach, Schmid, Wattenhofer, Zollinger, 2005): For d = 1, there is an algorithm, achieving I O( ) Theorem (von Rickenbach, Schmid, Wattenhofer, Zollinger, 2005): For d = 1, there is an algorithm, that approximates the optimal interference within a factor of O( 4 ) Theorem (von Haldórsson, Tokuyama, 2008): For d = 2, there is an algorithm, achieving I O( ) The parameter is the maximum degree of the initial graph.
Interference Minimization in Asymmetric Sensor Networks
Interference Minimization in Asymmetric Sensor Networks Yves Brise 1, Kevin Buchin 2, Dustin Eversmann 3, Michael Hoffmann 1, and Wolfgang Mulzer 3 1 ETH Zürich, Switzerland, hoffmann@inf.ethz.ch 2 TU
More informationA Note on Interference in Random Networks
CCCG 2012, Charlottetown, P.E.I., August 8 10, 2012 A Note on Interference in Random Networks Luc Devroye Pat Morin Abstract The (maximum receiver-centric) interference of a geometric graph (von Rickenbach
More informationHypergraph Matching by Linear and Semidefinite Programming. Yves Brise, ETH Zürich, Based on 2010 paper by Chan and Lau
Hypergraph Matching by Linear and Semidefinite Programming Yves Brise, ETH Zürich, 20110329 Based on 2010 paper by Chan and Lau Introduction Vertex set V : V = n Set of hyperedges E Hypergraph matching:
More informationPhysical Mapping. Restriction Mapping. Lecture 12. A physical map of a DNA tells the location of precisely defined sequences along the molecule.
Computat onal iology Lecture 12 Physical Mapping physical map of a DN tells the location of precisely defined sequences along the molecule. Restriction mapping: mapping of restriction sites of a cutting
More informationCutting Plane Methods II
6.859/5.083 Integer Programming and Combinatorial Optimization Fall 2009 Cutting Plane Methods II Gomory-Chvátal cuts Reminder P = {x R n : Ax b} with A Z m n, b Z m. For λ [0, ) m such that λ A Z n, (λ
More informationExact Algorithms for Dominating Induced Matching Based on Graph Partition
Exact Algorithms for Dominating Induced Matching Based on Graph Partition Mingyu Xiao School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731,
More informationChapter 11. Approximation Algorithms. Slides by Kevin Wayne Pearson-Addison Wesley. All rights reserved.
Chapter 11 Approximation Algorithms Slides by Kevin Wayne. Copyright @ 2005 Pearson-Addison Wesley. All rights reserved. 1 Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should
More informationA Polynomial-Time Algorithm for Pliable Index Coding
1 A Polynomial-Time Algorithm for Pliable Index Coding Linqi Song and Christina Fragouli arxiv:1610.06845v [cs.it] 9 Aug 017 Abstract In pliable index coding, we consider a server with m messages and n
More informationThe Turán number of sparse spanning graphs
The Turán number of sparse spanning graphs Noga Alon Raphael Yuster Abstract For a graph H, the extremal number ex(n, H) is the maximum number of edges in a graph of order n not containing a subgraph isomorphic
More informationDominating Set. Chapter 26
Chapter 26 Dominating Set In this chapter we present another randomized algorithm that demonstrates the power of randomization to break symmetries. We study the problem of finding a small dominating set
More informationDominating Set. Chapter Sequential Greedy Algorithm 294 CHAPTER 26. DOMINATING SET
294 CHAPTER 26. DOMINATING SET 26.1 Sequential Greedy Algorithm Chapter 26 Dominating Set Intuitively, to end up with a small dominating set S, nodes in S need to cover as many neighbors as possible. It
More informationAustralian National University WORKSHOP ON SYSTEMS AND CONTROL
Australian National University WORKSHOP ON SYSTEMS AND CONTROL Canberra, AU December 7, 2017 Australian National University WORKSHOP ON SYSTEMS AND CONTROL A Distributed Algorithm for Finding a Common
More informationClock Synchronization with Bounded Global and Local Skew
Clock Synchronization with ounded Global and Local Skew Distributed Computing Christoph Lenzen, ETH Zurich Thomas Locher, ETH Zurich Roger Wattenhofer, ETH Zurich October 2008 Motivation: No Global Clock
More informationCS 6820 Fall 2014 Lectures, October 3-20, 2014
Analysis of Algorithms Linear Programming Notes CS 6820 Fall 2014 Lectures, October 3-20, 2014 1 Linear programming The linear programming (LP) problem is the following optimization problem. We are given
More informationLecture 2: A Las Vegas Algorithm for finding the closest pair of points in the plane
Randomized Algorithms Lecture 2: A Las Vegas Algorithm for finding the closest pair of points in the plane Sotiris Nikoletseas Professor CEID - ETY Course 2017-2018 Sotiris Nikoletseas, Professor Randomized
More informationNP-problems continued
NP-problems continued Page 1 Since SAT and INDEPENDENT SET can be reduced to each other we might think that there would be some similarities between the two problems. In fact, there is one such similarity.
More information1 Matroid intersection
CS 369P: Polyhedral techniques in combinatorial optimization Instructor: Jan Vondrák Lecture date: October 21st, 2010 Scribe: Bernd Bandemer 1 Matroid intersection Given two matroids M 1 = (E, I 1 ) and
More information6.046 Recitation 11 Handout
6.046 Recitation 11 Handout May 2, 2008 1 Max Flow as a Linear Program As a reminder, a linear program is a problem that can be written as that of fulfilling an objective function and a set of constraints
More informationClassical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems
Classical Complexity and Fixed-Parameter Tractability of Simultaneous Consecutive Ones Submatrix & Editing Problems Rani M. R, Mohith Jagalmohanan, R. Subashini Binary matrices having simultaneous consecutive
More informationDistributed Distance-Bounded Network Design Through Distributed Convex Programming
Distributed Distance-Bounded Network Design Through Distributed Convex Programming OPODIS 2017 Michael Dinitz, Yasamin Nazari Johns Hopkins University December 18, 2017 Distance Bounded Network Design
More informationLecture 14: Random Walks, Local Graph Clustering, Linear Programming
CSE 521: Design and Analysis of Algorithms I Winter 2017 Lecture 14: Random Walks, Local Graph Clustering, Linear Programming Lecturer: Shayan Oveis Gharan 3/01/17 Scribe: Laura Vonessen Disclaimer: These
More informationA Lower Bound for the Distributed Lovász Local Lemma
A Lower Bound for the Distributed Lovász Local Lemma Sebastian Brandt, Orr Fischer, Juho Hirvonen, Barbara Keller, Tuomo Lempiäinen, Joel Rybicki, Jukka Suomela, Jara Uitto Aalto University, Comerge AG,
More informationLimitations of Algorithm Power
Limitations of Algorithm Power Objectives We now move into the third and final major theme for this course. 1. Tools for analyzing algorithms. 2. Design strategies for designing algorithms. 3. Identifying
More informationLower-Stretch Spanning Trees
Lower-Stretch Spanning Trees Michael Elkin Ben-Gurion University Joint work with Yuval Emek, Weizmann Institute Dan Spielman, Yale University Shang-Hua Teng, Boston University + 1 The Setting G = (V, E,
More information6.854J / J Advanced Algorithms Fall 2008
MIT OpenCourseWare http://ocw.mit.edu 6.85J / 8.5J Advanced Algorithms Fall 008 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 8.5/6.85 Advanced Algorithms
More information- Well-characterized problems, min-max relations, approximate certificates. - LP problems in the standard form, primal and dual linear programs
LP-Duality ( Approximation Algorithms by V. Vazirani, Chapter 12) - Well-characterized problems, min-max relations, approximate certificates - LP problems in the standard form, primal and dual linear programs
More informationGame Theory and Algorithms Lecture 7: PPAD and Fixed-Point Theorems
Game Theory and Algorithms Lecture 7: PPAD and Fixed-Point Theorems March 17, 2011 Summary: The ultimate goal of this lecture is to finally prove Nash s theorem. First, we introduce and prove Sperner s
More informationK-center Hardness and Max-Coverage (Greedy)
IOE 691: Approximation Algorithms Date: 01/11/2017 Lecture Notes: -center Hardness and Max-Coverage (Greedy) Instructor: Viswanath Nagarajan Scribe: Sentao Miao 1 Overview In this lecture, we will talk
More informationTechnische Universität München, Zentrum Mathematik Lehrstuhl für Angewandte Geometrie und Diskrete Mathematik. Combinatorial Optimization (MA 4502)
Technische Universität München, Zentrum Mathematik Lehrstuhl für Angewandte Geometrie und Diskrete Mathematik Combinatorial Optimization (MA 4502) Dr. Michael Ritter Problem Sheet 1 Homework Problems Exercise
More informationExample 1: Finding angle measures: I ll do one: We ll do one together: You try one: ML and MN are tangent to circle O. Find the value of x
Ch 1: Circles 1 1 Tangent Lines 1 Chords and Arcs 1 3 Inscribed Angles 1 4 Angle Measures and Segment Lengths 1 5 Circles in the coordinate plane 1 1 Tangent Lines Focused Learning Target: I will be able
More informationMaximum Clique on Disks
Maximum Clique on Disks Édouard Bonnet joint work with Panos Giannopoulos, Eunjung Kim, Paweł Rzążewski, and Florian Sikora and Marthe Bonamy, Nicolas Bousquet, Pierre Chabit, and Stéphan Thomassé LIP,
More informationIterative Rounding and Relaxation
Iterative Rounding and Relaxation James Davis Department of Computer Science Rutgers University Camden jamesdav@camden.rutgers.edu March 11, 2010 James Davis (Rutgers Camden) Iterative Rounding 1 / 58
More informationShow Your Work! Point values are in square brackets. There are 35 points possible. Some facts about sets are on the last page.
Formal Methods Name: Key Midterm 2, Spring, 2007 Show Your Work! Point values are in square brackets. There are 35 points possible. Some facts about sets are on the last page.. Determine whether each of
More information10.3 Matroids and approximation
10.3 Matroids and approximation 137 10.3 Matroids and approximation Given a family F of subsets of some finite set X, called the ground-set, and a weight function assigning each element x X a non-negative
More informationOn Asynchronous Node Coloring in the SINR Model
On Asynchronous Node Coloring in the SINR Model Fabian Fuchs Institute of Theoretical Informatics Karlsruhe Institute of Technology Karlsruhe, Germany fabian.fuchs@kit.edu Abstract In this work we extend
More informationClique is hard on average for regular resolution
Clique is hard on average for regular resolution Ilario Bonacina, UPC Barcelona Tech July 27, 2018 Oxford Complexity Day Talk based on a joint work with: A. Atserias S. de Rezende J. Nordstro m M. Lauria
More informationarxiv: v1 [cs.dc] 4 Oct 2018
Distributed Reconfiguration of Maximal Independent Sets Keren Censor-Hillel 1 and Mikael Rabie 2 1 Department of Computer Science, Technion, Israel, ckeren@cs.technion.ac.il 2 Aalto University, Helsinki,
More information8. INTRACTABILITY I. Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison Wesley. Last updated on 2/6/18 2:16 AM
8. INTRACTABILITY I poly-time reductions packing and covering problems constraint satisfaction problems sequencing problems partitioning problems graph coloring numerical problems Lecture slides by Kevin
More informationCS 350 Algorithms and Complexity
1 CS 350 Algorithms and Complexity Fall 2015 Lecture 15: Limitations of Algorithmic Power Introduction to complexity theory Andrew P. Black Department of Computer Science Portland State University Lower
More informationWolf-Tilo Balke Silviu Homoceanu Institut für Informationssysteme Technische Universität Braunschweig
Multimedia Databases Wolf-Tilo Balke Silviu Homoceanu Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 13 Indexes for Multimedia Data 13 Indexes for Multimedia
More information6.3 More Sine Language
6.3 More Sine Language A Solidify Understanding Task Clarita is helping Carlos calculate his height at different locations around a Ferris wheel. They have noticed when they use their formula h(t) = 30
More informationarxiv:cs/ v1 [cs.cc] 7 Sep 2006
Approximation Algorithms for the Bipartite Multi-cut problem arxiv:cs/0609031v1 [cs.cc] 7 Sep 2006 Sreyash Kenkre Sundar Vishwanathan Department Of Computer Science & Engineering, IIT Bombay, Powai-00076,
More informationEPTAS for Maximum Clique on Disks and Unit Balls
EPTAS for Maximum Clique on Disks and Unit Balls Édouard Bonnet joint work with Panos Giannopoulos, Eunjung Kim, Paweł Rzążewski, and Florian Sikora and Marthe Bonamy, Nicolas Bousquet, Pierre Chabit,
More informationTree-width and planar minors
Tree-width and planar minors Alexander Leaf and Paul Seymour 1 Princeton University, Princeton, NJ 08544 May 22, 2012; revised March 18, 2014 1 Supported by ONR grant N00014-10-1-0680 and NSF grant DMS-0901075.
More informationTheory of Computation Chapter 9
0-0 Theory of Computation Chapter 9 Guan-Shieng Huang May 12, 2003 NP-completeness Problems NP: the class of languages decided by nondeterministic Turing machine in polynomial time NP-completeness: Cook
More informationInterference in Cellular Networks: The Minimum Membership Set Cover Problem
Interference in Cellular Networks: The Minimum Membership Set Cover Problem Fabian Kuhn 1, Pascal von Rickenbach 1, Roger Wattenhofer 1, Emo Welzl 2, and Aaron Zollinger 1 kuhn@tikeeethzch, pascalv@tikeeethzch,
More informationChapter 11. Approximation Algorithms. Slides by Kevin Wayne Pearson-Addison Wesley. All rights reserved.
Chapter 11 Approximation Algorithms Slides by Kevin Wayne. Copyright @ 2005 Pearson-Addison Wesley. All rights reserved. 1 P and NP P: The family of problems that can be solved quickly in polynomial time.
More informationLecture: Expanders, in theory and in practice (2 of 2)
Stat260/CS294: Spectral Graph Methods Lecture 9-02/19/2015 Lecture: Expanders, in theory and in practice (2 of 2) Lecturer: Michael Mahoney Scribe: Michael Mahoney Warning: these notes are still very rough.
More informationMultimedia Databases 1/29/ Indexes for Multimedia Data Indexes for Multimedia Data Indexes for Multimedia Data
1/29/2010 13 Indexes for Multimedia Data 13 Indexes for Multimedia Data 13.1 R-Trees Multimedia Databases Wolf-Tilo Balke Silviu Homoceanu Institut für Informationssysteme Technische Universität Braunschweig
More informationNotes on MapReduce Algorithms
Notes on MapReduce Algorithms Barna Saha 1 Finding Minimum Spanning Tree of a Dense Graph in MapReduce We are given a graph G = (V, E) on V = N vertices and E = m N 1+c edges for some constant c > 0. Our
More informationKernelization by matroids: Odd Cycle Transversal
Lecture 8 (10.05.2013) Scribe: Tomasz Kociumaka Lecturer: Marek Cygan Kernelization by matroids: Odd Cycle Transversal 1 Introduction The main aim of this lecture is to give a polynomial kernel for the
More informationBreadth-First Search of Graphs
Breadth-First Search of Graphs Analysis of Algorithms Prepared by John Reif, Ph.D. Distinguished Professor of Computer Science Duke University Applications of Breadth-First Search of Graphs a) Single Source
More informationClarkson s Algorithm for Violator Spaces. Yves Brise, ETH Zürich, CCCG Joint work with Bernd Gärtner
Clarkson s Algorithm for Violator Spaces Yves Brise, ETH Zürich, CCCG 20090817 Joint work with Bernd Gärtner A Hierarchy of Optimization Frameworks Linear Programming Halfspaces (constraints), Optimization
More informationComputer Science 385 Analysis of Algorithms Siena College Spring Topic Notes: Limitations of Algorithms
Computer Science 385 Analysis of Algorithms Siena College Spring 2011 Topic Notes: Limitations of Algorithms We conclude with a discussion of the limitations of the power of algorithms. That is, what kinds
More informationResearch Collection. What cannot be computed locally! Report. ETH Library. Author(s): Kuhn, Fabian; Moscibroda, Thomas; Wattenhofer, Roger
Research Collection Report What cannot be computed locally! Author(s: Kuhn, Fabian; Moscibroda, Thomas; Wattenhofer, Roger Publication Date: 2004 Permanent Lin: https://doi.org/10.3929/ethz-a-006741901
More informationU.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 2 Luca Trevisan August 29, 2017
U.C. Berkeley CS94: Beyond Worst-Case Analysis Handout Luca Trevisan August 9, 07 Scribe: Mahshid Montazer Lecture In this lecture, we study the Max Cut problem in random graphs. We compute the probable
More informationPartitioning Metric Spaces
Partitioning Metric Spaces Computational and Metric Geometry Instructor: Yury Makarychev 1 Multiway Cut Problem 1.1 Preliminaries Definition 1.1. We are given a graph G = (V, E) and a set of terminals
More informationThe Lovász Local Lemma: constructive aspects, stronger variants and the hard core model
The Lovász Local Lemma: constructive aspects, stronger variants and the hard core model Jan Vondrák 1 1 Dept. of Mathematics Stanford University joint work with Nick Harvey (UBC) The Lovász Local Lemma
More information3.3 Easy ILP problems and totally unimodular matrices
3.3 Easy ILP problems and totally unimodular matrices Consider a generic ILP problem expressed in standard form where A Z m n with n m, and b Z m. min{c t x : Ax = b, x Z n +} (1) P(b) = {x R n : Ax =
More informationCS 301: Complexity of Algorithms (Term I 2008) Alex Tiskin Harald Räcke. Hamiltonian Cycle. 8.5 Sequencing Problems. Directed Hamiltonian Cycle
8.5 Sequencing Problems Basic genres. Packing problems: SET-PACKING, INDEPENDENT SET. Covering problems: SET-COVER, VERTEX-COVER. Constraint satisfaction problems: SAT, 3-SAT. Sequencing problems: HAMILTONIAN-CYCLE,
More informationVoronoi Diagrams with a Transportation Network on the Euclidean Plane
Voronoi Diagrams with a Transportation Network on the Euclidean Plane Sang Won Bae Kyung-Yong Chwa Division of Computer Science, Department of EECS, Korea Advanced Institute of Science and Technology,
More informationComputing Connected Components Given a graph G = (V; E) compute the connected components of G. Connected-Components(G) 1 for each vertex v 2 V [G] 2 d
Data Structures for Disjoint Sets Maintain a Dynamic collection of disjoint sets. Each set has a unique representative (an arbitrary member of the set). x. Make-Set(x) - Create a new set with one member
More informationOn shredders and vertex connectivity augmentation
On shredders and vertex connectivity augmentation Gilad Liberman The Open University of Israel giladliberman@gmail.com Zeev Nutov The Open University of Israel nutov@openu.ac.il Abstract We consider the
More informationInterference-Constrained Wireless Coverage in a Protocol Model
Interference-Constrained Wireless Coverage in a Protocol Model Prateek R. Kapadia Indian Institute of Technology, Bombay, India prateek@it.iitb.ac.in Om P. Damani Indian Institute of Technology, Bombay,
More informationCS 583: Algorithms. NP Completeness Ch 34. Intractability
CS 583: Algorithms NP Completeness Ch 34 Intractability Some problems are intractable: as they grow large, we are unable to solve them in reasonable time What constitutes reasonable time? Standard working
More informationCollege of Computer & Information Science Fall 2009 Northeastern University 22 September 2009
College of Computer & Information Science Fall 2009 Northeastern University 22 September 2009 CS 7880: Algorithmic Power Tools Scribe: Eric Miles Lecture Outline: General Lovász Local Lemma Two Simple
More informationP P P NP-Hard: L is NP-hard if for all L NP, L L. Thus, if we could solve L in polynomial. Cook's Theorem and Reductions
Summary of the previous lecture Recall that we mentioned the following topics: P: is the set of decision problems (or languages) that are solvable in polynomial time. NP: is the set of decision problems
More informationNP-Completeness. Until now we have been designing algorithms for specific problems
NP-Completeness 1 Introduction Until now we have been designing algorithms for specific problems We have seen running times O(log n), O(n), O(n log n), O(n 2 ), O(n 3 )... We have also discussed lower
More informationName. Satellite Motion Lab
Name Satellite Motion Lab Purpose To experiment with satellite motion using an interactive simulation in order to gain an understanding of Kepler s Laws of Planetary Motion and Newton s Law of Universal
More informationCS 350 Algorithms and Complexity
CS 350 Algorithms and Complexity Winter 2019 Lecture 15: Limitations of Algorithmic Power Introduction to complexity theory Andrew P. Black Department of Computer Science Portland State University Lower
More informationOptimization Prof. A. Goswami Department of Mathematics Indian Institute of Technology, Kharagpur. Lecture - 20 Travelling Salesman Problem
Optimization Prof. A. Goswami Department of Mathematics Indian Institute of Technology, Kharagpur Lecture - 20 Travelling Salesman Problem Today we are going to discuss the travelling salesman problem.
More informationTopological Graph Theory Lecture 4: Circle packing representations
Topological Graph Theory Lecture 4: Circle packing representations Notes taken by Andrej Vodopivec Burnaby, 2006 Summary: A circle packing of a plane graph G is a set of circles {C v v V (G)} in R 2 such
More informationApproximating maximum satisfiable subsystems of linear equations of bounded width
Approximating maximum satisfiable subsystems of linear equations of bounded width Zeev Nutov The Open University of Israel Daniel Reichman The Open University of Israel Abstract We consider the problem
More informationThe Strong Largeur d Arborescence
The Strong Largeur d Arborescence Rik Steenkamp (5887321) November 12, 2013 Master Thesis Supervisor: prof.dr. Monique Laurent Local Supervisor: prof.dr. Alexander Schrijver KdV Institute for Mathematics
More informationSolving the MWT. Recall the ILP for the MWT. We can obtain a solution to the MWT problem by solving the following ILP:
Solving the MWT Recall the ILP for the MWT. We can obtain a solution to the MWT problem by solving the following ILP: max subject to e i E ω i x i e i C E x i {0, 1} x i C E 1 for all critical mixed cycles
More informationGraph-theoretic Problems
Graph-theoretic Problems Parallel algorithms for fundamental graph-theoretic problems: We already used a parallelization of dynamic programming to solve the all-pairs-shortest-path problem. Here we are
More informationMaintaining Near-Popular Matchings
Maintaining Near-Popular Matchings Sayan Bhattacharya 1, Martin Hoefer 2, Chien-Chung Huang 3, Telikepalli Kavitha 4, and Lisa Wagner 5 1 Institute of Mathematical Sciences, Chennai, India bsayan@imsc.res.in
More informationLecture 24 Nov. 20, 2014
CS 224: Advanced Algorithms Fall 2014 Prof. Jelani Nelson Lecture 24 Nov. 20, 2014 Scribe: Xiaoyu He Overview Today we will move to a new topic: another way to deal with NP-hard problems. We have already
More informationOn improving matchings in trees, via bounded-length augmentations 1
On improving matchings in trees, via bounded-length augmentations 1 Julien Bensmail a, Valentin Garnero a, Nicolas Nisse a a Université Côte d Azur, CNRS, Inria, I3S, France Abstract Due to a classical
More informationP is the class of problems for which there are algorithms that solve the problem in time O(n k ) for some constant k.
Complexity Theory Problems are divided into complexity classes. Informally: So far in this course, almost all algorithms had polynomial running time, i.e., on inputs of size n, worst-case running time
More informationApproximation algorithms for cycle packing problems
Approximation algorithms for cycle packing problems Michael Krivelevich Zeev Nutov Raphael Yuster Abstract The cycle packing number ν c (G) of a graph G is the maximum number of pairwise edgedisjoint cycles
More informationAsymmetric Communication Complexity and Data Structure Lower Bounds
Asymmetric Communication Complexity and Data Structure Lower Bounds Yuanhao Wei 11 November 2014 1 Introduction This lecture will be mostly based off of Miltersen s paper Cell Probe Complexity - a Survey
More informationDynamic Programming on Trees. Example: Independent Set on T = (V, E) rooted at r V.
Dynamic Programming on Trees Example: Independent Set on T = (V, E) rooted at r V. For v V let T v denote the subtree rooted at v. Let f + (v) be the size of a maximum independent set for T v that contains
More informationarxiv: v1 [cs.ds] 20 Feb 2017
AN OPTIMAL XP ALGORITHM FOR HAMILTONIAN CYCLE ON GRAPHS OF BOUNDED CLIQUE-WIDTH BENJAMIN BERGOUGNOUX, MAMADOU MOUSTAPHA KANTÉ, AND O-JOUNG KWON arxiv:1702.06095v1 [cs.ds] 20 Feb 2017 Abstract. For MSO
More informationThe Inapproximability of Maximum Single-Sink Unsplittable, Priority and Confluent Flow Problems
The Inapproximability of Maximum Single-Sink Unsplittable, Priority and Confluent Flow Problems arxiv:1504.00627v2 [cs.ds] 15 May 2015 F. Bruce Shepherd Adrian Vetta August 20, 2018 Abstract We consider
More informationPreliminaries. Graphs. E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)}
Preliminaries Graphs G = (V, E), V : set of vertices E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) 1 2 3 5 4 V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)} 1 Directed Graph (Digraph)
More informationAPPROXIMATION FOR DOMINATING SET PROBLEM WITH MEASURE FUNCTIONS
Computing and Informatics, Vol. 23, 2004, 37 49 APPROXIMATION FOR DOMINATING SET PROBLEM WITH MEASURE FUNCTIONS Ning Chen, Jie Meng, Jiawei Rong, Hong Zhu Department of Computer Science, Fudan University
More informationLabelling grids locally
1 Joint work with: Sebastian Brandt 2, Orr Fischer 3, Juho Hirvonen 1, Janne H. Korhonen 1, Tuomo Lempiäinen 1, Joel Rybicki 4, Jukka Suomela 1, Patric Östergård1, Przemys law Uznański 2 1 Aalto University
More information2.2 Asymptotic Order of Growth. definitions and notation (2.2) examples (2.4) properties (2.2)
2.2 Asymptotic Order of Growth definitions and notation (2.2) examples (2.4) properties (2.2) Asymptotic Order of Growth Upper bounds. T(n) is O(f(n)) if there exist constants c > 0 and n 0 0 such that
More informationCompatible Hamilton cycles in Dirac graphs
Compatible Hamilton cycles in Dirac graphs Michael Krivelevich Choongbum Lee Benny Sudakov Abstract A graph is Hamiltonian if it contains a cycle passing through every vertex exactly once. A celebrated
More information2 Notation and Preliminaries
On Asymmetric TSP: Transformation to Symmetric TSP and Performance Bound Ratnesh Kumar Haomin Li epartment of Electrical Engineering University of Kentucky Lexington, KY 40506-0046 Abstract We show that
More informationSolutions to Quiz 1. Problem 1 (20 points). Suppose S(n) is a predicate on natural numbers, n, and suppose. k N S(k) S(k + 2). (1)
Massachusetts Institute of Technology 6.042J/18.062J, Fall 02: Mathematics for Computer Science Professor Albert Meyer and Dr. Radhika Nagpal Solutions to Quiz 1 Problem 1 (20 points). Suppose S(n) is
More informationAlgorithm Design and Analysis
Algorithm Design and Analysis LETURE 2 Network Flow Finish bipartite matching apacity-scaling algorithm Adam Smith 0//0 A. Smith; based on slides by E. Demaine,. Leiserson, S. Raskhodnikova, K. Wayne Marriage
More informationP, NP, NP-Complete. Ruth Anderson
P, NP, NP-Complete Ruth Anderson A Few Problems: Euler Circuits Hamiltonian Circuits Intractability: P and NP NP-Complete What now? Today s Agenda 2 Try it! Which of these can you draw (trace all edges)
More informationAugmenting Outerplanar Graphs to Meet Diameter Requirements
Proceedings of the Eighteenth Computing: The Australasian Theory Symposium (CATS 2012), Melbourne, Australia Augmenting Outerplanar Graphs to Meet Diameter Requirements Toshimasa Ishii Department of Information
More informationMINIMALLY NON-PFAFFIAN GRAPHS
MINIMALLY NON-PFAFFIAN GRAPHS SERGUEI NORINE AND ROBIN THOMAS Abstract. We consider the question of characterizing Pfaffian graphs. We exhibit an infinite family of non-pfaffian graphs minimal with respect
More informationDominating Set. Chapter 7
Chapter 7 Dominating Set In this chapter we present another randomized algorithm that demonstrates the power of randomization to break symmetries. We study the problem of finding a small dominating set
More informationConsistent digital line segments
Consistent digital line segments Tobias Christ Dömötör Pálvölgyi Miloš Stojaković November 27, 2009 Abstract We introduce a novel and general approach for digitalization of line segments in the plane that
More informationMinimizing Interference in Ad Hoc and Sensor Networks
Minimizing Interference in Ad Hoc and Sensor Networks Thomas Moscibroda Computer Engineering and Networks Laboratory, ETH Zurich 8092 Zurich, Switzerland moscitho@tik.ee.ethz.ch Roger Wattenhofer Computer
More information6.S078 A FINE-GRAINED APPROACH TO ALGORITHMS AND COMPLEXITY LECTURE 1
6.S078 A FINE-GRAINED APPROACH TO ALGORITHMS AND COMPLEXITY LECTURE 1 Not a requirement, but fun: OPEN PROBLEM Sessions!!! (more about this in a week) 6.S078 REQUIREMENTS 1. Class participation: worth
More information