Sparse Fault-Tolerant BFS Trees. Merav Parter and David Peleg Weizmann Institute Of Science BIU-CS Colloquium
|
|
- Dominic Bradley
- 5 years ago
- Views:
Transcription
1 Spare Fault-Tolerant BFS Tree Merav Parter and David Peleg Weizmann Intitute Of Science BIU-CS Colloquium
2 v 5 Breadth Firt Search (BFS) Tree Unweighted graph G=(V,E), ource vertex V. Shortet-Path Tree (BFS) rooted at. Spare olution: n-1 edge. v 1 v 2 Problem: Not robut againt edge and vertex fault. v 3 v 4
3 Fault Tolerant BFS Tree Objective: Purchae a collection of edge v 1 v 2 (BFS + backup edge) that i robut v 3 v 4 againt edge fault. v 5
4 Fault-Tolerant BFS Tree Subgraph H that contain a BFS tree in G\{e} for every edge failure e in G. v 1 v 2 v 1 v 2 v 3 v 4 v 3 v 4 e 5 v 5 v 5 G {e 1 } H {e 1 }
5 Fault-Tolerant (FT) BFS Tree Subgraph H that contain a BFS tree in G\{e} for every edge failure e in G. v 1 v 2 v 1 v 2 v 3 v 4 v 3 v 4 e 5 v 5 v 5 G {e 1 } H {e 1 }
6 Fault Tolerant (FT) BFS Tree Subgraph H that contain a BFS tree in G\{e} for every edge failure e in G. v 1 v 2 v 1 v 2 v 3 v 4 v 3 v 4 e 5 v 5 v 5 G {e 1 } H {e 1 }
7 Fault Tolerant (FT) BFS Tree Subgraph H that contain a BFS tree in G\{e} for every edge failure e in G. v 1 v 2 v 1 v 2 v 3 v 4 v 3 v 4 e 5 v 5 v 5 G {e 5 } H {e 5 }
8 FT-BFS Tree - Formal Definition Conider an unweighted graph G=(V,E) and a ource vetrex. A ubgraph H i an FT-BFS of G and if for every v in V and e in E: d(,v, H\{e}) = d(,v, G\{e})
9 FT-BFS for Multiple Source (FT-MBFS) Conider an unweighted graph G=(V,E) and a ource et S in V. A ubgraph H i an FT-MBFS of G if for every in S, v in V and e in E: d(,v, H \{e}) = d(,v, G\{e})
10 The Minimum FT-BFS tree Problem Input: unweighted graph G=(V,E) ource vertex in V. Output: An FT-BFS ubgraph H G with minimum number of edge.
11 Outline Related work Lower bound contruction Upper bound Hardne and approximation algorithm.
12 Related Work Replacement Path Fault-Tolerant Spanner
13 A related problem: the replacement path problem P(,t,e) : -t hortet path in G\{e} Problem definition: Given a ource, detination t, for every e ϵ P(,t), compute P(,t,e) the hortet -t path that avoid e. Trivial algorithm: For every edge e ϵ P(,t), run Dijktra algorithm from in G\{e}. Time complexity: O(mn) P(,t,e) P(,t) e t
14 The tructure of a replacement path P(,t,e) : -t hortet path in G\{e} P(,t) e Detour t
15 The replacement path problem Better bound available for replacement path problem for Undirected graph: Time complexity: O(m+n log n) [Gupta et al. 1989] [Herhberger and Suri, 2001] Unweighted directed graph: Time complexity: O(m n ) (Randomized MonteCarlo algorithm) [Roditty and Zwick 2005]
16 Single-ource replacement path Problem definition: Given a ource, compute P(,t,e) efficiently for each t in V and every e ϵ P(,t). Time complexity: O(n ɯ ) [Grandoni and William, FOCS 12] FT-BFS tree reviited: An FT-BFS tree H contain the collection of all ingle ource replacement path. Complexity meaure: ize of H (#edge). New!
17 Spanner Graph G=(V,E) A ubgraph H i an k -panner if for every u,v in V: d(u,v,h) k d(u,v,g).
18 Fault-Tolerant Spanner A ubgraph H i an f-edge fault tolerant k panner if for every u,v in V and every et of f edge F={e 1,e 2,,e f }: d(u,v,h \F) k d(u,v,g\f).
19 Fault-Tolerant Spanner d(u,v,h \F) (2k 1) d(u,v,g\f) for all u,v in V Robut to f-vertex fault: Stretch: 2k-1 #edge: O f 2 k f+1 n 1+1 k [Chechik et al., 2009] O f 2 1 k n 1+1 k [Dinitz and Krauthgamer, 2011]
20 Fault-Tolerant Spanner d(u,v,h \F) (2k 1) d(u,v,g\f) for all u,v in V Robut to f-edge fault: Stretch: 2k-1 #edge: O f n 1+1 k [Chechik et al., 2009]
21 FT-Spanner v. FT-BFS tree FT-Spanner FT-BFS tree All-pair V V Single ource V FT-BFS eaier approximate exact FT-BFS harder
22 Outline Related work Lower bound contruction Upper bound Hardne and approximation algorithm.
23 Lower Bound Theorem [Single ource]: For every integer n 1, there exit an n-vertex graph G=(V,E) and a ource vertex ϵ V uch that every FT-BFS tree H ha Ω(n n) edge.
24 Generalization to multiple ource (FT-MBFS) Theorem [Multiple ource]: For every integer n 1, there exit an n-vertex graph G=(V,E) and a ource et S V uch that every FT-BFS tree H ha Ω(n S n) edge.
25 The Lower Bound Contruction Complete bipartite graph B(X,Z): X =Ω(n), Z =Ω( n) Path of length Z Collection of Z path which are - Vertex dijoint - of monotone increaing length. Z Z X
26 Total number of vertice: n Ω( n) vertex dijoint path of increaing length contain Ω(n) vertice. Total number of edge: Ω(n n) The Contruction Z Z X Ω(n n) edge
27 The Contruction Cl. : Every FT-BFS tree H mut contain ALL the edge of the bipartite graph. By contradiction: Aume there exit an edge e i,j that i not in H. f i X Conider the cae where f i fail. z i e i,j x j Z Ω(n n) edge
28 The Contruction d(,x j, H \{f i }) >d(,x j, G\{f i }) Contradiction ince H i an FT-BFS tree. v i f i v i+1 X x j z i Z Ω(n n) edge
29 Outline Related work Lower bound contruction Upper bound Hardne and approximation algorithm.
30 Matching Upper Bound Theorem: For every graph G=(V,E) and every ource ϵ V there exit a (polynomially contructible) FT-BFS tree H with O(n n) edge.
31 Algorithm for contructing FT-BFS Input: unweighted graph G=(V,E), ource vertex. Output: FT-BFS tree H G. *Aume that all hortet path in G are unique. T 0 := BFS(, G) T e := BFS(, G \{e}) v 1 v 2 H T T e T 0 e 0 v 3 e 5 v 5 v 4
32 Algorithm for contructing FT-BFS T 0 := BFS(, G) T e := BFS(, G \{e}) T 0 v 1 v 2 v 3 v 4 e 5 v 5
33 Algorithm for contructing FT-BFS T 0 := BFS(, G) T e := BFS(, G \{e}) T e1 v 1 v 2 v 3 v 4 e 5 v 5
34 Algorithm for contructing FT-BFS T 0 := BFS(, G) T e := BFS(, G \{e}) T e2 v 1 v 2 v 3 v 4 e 5 v 5
35 Algorithm for contructing FT-BFS T 0 := BFS(, G) T e := BFS(, G \{e}) H v 1 v 2 v 3 v 4 v 5
36 Correctne Recall: P(,t,e) i the -t hortet path in G\{e}. H contain the collection of all ingle ource replacement path. T e1 The replacement path v 1 v 2 P(,v 5,e 1 ) i the -t path in T e1 =BFS(, G\{e 1 }). v 3 e 5 v 4 v 5
37 Size Analyi Baic Intuition An edge e in H i new if it i not in T 0. Lemma: Every vertex t ha at mot O( n) new edge in H. v 1 v 2 v 3 v 4 v 5
38 v 5 Size Analyi Baic Intuition π(,t,t): -t path in tree T New(t) ={ Lat edge of π(,t,t e ), e T 0 } \T 0 H T New( t), 0 t V v 1 v 2 H T T e T 0 e 0 v 3 v 4
39 v 5 Size Analyi Firt Bound π(,t,t): -t path in tree T New(t) ={ Lat edge of π(,t,te), e T 0 } \T 0 Cl. 1: New(t) dit(,t,g) Proof: If lat edge of π(,t,t e ) v 1 v 2 i new then e π(,t,t 0 ) v 3 v 4
40 v 5 Size Analyi Second Bound π(,t,t): -t path in tree T New(t) ={ Lat edge of π(,t,t e ), e T 0 } \T 0 Cl. 2: New(t) 2n v 1 v 2 v 3 v 4
41 Size Analyi Second Bound π(,t,t): -t path in tree T New(t) ={ Lat edge of π(,t,t e ), e T 0 } \T 0 A replacement path P(,t,e) whoe lat edge i new v 1 v 2 v 3 v 4 Count the number of new ending path. v 5
42 New Ending Replacement Path P(,t,e) i the -t path in T e =BFS(, G\{e}). P(,t) P(,t) e e t P(,t,e) Non-New Ending Path t P(,t,e) New Ending Path
43 Analyi Second Bound Strategy: Count the number of new ending path. Conider the et of L new ending replacement path P 1 =P(,t,e 1 ), P 2 =P(,t,e 2 ),., P L =P(,t,e L ) where each P i end with a ditinct new edge of t. Show that L 2n
44 The tructure of a new ending replacement path P(,t) Divergence point T 0 =BFS(,G) t e P(,t,e) Detour Lemma: The detour egment i edge dijoint from P(,t)
45 Analyi Baic Intuition Cl. 1: The detour egment i edge dijoint from P(,t) P(,t) By Contradiction: e P(,t,e) There are two v-t hortet path in G\{e}. Contradiction! v t New edge
46 Analyi Baic Intuition P(,t) P(,t,e 1 ) New edge t e 1 e 2 Claim 2: The detour egment are vertex dijoint! P(,t,e 2 )
47 Analyi Baic Intuition Claim 2: the detour are vertex dijoint! P(,t,e 1 ) P(,t) P(,t,e 2 ) e 1 b 2 there are two v-t hortet path in G\ {e 1, e 2 }. v e 2 t
48 New Ending Replacement Path Notation: b i := unique divergence point of P(,t,e i ) and P(,t). d i D i :=detour egment of P(,t,e i ). b i P(,t) e i D i t P(,t,e i )
49 Analyi Baic Intuition Set of new ending replacement path P 1, P 2,., P L. d(, b 1 ) d(, b 2 ) d(, b L ) b L The divergence point b i are ditinct! d(, b 1 )>d (, b 2 )> >d(, b L ) b i b 3 b 2 b 1 t
50 Analyi Baic Intuition Set of new ending replacement path P 1, P 2,., P L. Toward contradiction aume L > 2n The total #vertice in the detour i: L i=1 D i = L D i L i=1 i=1 i > L2 > n D i Detour are vertex dijoint Contradiction! Divergence point are are ditinct i t b i
51 Generalization to multiple ource (FT-MBFS) Theorem [upper bound] For every graph G=(V,E) and every ource et S V there exit a (polynomially contructible) FT-MBFS tree H with O(n S n) edge.
52 Outline Related work Lower bound contruction Upper bound Hardne and approximation algorithm.
53 The Minimum FT-BFS tree Problem Theorem [Hardne] The Minimum FT-BFS problem i NP-hard and cannot be approximated to within a factor of (log n) unle NP TIME(n ploylog(n) ). (By a gap preerving reduction from Set-Cover)
54 The Minimum FT-BFS tree Problem Theorem [Approximation] The Minimum FT-BFS problem can be approximated within a factor of O(log n).
55 O(log n) Approximation algorithm for the Min-FT BFS problem Solve n-1 intance of Set-Cover. A Set-Cover intance of vertex t: Univere of vertex t: U t = E(P(,t)) P(,t) e 1 e 2 Every neighbor v of t i a et S vt : e P(,t) i in the et S vt if dit(, t, G\{e})=dit(,v, G\{e})+1 e 5 t
56 Summary FT-BFS with O(n n) edge (tight!). FT-MBFS (S ource) with O(n S n) edge (tight!). The Minimum FT-MBFS problem i NP-hard. O(log n)-approximation (tight!).
57 What about approximate FT-BFS tructure? Multiplicative tretch =3: Upper bound: 4n edge. Additive tretch : Lower bound: Ω(n 1+ε β) edge. P, Peleg, SODA 14
58 Thank! Happy Tu-bihvat!
Scribes: Po-Hsuan Wei, William Kuzmaul Editor: Kevin Wu Date: October 18, 2016
CS 267 Lecture 7 Graph Spanners Scribes: Po-Hsuan Wei, William Kuzmaul Editor: Kevin Wu Date: October 18, 2016 1 Graph Spanners Our goal is to compress information about distances in a graph by looking
More informationChapter Landscape of an Optimization Problem. Local Search. Coping With NP-Hardness. Gradient Descent: Vertex Cover
Coping With NP-Hardne Chapter 12 Local Search Q Suppoe I need to olve an NP-hard problem What hould I do? A Theory ay you're unlikely to find poly-time algorithm Mut acrifice one of three deired feature
More informationProblem Set 8 Solutions
Deign and Analyi of Algorithm April 29, 2015 Maachuett Intitute of Technology 6.046J/18.410J Prof. Erik Demaine, Srini Devada, and Nancy Lynch Problem Set 8 Solution Problem Set 8 Solution Thi problem
More informationList Coloring Graphs
Lit Coloring Graph February 6, 004 LIST COLORINGS AND CHOICE NUMBER Thomaen Long Grotzch girth 5 verion Thomaen Long Let G be a connected planar graph of girth at leat 5. Let A be a et of vertice in G
More informationMyriad of applications
Shortet Path Myriad of application Finding hortet ditance between location (Google map, etc.) Internet router protocol: OSPF (Open Shortet Path Firt) i ued to find the hortet path to interchange package
More informationList coloring hypergraphs
Lit coloring hypergraph Penny Haxell Jacque Vertraete Department of Combinatoric and Optimization Univerity of Waterloo Waterloo, Ontario, Canada pehaxell@uwaterloo.ca Department of Mathematic Univerity
More informationCS4800: Algorithms & Data Jonathan Ullman
CS800: Algorithm & Data Jonathan Ullman Lecture 17: Network Flow Chooing Good Augmenting Path Mar 0, 018 Recap Directed graph! = #, % Two pecial node: ource & and ink = ' Edge capacitie ( ) 9 5 15 15 ource
More informationarxiv: v1 [cs.ds] 4 May 2015
Dual Failure Resilient BFS Structure Merav Parter arxiv:1505.00692v1 [cs.ds] 4 May 2015 Abstract We study breadth-first search (BFS) spanning trees, and address the problem of designing a sparse fault-tolerant
More informationApproximating Graph Spanners
Approximating Graph Spanners Michael Dinitz Johns Hopkins University Joint work with combinations of Robert Krauthgamer (Weizmann), Eden Chlamtáč (Ben Gurion), Ran Raz (Weizmann), Guy Kortsarz (Rutgers-Camden)
More informationarxiv: v1 [math.mg] 25 Aug 2011
ABSORBING ANGLES, STEINER MINIMAL TREES, AND ANTIPODALITY HORST MARTINI, KONRAD J. SWANEPOEL, AND P. OLOFF DE WET arxiv:08.5046v [math.mg] 25 Aug 20 Abtract. We give a new proof that a tar {op i : i =,...,
More informationCS 170: Midterm Exam II University of California at Berkeley Department of Electrical Engineering and Computer Sciences Computer Science Division
1 1 April 000 Demmel / Shewchuk CS 170: Midterm Exam II Univerity of California at Berkeley Department of Electrical Engineering and Computer Science Computer Science Diviion hi i a cloed book, cloed calculator,
More informationAvoiding Forbidden Submatrices by Row Deletions
Avoiding Forbidden Submatrice by Row Deletion Sebatian Wernicke, Jochen Alber, Jen Gramm, Jiong Guo, and Rolf Niedermeier Wilhelm-Schickard-Intitut für Informatik, niverität Tübingen, Sand 13, D-72076
More informationLecture 21. The Lovasz splitting-off lemma Topics in Combinatorial Optimization April 29th, 2004
18.997 Topic in Combinatorial Optimization April 29th, 2004 Lecture 21 Lecturer: Michel X. Goeman Scribe: Mohammad Mahdian 1 The Lovaz plitting-off lemma Lovaz plitting-off lemma tate the following. Theorem
More informationPrimitive Digraphs with the Largest Scrambling Index
Primitive Digraph with the Larget Scrambling Index Mahmud Akelbek, Steve Kirkl 1 Department of Mathematic Statitic, Univerity of Regina, Regina, Sakatchewan, Canada S4S 0A Abtract The crambling index of
More informationc n b n 0. c k 0 x b n < 1 b k b n = 0. } of integers between 0 and b 1 such that x = b k. b k c k c k
1. Exitence Let x (0, 1). Define c k inductively. Suppoe c 1,..., c k 1 are already defined. We let c k be the leat integer uch that x k An eay proof by induction give that and for all k. Therefore c n
More informationFlag-transitive non-symmetric 2-designs with (r, λ) = 1 and alternating socle
Flag-tranitive non-ymmetric -deign with (r, λ = 1 and alternating ocle Shenglin Zhou, Yajie Wang School of Mathematic South China Univerity of Technology Guangzhou, Guangdong 510640, P. R. China lzhou@cut.edu.cn
More informationConnections between exponential time and polynomial time problem Lecture Notes for CS294
Connections between exponential time and polynomial time problem Lecture Notes for CS294 Lecturer: Russell Impagliazzo Scribe: Stefan Schneider November 10, 2015 We connect problems that have exponential
More informationLecture 7: Testing Distributions
CSE 5: Sublinear (and Streaming) Algorithm Spring 014 Lecture 7: Teting Ditribution April 1, 014 Lecturer: Paul Beame Scribe: Paul Beame 1 Teting Uniformity of Ditribution We return today to property teting
More informationChapter 7. Network Flow. Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved.
Chapter 7 Network Flow Slide by Kevin Wayne. Copyright 5 Pearon-Addion Weley. All right reerved. Soviet Rail Network, 55 Reference: On the hitory of the tranportation and maximum flow problem. Alexander
More informationDuality of LPs and Applications
Lecture 6 Duality of LPs and Applications Last lecture we introduced duality of linear programs. We saw how to form duals, and proved both the weak and strong duality theorems. In this lecture we will
More informationLINEAR ALGEBRA METHOD IN COMBINATORICS. Theorem 1.1 (Oddtown theorem). In a town of n citizens, no more than n clubs can be formed under the rules
LINEAR ALGEBRA METHOD IN COMBINATORICS 1 Warming-up example Theorem 11 (Oddtown theorem) In a town of n citizen, no more tha club can be formed under the rule each club have an odd number of member each
More informationAlgorithm Design and Analysis
Algorithm Deign and Analyi LECTURES 1-1 Network Flow Flow, cut Ford-Fulkeron Min-cut/max-flow theorem Adam Smith // A. Smith; baed on lide by E. Demaine, C. Leieron, S. Rakhodnikova, K. Wayne Detecting
More informationarxiv: v2 [math.nt] 30 Apr 2015
A THEOREM FOR DISTINCT ZEROS OF L-FUNCTIONS École Normale Supérieure arxiv:54.6556v [math.nt] 3 Apr 5 943 Cachan November 9, 7 Abtract In thi paper, we etablih a imple criterion for two L-function L and
More informationClustering Methods without Given Number of Clusters
Clutering Method without Given Number of Cluter Peng Xu, Fei Liu Introduction A we now, mean method i a very effective algorithm of clutering. It mot powerful feature i the calability and implicity. However,
More informationRunning Time. Assumption. All capacities are integers between 1 and C.
Running Time Assumption. All capacities are integers between and. Invariant. Every flow value f(e) and every residual capacities c f (e) remains an integer throughout the algorithm. Theorem. The algorithm
More informationCollective Tree Spanners of Unit Disk Graphs with Applications to Compact and Low Delay Routing Labeling Schemes. F.F. Dragan
Collective Tree Spanners of Unit Disk Graphs with Applications to Compact and Low Delay Routing Labeling Schemes F.F. Dragan (joint work with Yang Xiang and Chenyu Yan) Kent State University, USA Well-known
More informationTRIPLE SOLUTIONS FOR THE ONE-DIMENSIONAL
GLASNIK MATEMATIČKI Vol. 38583, 73 84 TRIPLE SOLUTIONS FOR THE ONE-DIMENSIONAL p-laplacian Haihen Lü, Donal O Regan and Ravi P. Agarwal Academy of Mathematic and Sytem Science, Beijing, China, National
More informationMulticast Network Coding and Field Sizes
Multicat Network Coding and Field Size Qifu (Tyler) Sun, Xunrui Yin, Zongpeng Li, and Keping Long Intitute of Advanced Networking Technology and New Service, Univerity of Science and Technology Beijing,
More informationOn the Locality of Distributed Sparse Spanner Constructions
On the Locality of Distributed Sparse Spanner Constructions B. Derbel, C. Gavoille, D. Peleg, L. Viennot University of Lille University of Bordeaux Weizmann Institute INRIA, Paris PODC 2008 Toronto What
More informationBreadth-First Search of Graphs
Breadth-First Search of Graphs Analysis of Algorithms Prepared by John Reif, Ph.D. Distinguished Professor of Computer Science Duke University Applications of Breadth-First Search of Graphs a) Single Source
More informationAn Interesting Property of Hyperbolic Paraboloids
Page v w Conider the generic hyperbolic paraboloid defined by the equation. u = where a and b are aumed a b poitive. For our purpoe u, v and w are a permutation of x, y, and z. A typical graph of uch a
More informationToday. Flow review. Augmenting paths. Ford-Fulkerson Algorithm. Intro to cuts (reason: prove correctness)
Today Flow review Augmenting path Ford-Fulkeron Algorithm Intro to cut (reaon: prove correctne) Flow Network = ource, t = ink. c(e) = capacity of edge e Capacity condition: f(e) c(e) Conervation condition:
More informationMulticolor Sunflowers
Multicolor Sunflower Dhruv Mubayi Lujia Wang October 19, 2017 Abtract A unflower i a collection of ditinct et uch that the interection of any two of them i the ame a the common interection C of all of
More informationNew bounds for Morse clusters
New bound for More cluter Tamá Vinkó Advanced Concept Team, European Space Agency, ESTEC Keplerlaan 1, 2201 AZ Noordwijk, The Netherland Tama.Vinko@ea.int and Arnold Neumaier Fakultät für Mathematik, Univerität
More information4. Connectivity Connectivity Connectivity. Whitney's s connectivity theorem: (G) (G) (G) for special
4. Connectivity 4.. Connectivity Vertex-cut and vertex-connectivity Edge-cut and edge-connectivty Whitney' connectivity theorem: Further theorem for the relation of and graph 4.. The Menger Theorem and
More informationApproximation Algorithms for the k-set Packing Problem
Approximation Algorithms for the k-set Packing Problem Marek Cygan Institute of Informatics University of Warsaw 20th October 2016, Warszawa Marek Cygan Approximation Algorithms for the k-set Packing Problem
More informationCSCE 750 Final Exam Answer Key Wednesday December 7, 2005
CSCE 750 Final Exam Answer Key Wednesday December 7, 2005 Do all problems. Put your answers on blank paper or in a test booklet. There are 00 points total in the exam. You have 80 minutes. Please note
More informationSOME RESULTS ON INFINITE POWER TOWERS
NNTDM 16 2010) 3, 18-24 SOME RESULTS ON INFINITE POWER TOWERS Mladen Vailev - Miana 5, V. Hugo Str., Sofia 1124, Bulgaria E-mail:miana@abv.bg Abtract To my friend Kratyu Gumnerov In the paper the infinite
More informationGreedy algorithms. Shortest paths in weighted graphs. Tyler Moore. Shortest-paths problem. Shortest path applications.
Shortet-path problem Greedy algorithm Shortet path in weighted graph Problem. Gien a digraph G = (V, E), edge length e 0, orce V, and detination t V, find the hortet directed path from to t. Tyler Moore
More informationCOHOMOLOGY AS A LOCAL-TO-GLOBAL BRIDGE
COHOMOLOGY AS A LOCAL-TO-GLOBAL BRIDGE LIVIU I. NICOLAESCU ABSTRACT. I dicu low dimenional incarnation of cohomology and illutrate how baic cohomological principle lead to a proof of Sperner lemma. CONTENTS.
More informationApproximating Minimum-Power Degree and Connectivity Problems
Approximating Minimum-Power Degree and Connectivity Problems Guy Kortsarz Vahab S. Mirrokni Zeev Nutov Elena Tsanko Abstract Power optimization is a central issue in wireless network design. Given a graph
More informationLecture 3. January 9, 2018
Lecture 3 January 9, 208 Some complex analyi Although you might have never taken a complex analyi coure, you perhap till know what a complex number i. It i a number of the form z = x + iy, where x and
More informationRELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS
www.arpapre.com/volume/vol29iue1/ijrras_29_1_01.pdf RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS Sevcan Demir Atalay 1,* & Özge Elmataş Gültekin
More informationarxiv: v2 [math.co] 11 Sep 2017
The maximum number of clique in graph without long cycle Ruth Luo September 13, 017 arxiv:1701.0747v [math.co] 11 Sep 017 Abtract The Erdő Gallai Theorem tate that for k 3 every graph on n vertice with
More informationOn the Complexity of Budgeted Maximum Path Coverage on Trees
On the Complexity of Budgeted Maximum Path Coverage on Trees H.-C. Wirth An instance of the budgeted maximum coverage problem is given by a set of weighted ground elements and a cost weighted family of
More informationSymmetric Determinantal Representation of Formulas and Weakly Skew Circuits
Contemporary Mathematic Symmetric Determinantal Repreentation of Formula and Weakly Skew Circuit Bruno Grenet, Erich L. Kaltofen, Pacal Koiran, and Natacha Portier Abtract. We deploy algebraic complexity
More informationA necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees
A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees Yoshimi Egawa Department of Mathematical Information Science, Tokyo University of
More informationCodes Correcting Two Deletions
1 Code Correcting Two Deletion Ryan Gabry and Frederic Sala Spawar Sytem Center Univerity of California, Lo Angele ryan.gabry@navy.mil fredala@ucla.edu Abtract In thi work, we invetigate the problem of
More informationLecture 9: Shor s Algorithm
Quantum Computation (CMU 8-859BB, Fall 05) Lecture 9: Shor Algorithm October 7, 05 Lecturer: Ryan O Donnell Scribe: Sidhanth Mohanty Overview Let u recall the period finding problem that wa et up a a function
More informationTheoretical Computer Science. Optimal algorithms for online scheduling with bounded rearrangement at the end
Theoretical Computer Science 4 (0) 669 678 Content lit available at SciVere ScienceDirect Theoretical Computer Science journal homepage: www.elevier.com/locate/tc Optimal algorithm for online cheduling
More information1 Maximum Budgeted Allocation
CS 369P: Polyhedral techniques in combinatorial optimization Instructor: Jan Vondrák Lecture date: November 4, 2010 Scribe: David Tobin 1 Maximum Budgeted Allocation Agents Items Given: n agents and m
More informationConvex Hulls of Curves Sam Burton
Convex Hull of Curve Sam Burton 1 Introduction Thi paper will primarily be concerned with determining the face of convex hull of curve of the form C = {(t, t a, t b ) t [ 1, 1]}, a < b N in R 3. We hall
More informationA Subquadratic-Time Algorithm for Decremental Single-Source Shortest Paths
A Subquadratic-Time Algorithm for Decremental Single-Source Shortest Paths Monika Henzinger Sebastian Krinninger Danupon Nanongkai Abstract We study dynamic (1 + ɛ)-approximation algorithms for the single-source
More informationONLINE APPENDIX: TESTABLE IMPLICATIONS OF TRANSLATION INVARIANCE AND HOMOTHETICITY: VARIATIONAL, MAXMIN, CARA AND CRRA PREFERENCES
ONLINE APPENDIX: TESTABLE IMPLICATIONS OF TRANSLATION INVARIANCE AND HOMOTHETICITY: VARIATIONAL, MAXMIN, CARA AND CRRA PREFERENCES CHRISTOPHER P. CHAMBERS, FEDERICO ECHENIQUE, AND KOTA SAITO In thi online
More informationCompetitive Analysis of Task Scheduling Algorithms on a Fault-Prone Machine and the Impact of Resource Augmentation
Competitive Analyi of Tak Scheduling Algorithm on a Fault-Prone Machine and the Impact of Reource Augmentation Antonio Fernández Anta a, Chryi Georgiou b, Dariuz R. Kowalki c, Elli Zavou a,d,1 a Intitute
More informationNP-Completeness. Until now we have been designing algorithms for specific problems
NP-Completeness 1 Introduction Until now we have been designing algorithms for specific problems We have seen running times O(log n), O(n), O(n log n), O(n 2 ), O(n 3 )... We have also discussed lower
More informationBalanced Network Flows
revied, June, 1992 Thi paper appeared in Bulletin of the Intitute of Combinatoric and it Application 7 (1993), 17-32. Balanced Network Flow William Kocay* and Dougla tone Department of Computer cience
More informationLower-Stretch Spanning Trees
Lower-Stretch Spanning Trees Michael Elkin Ben-Gurion University Joint work with Yuval Emek, Weizmann Institute Dan Spielman, Yale University Shang-Hua Teng, Boston University + 1 The Setting G = (V, E,
More informationRing Sums, Bridges and Fundamental Sets
1 Ring Sums Definition 1 Given two graphs G 1 = (V 1, E 1 ) and G 2 = (V 2, E 2 ) we define the ring sum G 1 G 2 = (V 1 V 2, (E 1 E 2 ) (E 1 E 2 )) with isolated points dropped. So an edge is in G 1 G
More informationA relationship between generalized Davenport-Schinzel sequences and interval chains
A relationhip between generalized Davenport-Schinzel equence and interval chain The MIT Faculty ha made thi article openly available. Pleae hare how thi acce benefit you. Your tory matter. Citation A Publihed
More informationElectronic Theses and Dissertations
Eat Tenneee State Univerity Digital Common @ Eat Tenneee State Univerity Electronic Thee and Diertation Student Work 5-208 Vector Partition Jennifer French Eat Tenneee State Univerity Follow thi and additional
More informationFault-Tolerant Spanners for General Graphs
Fault-Tolerant Spanners for General Graphs S. Chechik M. Langberg D. Peleg L. Roditty Abstract The paper concerns graph spanners that are resistant to vertex or edge failures. Given a weighted undirected
More informationTHE THERMOELASTIC SQUARE
HE HERMOELASIC SQUARE A mnemonic for remembering thermodynamic identitie he tate of a material i the collection of variable uch a tre, train, temperature, entropy. A variable i a tate variable if it integral
More informationCMPUT 675: Approximation Algorithms Fall 2014
CMPUT 675: Approximation Algorithms Fall 204 Lecture 25 (Nov 3 & 5): Group Steiner Tree Lecturer: Zachary Friggstad Scribe: Zachary Friggstad 25. Group Steiner Tree In this problem, we are given a graph
More informationDistributed Distance-Bounded Network Design Through Distributed Convex Programming
Distributed Distance-Bounded Network Design Through Distributed Convex Programming OPODIS 2017 Michael Dinitz, Yasamin Nazari Johns Hopkins University December 18, 2017 Distance Bounded Network Design
More informationON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION. Xiaoqun Wang
Proceeding of the 2008 Winter Simulation Conference S. J. Maon, R. R. Hill, L. Mönch, O. Roe, T. Jefferon, J. W. Fowler ed. ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION Xiaoqun Wang
More informationIntroduction to Laplace Transform Techniques in Circuit Analysis
Unit 6 Introduction to Laplace Tranform Technique in Circuit Analyi In thi unit we conider the application of Laplace Tranform to circuit analyi. A relevant dicuion of the one-ided Laplace tranform i found
More informationarxiv: v1 [cs.ds] 15 May 2016
Improved distance sensitivity oracles via tree partitioning Ran Duan 1 and Tianyi Zhang 2 arxiv:1605.04491v1 [cs.ds] 15 May 2016 1 Institute for Interdisciplinary Information Science, Tsinghua University,
More informationSemilinear obstacle problem with measure data and generalized reflected BSDE
Semilinear obtacle problem with meaure data and generalized reflected BSDE Andrzej Rozkoz (joint work with T. Klimiak) Nicolau Copernicu Univerity (Toruń, Poland) 6th International Conference on Stochatic
More informationPCPs and Inapproximability Gap-producing and Gap-Preserving Reductions. My T. Thai
PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions My T. Thai 1 1 Hardness of Approximation Consider a maximization problem Π such as MAX-E3SAT. To show that it is NP-hard to approximation
More informationPowerful tool for sampling from complicated distributions. Many use Markov chains to model events that arise in nature.
Markov Chains Markov chains: 2SAT: Powerful tool for sampling from complicated distributions rely only on local moves to explore state space. Many use Markov chains to model events that arise in nature.
More informationGeometric Measure Theory
Geometric Meaure Theory Lin, Fall 010 Scribe: Evan Chou Reference: H. Federer, Geometric meaure theory L. Simon, Lecture on geometric meaure theory P. Mittila, Geometry of et and meaure in Euclidean pace
More informationEcient Parallel Algorithms for Computing All Pair. University of Kentucky. Duke University
Ecient Parallel Algorithm for Computing All Pair Shortet Path in Directed Graph 1 Yijie Han 2 * Victor Y. Pan 3 ** John H. Reif*** *Department of Computer Science Univerity of Kentucky Lexington, KY 40506
More informationEigenvalues and Eigenvectors - 5.1/ Determine if pairs 1,
Eigenvalue and Eigenvector - 5./5.. Definition Definition An eigenvector of an n n matrix A i a nonzero vector x uch that Ax x for ome calar. A calar i called an eigenvalue of A if there i a nontrivial
More informationarxiv: v1 [cs.gt] 4 Apr 2017
Communication Complexity of Correlated Equilibrium in Two-Player Games Anat Ganor Karthik C. S. Abstract arxiv:1704.01104v1 [cs.gt] 4 Apr 2017 We show a communication complexity lower bound for finding
More informationSteiner Transitive-Closure Spanners of Low-Dimensional Posets
Steiner Transitive-Closure Spanners of Low-Dimensional Posets Grigory Yaroslavtsev Pennsylvania State University + AT&T Labs Research (intern) Joint with P. Berman (PSU), A. Bhattacharyya (MIT), E. Grigorescu
More informationLecture 21 November 11, 2014
CS 224: Advanced Algorithms Fall 2-14 Prof. Jelani Nelson Lecture 21 November 11, 2014 Scribe: Nithin Tumma 1 Overview In the previous lecture we finished covering the multiplicative weights method and
More informationLaplace Transformation
Univerity of Technology Electromechanical Department Energy Branch Advance Mathematic Laplace Tranformation nd Cla Lecture 6 Page of 7 Laplace Tranformation Definition Suppoe that f(t) i a piecewie continuou
More information3.1 The Revised Simplex Algorithm. 3 Computational considerations. Thus, we work with the following tableau. Basic observations = CARRY. ... m.
3 Computational conideration In what follow, we analyze the complexity of the Simplex algorithm more in detail For thi purpoe, we focu on the update proce in each iteration of thi procedure Clearly, ince,
More informationGeometric Steiner Trees
Geometric Steiner Trees From the book: Optimal Interconnection Trees in the Plane By Marcus Brazil and Martin Zachariasen Part 3: Computational Complexity and the Steiner Tree Problem Marcus Brazil 2015
More informationLecture 8: Period Finding: Simon s Problem over Z N
Quantum Computation (CMU 8-859BB, Fall 205) Lecture 8: Period Finding: Simon Problem over Z October 5, 205 Lecturer: John Wright Scribe: icola Rech Problem A mentioned previouly, period finding i a rephraing
More informationarxiv: v4 [cs.ds] 13 Feb 2019
Distance-preserving graph contractions Aaron Bernstein 1, Karl Däubel 1, Yann Disser 2, Max Klimm 3, Torsten Mütze 1 and Frieder Smolny 1 1 Institut für Mathematik, TU Berlin 2 Department of Mathematics,
More informationBBM402-Lecture 20: LP Duality
BBM402-Lecture 20: LP Duality Lecturer: Lale Özkahya Resources for the presentation: https://courses.engr.illinois.edu/cs473/fa2016/lectures.html An easy LP? which is compact form for max cx subject to
More informationSecluded Connectivity Problems
Secluded Connectivity Problems Shiri Chechik M. P. Johnson Merav Parter David Peleg arxiv:1212.6176v1 [cs.ds] 26 Dec 2012 February 21, 2018 Abstract Consider a setting where possibly sensitive information
More informationAlgorithms: Lecture 12. Chalmers University of Technology
Algorithms: Lecture 1 Chalmers University of Technology Today s Topics Shortest Paths Network Flow Algorithms Shortest Path in a Graph Shortest Path Problem Shortest path network. Directed graph G = (V,
More informationarxiv: v1 [math.co] 17 Nov 2014
Maximizing proper coloring on graph Jie Ma Humberto Nave arxiv:1411.4364v1 [math.co] 17 Nov 2014 Abtract The number of proper q-coloring of a graph G, denoted by P G q, i an important graph parameter that
More informationDynamic Programming: Shortest Paths and DFA to Reg Exps
CS 374: Algorithms & Models of Computation, Spring 207 Dynamic Programming: Shortest Paths and DFA to Reg Exps Lecture 8 March 28, 207 Chandra Chekuri (UIUC) CS374 Spring 207 / 56 Part I Shortest Paths
More informationPreemptive scheduling on a small number of hierarchical machines
Available online at www.ciencedirect.com Information and Computation 06 (008) 60 619 www.elevier.com/locate/ic Preemptive cheduling on a mall number of hierarchical machine György Dóa a, Leah Eptein b,
More informationAlgorithms and Theory of Computation. Lecture 11: Network Flow
Algorithms and Theory of Computation Lecture 11: Network Flow Xiaohui Bei MAS 714 September 18, 2018 Nanyang Technological University MAS 714 September 18, 2018 1 / 26 Flow Network A flow network is a
More information5 Flows and cuts in digraphs
5 Flows and cuts in digraphs Recall that a digraph or network is a pair G = (V, E) where V is a set and E is a multiset of ordered pairs of elements of V, which we refer to as arcs. Note that two vertices
More informationCS 4407 Algorithms Lecture: Shortest Path Algorithms
CS 440 Algorithms Lecture: Shortest Path Algorithms Prof. Gregory Provan Department of Computer Science University College Cork 1 Outline Shortest Path Problem General Lemmas and Theorems. Algorithms Bellman-Ford
More informationSOLUTIONS TO ALGEBRAIC GEOMETRY AND ARITHMETIC CURVES BY QING LIU. I will collect my solutions to some of the exercises in this book in this document.
SOLUTIONS TO ALGEBRAIC GEOMETRY AND ARITHMETIC CURVES BY QING LIU CİHAN BAHRAN I will collect my olution to ome of the exercie in thi book in thi document. Section 2.1 1. Let A = k[[t ]] be the ring of
More informationHardness of Embedding Metric Spaces of Equal Size
Hardness of Embedding Metric Spaces of Equal Size Subhash Khot and Rishi Saket Georgia Institute of Technology {khot,saket}@cc.gatech.edu Abstract. We study the problem embedding an n-point metric space
More informationHELICAL TUBES TOUCHING ONE ANOTHER OR THEMSELVES
15 TH INTERNATIONAL CONFERENCE ON GEOMETRY AND GRAPHICS 0 ISGG 1-5 AUGUST, 0, MONTREAL, CANADA HELICAL TUBES TOUCHING ONE ANOTHER OR THEMSELVES Peter MAYRHOFER and Dominic WALTER The Univerity of Innbruck,
More informationFault-Tolerant Spanners: Better and Simpler
Fault-Tolerant Spanners: Better and Simpler Michael Dinitz Weizmann Institute of Science Rehovot, Israel michael.dinitz@weizmann.ac.il Robert Krauthgamer Weizmann Institute of Science Rehovot, Israel robert.krauthgamer@weizmann.ac.il
More informationarxiv: v1 [cs.ds] 20 Nov 2016
Algorithmic and Hardness Results for the Hub Labeling Problem Haris Angelidakis 1, Yury Makarychev 1 and Vsevolod Oparin 2 1 Toyota Technological Institute at Chicago 2 Saint Petersburg Academic University
More informationAgenda. Soviet Rail Network, We ve done Greedy Method Divide and Conquer Dynamic Programming
Agenda We ve done Greedy Method Divide and Conquer Dynamic Programming Now Flow Networks, Max-flow Min-cut and Applications c Hung Q. Ngo (SUNY at Buffalo) CSE 531 Algorithm Analysis and Design 1 / 52
More informationA Polynomial-Time Algorithm for Pliable Index Coding
1 A Polynomial-Time Algorithm for Pliable Index Coding Linqi Song and Christina Fragouli arxiv:1610.06845v [cs.it] 9 Aug 017 Abstract In pliable index coding, we consider a server with m messages and n
More informationChip-firing game and a partial Tutte polynomial for Eulerian digraphs
Chip-firing game and a partial Tutte polynomial for Eulerian digraph Kévin Perrot Aix Mareille Univerité, CNRS, LIF UMR 7279 3288 Mareille cedex 9, France. kevin.perrot@lif.univ-mr.fr Trung Van Pham Intitut
More informationMechanics Physics 151
Mechanic Phyic 151 Lecture 7 Scattering Problem (Chapter 3) What We Did Lat Time Dicued Central Force Problem l Problem i reduced to one equation mr = + f () r 3 mr Analyzed qualitative behavior Unbounded,
More information