p 3 pk 2 q 3 q 2 q 1 p 1 1 ε ε o q m p m
|
|
- Griffin Tate
- 6 years ago
- Views:
Transcription
1 Minimum-Energy Broadcast Routing in Static Ad Hoc Wireless Networks P.-J. Wan G. Calinescu.-Y. Li O. Frieder Abstract Energy conservation is a critical issue in ad hoc wireless networks for node and network life, as the nodes are owered by batteries only. One major aroach for energy conservation is to route a communication session along the routes which requires the lowest total energy consumtion. This otimization roblem is referred to as minimum-energy routing. While minimum-energy unicast routing can be solved in olynomial time by shortest-ath algorithms, it remains oen whether minimum-energy broadcast routing can be solved in olynomial time, desite of the NP-hardness of its general grah version. Recently three greedy heuristics were roosed in [8]: MST (minimum sanning tree), SPT (shortest-ath tree), and BIP (broadcasting incremental ower). They have been evaluated through simulations in [8], but little is known about their analytical erformance. The main contribution of this aer is the quantitative characterization of their erformances in terms of aroximation ratios. By exloring geometric structures of Euclidean MSTs, we have been able to rove that the aroximation ratio of MST is between 6 and, and the aroximation ratio of BIP is between and. On the other hand, the aroximation ratio of SPT is shown to be at least n,wherenis the number of receiving nodes. To our best knowledge, these are the rst analytical results for minimum-energy broadcasting. I. Introduction Ad hoc wireless networks have received signicant attention in recent years due to their otential alications in battleeld, emergency disaster relief and etc [7] [8]. Unlike wired networks or cellular networks, no wired backbone infrastructure is installed in ad hoc wireless networks. A communication session is achieved either through a gle-ho transmission if the communication arties are close enough, or through relaying by intermediate nodes otherwise. Omnidirectional antennas are used by all nodes to transmit and receive signals. They are attractive in their broadcast nature. A gle transmission by a node can be received by many nodes within its vicinity. This feature is extremely useful for multicasting/broadcasting communications. For the urose of energy conservation, each node can dynamically adjust its transmitting ower based on the distance of the receiving nodes and background noise. In the most common ower-attenuation model [6], the signal ower falls as r where r is the distance from the transmitter antenna and is the a constant between and 4 deendent on the wireless environment. All receivers have the same ower threshold for signal detection, which aretyically normalized to one. With these assumtions, the ower Deartment of Comuter Science, Illinois Institute of Technology, Chicago, IL s: fwan, calinescu, xli, ohirg@cs.iit.edu. required to suort a link between two nodes searated by ranger is r. Akey observation is that relaying signal between nodes may results in lower transmission than communicating over large distances due to the nonlinear ower attenuation. As a simle illustration, consider three nodes and with as k k > k k in Figure and assume =.Node wants to send a message to node. It has two otions. It can transmit the signal directly to node, with a energy consumtion of k k. Alternatively, it can relay the message through node and have it retransmit to node, with a total energy consumtion of k k + k k. Therefore if the angle is obtuse, the second otion consumes less total energy. A crucial issue is then how to nd a routing with minimum total energy consumtion for a given communication session. This roblem is referred to as the Minimum-Energy Routing [7] [8]. Fig.. Reduce energy consumtion through relaying. The minimum-energy broadcast/multicast routing in a simle ad hoc networking environment has been addressed by the ioneering work in [8]. To assess the comlex trade-os one at a time, the nodes in the network are assumed to be a oint set randomly distributed in a twodimensional lane and there is no mobility. Nevertheless, as argued in [8], the imact of mobility can be incororated into this static model because transmitter ower can be adjusted to accommodate the new locations of the nodes, as necessary. In other words, the caability to adjust transmission ower rovides considerable \elasticity" to the toological connectivity, and hence may reduce the The terms node, oint and vertex are interchangeable in this aer: node is a networking term, oint is a geometric term, and vertex is a grah-theoretic term.
2 need for hand-os and tracking. In addition, as assumed in [8], there are sucient bandwidth and transceiver resources. Under these assumtions, centralized (as oosed to distributed) algorithms were resented by [8] for minimum-energy broadcast/multicast routing. These centralized algorithms in this simle networking environment are exected to serve as the basis for further studies on the distributed algorithms in a more ractical network environment with limited bandwidth and transceiver resources, as well as node mobility. Three greedy heuristics were roosed in [8] for minimum-energy broadcast routing: MST (minimum sanning tree), SPT (shortest-ath tree), and BIP (broadcasting incremental ower). They have been evaluated through simulations in [8], but little is known about their analytical erformances in terms of the aroximation ratios. We believe that this analytical erformance is very essential and more convincing in evaluating these heuristics. For the minimum-energy broadcast routing, one may come u with many seemingly reasonable greedy criteria. But it's hard to tell from simulation oututs which one is better or oorer. Indeed, all the three heuristics roosed in [8] only have subtle dierences. For ure illustrative urose, another a slight variation of BIP, which is referred to Broadcast Average Incremental Power (BAIP), will be introduced in Section III. These subtle dierences, however, can have great imact on their erformance ratios. In fact, we will show thatthe aroximation ratios of MST and BIP are between 6 and and between and resectively on the other hand, the aroximation ratios of SPT and BAIP are at least n 4n and ln n ; o () resectively, where n is the number of nodes. To our best knowledge, these are the rst quantiative characterizations of heuristics for minimum-energy broadcast routing. The remaining of this aer is organized as follows. In Section II, we analyze the challenges for minimum-energy broadcast routing and briey overview the three greedy heuristics develoed in [8]. In Section III, we construct some bad instances to illustrate the oor erformance of both SPT and BAIP. These instances lead to the lower boundsonthearoximation ratios of SPT and BAIP. In Section IV, we construct instances to obtain lowerbounds on the aroximation ratios of MST and BIP. InSection V, we derive uer bounds on the aroximation ratios of MST and BIP. A cornerstone to the analysis of the uer bounds is an elegant structure roerty of Euclidean MST, which is exlored in Section VI. Finally in Section VIIwe summarize our results and oint outseveral future reseach roblems. II. Preliminaries In this aer, we assume the network nodes are given as a nite oint set P in the two-dimensional lane. For any,weuseg () to denote the weighted comlete grah over P in which the weight ofanedgee is equal to kek. The minimum-energy unicast routing is essentially a shortest-ath roblem in G (). Consider any for a unicast from a node P to another node q P can be easily obtained by alying a shortest-ath algorithm to G (). Consider any unicast ath from a node P to another node q P: = 0 m; m = q: In this ath, the transmission ower of node i for 0 i m; isk i i+ k and the transmission ower of m is zero. Thus the total transmission energy required by this ath is m; i= k i i+ k which isthetotalweight of this ath. So by alying any shortest-ath algorithm such as Dijkstra's algorithm [], one can get a minimum-energy unicast routing. However, for broadcast alications, and in general multicast alications, the minimum-energy routing is far more challenging. Any broadcast routing is an arborescence (a directed tree) T rooted at the source node of the broadcasting that sans all nodes. We usef T () to denote the transmission ower of the node required by T. Then for any leaf node of T, f T () = 0 and for any internal node of T, f T () = max qt kqk in other words, the -th ower of the longest distance between and its children in T P. The total energy required by T is then given by P f T (). Thus the minimum-energy broadcast routing is dierent from the conventional link-based minimum sanning tree (MST) roblem. Indeed, while the MST can be solved in olynomial time by algorithms such as Prim's algorithm [] and Kruskal's algorithm, it is still unknown whether minimum-energy broadcast routing can be solved in olynomial time. In its general grah version, the minimumenergy broadcast routing can be shown to be NP-hard [], and even worse, inaroxiable within a factor of ( ; ) log, where is the maximal degree and is any arbitrary small ositive constant unless NP DTIME n O(log log n) by an aroximation-reserving reduction from the Connected Dominating Set roblem [4]. However, this intractness of its general grah version does not necessarily imly the same hardness of its geometric version. In fact, as will be shown later in the aer, its geometric version can be aroximated within a constant factor. Nevertheless, this suggests that minimum-energy broadcast routing is considerably harder than the MST roblem. Three greedy heuristics have been roosed for the minimum-energy broadcast routing by [8]. The MST heuristic rst alies the Prim's algorithm to obtain a MST, and then orient it as an arborescence rooted at the source node. The SPT heuristic rst alies the Dijkstra's algorithm [] to obtain a SPT, and then orient it
3 as an arborescence rooted at the source node. The BIP heuristic is the node version of Dijkstra's algorithm for SPT. It maintains throughout its execution a gle arborescence rooted at the source node. The arborescence starts from the source node, and new nodes are added to the arborescence one at a time on a minimum incremental cost basis until all nodes are included in the arborescence. The incremental cost of adding a new node is the minimum additional ower increased by some node in the current arborescence so as to reach thisnew node. The imlementation of BIP is based on the standard Dijkstra's algorithm, with one fundamental dierence on the oeration whenever a new node is added. Whereas Dijkstra's algorithm udates the node weights (reresenting the distances), BIP udates the link costs (reresenting the incremental ower to reach the head node of the link). This udate is erformed by subtracting the cost of the added link from the cost of every link from the source node of the added link to a node not in new arborescence. The erformance of these three greedy heuristics have been evaluated in [8] by simulations studies. However, their analytic erformances in terms of the aroximation ratios remain oen. The subsequent sections of this aer will derive the bounds on their aroximation ratios. III. Greedy Is Not Always Good Greedy aroaches are the most natural and widely used techniques in design ractical heuristics for otimization roblems. For minimum-energy broadcast routing, one may think of many greedy heuristics, in addition to the three greedy heuristics roosed in [8]. The real challenge, however, is how to come u with a rovably good one. Two greedy criteria may only have slightdif- ference, but these small variation can have a great imact on their erformance. In addition, some criteria may erform quite well or even otimally in some situations, but may erform very oorly in some other situations. In this section, we describe two examles, one is SPT, another is a new one. The \bad" instance constructed in this section can not only lead to lower bounds on their aroximation ration, but also hel to design an overall good greedy criteria. For the simlicity, we only consider = in this section. We begin with the SPT algorithm. Let be a suciently small ositive number. Consider m nodes m evenly distributed on a cycle of radius centered at node o (see Figure ). For i m, let q i be the oint in the line segment o i with koq i k =. We consider a broadcasting from node o to these n =m nodes m q q q m : The SPT is the suerosition of the aths oq i i. Its total energy is + m ( ; ) : On the other hand, if the transmission ower of node o is, then the signal can reach all other oints. Thus the minimum energy is at most. So the aroximation ratio of SPT is + m ( ; ). As ;! 0, this ratio converges to n = m. ε ε o Fig.. q q q q m m A bad instance for SPT. The second greedy heuristic is very similar to Chvatal's algorithm [] for Set Cover Problem and is a variation of BIP. Like BIP, an arborescence, which starts with the source node, is maintained throughout the execution of algorithm. However, unlike BIP, many new nodes can be added one time. Similar to Chvatal's algorithm [], the new nodes added are chosen to have the minimal average incremental cost, which is dened as the ratio of the minimum addition ower increased by some node in the current arborescence so as to reach these new nodes to the number of these new nodes. We refer to this heuristic as the Broadcast Average Incremental Power, abbreviated by BAIP. In contrast to the + log m aroximation ratioofthechvatal's algorithm [] where m is the largest set size, we show that the aroximation ratio of BAIP is at least 4n ln n ; o () where n is the number of receiving nodes. Consider the following instance of minimum-energy broadcasting. All nodes are colinear with the source being the origin, the i-th receiving node at the osition i for i n ;, and the n-th receiving node at the osition n ; for some suciently small number >0. For any k n ;, the minimal transmission ower of the source to reach k receiving nodes is k = k, and thus the average ower eciency is k k =. On the other hand, the minimal transmission ower of the source to reach alln receiving nodes is ; n ; = n ;, and the thus the average ower eciency is n; n =; n. So BAIP will let the source to transmit at ower n ; to reach all nodes in a gle ste. However, the otimal routing is a directed ath consisting of all nodes from left
4 4 to right. So the minimum ower is n; i ; ; i ; + n ; ; n ; : i= < n i= i n; ; i ; =+ i= n; (n ; ) + + +ln 4i 4 = i= ln (n ; ) + 5 : 4 Thus the aroximation ratio is at least P n; i= n ; ; i ++ i ; i ; i ; + ; n ; ; n ; : As ;! 0, this ratio converges to P n i= = n ; = i ; i ; n + P n; i= 4i + P n; i= n + ln(n;)+ 4 4n ln (n ; ) + 5 = 4n ln n ; o () : n ( i++ i) Interestingly, SPT generates the otimal solution in the second bad instance, while BAIP can rovide nearotimal or otimal solution for the rst bad instance. On the other hand, MST and BIP have a lot similarities to SPT and BAIP, but have constant aroximation ratios as will be roved later. Thus one should carefully design and select greedy heuristics. IV. Lower Bounds on Aroximation Ratios In this section, we will derive lower bounds on aroximation ratios of MST and BIP. We begin with MST. Theorem : The aroximation ratio of MST is at least 6forany. Proof: Let be a suciently small ositive number. Consider seven nodes o 6 (see Figure ), which satises that ko k = Then for any i 5, and ko i k =+ i 6 k i i+ k = i 5: \ i o i+ < \ 6 o > : 4 5 Fig.. +ε +ε +ε +ε o 6 +ε A bad instance for MST. Consider the two triangles o and o 6. Since and by Law of Coe, we have ko k = ko 6 k \ 6 o > \ o k 6 k > k k =: We consider the broadcasting from the node o to nodes 6. Then the ath o 5 6 is the unique MST. It's total energy is 6. On the other hand, the otimal routing is the star centered at node o, whose total energy is ( + ). Thus the aroximation ratio is at 6 least (+), which converges to 6 as ;! 0. Now wedevelo the lower bound on the aroximation ratio of BIP. Theorem : The aroximation ratio of BIP is at least for any =. Proof: Let be a suciently small ositive number. Consider six oints 6 on a cycle of radius centered at node o (see Figure 4), with Then \ o = \ 5 o 6 = ; \ o = \ 4 o 5 = ; \ o 4 = ; \ 6 o = +: k k = k 5 6 k < k k = k 4 5 k < k 4 k < < k 6 k :
5 5 π/ θ Thus in the subsequent two stes, the oints and 5 are added, and the transmission ower of oints and 6 is k k = k 5 6 k. Similarly, in the last two stes, the oints and 4 are added, and the transmission ower of oints and 5 is k k = k 4 5 k. The total ower is 4 Fig. 4. π/ θ π/ θ 5 π/ θ q o q q q q m m+ π/ θ A bad instance for BIP. Let q be the oint in the erendicular bisector of 6 such that q is erendicular to : Choose a suciently large integer m such that koqk ; > k 4 k : m Let q q m+ be the m+ oints on the ray oq with koq i k = i m koqk for i m +. Then q m = q. We consider a broadcasting from oint o to oints q q m+ 6. The otimal solution is that the node o transmits at ower to reach all nodes. Now let's examine the outut of the BIP algorithm. As m is suciently large, in the rst m + stes, the oints q q m+ are sequentially added, and the transmission ower of the nodes o q q m all has the transmission ower Since the. angles koqk m \ q m+ q m = \ 6 q m+ q m > in the next two stes, the oints and 6 are added, and the transmission ower of oint q m+ is k q m+ k. At this moment, the incremental ower of all oints o q q m to reach any node i for i 5 is at least koqk ; > k 4 k > k k = k 5 6 k m and the incremental ower of oint q m+ to reach any node i for i 5 is also greater than k k = k 5 6 k as \ q m+ = \ 5 6 q m+ > \ q m = : 6 koqk (m +) + kqm+k +kk +kk m = m + m koqk + kqm+k +kk +kk : As ;! 0 and m ;!, the olygon converges to a regular hexagon, and the nodes q and q m+ converges to the center of the triangle o 6. Thus the total ower converges to +4=. Thus the aroximation ratio of BIP is at least 4:. V. Uer Bounds on Aroximation Ratios Our deriving of the uer bounds relies on extensively on the geometric structures of Euclidean MSTs. We rst observe that as long as the cost of a link is an increag function of the Euclidean length of the link, the set of MSTs of anyoint set coincides with the set of Euclidean MSTs of the same oint set. In fact, this can be followed from Prim's algorithm. In articular, for any sanning tree T of a (nite) oint setp, the arameter P et kek achieves its minimum if and only if T is an Euclidean MST of P. For any (nite) oint setp,weusemst (P ) to denote an arbitrary Euclidean MST of P. The radius of a oint set P is dened as inf su kqk : P qp Thus a oint set of radius one can be covered by a disk of the same radius. A key result P in this section is an uer bound on the arameter emst(p ) kek for any nite oint set P of radius P one. Note that the sureme of the length of mst (P ), emst(p ) kek, over all oint sets P of radius P one is innity. Amazingly however, the arameter emst(p ) kek is bounded by a constant for any oint set P of radius one, as shown P later. We use c to denote the sureme of the length of emst(p ) kek over all oint sets P of radius one. The next key theorem states that c is at most. Theorem : 6 c. The roof of this theorem involves comlicated geometric arguments, and therefore we ostone it in Section VI. Note that for any ointsetp of radius one, the length of each edge in mst (P ) isatmostone. Therefore, Theorem imlies that for any oint set P of radius one and any, emst(p ) kek emst(p ) kek c :
6 6 In the next, we exlore a relation between the minimum energy required by a broadcasting and the Euclidean MST of the corresonding oint set. Lemma 4: For any ointsetp in the lane, the total anergy required by any broadcasting among P is at least c P emst(p ) kek. Proof: Let T be an otimal arborescence for a broadcasting among P. For any none-leaf node in T, let T be an Euclidean MST of the oint set consisting and all children of in T. Suose that the longest Euclidean distance between and its children is r. Then the transmission ower of node is r, and all children of lie in the disk centered at with radius r. From the denition of c, we have which imlies that et r c kek c r et kek Let T denote the sanning tree obtained by suerog of all T 's for non-leaf nodes of PT. Then the total energy required by T is at least c et kek, which is P further no less than c emst(p ) kek. This comletes the roof. Consider any oint set P in the lane. Let T be an arborescence oriented from some mst P (P ). Then the total energy required by T is at most et kek. From Lemma 4, this total energy is at most c times the otimum cost. Thus the aroximation ratio of MST is at most c. Together with Theorem, this observation leads to the following theorem. Theorem 5: The aroximation ratio of MST is at most c, and therefore is at most. Finally, we derive the uer bound on the aroximation ratio of the BIP heuristic. Once again, the Euclidean MST will lay an imortant role. Lemma 6: For any broadcasting among a oint setp in the lane, the total energy required by P the arborescence generated by BIP algorithm is at most emst(p ) kek. Proof: Let G () be the comlete grah over the oint setp, in which theweight of an edge e is kek. Let T be the arborescence outut by the algorithm BIP. We construct another weighted grah H over the same oint set P according to the execution of BIP for generating T. Suose that during the execution of BIP the nodes are added in the order n where is the source node. Let T i be the arborescence just after node i is added. In H, the weight of the edge i i+ is equal to the incremental energy of the link from T i to i+ chosen during the execution of SPF and the weight ofany other edge is the same as that in G (). Note that for each edge i i+, its weight in H is not more than its weight in G (). Therefore, for any sanning tree, its weight inh is no more than its weight ing (). On the other hand, the execution of Prim's algorithm on H will emulate the algorithm BIP on G () in the sense that it will add the required nodes in the same order, and will outut the ath n. The weight of this ath in H is exactly the total energy required by T, but is at most the weight of any MSTin G (). This imlies that the total energy required by T is at most P emst(p ) kek. This comletes the roof. From the above lemma and Lemma 4, we can get the result for the BIP algorithm similar to Theorem 5. Theorem 7: The aroximation ratio of the BIP heuristic is at most c, and therefore is at most. VI. Proof of Theorem This section is devoted to the roof of Theorem. The lower bound is very trivial as it can follow from the instance consisting of seven oints: the center of a regular hexagon and its six vertices. However, the deriving of the uer bound is very challenging. We rst introduce some geometric structures and notations to be used in this section. All angles are measured in radians and take values in the range [0 ]. For any three oints and, the angle between the tworays and is denoted by \ or \. The closed innite area inside the angle \, also referred to as a sector, is denoted by ]. The triangle determined and is denoted by 4. The oen disk centered at with radius r, denoted by B ( r), is the set of oints whose distance from is less than r. The lune through oints and, denoted by L ( ), is the intersection of the two oen disks of radius k kcentered at and resectively (see Figure 5(a)). Thus it consists of oints whose distances from and are both less than k k. The oen diamond substended by a line segment, denoted by D ( ), is the rhombus with sides of length k k (see Figure 5(b)). Note that the interior angles at and within D ( )are equal to. Fig. 5. (a) (b) Illustration of (a) lune and (b) diamond. The Euclidean MSTs have many nice structure roerties [5]. Some basic roerties are listed blow. Any air of edges do not cross each other. The angles between any two edges incident to a common vertex is at least.
7 7 The length of each edge is at most the radius of the vertex set. The luna determined by each edge does not contain any other vertices. Let be any edge. Then the two endoints of any other edge are either both outside B ( k k), or both outside B ( k k). In this section, we willrstrove yet another structure roerty of the Euclidean MSTs, which isvery essential to bound the constant c: The diamonds of any two edges are disjoint. The roof of this roerty willmake use of the following lemma. Lemma 8: Let and be any three oints in the lane with \ = and k k = k k(see Figure 6). Let 4 be any oint in ] but outside 4 with \ 4 =. Then D ( 4 ) ] if and only if either 0 and k 4 k ( ;) k k or 5 6. On the other hand, as 4 and 4 4 x are similar, k 4 k k k = k xk k k = ; ; : Therefore, D ( 4 ) ] as long as k 4 k ( ;) k k. In the next we aly the above lemma to show that the diamond determined by any edge in an Euclidean MST is contained in some sector dened in the next lemma. Lemma 9: Let and be any three oints in the lane with being outside L ( ). Let 0 ( 0 resectively) be the vertex of D ( )(D ( ) resectively) which is lies on the oosite side of the line ( resectively) from ( resectively) (see Figure 7). Then D ( ) ] α α α π/ α x (a) 4 x y (a) x α α π/ α α x (b) y Fig. 6. (b) Two extreme cases for D (4) ]. Proof: Note that D ( 4 ) ] if > 5 6 and D ( 4 ) ] if 5 6. So we now assume 0. We x and calculate the maximum length of 4 such that D ( 4 ) ]. This haens when D ( 4 ) touches the ray,sayatx. We consider this extreme scenario. In this case, \ x = \ x = ; : Alying the Laws of Sine in 4 x,wehave k xk k k = ; ; : (c) Fig. 7. The three cases for Lemma 9 Proof: We assume by symmetry that is to the left of the line and to the right of the erendicular bisector of. Then k kk k. Since is outside L ( ), k kk k and \ <. x y
8 8 Therefore, q q \ 0 0 < = 5 6 \ q q q q y x \ < : Let x and y be the other twovertices of D ( )which lie between the left side and right side resectively of the line. It's sucient toshow that both x and y are within ] 0 0. This is true when \ 6 (see Figure 7(a)). So we assume that \ < 6. In this case x is within 4 0, and thus within ] 0 0, from Lemma 8 and k kk k. If \ 5 6, then y is within ] 0 ] 0 0 (see Figure 7(b)). If \ > 5 6,then \ y = ;\ ; \ y ; ; 6 = 5 6 which imlies that the ray y does not intersect with the ray 0 (see Figure 7(c)). So y is within ] 0 0. Therefore, in either case both x and y are within ] 0 0. This comletes the roof. Now we are ready to rove the \disjoint diamond" roerty of Euclidean MSTs. Lemma 0: In any Euclidean MST, the two diamonds determined by anytwo edges are disjoint. Proof: The lemma is true when two edges are incident to a common vertex as the angle between them is at least. So we consider two edges and q q with distinct endoints. We consider two cases. Case : At least one of and q q does not cross the erendicular bisector of the other. Without loss of generality, assume that q and q lie in the same side of the erendicular bisector of as (see Figure 8(a)). Let q 0 (q 0 resectively) be the vertex of D ( q ) (D ( q ) resectively) which is lies on the oosite side of the line q ( q resectively) from q (q resectively). Then from Lemma 9, D (q q ) ]q 0 q 0. On the other hand, ce both q and q are outside L ( ), D ( ) is outside ]q 0 q 0. Thus D ( ) and D (q q ) are disjoint. Case : Both and q q cross the erendicular bisector of the other. Without loss of generality, assume that q lies in the same side of the erendicular bisector of as (see Figure 8(b)). Then must lie in the same side of the erendicular bisector of q q as q, for otherwise k q k > k q k > k q k > k q k i.e., both and lie in the same side of the erendicular bisector of q q as q, which contradicts to the assumtion. Since q is outside L ( ) and (a) Fig. 8. Two cases for Lemma 0. k q k > k q k, we have k q k > k k. As k q k > k q k, q is outside 4q. Similarly, any of these four oints q and q is outside the triangle determined by theother three oints. This imlies that the convex hull determined by these four oints is a quadrilateral. Note that and q q can't be the two diagonals of the quadrilateral as they do not cross each other. Neither can be q and q as they are searated by the erendicular bisector of. Thus the two diagonals must be q and q, and consequently the boundary of the quadrilateral is q q. From the revious argument its four sides are all less than its two diagonals, and hence its four inner angles are all more than. Without loss of generality, we assume that k q kk q k. Then k q kk k, for otherwise q would be inside B ( k k) and q would be inside B ( k k), which is imossible. Similarly, k q kkq q k. Therefore, both \q q and \ q are less than. Since both \q and \ q q are less than,wehave \q \ q q 5 6 (b) : Let x be the oint inside ]q such that 4 q x is equilateral. Then both and q q are outside 4 q x. In addition, and \x \xq q 0 k xkk k kq xkkq q k : Let y be the center of 4 q x. Then from Lemma 8, D ( ) ] yx D (q q ) ]q yx: This imlies that D ( ) and D (q q ) are disjoint. Let P be any oint set of radius one. According to Lemma 0, the total area of the diamonds through the
9 edges in mst (P ) equals to 6 emst(p ) kek : Let be the oint in P such that all oints in P have distance of at most one from. Since all edges have lengths of at most one, all diamonds are contained in B. This imlies that 6 emst(p ) kek = 4 : q 9 Therefore emst(p ) kek 8 4:5: This estimation is quite loose and fails in getting the desired uer bound. In the next, we will rovide a tighter estimation which can lead to the uer bound. We observe that the total area of the diamonds is no more than the area of the disk B ( ) lus the sticking-out areas of these diamonds beyond B ( ). Let D ( )beany diamond which sticks out B ( ), and let q be its vertex which is outside B ( ) (see Figure 9). Let 0 ( 0 resectively) be the intersection between q ( q resectively) and the boundary of B ( ). Then the sticking-out area of D ( ) can be calculated by subtracting the area of the sector substended by 0 and 0 from the area of the quadrilateral 0 q0. The area of the quadrilateral 0 q0 can be further calculated by summing u the areas of and 4q 0 0. As \ 0 q0 is a constant, the area of 4q0 0 is maximized when kq 0 k kq 0 k. Let \ 0 0 =, then ; 0 and the sticking-out area of D ( )isaat most S () = + 6 ( ; cos ) ; : The area function S () has the following nice roerty. Lemma : For any ; 0,. if +, S ()+S() S ( + ). if +, S ()+S () S ; + ; + S ;. Proof: The lemma follows from the following two equality: for any and, S ( + ) ; S () ; S () = 4 6 ; + + ; + S S = 4 + ; 6 ; S () ; S () 6 ; 6 ; : Fig. 9. The calculation of the sticking-out area. We rst rove the rst equality. S ( + ) ; S () ; S () = ( ( + ) ; ; )+ ((cos +cos) ; (cos ( + )+)) 6 = + cos + ; + cos + = + cos + cos ; cos + = cos ; cos ; ; cos + + ; cos ; ; cos + cos + ; + = 4 6 ; + Now werove the second equality. S + ; + S ; S () ; S () =(S ( + ) ; S () ; S ()) ; S ( + ) ; S + ; ; S = 4 6 ; + ; 4 + ; 6 = 4 + ; 6 = + ; 6 = 4 + ; ; ; + cos 6 ; + ; ; 6 ; cos ; 6 ; :
10 0 Suose that there are k diamonds which stick out B ( ). For any i k, let i be the inner angle of the arc between the two intersection oints of the boundary B ( ) and the boundary of the i-th stickingout diamond. Then i ; 0 and k i= i < : By reeatedly alying the two inequalities in Lemma, the total sticking-out area of the diamonds is k i= &P k i= S ( i ) i 6S ' S = ; : Thus the total area of diamonds is at most Therefore, + ; = : emst(p ) kek 6 This comletes the roof Theorem. =: VII. Summary and Future Works In this aer, we have rovided theoretical erformance analysis the heuristics resented in [8]. The aroximation ratio of SPT is at least n, and thus less favorable from the theoretical ersective. The other two heuristics, MST and BIP, have constant aroximation ratios. Secically, the aroximation ratio of MST is between 6 and c, which is at most the aroximation ratio of the BIP heuristic is between and c. However, there are still several challenging issues for future research. First of all, the comutational comlexity of the Minimum-Energy Broadcasting remains unknown. As mentioned in Section I, the grah-version of this roblem is at least as hard as the Connected Dominate Set roblem. However, due to its geometric nature, this intractness of the grah version does not imly the same intractness of geometric version which isstudied in this aer. Indeed, while Connected Dominating Set roblem does not allow a constant-aroximation ratio, the geometric version does on the contrary, for examle, bymst or BIP. Secondly, the exact value of the constant c remains unsolved. A tighter uer bound on c can lead to tighter uer bounds on the aroximation ratios of both MST and BIP. From the deriving of the uer bound, we observe there are still rooms to imrove the uer bound. For examle, it's very unlikely for the diamonds to ll the unit disk fully. At least this is true for small number of nodes. However, the treatment of large number of nodes is quite challenging, and more geometric roerties of the Euclidean MSTs have to be exlored. The third interesting roblem is how to construct \worse" instances that can lead to better lower bounds on the aroximation ratios of both the MST and BIP. A major challenge, and a toic of continued research, is the develoment of distributed algorithms of MST and BIP. These algorithms should take advantage of the geometric roerties for fast imlementation. Furthermore, it is imortant to study the imact of limited bandwidth and transceiver resources, as well as to develo mechanisms to coe with node mobility [8]. References [] V. Chvatal, \A Greedy Heuristic for the Set-Covering Problem", Mathematics of Oerations Research, Vol. 4, No.,. {5, 979. [] T. J. Cormen, C. E. Leiserson, and R. L. Rivest, Introduction to Algorithms, MIT Press and MxGraw-Hill, 990. [] M. R. Garey, and D. S. Johnson, Comuters and Intractability: a Guide to the Theory of NP-Comleteness, W. H. Freeman and Comany, 979. [4] S. Guha, and S. Khuller, \Aroximation Algorithms for Connected Dominating Sets". Algorithmica 998, 0: [5] F. P. Prearata and M. I. Shamos, Comuatational Geometry: an Introduction, Sringer-Verlag, 985. [6] T. S. Raaort, Wireless Communications: Princiles and Practices, Prentice Hall, 996. [7] S. Singh, C. S. Raghavendra, and J. Steanek, \Power-Aware Broadcasting in Mobile Ad Hoc Networks", Proceedings of IEEE PIMRC'99, Osaka, Jaan, Se [8] J.E. Wieselthier, G.D. Nguyen, and A. Ehremides, \On the Construction of energy-ecient Broadcast and Multicast Trees in Wireless Networks". IEEE Infocom'000.
Minimum-Energy Broadcast Routing
Minimum-Energy Broadcast Routing in Static Ad Hoc Wireless Networks P.-J. Wan G. Călinescu X.-Y. Li O. Frieder Abstract Energy conservation is a critical issue in ad hoc wireless networks for node and
More informationStrong Matching of Points with Geometric Shapes
Strong Matching of Points with Geometric Shaes Ahmad Biniaz Anil Maheshwari Michiel Smid School of Comuter Science, Carleton University, Ottawa, Canada December 9, 05 In memory of Ferran Hurtado. Abstract
More informationwhere x i is the ith coordinate of x R N. 1. Show that the following upper bound holds for the growth function of H:
Mehryar Mohri Foundations of Machine Learning Courant Institute of Mathematical Sciences Homework assignment 2 October 25, 2017 Due: November 08, 2017 A. Growth function Growth function of stum functions.
More informationApproximating min-max k-clustering
Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost
More information1 1 c (a) 1 (b) 1 Figure 1: (a) First ath followed by salesman in the stris method. (b) Alternative ath. 4. D = distance travelled closing the loo. Th
18.415/6.854 Advanced Algorithms ovember 7, 1996 Euclidean TSP (art I) Lecturer: Michel X. Goemans MIT These notes are based on scribe notes by Marios Paaefthymiou and Mike Klugerman. 1 Euclidean TSP Consider
More informationFor q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i
Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:
More informationRANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES
RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES AARON ZWIEBACH Abstract. In this aer we will analyze research that has been recently done in the field of discrete
More informationParallelism and Locality in Priority Queues. A. Ranade S. Cheng E. Deprit J. Jones S. Shih. University of California. Berkeley, CA 94720
Parallelism and Locality in Priority Queues A. Ranade S. Cheng E. Derit J. Jones S. Shih Comuter Science Division University of California Berkeley, CA 94720 Abstract We exlore two ways of incororating
More informationMulti-Operation Multi-Machine Scheduling
Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job
More information19th Bay Area Mathematical Olympiad. Problems and Solutions. February 28, 2017
th Bay Area Mathematical Olymiad February, 07 Problems and Solutions BAMO- and BAMO- are each 5-question essay-roof exams, for middle- and high-school students, resectively. The roblems in each exam are
More informationCOMMUNICATION BETWEEN SHAREHOLDERS 1
COMMUNICATION BTWN SHARHOLDRS 1 A B. O A : A D Lemma B.1. U to µ Z r 2 σ2 Z + σ2 X 2r ω 2 an additive constant that does not deend on a or θ, the agents ayoffs can be written as: 2r rθa ω2 + θ µ Y rcov
More informationPositive decomposition of transfer functions with multiple poles
Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.
More informationMATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK
Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment
More informationTHE ERDÖS - MORDELL THEOREM IN THE EXTERIOR DOMAIN
INTERNATIONAL JOURNAL OF GEOMETRY Vol. 5 (2016), No. 1, 31-38 THE ERDÖS - MORDELL THEOREM IN THE EXTERIOR DOMAIN PETER WALKER Abstract. We show that in the Erd½os-Mordell theorem, the art of the region
More informationElementary Analysis in Q p
Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some
More informationThe Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule
The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca
More information4. Score normalization technical details We now discuss the technical details of the score normalization method.
SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules
More information216 S. Chandrasearan and I.C.F. Isen Our results dier from those of Sun [14] in two asects: we assume that comuted eigenvalues or singular values are
Numer. Math. 68: 215{223 (1994) Numerische Mathemati c Sringer-Verlag 1994 Electronic Edition Bacward errors for eigenvalue and singular value decomositions? S. Chandrasearan??, I.C.F. Isen??? Deartment
More informationON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS
#A13 INTEGERS 14 (014) ON THE LEAST SIGNIFICANT ADIC DIGITS OF CERTAIN LUCAS NUMBERS Tamás Lengyel Deartment of Mathematics, Occidental College, Los Angeles, California lengyel@oxy.edu Received: 6/13/13,
More informationMATH 2710: NOTES FOR ANALYSIS
MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite
More informationFeedback-error control
Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller
More informationShadow Computing: An Energy-Aware Fault Tolerant Computing Model
Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms
More informationOn the Chvatál-Complexity of Knapsack Problems
R u t c o r Research R e o r t On the Chvatál-Comlexity of Knasack Problems Gergely Kovács a Béla Vizvári b RRR 5-08, October 008 RUTCOR Rutgers Center for Oerations Research Rutgers University 640 Bartholomew
More informationAnalysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks
Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their
More informationStable Delaunay Graphs
Stable Delaunay Grahs Pankaj K. Agarwal Jie Gao Leonidas Guibas Haim Kalan Natan Rubin Micha Sharir Aril 29, 2014 Abstract Let P be a set of n oints in R 2, and let DT(P) denote its Euclidean Delaunay
More informationSums of independent random variables
3 Sums of indeendent random variables This lecture collects a number of estimates for sums of indeendent random variables with values in a Banach sace E. We concentrate on sums of the form N γ nx n, where
More informationIntroduction Consider a set of jobs that are created in an on-line fashion and should be assigned to disks. Each job has a weight which is the frequen
Ancient and new algorithms for load balancing in the L norm Adi Avidor Yossi Azar y Jir Sgall z July 7, 997 Abstract We consider the on-line load balancing roblem where there are m identical machines (servers)
More informationOn a Markov Game with Incomplete Information
On a Markov Game with Incomlete Information Johannes Hörner, Dinah Rosenberg y, Eilon Solan z and Nicolas Vieille x{ January 24, 26 Abstract We consider an examle of a Markov game with lack of information
More informationOpposite-quadrant depth in the plane
Oosite-quadrant deth in the lane Hervé Brönnimann Jonathan Lenchner János Pach Comuter and Information Science, Polytechnic University, Brooklyn, NY 1101, hbr@oly.edu IBM T. J. Watson Research Center,
More informationCorrespondence Between Fractal-Wavelet. Transforms and Iterated Function Systems. With Grey Level Maps. F. Mendivil and E.R.
1 Corresondence Between Fractal-Wavelet Transforms and Iterated Function Systems With Grey Level Mas F. Mendivil and E.R. Vrscay Deartment of Alied Mathematics Faculty of Mathematics University of Waterloo
More informationA Social Welfare Optimal Sequential Allocation Procedure
A Social Welfare Otimal Sequential Allocation Procedure Thomas Kalinowsi Universität Rostoc, Germany Nina Narodytsa and Toby Walsh NICTA and UNSW, Australia May 2, 201 Abstract We consider a simle sequential
More informationBest approximation by linear combinations of characteristic functions of half-spaces
Best aroximation by linear combinations of characteristic functions of half-saces Paul C. Kainen Deartment of Mathematics Georgetown University Washington, D.C. 20057-1233, USA Věra Kůrková Institute of
More informationMA3H1 TOPICS IN NUMBER THEORY PART III
MA3H1 TOPICS IN NUMBER THEORY PART III SAMIR SIKSEK 1. Congruences Modulo m In quadratic recirocity we studied congruences of the form x 2 a (mod ). We now turn our attention to situations where is relaced
More informationMODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL
Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management
More informationThe inverse Goldbach problem
1 The inverse Goldbach roblem by Christian Elsholtz Submission Setember 7, 2000 (this version includes galley corrections). Aeared in Mathematika 2001. Abstract We imrove the uer and lower bounds of the
More informationOn the irreducibility of a polynomial associated with the Strong Factorial Conjecture
On the irreducibility of a olynomial associated with the Strong Factorial Conecture Michael Filaseta Mathematics Deartment University of South Carolina Columbia, SC 29208 USA E-mail: filaseta@math.sc.edu
More informationStatics and dynamics: some elementary concepts
1 Statics and dynamics: some elementary concets Dynamics is the study of the movement through time of variables such as heartbeat, temerature, secies oulation, voltage, roduction, emloyment, rices and
More informationConvexification of Generalized Network Flow Problem with Application to Power Systems
1 Convexification of Generalized Network Flow Problem with Alication to Power Systems Somayeh Sojoudi and Javad Lavaei + Deartment of Comuting and Mathematical Sciences, California Institute of Technology
More informationImprovement on the Decay of Crossing Numbers
Grahs and Combinatorics 2013) 29:365 371 DOI 10.1007/s00373-012-1137-3 ORIGINAL PAPER Imrovement on the Decay of Crossing Numbers Jakub Černý Jan Kynčl Géza Tóth Received: 24 Aril 2007 / Revised: 1 November
More informationA Special Case Solution to the Perspective 3-Point Problem William J. Wolfe California State University Channel Islands
A Secial Case Solution to the Persective -Point Problem William J. Wolfe California State University Channel Islands william.wolfe@csuci.edu Abstract In this aer we address a secial case of the ersective
More information#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS
#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS Ramy F. Taki ElDin Physics and Engineering Mathematics Deartment, Faculty of Engineering, Ain Shams University, Cairo, Egyt
More informationOn Wald-Type Optimal Stopping for Brownian Motion
J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of
More informationVarious Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems
Int. J. Oen Problems Comt. Math., Vol. 3, No. 2, June 2010 ISSN 1998-6262; Coyright c ICSRS Publication, 2010 www.i-csrs.org Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various
More informationMultiplicity of weak solutions for a class of nonuniformly elliptic equations of p-laplacian type
Nonlinear Analysis 7 29 536 546 www.elsevier.com/locate/na Multilicity of weak solutions for a class of nonuniformly ellitic equations of -Lalacian tye Hoang Quoc Toan, Quô c-anh Ngô Deartment of Mathematics,
More informationAn Analysis of Reliable Classifiers through ROC Isometrics
An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit
More informationLilian Markenzon 1, Nair Maria Maia de Abreu 2* and Luciana Lee 3
Pesquisa Oeracional (2013) 33(1): 123-132 2013 Brazilian Oerations Research Society Printed version ISSN 0101-7438 / Online version ISSN 1678-5142 www.scielo.br/oe SOME RESULTS ABOUT THE CONNECTIVITY OF
More informationDiverse Routing in Networks with Probabilistic Failures
Diverse Routing in Networks with Probabilistic Failures Hyang-Won Lee, Member, IEEE, Eytan Modiano, Senior Member, IEEE, Kayi Lee, Member, IEEE Abstract We develo diverse routing schemes for dealing with
More informationp-adic Measures and Bernoulli Numbers
-Adic Measures and Bernoulli Numbers Adam Bowers Introduction The constants B k in the Taylor series exansion t e t = t k B k k! k=0 are known as the Bernoulli numbers. The first few are,, 6, 0, 30, 0,
More informationComplex Analysis Homework 1
Comlex Analysis Homework 1 Steve Clanton Sarah Crimi January 27, 2009 Problem Claim. If two integers can be exressed as the sum of two squares, then so can their roduct. Proof. Call the two squares that
More informationEstimation of the large covariance matrix with two-step monotone missing data
Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo
More informationRadial Basis Function Networks: Algorithms
Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.
More informationA numerical implementation of a predictor-corrector algorithm for sufcient linear complementarity problem
A numerical imlementation of a redictor-corrector algorithm for sufcient linear comlementarity roblem BENTERKI DJAMEL University Ferhat Abbas of Setif-1 Faculty of science Laboratory of fundamental and
More informationMonopolist s mark-up and the elasticity of substitution
Croatian Oerational Research Review 377 CRORR 8(7), 377 39 Monoolist s mark-u and the elasticity of substitution Ilko Vrankić, Mira Kran, and Tomislav Herceg Deartment of Economic Theory, Faculty of Economics
More informationGENERICITY OF INFINITE-ORDER ELEMENTS IN HYPERBOLIC GROUPS
GENERICITY OF INFINITE-ORDER ELEMENTS IN HYPERBOLIC GROUPS PALLAVI DANI 1. Introduction Let Γ be a finitely generated grou and let S be a finite set of generators for Γ. This determines a word metric on
More informationConvex Optimization methods for Computing Channel Capacity
Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem
More informationAn Ant Colony Optimization Approach to the Probabilistic Traveling Salesman Problem
An Ant Colony Otimization Aroach to the Probabilistic Traveling Salesman Problem Leonora Bianchi 1, Luca Maria Gambardella 1, and Marco Dorigo 2 1 IDSIA, Strada Cantonale Galleria 2, CH-6928 Manno, Switzerland
More informationMollifiers and its applications in L p (Ω) space
Mollifiers and its alications in L () sace MA Shiqi Deartment of Mathematics, Hong Kong Batist University November 19, 2016 Abstract This note gives definition of mollifier and mollification. We illustrate
More information1 Extremum Estimators
FINC 9311-21 Financial Econometrics Handout Jialin Yu 1 Extremum Estimators Let θ 0 be a vector of k 1 unknown arameters. Extremum estimators: estimators obtained by maximizing or minimizing some objective
More informationProbability Estimates for Multi-class Classification by Pairwise Coupling
Probability Estimates for Multi-class Classification by Pairwise Couling Ting-Fan Wu Chih-Jen Lin Deartment of Comuter Science National Taiwan University Taiei 06, Taiwan Ruby C. Weng Deartment of Statistics
More informationApproximation of the Euclidean Distance by Chamfer Distances
Acta Cybernetica 0 (0 399 47. Aroximation of the Euclidean Distance by Chamfer Distances András Hajdu, Lajos Hajdu, and Robert Tijdeman Abstract Chamfer distances lay an imortant role in the theory of
More informationImproved Capacity Bounds for the Binary Energy Harvesting Channel
Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,
More informationNotes on duality in second order and -order cone otimization E. D. Andersen Λ, C. Roos y, and T. Terlaky z Aril 6, 000 Abstract Recently, the so-calle
McMaster University Advanced Otimization Laboratory Title: Notes on duality in second order and -order cone otimization Author: Erling D. Andersen, Cornelis Roos and Tamás Terlaky AdvOl-Reort No. 000/8
More informationarxiv:cond-mat/ v2 25 Sep 2002
Energy fluctuations at the multicritical oint in two-dimensional sin glasses arxiv:cond-mat/0207694 v2 25 Se 2002 1. Introduction Hidetoshi Nishimori, Cyril Falvo and Yukiyasu Ozeki Deartment of Physics,
More informationIMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES
IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES OHAD GILADI AND ASSAF NAOR Abstract. It is shown that if (, ) is a Banach sace with Rademacher tye 1 then for every n N there exists
More informationLEIBNIZ SEMINORMS IN PROBABILITY SPACES
LEIBNIZ SEMINORMS IN PROBABILITY SPACES ÁDÁM BESENYEI AND ZOLTÁN LÉKA Abstract. In this aer we study the (strong) Leibniz roerty of centered moments of bounded random variables. We shall answer a question
More informationConvex Analysis and Economic Theory Winter 2018
Division of the Humanities and Social Sciences Ec 181 KC Border Conve Analysis and Economic Theory Winter 2018 Toic 16: Fenchel conjugates 16.1 Conjugate functions Recall from Proosition 14.1.1 that is
More informationCubic Sieve Congruence of the Discrete Logarithm Problem, and Fractional Part Sequences
Cubic Sieve Congruence of the Discrete Logarithm Problem, and Fractional Part Sequences Srinivas Vivek University of Luxembourg, Luxembourg C. E. Veni Madhavan Deartment of Comuter Science and Automation,
More information15-451/651: Design & Analysis of Algorithms October 23, 2018 Lecture #17: Prediction from Expert Advice last changed: October 25, 2018
5-45/65: Design & Analysis of Algorithms October 23, 208 Lecture #7: Prediction from Exert Advice last changed: October 25, 208 Prediction with Exert Advice Today we ll study the roblem of making redictions
More informationAn Estimate For Heilbronn s Exponential Sum
An Estimate For Heilbronn s Exonential Sum D.R. Heath-Brown Magdalen College, Oxford For Heini Halberstam, on his retirement Let be a rime, and set e(x) = ex(2πix). Heilbronn s exonential sum is defined
More informationOn split sample and randomized confidence intervals for binomial proportions
On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have
More informationA Plane 1.88-Spanner for Points in Convex Position
A Plane 1.88-Sanner or Points in Convex Position Mahdi Amani Ahmad Biniaz Prosenjit Bose Jean-Lou De Caruel Anil Maheshwari Michiel Smid October 6, 016 Abstract Let S be a set o n oints in the lane that
More informationSome results of convex programming complexity
2012c12 $ Ê Æ Æ 116ò 14Ï Dec., 2012 Oerations Research Transactions Vol.16 No.4 Some results of convex rogramming comlexity LOU Ye 1,2 GAO Yuetian 1 Abstract Recently a number of aers were written that
More informationThe non-stochastic multi-armed bandit problem
Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at
More informationAsymptotically Optimal Simulation Allocation under Dependent Sampling
Asymtotically Otimal Simulation Allocation under Deendent Samling Xiaoing Xiong The Robert H. Smith School of Business, University of Maryland, College Park, MD 20742-1815, USA, xiaoingx@yahoo.com Sandee
More informationHARMONIC EXTENSION ON NETWORKS
HARMONIC EXTENSION ON NETWORKS MING X. LI Abstract. We study the imlication of geometric roerties of the grah of a network in the extendibility of all γ-harmonic germs at an interior node. We rove that
More informationTopic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar
15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider
More informationAnalysis of some entrance probabilities for killed birth-death processes
Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction
More informationEfficient algorithms for the smallest enclosing ball problem
Efficient algorithms for the smallest enclosing ball roblem Guanglu Zhou, Kim-Chuan Toh, Jie Sun November 27, 2002; Revised August 4, 2003 Abstract. Consider the roblem of comuting the smallest enclosing
More informationCMSC 425: Lecture 4 Geometry and Geometric Programming
CMSC 425: Lecture 4 Geometry and Geometric Programming Geometry for Game Programming and Grahics: For the next few lectures, we will discuss some of the basic elements of geometry. There are many areas
More informationSets of Real Numbers
Chater 4 Sets of Real Numbers 4. The Integers Z and their Proerties In our revious discussions about sets and functions the set of integers Z served as a key examle. Its ubiquitousness comes from the fact
More informations v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4
Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work
More informationGOOD MODELS FOR CUBIC SURFACES. 1. Introduction
GOOD MODELS FOR CUBIC SURFACES ANDREAS-STEPHAN ELSENHANS Abstract. This article describes an algorithm for finding a model of a hyersurface with small coefficients. It is shown that the aroach works in
More informationA New Perspective on Learning Linear Separators with Large L q L p Margins
A New Persective on Learning Linear Searators with Large L q L Margins Maria-Florina Balcan Georgia Institute of Technology Christoher Berlind Georgia Institute of Technology Abstract We give theoretical
More informationBrownian Motion and Random Prime Factorization
Brownian Motion and Random Prime Factorization Kendrick Tang June 4, 202 Contents Introduction 2 2 Brownian Motion 2 2. Develoing Brownian Motion.................... 2 2.. Measure Saces and Borel Sigma-Algebras.........
More informationTopic 7: Using identity types
Toic 7: Using identity tyes June 10, 2014 Now we would like to learn how to use identity tyes and how to do some actual mathematics with them. By now we have essentially introduced all inference rules
More information#A37 INTEGERS 15 (2015) NOTE ON A RESULT OF CHUNG ON WEIL TYPE SUMS
#A37 INTEGERS 15 (2015) NOTE ON A RESULT OF CHUNG ON WEIL TYPE SUMS Norbert Hegyvári ELTE TTK, Eötvös University, Institute of Mathematics, Budaest, Hungary hegyvari@elte.hu François Hennecart Université
More informationApplicable Analysis and Discrete Mathematics available online at HENSEL CODES OF SQUARE ROOTS OF P-ADIC NUMBERS
Alicable Analysis and Discrete Mathematics available online at htt://efmath.etf.rs Al. Anal. Discrete Math. 4 (010), 3 44. doi:10.98/aadm1000009m HENSEL CODES OF SQUARE ROOTS OF P-ADIC NUMBERS Zerzaihi
More informationAR PROCESSES AND SOURCES CAN BE RECONSTRUCTED FROM. Radu Balan, Alexander Jourjine, Justinian Rosca. Siemens Corporation Research
AR PROCESSES AND SOURCES CAN BE RECONSTRUCTED FROM DEGENERATE MIXTURES Radu Balan, Alexander Jourjine, Justinian Rosca Siemens Cororation Research 7 College Road East Princeton, NJ 8 fradu,jourjine,roscag@scr.siemens.com
More informationLinear diophantine equations for discrete tomography
Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,
More information2 K. ENTACHER 2 Generalized Haar function systems In the following we x an arbitrary integer base b 2. For the notations and denitions of generalized
BIT 38 :2 (998), 283{292. QUASI-MONTE CARLO METHODS FOR NUMERICAL INTEGRATION OF MULTIVARIATE HAAR SERIES II KARL ENTACHER y Deartment of Mathematics, University of Salzburg, Hellbrunnerstr. 34 A-52 Salzburg,
More informationA Note on Guaranteed Sparse Recovery via l 1 -Minimization
A Note on Guaranteed Sarse Recovery via l -Minimization Simon Foucart, Université Pierre et Marie Curie Abstract It is roved that every s-sarse vector x C N can be recovered from the measurement vector
More informationOn a class of Rellich inequalities
On a class of Rellich inequalities G. Barbatis A. Tertikas Dedicated to Professor E.B. Davies on the occasion of his 60th birthday Abstract We rove Rellich and imroved Rellich inequalities that involve
More informationDistributed Rule-Based Inference in the Presence of Redundant Information
istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced
More informationRecursive Estimation of the Preisach Density function for a Smart Actuator
Recursive Estimation of the Preisach Density function for a Smart Actuator Ram V. Iyer Deartment of Mathematics and Statistics, Texas Tech University, Lubbock, TX 7949-142. ABSTRACT The Preisach oerator
More informationHAUSDORFF MEASURE OF p-cantor SETS
Real Analysis Exchange Vol. 302), 2004/2005,. 20 C. Cabrelli, U. Molter, Deartamento de Matemática, Facultad de Cs. Exactas y Naturales, Universidad de Buenos Aires and CONICET, Pabellón I - Ciudad Universitaria,
More information7. The olynomial P (x) =x, 9x 4 +9x, 4x +4x, 4 can be written in the form P (x) =(x, ) n Q(x), where n is a ositive integer and Q(x) is not divisible
. Which of the following intervals contains all of the real zeros of the function g(t) =t, t + t? (a) (,; ) (b) ( ; ) (c) (,; ) (d) (; ) (e) (,; ) 4 4. The exression ((a), + b), is equivalent to which
More informationq-ary Symmetric Channel for Large q
List-Message Passing Achieves Caacity on the q-ary Symmetric Channel for Large q Fan Zhang and Henry D Pfister Deartment of Electrical and Comuter Engineering, Texas A&M University {fanzhang,hfister}@tamuedu
More informationA randomized sorting algorithm on the BSP model
A randomized sorting algorithm on the BSP model Alexandros V. Gerbessiotis a, Constantinos J. Siniolakis b a CS Deartment, New Jersey Institute of Technology, Newark, NJ 07102, USA b The American College
More informationFinding Shortest Hamiltonian Path is in P. Abstract
Finding Shortest Hamiltonian Path is in P Dhananay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune, India bstract The roblem of finding shortest Hamiltonian ath in a eighted comlete grah belongs
More informationAveraging sums of powers of integers and Faulhaber polynomials
Annales Mathematicae et Informaticae 42 (20. 0 htt://ami.ektf.hu Averaging sums of owers of integers and Faulhaber olynomials José Luis Cereceda a a Distrito Telefónica Madrid Sain jl.cereceda@movistar.es
More information